Hay
Date
May 30, 2025, 4:14 a.m.
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   66.713897] ==================================================================
[   66.725372] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x314/0x34c
[   66.733001] Read of size 1 at addr f2493c8a by task kunit_try_catch/305
[   66.739654] 
[   66.741180] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   66.741210] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.741210] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.741210] Call trace: 
[   66.741241]  unwind_backtrace from show_stack+0x18/0x1c
[   66.741241]  show_stack from dump_stack_lvl+0x70/0x90
[   66.741271]  dump_stack_lvl from print_report+0x158/0x528
[   66.741302]  print_report from kasan_report+0xdc/0x118
[   66.741333]  kasan_report from kasan_alloca_oob_right+0x314/0x34c
[   66.741363]  kasan_alloca_oob_right from kunit_try_run_case+0x22c/0x5a8
[   66.741363]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.741394]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.741424]  kthread from ret_from_fork+0x14/0x20
[   66.741455] Exception stack(0xf2493fb0 to 0xf2493ff8)
[   66.741455] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.741485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.741516] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.741516] 
[   66.848114] The buggy address belongs to stack of task kunit_try_catch/305
[   66.855041] 
[   66.856567] The buggy address belongs to the virtual mapping at
[   66.856567]  [f2490000, f2495000) created by:
[   66.856567]  kernel_clone+0x174/0x794
[   66.870544] 
[   66.872070] The buggy address belongs to the physical page:
[   66.877655] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0823
[   66.884948] flags: 0x80000000(zone=2)
[   66.888641] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.896789] raw: 00000000
[   66.899414] page dumped because: kasan: bad access detected
[   66.905029] 
[   66.906524] Memory state around the buggy address:
[   66.911346]  f2493b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.917938]  f2493c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   66.924499] >f2493c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   66.931060]               ^
[   66.933898]  f2493d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   66.940460]  f2493d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.947021] ==================================================================
Failure - log-parser-boot - fault-unhandled-fault-asynchronous-external-abort-at
[  231.408050] Unhandled fault: asynchronous external abort (0x1211) at 0x00000000
Failure - log-parser-boot - panic-multiline-kernel-panic-not-syncing-attempted-to-kill-init-exitcode
[  231.420684] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007
[  231.428466] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 ]---
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-test_cache_read
[  196.980895] ==================================================================
[  196.988189] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc
[  196.995117] Read of size 4 at addr f32c3d10 by task kunit_try_catch/3953
[  197.001861] 
[  197.003387] CPU: 0 UID: 0 PID: 3953 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  197.003417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  197.003417] Hardware name: Generic DRA74X (Flattened Device Tree)
[  197.003417] Call trace: 
[  197.003417]  unwind_backtrace from show_stack+0x18/0x1c
[  197.003448]  show_stack from dump_stack_lvl+0x70/0x90
[  197.003479]  dump_stack_lvl from print_report+0x158/0x528
[  197.003509]  print_report from kasan_report+0xdc/0x118
[  197.003540]  kasan_report from test_cache_read+0x3c8/0x3fc
[  197.003540]  test_cache_read from vcap_addr_keysets+0x1d8/0x3b4
[  197.003570]  vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc
[  197.003601]  vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8
[  197.003631]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  197.003662]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  197.003662]  kthread from ret_from_fork+0x14/0x20
[  197.003692] Exception stack(0xf32c3fb0 to 0xf32c3ff8)
[  197.003692] 3fa0:                                     00000000 00000000 00000000 00000000
[  197.003723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  197.003723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  197.003753] 
[  197.123657] The buggy address belongs to stack of task kunit_try_catch/3953
[  197.130645]  and is located at offset 496 in frame:
[  197.135559]  vcap_api_addr_keyset_test+0x0/0x6cc
[  197.140228] 
[  197.141723] This frame has 7 objects:
[  197.145416]  [48, 60) 'matches'
[  197.145446]  [80, 104) '__assertion'
[  197.148590]  [144, 252) 'admin'
[  197.152191]  [288, 328) 'keysets'
[  197.155364]  [368, 416) 'keydata'
[  197.158691]  [448, 496) 'mskdata'
[  197.162048]  [528, 576) 'actdata'
[  197.165374] 
[  197.170196] The buggy address belongs to the virtual mapping at
[  197.170196]  [f32c0000, f32c5000) created by:
[  197.170196]  kernel_clone+0x174/0x794
[  197.184204] 
[  197.185699] The buggy address belongs to the physical page:
[  197.191314] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0b2d
[  197.198577] flags: 0x80000000(zone=2)
[  197.202301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  197.210418] raw: 00000000
[  197.213073] page dumped because: kasan: bad access detected
[  197.218658] 
[  197.220184] Memory state around the buggy address:
[  197.225006]  f32c3c00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2
[  197.231567]  f32c3c80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00
[  197.238128] >f32c3d00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3
[  197.244720]                  ^
[  197.247772]  f32c3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  197.254364]  f32c3e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  197.260925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   92.975952] ==================================================================
[   92.983245] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x248/0x260
[   92.990234] Write of size 1 at addr cc90cd78 by task kunit_try_catch/337
[   92.996978] 
[   92.998504] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.998535] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.998535] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.998535] Call trace: 
[   92.998565]  unwind_backtrace from show_stack+0x18/0x1c
[   92.998565]  show_stack from dump_stack_lvl+0x70/0x90
[   92.998596]  dump_stack_lvl from print_report+0x158/0x528
[   92.998626]  print_report from kasan_report+0xdc/0x118
[   92.998657]  kasan_report from strncpy_from_user+0x248/0x260
[   92.998687]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   92.998687]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.998718]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.998748]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.998779]  kthread from ret_from_fork+0x14/0x20
[   92.998809] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.998809] bfa0:                                     00000000 00000000 00000000 00000000
[   92.998840] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.998840] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.998870] 
[   93.110992] Allocated by task 337:
[   93.114410]  kasan_save_track+0x30/0x5c
[   93.118286]  __kasan_kmalloc+0x8c/0x94
[   93.122039]  __kmalloc_noprof+0x20c/0x488
[   93.126098]  kunit_kmalloc_array+0x28/0x60
[   93.130218]  copy_user_test_oob+0xac/0x12b0
[   93.134429]  kunit_try_run_case+0x22c/0x5a8
[   93.138671]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   93.144195]  kthread+0x464/0x810
[   93.147460]  ret_from_fork+0x14/0x20
[   93.151062] 
[   93.152557] The buggy address belongs to the object at cc90cd00
[   93.152557]  which belongs to the cache kmalloc-128 of size 128
[   93.164459] The buggy address is located 0 bytes to the right of
[   93.164459]  allocated 120-byte region [cc90cd00, cc90cd78)
[   93.176086] 
[   93.177581] The buggy address belongs to the physical page:
[   93.183197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   93.190460] flags: 0x0(zone=0)
[   93.193542] page_type: f5(slab)
[   93.196716] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   93.204864] raw: 00000000
[   93.207489] page dumped because: kasan: bad access detected
[   93.213104] 
[   93.214599] Memory state around the buggy address:
[   93.219421]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   93.226013]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.232574] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   93.239135]                                                         ^
[   93.245635]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.252197]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.258758] ==================================================================
[   92.680206] ==================================================================
[   92.687469] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x20/0x260
[   92.694427] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   92.701324] 
[   92.702850] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.702880] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.702880] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.702880] Call trace: 
[   92.702911]  unwind_backtrace from show_stack+0x18/0x1c
[   92.702911]  show_stack from dump_stack_lvl+0x70/0x90
[   92.702941]  dump_stack_lvl from print_report+0x158/0x528
[   92.702972]  print_report from kasan_report+0xdc/0x118
[   92.703002]  kasan_report from kasan_check_range+0x14c/0x198
[   92.703033]  kasan_check_range from strncpy_from_user+0x20/0x260
[   92.703033]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   92.703063]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.703094]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.703124]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.703155]  kthread from ret_from_fork+0x14/0x20
[   92.703186] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.703186] bfa0:                                     00000000 00000000 00000000 00000000
[   92.703216] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.703216] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.703247] 
[   92.821380] Allocated by task 337:
[   92.824829]  kasan_save_track+0x30/0x5c
[   92.828674]  __kasan_kmalloc+0x8c/0x94
[   92.832458]  __kmalloc_noprof+0x20c/0x488
[   92.836486]  kunit_kmalloc_array+0x28/0x60
[   92.840637]  copy_user_test_oob+0xac/0x12b0
[   92.844848]  kunit_try_run_case+0x22c/0x5a8
[   92.849060]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.854583]  kthread+0x464/0x810
[   92.857849]  ret_from_fork+0x14/0x20
[   92.861450] 
[   92.862945] The buggy address belongs to the object at cc90cd00
[   92.862945]  which belongs to the cache kmalloc-128 of size 128
[   92.874847] The buggy address is located 0 bytes inside of
[   92.874847]  allocated 120-byte region [cc90cd00, cc90cd78)
[   92.885955] 
[   92.887481] The buggy address belongs to the physical page:
[   92.893066] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   92.900360] flags: 0x0(zone=0)
[   92.903411] page_type: f5(slab)
[   92.906585] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.914733] raw: 00000000
[   92.917358] page dumped because: kasan: bad access detected
[   92.922973] 
[   92.924468] Memory state around the buggy address:
[   92.929290]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   92.935882]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.942443] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.949005]                                                         ^
[   92.955505]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.962066]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.968658] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   91.230102] ==================================================================
[   91.237365] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x800/0x12b0
[   91.244567] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   91.251403] 
[   91.252899] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   91.252929] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.252960] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.252960] Call trace: 
[   91.252960]  unwind_backtrace from show_stack+0x18/0x1c
[   91.252990]  show_stack from dump_stack_lvl+0x70/0x90
[   91.253021]  dump_stack_lvl from print_report+0x158/0x528
[   91.253051]  print_report from kasan_report+0xdc/0x118
[   91.253082]  kasan_report from kasan_check_range+0x14c/0x198
[   91.253082]  kasan_check_range from copy_user_test_oob+0x800/0x12b0
[   91.253112]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.253143]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.253173]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.253204]  kthread from ret_from_fork+0x14/0x20
[   91.253204] Exception stack(0xf256bfb0 to 0xf256bff8)
[   91.253234] bfa0:                                     00000000 00000000 00000000 00000000
[   91.253234] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.253265] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.253265] 
[   91.365386] Allocated by task 337:
[   91.368835]  kasan_save_track+0x30/0x5c
[   91.372680]  __kasan_kmalloc+0x8c/0x94
[   91.376464]  __kmalloc_noprof+0x20c/0x488
[   91.380523]  kunit_kmalloc_array+0x28/0x60
[   91.384643]  copy_user_test_oob+0xac/0x12b0
[   91.388854]  kunit_try_run_case+0x22c/0x5a8
[   91.393096]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.398620]  kthread+0x464/0x810
[   91.401885]  ret_from_fork+0x14/0x20
[   91.405487] 
[   91.406982] The buggy address belongs to the object at cc90cd00
[   91.406982]  which belongs to the cache kmalloc-128 of size 128
[   91.418884] The buggy address is located 0 bytes inside of
[   91.418884]  allocated 120-byte region [cc90cd00, cc90cd78)
[   91.429992] 
[   91.431488] The buggy address belongs to the physical page:
[   91.437103] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   91.444366] flags: 0x0(zone=0)
[   91.447448] page_type: f5(slab)
[   91.450622] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.458770] raw: 00000000
[   91.461395] page dumped because: kasan: bad access detected
[   91.467010] 
[   91.468505] Memory state around the buggy address:
[   91.473327]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   91.479919]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.486480] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.493041]                                                         ^
[   91.499542]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.506103]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.512664] ==================================================================
[   92.390350] ==================================================================
[   92.397644] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x12b0
[   92.404815] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   92.411651] 
[   92.413146] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.413177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.413208] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.413208] Call trace: 
[   92.413208]  unwind_backtrace from show_stack+0x18/0x1c
[   92.413238]  show_stack from dump_stack_lvl+0x70/0x90
[   92.413269]  dump_stack_lvl from print_report+0x158/0x528
[   92.413299]  print_report from kasan_report+0xdc/0x118
[   92.413299]  kasan_report from kasan_check_range+0x14c/0x198
[   92.413330]  kasan_check_range from copy_user_test_oob+0x604/0x12b0
[   92.413360]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.413391]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.413421]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.413452]  kthread from ret_from_fork+0x14/0x20
[   92.413452] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.413482] bfa0:                                     00000000 00000000 00000000 00000000
[   92.413482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.413513] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.413513] 
[   92.525634] Allocated by task 337:
[   92.529052]  kasan_save_track+0x30/0x5c
[   92.532928]  __kasan_kmalloc+0x8c/0x94
[   92.536712]  __kmalloc_noprof+0x20c/0x488
[   92.540740]  kunit_kmalloc_array+0x28/0x60
[   92.544891]  copy_user_test_oob+0xac/0x12b0
[   92.549102]  kunit_try_run_case+0x22c/0x5a8
[   92.553314]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.558837]  kthread+0x464/0x810
[   92.562103]  ret_from_fork+0x14/0x20
[   92.565704] 
[   92.567199] The buggy address belongs to the object at cc90cd00
[   92.567199]  which belongs to the cache kmalloc-128 of size 128
[   92.579101] The buggy address is located 0 bytes inside of
[   92.579101]  allocated 120-byte region [cc90cd00, cc90cd78)
[   92.590240] 
[   92.591735] The buggy address belongs to the physical page:
[   92.597351] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   92.604614] flags: 0x0(zone=0)
[   92.607696] page_type: f5(slab)
[   92.610870] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.618988] raw: 00000000
[   92.621643] page dumped because: kasan: bad access detected
[   92.627227] 
[   92.628753] Memory state around the buggy address:
[   92.633575]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   92.640136]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.646697] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.653289]                                                         ^
[   92.659759]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.666320]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.672912] ==================================================================
[   92.100402] ==================================================================
[   92.107696] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x544/0x12b0
[   92.114868] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   92.121795] 
[   92.123291] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.123321] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.123352] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.123352] Call trace: 
[   92.123352]  unwind_backtrace from show_stack+0x18/0x1c
[   92.123382]  show_stack from dump_stack_lvl+0x70/0x90
[   92.123413]  dump_stack_lvl from print_report+0x158/0x528
[   92.123443]  print_report from kasan_report+0xdc/0x118
[   92.123443]  kasan_report from kasan_check_range+0x14c/0x198
[   92.123474]  kasan_check_range from copy_user_test_oob+0x544/0x12b0
[   92.123504]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.123535]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.123565]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.123596]  kthread from ret_from_fork+0x14/0x20
[   92.123596] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.123626] bfa0:                                     00000000 00000000 00000000 00000000
[   92.123626] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.123657] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.123657] 
[   92.235778] Allocated by task 337:
[   92.239196]  kasan_save_track+0x30/0x5c
[   92.243072]  __kasan_kmalloc+0x8c/0x94
[   92.246856]  __kmalloc_noprof+0x20c/0x488
[   92.250885]  kunit_kmalloc_array+0x28/0x60
[   92.255035]  copy_user_test_oob+0xac/0x12b0
[   92.259246]  kunit_try_run_case+0x22c/0x5a8
[   92.263458]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.268981]  kthread+0x464/0x810
[   92.272247]  ret_from_fork+0x14/0x20
[   92.275848] 
[   92.277343] The buggy address belongs to the object at cc90cd00
[   92.277343]  which belongs to the cache kmalloc-128 of size 128
[   92.289245] The buggy address is located 0 bytes inside of
[   92.289245]  allocated 120-byte region [cc90cd00, cc90cd78)
[   92.300354] 
[   92.301849] The buggy address belongs to the physical page:
[   92.307464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   92.314758] flags: 0x0(zone=0)
[   92.317810] page_type: f5(slab)
[   92.320983] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.329132] raw: 00000000
[   92.331756] page dumped because: kasan: bad access detected
[   92.337371] 
[   92.338867] Memory state around the buggy address:
[   92.343688]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   92.350280]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.356842] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.363403]                                                         ^
[   92.369903]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.376464]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.383026] ==================================================================
[   91.520233] ==================================================================
[   91.527526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c4/0x12b0
[   91.534698] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   91.541625] 
[   91.543121] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   91.543151] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.543182] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.543182] Call trace: 
[   91.543182]  unwind_backtrace from show_stack+0x18/0x1c
[   91.543212]  show_stack from dump_stack_lvl+0x70/0x90
[   91.543243]  dump_stack_lvl from print_report+0x158/0x528
[   91.543273]  print_report from kasan_report+0xdc/0x118
[   91.543304]  kasan_report from kasan_check_range+0x14c/0x198
[   91.543304]  kasan_check_range from copy_user_test_oob+0x3c4/0x12b0
[   91.543334]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.543365]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.543395]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.543426]  kthread from ret_from_fork+0x14/0x20
[   91.543426] Exception stack(0xf256bfb0 to 0xf256bff8)
[   91.543457] bfa0:                                     00000000 00000000 00000000 00000000
[   91.543457] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.543487] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.543487] 
[   91.655609] Allocated by task 337:
[   91.659057]  kasan_save_track+0x30/0x5c
[   91.662902]  __kasan_kmalloc+0x8c/0x94
[   91.666687]  __kmalloc_noprof+0x20c/0x488
[   91.670745]  kunit_kmalloc_array+0x28/0x60
[   91.674865]  copy_user_test_oob+0xac/0x12b0
[   91.679077]  kunit_try_run_case+0x22c/0x5a8
[   91.683319]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.688842]  kthread+0x464/0x810
[   91.692077]  ret_from_fork+0x14/0x20
[   91.695678] 
[   91.697204] The buggy address belongs to the object at cc90cd00
[   91.697204]  which belongs to the cache kmalloc-128 of size 128
[   91.709075] The buggy address is located 0 bytes inside of
[   91.709075]  allocated 120-byte region [cc90cd00, cc90cd78)
[   91.720214] 
[   91.721710] The buggy address belongs to the physical page:
[   91.727325] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   91.734588] flags: 0x0(zone=0)
[   91.737670] page_type: f5(slab)
[   91.740844] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.748962] raw: 00000000
[   91.751617] page dumped because: kasan: bad access detected
[   91.757232] 
[   91.758728] Memory state around the buggy address:
[   91.763549]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   91.770111]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.776702] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.783264]                                                         ^
[   91.789733]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.796325]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.802886] ==================================================================
[   91.810455] ==================================================================
[   91.817718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x484/0x12b0
[   91.824890] Read of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   91.831726] 
[   91.833251] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   91.833282] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   91.833282] Hardware name: Generic DRA74X (Flattened Device Tree)
[   91.833282] Call trace: 
[   91.833312]  unwind_backtrace from show_stack+0x18/0x1c
[   91.833312]  show_stack from dump_stack_lvl+0x70/0x90
[   91.833343]  dump_stack_lvl from print_report+0x158/0x528
[   91.833374]  print_report from kasan_report+0xdc/0x118
[   91.833404]  kasan_report from kasan_check_range+0x14c/0x198
[   91.833435]  kasan_check_range from copy_user_test_oob+0x484/0x12b0
[   91.833435]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   91.833465]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.833496]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   91.833526]  kthread from ret_from_fork+0x14/0x20
[   91.833557] Exception stack(0xf256bfb0 to 0xf256bff8)
[   91.833557] bfa0:                                     00000000 00000000 00000000 00000000
[   91.833587] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   91.833587] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   91.833618] 
[   91.945739] Allocated by task 337:
[   91.949157]  kasan_save_track+0x30/0x5c
[   91.953033]  __kasan_kmalloc+0x8c/0x94
[   91.956817]  __kmalloc_noprof+0x20c/0x488
[   91.960845]  kunit_kmalloc_array+0x28/0x60
[   91.964965]  copy_user_test_oob+0xac/0x12b0
[   91.969177]  kunit_try_run_case+0x22c/0x5a8
[   91.973419]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.978942]  kthread+0x464/0x810
[   91.982208]  ret_from_fork+0x14/0x20
[   91.985809] 
[   91.987304] The buggy address belongs to the object at cc90cd00
[   91.987304]  which belongs to the cache kmalloc-128 of size 128
[   91.999206] The buggy address is located 0 bytes inside of
[   91.999206]  allocated 120-byte region [cc90cd00, cc90cd78)
[   92.010314] 
[   92.011810] The buggy address belongs to the physical page:
[   92.017425] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   92.024688] flags: 0x0(zone=0)
[   92.027770] page_type: f5(slab)
[   92.030944] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.039093] raw: 00000000
[   92.041717] page dumped because: kasan: bad access detected
[   92.047332] 
[   92.048828] Memory state around the buggy address:
[   92.053649]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   92.060211]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.066802] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.073364]                                                         ^
[   92.079864]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.086425]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.092987] ==================================================================
[   90.933654] ==================================================================
[   90.947052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x24c/0x12b0
[   90.954254] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   90.961181] 
[   90.962677] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.962707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.962738] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.962738] Call trace: 
[   90.962738]  unwind_backtrace from show_stack+0x18/0x1c
[   90.962768]  show_stack from dump_stack_lvl+0x70/0x90
[   90.962799]  dump_stack_lvl from print_report+0x158/0x528
[   90.962829]  print_report from kasan_report+0xdc/0x118
[   90.962860]  kasan_report from kasan_check_range+0x14c/0x198
[   90.962860]  kasan_check_range from copy_user_test_oob+0x24c/0x12b0
[   90.962890]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   90.962921]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.962951]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.962982]  kthread from ret_from_fork+0x14/0x20
[   90.963012] Exception stack(0xf256bfb0 to 0xf256bff8)
[   90.963012] bfa0:                                     00000000 00000000 00000000 00000000
[   90.963043] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.963043] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.963073] 
[   91.075164] Allocated by task 337:
[   91.078613]  kasan_save_track+0x30/0x5c
[   91.082489]  __kasan_kmalloc+0x8c/0x94
[   91.086242]  __kmalloc_noprof+0x20c/0x488
[   91.090301]  kunit_kmalloc_array+0x28/0x60
[   91.094421]  copy_user_test_oob+0xac/0x12b0
[   91.098663]  kunit_try_run_case+0x22c/0x5a8
[   91.102874]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   91.108398]  kthread+0x464/0x810
[   91.111663]  ret_from_fork+0x14/0x20
[   91.115264] 
[   91.116760] The buggy address belongs to the object at cc90cd00
[   91.116760]  which belongs to the cache kmalloc-128 of size 128
[   91.128662] The buggy address is located 0 bytes inside of
[   91.128662]  allocated 120-byte region [cc90cd00, cc90cd78)
[   91.139770] 
[   91.141265] The buggy address belongs to the physical page:
[   91.146881] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   91.154144] flags: 0x0(zone=0)
[   91.157226] page_type: f5(slab)
[   91.160400] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   91.168548] raw: 00000000
[   91.171173] page dumped because: kasan: bad access detected
[   91.176788] 
[   91.178283] Memory state around the buggy address:
[   91.183105]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   91.189697]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.196258] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   91.202819]                                                         ^
[   91.209320]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.215881]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   91.222442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   90.636047] ==================================================================
[   90.643310] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x144/0x3fc
[   90.650756] Write of size 8 at addr cc963178 by task kunit_try_catch/333
[   90.657501] 
[   90.659027] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.659057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.659057] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.659057] Call trace: 
[   90.659088]  unwind_backtrace from show_stack+0x18/0x1c
[   90.659118]  show_stack from dump_stack_lvl+0x70/0x90
[   90.659118]  dump_stack_lvl from print_report+0x158/0x528
[   90.659149]  print_report from kasan_report+0xdc/0x118
[   90.659179]  kasan_report from kasan_check_range+0x14c/0x198
[   90.659210]  kasan_check_range from copy_to_kernel_nofault+0x144/0x3fc
[   90.659240]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x258/0x4fc
[   90.659240]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.659271]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.659301]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.659332]  kthread from ret_from_fork+0x14/0x20
[   90.659362] Exception stack(0xf2553fb0 to 0xf2553ff8)
[   90.659362] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.659393] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.659393] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.659423] 
[   90.779846] Allocated by task 333:
[   90.783264]  kasan_save_track+0x30/0x5c
[   90.787139]  __kasan_kmalloc+0x8c/0x94
[   90.790893]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   90.795745]  kunit_try_run_case+0x22c/0x5a8
[   90.799957]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.805480]  kthread+0x464/0x810
[   90.808746]  ret_from_fork+0x14/0x20
[   90.812347] 
[   90.813842] The buggy address belongs to the object at cc963100
[   90.813842]  which belongs to the cache kmalloc-128 of size 128
[   90.825744] The buggy address is located 0 bytes to the right of
[   90.825744]  allocated 120-byte region [cc963100, cc963178)
[   90.837371] 
[   90.838897] The buggy address belongs to the physical page:
[   90.844482] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963
[   90.851745] flags: 0x0(zone=0)
[   90.854827] page_type: f5(slab)
[   90.858001] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   90.866149] raw: 00000000
[   90.868804] page dumped because: kasan: bad access detected
[   90.874389] 
[   90.875915] Memory state around the buggy address:
[   90.880737]  cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   90.887298]  cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.893859] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   90.900451]                                                         ^
[   90.906921]  cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.913482]  cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.920074] ==================================================================
[   90.343170] ==================================================================
[   90.358154] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x37c/0x3fc
[   90.365600] Read of size 8 at addr cc963178 by task kunit_try_catch/333
[   90.372253] 
[   90.373779] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.373809] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.373809] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.373840] Call trace: 
[   90.373840]  unwind_backtrace from show_stack+0x18/0x1c
[   90.373870]  show_stack from dump_stack_lvl+0x70/0x90
[   90.373901]  dump_stack_lvl from print_report+0x158/0x528
[   90.373901]  print_report from kasan_report+0xdc/0x118
[   90.373931]  kasan_report from copy_to_kernel_nofault+0x37c/0x3fc
[   90.373962]  copy_to_kernel_nofault from copy_to_kernel_nofault_oob+0x1c0/0x4fc
[   90.373992]  copy_to_kernel_nofault_oob from kunit_try_run_case+0x22c/0x5a8
[   90.374023]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.374053]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.374084]  kthread from ret_from_fork+0x14/0x20
[   90.374084] Exception stack(0xf2553fb0 to 0xf2553ff8)
[   90.374114] 3fa0:                                     00000000 00000000 00000000 00000000
[   90.374114] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.374145] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.374145] 
[   90.488464] Allocated by task 333:
[   90.491882]  kasan_save_track+0x30/0x5c
[   90.495758]  __kasan_kmalloc+0x8c/0x94
[   90.499542]  copy_to_kernel_nofault_oob+0xf0/0x4fc
[   90.504364]  kunit_try_run_case+0x22c/0x5a8
[   90.508605]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.514129]  kthread+0x464/0x810
[   90.517395]  ret_from_fork+0x14/0x20
[   90.520996] 
[   90.522491] The buggy address belongs to the object at cc963100
[   90.522491]  which belongs to the cache kmalloc-128 of size 128
[   90.534393] The buggy address is located 0 bytes to the right of
[   90.534393]  allocated 120-byte region [cc963100, cc963178)
[   90.546020] 
[   90.547515] The buggy address belongs to the physical page:
[   90.553131] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c963
[   90.560424] flags: 0x0(zone=0)
[   90.563507] page_type: f5(slab)
[   90.566650] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   90.574798] raw: 00000000
[   90.577453] page dumped because: kasan: bad access detected
[   90.583038] 
[   90.584564] Memory state around the buggy address:
[   90.589385]  cc963000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   90.595947]  cc963080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.602508] >cc963100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   90.609100]                                                         ^
[   90.615570]  cc963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.622131]  cc963200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.628723] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   89.826995] ==================================================================
[   89.842224] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc
[   89.848999] Read of size 1 at addr f02b57f3 by task kunit_try_catch/321
[   89.855651] 
[   89.857147] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.857177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.857208] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.857208] Call trace: 
[   89.857208]  unwind_backtrace from show_stack+0x18/0x1c
[   89.857238]  show_stack from dump_stack_lvl+0x70/0x90
[   89.857269]  dump_stack_lvl from print_report+0x158/0x528
[   89.857299]  print_report from kasan_report+0xdc/0x118
[   89.857330]  kasan_report from vmalloc_oob+0x6a0/0x6fc
[   89.857330]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   89.857360]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.857391]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.857421]  kthread from ret_from_fork+0x14/0x20
[   89.857452] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   89.857452] bfa0:                                     00000000 00000000 00000000 00000000
[   89.857482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.857482] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.857513] 
[   89.962219] The buggy address belongs to the virtual mapping at
[   89.962219]  [f02b5000, f02b7000) created by:
[   89.962219]  vmalloc_oob+0x88/0x6fc
[   89.976043] 
[   89.977539] The buggy address belongs to the physical page:
[   89.983154] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f
[   89.990417] flags: 0x80000000(zone=2)
[   89.994140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.002258] raw: 00000000
[   90.004913] page dumped because: kasan: bad access detected
[   90.010528] 
[   90.012023] Memory state around the buggy address:
[   90.016845]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.023406]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.029998] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.036560]                                                      ^
[   90.042785]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.049346]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.055908] ==================================================================
[   90.063507] ==================================================================
[   90.070800] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc
[   90.077545] Read of size 1 at addr f02b57f8 by task kunit_try_catch/321
[   90.084197] 
[   90.085693] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.085723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.085754] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.085754] Call trace: 
[   90.085754]  unwind_backtrace from show_stack+0x18/0x1c
[   90.085784]  show_stack from dump_stack_lvl+0x70/0x90
[   90.085815]  dump_stack_lvl from print_report+0x158/0x528
[   90.085845]  print_report from kasan_report+0xdc/0x118
[   90.085876]  kasan_report from vmalloc_oob+0x6a8/0x6fc
[   90.085876]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   90.085906]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.085937]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.085968]  kthread from ret_from_fork+0x14/0x20
[   90.085998] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   90.085998] bfa0:                                     00000000 00000000 00000000 00000000
[   90.086029] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.086029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.086059] 
[   90.190734] The buggy address belongs to the virtual mapping at
[   90.190734]  [f02b5000, f02b7000) created by:
[   90.190734]  vmalloc_oob+0x88/0x6fc
[   90.204559] 
[   90.206085] The buggy address belongs to the physical page:
[   90.211669] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f
[   90.218963] flags: 0x80000000(zone=2)
[   90.222656] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.230804] raw: 00000000
[   90.233428] page dumped because: kasan: bad access detected
[   90.239044] 
[   90.240539] Memory state around the buggy address:
[   90.245361]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.251953]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.258514] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.265075]                                                         ^
[   90.271575]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.278137]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.284698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   72.234069] ==================================================================
[   72.249053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0
[   72.256500] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.263153] 
[   72.264678] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.264678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.264709] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.264709] Call trace: 
[   72.264709]  unwind_backtrace from show_stack+0x18/0x1c
[   72.264739]  show_stack from dump_stack_lvl+0x70/0x90
[   72.264770]  dump_stack_lvl from print_report+0x158/0x528
[   72.264801]  print_report from kasan_report+0xdc/0x118
[   72.264831]  kasan_report from kasan_atomics_helper+0x5044/0x5ab0
[   72.264831]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.264862]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.264892]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.264923]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.264953]  kthread from ret_from_fork+0x14/0x20
[   72.264984] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.264984] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.265014] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.265014] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.265045] 
[   72.376892] Allocated by task 317:
[   72.380310]  kasan_save_track+0x30/0x5c
[   72.384185]  __kasan_kmalloc+0x8c/0x94
[   72.387969]  kasan_atomics+0xc0/0x33c
[   72.391662]  kunit_try_run_case+0x22c/0x5a8
[   72.395874]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.401428]  kthread+0x464/0x810
[   72.404663]  ret_from_fork+0x14/0x20
[   72.408264] 
[   72.409790] The buggy address belongs to the object at cc90f300
[   72.409790]  which belongs to the cache kmalloc-64 of size 64
[   72.421508] The buggy address is located 0 bytes to the right of
[   72.421508]  allocated 48-byte region [cc90f300, cc90f330)
[   72.433044] 
[   72.434539] The buggy address belongs to the physical page:
[   72.440155] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   72.447448] flags: 0x0(zone=0)
[   72.450531] page_type: f5(slab)
[   72.453674] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.461822] raw: 00000000
[   72.464477] page dumped because: kasan: bad access detected
[   72.470092] 
[   72.471588] Memory state around the buggy address:
[   72.476409]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.482971]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.489562] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.496124]                              ^
[   72.500244]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.506805]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.513397] ==================================================================
[   87.840515] ==================================================================
[   87.847808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0
[   87.855255] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.861999] 
[   87.863494] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.863525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.863525] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.863555] Call trace: 
[   87.863555]  unwind_backtrace from show_stack+0x18/0x1c
[   87.863586]  show_stack from dump_stack_lvl+0x70/0x90
[   87.863616]  dump_stack_lvl from print_report+0x158/0x528
[   87.863616]  print_report from kasan_report+0xdc/0x118
[   87.863647]  kasan_report from kasan_check_range+0x14c/0x198
[   87.863677]  kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0
[   87.863708]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.863739]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.863769]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.863769]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.863800]  kthread from ret_from_fork+0x14/0x20
[   87.863830] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.863830] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.863861] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.863891] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.863891] 
[   87.981872] Allocated by task 317:
[   87.985290]  kasan_save_track+0x30/0x5c
[   87.989166]  __kasan_kmalloc+0x8c/0x94
[   87.992950]  kasan_atomics+0xc0/0x33c
[   87.996643]  kunit_try_run_case+0x22c/0x5a8
[   88.000854]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.006378]  kthread+0x464/0x810
[   88.009643]  ret_from_fork+0x14/0x20
[   88.013244] 
[   88.014739] The buggy address belongs to the object at cc90f300
[   88.014739]  which belongs to the cache kmalloc-64 of size 64
[   88.026458] The buggy address is located 0 bytes to the right of
[   88.026458]  allocated 48-byte region [cc90f300, cc90f330)
[   88.038024] 
[   88.039520] The buggy address belongs to the physical page:
[   88.045135] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.052398] flags: 0x0(zone=0)
[   88.055480] page_type: f5(slab)
[   88.058654] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.066772] raw: 00000000
[   88.069427] page dumped because: kasan: bad access detected
[   88.075042] 
[   88.076538] Memory state around the buggy address:
[   88.081359]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.087921]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.094512] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.101074]                              ^
[   88.105194]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.111755]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.118316] ==================================================================
[   88.410766] ==================================================================
[   88.418029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0
[   88.425476] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.432159] 
[   88.433654] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.433685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.433685] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.433715] Call trace: 
[   88.433715]  unwind_backtrace from show_stack+0x18/0x1c
[   88.433746]  show_stack from dump_stack_lvl+0x70/0x90
[   88.433776]  dump_stack_lvl from print_report+0x158/0x528
[   88.433776]  print_report from kasan_report+0xdc/0x118
[   88.433807]  kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0
[   88.433837]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.433868]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.433898]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.433929]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.433929]  kthread from ret_from_fork+0x14/0x20
[   88.433959] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.433990] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.433990] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.434020] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.434020] 
[   88.545867] Allocated by task 317:
[   88.549316]  kasan_save_track+0x30/0x5c
[   88.553161]  __kasan_kmalloc+0x8c/0x94
[   88.556945]  kasan_atomics+0xc0/0x33c
[   88.560638]  kunit_try_run_case+0x22c/0x5a8
[   88.564880]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.570404]  kthread+0x464/0x810
[   88.573638]  ret_from_fork+0x14/0x20
[   88.577239] 
[   88.578765] The buggy address belongs to the object at cc90f300
[   88.578765]  which belongs to the cache kmalloc-64 of size 64
[   88.590484] The buggy address is located 0 bytes to the right of
[   88.590484]  allocated 48-byte region [cc90f300, cc90f330)
[   88.602020] 
[   88.603546] The buggy address belongs to the physical page:
[   88.609130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.616424] flags: 0x0(zone=0)
[   88.619476] page_type: f5(slab)
[   88.622650] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.630798] raw: 00000000
[   88.633453] page dumped because: kasan: bad access detected
[   88.639038] 
[   88.640533] Memory state around the buggy address:
[   88.645385]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.651947]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.658508] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.665069]                              ^
[   88.669219]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.675781]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.682342] ==================================================================
[   73.078826] ==================================================================
[   73.086090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0
[   73.093566] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.100311] 
[   73.101806] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.101837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.101837] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.101867] Call trace: 
[   73.101867]  unwind_backtrace from show_stack+0x18/0x1c
[   73.101898]  show_stack from dump_stack_lvl+0x70/0x90
[   73.101898]  dump_stack_lvl from print_report+0x158/0x528
[   73.101928]  print_report from kasan_report+0xdc/0x118
[   73.101959]  kasan_report from kasan_atomics_helper+0x550c/0x5ab0
[   73.101989]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.102020]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.102050]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.102081]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.102081]  kthread from ret_from_fork+0x14/0x20
[   73.102111] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.102142] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.102142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.102172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.102172] 
[   73.214019] Allocated by task 317:
[   73.217468]  kasan_save_track+0x30/0x5c
[   73.221313]  __kasan_kmalloc+0x8c/0x94
[   73.225097]  kasan_atomics+0xc0/0x33c
[   73.228790]  kunit_try_run_case+0x22c/0x5a8
[   73.233032]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.238555]  kthread+0x464/0x810
[   73.241790]  ret_from_fork+0x14/0x20
[   73.245422] 
[   73.246917] The buggy address belongs to the object at cc90f300
[   73.246917]  which belongs to the cache kmalloc-64 of size 64
[   73.258636] The buggy address is located 0 bytes to the right of
[   73.258636]  allocated 48-byte region [cc90f300, cc90f330)
[   73.270202] 
[   73.271697] The buggy address belongs to the physical page:
[   73.277313] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.284576] flags: 0x0(zone=0)
[   73.287658] page_type: f5(slab)
[   73.290832] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.298980] raw: 00000000
[   73.301605] page dumped because: kasan: bad access detected
[   73.307220] 
[   73.308715] Memory state around the buggy address:
[   73.313537]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.320098]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.326690] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.333251]                              ^
[   73.337371]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.343933]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.350524] ==================================================================
[   72.799926] ==================================================================
[   72.807189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0
[   72.814636] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.821289] 
[   72.822814] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.822845] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.822845] Call trace: 
[   72.822845]  unwind_backtrace from show_stack+0x18/0x1c
[   72.822875]  show_stack from dump_stack_lvl+0x70/0x90
[   72.822906]  dump_stack_lvl from print_report+0x158/0x528
[   72.822937]  print_report from kasan_report+0xdc/0x118
[   72.822967]  kasan_report from kasan_atomics_helper+0x5170/0x5ab0
[   72.822967]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.822998]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.823028]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.823059]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.823089]  kthread from ret_from_fork+0x14/0x20
[   72.823120] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.823120] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.823150] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.823150] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.823181] 
[   72.935028] Allocated by task 317:
[   72.938446]  kasan_save_track+0x30/0x5c
[   72.942321]  __kasan_kmalloc+0x8c/0x94
[   72.946105]  kasan_atomics+0xc0/0x33c
[   72.949798]  kunit_try_run_case+0x22c/0x5a8
[   72.954010]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.959533]  kthread+0x464/0x810
[   72.962799]  ret_from_fork+0x14/0x20
[   72.966400] 
[   72.967895] The buggy address belongs to the object at cc90f300
[   72.967895]  which belongs to the cache kmalloc-64 of size 64
[   72.979644] The buggy address is located 0 bytes to the right of
[   72.979644]  allocated 48-byte region [cc90f300, cc90f330)
[   72.991180] 
[   72.992675] The buggy address belongs to the physical page:
[   72.998291] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.005554] flags: 0x0(zone=0)
[   73.008636] page_type: f5(slab)
[   73.011810] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.019958] raw: 00000000
[   73.022613] page dumped because: kasan: bad access detected
[   73.028198] 
[   73.029724] Memory state around the buggy address:
[   73.034545]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.041107]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.047668] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.054260]                              ^
[   73.058380]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.064941]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.071502] ==================================================================
[   79.038940] ==================================================================
[   79.046203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0
[   79.053649] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.060394] 
[   79.061920] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.061950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.061950] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.061950] Call trace: 
[   79.061981]  unwind_backtrace from show_stack+0x18/0x1c
[   79.061981]  show_stack from dump_stack_lvl+0x70/0x90
[   79.062011]  dump_stack_lvl from print_report+0x158/0x528
[   79.062042]  print_report from kasan_report+0xdc/0x118
[   79.062072]  kasan_report from kasan_check_range+0x14c/0x198
[   79.062072]  kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0
[   79.062103]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.062133]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.062164]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.062194]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.062225]  kthread from ret_from_fork+0x14/0x20
[   79.062225] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.062255] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.062286] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.062286] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.062286] 
[   79.180267] Allocated by task 317:
[   79.183685]  kasan_save_track+0x30/0x5c
[   79.187561]  __kasan_kmalloc+0x8c/0x94
[   79.191345]  kasan_atomics+0xc0/0x33c
[   79.195037]  kunit_try_run_case+0x22c/0x5a8
[   79.199249]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.204803]  kthread+0x464/0x810
[   79.208038]  ret_from_fork+0x14/0x20
[   79.211639] 
[   79.213165] The buggy address belongs to the object at cc90f300
[   79.213165]  which belongs to the cache kmalloc-64 of size 64
[   79.224884] The buggy address is located 0 bytes to the right of
[   79.224884]  allocated 48-byte region [cc90f300, cc90f330)
[   79.236419] 
[   79.237915] The buggy address belongs to the physical page:
[   79.243530] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.250793] flags: 0x0(zone=0)
[   79.253875] page_type: f5(slab)
[   79.257049] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.265197] raw: 00000000
[   79.267822] page dumped because: kasan: bad access detected
[   79.273437] 
[   79.274932] Memory state around the buggy address:
[   79.279754]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.286346]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.292907] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.299468]                              ^
[   79.303588]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.310180]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.316741] ==================================================================
[   73.921630] ==================================================================
[   73.928894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0
[   73.936279] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.943023] 
[   73.944519] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.944549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.944549] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.944580] Call trace: 
[   73.944580]  unwind_backtrace from show_stack+0x18/0x1c
[   73.944610]  show_stack from dump_stack_lvl+0x70/0x90
[   73.944641]  dump_stack_lvl from print_report+0x158/0x528
[   73.944671]  print_report from kasan_report+0xdc/0x118
[   73.944671]  kasan_report from kasan_check_range+0x14c/0x198
[   73.944702]  kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0
[   73.944732]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.944763]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.944793]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.944824]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.944824]  kthread from ret_from_fork+0x14/0x20
[   73.944854] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.944885] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.944885] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.944915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.944915] 
[   74.062805] Allocated by task 317:
[   74.066223]  kasan_save_track+0x30/0x5c
[   74.070098]  __kasan_kmalloc+0x8c/0x94
[   74.073883]  kasan_atomics+0xc0/0x33c
[   74.077575]  kunit_try_run_case+0x22c/0x5a8
[   74.081787]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.087310]  kthread+0x464/0x810
[   74.090576]  ret_from_fork+0x14/0x20
[   74.094177] 
[   74.095672] The buggy address belongs to the object at cc90f300
[   74.095672]  which belongs to the cache kmalloc-64 of size 64
[   74.107421] The buggy address is located 0 bytes to the right of
[   74.107421]  allocated 48-byte region [cc90f300, cc90f330)
[   74.118957] 
[   74.120452] The buggy address belongs to the physical page:
[   74.126068] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.133331] flags: 0x0(zone=0)
[   74.136413] page_type: f5(slab)
[   74.139587] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.147735] raw: 00000000
[   74.150360] page dumped because: kasan: bad access detected
[   74.155975] 
[   74.157501] Memory state around the buggy address:
[   74.162322]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.168884]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.175445] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.182037]                              ^
[   74.186157]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.192718]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.199279] ==================================================================
[   85.850891] ==================================================================
[   85.858154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0
[   85.865631] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.872375] 
[   85.873870] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.873901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.873901] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.873931] Call trace: 
[   85.873931]  unwind_backtrace from show_stack+0x18/0x1c
[   85.873962]  show_stack from dump_stack_lvl+0x70/0x90
[   85.873992]  dump_stack_lvl from print_report+0x158/0x528
[   85.873992]  print_report from kasan_report+0xdc/0x118
[   85.874023]  kasan_report from kasan_check_range+0x14c/0x198
[   85.874053]  kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0
[   85.874084]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.874114]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.874114]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.874145]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.874176]  kthread from ret_from_fork+0x14/0x20
[   85.874206] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.874206] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.874237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.874237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.874267] 
[   85.992248] Allocated by task 317:
[   85.995666]  kasan_save_track+0x30/0x5c
[   85.999542]  __kasan_kmalloc+0x8c/0x94
[   86.003326]  kasan_atomics+0xc0/0x33c
[   86.007019]  kunit_try_run_case+0x22c/0x5a8
[   86.011230]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.016754]  kthread+0x464/0x810
[   86.020019]  ret_from_fork+0x14/0x20
[   86.023620] 
[   86.025115] The buggy address belongs to the object at cc90f300
[   86.025115]  which belongs to the cache kmalloc-64 of size 64
[   86.036834] The buggy address is located 0 bytes to the right of
[   86.036834]  allocated 48-byte region [cc90f300, cc90f330)
[   86.048400] 
[   86.049896] The buggy address belongs to the physical page:
[   86.055511] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.062774] flags: 0x0(zone=0)
[   86.065856] page_type: f5(slab)
[   86.069030] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.077178] raw: 00000000
[   86.079803] page dumped because: kasan: bad access detected
[   86.085418] 
[   86.086914] Memory state around the buggy address:
[   86.091735]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.098297]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.104888] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.111450]                              ^
[   86.115570]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.122131]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.128723] ==================================================================
[   87.270294] ==================================================================
[   87.277557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0
[   87.285034] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.291778] 
[   87.293273] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.293304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.293304] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.293334] Call trace: 
[   87.293334]  unwind_backtrace from show_stack+0x18/0x1c
[   87.293365]  show_stack from dump_stack_lvl+0x70/0x90
[   87.293365]  dump_stack_lvl from print_report+0x158/0x528
[   87.293395]  print_report from kasan_report+0xdc/0x118
[   87.293426]  kasan_report from kasan_check_range+0x14c/0x198
[   87.293457]  kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0
[   87.293487]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.293487]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.293518]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.293548]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.293579]  kthread from ret_from_fork+0x14/0x20
[   87.293609] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.293609] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.293640] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.293640] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.293670] 
[   87.411651] Allocated by task 317:
[   87.415069]  kasan_save_track+0x30/0x5c
[   87.418914]  __kasan_kmalloc+0x8c/0x94
[   87.422698]  kasan_atomics+0xc0/0x33c
[   87.426391]  kunit_try_run_case+0x22c/0x5a8
[   87.430633]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.436157]  kthread+0x464/0x810
[   87.439392]  ret_from_fork+0x14/0x20
[   87.442993] 
[   87.444519] The buggy address belongs to the object at cc90f300
[   87.444519]  which belongs to the cache kmalloc-64 of size 64
[   87.456237] The buggy address is located 0 bytes to the right of
[   87.456237]  allocated 48-byte region [cc90f300, cc90f330)
[   87.467773] 
[   87.469299] The buggy address belongs to the physical page:
[   87.474884] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.482177] flags: 0x0(zone=0)
[   87.485229] page_type: f5(slab)
[   87.488403] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.496551] raw: 00000000
[   87.499206] page dumped because: kasan: bad access detected
[   87.504791] 
[   87.506317] Memory state around the buggy address:
[   87.511108]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.517700]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.524261] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.530822]                              ^
[   87.534973]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.541534]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.548095] ==================================================================
[   79.609191] ==================================================================
[   79.616455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0
[   79.623901] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.630645] 
[   79.632171] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.632202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.632202] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.632202] Call trace: 
[   79.632232]  unwind_backtrace from show_stack+0x18/0x1c
[   79.632263]  show_stack from dump_stack_lvl+0x70/0x90
[   79.632263]  dump_stack_lvl from print_report+0x158/0x528
[   79.632293]  print_report from kasan_report+0xdc/0x118
[   79.632324]  kasan_report from kasan_check_range+0x14c/0x198
[   79.632354]  kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0
[   79.632354]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.632385]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.632415]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.632446]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.632476]  kthread from ret_from_fork+0x14/0x20
[   79.632507] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.632507] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.632537] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.632537] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.632568] 
[   79.750518] Allocated by task 317:
[   79.753967]  kasan_save_track+0x30/0x5c
[   79.757843]  __kasan_kmalloc+0x8c/0x94
[   79.761596]  kasan_atomics+0xc0/0x33c
[   79.765289]  kunit_try_run_case+0x22c/0x5a8
[   79.769531]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.775054]  kthread+0x464/0x810
[   79.778320]  ret_from_fork+0x14/0x20
[   79.781921] 
[   79.783416] The buggy address belongs to the object at cc90f300
[   79.783416]  which belongs to the cache kmalloc-64 of size 64
[   79.795135] The buggy address is located 0 bytes to the right of
[   79.795135]  allocated 48-byte region [cc90f300, cc90f330)
[   79.806701] 
[   79.808197] The buggy address belongs to the physical page:
[   79.813812] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.821075] flags: 0x0(zone=0)
[   79.824157] page_type: f5(slab)
[   79.827331] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.835449] raw: 00000000
[   79.838104] page dumped because: kasan: bad access detected
[   79.843719] 
[   79.845214] Memory state around the buggy address:
[   79.850036]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.856597]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.863189] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.869750]                              ^
[   79.873870]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.880432]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.886993] ==================================================================
[   75.340515] ==================================================================
[   75.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0
[   75.355133] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.361877] 
[   75.363403] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.363403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.363433] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.363433] Call trace: 
[   75.363433]  unwind_backtrace from show_stack+0x18/0x1c
[   75.363464]  show_stack from dump_stack_lvl+0x70/0x90
[   75.363494]  dump_stack_lvl from print_report+0x158/0x528
[   75.363525]  print_report from kasan_report+0xdc/0x118
[   75.363555]  kasan_report from kasan_check_range+0x14c/0x198
[   75.363555]  kasan_check_range from kasan_atomics_helper+0x790/0x5ab0
[   75.363586]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.363616]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.363647]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.363677]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.363708]  kthread from ret_from_fork+0x14/0x20
[   75.363708] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.363739] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.363739] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.363769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.363769] 
[   75.481658] Allocated by task 317:
[   75.485107]  kasan_save_track+0x30/0x5c
[   75.488952]  __kasan_kmalloc+0x8c/0x94
[   75.492736]  kasan_atomics+0xc0/0x33c
[   75.496429]  kunit_try_run_case+0x22c/0x5a8
[   75.500640]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.506195]  kthread+0x464/0x810
[   75.509429]  ret_from_fork+0x14/0x20
[   75.513061] 
[   75.514556] The buggy address belongs to the object at cc90f300
[   75.514556]  which belongs to the cache kmalloc-64 of size 64
[   75.526275] The buggy address is located 0 bytes to the right of
[   75.526275]  allocated 48-byte region [cc90f300, cc90f330)
[   75.537811] 
[   75.539337] The buggy address belongs to the physical page:
[   75.544921] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.552215] flags: 0x0(zone=0)
[   75.555297] page_type: f5(slab)
[   75.558471] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.566589] raw: 00000000
[   75.569244] page dumped because: kasan: bad access detected
[   75.574859] 
[   75.576354] Memory state around the buggy address:
[   75.581176]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.587738]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.594329] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.600891]                              ^
[   75.605010]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.611602]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.618164] ==================================================================
[   75.625488] ==================================================================
[   75.632751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0
[   75.640106] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.646850] 
[   75.648376] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.648406] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.648406] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.648406] Call trace: 
[   75.648437]  unwind_backtrace from show_stack+0x18/0x1c
[   75.648437]  show_stack from dump_stack_lvl+0x70/0x90
[   75.648468]  dump_stack_lvl from print_report+0x158/0x528
[   75.648498]  print_report from kasan_report+0xdc/0x118
[   75.648529]  kasan_report from kasan_check_range+0x14c/0x198
[   75.648529]  kasan_check_range from kasan_atomics_helper+0x834/0x5ab0
[   75.648559]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.648590]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.648620]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.648651]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.648681]  kthread from ret_from_fork+0x14/0x20
[   75.648681] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.648712] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.648742] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.648742] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.648742] 
[   75.766632] Allocated by task 317:
[   75.770080]  kasan_save_track+0x30/0x5c
[   75.773925]  __kasan_kmalloc+0x8c/0x94
[   75.777709]  kasan_atomics+0xc0/0x33c
[   75.781402]  kunit_try_run_case+0x22c/0x5a8
[   75.785644]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.791168]  kthread+0x464/0x810
[   75.794403]  ret_from_fork+0x14/0x20
[   75.798034] 
[   75.799530] The buggy address belongs to the object at cc90f300
[   75.799530]  which belongs to the cache kmalloc-64 of size 64
[   75.811248] The buggy address is located 0 bytes to the right of
[   75.811248]  allocated 48-byte region [cc90f300, cc90f330)
[   75.822784] 
[   75.824310] The buggy address belongs to the physical page:
[   75.829895] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.837188] flags: 0x0(zone=0)
[   75.840270] page_type: f5(slab)
[   75.843414] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.851562] raw: 00000000
[   75.854217] page dumped because: kasan: bad access detected
[   75.859832] 
[   75.861328] Memory state around the buggy address:
[   75.866149]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.872711]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.879302] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.885864]                              ^
[   75.889984]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.896545]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.903137] ==================================================================
[   83.569885] ==================================================================
[   83.577148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0
[   83.584594] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.591339] 
[   83.592864] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.592895] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.592895] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.592895] Call trace: 
[   83.592926]  unwind_backtrace from show_stack+0x18/0x1c
[   83.592926]  show_stack from dump_stack_lvl+0x70/0x90
[   83.592956]  dump_stack_lvl from print_report+0x158/0x528
[   83.592987]  print_report from kasan_report+0xdc/0x118
[   83.593017]  kasan_report from kasan_check_range+0x14c/0x198
[   83.593048]  kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0
[   83.593048]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.593078]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.593109]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.593139]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.593170]  kthread from ret_from_fork+0x14/0x20
[   83.593200] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.593200] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.593231] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.593231] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.593261] 
[   83.711212] Allocated by task 317:
[   83.714660]  kasan_save_track+0x30/0x5c
[   83.718505]  __kasan_kmalloc+0x8c/0x94
[   83.722290]  kasan_atomics+0xc0/0x33c
[   83.725982]  kunit_try_run_case+0x22c/0x5a8
[   83.730224]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.735748]  kthread+0x464/0x810
[   83.739013]  ret_from_fork+0x14/0x20
[   83.742614] 
[   83.744110] The buggy address belongs to the object at cc90f300
[   83.744110]  which belongs to the cache kmalloc-64 of size 64
[   83.755828] The buggy address is located 0 bytes to the right of
[   83.755828]  allocated 48-byte region [cc90f300, cc90f330)
[   83.767395] 
[   83.768890] The buggy address belongs to the physical page:
[   83.774505] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.781768] flags: 0x0(zone=0)
[   83.784851] page_type: f5(slab)
[   83.787994] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.796142] raw: 00000000
[   83.798797] page dumped because: kasan: bad access detected
[   83.804382] 
[   83.805908] Memory state around the buggy address:
[   83.810729]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.817291]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.823852] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.830444]                              ^
[   83.834564]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.841125]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.847686] ==================================================================
[   80.179443] ==================================================================
[   80.186737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0
[   80.194183] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.200836] 
[   80.202331] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.202362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.202362] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.202392] Call trace: 
[   80.202392]  unwind_backtrace from show_stack+0x18/0x1c
[   80.202423]  show_stack from dump_stack_lvl+0x70/0x90
[   80.202453]  dump_stack_lvl from print_report+0x158/0x528
[   80.202484]  print_report from kasan_report+0xdc/0x118
[   80.202484]  kasan_report from kasan_atomics_helper+0x5218/0x5ab0
[   80.202514]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.202545]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.202575]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.202606]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.202636]  kthread from ret_from_fork+0x14/0x20
[   80.202636] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.202667] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.202667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.202697] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.202697] 
[   80.314575] Allocated by task 317:
[   80.317993]  kasan_save_track+0x30/0x5c
[   80.321868]  __kasan_kmalloc+0x8c/0x94
[   80.325653]  kasan_atomics+0xc0/0x33c
[   80.329345]  kunit_try_run_case+0x22c/0x5a8
[   80.333557]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.339080]  kthread+0x464/0x810
[   80.342346]  ret_from_fork+0x14/0x20
[   80.345947] 
[   80.347442] The buggy address belongs to the object at cc90f300
[   80.347442]  which belongs to the cache kmalloc-64 of size 64
[   80.359161] The buggy address is located 0 bytes to the right of
[   80.359161]  allocated 48-byte region [cc90f300, cc90f330)
[   80.370727] 
[   80.372222] The buggy address belongs to the physical page:
[   80.377838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.385101] flags: 0x0(zone=0)
[   80.388183] page_type: f5(slab)
[   80.391357] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.399505] raw: 00000000
[   80.402130] page dumped because: kasan: bad access detected
[   80.407745] 
[   80.409240] Memory state around the buggy address:
[   80.414062]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.420623]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.427215] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.433776]                              ^
[   80.437896]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.444488]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.451049] ==================================================================
[   88.689666] ==================================================================
[   88.696929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0
[   88.704376] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.711120] 
[   88.712646] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.712677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.712677] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.712677] Call trace: 
[   88.712677]  unwind_backtrace from show_stack+0x18/0x1c
[   88.712707]  show_stack from dump_stack_lvl+0x70/0x90
[   88.712738]  dump_stack_lvl from print_report+0x158/0x528
[   88.712768]  print_report from kasan_report+0xdc/0x118
[   88.712799]  kasan_report from kasan_check_range+0x14c/0x198
[   88.712799]  kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0
[   88.712829]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.712860]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.712890]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.712921]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.712951]  kthread from ret_from_fork+0x14/0x20
[   88.712951] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.712982] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.712982] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.713012] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.713012] 
[   88.830993] Allocated by task 317:
[   88.834411]  kasan_save_track+0x30/0x5c
[   88.838287]  __kasan_kmalloc+0x8c/0x94
[   88.842071]  kasan_atomics+0xc0/0x33c
[   88.845764]  kunit_try_run_case+0x22c/0x5a8
[   88.849975]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.855499]  kthread+0x464/0x810
[   88.858764]  ret_from_fork+0x14/0x20
[   88.862365] 
[   88.863861] The buggy address belongs to the object at cc90f300
[   88.863861]  which belongs to the cache kmalloc-64 of size 64
[   88.875610] The buggy address is located 0 bytes to the right of
[   88.875610]  allocated 48-byte region [cc90f300, cc90f330)
[   88.887145] 
[   88.888641] The buggy address belongs to the physical page:
[   88.894256] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.901519] flags: 0x0(zone=0)
[   88.904602] page_type: f5(slab)
[   88.907775] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.915924] raw: 00000000
[   88.918548] page dumped because: kasan: bad access detected
[   88.924163] 
[   88.925659] Memory state around the buggy address:
[   88.930480]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.937042]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.943634] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.950195]                              ^
[   88.954315]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.960906]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.967468] ==================================================================
[   72.520874] ==================================================================
[   72.528167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0
[   72.535614] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.542358] 
[   72.543853] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.543884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.543914] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.543914] Call trace: 
[   72.543914]  unwind_backtrace from show_stack+0x18/0x1c
[   72.543945]  show_stack from dump_stack_lvl+0x70/0x90
[   72.543975]  dump_stack_lvl from print_report+0x158/0x528
[   72.544006]  print_report from kasan_report+0xdc/0x118
[   72.544006]  kasan_report from kasan_atomics_helper+0x514c/0x5ab0
[   72.544036]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.544067]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.544097]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.544128]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.544158]  kthread from ret_from_fork+0x14/0x20
[   72.544158] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.544189] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.544189] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.544219] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.544219] 
[   72.656097] Allocated by task 317:
[   72.659515]  kasan_save_track+0x30/0x5c
[   72.663391]  __kasan_kmalloc+0x8c/0x94
[   72.667175]  kasan_atomics+0xc0/0x33c
[   72.670867]  kunit_try_run_case+0x22c/0x5a8
[   72.675079]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.680603]  kthread+0x464/0x810
[   72.683868]  ret_from_fork+0x14/0x20
[   72.687469] 
[   72.688964] The buggy address belongs to the object at cc90f300
[   72.688964]  which belongs to the cache kmalloc-64 of size 64
[   72.700714] The buggy address is located 0 bytes to the right of
[   72.700714]  allocated 48-byte region [cc90f300, cc90f330)
[   72.712249] 
[   72.713775] The buggy address belongs to the physical page:
[   72.719360] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   72.726654] flags: 0x0(zone=0)
[   72.729705] page_type: f5(slab)
[   72.732879] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.741027] raw: 00000000
[   72.743682] page dumped because: kasan: bad access detected
[   72.749267] 
[   72.750793] Memory state around the buggy address:
[   72.755615]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.762176]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.768737] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.775329]                              ^
[   72.779449]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.786010]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.792602] ==================================================================
[   83.855010] ==================================================================
[   83.862274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0
[   83.869720] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.876464] 
[   83.877990] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.878021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.878021] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.878021] Call trace: 
[   83.878051]  unwind_backtrace from show_stack+0x18/0x1c
[   83.878051]  show_stack from dump_stack_lvl+0x70/0x90
[   83.878082]  dump_stack_lvl from print_report+0x158/0x528
[   83.878112]  print_report from kasan_report+0xdc/0x118
[   83.878143]  kasan_report from kasan_check_range+0x14c/0x198
[   83.878173]  kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0
[   83.878173]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.878204]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.878234]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.878265]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.878295]  kthread from ret_from_fork+0x14/0x20
[   83.878326] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.878326] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.878356] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.878356] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.878387] 
[   83.996368] Allocated by task 317:
[   83.999786]  kasan_save_track+0x30/0x5c
[   84.003662]  __kasan_kmalloc+0x8c/0x94
[   84.007415]  kasan_atomics+0xc0/0x33c
[   84.011138]  kunit_try_run_case+0x22c/0x5a8
[   84.015350]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.020874]  kthread+0x464/0x810
[   84.024139]  ret_from_fork+0x14/0x20
[   84.027740] 
[   84.029235] The buggy address belongs to the object at cc90f300
[   84.029235]  which belongs to the cache kmalloc-64 of size 64
[   84.040954] The buggy address is located 0 bytes to the right of
[   84.040954]  allocated 48-byte region [cc90f300, cc90f330)
[   84.052520] 
[   84.054016] The buggy address belongs to the physical page:
[   84.059631] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.066894] flags: 0x0(zone=0)
[   84.069976] page_type: f5(slab)
[   84.073150] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.081298] raw: 00000000
[   84.083923] page dumped because: kasan: bad access detected
[   84.089538] 
[   84.091033] Memory state around the buggy address:
[   84.095855]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.102416]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.109008] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.115570]                              ^
[   84.119689]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.126251]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.132843] ==================================================================
[   85.280670] ==================================================================
[   85.287933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0
[   85.295379] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.302124] 
[   85.303619] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.303649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.303649] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.303680] Call trace: 
[   85.303680]  unwind_backtrace from show_stack+0x18/0x1c
[   85.303710]  show_stack from dump_stack_lvl+0x70/0x90
[   85.303741]  dump_stack_lvl from print_report+0x158/0x528
[   85.303771]  print_report from kasan_report+0xdc/0x118
[   85.303771]  kasan_report from kasan_check_range+0x14c/0x198
[   85.303802]  kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0
[   85.303833]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.303863]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.303894]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.303924]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.303924]  kthread from ret_from_fork+0x14/0x20
[   85.303955] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.303955] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.303985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.304016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.304016] 
[   85.421997] Allocated by task 317:
[   85.425415]  kasan_save_track+0x30/0x5c
[   85.429290]  __kasan_kmalloc+0x8c/0x94
[   85.433074]  kasan_atomics+0xc0/0x33c
[   85.436767]  kunit_try_run_case+0x22c/0x5a8
[   85.440979]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.446502]  kthread+0x464/0x810
[   85.449768]  ret_from_fork+0x14/0x20
[   85.453369] 
[   85.454864] The buggy address belongs to the object at cc90f300
[   85.454864]  which belongs to the cache kmalloc-64 of size 64
[   85.466583] The buggy address is located 0 bytes to the right of
[   85.466583]  allocated 48-byte region [cc90f300, cc90f330)
[   85.478149] 
[   85.479644] The buggy address belongs to the physical page:
[   85.485260] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.492523] flags: 0x0(zone=0)
[   85.495605] page_type: f5(slab)
[   85.498779] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.506896] raw: 00000000
[   85.509552] page dumped because: kasan: bad access detected
[   85.515167] 
[   85.516662] Memory state around the buggy address:
[   85.521484]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.528045]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.534637] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.541198]                              ^
[   85.545318]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.551879]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.558471] ==================================================================
[   81.022399] ==================================================================
[   81.029663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0
[   81.037109] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.043853] 
[   81.045349] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.045379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.045379] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.045410] Call trace: 
[   81.045410]  unwind_backtrace from show_stack+0x18/0x1c
[   81.045440]  show_stack from dump_stack_lvl+0x70/0x90
[   81.045471]  dump_stack_lvl from print_report+0x158/0x528
[   81.045501]  print_report from kasan_report+0xdc/0x118
[   81.045501]  kasan_report from kasan_check_range+0x14c/0x198
[   81.045532]  kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0
[   81.045562]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.045593]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.045623]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.045654]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.045654]  kthread from ret_from_fork+0x14/0x20
[   81.045684] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.045715] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.045715] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.045745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.045745] 
[   81.163726] Allocated by task 317:
[   81.167144]  kasan_save_track+0x30/0x5c
[   81.171020]  __kasan_kmalloc+0x8c/0x94
[   81.174804]  kasan_atomics+0xc0/0x33c
[   81.178497]  kunit_try_run_case+0x22c/0x5a8
[   81.182708]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.188232]  kthread+0x464/0x810
[   81.191497]  ret_from_fork+0x14/0x20
[   81.195098] 
[   81.196594] The buggy address belongs to the object at cc90f300
[   81.196594]  which belongs to the cache kmalloc-64 of size 64
[   81.208312] The buggy address is located 0 bytes to the right of
[   81.208312]  allocated 48-byte region [cc90f300, cc90f330)
[   81.219879] 
[   81.221374] The buggy address belongs to the physical page:
[   81.226989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.234252] flags: 0x0(zone=0)
[   81.237335] page_type: f5(slab)
[   81.240509] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.248626] raw: 00000000
[   81.251281] page dumped because: kasan: bad access detected
[   81.256896] 
[   81.258392] Memory state around the buggy address:
[   81.263214]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.269775]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.276367] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.282928]                              ^
[   81.287048]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.293609]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.300201] ==================================================================
[   74.770568] ==================================================================
[   74.777832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0
[   74.785186] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.791961] 
[   74.793457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.793487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.793487] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.793487] Call trace: 
[   74.793518]  unwind_backtrace from show_stack+0x18/0x1c
[   74.793548]  show_stack from dump_stack_lvl+0x70/0x90
[   74.793548]  dump_stack_lvl from print_report+0x158/0x528
[   74.793579]  print_report from kasan_report+0xdc/0x118
[   74.793609]  kasan_report from kasan_check_range+0x14c/0x198
[   74.793640]  kasan_check_range from kasan_atomics_helper+0x648/0x5ab0
[   74.793640]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.793670]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.793701]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.793731]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.793762]  kthread from ret_from_fork+0x14/0x20
[   74.793792] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.793792] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.793823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.793823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.793853] 
[   74.911743] Allocated by task 317:
[   74.915161]  kasan_save_track+0x30/0x5c
[   74.919036]  __kasan_kmalloc+0x8c/0x94
[   74.922790]  kasan_atomics+0xc0/0x33c
[   74.926513]  kunit_try_run_case+0x22c/0x5a8
[   74.930725]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.936248]  kthread+0x464/0x810
[   74.939514]  ret_from_fork+0x14/0x20
[   74.943115] 
[   74.944610] The buggy address belongs to the object at cc90f300
[   74.944610]  which belongs to the cache kmalloc-64 of size 64
[   74.956329] The buggy address is located 0 bytes to the right of
[   74.956329]  allocated 48-byte region [cc90f300, cc90f330)
[   74.967895] 
[   74.969390] The buggy address belongs to the physical page:
[   74.975006] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.982269] flags: 0x0(zone=0)
[   74.985351] page_type: f5(slab)
[   74.988525] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.996673] raw: 00000000
[   74.999298] page dumped because: kasan: bad access detected
[   75.004913] 
[   75.006408] Memory state around the buggy address:
[   75.011230]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.017822]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024383] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.030944]                              ^
[   75.035064]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.041656]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.048217] ==================================================================
[   76.195404] ==================================================================
[   76.202667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0
[   76.210021] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.216796] 
[   76.218292] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.218322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.218322] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.218353] Call trace: 
[   76.218353]  unwind_backtrace from show_stack+0x18/0x1c
[   76.218383]  show_stack from dump_stack_lvl+0x70/0x90
[   76.218383]  dump_stack_lvl from print_report+0x158/0x528
[   76.218414]  print_report from kasan_report+0xdc/0x118
[   76.218444]  kasan_report from kasan_check_range+0x14c/0x198
[   76.218475]  kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0
[   76.218505]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.218505]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.218536]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.218566]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.218597]  kthread from ret_from_fork+0x14/0x20
[   76.218627] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.218627] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.218658] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.218658] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.218688] 
[   76.336578] Allocated by task 317:
[   76.339996]  kasan_save_track+0x30/0x5c
[   76.343872]  __kasan_kmalloc+0x8c/0x94
[   76.347656]  kasan_atomics+0xc0/0x33c
[   76.351348]  kunit_try_run_case+0x22c/0x5a8
[   76.355560]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.361083]  kthread+0x464/0x810
[   76.364349]  ret_from_fork+0x14/0x20
[   76.367950] 
[   76.369445] The buggy address belongs to the object at cc90f300
[   76.369445]  which belongs to the cache kmalloc-64 of size 64
[   76.381164] The buggy address is located 0 bytes to the right of
[   76.381164]  allocated 48-byte region [cc90f300, cc90f330)
[   76.392730] 
[   76.394226] The buggy address belongs to the physical page:
[   76.399841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.407104] flags: 0x0(zone=0)
[   76.410186] page_type: f5(slab)
[   76.413360] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.421508] raw: 00000000
[   76.424133] page dumped because: kasan: bad access detected
[   76.429748] 
[   76.431243] Memory state around the buggy address:
[   76.436065]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.442657]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.449218] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.455780]                              ^
[   76.459899]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.466491]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.473052] ==================================================================
[   83.284759] ==================================================================
[   83.292022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0
[   83.299468] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.306213] 
[   83.307739] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.307769] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.307769] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.307769] Call trace: 
[   83.307769]  unwind_backtrace from show_stack+0x18/0x1c
[   83.307800]  show_stack from dump_stack_lvl+0x70/0x90
[   83.307830]  dump_stack_lvl from print_report+0x158/0x528
[   83.307861]  print_report from kasan_report+0xdc/0x118
[   83.307891]  kasan_report from kasan_check_range+0x14c/0x198
[   83.307891]  kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0
[   83.307922]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.307952]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.307983]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.308013]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.308044]  kthread from ret_from_fork+0x14/0x20
[   83.308044] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.308074] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.308105] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.308105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.308105] 
[   83.426086] Allocated by task 317:
[   83.429504]  kasan_save_track+0x30/0x5c
[   83.433380]  __kasan_kmalloc+0x8c/0x94
[   83.437164]  kasan_atomics+0xc0/0x33c
[   83.440856]  kunit_try_run_case+0x22c/0x5a8
[   83.445068]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.450622]  kthread+0x464/0x810
[   83.453857]  ret_from_fork+0x14/0x20
[   83.457458] 
[   83.458984] The buggy address belongs to the object at cc90f300
[   83.458984]  which belongs to the cache kmalloc-64 of size 64
[   83.470703] The buggy address is located 0 bytes to the right of
[   83.470703]  allocated 48-byte region [cc90f300, cc90f330)
[   83.482238] 
[   83.483764] The buggy address belongs to the physical page:
[   83.489349] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.496643] flags: 0x0(zone=0)
[   83.499694] page_type: f5(slab)
[   83.502868] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.511016] raw: 00000000
[   83.513671] page dumped because: kasan: bad access detected
[   83.519256] 
[   83.520782] Memory state around the buggy address:
[   83.525604]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.532165]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.538726] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.545318]                              ^
[   83.549438]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.555999]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.562561] ==================================================================
[   82.150360] ==================================================================
[   82.157623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0
[   82.165069] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.171813] 
[   82.173339] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.173370] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.173370] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.173370] Call trace: 
[   82.173400]  unwind_backtrace from show_stack+0x18/0x1c
[   82.173400]  show_stack from dump_stack_lvl+0x70/0x90
[   82.173431]  dump_stack_lvl from print_report+0x158/0x528
[   82.173461]  print_report from kasan_report+0xdc/0x118
[   82.173492]  kasan_report from kasan_check_range+0x14c/0x198
[   82.173492]  kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0
[   82.173522]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.173553]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.173583]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.173614]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.173645]  kthread from ret_from_fork+0x14/0x20
[   82.173645] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.173675] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.173706] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.173706] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.173706] 
[   82.291687] Allocated by task 317:
[   82.295135]  kasan_save_track+0x30/0x5c
[   82.298980]  __kasan_kmalloc+0x8c/0x94
[   82.302764]  kasan_atomics+0xc0/0x33c
[   82.306457]  kunit_try_run_case+0x22c/0x5a8
[   82.310668]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.316223]  kthread+0x464/0x810
[   82.319458]  ret_from_fork+0x14/0x20
[   82.323059] 
[   82.324584] The buggy address belongs to the object at cc90f300
[   82.324584]  which belongs to the cache kmalloc-64 of size 64
[   82.336303] The buggy address is located 0 bytes to the right of
[   82.336303]  allocated 48-byte region [cc90f300, cc90f330)
[   82.347839] 
[   82.349365] The buggy address belongs to the physical page:
[   82.354949] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.362243] flags: 0x0(zone=0)
[   82.365295] page_type: f5(slab)
[   82.368469] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.376617] raw: 00000000
[   82.379272] page dumped because: kasan: bad access detected
[   82.384857] 
[   82.386383] Memory state around the buggy address:
[   82.391204]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.397766]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.404327] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.410888]                              ^
[   82.415039]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.421600]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.428161] ==================================================================
[   88.125640] ==================================================================
[   88.132904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0
[   88.140350] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.147125] 
[   88.148620] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.148651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.148651] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.148681] Call trace: 
[   88.148681]  unwind_backtrace from show_stack+0x18/0x1c
[   88.148712]  show_stack from dump_stack_lvl+0x70/0x90
[   88.148712]  dump_stack_lvl from print_report+0x158/0x528
[   88.148742]  print_report from kasan_report+0xdc/0x118
[   88.148773]  kasan_report from kasan_check_range+0x14c/0x198
[   88.148803]  kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0
[   88.148834]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.148834]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.148864]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.148895]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.148925]  kthread from ret_from_fork+0x14/0x20
[   88.148956] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.148956] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.148986] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.148986] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.149017] 
[   88.266967] Allocated by task 317:
[   88.270416]  kasan_save_track+0x30/0x5c
[   88.274261]  __kasan_kmalloc+0x8c/0x94
[   88.278045]  kasan_atomics+0xc0/0x33c
[   88.281738]  kunit_try_run_case+0x22c/0x5a8
[   88.285980]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.291503]  kthread+0x464/0x810
[   88.294738]  ret_from_fork+0x14/0x20
[   88.298370] 
[   88.299865] The buggy address belongs to the object at cc90f300
[   88.299865]  which belongs to the cache kmalloc-64 of size 64
[   88.311584] The buggy address is located 0 bytes to the right of
[   88.311584]  allocated 48-byte region [cc90f300, cc90f330)
[   88.323150] 
[   88.324645] The buggy address belongs to the physical page:
[   88.330230] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.337524] flags: 0x0(zone=0)
[   88.340606] page_type: f5(slab)
[   88.343780] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.351898] raw: 00000000
[   88.354553] page dumped because: kasan: bad access detected
[   88.360168] 
[   88.361663] Memory state around the buggy address:
[   88.366485]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.373046]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.379608] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.386199]                              ^
[   88.390319]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.396881]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.403442] ==================================================================
[   75.055541] ==================================================================
[   75.062805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0
[   75.070159] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.076904] 
[   75.078430] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.078460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.078460] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.078460] Call trace: 
[   75.078491]  unwind_backtrace from show_stack+0x18/0x1c
[   75.078491]  show_stack from dump_stack_lvl+0x70/0x90
[   75.078521]  dump_stack_lvl from print_report+0x158/0x528
[   75.078552]  print_report from kasan_report+0xdc/0x118
[   75.078582]  kasan_report from kasan_check_range+0x14c/0x198
[   75.078582]  kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0
[   75.078613]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.078643]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.078674]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.078704]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.078735]  kthread from ret_from_fork+0x14/0x20
[   75.078765] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.078765] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.078796] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.078796] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.078826] 
[   75.196685] Allocated by task 317:
[   75.200134]  kasan_save_track+0x30/0x5c
[   75.203979]  __kasan_kmalloc+0x8c/0x94
[   75.207763]  kasan_atomics+0xc0/0x33c
[   75.211456]  kunit_try_run_case+0x22c/0x5a8
[   75.215698]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.221221]  kthread+0x464/0x810
[   75.224487]  ret_from_fork+0x14/0x20
[   75.228088] 
[   75.229583] The buggy address belongs to the object at cc90f300
[   75.229583]  which belongs to the cache kmalloc-64 of size 64
[   75.241302] The buggy address is located 0 bytes to the right of
[   75.241302]  allocated 48-byte region [cc90f300, cc90f330)
[   75.252868] 
[   75.254364] The buggy address belongs to the physical page:
[   75.259979] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.267242] flags: 0x0(zone=0)
[   75.270324] page_type: f5(slab)
[   75.273498] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.281616] raw: 00000000
[   75.284271] page dumped because: kasan: bad access detected
[   75.289886] 
[   75.291381] Memory state around the buggy address:
[   75.296203]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.302764]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.309356] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.315917]                              ^
[   75.320037]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.326629]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.333190] ==================================================================
[   84.710418] ==================================================================
[   84.717681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0
[   84.725128] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.731872] 
[   84.733367] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.733398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.733428] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.733428] Call trace: 
[   84.733428]  unwind_backtrace from show_stack+0x18/0x1c
[   84.733459]  show_stack from dump_stack_lvl+0x70/0x90
[   84.733489]  dump_stack_lvl from print_report+0x158/0x528
[   84.733520]  print_report from kasan_report+0xdc/0x118
[   84.733520]  kasan_report from kasan_check_range+0x14c/0x198
[   84.733551]  kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0
[   84.733581]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.733612]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.733642]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.733673]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.733703]  kthread from ret_from_fork+0x14/0x20
[   84.733703] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.733734] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.733734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.733764] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.733764] 
[   84.851745] Allocated by task 317:
[   84.855163]  kasan_save_track+0x30/0x5c
[   84.859039]  __kasan_kmalloc+0x8c/0x94
[   84.862823]  kasan_atomics+0xc0/0x33c
[   84.866516]  kunit_try_run_case+0x22c/0x5a8
[   84.870727]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.876251]  kthread+0x464/0x810
[   84.879516]  ret_from_fork+0x14/0x20
[   84.883117] 
[   84.884613] The buggy address belongs to the object at cc90f300
[   84.884613]  which belongs to the cache kmalloc-64 of size 64
[   84.896362] The buggy address is located 0 bytes to the right of
[   84.896362]  allocated 48-byte region [cc90f300, cc90f330)
[   84.907897] 
[   84.909393] The buggy address belongs to the physical page:
[   84.915008] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.922271] flags: 0x0(zone=0)
[   84.925354] page_type: f5(slab)
[   84.928527] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.936676] raw: 00000000
[   84.939300] page dumped because: kasan: bad access detected
[   84.944915] 
[   84.946411] Memory state around the buggy address:
[   84.951232]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.957824]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.964385] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.970947]                              ^
[   84.975067]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.981658]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.988220] ==================================================================
[   86.414916] ==================================================================
[   86.422210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0
[   86.429656] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.436401] 
[   86.437896] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.437927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.437927] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.437957] Call trace: 
[   86.437957]  unwind_backtrace from show_stack+0x18/0x1c
[   86.437988]  show_stack from dump_stack_lvl+0x70/0x90
[   86.438018]  dump_stack_lvl from print_report+0x158/0x528
[   86.438049]  print_report from kasan_report+0xdc/0x118
[   86.438049]  kasan_report from kasan_check_range+0x14c/0x198
[   86.438079]  kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0
[   86.438110]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.438140]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.438171]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.438171]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.438201]  kthread from ret_from_fork+0x14/0x20
[   86.438232] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.438232] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.438262] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.438293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.438293] 
[   86.556274] Allocated by task 317:
[   86.559692]  kasan_save_track+0x30/0x5c
[   86.563568]  __kasan_kmalloc+0x8c/0x94
[   86.567352]  kasan_atomics+0xc0/0x33c
[   86.571044]  kunit_try_run_case+0x22c/0x5a8
[   86.575256]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.580780]  kthread+0x464/0x810
[   86.584045]  ret_from_fork+0x14/0x20
[   86.587646] 
[   86.589141] The buggy address belongs to the object at cc90f300
[   86.589141]  which belongs to the cache kmalloc-64 of size 64
[   86.600860] The buggy address is located 0 bytes to the right of
[   86.600860]  allocated 48-byte region [cc90f300, cc90f330)
[   86.612426] 
[   86.613922] The buggy address belongs to the physical page:
[   86.619537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.626800] flags: 0x0(zone=0)
[   86.629882] page_type: f5(slab)
[   86.633056] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.641204] raw: 00000000
[   86.643829] page dumped because: kasan: bad access detected
[   86.649444] 
[   86.650939] Memory state around the buggy address:
[   86.655761]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.662322]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.668914] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.675476]                              ^
[   86.679595]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.686157]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.692749] ==================================================================
[   89.253662] ==================================================================
[   89.260925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0
[   89.268371] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   89.275115] 
[   89.276611] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.276641] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.276672] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.276672] Call trace: 
[   89.276672]  unwind_backtrace from show_stack+0x18/0x1c
[   89.276702]  show_stack from dump_stack_lvl+0x70/0x90
[   89.276733]  dump_stack_lvl from print_report+0x158/0x528
[   89.276763]  print_report from kasan_report+0xdc/0x118
[   89.276763]  kasan_report from kasan_check_range+0x14c/0x198
[   89.276794]  kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0
[   89.276824]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.276855]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.276885]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.276916]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.276947]  kthread from ret_from_fork+0x14/0x20
[   89.276947] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   89.276977] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.276977] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.277008] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.277008] 
[   89.394989] Allocated by task 317:
[   89.398406]  kasan_save_track+0x30/0x5c
[   89.402282]  __kasan_kmalloc+0x8c/0x94
[   89.406066]  kasan_atomics+0xc0/0x33c
[   89.409759]  kunit_try_run_case+0x22c/0x5a8
[   89.413970]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.419494]  kthread+0x464/0x810
[   89.422760]  ret_from_fork+0x14/0x20
[   89.426361] 
[   89.427856] The buggy address belongs to the object at cc90f300
[   89.427856]  which belongs to the cache kmalloc-64 of size 64
[   89.439575] The buggy address is located 0 bytes to the right of
[   89.439575]  allocated 48-byte region [cc90f300, cc90f330)
[   89.451141] 
[   89.452636] The buggy address belongs to the physical page:
[   89.458251] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.465515] flags: 0x0(zone=0)
[   89.468597] page_type: f5(slab)
[   89.471771] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.479888] raw: 00000000
[   89.482543] page dumped because: kasan: bad access detected
[   89.488159] 
[   89.489654] Memory state around the buggy address:
[   89.494476]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.501037]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.507629] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.514190]                              ^
[   89.518310]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.524871]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.531433] ==================================================================
[   82.714477] ==================================================================
[   82.721740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0
[   82.729187] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.735931] 
[   82.737457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.737487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.737487] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.737487] Call trace: 
[   82.737518]  unwind_backtrace from show_stack+0x18/0x1c
[   82.737518]  show_stack from dump_stack_lvl+0x70/0x90
[   82.737548]  dump_stack_lvl from print_report+0x158/0x528
[   82.737579]  print_report from kasan_report+0xdc/0x118
[   82.737609]  kasan_report from kasan_check_range+0x14c/0x198
[   82.737640]  kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0
[   82.737640]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.737670]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.737701]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.737731]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.737762]  kthread from ret_from_fork+0x14/0x20
[   82.737792] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.737792] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.737823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.737823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.737854] 
[   82.855804] Allocated by task 317:
[   82.859252]  kasan_save_track+0x30/0x5c
[   82.863098]  __kasan_kmalloc+0x8c/0x94
[   82.866882]  kasan_atomics+0xc0/0x33c
[   82.870574]  kunit_try_run_case+0x22c/0x5a8
[   82.874816]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.880340]  kthread+0x464/0x810
[   82.883605]  ret_from_fork+0x14/0x20
[   82.887207] 
[   82.888702] The buggy address belongs to the object at cc90f300
[   82.888702]  which belongs to the cache kmalloc-64 of size 64
[   82.900421] The buggy address is located 0 bytes to the right of
[   82.900421]  allocated 48-byte region [cc90f300, cc90f330)
[   82.911987] 
[   82.913482] The buggy address belongs to the physical page:
[   82.919097] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.926361] flags: 0x0(zone=0)
[   82.929443] page_type: f5(slab)
[   82.932617] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.940734] raw: 00000000
[   82.943389] page dumped because: kasan: bad access detected
[   82.949005] 
[   82.950500] Memory state around the buggy address:
[   82.955322]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.961883]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.968475] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.975036]                              ^
[   82.979156]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.985717]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.992309] ==================================================================
[   73.357849] ==================================================================
[   73.365112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0
[   73.372467] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.379119] 
[   73.380645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.380676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.380676] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.380676] Call trace: 
[   73.380706]  unwind_backtrace from show_stack+0x18/0x1c
[   73.380737]  show_stack from dump_stack_lvl+0x70/0x90
[   73.380737]  dump_stack_lvl from print_report+0x158/0x528
[   73.380767]  print_report from kasan_report+0xdc/0x118
[   73.380798]  kasan_report from kasan_check_range+0x14c/0x198
[   73.380828]  kasan_check_range from kasan_atomics_helper+0x420/0x5ab0
[   73.380828]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.380859]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.380889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.380920]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.380950]  kthread from ret_from_fork+0x14/0x20
[   73.380981] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.380981] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.381011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.381011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.381042] 
[   73.498931] Allocated by task 317:
[   73.502349]  kasan_save_track+0x30/0x5c
[   73.506225]  __kasan_kmalloc+0x8c/0x94
[   73.509979]  kasan_atomics+0xc0/0x33c
[   73.513702]  kunit_try_run_case+0x22c/0x5a8
[   73.517913]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.523437]  kthread+0x464/0x810
[   73.526702]  ret_from_fork+0x14/0x20
[   73.530303] 
[   73.531799] The buggy address belongs to the object at cc90f300
[   73.531799]  which belongs to the cache kmalloc-64 of size 64
[   73.543518] The buggy address is located 0 bytes to the right of
[   73.543518]  allocated 48-byte region [cc90f300, cc90f330)
[   73.555084] 
[   73.556579] The buggy address belongs to the physical page:
[   73.562194] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.569458] flags: 0x0(zone=0)
[   73.572540] page_type: f5(slab)
[   73.575714] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.583862] raw: 00000000
[   73.586486] page dumped because: kasan: bad access detected
[   73.592102] 
[   73.593597] Memory state around the buggy address:
[   73.598419]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.605010]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.611572] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.618133]                              ^
[   73.622253]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.628845]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.635406] ==================================================================
[   81.871459] ==================================================================
[   81.878723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0
[   81.886169] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.892822] 
[   81.894348] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.894378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.894378] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.894378] Call trace: 
[   81.894378]  unwind_backtrace from show_stack+0x18/0x1c
[   81.894409]  show_stack from dump_stack_lvl+0x70/0x90
[   81.894439]  dump_stack_lvl from print_report+0x158/0x528
[   81.894470]  print_report from kasan_report+0xdc/0x118
[   81.894500]  kasan_report from kasan_atomics_helper+0x52e4/0x5ab0
[   81.894500]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.894531]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.894561]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.894592]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.894622]  kthread from ret_from_fork+0x14/0x20
[   81.894653] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.894653] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.894683] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.894683] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.894714] 
[   82.006561] Allocated by task 317:
[   82.009979]  kasan_save_track+0x30/0x5c
[   82.013854]  __kasan_kmalloc+0x8c/0x94
[   82.017639]  kasan_atomics+0xc0/0x33c
[   82.021331]  kunit_try_run_case+0x22c/0x5a8
[   82.025543]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.031066]  kthread+0x464/0x810
[   82.034332]  ret_from_fork+0x14/0x20
[   82.037933] 
[   82.039428] The buggy address belongs to the object at cc90f300
[   82.039428]  which belongs to the cache kmalloc-64 of size 64
[   82.051177] The buggy address is located 0 bytes to the right of
[   82.051177]  allocated 48-byte region [cc90f300, cc90f330)
[   82.062713] 
[   82.064208] The buggy address belongs to the physical page:
[   82.069824] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.077087] flags: 0x0(zone=0)
[   82.080169] page_type: f5(slab)
[   82.083343] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.091491] raw: 00000000
[   82.094116] page dumped because: kasan: bad access detected
[   82.099731] 
[   82.101226] Memory state around the buggy address:
[   82.106048]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.112640]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.119201] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.125762]                              ^
[   82.129882]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.136474]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.143035] ==================================================================
[   81.307525] ==================================================================
[   81.314788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0
[   81.322235] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.328887] 
[   81.330413] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.330444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.330444] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.330444] Call trace: 
[   81.330444]  unwind_backtrace from show_stack+0x18/0x1c
[   81.330474]  show_stack from dump_stack_lvl+0x70/0x90
[   81.330505]  dump_stack_lvl from print_report+0x158/0x528
[   81.330535]  print_report from kasan_report+0xdc/0x118
[   81.330566]  kasan_report from kasan_atomics_helper+0x52d8/0x5ab0
[   81.330596]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.330596]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.330627]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.330657]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.330688]  kthread from ret_from_fork+0x14/0x20
[   81.330718] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.330718] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.330749] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.330749] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.330780] 
[   81.442626] Allocated by task 317:
[   81.446044]  kasan_save_track+0x30/0x5c
[   81.449920]  __kasan_kmalloc+0x8c/0x94
[   81.453704]  kasan_atomics+0xc0/0x33c
[   81.457397]  kunit_try_run_case+0x22c/0x5a8
[   81.461608]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.467132]  kthread+0x464/0x810
[   81.470397]  ret_from_fork+0x14/0x20
[   81.473999] 
[   81.475494] The buggy address belongs to the object at cc90f300
[   81.475494]  which belongs to the cache kmalloc-64 of size 64
[   81.487243] The buggy address is located 0 bytes to the right of
[   81.487243]  allocated 48-byte region [cc90f300, cc90f330)
[   81.498779] 
[   81.500274] The buggy address belongs to the physical page:
[   81.505889] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.513153] flags: 0x0(zone=0)
[   81.516235] page_type: f5(slab)
[   81.519409] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.527557] raw: 00000000
[   81.530181] page dumped because: kasan: bad access detected
[   81.535797] 
[   81.537292] Memory state around the buggy address:
[   81.542114]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.548706]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.555267] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.561828]                              ^
[   81.565948]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.572540]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.579101] ==================================================================
[   86.700042] ==================================================================
[   86.707305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0
[   86.714782] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.721527] 
[   86.723022] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.723052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.723052] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.723083] Call trace: 
[   86.723083]  unwind_backtrace from show_stack+0x18/0x1c
[   86.723114]  show_stack from dump_stack_lvl+0x70/0x90
[   86.723114]  dump_stack_lvl from print_report+0x158/0x528
[   86.723144]  print_report from kasan_report+0xdc/0x118
[   86.723175]  kasan_report from kasan_check_range+0x14c/0x198
[   86.723205]  kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0
[   86.723236]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.723236]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.723266]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.723297]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.723327]  kthread from ret_from_fork+0x14/0x20
[   86.723358] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.723358] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.723388] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.723388] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.723419] 
[   86.841400] Allocated by task 317:
[   86.844818]  kasan_save_track+0x30/0x5c
[   86.848693]  __kasan_kmalloc+0x8c/0x94
[   86.852447]  kasan_atomics+0xc0/0x33c
[   86.856140]  kunit_try_run_case+0x22c/0x5a8
[   86.860382]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.865905]  kthread+0x464/0x810
[   86.869171]  ret_from_fork+0x14/0x20
[   86.872772] 
[   86.874267] The buggy address belongs to the object at cc90f300
[   86.874267]  which belongs to the cache kmalloc-64 of size 64
[   86.885986] The buggy address is located 0 bytes to the right of
[   86.885986]  allocated 48-byte region [cc90f300, cc90f330)
[   86.897552] 
[   86.899047] The buggy address belongs to the physical page:
[   86.904663] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.911926] flags: 0x0(zone=0)
[   86.915008] page_type: f5(slab)
[   86.918182] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.926300] raw: 00000000
[   86.928955] page dumped because: kasan: bad access detected
[   86.934570] 
[   86.936065] Memory state around the buggy address:
[   86.940887]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.947448]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.954010] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.960601]                              ^
[   86.964721]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.971282]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.977844] ==================================================================
[   78.469024] ==================================================================
[   78.476287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0
[   78.483673] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.490417] 
[   78.491912] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.491943] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.491943] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.491973] Call trace: 
[   78.491973]  unwind_backtrace from show_stack+0x18/0x1c
[   78.492004]  show_stack from dump_stack_lvl+0x70/0x90
[   78.492004]  dump_stack_lvl from print_report+0x158/0x528
[   78.492034]  print_report from kasan_report+0xdc/0x118
[   78.492065]  kasan_report from kasan_check_range+0x14c/0x198
[   78.492095]  kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0
[   78.492126]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.492126]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.492156]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.492187]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.492218]  kthread from ret_from_fork+0x14/0x20
[   78.492248] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.492248] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.492279] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.492279] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.492309] 
[   78.610198] Allocated by task 317:
[   78.613616]  kasan_save_track+0x30/0x5c
[   78.617492]  __kasan_kmalloc+0x8c/0x94
[   78.621246]  kasan_atomics+0xc0/0x33c
[   78.624938]  kunit_try_run_case+0x22c/0x5a8
[   78.629180]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.634704]  kthread+0x464/0x810
[   78.637969]  ret_from_fork+0x14/0x20
[   78.641571] 
[   78.643066] The buggy address belongs to the object at cc90f300
[   78.643066]  which belongs to the cache kmalloc-64 of size 64
[   78.654785] The buggy address is located 0 bytes to the right of
[   78.654785]  allocated 48-byte region [cc90f300, cc90f330)
[   78.666351] 
[   78.667846] The buggy address belongs to the physical page:
[   78.673461] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.680725] flags: 0x0(zone=0)
[   78.683807] page_type: f5(slab)
[   78.686981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.695098] raw: 00000000
[   78.697753] page dumped because: kasan: bad access detected
[   78.703369] 
[   78.704864] Memory state around the buggy address:
[   78.709686]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.716247]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.722839] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.729400]                              ^
[   78.733520]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.740081]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.746673] ==================================================================
[   78.753967] ==================================================================
[   78.761260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0
[   78.768615] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.775360] 
[   78.776855] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.776885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.776916] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.776916] Call trace: 
[   78.776916]  unwind_backtrace from show_stack+0x18/0x1c
[   78.776947]  show_stack from dump_stack_lvl+0x70/0x90
[   78.776977]  dump_stack_lvl from print_report+0x158/0x528
[   78.777008]  print_report from kasan_report+0xdc/0x118
[   78.777008]  kasan_report from kasan_check_range+0x14c/0x198
[   78.777038]  kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0
[   78.777069]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.777099]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.777130]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.777160]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.777160]  kthread from ret_from_fork+0x14/0x20
[   78.777191] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.777221] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.777221] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.777252] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.777252] 
[   78.895141] Allocated by task 317:
[   78.898559]  kasan_save_track+0x30/0x5c
[   78.902435]  __kasan_kmalloc+0x8c/0x94
[   78.906219]  kasan_atomics+0xc0/0x33c
[   78.909912]  kunit_try_run_case+0x22c/0x5a8
[   78.914123]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.919647]  kthread+0x464/0x810
[   78.922912]  ret_from_fork+0x14/0x20
[   78.926513] 
[   78.928009] The buggy address belongs to the object at cc90f300
[   78.928009]  which belongs to the cache kmalloc-64 of size 64
[   78.939758] The buggy address is located 0 bytes to the right of
[   78.939758]  allocated 48-byte region [cc90f300, cc90f330)
[   78.951293] 
[   78.952789] The buggy address belongs to the physical page:
[   78.958404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.965667] flags: 0x0(zone=0)
[   78.968749] page_type: f5(slab)
[   78.971923] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.980072] raw: 00000000
[   78.982696] page dumped because: kasan: bad access detected
[   78.988311] 
[   78.989807] Memory state around the buggy address:
[   78.994628]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.001220]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.007781] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.014343]                              ^
[   79.018493]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.025054]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.031616] ==================================================================
[   79.894317] ==================================================================
[   79.901580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0
[   79.909027] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.915802] 
[   79.917297] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.917327] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.917327] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.917358] Call trace: 
[   79.917358]  unwind_backtrace from show_stack+0x18/0x1c
[   79.917388]  show_stack from dump_stack_lvl+0x70/0x90
[   79.917388]  dump_stack_lvl from print_report+0x158/0x528
[   79.917419]  print_report from kasan_report+0xdc/0x118
[   79.917449]  kasan_report from kasan_check_range+0x14c/0x198
[   79.917480]  kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0
[   79.917480]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.917510]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.917541]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.917572]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.917602]  kthread from ret_from_fork+0x14/0x20
[   79.917633] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.917633] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.917663] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.917663] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.917694] 
[   80.035675] Allocated by task 317:
[   80.039093]  kasan_save_track+0x30/0x5c
[   80.042968]  __kasan_kmalloc+0x8c/0x94
[   80.046722]  kasan_atomics+0xc0/0x33c
[   80.050445]  kunit_try_run_case+0x22c/0x5a8
[   80.054656]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.060180]  kthread+0x464/0x810
[   80.063446]  ret_from_fork+0x14/0x20
[   80.067047] 
[   80.068542] The buggy address belongs to the object at cc90f300
[   80.068542]  which belongs to the cache kmalloc-64 of size 64
[   80.080261] The buggy address is located 0 bytes to the right of
[   80.080261]  allocated 48-byte region [cc90f300, cc90f330)
[   80.091827] 
[   80.093322] The buggy address belongs to the physical page:
[   80.098937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.106201] flags: 0x0(zone=0)
[   80.109283] page_type: f5(slab)
[   80.112457] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.120605] raw: 00000000
[   80.123229] page dumped because: kasan: bad access detected
[   80.128845] 
[   80.130340] Memory state around the buggy address:
[   80.135162]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.141723]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.148315] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.154876]                              ^
[   80.158996]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.165557]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.172149] ==================================================================
[   85.565765] ==================================================================
[   85.573028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0
[   85.580474] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.587249] 
[   85.588745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.588775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.588775] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.588775] Call trace: 
[   85.588806]  unwind_backtrace from show_stack+0x18/0x1c
[   85.588836]  show_stack from dump_stack_lvl+0x70/0x90
[   85.588836]  dump_stack_lvl from print_report+0x158/0x528
[   85.588867]  print_report from kasan_report+0xdc/0x118
[   85.588897]  kasan_report from kasan_check_range+0x14c/0x198
[   85.588928]  kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0
[   85.588928]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.588958]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.588989]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.589019]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.589050]  kthread from ret_from_fork+0x14/0x20
[   85.589080] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.589080] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.589111] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.589111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.589141] 
[   85.707122] Allocated by task 317:
[   85.710540]  kasan_save_track+0x30/0x5c
[   85.714416]  __kasan_kmalloc+0x8c/0x94
[   85.718170]  kasan_atomics+0xc0/0x33c
[   85.721862]  kunit_try_run_case+0x22c/0x5a8
[   85.726104]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.731628]  kthread+0x464/0x810
[   85.734893]  ret_from_fork+0x14/0x20
[   85.738494] 
[   85.739990] The buggy address belongs to the object at cc90f300
[   85.739990]  which belongs to the cache kmalloc-64 of size 64
[   85.751708] The buggy address is located 0 bytes to the right of
[   85.751708]  allocated 48-byte region [cc90f300, cc90f330)
[   85.763275] 
[   85.764770] The buggy address belongs to the physical page:
[   85.770385] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.777648] flags: 0x0(zone=0)
[   85.780731] page_type: f5(slab)
[   85.783905] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.792022] raw: 00000000
[   85.794677] page dumped because: kasan: bad access detected
[   85.800292] 
[   85.801788] Memory state around the buggy address:
[   85.806610]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.813171]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.819763] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.826324]                              ^
[   85.830444]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.837005]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.843597] ==================================================================
[   87.555419] ==================================================================
[   87.562683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0
[   87.570129] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.576873] 
[   87.578369] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.578399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.578430] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.578430] Call trace: 
[   87.578430]  unwind_backtrace from show_stack+0x18/0x1c
[   87.578460]  show_stack from dump_stack_lvl+0x70/0x90
[   87.578491]  dump_stack_lvl from print_report+0x158/0x528
[   87.578521]  print_report from kasan_report+0xdc/0x118
[   87.578552]  kasan_report from kasan_check_range+0x14c/0x198
[   87.578552]  kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0
[   87.578582]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.578613]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.578643]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.578674]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.578704]  kthread from ret_from_fork+0x14/0x20
[   87.578704] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.578735] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.578735] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.578765] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.578765] 
[   87.696746] Allocated by task 317:
[   87.700164]  kasan_save_track+0x30/0x5c
[   87.704040]  __kasan_kmalloc+0x8c/0x94
[   87.707824]  kasan_atomics+0xc0/0x33c
[   87.711517]  kunit_try_run_case+0x22c/0x5a8
[   87.715728]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.721252]  kthread+0x464/0x810
[   87.724517]  ret_from_fork+0x14/0x20
[   87.728118] 
[   87.729614] The buggy address belongs to the object at cc90f300
[   87.729614]  which belongs to the cache kmalloc-64 of size 64
[   87.741333] The buggy address is located 0 bytes to the right of
[   87.741333]  allocated 48-byte region [cc90f300, cc90f330)
[   87.752899] 
[   87.754394] The buggy address belongs to the physical page:
[   87.760009] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.767272] flags: 0x0(zone=0)
[   87.770355] page_type: f5(slab)
[   87.773529] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.781677] raw: 00000000
[   87.784301] page dumped because: kasan: bad access detected
[   87.789916] 
[   87.791412] Memory state around the buggy address:
[   87.796234]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.802795]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.809387] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.815948]                              ^
[   87.820068]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.826629]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.833221] ==================================================================
[   86.985168] ==================================================================
[   86.992431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0
[   86.999908] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.006652] 
[   87.008148] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.008178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.008178] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.008209] Call trace: 
[   87.008209]  unwind_backtrace from show_stack+0x18/0x1c
[   87.008239]  show_stack from dump_stack_lvl+0x70/0x90
[   87.008239]  dump_stack_lvl from print_report+0x158/0x528
[   87.008270]  print_report from kasan_report+0xdc/0x118
[   87.008300]  kasan_report from kasan_check_range+0x14c/0x198
[   87.008331]  kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0
[   87.008361]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.008361]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.008392]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.008422]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.008453]  kthread from ret_from_fork+0x14/0x20
[   87.008483] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.008483] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.008514] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.008514] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.008544] 
[   87.126495] Allocated by task 317:
[   87.129943]  kasan_save_track+0x30/0x5c
[   87.133789]  __kasan_kmalloc+0x8c/0x94
[   87.137573]  kasan_atomics+0xc0/0x33c
[   87.141265]  kunit_try_run_case+0x22c/0x5a8
[   87.145507]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.151031]  kthread+0x464/0x810
[   87.154266]  ret_from_fork+0x14/0x20
[   87.157897] 
[   87.159393] The buggy address belongs to the object at cc90f300
[   87.159393]  which belongs to the cache kmalloc-64 of size 64
[   87.171112] The buggy address is located 0 bytes to the right of
[   87.171112]  allocated 48-byte region [cc90f300, cc90f330)
[   87.182647] 
[   87.184173] The buggy address belongs to the physical page:
[   87.189758] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.197052] flags: 0x0(zone=0)
[   87.200103] page_type: f5(slab)
[   87.203277] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.211425] raw: 00000000
[   87.214080] page dumped because: kasan: bad access detected
[   87.219665] 
[   87.221191] Memory state around the buggy address:
[   87.226013]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.232574]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.239135] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.245727]                              ^
[   87.249847]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.256408]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.262969] ==================================================================
[   84.140136] ==================================================================
[   84.147430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0
[   84.154876] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.161621] 
[   84.163116] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.163146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.163146] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.163177] Call trace: 
[   84.163177]  unwind_backtrace from show_stack+0x18/0x1c
[   84.163208]  show_stack from dump_stack_lvl+0x70/0x90
[   84.163238]  dump_stack_lvl from print_report+0x158/0x528
[   84.163269]  print_report from kasan_report+0xdc/0x118
[   84.163269]  kasan_report from kasan_check_range+0x14c/0x198
[   84.163299]  kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0
[   84.163330]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.163360]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.163391]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.163391]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.163421]  kthread from ret_from_fork+0x14/0x20
[   84.163452] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.163452] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.163482] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.163513] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.163513] 
[   84.281494] Allocated by task 317:
[   84.284912]  kasan_save_track+0x30/0x5c
[   84.288787]  __kasan_kmalloc+0x8c/0x94
[   84.292572]  kasan_atomics+0xc0/0x33c
[   84.296264]  kunit_try_run_case+0x22c/0x5a8
[   84.300476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.305999]  kthread+0x464/0x810
[   84.309265]  ret_from_fork+0x14/0x20
[   84.312866] 
[   84.314361] The buggy address belongs to the object at cc90f300
[   84.314361]  which belongs to the cache kmalloc-64 of size 64
[   84.326080] The buggy address is located 0 bytes to the right of
[   84.326080]  allocated 48-byte region [cc90f300, cc90f330)
[   84.337646] 
[   84.339141] The buggy address belongs to the physical page:
[   84.344757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.352020] flags: 0x0(zone=0)
[   84.355102] page_type: f5(slab)
[   84.358276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.366424] raw: 00000000
[   84.369049] page dumped because: kasan: bad access detected
[   84.374664] 
[   84.376159] Memory state around the buggy address:
[   84.380981]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.387542]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.394134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.400695]                              ^
[   84.404815]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.411407]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.417968] ==================================================================
[   86.136016] ==================================================================
[   86.143310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0
[   86.150756] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.157409] 
[   86.158905] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.158935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.158966] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.158966] Call trace: 
[   86.158966]  unwind_backtrace from show_stack+0x18/0x1c
[   86.158996]  show_stack from dump_stack_lvl+0x70/0x90
[   86.159027]  dump_stack_lvl from print_report+0x158/0x528
[   86.159057]  print_report from kasan_report+0xdc/0x118
[   86.159057]  kasan_report from kasan_atomics_helper+0x544c/0x5ab0
[   86.159088]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.159118]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.159149]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.159179]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.159210]  kthread from ret_from_fork+0x14/0x20
[   86.159210] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.159240] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.159240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.159271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.159271] 
[   86.271148] Allocated by task 317:
[   86.274566]  kasan_save_track+0x30/0x5c
[   86.278442]  __kasan_kmalloc+0x8c/0x94
[   86.282226]  kasan_atomics+0xc0/0x33c
[   86.285919]  kunit_try_run_case+0x22c/0x5a8
[   86.290130]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.295654]  kthread+0x464/0x810
[   86.298919]  ret_from_fork+0x14/0x20
[   86.302520] 
[   86.304016] The buggy address belongs to the object at cc90f300
[   86.304016]  which belongs to the cache kmalloc-64 of size 64
[   86.315734] The buggy address is located 0 bytes to the right of
[   86.315734]  allocated 48-byte region [cc90f300, cc90f330)
[   86.327301] 
[   86.328796] The buggy address belongs to the physical page:
[   86.334411] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.341674] flags: 0x0(zone=0)
[   86.344757] page_type: f5(slab)
[   86.347930] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.356079] raw: 00000000
[   86.358703] page dumped because: kasan: bad access detected
[   86.364318] 
[   86.365814] Memory state around the buggy address:
[   86.370635]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.377197]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.383789] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.390350]                              ^
[   86.394470]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.401062]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.407623] ==================================================================
[   80.458343] ==================================================================
[   80.465637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0
[   80.473083] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.479827] 
[   80.481323] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.481353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.481353] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.481384] Call trace: 
[   80.481384]  unwind_backtrace from show_stack+0x18/0x1c
[   80.481414]  show_stack from dump_stack_lvl+0x70/0x90
[   80.481445]  dump_stack_lvl from print_report+0x158/0x528
[   80.481475]  print_report from kasan_report+0xdc/0x118
[   80.481475]  kasan_report from kasan_check_range+0x14c/0x198
[   80.481506]  kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0
[   80.481536]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.481567]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.481597]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.481597]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.481628]  kthread from ret_from_fork+0x14/0x20
[   80.481658] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.481658] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.481689] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.481719] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.481719] 
[   80.599700] Allocated by task 317:
[   80.603118]  kasan_save_track+0x30/0x5c
[   80.606994]  __kasan_kmalloc+0x8c/0x94
[   80.610778]  kasan_atomics+0xc0/0x33c
[   80.614471]  kunit_try_run_case+0x22c/0x5a8
[   80.618682]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.624206]  kthread+0x464/0x810
[   80.627471]  ret_from_fork+0x14/0x20
[   80.631072] 
[   80.632568] The buggy address belongs to the object at cc90f300
[   80.632568]  which belongs to the cache kmalloc-64 of size 64
[   80.644287] The buggy address is located 0 bytes to the right of
[   80.644287]  allocated 48-byte region [cc90f300, cc90f330)
[   80.655853] 
[   80.657348] The buggy address belongs to the physical page:
[   80.662963] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.670227] flags: 0x0(zone=0)
[   80.673309] page_type: f5(slab)
[   80.676483] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.684631] raw: 00000000
[   80.687255] page dumped because: kasan: bad access detected
[   80.692871] 
[   80.694366] Memory state around the buggy address:
[   80.699188]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.705749]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.712341] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.718902]                              ^
[   80.723022]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.729583]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.736175] ==================================================================
[   81.586425] ==================================================================
[   81.593688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0
[   81.601135] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.607788] 
[   81.609283] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.609313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.609344] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.609344] Call trace: 
[   81.609344]  unwind_backtrace from show_stack+0x18/0x1c
[   81.609374]  show_stack from dump_stack_lvl+0x70/0x90
[   81.609405]  dump_stack_lvl from print_report+0x158/0x528
[   81.609436]  print_report from kasan_report+0xdc/0x118
[   81.609466]  kasan_report from kasan_check_range+0x14c/0x198
[   81.609466]  kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0
[   81.609497]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.609527]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.609558]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.609588]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.609619]  kthread from ret_from_fork+0x14/0x20
[   81.609619] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.609649] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.609649] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.609680] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.609680] 
[   81.727661] Allocated by task 317:
[   81.731079]  kasan_save_track+0x30/0x5c
[   81.734954]  __kasan_kmalloc+0x8c/0x94
[   81.738739]  kasan_atomics+0xc0/0x33c
[   81.742431]  kunit_try_run_case+0x22c/0x5a8
[   81.746643]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.752166]  kthread+0x464/0x810
[   81.755432]  ret_from_fork+0x14/0x20
[   81.759033] 
[   81.760528] The buggy address belongs to the object at cc90f300
[   81.760528]  which belongs to the cache kmalloc-64 of size 64
[   81.772247] The buggy address is located 0 bytes to the right of
[   81.772247]  allocated 48-byte region [cc90f300, cc90f330)
[   81.783813] 
[   81.785308] The buggy address belongs to the physical page:
[   81.790924] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.798187] flags: 0x0(zone=0)
[   81.801269] page_type: f5(slab)
[   81.804443] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.812591] raw: 00000000
[   81.815216] page dumped because: kasan: bad access detected
[   81.820831] 
[   81.822326] Memory state around the buggy address:
[   81.827148]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.833740]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.840301] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.846862]                              ^
[   81.850982]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.857574]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.864135] ==================================================================
[   88.974761] ==================================================================
[   88.982025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0
[   88.989501] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.996154] 
[   88.997650] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.997680] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.997680] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.997711] Call trace: 
[   88.997711]  unwind_backtrace from show_stack+0x18/0x1c
[   88.997741]  show_stack from dump_stack_lvl+0x70/0x90
[   88.997772]  dump_stack_lvl from print_report+0x158/0x528
[   88.997802]  print_report from kasan_report+0xdc/0x118
[   88.997802]  kasan_report from kasan_atomics_helper+0x54f4/0x5ab0
[   88.997833]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.997863]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.997894]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.997924]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.997955]  kthread from ret_from_fork+0x14/0x20
[   88.997955] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.997985] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.997985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.998016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.998016] 
[   89.109893] Allocated by task 317:
[   89.113311]  kasan_save_track+0x30/0x5c
[   89.117187]  __kasan_kmalloc+0x8c/0x94
[   89.120941]  kasan_atomics+0xc0/0x33c
[   89.124664]  kunit_try_run_case+0x22c/0x5a8
[   89.128875]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.134399]  kthread+0x464/0x810
[   89.137664]  ret_from_fork+0x14/0x20
[   89.141265] 
[   89.142761] The buggy address belongs to the object at cc90f300
[   89.142761]  which belongs to the cache kmalloc-64 of size 64
[   89.154479] The buggy address is located 0 bytes to the right of
[   89.154479]  allocated 48-byte region [cc90f300, cc90f330)
[   89.166046] 
[   89.167541] The buggy address belongs to the physical page:
[   89.173126] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.180419] flags: 0x0(zone=0)
[   89.183471] page_type: f5(slab)
[   89.186645] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.194793] raw: 00000000
[   89.197448] page dumped because: kasan: bad access detected
[   89.203033] 
[   89.204528] Memory state around the buggy address:
[   89.209350]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.215942]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.222503] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.229064]                              ^
[   89.233184]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.239776]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.246337] ==================================================================
[   77.050292] ==================================================================
[   77.057556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0
[   77.064941] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.071685] 
[   77.073181] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.073211] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.073211] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.073242] Call trace: 
[   77.073242]  unwind_backtrace from show_stack+0x18/0x1c
[   77.073272]  show_stack from dump_stack_lvl+0x70/0x90
[   77.073303]  dump_stack_lvl from print_report+0x158/0x528
[   77.073303]  print_report from kasan_report+0xdc/0x118
[   77.073333]  kasan_report from kasan_check_range+0x14c/0x198
[   77.073364]  kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0
[   77.073394]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.073425]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.073425]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.073455]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.073486]  kthread from ret_from_fork+0x14/0x20
[   77.073516] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.073516] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.073547] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.073547] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.073577] 
[   77.191467] Allocated by task 317:
[   77.194885]  kasan_save_track+0x30/0x5c
[   77.198760]  __kasan_kmalloc+0x8c/0x94
[   77.202545]  kasan_atomics+0xc0/0x33c
[   77.206237]  kunit_try_run_case+0x22c/0x5a8
[   77.210449]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.215972]  kthread+0x464/0x810
[   77.219238]  ret_from_fork+0x14/0x20
[   77.222839] 
[   77.224334] The buggy address belongs to the object at cc90f300
[   77.224334]  which belongs to the cache kmalloc-64 of size 64
[   77.236053] The buggy address is located 0 bytes to the right of
[   77.236053]  allocated 48-byte region [cc90f300, cc90f330)
[   77.247619] 
[   77.249114] The buggy address belongs to the physical page:
[   77.254730] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.261993] flags: 0x0(zone=0)
[   77.265075] page_type: f5(slab)
[   77.268249] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.276397] raw: 00000000
[   77.279022] page dumped because: kasan: bad access detected
[   77.284637] 
[   77.286132] Memory state around the buggy address:
[   77.290954]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297515]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.304107] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.310668]                              ^
[   77.314788]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.321380]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.327941] ==================================================================
[   77.905181] ==================================================================
[   77.912445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0
[   77.919891] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.926544] 
[   77.928070] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.928100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.928100] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.928100] Call trace: 
[   77.928100]  unwind_backtrace from show_stack+0x18/0x1c
[   77.928131]  show_stack from dump_stack_lvl+0x70/0x90
[   77.928161]  dump_stack_lvl from print_report+0x158/0x528
[   77.928192]  print_report from kasan_report+0xdc/0x118
[   77.928222]  kasan_report from kasan_atomics_helper+0x5404/0x5ab0
[   77.928253]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.928253]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.928283]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.928314]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.928344]  kthread from ret_from_fork+0x14/0x20
[   77.928375] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.928375] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.928405] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.928405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.928436] 
[   78.040283] Allocated by task 317:
[   78.043701]  kasan_save_track+0x30/0x5c
[   78.047576]  __kasan_kmalloc+0x8c/0x94
[   78.051361]  kasan_atomics+0xc0/0x33c
[   78.055053]  kunit_try_run_case+0x22c/0x5a8
[   78.059265]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.064788]  kthread+0x464/0x810
[   78.068054]  ret_from_fork+0x14/0x20
[   78.071655] 
[   78.073150] The buggy address belongs to the object at cc90f300
[   78.073150]  which belongs to the cache kmalloc-64 of size 64
[   78.084899] The buggy address is located 0 bytes to the right of
[   78.084899]  allocated 48-byte region [cc90f300, cc90f330)
[   78.096435] 
[   78.097930] The buggy address belongs to the physical page:
[   78.103546] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.110809] flags: 0x0(zone=0)
[   78.113891] page_type: f5(slab)
[   78.117065] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.125213] raw: 00000000
[   78.127838] page dumped because: kasan: bad access detected
[   78.133453] 
[   78.134948] Memory state around the buggy address:
[   78.139770]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.146362]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.152923] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.159484]                              ^
[   78.163635]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.170196]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.176757] ==================================================================
[   84.425262] ==================================================================
[   84.432556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0
[   84.440002] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.446746] 
[   84.448242] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.448272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.448303] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.448303] Call trace: 
[   84.448303]  unwind_backtrace from show_stack+0x18/0x1c
[   84.448333]  show_stack from dump_stack_lvl+0x70/0x90
[   84.448364]  dump_stack_lvl from print_report+0x158/0x528
[   84.448394]  print_report from kasan_report+0xdc/0x118
[   84.448394]  kasan_report from kasan_check_range+0x14c/0x198
[   84.448425]  kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0
[   84.448455]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.448486]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.448516]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.448547]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.448577]  kthread from ret_from_fork+0x14/0x20
[   84.448577] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.448608] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.448608] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.448638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.448638] 
[   84.566619] Allocated by task 317:
[   84.570037]  kasan_save_track+0x30/0x5c
[   84.573913]  __kasan_kmalloc+0x8c/0x94
[   84.577697]  kasan_atomics+0xc0/0x33c
[   84.581390]  kunit_try_run_case+0x22c/0x5a8
[   84.585601]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.591125]  kthread+0x464/0x810
[   84.594390]  ret_from_fork+0x14/0x20
[   84.597991] 
[   84.599487] The buggy address belongs to the object at cc90f300
[   84.599487]  which belongs to the cache kmalloc-64 of size 64
[   84.611236] The buggy address is located 0 bytes to the right of
[   84.611236]  allocated 48-byte region [cc90f300, cc90f330)
[   84.622772] 
[   84.624267] The buggy address belongs to the physical page:
[   84.629882] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.637145] flags: 0x0(zone=0)
[   84.640228] page_type: f5(slab)
[   84.643402] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.651550] raw: 00000000
[   84.654174] page dumped because: kasan: bad access detected
[   84.659790] 
[   84.661285] Memory state around the buggy address:
[   84.666107]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.672698]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.679260] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.685821]                              ^
[   84.689941]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.696533]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.703094] ==================================================================
[   78.184082] ==================================================================
[   78.191345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0
[   78.198699] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.205444] 
[   78.206970] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.207000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.207000] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.207000] Call trace: 
[   78.207031]  unwind_backtrace from show_stack+0x18/0x1c
[   78.207031]  show_stack from dump_stack_lvl+0x70/0x90
[   78.207061]  dump_stack_lvl from print_report+0x158/0x528
[   78.207092]  print_report from kasan_report+0xdc/0x118
[   78.207122]  kasan_report from kasan_check_range+0x14c/0x198
[   78.207122]  kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0
[   78.207153]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.207183]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.207214]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.207244]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.207275]  kthread from ret_from_fork+0x14/0x20
[   78.207305] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.207305] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.207336] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.207336] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.207366] 
[   78.325225] Allocated by task 317:
[   78.328674]  kasan_save_track+0x30/0x5c
[   78.332519]  __kasan_kmalloc+0x8c/0x94
[   78.336303]  kasan_atomics+0xc0/0x33c
[   78.339996]  kunit_try_run_case+0x22c/0x5a8
[   78.344207]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.349761]  kthread+0x464/0x810
[   78.352996]  ret_from_fork+0x14/0x20
[   78.356628] 
[   78.358123] The buggy address belongs to the object at cc90f300
[   78.358123]  which belongs to the cache kmalloc-64 of size 64
[   78.369842] The buggy address is located 0 bytes to the right of
[   78.369842]  allocated 48-byte region [cc90f300, cc90f330)
[   78.381378] 
[   78.382904] The buggy address belongs to the physical page:
[   78.388488] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.395782] flags: 0x0(zone=0)
[   78.398834] page_type: f5(slab)
[   78.402008] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.410156] raw: 00000000
[   78.412780] page dumped because: kasan: bad access detected
[   78.418395] 
[   78.419891] Memory state around the buggy address:
[   78.424713]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.431304]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.437866] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.444427]                              ^
[   78.448577]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.455139]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.461700] ==================================================================
[   84.995544] ==================================================================
[   85.002807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0
[   85.010253] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.016998] 
[   85.018493] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.018524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.018554] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.018554] Call trace: 
[   85.018554]  unwind_backtrace from show_stack+0x18/0x1c
[   85.018585]  show_stack from dump_stack_lvl+0x70/0x90
[   85.018615]  dump_stack_lvl from print_report+0x158/0x528
[   85.018646]  print_report from kasan_report+0xdc/0x118
[   85.018646]  kasan_report from kasan_check_range+0x14c/0x198
[   85.018676]  kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0
[   85.018707]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.018737]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.018768]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.018798]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.018829]  kthread from ret_from_fork+0x14/0x20
[   85.018829] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.018859] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.018859] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.018890] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.018890] 
[   85.136871] Allocated by task 317:
[   85.140289]  kasan_save_track+0x30/0x5c
[   85.144165]  __kasan_kmalloc+0x8c/0x94
[   85.147949]  kasan_atomics+0xc0/0x33c
[   85.151641]  kunit_try_run_case+0x22c/0x5a8
[   85.155853]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.161376]  kthread+0x464/0x810
[   85.164642]  ret_from_fork+0x14/0x20
[   85.168243] 
[   85.169738] The buggy address belongs to the object at cc90f300
[   85.169738]  which belongs to the cache kmalloc-64 of size 64
[   85.181457] The buggy address is located 0 bytes to the right of
[   85.181457]  allocated 48-byte region [cc90f300, cc90f330)
[   85.193023] 
[   85.194519] The buggy address belongs to the physical page:
[   85.200134] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.207397] flags: 0x0(zone=0)
[   85.210479] page_type: f5(slab)
[   85.213653] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.221801] raw: 00000000
[   85.224426] page dumped because: kasan: bad access detected
[   85.230041] 
[   85.231536] Memory state around the buggy address:
[   85.236358]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.242919]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.249511] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.256072]                              ^
[   85.260192]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.266784]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.273345] ==================================================================
[   82.999603] ==================================================================
[   83.006866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0
[   83.014343] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.021087] 
[   83.022583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.022613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.022613] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.022644] Call trace: 
[   83.022644]  unwind_backtrace from show_stack+0x18/0x1c
[   83.022674]  show_stack from dump_stack_lvl+0x70/0x90
[   83.022705]  dump_stack_lvl from print_report+0x158/0x528
[   83.022705]  print_report from kasan_report+0xdc/0x118
[   83.022735]  kasan_report from kasan_check_range+0x14c/0x198
[   83.022766]  kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0
[   83.022796]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.022827]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.022857]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.022857]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.022888]  kthread from ret_from_fork+0x14/0x20
[   83.022918] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.022918] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.022949] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.022979] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.022979] 
[   83.140960] Allocated by task 317:
[   83.144378]  kasan_save_track+0x30/0x5c
[   83.148254]  __kasan_kmalloc+0x8c/0x94
[   83.152038]  kasan_atomics+0xc0/0x33c
[   83.155731]  kunit_try_run_case+0x22c/0x5a8
[   83.159942]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.165466]  kthread+0x464/0x810
[   83.168731]  ret_from_fork+0x14/0x20
[   83.172332] 
[   83.173828] The buggy address belongs to the object at cc90f300
[   83.173828]  which belongs to the cache kmalloc-64 of size 64
[   83.185577] The buggy address is located 0 bytes to the right of
[   83.185577]  allocated 48-byte region [cc90f300, cc90f330)
[   83.197113] 
[   83.198608] The buggy address belongs to the physical page:
[   83.204223] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.211486] flags: 0x0(zone=0)
[   83.214569] page_type: f5(slab)
[   83.217742] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.225891] raw: 00000000
[   83.228515] page dumped because: kasan: bad access detected
[   83.234130] 
[   83.235626] Memory state around the buggy address:
[   83.240447]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.247039]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.253601] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.260162]                              ^
[   83.264282]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.270874]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.277435] ==================================================================
[   89.538757] ==================================================================
[   89.546020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0
[   89.553497] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   89.560150] 
[   89.561645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.561676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.561676] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.561706] Call trace: 
[   89.561706]  unwind_backtrace from show_stack+0x18/0x1c
[   89.561737]  show_stack from dump_stack_lvl+0x70/0x90
[   89.561767]  dump_stack_lvl from print_report+0x158/0x528
[   89.561767]  print_report from kasan_report+0xdc/0x118
[   89.561798]  kasan_report from kasan_atomics_helper+0x5500/0x5ab0
[   89.561828]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.561859]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.561889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.561920]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.561950]  kthread from ret_from_fork+0x14/0x20
[   89.561950] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   89.561981] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.561981] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.562011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.562011] 
[   89.673858] Allocated by task 317:
[   89.677307]  kasan_save_track+0x30/0x5c
[   89.681152]  __kasan_kmalloc+0x8c/0x94
[   89.684936]  kasan_atomics+0xc0/0x33c
[   89.688629]  kunit_try_run_case+0x22c/0x5a8
[   89.692840]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.698394]  kthread+0x464/0x810
[   89.701629]  ret_from_fork+0x14/0x20
[   89.705230] 
[   89.706756] The buggy address belongs to the object at cc90f300
[   89.706756]  which belongs to the cache kmalloc-64 of size 64
[   89.718475] The buggy address is located 0 bytes to the right of
[   89.718475]  allocated 48-byte region [cc90f300, cc90f330)
[   89.730010] 
[   89.731506] The buggy address belongs to the physical page:
[   89.737121] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.744384] flags: 0x0(zone=0)
[   89.747467] page_type: f5(slab)
[   89.750640] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.758789] raw: 00000000
[   89.761413] page dumped because: kasan: bad access detected
[   89.767028] 
[   89.768524] Memory state around the buggy address:
[   89.773345]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.779937]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.786499] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.793060]                              ^
[   89.797180]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.803771]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.810333] ==================================================================
[   74.485595] ==================================================================
[   74.492889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0
[   74.500244] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.506988] 
[   74.508483] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.508514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.508514] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.508544] Call trace: 
[   74.508544]  unwind_backtrace from show_stack+0x18/0x1c
[   74.508575]  show_stack from dump_stack_lvl+0x70/0x90
[   74.508605]  dump_stack_lvl from print_report+0x158/0x528
[   74.508636]  print_report from kasan_report+0xdc/0x118
[   74.508636]  kasan_report from kasan_check_range+0x14c/0x198
[   74.508666]  kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0
[   74.508697]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.508728]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.508758]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.508789]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.508789]  kthread from ret_from_fork+0x14/0x20
[   74.508819] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.508850] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.508850] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.508880] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.508880] 
[   74.626770] Allocated by task 317:
[   74.630187]  kasan_save_track+0x30/0x5c
[   74.634063]  __kasan_kmalloc+0x8c/0x94
[   74.637847]  kasan_atomics+0xc0/0x33c
[   74.641540]  kunit_try_run_case+0x22c/0x5a8
[   74.645751]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.651306]  kthread+0x464/0x810
[   74.654541]  ret_from_fork+0x14/0x20
[   74.658142] 
[   74.659667] The buggy address belongs to the object at cc90f300
[   74.659667]  which belongs to the cache kmalloc-64 of size 64
[   74.671386] The buggy address is located 0 bytes to the right of
[   74.671386]  allocated 48-byte region [cc90f300, cc90f330)
[   74.682922] 
[   74.684417] The buggy address belongs to the physical page:
[   74.690032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.697296] flags: 0x0(zone=0)
[   74.700378] page_type: f5(slab)
[   74.703552] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.711700] raw: 00000000
[   74.714355] page dumped because: kasan: bad access detected
[   74.719940] 
[   74.721466] Memory state around the buggy address:
[   74.726287]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.732849]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.739410] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.745971]                              ^
[   74.750122]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.756683]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.763244] ==================================================================
[   74.206604] ==================================================================
[   74.213867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0
[   74.221313] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.228088] 
[   74.229583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.229614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.229614] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.229614] Call trace: 
[   74.229644]  unwind_backtrace from show_stack+0x18/0x1c
[   74.229675]  show_stack from dump_stack_lvl+0x70/0x90
[   74.229675]  dump_stack_lvl from print_report+0x158/0x528
[   74.229705]  print_report from kasan_report+0xdc/0x118
[   74.229736]  kasan_report from kasan_atomics_helper+0x50bc/0x5ab0
[   74.229766]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.229797]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.229827]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.229858]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.229858]  kthread from ret_from_fork+0x14/0x20
[   74.229888] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.229919] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.229919] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.229949] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.229949] 
[   74.341796] Allocated by task 317:
[   74.345245]  kasan_save_track+0x30/0x5c
[   74.349090]  __kasan_kmalloc+0x8c/0x94
[   74.352874]  kasan_atomics+0xc0/0x33c
[   74.356567]  kunit_try_run_case+0x22c/0x5a8
[   74.360809]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.366333]  kthread+0x464/0x810
[   74.369567]  ret_from_fork+0x14/0x20
[   74.373199] 
[   74.374694] The buggy address belongs to the object at cc90f300
[   74.374694]  which belongs to the cache kmalloc-64 of size 64
[   74.386413] The buggy address is located 0 bytes to the right of
[   74.386413]  allocated 48-byte region [cc90f300, cc90f330)
[   74.397949] 
[   74.399475] The buggy address belongs to the physical page:
[   74.405059] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.412353] flags: 0x0(zone=0)
[   74.415435] page_type: f5(slab)
[   74.418609] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.426727] raw: 00000000
[   74.429382] page dumped because: kasan: bad access detected
[   74.434997] 
[   74.436492] Memory state around the buggy address:
[   74.441314]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.447875]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.454437] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.461029]                              ^
[   74.465148]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.471710]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478302] ==================================================================
[   76.765319] ==================================================================
[   76.772583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0
[   76.779968] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.786712] 
[   76.788208] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.788238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.788238] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.788269] Call trace: 
[   76.788269]  unwind_backtrace from show_stack+0x18/0x1c
[   76.788299]  show_stack from dump_stack_lvl+0x70/0x90
[   76.788330]  dump_stack_lvl from print_report+0x158/0x528
[   76.788360]  print_report from kasan_report+0xdc/0x118
[   76.788360]  kasan_report from kasan_check_range+0x14c/0x198
[   76.788391]  kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0
[   76.788421]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.788452]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.788482]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.788513]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.788513]  kthread from ret_from_fork+0x14/0x20
[   76.788543] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.788574] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.788574] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.788604] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.788604] 
[   76.906494] Allocated by task 317:
[   76.909912]  kasan_save_track+0x30/0x5c
[   76.913787]  __kasan_kmalloc+0x8c/0x94
[   76.917572]  kasan_atomics+0xc0/0x33c
[   76.921264]  kunit_try_run_case+0x22c/0x5a8
[   76.925476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.930999]  kthread+0x464/0x810
[   76.934265]  ret_from_fork+0x14/0x20
[   76.937866] 
[   76.939361] The buggy address belongs to the object at cc90f300
[   76.939361]  which belongs to the cache kmalloc-64 of size 64
[   76.951110] The buggy address is located 0 bytes to the right of
[   76.951110]  allocated 48-byte region [cc90f300, cc90f330)
[   76.962646] 
[   76.964141] The buggy address belongs to the physical page:
[   76.969757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.977020] flags: 0x0(zone=0)
[   76.980102] page_type: f5(slab)
[   76.983276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.991424] raw: 00000000
[   76.994049] page dumped because: kasan: bad access detected
[   76.999664] 
[   77.001159] Memory state around the buggy address:
[   77.005981]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.012573]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.019134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.025695]                              ^
[   77.029846]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.036407]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.042968] ==================================================================
[   77.335266] ==================================================================
[   77.342529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0
[   77.349884] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.356628] 
[   77.358154] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.358184] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.358184] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.358184] Call trace: 
[   77.358184]  unwind_backtrace from show_stack+0x18/0x1c
[   77.358215]  show_stack from dump_stack_lvl+0x70/0x90
[   77.358245]  dump_stack_lvl from print_report+0x158/0x528
[   77.358276]  print_report from kasan_report+0xdc/0x118
[   77.358306]  kasan_report from kasan_check_range+0x14c/0x198
[   77.358306]  kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0
[   77.358337]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.358367]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.358398]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.358428]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.358459]  kthread from ret_from_fork+0x14/0x20
[   77.358459] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.358489] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.358520] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.358520] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.358520] 
[   77.476409] Allocated by task 317:
[   77.479858]  kasan_save_track+0x30/0x5c
[   77.483703]  __kasan_kmalloc+0x8c/0x94
[   77.487487]  kasan_atomics+0xc0/0x33c
[   77.491180]  kunit_try_run_case+0x22c/0x5a8
[   77.495422]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.500946]  kthread+0x464/0x810
[   77.504180]  ret_from_fork+0x14/0x20
[   77.507812] 
[   77.509307] The buggy address belongs to the object at cc90f300
[   77.509307]  which belongs to the cache kmalloc-64 of size 64
[   77.521026] The buggy address is located 0 bytes to the right of
[   77.521026]  allocated 48-byte region [cc90f300, cc90f330)
[   77.532592] 
[   77.534088] The buggy address belongs to the physical page:
[   77.539672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.546966] flags: 0x0(zone=0)
[   77.550048] page_type: f5(slab)
[   77.553222] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.561340] raw: 00000000
[   77.563995] page dumped because: kasan: bad access detected
[   77.569610] 
[   77.571105] Memory state around the buggy address:
[   77.575927]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.582489]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.589080] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.595642]                              ^
[   77.599761]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.606323]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.612884] ==================================================================
[   77.620208] ==================================================================
[   77.627471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0
[   77.634857] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.641601] 
[   77.643096] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.643127] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.643127] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.643157] Call trace: 
[   77.643157]  unwind_backtrace from show_stack+0x18/0x1c
[   77.643188]  show_stack from dump_stack_lvl+0x70/0x90
[   77.643218]  dump_stack_lvl from print_report+0x158/0x528
[   77.643218]  print_report from kasan_report+0xdc/0x118
[   77.643249]  kasan_report from kasan_check_range+0x14c/0x198
[   77.643280]  kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0
[   77.643310]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.643341]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.643371]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.643371]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.643402]  kthread from ret_from_fork+0x14/0x20
[   77.643432] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.643432] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.643463] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.643493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.643493] 
[   77.761383] Allocated by task 317:
[   77.764801]  kasan_save_track+0x30/0x5c
[   77.768676]  __kasan_kmalloc+0x8c/0x94
[   77.772460]  kasan_atomics+0xc0/0x33c
[   77.776153]  kunit_try_run_case+0x22c/0x5a8
[   77.780364]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.785888]  kthread+0x464/0x810
[   77.789154]  ret_from_fork+0x14/0x20
[   77.792755] 
[   77.794250] The buggy address belongs to the object at cc90f300
[   77.794250]  which belongs to the cache kmalloc-64 of size 64
[   77.805969] The buggy address is located 0 bytes to the right of
[   77.805969]  allocated 48-byte region [cc90f300, cc90f330)
[   77.817535] 
[   77.819030] The buggy address belongs to the physical page:
[   77.824645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.831909] flags: 0x0(zone=0)
[   77.834991] page_type: f5(slab)
[   77.838165] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.846313] raw: 00000000
[   77.848937] page dumped because: kasan: bad access detected
[   77.854553] 
[   77.856048] Memory state around the buggy address:
[   77.860870]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.867462]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.874023] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.880584]                              ^
[   77.884704]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.891296]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.897857] ==================================================================
[   79.324066] ==================================================================
[   79.331329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0
[   79.338775] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.345520] 
[   79.347045] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.347076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.347076] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.347076] Call trace: 
[   79.347106]  unwind_backtrace from show_stack+0x18/0x1c
[   79.347106]  show_stack from dump_stack_lvl+0x70/0x90
[   79.347137]  dump_stack_lvl from print_report+0x158/0x528
[   79.347167]  print_report from kasan_report+0xdc/0x118
[   79.347198]  kasan_report from kasan_check_range+0x14c/0x198
[   79.347198]  kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0
[   79.347229]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.347259]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.347290]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.347320]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.347351]  kthread from ret_from_fork+0x14/0x20
[   79.347381] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.347381] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.347412] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.347412] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.347442] 
[   79.465393] Allocated by task 317:
[   79.468841]  kasan_save_track+0x30/0x5c
[   79.472686]  __kasan_kmalloc+0x8c/0x94
[   79.476470]  kasan_atomics+0xc0/0x33c
[   79.480163]  kunit_try_run_case+0x22c/0x5a8
[   79.484374]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.489929]  kthread+0x464/0x810
[   79.493164]  ret_from_fork+0x14/0x20
[   79.496765] 
[   79.498291] The buggy address belongs to the object at cc90f300
[   79.498291]  which belongs to the cache kmalloc-64 of size 64
[   79.510009] The buggy address is located 0 bytes to the right of
[   79.510009]  allocated 48-byte region [cc90f300, cc90f330)
[   79.521545] 
[   79.523071] The buggy address belongs to the physical page:
[   79.528656] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.535949] flags: 0x0(zone=0)
[   79.539001] page_type: f5(slab)
[   79.542175] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.550323] raw: 00000000
[   79.552978] page dumped because: kasan: bad access detected
[   79.558563] 
[   79.560089] Memory state around the buggy address:
[   79.564910]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.571472]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.578033] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.584625]                              ^
[   79.588745]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.595306]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.601867] ==================================================================
[   76.480377] ==================================================================
[   76.487640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0
[   76.494995] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.501739] 
[   76.503265] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.503265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.503295] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.503295] Call trace: 
[   76.503295]  unwind_backtrace from show_stack+0x18/0x1c
[   76.503326]  show_stack from dump_stack_lvl+0x70/0x90
[   76.503356]  dump_stack_lvl from print_report+0x158/0x528
[   76.503387]  print_report from kasan_report+0xdc/0x118
[   76.503417]  kasan_report from kasan_check_range+0x14c/0x198
[   76.503417]  kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0
[   76.503448]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.503479]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.503509]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.503540]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.503570]  kthread from ret_from_fork+0x14/0x20
[   76.503570] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.503601] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.503601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.503631] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.503631] 
[   76.621520] Allocated by task 317:
[   76.624969]  kasan_save_track+0x30/0x5c
[   76.628814]  __kasan_kmalloc+0x8c/0x94
[   76.632598]  kasan_atomics+0xc0/0x33c
[   76.636291]  kunit_try_run_case+0x22c/0x5a8
[   76.640502]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.646057]  kthread+0x464/0x810
[   76.649291]  ret_from_fork+0x14/0x20
[   76.652923] 
[   76.654418] The buggy address belongs to the object at cc90f300
[   76.654418]  which belongs to the cache kmalloc-64 of size 64
[   76.666137] The buggy address is located 0 bytes to the right of
[   76.666137]  allocated 48-byte region [cc90f300, cc90f330)
[   76.677673] 
[   76.679199] The buggy address belongs to the physical page:
[   76.684783] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.692077] flags: 0x0(zone=0)
[   76.695159] page_type: f5(slab)
[   76.698303] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.706451] raw: 00000000
[   76.709106] page dumped because: kasan: bad access detected
[   76.714721] 
[   76.716217] Memory state around the buggy address:
[   76.721038]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.727600]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734161] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.740753]                              ^
[   76.744873]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.751434]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.758026] ==================================================================
[   73.642730] ==================================================================
[   73.649993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0
[   73.657440] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.664123] 
[   73.665618] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.665649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.665649] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.665679] Call trace: 
[   73.665679]  unwind_backtrace from show_stack+0x18/0x1c
[   73.665710]  show_stack from dump_stack_lvl+0x70/0x90
[   73.665710]  dump_stack_lvl from print_report+0x158/0x528
[   73.665740]  print_report from kasan_report+0xdc/0x118
[   73.665771]  kasan_report from kasan_atomics_helper+0x5200/0x5ab0
[   73.665802]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.665832]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.665863]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.665893]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.665893]  kthread from ret_from_fork+0x14/0x20
[   73.665924] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.665954] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.665954] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.665985] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.665985] 
[   73.777832] Allocated by task 317:
[   73.781280]  kasan_save_track+0x30/0x5c
[   73.785125]  __kasan_kmalloc+0x8c/0x94
[   73.788909]  kasan_atomics+0xc0/0x33c
[   73.792602]  kunit_try_run_case+0x22c/0x5a8
[   73.796813]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.802368]  kthread+0x464/0x810
[   73.805603]  ret_from_fork+0x14/0x20
[   73.809234] 
[   73.810729] The buggy address belongs to the object at cc90f300
[   73.810729]  which belongs to the cache kmalloc-64 of size 64
[   73.822448] The buggy address is located 0 bytes to the right of
[   73.822448]  allocated 48-byte region [cc90f300, cc90f330)
[   73.833984] 
[   73.835510] The buggy address belongs to the physical page:
[   73.841094] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.848388] flags: 0x0(zone=0)
[   73.851470] page_type: f5(slab)
[   73.854614] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.862762] raw: 00000000
[   73.865417] page dumped because: kasan: bad access detected
[   73.871002] 
[   73.872528] Memory state around the buggy address:
[   73.877349]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.883911]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.890472] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.897064]                              ^
[   73.901184]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.907745]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.914306] ==================================================================
[   82.435485] ==================================================================
[   82.442749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0
[   82.450195] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.456939] 
[   82.458465] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.458496] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.458496] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.458496] Call trace: 
[   82.458526]  unwind_backtrace from show_stack+0x18/0x1c
[   82.458526]  show_stack from dump_stack_lvl+0x70/0x90
[   82.458557]  dump_stack_lvl from print_report+0x158/0x528
[   82.458587]  print_report from kasan_report+0xdc/0x118
[   82.458618]  kasan_report from kasan_atomics_helper+0x52cc/0x5ab0
[   82.458648]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.458679]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.458679]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.458709]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.458740]  kthread from ret_from_fork+0x14/0x20
[   82.458770] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.458770] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.458801] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.458801] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.458831] 
[   82.570678] Allocated by task 317:
[   82.574096]  kasan_save_track+0x30/0x5c
[   82.577972]  __kasan_kmalloc+0x8c/0x94
[   82.581756]  kasan_atomics+0xc0/0x33c
[   82.585449]  kunit_try_run_case+0x22c/0x5a8
[   82.589660]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.595214]  kthread+0x464/0x810
[   82.598449]  ret_from_fork+0x14/0x20
[   82.602050] 
[   82.603576] The buggy address belongs to the object at cc90f300
[   82.603576]  which belongs to the cache kmalloc-64 of size 64
[   82.615295] The buggy address is located 0 bytes to the right of
[   82.615295]  allocated 48-byte region [cc90f300, cc90f330)
[   82.626831] 
[   82.628326] The buggy address belongs to the physical page:
[   82.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.641204] flags: 0x0(zone=0)
[   82.644287] page_type: f5(slab)
[   82.647460] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.655609] raw: 00000000
[   82.658233] page dumped because: kasan: bad access detected
[   82.663848] 
[   82.665344] Memory state around the buggy address:
[   82.670166]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.676757]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.683319] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.689880]                              ^
[   82.694030]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.700592]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.707153] ==================================================================
[   80.743469] ==================================================================
[   80.750762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0
[   80.758209] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.764862] 
[   80.766357] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.766387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.766418] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.766418] Call trace: 
[   80.766418]  unwind_backtrace from show_stack+0x18/0x1c
[   80.766448]  show_stack from dump_stack_lvl+0x70/0x90
[   80.766479]  dump_stack_lvl from print_report+0x158/0x528
[   80.766510]  print_report from kasan_report+0xdc/0x118
[   80.766540]  kasan_report from kasan_atomics_helper+0x520c/0x5ab0
[   80.766540]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.766571]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.766601]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.766632]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.766662]  kthread from ret_from_fork+0x14/0x20
[   80.766693] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.766693] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.766723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.766723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.766754] 
[   80.878601] Allocated by task 317:
[   80.882019]  kasan_save_track+0x30/0x5c
[   80.885894]  __kasan_kmalloc+0x8c/0x94
[   80.889678]  kasan_atomics+0xc0/0x33c
[   80.893371]  kunit_try_run_case+0x22c/0x5a8
[   80.897583]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.903106]  kthread+0x464/0x810
[   80.906372]  ret_from_fork+0x14/0x20
[   80.909973] 
[   80.911468] The buggy address belongs to the object at cc90f300
[   80.911468]  which belongs to the cache kmalloc-64 of size 64
[   80.923187] The buggy address is located 0 bytes to the right of
[   80.923187]  allocated 48-byte region [cc90f300, cc90f330)
[   80.934753] 
[   80.936248] The buggy address belongs to the physical page:
[   80.941864] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.949127] flags: 0x0(zone=0)
[   80.952209] page_type: f5(slab)
[   80.955383] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.963531] raw: 00000000
[   80.966156] page dumped because: kasan: bad access detected
[   80.971771] 
[   80.973266] Memory state around the buggy address:
[   80.978088]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.984680]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.991241] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.997802]                              ^
[   81.001922]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.008514]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.015075] ==================================================================
[   75.910430] ==================================================================
[   75.917694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0
[   75.925079] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.931823] 
[   75.933319] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.933349] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.933349] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.933380] Call trace: 
[   75.933380]  unwind_backtrace from show_stack+0x18/0x1c
[   75.933410]  show_stack from dump_stack_lvl+0x70/0x90
[   75.933441]  dump_stack_lvl from print_report+0x158/0x528
[   75.933471]  print_report from kasan_report+0xdc/0x118
[   75.933471]  kasan_report from kasan_check_range+0x14c/0x198
[   75.933502]  kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0
[   75.933532]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.933563]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.933593]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.933624]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.933624]  kthread from ret_from_fork+0x14/0x20
[   75.933654] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.933685] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.933685] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.933715] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.933715] 
[   76.051605] Allocated by task 317:
[   76.055023]  kasan_save_track+0x30/0x5c
[   76.058898]  __kasan_kmalloc+0x8c/0x94
[   76.062683]  kasan_atomics+0xc0/0x33c
[   76.066375]  kunit_try_run_case+0x22c/0x5a8
[   76.070587]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.076110]  kthread+0x464/0x810
[   76.079376]  ret_from_fork+0x14/0x20
[   76.082977] 
[   76.084472] The buggy address belongs to the object at cc90f300
[   76.084472]  which belongs to the cache kmalloc-64 of size 64
[   76.096221] The buggy address is located 0 bytes to the right of
[   76.096221]  allocated 48-byte region [cc90f300, cc90f330)
[   76.107757] 
[   76.109252] The buggy address belongs to the physical page:
[   76.114868] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.122131] flags: 0x0(zone=0)
[   76.125213] page_type: f5(slab)
[   76.128387] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.136535] raw: 00000000
[   76.139160] page dumped because: kasan: bad access detected
[   76.144775] 
[   76.146270] Memory state around the buggy address:
[   76.151092]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.157684]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164245] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.170806]                              ^
[   76.174957]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.181518]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.188079] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[   69.420867] ==================================================================
[   69.428131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4e8/0x1d70
[   69.435485] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.442260] 
[   69.443756] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.443786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.443786] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.443786] Call trace: 
[   69.443817]  unwind_backtrace from show_stack+0x18/0x1c
[   69.443847]  show_stack from dump_stack_lvl+0x70/0x90
[   69.443847]  dump_stack_lvl from print_report+0x158/0x528
[   69.443878]  print_report from kasan_report+0xdc/0x118
[   69.443908]  kasan_report from kasan_check_range+0x14c/0x198
[   69.443939]  kasan_check_range from kasan_bitops_generic+0x4e8/0x1d70
[   69.443939]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.443969]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.444000]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.444030]  kthread from ret_from_fork+0x14/0x20
[   69.444061] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.444061] bfa0:                                     00000000 00000000 00000000 00000000
[   69.444091] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.444091] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.444122] 
[   69.556579] Allocated by task 313:
[   69.560028]  kasan_save_track+0x30/0x5c
[   69.563873]  __kasan_kmalloc+0x8c/0x94
[   69.567657]  kasan_bitops_generic+0xd4/0x1d70
[   69.572052]  kunit_try_run_case+0x22c/0x5a8
[   69.576263]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.581817]  kthread+0x464/0x810
[   69.585052]  ret_from_fork+0x14/0x20
[   69.588653] 
[   69.590179] The buggy address belongs to the object at cc90ae80
[   69.590179]  which belongs to the cache kmalloc-64 of size 64
[   69.601898] The buggy address is located 4 bytes inside of
[   69.601898]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.612823] 
[   69.614318] The buggy address belongs to the physical page:
[   69.619934] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.627197] flags: 0x0(zone=0)
[   69.630279] page_type: f5(slab)
[   69.633453] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.641601] raw: 00000000
[   69.644226] page dumped because: kasan: bad access detected
[   69.649841] 
[   69.651336] Memory state around the buggy address:
[   69.656188]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.662750]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.669311] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.675903]            ^
[   69.678436]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.685028]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.691589] ==================================================================
[   70.243133] ==================================================================
[   70.266387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bb8/0x1d70
[   70.273834] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.280487] 
[   70.282012] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.282012] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.282043] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.282043] Call trace: 
[   70.282043]  unwind_backtrace from show_stack+0x18/0x1c
[   70.282073]  show_stack from dump_stack_lvl+0x70/0x90
[   70.282104]  dump_stack_lvl from print_report+0x158/0x528
[   70.282135]  print_report from kasan_report+0xdc/0x118
[   70.282165]  kasan_report from kasan_bitops_generic+0x1bb8/0x1d70
[   70.282165]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.282196]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.282226]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.282257]  kthread from ret_from_fork+0x14/0x20
[   70.282287] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.282287] bfa0:                                     00000000 00000000 00000000 00000000
[   70.282318] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.282318] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.282348] 
[   70.388793] Allocated by task 313:
[   70.392211]  kasan_save_track+0x30/0x5c
[   70.396087]  __kasan_kmalloc+0x8c/0x94
[   70.399841]  kasan_bitops_generic+0xd4/0x1d70
[   70.404266]  kunit_try_run_case+0x22c/0x5a8
[   70.408477]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.414001]  kthread+0x464/0x810
[   70.417266]  ret_from_fork+0x14/0x20
[   70.420867] 
[   70.422363] The buggy address belongs to the object at cc90ae80
[   70.422363]  which belongs to the cache kmalloc-64 of size 64
[   70.434082] The buggy address is located 4 bytes inside of
[   70.434082]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.445037] 
[   70.446533] The buggy address belongs to the physical page:
[   70.452148] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.459411] flags: 0x0(zone=0)
[   70.462493] page_type: f5(slab)
[   70.465667] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.473815] raw: 00000000
[   70.476440] page dumped because: kasan: bad access detected
[   70.482055] 
[   70.483551] Memory state around the buggy address:
[   70.488372]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.494934]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.501525] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.508087]            ^
[   70.510650]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.517211]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.523773] ==================================================================
[   71.369964] ==================================================================
[   71.393920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a80/0x1d70
[   71.401367] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.408020] 
[   71.409545] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.409576] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.409576] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.409576] Call trace: 
[   71.409606]  unwind_backtrace from show_stack+0x18/0x1c
[   71.409606]  show_stack from dump_stack_lvl+0x70/0x90
[   71.409637]  dump_stack_lvl from print_report+0x158/0x528
[   71.409667]  print_report from kasan_report+0xdc/0x118
[   71.409698]  kasan_report from kasan_bitops_generic+0x1a80/0x1d70
[   71.409729]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.409759]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.409759]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.409790]  kthread from ret_from_fork+0x14/0x20
[   71.409820] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.409820] bfa0:                                     00000000 00000000 00000000 00000000
[   71.409851] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.409881] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.409881] 
[   71.516326] Allocated by task 313:
[   71.519744]  kasan_save_track+0x30/0x5c
[   71.523620]  __kasan_kmalloc+0x8c/0x94
[   71.527404]  kasan_bitops_generic+0xd4/0x1d70
[   71.531799]  kunit_try_run_case+0x22c/0x5a8
[   71.536010]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.541534]  kthread+0x464/0x810
[   71.544799]  ret_from_fork+0x14/0x20
[   71.548400] 
[   71.549896] The buggy address belongs to the object at cc90ae80
[   71.549896]  which belongs to the cache kmalloc-64 of size 64
[   71.561614] The buggy address is located 4 bytes inside of
[   71.561614]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.572570] 
[   71.574066] The buggy address belongs to the physical page:
[   71.579681] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.586944] flags: 0x0(zone=0)
[   71.590026] page_type: f5(slab)
[   71.593200] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.601348] raw: 00000000
[   71.603973] page dumped because: kasan: bad access detected
[   71.609588] 
[   71.611083] Memory state around the buggy address:
[   71.615905]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.622497]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.629058] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.635620]            ^
[   71.638183]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.644744]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.651336] ==================================================================
[   68.854827] ==================================================================
[   68.877990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bd0/0x1d70
[   68.885437] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   68.892089] 
[   68.893615] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   68.893646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.893646] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.893646] Call trace: 
[   68.893676]  unwind_backtrace from show_stack+0x18/0x1c
[   68.893676]  show_stack from dump_stack_lvl+0x70/0x90
[   68.893707]  dump_stack_lvl from print_report+0x158/0x528
[   68.893737]  print_report from kasan_report+0xdc/0x118
[   68.893768]  kasan_report from kasan_bitops_generic+0x1bd0/0x1d70
[   68.893798]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.893829]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.893859]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.893859]  kthread from ret_from_fork+0x14/0x20
[   68.893890] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   68.893920] bfa0:                                     00000000 00000000 00000000 00000000
[   68.893920] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.893951] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.893951] 
[   69.000396] Allocated by task 313:
[   69.003814]  kasan_save_track+0x30/0x5c
[   69.007690]  __kasan_kmalloc+0x8c/0x94
[   69.011474]  kasan_bitops_generic+0xd4/0x1d70
[   69.015869]  kunit_try_run_case+0x22c/0x5a8
[   69.020080]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.025604]  kthread+0x464/0x810
[   69.028869]  ret_from_fork+0x14/0x20
[   69.032470] 
[   69.033966] The buggy address belongs to the object at cc90ae80
[   69.033966]  which belongs to the cache kmalloc-64 of size 64
[   69.045715] The buggy address is located 4 bytes inside of
[   69.045715]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.056640] 
[   69.058135] The buggy address belongs to the physical page:
[   69.063751] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.071014] flags: 0x0(zone=0)
[   69.074096] page_type: f5(slab)
[   69.077270] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.085418] raw: 00000000
[   69.088043] page dumped because: kasan: bad access detected
[   69.093658] 
[   69.095153] Memory state around the buggy address:
[   69.099975]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.106567]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.113128] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.119720]            ^
[   69.122253]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.128845]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.135406] ==================================================================
[   70.531280] ==================================================================
[   70.555053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b88/0x1d70
[   70.562499] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.569152] 
[   70.570678] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.570709] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.570709] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.570709] Call trace: 
[   70.570739]  unwind_backtrace from show_stack+0x18/0x1c
[   70.570770]  show_stack from dump_stack_lvl+0x70/0x90
[   70.570770]  dump_stack_lvl from print_report+0x158/0x528
[   70.570800]  print_report from kasan_report+0xdc/0x118
[   70.570831]  kasan_report from kasan_bitops_generic+0x1b88/0x1d70
[   70.570861]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.570892]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.570922]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.570922]  kthread from ret_from_fork+0x14/0x20
[   70.570953] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.570983] bfa0:                                     00000000 00000000 00000000 00000000
[   70.570983] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.571014] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.571014] 
[   70.677459] Allocated by task 313:
[   70.680877]  kasan_save_track+0x30/0x5c
[   70.684753]  __kasan_kmalloc+0x8c/0x94
[   70.688537]  kasan_bitops_generic+0xd4/0x1d70
[   70.692932]  kunit_try_run_case+0x22c/0x5a8
[   70.697143]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.702667]  kthread+0x464/0x810
[   70.705932]  ret_from_fork+0x14/0x20
[   70.709533] 
[   70.711029] The buggy address belongs to the object at cc90ae80
[   70.711029]  which belongs to the cache kmalloc-64 of size 64
[   70.722747] The buggy address is located 4 bytes inside of
[   70.722747]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.733703] 
[   70.735198] The buggy address belongs to the physical page:
[   70.740814] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.748077] flags: 0x0(zone=0)
[   70.751159] page_type: f5(slab)
[   70.754333] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.762481] raw: 00000000
[   70.765106] page dumped because: kasan: bad access detected
[   70.770721] 
[   70.772216] Memory state around the buggy address:
[   70.777038]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.783630]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.790191] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.796752]            ^
[   70.799316]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.805877]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.812469] ==================================================================
[   69.142822] ==================================================================
[   69.150085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x438/0x1d70
[   69.157440] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.164215] 
[   69.165710] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.165740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.165740] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.165771] Call trace: 
[   69.165771]  unwind_backtrace from show_stack+0x18/0x1c
[   69.165802]  show_stack from dump_stack_lvl+0x70/0x90
[   69.165802]  dump_stack_lvl from print_report+0x158/0x528
[   69.165832]  print_report from kasan_report+0xdc/0x118
[   69.165863]  kasan_report from kasan_check_range+0x14c/0x198
[   69.165893]  kasan_check_range from kasan_bitops_generic+0x438/0x1d70
[   69.165924]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.165924]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.165954]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.165985]  kthread from ret_from_fork+0x14/0x20
[   69.166015] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.166015] bfa0:                                     00000000 00000000 00000000 00000000
[   69.166046] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.166046] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.166076] 
[   69.278533] Allocated by task 313:
[   69.281982]  kasan_save_track+0x30/0x5c
[   69.285827]  __kasan_kmalloc+0x8c/0x94
[   69.289611]  kasan_bitops_generic+0xd4/0x1d70
[   69.294006]  kunit_try_run_case+0x22c/0x5a8
[   69.298217]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.303741]  kthread+0x464/0x810
[   69.307006]  ret_from_fork+0x14/0x20
[   69.310607] 
[   69.312133] The buggy address belongs to the object at cc90ae80
[   69.312133]  which belongs to the cache kmalloc-64 of size 64
[   69.323852] The buggy address is located 4 bytes inside of
[   69.323852]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.334777] 
[   69.336273] The buggy address belongs to the physical page:
[   69.341888] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.349182] flags: 0x0(zone=0)
[   69.352233] page_type: f5(slab)
[   69.355407] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.363555] raw: 00000000
[   69.366210] page dumped because: kasan: bad access detected
[   69.371826] 
[   69.373321] Memory state around the buggy address:
[   69.378143]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.384704]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.391296] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.397857]            ^
[   69.400390]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.406982]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.413543] ==================================================================
[   71.658813] ==================================================================
[   71.682861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1abc/0x1d70
[   71.690307] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.696960] 
[   71.698486] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.698516] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.698516] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.698516] Call trace: 
[   71.698547]  unwind_backtrace from show_stack+0x18/0x1c
[   71.698577]  show_stack from dump_stack_lvl+0x70/0x90
[   71.698577]  dump_stack_lvl from print_report+0x158/0x528
[   71.698608]  print_report from kasan_report+0xdc/0x118
[   71.698638]  kasan_report from kasan_bitops_generic+0x1abc/0x1d70
[   71.698669]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.698699]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.698730]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.698760]  kthread from ret_from_fork+0x14/0x20
[   71.698760] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.698791] bfa0:                                     00000000 00000000 00000000 00000000
[   71.698791] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.698822] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.698822] 
[   71.805267] Allocated by task 313:
[   71.808685]  kasan_save_track+0x30/0x5c
[   71.812561]  __kasan_kmalloc+0x8c/0x94
[   71.816345]  kasan_bitops_generic+0xd4/0x1d70
[   71.820739]  kunit_try_run_case+0x22c/0x5a8
[   71.824951]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.830474]  kthread+0x464/0x810
[   71.833740]  ret_from_fork+0x14/0x20
[   71.837341] 
[   71.838836] The buggy address belongs to the object at cc90ae80
[   71.838836]  which belongs to the cache kmalloc-64 of size 64
[   71.850585] The buggy address is located 4 bytes inside of
[   71.850585]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.861511] 
[   71.863006] The buggy address belongs to the physical page:
[   71.868621] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.875885] flags: 0x0(zone=0)
[   71.878967] page_type: f5(slab)
[   71.882141] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.890289] raw: 00000000
[   71.892913] page dumped because: kasan: bad access detected
[   71.898529] 
[   71.900024] Memory state around the buggy address:
[   71.904846]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.911437]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.917999] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.924560]            ^
[   71.927124]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.933685]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.940277] ==================================================================
[   69.698913] ==================================================================
[   69.706176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b10/0x1d70
[   69.713623] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.720275] 
[   69.721801] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.721832] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.721832] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.721832] Call trace: 
[   69.721862]  unwind_backtrace from show_stack+0x18/0x1c
[   69.721862]  show_stack from dump_stack_lvl+0x70/0x90
[   69.721893]  dump_stack_lvl from print_report+0x158/0x528
[   69.721923]  print_report from kasan_report+0xdc/0x118
[   69.721954]  kasan_report from kasan_bitops_generic+0x1b10/0x1d70
[   69.721984]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.721984]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.722015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.722045]  kthread from ret_from_fork+0x14/0x20
[   69.722076] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.722076] bfa0:                                     00000000 00000000 00000000 00000000
[   69.722106] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.722106] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.722137] 
[   69.828582] Allocated by task 313:
[   69.832000]  kasan_save_track+0x30/0x5c
[   69.835876]  __kasan_kmalloc+0x8c/0x94
[   69.839630]  kasan_bitops_generic+0xd4/0x1d70
[   69.844024]  kunit_try_run_case+0x22c/0x5a8
[   69.848266]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.853790]  kthread+0x464/0x810
[   69.857055]  ret_from_fork+0x14/0x20
[   69.860656] 
[   69.862152] The buggy address belongs to the object at cc90ae80
[   69.862152]  which belongs to the cache kmalloc-64 of size 64
[   69.873870] The buggy address is located 4 bytes inside of
[   69.873870]  allocated 5-byte region [cc90ae80, cc90ae85)
[   69.884826] 
[   69.886322] The buggy address belongs to the physical page:
[   69.891906] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   69.899200] flags: 0x0(zone=0)
[   69.902282] page_type: f5(slab)
[   69.905456] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   69.913574] raw: 00000000
[   69.916229] page dumped because: kasan: bad access detected
[   69.921844] 
[   69.923339] Memory state around the buggy address:
[   69.928161]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.934722]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.941314] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.947875]            ^
[   69.950408]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.957000]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.963562] ==================================================================
[   71.947570] ==================================================================
[   71.954864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1b34/0x1d70
[   71.962310] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.968963] 
[   71.970458] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.970489] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.970520] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.970520] Call trace: 
[   71.970520]  unwind_backtrace from show_stack+0x18/0x1c
[   71.970550]  show_stack from dump_stack_lvl+0x70/0x90
[   71.970581]  dump_stack_lvl from print_report+0x158/0x528
[   71.970611]  print_report from kasan_report+0xdc/0x118
[   71.970611]  kasan_report from kasan_bitops_generic+0x1b34/0x1d70
[   71.970642]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.970672]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.970703]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.970733]  kthread from ret_from_fork+0x14/0x20
[   71.970764] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.970764] bfa0:                                     00000000 00000000 00000000 00000000
[   71.970794] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.970794] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.970825] 
[   72.077239] Allocated by task 313:
[   72.080688]  kasan_save_track+0x30/0x5c
[   72.084533]  __kasan_kmalloc+0x8c/0x94
[   72.088317]  kasan_bitops_generic+0xd4/0x1d70
[   72.092712]  kunit_try_run_case+0x22c/0x5a8
[   72.096954]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.102478]  kthread+0x464/0x810
[   72.105712]  ret_from_fork+0x14/0x20
[   72.109313] 
[   72.110839] The buggy address belongs to the object at cc90ae80
[   72.110839]  which belongs to the cache kmalloc-64 of size 64
[   72.122558] The buggy address is located 4 bytes inside of
[   72.122558]  allocated 5-byte region [cc90ae80, cc90ae85)
[   72.133483] 
[   72.135009] The buggy address belongs to the physical page:
[   72.140594] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   72.147888] flags: 0x0(zone=0)
[   72.150970] page_type: f5(slab)
[   72.154113] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   72.162261] raw: 00000000
[   72.164916] page dumped because: kasan: bad access detected
[   72.170501] 
[   72.172027] Memory state around the buggy address:
[   72.176849]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.183410]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.190002] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.196563]            ^
[   72.199127]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.205688]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.212249] ==================================================================
[   71.097808] ==================================================================
[   71.105072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1bac/0x1d70
[   71.112518] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   71.119201] 
[   71.120697] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   71.120727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   71.120727] Hardware name: Generic DRA74X (Flattened Device Tree)
[   71.120758] Call trace: 
[   71.120758]  unwind_backtrace from show_stack+0x18/0x1c
[   71.120788]  show_stack from dump_stack_lvl+0x70/0x90
[   71.120788]  dump_stack_lvl from print_report+0x158/0x528
[   71.120819]  print_report from kasan_report+0xdc/0x118
[   71.120849]  kasan_report from kasan_bitops_generic+0x1bac/0x1d70
[   71.120880]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   71.120910]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.120941]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   71.120971]  kthread from ret_from_fork+0x14/0x20
[   71.120971] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   71.121002] bfa0:                                     00000000 00000000 00000000 00000000
[   71.121002] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   71.121032] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   71.121032] 
[   71.227478] Allocated by task 313:
[   71.230895]  kasan_save_track+0x30/0x5c
[   71.234771]  __kasan_kmalloc+0x8c/0x94
[   71.238555]  kasan_bitops_generic+0xd4/0x1d70
[   71.242950]  kunit_try_run_case+0x22c/0x5a8
[   71.247161]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   71.252685]  kthread+0x464/0x810
[   71.255950]  ret_from_fork+0x14/0x20
[   71.259552] 
[   71.261047] The buggy address belongs to the object at cc90ae80
[   71.261047]  which belongs to the cache kmalloc-64 of size 64
[   71.272766] The buggy address is located 4 bytes inside of
[   71.272766]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.283721] 
[   71.285217] The buggy address belongs to the physical page:
[   71.290832] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.298095] flags: 0x0(zone=0)
[   71.301177] page_type: f5(slab)
[   71.304351] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.312499] raw: 00000000
[   71.315124] page dumped because: kasan: bad access detected
[   71.320739] 
[   71.322235] Memory state around the buggy address:
[   71.327056]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.333648]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.340209] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.346771]            ^
[   71.349334]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.355895]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.362457] ==================================================================
[   70.819763] ==================================================================
[   70.827026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x874/0x1d70
[   70.834411] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   70.841156] 
[   70.842651] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   70.842681] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   70.842712] Hardware name: Generic DRA74X (Flattened Device Tree)
[   70.842712] Call trace: 
[   70.842712]  unwind_backtrace from show_stack+0x18/0x1c
[   70.842742]  show_stack from dump_stack_lvl+0x70/0x90
[   70.842773]  dump_stack_lvl from print_report+0x158/0x528
[   70.842803]  print_report from kasan_report+0xdc/0x118
[   70.842803]  kasan_report from kasan_check_range+0x14c/0x198
[   70.842834]  kasan_check_range from kasan_bitops_generic+0x874/0x1d70
[   70.842864]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   70.842895]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.842926]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   70.842956]  kthread from ret_from_fork+0x14/0x20
[   70.842956] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   70.842987] bfa0:                                     00000000 00000000 00000000 00000000
[   70.842987] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   70.843017] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   70.843017] 
[   70.955505] Allocated by task 313:
[   70.958923]  kasan_save_track+0x30/0x5c
[   70.962799]  __kasan_kmalloc+0x8c/0x94
[   70.966552]  kasan_bitops_generic+0xd4/0x1d70
[   70.970947]  kunit_try_run_case+0x22c/0x5a8
[   70.975189]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.980712]  kthread+0x464/0x810
[   70.983978]  ret_from_fork+0x14/0x20
[   70.987579] 
[   70.989074] The buggy address belongs to the object at cc90ae80
[   70.989074]  which belongs to the cache kmalloc-64 of size 64
[   71.000793] The buggy address is located 4 bytes inside of
[   71.000793]  allocated 5-byte region [cc90ae80, cc90ae85)
[   71.011749] 
[   71.013244] The buggy address belongs to the physical page:
[   71.018859] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   71.026123] flags: 0x0(zone=0)
[   71.029205] page_type: f5(slab)
[   71.032379] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   71.040496] raw: 00000000
[   71.043151] page dumped because: kasan: bad access detected
[   71.048767] 
[   71.050262] Memory state around the buggy address:
[   71.055084]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.061645]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.068237] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.074798]            ^
[   71.077362]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.083923]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.090484] ==================================================================
[   68.566680] ==================================================================
[   68.589691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a50/0x1d70
[   68.597137] Read of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   68.603790] 
[   68.605285] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   68.605316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.605346] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.605346] Call trace: 
[   68.605346]  unwind_backtrace from show_stack+0x18/0x1c
[   68.605377]  show_stack from dump_stack_lvl+0x70/0x90
[   68.605407]  dump_stack_lvl from print_report+0x158/0x528
[   68.605438]  print_report from kasan_report+0xdc/0x118
[   68.605438]  kasan_report from kasan_bitops_generic+0x1a50/0x1d70
[   68.605468]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   68.605499]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.605529]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.605560]  kthread from ret_from_fork+0x14/0x20
[   68.605590] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   68.605590] bfa0:                                     00000000 00000000 00000000 00000000
[   68.605621] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.605621] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.605651] 
[   68.712066] Allocated by task 313:
[   68.715515]  kasan_save_track+0x30/0x5c
[   68.719360]  __kasan_kmalloc+0x8c/0x94
[   68.723144]  kasan_bitops_generic+0xd4/0x1d70
[   68.727539]  kunit_try_run_case+0x22c/0x5a8
[   68.731750]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.737304]  kthread+0x464/0x810
[   68.740539]  ret_from_fork+0x14/0x20
[   68.744140] 
[   68.745666] The buggy address belongs to the object at cc90ae80
[   68.745666]  which belongs to the cache kmalloc-64 of size 64
[   68.757385] The buggy address is located 4 bytes inside of
[   68.757385]  allocated 5-byte region [cc90ae80, cc90ae85)
[   68.768310] 
[   68.769836] The buggy address belongs to the physical page:
[   68.775451] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   68.782714] flags: 0x0(zone=0)
[   68.785797] page_type: f5(slab)
[   68.788970] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   68.797088] raw: 00000000
[   68.799743] page dumped because: kasan: bad access detected
[   68.805358] 
[   68.806854] Memory state around the buggy address:
[   68.811676]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.818237]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.824798] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.831390]            ^
[   68.833923]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.840515]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.847076] ==================================================================
[   69.970886] ==================================================================
[   69.978149] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19f8/0x1d70
[   69.985595] Write of size 4 at addr cc90ae84 by task kunit_try_catch/313
[   69.992340] 
[   69.993865] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   69.993896] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   69.993896] Hardware name: Generic DRA74X (Flattened Device Tree)
[   69.993896] Call trace: 
[   69.993927]  unwind_backtrace from show_stack+0x18/0x1c
[   69.993927]  show_stack from dump_stack_lvl+0x70/0x90
[   69.993957]  dump_stack_lvl from print_report+0x158/0x528
[   69.993988]  print_report from kasan_report+0xdc/0x118
[   69.994018]  kasan_report from kasan_bitops_generic+0x19f8/0x1d70
[   69.994049]  kasan_bitops_generic from kunit_try_run_case+0x22c/0x5a8
[   69.994049]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   69.994079]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   69.994110]  kthread from ret_from_fork+0x14/0x20
[   69.994140] Exception stack(0xf24cbfb0 to 0xf24cbff8)
[   69.994140] bfa0:                                     00000000 00000000 00000000 00000000
[   69.994171] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   69.994171] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   69.994201] 
[   70.100646] Allocated by task 313:
[   70.104064]  kasan_save_track+0x30/0x5c
[   70.107940]  __kasan_kmalloc+0x8c/0x94
[   70.111694]  kasan_bitops_generic+0xd4/0x1d70
[   70.116088]  kunit_try_run_case+0x22c/0x5a8
[   70.120330]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   70.125854]  kthread+0x464/0x810
[   70.129119]  ret_from_fork+0x14/0x20
[   70.132720] 
[   70.134216] The buggy address belongs to the object at cc90ae80
[   70.134216]  which belongs to the cache kmalloc-64 of size 64
[   70.145935] The buggy address is located 4 bytes inside of
[   70.145935]  allocated 5-byte region [cc90ae80, cc90ae85)
[   70.156890] 
[   70.158386] The buggy address belongs to the physical page:
[   70.163970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   70.171264] flags: 0x0(zone=0)
[   70.174346] page_type: f5(slab)
[   70.177490] raw: 00000000 c7001300 00000122 00000000 00000000 00200020 f5000000 00000000
[   70.185638] raw: 00000000
[   70.188293] page dumped because: kasan: bad access detected
[   70.193908] 
[   70.195404] Memory state around the buggy address:
[   70.200225]  cc90ad80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.206787]  cc90ae00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.213378] >cc90ae80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.219940]            ^
[   70.222473]  cc90af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.229064]  cc90af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.235626] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   68.248748] ==================================================================
[   68.256011] BUG: KASAN: slab-use-after-free in strnlen+0x94/0x9c
[   68.262054] Read of size 1 at addr cc90a410 by task kunit_try_catch/311
[   68.268737] 
[   68.270233] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   68.270263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   68.270263] Hardware name: Generic DRA74X (Flattened Device Tree)
[   68.270294] Call trace: 
[   68.270294]  unwind_backtrace from show_stack+0x18/0x1c
[   68.270324]  show_stack from dump_stack_lvl+0x70/0x90
[   68.270355]  dump_stack_lvl from print_report+0x158/0x528
[   68.270355]  print_report from kasan_report+0xdc/0x118
[   68.270385]  kasan_report from strnlen+0x94/0x9c
[   68.270416]  strnlen from kasan_strings+0x670/0xf00
[   68.270446]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   68.270477]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.270507]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   68.270507]  kthread from ret_from_fork+0x14/0x20
[   68.270538] Exception stack(0xf24c3fb0 to 0xf24c3ff8)
[   68.270568] 3fa0:                                     00000000 00000000 00000000 00000000
[   68.270568] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   68.270599] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   68.270599] 
[   68.379852] Allocated by task 311:
[   68.383270]  kasan_save_track+0x30/0x5c
[   68.387145]  __kasan_kmalloc+0x8c/0x94
[   68.390899]  kasan_strings+0xe8/0xf00
[   68.394622]  kunit_try_run_case+0x22c/0x5a8
[   68.398834]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.404357]  kthread+0x464/0x810
[   68.407623]  ret_from_fork+0x14/0x20
[   68.411224] 
[   68.412719] Freed by task 311:
[   68.415802]  kasan_save_track+0x30/0x5c
[   68.419677]  kasan_save_free_info+0x3c/0x48
[   68.423889]  __kasan_slab_free+0x40/0x50
[   68.427825]  kfree+0xe8/0x384
[   68.430847]  kasan_strings+0x310/0xf00
[   68.434600]  kunit_try_run_case+0x22c/0x5a8
[   68.438842]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.444366]  kthread+0x464/0x810
[   68.447631]  ret_from_fork+0x14/0x20
[   68.451232] 
[   68.452728] The buggy address belongs to the object at cc90a400
[   68.452728]  which belongs to the cache kmalloc-64 of size 64
[   68.464447] The buggy address is located 16 bytes inside of
[   68.464447]  freed 64-byte region [cc90a400, cc90a440)
[   68.475219] 
[   68.476715] The buggy address belongs to the physical page:
[   68.482330] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   68.489593] flags: 0x0(zone=0)
[   68.492675] page_type: f5(slab)
[   68.495849] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   68.503997] raw: 00000000
[   68.506622] page dumped because: kasan: bad access detected
[   68.512237] 
[   68.513732] Memory state around the buggy address:
[   68.518585]  cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.525146]  cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.531707] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.538299]                  ^
[   68.541351]  cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.547943]  cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.554504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   48.378814] ==================================================================
[   48.393951] BUG: KASAN: use-after-free in page_alloc_uaf+0x368/0x39c
[   48.400360] Read of size 1 at addr cc830000 by task kunit_try_catch/206
[   48.407012] 
[   48.408508] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   48.408538] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.408569] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.408569] Call trace: 
[   48.408569]  unwind_backtrace from show_stack+0x18/0x1c
[   48.408599]  show_stack from dump_stack_lvl+0x70/0x90
[   48.408630]  dump_stack_lvl from print_report+0x158/0x528
[   48.408660]  print_report from kasan_report+0xdc/0x118
[   48.408660]  kasan_report from page_alloc_uaf+0x368/0x39c
[   48.408691]  page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   48.408721]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.408752]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.408782]  kthread from ret_from_fork+0x14/0x20
[   48.408782] Exception stack(0xf220bfb0 to 0xf220bff8)
[   48.408813] bfa0:                                     00000000 00000000 00000000 00000000
[   48.408813] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.408843] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.408843] 
[   48.514068] The buggy address belongs to the physical page:
[   48.519683] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c830
[   48.526947] flags: 0x0(zone=0)
[   48.530029] page_type: f0(buddy)
[   48.533294] raw: 00000000 c69c5750 c69c5750 00000000 00000000 00000004 f0000000 00000000
[   48.541412] raw: 00000000
[   48.544067] page dumped because: kasan: bad access detected
[   48.549652] 
[   48.551177] Memory state around the buggy address:
[   48.555999]  cc82ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.562561]  cc82ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.569122] >cc830000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.575714]            ^
[   48.578247]  cc830080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.584838]  cc830100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.591400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   67.935913] ==================================================================
[   67.943176] BUG: KASAN: slab-use-after-free in strlen+0xb0/0xb4
[   67.949157] Read of size 1 at addr cc90a410 by task kunit_try_catch/311
[   67.955810] 
[   67.957305] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   67.957336] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.957366] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.957366] Call trace: 
[   67.957366]  unwind_backtrace from show_stack+0x18/0x1c
[   67.957397]  show_stack from dump_stack_lvl+0x70/0x90
[   67.957427]  dump_stack_lvl from print_report+0x158/0x528
[   67.957458]  print_report from kasan_report+0xdc/0x118
[   67.957458]  kasan_report from strlen+0xb0/0xb4
[   67.957489]  strlen from kasan_strings+0x5dc/0xf00
[   67.957519]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   67.957550]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.957580]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.957611]  kthread from ret_from_fork+0x14/0x20
[   67.957611] Exception stack(0xf24c3fb0 to 0xf24c3ff8)
[   67.957641] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.957641] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.957672] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.957672] 
[   68.066741] Allocated by task 311:
[   68.070159]  kasan_save_track+0x30/0x5c
[   68.074035]  __kasan_kmalloc+0x8c/0x94
[   68.077819]  kasan_strings+0xe8/0xf00
[   68.081512]  kunit_try_run_case+0x22c/0x5a8
[   68.085723]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.091278]  kthread+0x464/0x810
[   68.094512]  ret_from_fork+0x14/0x20
[   68.098114] 
[   68.099639] Freed by task 311:
[   68.102691]  kasan_save_track+0x30/0x5c
[   68.106567]  kasan_save_free_info+0x3c/0x48
[   68.110778]  __kasan_slab_free+0x40/0x50
[   68.114746]  kfree+0xe8/0x384
[   68.117736]  kasan_strings+0x310/0xf00
[   68.121520]  kunit_try_run_case+0x22c/0x5a8
[   68.125732]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   68.131286]  kthread+0x464/0x810
[   68.134521]  ret_from_fork+0x14/0x20
[   68.138122] 
[   68.139648] The buggy address belongs to the object at cc90a400
[   68.139648]  which belongs to the cache kmalloc-64 of size 64
[   68.151367] The buggy address is located 16 bytes inside of
[   68.151367]  freed 64-byte region [cc90a400, cc90a440)
[   68.162139] 
[   68.163635] The buggy address belongs to the physical page:
[   68.169219] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   68.176513] flags: 0x0(zone=0)
[   68.179595] page_type: f5(slab)
[   68.182769] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   68.190887] raw: 00000000
[   68.193542] page dumped because: kasan: bad access detected
[   68.199157] 
[   68.200653] Memory state around the buggy address:
[   68.205474]  cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.212036]  cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.218627] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.225189]                  ^
[   68.228271]  cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.234832]  cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.241394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   67.626342] ==================================================================
[   67.633605] BUG: KASAN: slab-use-after-free in kasan_strings+0xd0c/0xf00
[   67.640380] Read of size 1 at addr cc90a410 by task kunit_try_catch/311
[   67.647033] 
[   67.648529] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   67.648559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.648590] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.648590] Call trace: 
[   67.648590]  unwind_backtrace from show_stack+0x18/0x1c
[   67.648620]  show_stack from dump_stack_lvl+0x70/0x90
[   67.648651]  dump_stack_lvl from print_report+0x158/0x528
[   67.648681]  print_report from kasan_report+0xdc/0x118
[   67.648681]  kasan_report from kasan_strings+0xd0c/0xf00
[   67.648712]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   67.648742]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.648773]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.648803]  kthread from ret_from_fork+0x14/0x20
[   67.648834] Exception stack(0xf24c3fb0 to 0xf24c3ff8)
[   67.648834] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.648864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.648864] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.648895] 
[   67.753936] Allocated by task 311:
[   67.757354]  kasan_save_track+0x30/0x5c
[   67.761230]  __kasan_kmalloc+0x8c/0x94
[   67.764984]  kasan_strings+0xe8/0xf00
[   67.768707]  kunit_try_run_case+0x22c/0x5a8
[   67.772918]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.778442]  kthread+0x464/0x810
[   67.781707]  ret_from_fork+0x14/0x20
[   67.785308] 
[   67.786804] Freed by task 311:
[   67.789886]  kasan_save_track+0x30/0x5c
[   67.793762]  kasan_save_free_info+0x3c/0x48
[   67.797973]  __kasan_slab_free+0x40/0x50
[   67.801910]  kfree+0xe8/0x384
[   67.804931]  kasan_strings+0x310/0xf00
[   67.808685]  kunit_try_run_case+0x22c/0x5a8
[   67.812927]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.818450]  kthread+0x464/0x810
[   67.821716]  ret_from_fork+0x14/0x20
[   67.825317] 
[   67.826812] The buggy address belongs to the object at cc90a400
[   67.826812]  which belongs to the cache kmalloc-64 of size 64
[   67.838531] The buggy address is located 16 bytes inside of
[   67.838531]  freed 64-byte region [cc90a400, cc90a440)
[   67.849304] 
[   67.850799] The buggy address belongs to the physical page:
[   67.856414] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   67.863677] flags: 0x0(zone=0)
[   67.866760] page_type: f5(slab)
[   67.869934] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   67.878082] raw: 00000000
[   67.880706] page dumped because: kasan: bad access detected
[   67.886322] 
[   67.887817] Memory state around the buggy address:
[   67.892639]  cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.899230]  cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.905792] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.912353]                  ^
[   67.915435]  cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.921997]  cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.928588] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   67.296722] ==================================================================
[   67.320770] BUG: KASAN: slab-use-after-free in strcmp+0xcc/0xd4
[   67.326721] Read of size 1 at addr cc90a410 by task kunit_try_catch/311
[   67.333404] 
[   67.334899] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   67.334930] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.334930] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.334960] Call trace: 
[   67.334960]  unwind_backtrace from show_stack+0x18/0x1c
[   67.334991]  show_stack from dump_stack_lvl+0x70/0x90
[   67.335021]  dump_stack_lvl from print_report+0x158/0x528
[   67.335052]  print_report from kasan_report+0xdc/0x118
[   67.335052]  kasan_report from strcmp+0xcc/0xd4
[   67.335083]  strcmp from kasan_strings+0x490/0xf00
[   67.335113]  kasan_strings from kunit_try_run_case+0x22c/0x5a8
[   67.335144]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.335174]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.335205]  kthread from ret_from_fork+0x14/0x20
[   67.335205] Exception stack(0xf24c3fb0 to 0xf24c3ff8)
[   67.335235] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.335235] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.335266] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.335266] 
[   67.444335] Allocated by task 311:
[   67.447753]  kasan_save_track+0x30/0x5c
[   67.451629]  __kasan_kmalloc+0x8c/0x94
[   67.455413]  kasan_strings+0xe8/0xf00
[   67.459106]  kunit_try_run_case+0x22c/0x5a8
[   67.463317]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.468872]  kthread+0x464/0x810
[   67.472106]  ret_from_fork+0x14/0x20
[   67.475708] 
[   67.477233] Freed by task 311:
[   67.480285]  kasan_save_track+0x30/0x5c
[   67.484161]  kasan_save_free_info+0x3c/0x48
[   67.488372]  __kasan_slab_free+0x40/0x50
[   67.492340]  kfree+0xe8/0x384
[   67.495330]  kasan_strings+0x310/0xf00
[   67.499114]  kunit_try_run_case+0x22c/0x5a8
[   67.503326]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.508880]  kthread+0x464/0x810
[   67.512115]  ret_from_fork+0x14/0x20
[   67.515716] 
[   67.517242] The buggy address belongs to the object at cc90a400
[   67.517242]  which belongs to the cache kmalloc-64 of size 64
[   67.528961] The buggy address is located 16 bytes inside of
[   67.528961]  freed 64-byte region [cc90a400, cc90a440)
[   67.539733] 
[   67.541229] The buggy address belongs to the physical page:
[   67.546844] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   67.554107] flags: 0x0(zone=0)
[   67.557189] page_type: f5(slab)
[   67.560363] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   67.568511] raw: 00000000
[   67.571136] page dumped because: kasan: bad access detected
[   67.576751] 
[   67.578247] Memory state around the buggy address:
[   67.583068]  cc90a300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.589630]  cc90a380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.596221] >cc90a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.602783]                  ^
[   67.605865]  cc90a480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.612426]  cc90a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.619018] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   66.977935] ==================================================================
[   66.988983] BUG: KASAN: slab-out-of-bounds in memcmp+0x19c/0x1b0
[   66.995056] Read of size 1 at addr cc90a298 by task kunit_try_catch/309
[   67.001708] 
[   67.003204] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   67.003234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.003234] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.003265] Call trace: 
[   67.003265]  unwind_backtrace from show_stack+0x18/0x1c
[   67.003295]  show_stack from dump_stack_lvl+0x70/0x90
[   67.003326]  dump_stack_lvl from print_report+0x158/0x528
[   67.003356]  print_report from kasan_report+0xdc/0x118
[   67.003356]  kasan_report from memcmp+0x19c/0x1b0
[   67.003387]  memcmp from kasan_memcmp+0x1d0/0x388
[   67.003417]  kasan_memcmp from kunit_try_run_case+0x22c/0x5a8
[   67.003448]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.003479]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.003509]  kthread from ret_from_fork+0x14/0x20
[   67.003509] Exception stack(0xf24b3fb0 to 0xf24b3ff8)
[   67.003540] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.003540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.003570] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.003570] 
[   67.112640] Allocated by task 309:
[   67.116058]  kasan_save_track+0x30/0x5c
[   67.119934]  __kasan_kmalloc+0x8c/0x94
[   67.123718]  kasan_memcmp+0xe0/0x388
[   67.127319]  kunit_try_run_case+0x22c/0x5a8
[   67.131561]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.137084]  kthread+0x464/0x810
[   67.140319]  ret_from_fork+0x14/0x20
[   67.143951] 
[   67.145446] The buggy address belongs to the object at cc90a280
[   67.145446]  which belongs to the cache kmalloc-64 of size 64
[   67.157165] The buggy address is located 0 bytes to the right of
[   67.157165]  allocated 24-byte region [cc90a280, cc90a298)
[   67.168731] 
[   67.170227] The buggy address belongs to the physical page:
[   67.175842] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90a
[   67.183105] flags: 0x0(zone=0)
[   67.186187] page_type: f5(slab)
[   67.189361] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   67.197479] raw: 00000000
[   67.200134] page dumped because: kasan: bad access detected
[   67.205749] 
[   67.207244] Memory state around the buggy address:
[   67.212066]  cc90a180: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.218627]  cc90a200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.225219] >cc90a280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.231781]                     ^
[   67.235107]  cc90a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.241699]  cc90a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.248260] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   66.469665] ==================================================================
[   66.480621] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c
[   66.488159] Read of size 1 at addr f2483c7f by task kunit_try_catch/303
[   66.494812] 
[   66.496307] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   66.496337] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.496368] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.496368] Call trace: 
[   66.496368]  unwind_backtrace from show_stack+0x18/0x1c
[   66.496398]  show_stack from dump_stack_lvl+0x70/0x90
[   66.496429]  dump_stack_lvl from print_report+0x158/0x528
[   66.496459]  print_report from kasan_report+0xdc/0x118
[   66.496459]  kasan_report from kasan_alloca_oob_left+0x304/0x33c
[   66.496490]  kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8
[   66.496520]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.496551]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.496582]  kthread from ret_from_fork+0x14/0x20
[   66.496582] Exception stack(0xf2483fb0 to 0xf2483ff8)
[   66.496612] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.496643] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.496643] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.496643] 
[   66.603088] The buggy address belongs to stack of task kunit_try_catch/303
[   66.610015] 
[   66.611541] The buggy address belongs to the virtual mapping at
[   66.611541]  [f2480000, f2485000) created by:
[   66.611541]  kernel_clone+0x174/0x794
[   66.625518] 
[   66.627014] The buggy address belongs to the physical page:
[   66.632629] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb081b
[   66.639923] flags: 0x80000000(zone=2)
[   66.643615] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.651763] raw: 00000000
[   66.654388] page dumped because: kasan: bad access detected
[   66.660003] 
[   66.661499] Memory state around the buggy address:
[   66.666320]  f2483b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.672882]  f2483b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.679473] >f2483c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   66.686035]                                                         ^
[   66.692535]  f2483c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   66.699096]  f2483d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   66.705657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   66.195953] ==================================================================
[   66.211090] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2a8/0x2dc
[   66.218017] Read of size 1 at addr f2473d6a by task kunit_try_catch/301
[   66.224670] 
[   66.226196] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   66.226226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.226226] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.226226] Call trace: 
[   66.226257]  unwind_backtrace from show_stack+0x18/0x1c
[   66.226257]  show_stack from dump_stack_lvl+0x70/0x90
[   66.226287]  dump_stack_lvl from print_report+0x158/0x528
[   66.226318]  print_report from kasan_report+0xdc/0x118
[   66.226348]  kasan_report from kasan_stack_oob+0x2a8/0x2dc
[   66.226379]  kasan_stack_oob from kunit_try_run_case+0x22c/0x5a8
[   66.226379]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.226409]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.226440]  kthread from ret_from_fork+0x14/0x20
[   66.226470] Exception stack(0xf2473fb0 to 0xf2473ff8)
[   66.226470] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.226501] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.226501] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.226531] 
[   66.331939] The buggy address belongs to stack of task kunit_try_catch/301
[   66.338836]  and is located at offset 106 in frame:
[   66.343749]  kasan_stack_oob+0x0/0x2dc
[   66.347534] 
[   66.349029] This frame has 4 objects:
[   66.352722]  [32, 33) '__assertion'
[   66.352752]  [48, 52) 'array'
[   66.356262]  [64, 72) '__assertion'
[   66.359252]  [96, 106) 'stack_array'
[   66.362762] 
[   66.367858] The buggy address belongs to the virtual mapping at
[   66.367858]  [f2470000, f2475000) created by:
[   66.367858]  kernel_clone+0x174/0x794
[   66.381866] 
[   66.383361] The buggy address belongs to the physical page:
[   66.388977] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb081f
[   66.396240] flags: 0x80000000(zone=2)
[   66.399932] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.408081] raw: 00000000
[   66.410736] page dumped because: kasan: bad access detected
[   66.416320] 
[   66.417846] Memory state around the buggy address:
[   66.422668]  f2473c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.429229]  f2473c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.435791] >f2473d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 02 f3 f3
[   66.442382]                                                   ^
[   66.448333]  f2473d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.454895]  f2473e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[   66.461486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   65.961669] ==================================================================
[   65.974273] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc
[   65.981903] Read of size 1 at addr c6a56c8d by task kunit_try_catch/297
[   65.988555] 
[   65.990081] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   65.990112] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.990112] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.990112] Call trace: 
[   65.990142]  unwind_backtrace from show_stack+0x18/0x1c
[   65.990142]  show_stack from dump_stack_lvl+0x70/0x90
[   65.990173]  dump_stack_lvl from print_report+0x158/0x528
[   65.990203]  print_report from kasan_report+0xdc/0x118
[   65.990234]  kasan_report from kasan_global_oob_right+0x284/0x2bc
[   65.990264]  kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8
[   65.990264]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.990295]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.990325]  kthread from ret_from_fork+0x14/0x20
[   65.990356] Exception stack(0xf245bfb0 to 0xf245bff8)
[   65.990356] bfa0:                                     00000000 00000000 00000000 00000000
[   65.990386] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.990417] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.990417] 
[   66.097045] The buggy address belongs to the variable:
[   66.102203]  global_array+0xd/0x40
[   66.105651] 
[   66.107147] The buggy address belongs to the physical page:
[   66.112762] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a56
[   66.120025] flags: 0x2000(reserved|zone=0)
[   66.124145] raw: 00002000 eeaee41c eeaee41c 00000000 00000000 00000000 ffffffff 00000001
[   66.132293] raw: 00000000
[   66.134948] page dumped because: kasan: bad access detected
[   66.140533] 
[   66.142059] Memory state around the buggy address:
[   66.146881]  c6a56b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.153442]  c6a56c00: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   66.160034] >c6a56c80: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.166595]               ^
[   66.169403]  c6a56d00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   66.175964]  c6a56d80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.182556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   65.686401] ==================================================================
[   65.698486] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.706573] Free of addr cc8fc001 by task kunit_try_catch/295
[   65.712341] 
[   65.713867] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   65.713867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.713897] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.713897] Call trace: 
[   65.713897]  unwind_backtrace from show_stack+0x18/0x1c
[   65.713928]  show_stack from dump_stack_lvl+0x70/0x90
[   65.713958]  dump_stack_lvl from print_report+0x158/0x528
[   65.713989]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.714019]  kasan_report_invalid_free from __kasan_mempool_poison_object+0xd0/0x128
[   65.714050]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   65.714050]  mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.714080]  mempool_kmalloc_invalid_free_helper from mempool_kmalloc_large_invalid_free+0xb8/0x104
[   65.714111]  mempool_kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   65.714141]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.714172]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.714202]  kthread from ret_from_fork+0x14/0x20
[   65.714233] Exception stack(0xf2453fb0 to 0xf2453ff8)
[   65.714233] 3fa0:                                     00000000 00000000 00000000 00000000
[   65.714263] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.714263] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.714294] 
[   65.847717] The buggy address belongs to the physical page:
[   65.853332] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc
[   65.860595] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.868316] flags: 0x40(head|zone=0)
[   65.871917] page_type: f8(unknown)
[   65.875335] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.883483] raw: 00000000
[   65.886138] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.894378] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff
[   65.902587] head: 00000000 00000004
[   65.906097] page dumped because: kasan: bad access detected
[   65.911712] 
[   65.913238] Memory state around the buggy address:
[   65.918060]  cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.924621]  cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.931182] >cc8fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.937774]            ^
[   65.940307]  cc8fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.946899]  cc8fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.953460] ==================================================================
[   65.365447] ==================================================================
[   65.377716] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.385772] Free of addr cc893b01 by task kunit_try_catch/293
[   65.391571] 
[   65.393066] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   65.393096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.393096] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.393127] Call trace: 
[   65.393127]  unwind_backtrace from show_stack+0x18/0x1c
[   65.393157]  show_stack from dump_stack_lvl+0x70/0x90
[   65.393188]  dump_stack_lvl from print_report+0x158/0x528
[   65.393188]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.393218]  kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8
[   65.393249]  check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128
[   65.393280]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   65.393280]  mempool_free from mempool_kmalloc_invalid_free_helper+0x15c/0x2f8
[   65.393310]  mempool_kmalloc_invalid_free_helper from mempool_kmalloc_invalid_free+0xb8/0x104
[   65.393341]  mempool_kmalloc_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   65.393371]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.393402]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.393432]  kthread from ret_from_fork+0x14/0x20
[   65.393463] Exception stack(0xf2423fb0 to 0xf2423ff8)
[   65.393463] 3fa0:                                     00000000 00000000 00000000 00000000
[   65.393493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.393493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.393493] 
[   65.532531] Allocated by task 293:
[   65.535949]  kasan_save_track+0x30/0x5c
[   65.539825]  remove_element+0x180/0x264
[   65.543701]  mempool_alloc_preallocated+0x60/0x9c
[   65.548431]  mempool_kmalloc_invalid_free_helper+0x90/0x2f8
[   65.554046]  mempool_kmalloc_invalid_free+0xb8/0x104
[   65.559051]  kunit_try_run_case+0x22c/0x5a8
[   65.563293]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.568817]  kthread+0x464/0x810
[   65.572082]  ret_from_fork+0x14/0x20
[   65.575683] 
[   65.577178] The buggy address belongs to the object at cc893b00
[   65.577178]  which belongs to the cache kmalloc-128 of size 128
[   65.589080] The buggy address is located 1 bytes inside of
[   65.589080]  128-byte region [cc893b00, cc893b80)
[   65.599334] 
[   65.600830] The buggy address belongs to the physical page:
[   65.606445] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893
[   65.613708] flags: 0x0(zone=0)
[   65.616790] page_type: f5(slab)
[   65.619964] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   65.628082] raw: 00000000
[   65.630737] page dumped because: kasan: bad access detected
[   65.636352] 
[   65.637847] Memory state around the buggy address:
[   65.642669]  cc893a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.649230]  cc893a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.655822] >cc893b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.662384]            ^
[   65.664947]  cc893b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.671508]  cc893c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.678070] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   64.487854] ==================================================================
[   64.499420] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   64.506591] Free of addr cc893700 by task kunit_try_catch/287
[   64.512390] 
[   64.513885] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   64.513916] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.513946] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.513946] Call trace: 
[   64.513946]  unwind_backtrace from show_stack+0x18/0x1c
[   64.513977]  show_stack from dump_stack_lvl+0x70/0x90
[   64.514007]  dump_stack_lvl from print_report+0x158/0x528
[   64.514038]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   64.514068]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   64.514068]  check_slab_allocation from __kasan_mempool_poison_object+0x54/0x128
[   64.514099]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   64.514129]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   64.514160]  mempool_double_free_helper from mempool_kmalloc_double_free+0xb8/0x104
[   64.514190]  mempool_kmalloc_double_free from kunit_try_run_case+0x22c/0x5a8
[   64.514221]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.514251]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.514251]  kthread from ret_from_fork+0x14/0x20
[   64.514282] Exception stack(0xf243bfb0 to 0xf243bff8)
[   64.514282] bfa0:                                     00000000 00000000 00000000 00000000
[   64.514312] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.514343] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.514343] 
[   64.651611] Allocated by task 287:
[   64.655059]  kasan_save_track+0x30/0x5c
[   64.658905]  remove_element+0x180/0x264
[   64.662780]  mempool_alloc_preallocated+0x60/0x9c
[   64.667510]  mempool_double_free_helper+0x8c/0x368
[   64.672363]  mempool_kmalloc_double_free+0xb8/0x104
[   64.677276]  kunit_try_run_case+0x22c/0x5a8
[   64.681488]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.687011]  kthread+0x464/0x810
[   64.690277]  ret_from_fork+0x14/0x20
[   64.693878] 
[   64.695373] Freed by task 287:
[   64.698455]  kasan_save_track+0x30/0x5c
[   64.702331]  kasan_save_free_info+0x3c/0x48
[   64.706542]  __kasan_mempool_poison_object+0x94/0x128
[   64.711639]  mempool_free+0x360/0x440
[   64.715332]  mempool_double_free_helper+0x13c/0x368
[   64.720245]  mempool_kmalloc_double_free+0xb8/0x104
[   64.725158]  kunit_try_run_case+0x22c/0x5a8
[   64.729370]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.734893]  kthread+0x464/0x810
[   64.738159]  ret_from_fork+0x14/0x20
[   64.741760] 
[   64.743255] The buggy address belongs to the object at cc893700
[   64.743255]  which belongs to the cache kmalloc-128 of size 128
[   64.755157] The buggy address is located 0 bytes inside of
[   64.755157]  128-byte region [cc893700, cc893780)
[   64.765411] 
[   64.766906] The buggy address belongs to the physical page:
[   64.772521] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c893
[   64.779785] flags: 0x0(zone=0)
[   64.782867] page_type: f5(slab)
[   64.786041] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   64.794189] raw: 00000000
[   64.796813] page dumped because: kasan: bad access detected
[   64.802429] 
[   64.803924] Memory state around the buggy address:
[   64.808746]  cc893600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.815307]  cc893680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.821899] >cc893700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.828460]            ^
[   64.831024]  cc893780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.837585]  cc893800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.844146] ==================================================================
[   64.852233] ==================================================================
[   64.864227] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   64.871398] Free of addr cc8fc000 by task kunit_try_catch/289
[   64.877197] 
[   64.878692] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   64.878723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.878753] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.878753] Call trace: 
[   64.878753]  unwind_backtrace from show_stack+0x18/0x1c
[   64.878784]  show_stack from dump_stack_lvl+0x70/0x90
[   64.878814]  dump_stack_lvl from print_report+0x158/0x528
[   64.878845]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   64.878875]  kasan_report_invalid_free from __kasan_mempool_poison_object+0x124/0x128
[   64.878875]  __kasan_mempool_poison_object from mempool_free+0x360/0x440
[   64.878906]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   64.878936]  mempool_double_free_helper from mempool_kmalloc_large_double_free+0xb8/0x104
[   64.878967]  mempool_kmalloc_large_double_free from kunit_try_run_case+0x22c/0x5a8
[   64.878997]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.879028]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.879058]  kthread from ret_from_fork+0x14/0x20
[   64.879058] Exception stack(0xf1833fb0 to 0xf1833ff8)
[   64.879089] 3fa0:                                     00000000 00000000 00000000 00000000
[   64.879089] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.879119] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.879119] 
[   65.010894] The buggy address belongs to the physical page:
[   65.016510] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc
[   65.023773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.031494] flags: 0x40(head|zone=0)
[   65.035095] page_type: f8(unknown)
[   65.038513] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.046661] raw: 00000000
[   65.049316] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   65.057556] head: 00000000 00000002 eebc3371 ffffffff 00000000 ffffffff 00000000 ffffffff
[   65.065795] head: 00000000 00000004
[   65.069305] page dumped because: kasan: bad access detected
[   65.074890] 
[   65.076416] Memory state around the buggy address:
[   65.081237]  cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.087799]  cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.094360] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.100952]            ^
[   65.103485]  cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.110076]  cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.116638] ==================================================================
[   65.124847] ==================================================================
[   65.137359] BUG: KASAN: double-free in mempool_double_free_helper+0x1c4/0x368
[   65.144561] Free of addr cc8fc000 by task kunit_try_catch/291
[   65.150329] 
[   65.151855] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   65.151885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   65.151885] Hardware name: Generic DRA74X (Flattened Device Tree)
[   65.151885] Call trace: 
[   65.151916]  unwind_backtrace from show_stack+0x18/0x1c
[   65.151916]  show_stack from dump_stack_lvl+0x70/0x90
[   65.151947]  dump_stack_lvl from print_report+0x158/0x528
[   65.151977]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   65.152008]  kasan_report_invalid_free from __kasan_mempool_poison_pages+0xdc/0xe0
[   65.152038]  __kasan_mempool_poison_pages from mempool_free+0x314/0x440
[   65.152038]  mempool_free from mempool_double_free_helper+0x1c4/0x368
[   65.152069]  mempool_double_free_helper from mempool_page_alloc_double_free+0xb4/0x100
[   65.152099]  mempool_page_alloc_double_free from kunit_try_run_case+0x22c/0x5a8
[   65.152130]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   65.152160]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   65.152191]  kthread from ret_from_fork+0x14/0x20
[   65.152221] Exception stack(0xf244bfb0 to 0xf244bff8)
[   65.152221] bfa0:                                     00000000 00000000 00000000 00000000
[   65.152252] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   65.152252] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   65.152252] 
[   65.283172] The buggy address belongs to the physical page:
[   65.288757] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8fc
[   65.296051] flags: 0x0(zone=0)
[   65.299133] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   65.307281] raw: 00000000
[   65.309906] page dumped because: kasan: bad access detected
[   65.315521] 
[   65.317016] Memory state around the buggy address:
[   65.321838]  cc8fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.328399]  cc8fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.334991] >cc8fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.341552]            ^
[   65.344085]  cc8fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.350677]  cc8fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   65.357238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   64.265655] ==================================================================
[   64.276702] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8
[   64.283477] Read of size 1 at addr cc8a4000 by task kunit_try_catch/285
[   64.290130] 
[   64.291656] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   64.291687] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   64.291687] Hardware name: Generic DRA74X (Flattened Device Tree)
[   64.291717] Call trace: 
[   64.291717]  unwind_backtrace from show_stack+0x18/0x1c
[   64.291748]  show_stack from dump_stack_lvl+0x70/0x90
[   64.291809]  dump_stack_lvl from print_report+0x158/0x528
[   64.291839]  print_report from kasan_report+0xdc/0x118
[   64.291870]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   64.291870]  mempool_uaf_helper from mempool_page_alloc_uaf+0xb8/0x104
[   64.291931]  mempool_page_alloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   64.291961]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.291992]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   64.292022]  kthread from ret_from_fork+0x14/0x20
[   64.292053] Exception stack(0xf242bfb0 to 0xf242bff8)
[   64.292083] bfa0:                                     00000000 00000000 00000000 00000000
[   64.292083] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   64.292114] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   64.292114] 
[   64.404998] The buggy address belongs to the physical page:
[   64.410614] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4
[   64.417877] flags: 0x0(zone=0)
[   64.420989] raw: 00000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   64.429138] raw: 00000000
[   64.431762] page dumped because: kasan: bad access detected
[   64.437377] 
[   64.438903] Memory state around the buggy address:
[   64.443725]  cc8a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.450286]  cc8a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.456878] >cc8a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.463439]            ^
[   64.466003]  cc8a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.472595]  cc8a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   64.479156] ==================================================================
[   63.659790] ==================================================================
[   63.671081] BUG: KASAN: use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.677825] Read of size 1 at addr cc8a4000 by task kunit_try_catch/281
[   63.684478] 
[   63.686004] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.686035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.686035] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.686035] Call trace: 
[   63.686065]  unwind_backtrace from show_stack+0x18/0x1c
[   63.686065]  show_stack from dump_stack_lvl+0x70/0x90
[   63.686096]  dump_stack_lvl from print_report+0x158/0x528
[   63.686126]  print_report from kasan_report+0xdc/0x118
[   63.686157]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.686187]  mempool_uaf_helper from mempool_kmalloc_large_uaf+0xbc/0x108
[   63.686187]  mempool_kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.686218]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.686248]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.686279]  kthread from ret_from_fork+0x14/0x20
[   63.686309] Exception stack(0xf241bfb0 to 0xf241bff8)
[   63.686309] bfa0:                                     00000000 00000000 00000000 00000000
[   63.686340] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.686340] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.686370] 
[   63.799713] The buggy address belongs to the physical page:
[   63.805328] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4
[   63.812591] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   63.820312] flags: 0x40(head|zone=0)
[   63.823913] page_type: f8(unknown)
[   63.827331] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.835479] raw: 00000000
[   63.838134] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   63.846343] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff
[   63.854583] head: 00000000 00000004
[   63.858093] page dumped because: kasan: bad access detected
[   63.863708] 
[   63.865203] Memory state around the buggy address:
[   63.870025]  cc8a3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.876617]  cc8a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.883178] >cc8a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.889739]            ^
[   63.892303]  cc8a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.898864]  cc8a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   63.905426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   63.914215] ==================================================================
[   63.926055] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.933258] Read of size 1 at addr cc8d2240 by task kunit_try_catch/283
[   63.939910] 
[   63.941436] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.941467] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.941467] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.941497] Call trace: 
[   63.941497]  unwind_backtrace from show_stack+0x18/0x1c
[   63.941528]  show_stack from dump_stack_lvl+0x70/0x90
[   63.941558]  dump_stack_lvl from print_report+0x158/0x528
[   63.941589]  print_report from kasan_report+0xdc/0x118
[   63.941619]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.941650]  mempool_uaf_helper from mempool_slab_uaf+0xb8/0x100
[   63.941680]  mempool_slab_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.941711]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.941772]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.941802]  kthread from ret_from_fork+0x14/0x20
[   63.941833] Exception stack(0xf2423fb0 to 0xf2423ff8)
[   63.941833] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.941864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.941894] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.941894] 
[   64.053710] Allocated by task 283:
[   64.057128]  kasan_save_track+0x30/0x5c
[   64.061004]  __kasan_mempool_unpoison_object+0xec/0x14c
[   64.066284]  remove_element+0x1d4/0x264
[   64.070159]  mempool_alloc_preallocated+0x60/0x9c
[   64.074920]  mempool_uaf_helper+0x90/0x3b8
[   64.079040]  mempool_slab_uaf+0xb8/0x100
[   64.083007]  kunit_try_run_case+0x22c/0x5a8
[   64.087249]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.092773]  kthread+0x464/0x810
[   64.096038]  ret_from_fork+0x14/0x20
[   64.099639] 
[   64.101165] Freed by task 283:
[   64.104248]  kasan_save_track+0x30/0x5c
[   64.108093]  kasan_save_free_info+0x3c/0x48
[   64.112335]  __kasan_mempool_poison_object+0x94/0x128
[   64.117431]  mempool_free+0x360/0x440
[   64.121124]  mempool_uaf_helper+0x13c/0x3b8
[   64.125335]  mempool_slab_uaf+0xb8/0x100
[   64.129302]  kunit_try_run_case+0x22c/0x5a8
[   64.133544]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   64.139068]  kthread+0x464/0x810
[   64.142333]  ret_from_fork+0x14/0x20
[   64.145935] 
[   64.147460] The buggy address belongs to the object at cc8d2240
[   64.147460]  which belongs to the cache test_cache of size 123
[   64.159271] The buggy address is located 0 bytes inside of
[   64.159271]  freed 123-byte region [cc8d2240, cc8d22bb)
[   64.170043] 
[   64.171539] The buggy address belongs to the physical page:
[   64.177154] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8d2
[   64.184448] flags: 0x0(zone=0)
[   64.187530] page_type: f5(slab)
[   64.190704] raw: 00000000 c8f6d600 00000122 00000000 00000000 80150015 f5000000 00000000
[   64.198852] raw: 00000000
[   64.201477] page dumped because: kasan: bad access detected
[   64.207092] 
[   64.208618] Memory state around the buggy address:
[   64.213439]  cc8d2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.220001]  cc8d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.226593] >cc8d2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   64.233154]                                    ^
[   64.237823]  cc8d2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.244384]  cc8d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.250976] ==================================================================
[   63.321411] ==================================================================
[   63.332977] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x388/0x3b8
[   63.340148] Read of size 1 at addr cc854900 by task kunit_try_catch/279
[   63.346832] 
[   63.348327] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.348358] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.348358] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.348388] Call trace: 
[   63.348388]  unwind_backtrace from show_stack+0x18/0x1c
[   63.348419]  show_stack from dump_stack_lvl+0x70/0x90
[   63.348449]  dump_stack_lvl from print_report+0x158/0x528
[   63.348480]  print_report from kasan_report+0xdc/0x118
[   63.348510]  kasan_report from mempool_uaf_helper+0x388/0x3b8
[   63.348510]  mempool_uaf_helper from mempool_kmalloc_uaf+0xbc/0x108
[   63.348541]  mempool_kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   63.348571]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.348602]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.348632]  kthread from ret_from_fork+0x14/0x20
[   63.348663] Exception stack(0xf2413fb0 to 0xf2413ff8)
[   63.348663] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.348693] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.348693] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.348724] 
[   63.461029] Allocated by task 279:
[   63.464447]  kasan_save_track+0x30/0x5c
[   63.468322]  remove_element+0x180/0x264
[   63.472167]  mempool_alloc_preallocated+0x60/0x9c
[   63.476928]  mempool_uaf_helper+0x90/0x3b8
[   63.481048]  mempool_kmalloc_uaf+0xbc/0x108
[   63.485260]  kunit_try_run_case+0x22c/0x5a8
[   63.489501]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.495025]  kthread+0x464/0x810
[   63.498260]  ret_from_fork+0x14/0x20
[   63.501892] 
[   63.503387] Freed by task 279:
[   63.506469]  kasan_save_track+0x30/0x5c
[   63.510314]  kasan_save_free_info+0x3c/0x48
[   63.514526]  __kasan_mempool_poison_object+0x94/0x128
[   63.519622]  mempool_free+0x360/0x440
[   63.523315]  mempool_uaf_helper+0x13c/0x3b8
[   63.527526]  mempool_kmalloc_uaf+0xbc/0x108
[   63.531768]  kunit_try_run_case+0x22c/0x5a8
[   63.535980]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.541503]  kthread+0x464/0x810
[   63.544769]  ret_from_fork+0x14/0x20
[   63.548370] 
[   63.549865] The buggy address belongs to the object at cc854900
[   63.549865]  which belongs to the cache kmalloc-128 of size 128
[   63.561767] The buggy address is located 0 bytes inside of
[   63.561767]  freed 128-byte region [cc854900, cc854980)
[   63.572540] 
[   63.574035] The buggy address belongs to the physical page:
[   63.579650] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854
[   63.586914] flags: 0x0(zone=0)
[   63.589996] page_type: f5(slab)
[   63.593170] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   63.601318] raw: 00000000
[   63.603942] page dumped because: kasan: bad access detected
[   63.609558] 
[   63.611053] Memory state around the buggy address:
[   63.615875]  cc854800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.622436]  cc854880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.629028] >cc854900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.635589]            ^
[   63.638153]  cc854980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.644714]  cc854a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.651275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   62.754791] ==================================================================
[   62.766632] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.774261] Read of size 1 at addr cc8a6001 by task kunit_try_catch/275
[   62.780914] 
[   62.782409] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   62.782440] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.782440] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.782470] Call trace: 
[   62.782470]  unwind_backtrace from show_stack+0x18/0x1c
[   62.782501]  show_stack from dump_stack_lvl+0x70/0x90
[   62.782531]  dump_stack_lvl from print_report+0x158/0x528
[   62.782562]  print_report from kasan_report+0xdc/0x118
[   62.782562]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.782592]  mempool_oob_right_helper from mempool_kmalloc_large_oob_right+0xbc/0x108
[   62.782623]  mempool_kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.782653]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.782684]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.782714]  kthread from ret_from_fork+0x14/0x20
[   62.782714] Exception stack(0xf23f3fb0 to 0xf23f3ff8)
[   62.782745] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.782745] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.782775] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.782775] 
[   62.898223] The buggy address belongs to the physical page:
[   62.903839] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8a4
[   62.911102] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   62.918823] flags: 0x40(head|zone=0)
[   62.922424] page_type: f8(unknown)
[   62.925842] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   62.933990] raw: 00000000
[   62.936645] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   62.944854] head: 00000000 00000002 eebc2711 ffffffff 00000000 ffffffff 00000000 ffffffff
[   62.953094] head: 00000000 00000004
[   62.956604] page dumped because: kasan: bad access detected
[   62.962219] 
[   62.963714] Memory state around the buggy address:
[   62.968536]  cc8a5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.975097]  cc8a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   62.981689] >cc8a6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   62.988250]            ^
[   62.990814]  cc8a6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   62.997375]  cc8a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   63.003936] ==================================================================
[   62.455444] ==================================================================
[   62.466430] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   62.474060] Read of size 1 at addr cc854573 by task kunit_try_catch/273
[   62.480743] 
[   62.482269] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   62.482299] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   62.482299] Hardware name: Generic DRA74X (Flattened Device Tree)
[   62.482330] Call trace: 
[   62.482330]  unwind_backtrace from show_stack+0x18/0x1c
[   62.482360]  show_stack from dump_stack_lvl+0x70/0x90
[   62.482391]  dump_stack_lvl from print_report+0x158/0x528
[   62.482421]  print_report from kasan_report+0xdc/0x118
[   62.482452]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   62.482482]  mempool_oob_right_helper from mempool_kmalloc_oob_right+0xbc/0x108
[   62.482543]  mempool_kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   62.482574]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.482604]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   62.482635]  kthread from ret_from_fork+0x14/0x20
[   62.482666] Exception stack(0xf23e3fb0 to 0xf23e3ff8)
[   62.482696] 3fa0:                                     00000000 00000000 00000000 00000000
[   62.482696] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   62.482727] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   62.482727] 
[   62.597167] Allocated by task 273:
[   62.600585]  kasan_save_track+0x30/0x5c
[   62.604461]  remove_element+0x180/0x264
[   62.608337]  mempool_alloc_preallocated+0x60/0x9c
[   62.613067]  mempool_oob_right_helper+0x94/0x334
[   62.617736]  mempool_kmalloc_oob_right+0xbc/0x108
[   62.622467]  kunit_try_run_case+0x22c/0x5a8
[   62.626678]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   62.632202]  kthread+0x464/0x810
[   62.635467]  ret_from_fork+0x14/0x20
[   62.639068] 
[   62.640563] The buggy address belongs to the object at cc854500
[   62.640563]  which belongs to the cache kmalloc-128 of size 128
[   62.652465] The buggy address is located 0 bytes to the right of
[   62.652465]  allocated 115-byte region [cc854500, cc854573)
[   62.664123] 
[   62.665618] The buggy address belongs to the physical page:
[   62.671234] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c854
[   62.678497] flags: 0x0(zone=0)
[   62.681579] page_type: f5(slab)
[   62.684753] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   62.692901] raw: 00000000
[   62.695526] page dumped because: kasan: bad access detected
[   62.701141] 
[   62.702636] Memory state around the buggy address:
[   62.707458]  cc854400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.714050]  cc854480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.720611] >cc854500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   62.727172]                                                      ^
[   62.733398]  cc854580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.739959]  cc854600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   62.746551] ==================================================================
[   63.013275] ==================================================================
[   63.025604] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2f8/0x334
[   63.033233] Read of size 1 at addr cc8b62bb by task kunit_try_catch/277
[   63.039886] 
[   63.041412] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   63.041442] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   63.041442] Hardware name: Generic DRA74X (Flattened Device Tree)
[   63.041442] Call trace: 
[   63.041473]  unwind_backtrace from show_stack+0x18/0x1c
[   63.041473]  show_stack from dump_stack_lvl+0x70/0x90
[   63.041503]  dump_stack_lvl from print_report+0x158/0x528
[   63.041534]  print_report from kasan_report+0xdc/0x118
[   63.041564]  kasan_report from mempool_oob_right_helper+0x2f8/0x334
[   63.041595]  mempool_oob_right_helper from mempool_slab_oob_right+0xb8/0x100
[   63.041625]  mempool_slab_oob_right from kunit_try_run_case+0x22c/0x5a8
[   63.041625]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.041656]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   63.041687]  kthread from ret_from_fork+0x14/0x20
[   63.041717] Exception stack(0xf2403fb0 to 0xf2403ff8)
[   63.041717] 3fa0:                                     00000000 00000000 00000000 00000000
[   63.041748] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   63.041748] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   63.041778] 
[   63.155639] Allocated by task 277:
[   63.159057]  kasan_save_track+0x30/0x5c
[   63.162933]  __kasan_mempool_unpoison_object+0xec/0x14c
[   63.168182]  remove_element+0x1d4/0x264
[   63.172058]  mempool_alloc_preallocated+0x60/0x9c
[   63.176788]  mempool_oob_right_helper+0x94/0x334
[   63.181457]  mempool_slab_oob_right+0xb8/0x100
[   63.185943]  kunit_try_run_case+0x22c/0x5a8
[   63.190155]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   63.195678]  kthread+0x464/0x810
[   63.198944]  ret_from_fork+0x14/0x20
[   63.202545] 
[   63.204040] The buggy address belongs to the object at cc8b6240
[   63.204040]  which belongs to the cache test_cache of size 123
[   63.215850] The buggy address is located 0 bytes to the right of
[   63.215850]  allocated 123-byte region [cc8b6240, cc8b62bb)
[   63.227508] 
[   63.229003] The buggy address belongs to the physical page:
[   63.234619] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c8b6
[   63.241882] flags: 0x0(zone=0)
[   63.244964] page_type: f5(slab)
[   63.248138] raw: 00000000 cc85a700 00000122 00000000 00000000 80150015 f5000000 00000000
[   63.256256] raw: 00000000
[   63.258911] page dumped because: kasan: bad access detected
[   63.264526] 
[   63.266021] Memory state around the buggy address:
[   63.270843]  cc8b6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.277404]  cc8b6200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   63.283996] >cc8b6280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   63.290557]                                 ^
[   63.294921]  cc8b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.301513]  cc8b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.308074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   61.545806] ==================================================================
[   61.557067] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1e8/0x398
[   61.564880] Read of size 1 at addr cc85a400 by task kunit_try_catch/267
[   61.571563] 
[   61.573059] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   61.573120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   61.573120] Hardware name: Generic DRA74X (Flattened Device Tree)
[   61.573150] Call trace: 
[   61.573150]  unwind_backtrace from show_stack+0x18/0x1c
[   61.573211]  show_stack from dump_stack_lvl+0x70/0x90
[   61.573242]  dump_stack_lvl from print_report+0x158/0x528
[   61.573272]  print_report from kasan_report+0xdc/0x118
[   61.573303]  kasan_report from __kasan_check_byte+0x34/0x3c
[   61.573333]  __kasan_check_byte from kmem_cache_destroy+0x24/0x1ec
[   61.573394]  kmem_cache_destroy from kmem_cache_double_destroy+0x1e8/0x398
[   61.573425]  kmem_cache_double_destroy from kunit_try_run_case+0x22c/0x5a8
[   61.573455]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.573516]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   61.573547]  kthread from ret_from_fork+0x14/0x20
[   61.573577] Exception stack(0xf23b3fb0 to 0xf23b3ff8)
[   61.573608] 3fa0:                                     00000000 00000000 00000000 00000000
[   61.573638] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   61.573638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   61.573669] 
[   61.693176] Allocated by task 267:
[   61.696624]  kasan_save_track+0x30/0x5c
[   61.700469]  __kasan_slab_alloc+0x60/0x68
[   61.704528]  kmem_cache_alloc_noprof+0x17c/0x36c
[   61.709167]  __kmem_cache_create_args+0x1c0/0x2c0
[   61.713928]  kmem_cache_double_destroy+0xc0/0x398
[   61.718658]  kunit_try_run_case+0x22c/0x5a8
[   61.722869]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.728393]  kthread+0x464/0x810
[   61.731658]  ret_from_fork+0x14/0x20
[   61.735260] 
[   61.736755] Freed by task 267:
[   61.739837]  kasan_save_track+0x30/0x5c
[   61.743713]  kasan_save_free_info+0x3c/0x48
[   61.747924]  __kasan_slab_free+0x40/0x50
[   61.751892]  kmem_cache_free+0x100/0x470
[   61.755828]  kobject_put+0x21c/0x678
[   61.759460]  kmem_cache_double_destroy+0x168/0x398
[   61.764282]  kunit_try_run_case+0x22c/0x5a8
[   61.768493]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.774017]  kthread+0x464/0x810
[   61.777282]  ret_from_fork+0x14/0x20
[   61.780883] 
[   61.782379] The buggy address belongs to the object at cc85a400
[   61.782379]  which belongs to the cache kmem_cache of size 132
[   61.794189] The buggy address is located 0 bytes inside of
[   61.794189]  freed 132-byte region [cc85a400, cc85a484)
[   61.804962] 
[   61.806457] The buggy address belongs to the physical page:
[   61.812072] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85a
[   61.819366] flags: 0x0(zone=0)
[   61.822448] page_type: f5(slab)
[   61.825592] raw: 00000000 c7001000 00000122 00000000 00000000 80100010 f5000000 00000000
[   61.833740] raw: 00000000
[   61.836395] page dumped because: kasan: bad access detected
[   61.841979] 
[   61.843505] Memory state around the buggy address:
[   61.848327]  cc85a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.854888]  cc85a380: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.861450] >cc85a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.868041]            ^
[   61.870574]  cc85a480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.877166]  cc85a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.883728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   61.103240] ==================================================================
[   61.114898] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x430/0x550
[   61.122131] Read of size 1 at addr cc896000 by task kunit_try_catch/265
[   61.128814] 
[   61.130310] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   61.130371] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   61.130371] Hardware name: Generic DRA74X (Flattened Device Tree)
[   61.130401] Call trace: 
[   61.130401]  unwind_backtrace from show_stack+0x18/0x1c
[   61.130462]  show_stack from dump_stack_lvl+0x70/0x90
[   61.130493]  dump_stack_lvl from print_report+0x158/0x528
[   61.130523]  print_report from kasan_report+0xdc/0x118
[   61.130554]  kasan_report from kmem_cache_rcu_uaf+0x430/0x550
[   61.130584]  kmem_cache_rcu_uaf from kunit_try_run_case+0x22c/0x5a8
[   61.130645]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.130676]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   61.130737]  kthread from ret_from_fork+0x14/0x20
[   61.130767] Exception stack(0xf23a3fb0 to 0xf23a3ff8)
[   61.130767] 3fa0:                                     00000000 00000000 00000000 00000000
[   61.130798] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   61.130828] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   61.130828] 
[   61.236816] Allocated by task 265:
[   61.240264]  kasan_save_track+0x30/0x5c
[   61.244140]  __kasan_slab_alloc+0x60/0x68
[   61.248168]  kmem_cache_alloc_noprof+0x17c/0x36c
[   61.252838]  kmem_cache_rcu_uaf+0x174/0x550
[   61.257080]  kunit_try_run_case+0x22c/0x5a8
[   61.261322]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.266845]  kthread+0x464/0x810
[   61.270111]  ret_from_fork+0x14/0x20
[   61.273742] 
[   61.275238] Freed by task 22:
[   61.278228]  kasan_save_track+0x30/0x5c
[   61.282104]  kasan_save_free_info+0x3c/0x48
[   61.286346]  __kasan_slab_free+0x40/0x50
[   61.290313]  slab_free_after_rcu_debug+0xb0/0x290
[   61.295043]  rcu_core+0x84c/0x1aa4
[   61.298492]  handle_softirqs+0x3d8/0xc7c
[   61.302459]  run_ksoftirqd+0x7c/0x9c
[   61.306091]  smpboot_thread_fn+0x46c/0xa68
[   61.310241]  kthread+0x464/0x810
[   61.313507]  ret_from_fork+0x14/0x20
[   61.317108] 
[   61.318603] Last potentially related work creation:
[   61.323516]  kasan_save_stack+0x30/0x4c
[   61.327392]  kasan_record_aux_stack+0x80/0x88
[   61.331817]  kmem_cache_free+0x1f0/0x470
[   61.335784]  kmem_cache_rcu_uaf+0x1b8/0x550
[   61.339996]  kunit_try_run_case+0x22c/0x5a8
[   61.344238]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   61.349792]  kthread+0x464/0x810
[   61.353057]  ret_from_fork+0x14/0x20
[   61.356658] 
[   61.358154] The buggy address belongs to the object at cc896000
[   61.358154]  which belongs to the cache test_cache of size 200
[   61.369995] The buggy address is located 0 bytes inside of
[   61.369995]  freed 200-byte region [cc896000, cc8960c8)
[   61.380767] 
[   61.382293] The buggy address belongs to the physical page:
[   61.387908] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c896
[   61.395172] flags: 0x0(zone=0)
[   61.398284] page_type: f5(slab)
[   61.401458] raw: 00000000 cc85a300 00000122 00000000 00000000 800f000f f5000000 00000000
[   61.409606] raw: 00000000
[   61.412261] page dumped because: kasan: bad access detected
[   61.417877] 
[   61.419372] Memory state around the buggy address:
[   61.424224]  cc895f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   61.430786]  cc895f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   61.437377] >cc896000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.443969]            ^
[   61.446502]  cc896080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   61.453094]  cc896100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.459686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   60.631805] ==================================================================
[   60.643371] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x200/0x4c0
[   60.650421] Free of addr cc85e001 by task kunit_try_catch/263
[   60.656188] 
[   60.657714] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   60.657745] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.657745] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.657745] Call trace: 
[   60.657775]  unwind_backtrace from show_stack+0x18/0x1c
[   60.657806]  show_stack from dump_stack_lvl+0x70/0x90
[   60.657806]  dump_stack_lvl from print_report+0x158/0x528
[   60.657836]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   60.657867]  kasan_report_invalid_free from check_slab_allocation+0xd0/0xd8
[   60.657897]  check_slab_allocation from kmem_cache_free+0x1c0/0x470
[   60.657928]  kmem_cache_free from kmem_cache_invalid_free+0x200/0x4c0
[   60.657928]  kmem_cache_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   60.657958]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.657989]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.658020]  kthread from ret_from_fork+0x14/0x20
[   60.658050] Exception stack(0xf2393fb0 to 0xf2393ff8)
[   60.658050] 3fa0:                                     00000000 00000000 00000000 00000000
[   60.658081] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.658081] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.658111] 
[   60.779479] Allocated by task 263:
[   60.782928]  kasan_save_track+0x30/0x5c
[   60.786804]  __kasan_slab_alloc+0x60/0x68
[   60.790832]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.795471]  kmem_cache_invalid_free+0x16c/0x4c0
[   60.800140]  kunit_try_run_case+0x22c/0x5a8
[   60.804351]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.809875]  kthread+0x464/0x810
[   60.813140]  ret_from_fork+0x14/0x20
[   60.816741] 
[   60.818237] The buggy address belongs to the object at cc85e000
[   60.818237]  which belongs to the cache test_cache of size 200
[   60.830078] The buggy address is located 1 bytes inside of
[   60.830078]  200-byte region [cc85e000, cc85e0c8)
[   60.840301] 
[   60.841796] The buggy address belongs to the physical page:
[   60.847412] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85e
[   60.854705] flags: 0x0(zone=0)
[   60.857757] page_type: f5(slab)
[   60.860931] raw: 00000000 cc85a200 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.869079] raw: 00000000
[   60.871734] page dumped because: kasan: bad access detected
[   60.877319] 
[   60.878845] Memory state around the buggy address:
[   60.883666]  cc85df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.890228]  cc85df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.896789] >cc85e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.903381]            ^
[   60.905914]  cc85e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   60.912506]  cc85e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.919067] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   60.289825] ==================================================================
[   60.300720] BUG: KASAN: double-free in kmem_cache_double_free+0x208/0x4bc
[   60.307586] Free of addr cc85d000 by task kunit_try_catch/261
[   60.313354] 
[   60.314880] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   60.314910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.314941] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.314941] Call trace: 
[   60.314941]  unwind_backtrace from show_stack+0x18/0x1c
[   60.315002]  show_stack from dump_stack_lvl+0x70/0x90
[   60.315032]  dump_stack_lvl from print_report+0x158/0x528
[   60.315063]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   60.315093]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   60.315124]  check_slab_allocation from kmem_cache_free+0xe0/0x470
[   60.315155]  kmem_cache_free from kmem_cache_double_free+0x208/0x4bc
[   60.315185]  kmem_cache_double_free from kunit_try_run_case+0x22c/0x5a8
[   60.315216]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.315246]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.315277]  kthread from ret_from_fork+0x14/0x20
[   60.315307] Exception stack(0xf2383fb0 to 0xf2383ff8)
[   60.315307] 3fa0:                                     00000000 00000000 00000000 00000000
[   60.315338] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.315368] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.315368] 
[   60.436523] Allocated by task 261:
[   60.439971]  kasan_save_track+0x30/0x5c
[   60.443847]  __kasan_slab_alloc+0x60/0x68
[   60.447875]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.452545]  kmem_cache_double_free+0x16c/0x4bc
[   60.457122]  kunit_try_run_case+0x22c/0x5a8
[   60.461334]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.466888]  kthread+0x464/0x810
[   60.470153]  ret_from_fork+0x14/0x20
[   60.473754] 
[   60.475250] Freed by task 261:
[   60.478332]  kasan_save_track+0x30/0x5c
[   60.482208]  kasan_save_free_info+0x3c/0x48
[   60.486419]  __kasan_slab_free+0x40/0x50
[   60.490386]  kmem_cache_free+0x100/0x470
[   60.494354]  kmem_cache_double_free+0x184/0x4bc
[   60.498931]  kunit_try_run_case+0x22c/0x5a8
[   60.503143]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.508697]  kthread+0x464/0x810
[   60.511962]  ret_from_fork+0x14/0x20
[   60.515563] 
[   60.517059] The buggy address belongs to the object at cc85d000
[   60.517059]  which belongs to the cache test_cache of size 200
[   60.528900] The buggy address is located 0 bytes inside of
[   60.528900]  200-byte region [cc85d000, cc85d0c8)
[   60.539123] 
[   60.540649] The buggy address belongs to the physical page:
[   60.546264] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85d
[   60.553527] flags: 0x0(zone=0)
[   60.556610] page_type: f5(slab)
[   60.559814] raw: 00000000 cc85a100 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.567962] raw: 00000000
[   60.570587] page dumped because: kasan: bad access detected
[   60.576202] 
[   60.577697] Memory state around the buggy address:
[   60.582550]  cc85cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.589111]  cc85cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.595703] >cc85d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.602264]            ^
[   60.604827]  cc85d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   60.611389]  cc85d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.617980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   59.987060] ==================================================================
[   59.997924] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x3e0/0x524
[   60.004699] Read of size 1 at addr cc85c0c8 by task kunit_try_catch/259
[   60.011352] 
[   60.012878] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   60.012908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   60.012939] Hardware name: Generic DRA74X (Flattened Device Tree)
[   60.012939] Call trace: 
[   60.012939]  unwind_backtrace from show_stack+0x18/0x1c
[   60.013000]  show_stack from dump_stack_lvl+0x70/0x90
[   60.013031]  dump_stack_lvl from print_report+0x158/0x528
[   60.013061]  print_report from kasan_report+0xdc/0x118
[   60.013092]  kasan_report from kmem_cache_oob+0x3e0/0x524
[   60.013092]  kmem_cache_oob from kunit_try_run_case+0x22c/0x5a8
[   60.013153]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.013183]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   60.013214]  kthread from ret_from_fork+0x14/0x20
[   60.013244] Exception stack(0xf2373fb0 to 0xf2373ff8)
[   60.013244] 3fa0:                                     00000000 00000000 00000000 00000000
[   60.013275] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   60.013305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   60.013305] 
[   60.118560] Allocated by task 259:
[   60.121978]  kasan_save_track+0x30/0x5c
[   60.125854]  __kasan_slab_alloc+0x60/0x68
[   60.129913]  kmem_cache_alloc_noprof+0x17c/0x36c
[   60.134582]  kmem_cache_oob+0x170/0x524
[   60.138458]  kunit_try_run_case+0x22c/0x5a8
[   60.142669]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   60.148193]  kthread+0x464/0x810
[   60.151458]  ret_from_fork+0x14/0x20
[   60.155090] 
[   60.156585] The buggy address belongs to the object at cc85c000
[   60.156585]  which belongs to the cache test_cache of size 200
[   60.168395] The buggy address is located 0 bytes to the right of
[   60.168395]  allocated 200-byte region [cc85c000, cc85c0c8)
[   60.180053] 
[   60.181549] The buggy address belongs to the physical page:
[   60.187164] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c85c
[   60.194458] flags: 0x0(zone=0)
[   60.197540] page_type: f5(slab)
[   60.200714] raw: 00000000 cc85a000 00000122 00000000 00000000 800f000f f5000000 00000000
[   60.208862] raw: 00000000
[   60.211486] page dumped because: kasan: bad access detected
[   60.217102] 
[   60.218627] Memory state around the buggy address:
[   60.223449]  cc85bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.230010]  cc85c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   60.236602] >cc85c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   60.243164]                                       ^
[   60.248077]  cc85c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.254669]  cc85c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.261230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   59.628509] ==================================================================
[   59.638763] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x580/0x5b8
[   59.645538] Read of size 4 at addr cc859080 by task kunit_try_catch/252
[   59.652191] 
[   59.653686] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   59.653717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   59.653747] Hardware name: Generic DRA74X (Flattened Device Tree)
[   59.653747] Call trace: 
[   59.653747]  unwind_backtrace from show_stack+0x18/0x1c
[   59.653778]  show_stack from dump_stack_lvl+0x70/0x90
[   59.653808]  dump_stack_lvl from print_report+0x158/0x528
[   59.653839]  print_report from kasan_report+0xdc/0x118
[   59.653869]  kasan_report from workqueue_uaf+0x580/0x5b8
[   59.653869]  workqueue_uaf from kunit_try_run_case+0x22c/0x5a8
[   59.653900]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.653930]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   59.653961]  kthread from ret_from_fork+0x14/0x20
[   59.653991] Exception stack(0xf181bfb0 to 0xf181bff8)
[   59.653991] bfa0:                                     00000000 00000000 00000000 00000000
[   59.654022] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   59.654022] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   59.654052] 
[   59.759094] Allocated by task 252:
[   59.762512]  kasan_save_track+0x30/0x5c
[   59.766387]  __kasan_kmalloc+0x8c/0x94
[   59.770172]  workqueue_uaf+0x184/0x5b8
[   59.773925]  kunit_try_run_case+0x22c/0x5a8
[   59.778167]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.783691]  kthread+0x464/0x810
[   59.786926]  ret_from_fork+0x14/0x20
[   59.790557] 
[   59.792053] Freed by task 81:
[   59.795043]  kasan_save_track+0x30/0x5c
[   59.798889]  kasan_save_free_info+0x3c/0x48
[   59.803131]  __kasan_slab_free+0x40/0x50
[   59.807067]  kfree+0xe8/0x384
[   59.810058]  process_one_work+0x7dc/0x1304
[   59.814208]  worker_thread+0xb98/0x1658
[   59.818084]  kthread+0x464/0x810
[   59.821319]  ret_from_fork+0x14/0x20
[   59.824920] 
[   59.826446] Last potentially related work creation:
[   59.831329]  kasan_save_stack+0x30/0x4c
[   59.835205]  kasan_record_aux_stack+0x80/0x88
[   59.839599]  __queue_work+0x878/0x1780
[   59.843383]  queue_work_on+0xbc/0xc0
[   59.846984]  workqueue_uaf+0x2e4/0x5b8
[   59.850769]  kunit_try_run_case+0x22c/0x5a8
[   59.854980]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.860504]  kthread+0x464/0x810
[   59.863769]  ret_from_fork+0x14/0x20
[   59.867370] 
[   59.868865] The buggy address belongs to the object at cc859080
[   59.868865]  which belongs to the cache kmalloc-64 of size 64
[   59.880615] The buggy address is located 0 bytes inside of
[   59.880615]  freed 64-byte region [cc859080, cc8590c0)
[   59.891265] 
[   59.892791] The buggy address belongs to the physical page:
[   59.898376] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c859
[   59.905670] flags: 0x0(zone=0)
[   59.908752] page_type: f5(slab)
[   59.911926] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   59.920043] raw: 00000000
[   59.922698] page dumped because: kasan: bad access detected
[   59.928314] 
[   59.929809] Memory state around the buggy address:
[   59.934631]  cc858f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   59.941192]  cc859000: 00 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc
[   59.947784] >cc859080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.954345]            ^
[   59.956878]  cc859100: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.963470]  cc859180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.970031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   59.263244] ==================================================================
[   59.273681] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x5c/0x60
[   59.280456] Read of size 4 at addr cc797a80 by task ksoftirqd/0/14
[   59.286682] 
[   59.288208] CPU: 0 UID: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   59.288238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   59.288269] Hardware name: Generic DRA74X (Flattened Device Tree)
[   59.288269] Call trace: 
[   59.288299]  unwind_backtrace from show_stack+0x18/0x1c
[   59.288330]  show_stack from dump_stack_lvl+0x70/0x90
[   59.288360]  dump_stack_lvl from print_report+0x158/0x528
[   59.288391]  print_report from kasan_report+0xdc/0x118
[   59.288421]  kasan_report from rcu_uaf_reclaim+0x5c/0x60
[   59.288482]  rcu_uaf_reclaim from rcu_core+0x84c/0x1aa4
[   59.288513]  rcu_core from handle_softirqs+0x3d8/0xc7c
[   59.288543]  handle_softirqs from run_ksoftirqd+0x7c/0x9c
[   59.288574]  run_ksoftirqd from smpboot_thread_fn+0x46c/0xa68
[   59.288604]  smpboot_thread_fn from kthread+0x464/0x810
[   59.288635]  kthread from ret_from_fork+0x14/0x20
[   59.288665] Exception stack(0xf007bfb0 to 0xf007bff8)
[   59.288696] bfa0:                                     00000000 00000000 00000000 00000000
[   59.288696] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   59.288726] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   59.288757] 
[   59.400054] Allocated by task 250:
[   59.403503]  kasan_save_track+0x30/0x5c
[   59.407379]  __kasan_kmalloc+0x8c/0x94
[   59.411163]  rcu_uaf+0xd0/0x354
[   59.414337]  kunit_try_run_case+0x22c/0x5a8
[   59.418579]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.424133]  kthread+0x464/0x810
[   59.427398]  ret_from_fork+0x14/0x20
[   59.430999] 
[   59.432525] Freed by task 14:
[   59.435516]  kasan_save_track+0x30/0x5c
[   59.439392]  kasan_save_free_info+0x3c/0x48
[   59.443603]  __kasan_slab_free+0x40/0x50
[   59.447570]  kfree+0xe8/0x384
[   59.450592]  rcu_uaf_reclaim+0x1c/0x60
[   59.454376]  rcu_core+0x84c/0x1aa4
[   59.457824]  handle_softirqs+0x3d8/0xc7c
[   59.461791]  run_ksoftirqd+0x7c/0x9c
[   59.465393]  smpboot_thread_fn+0x46c/0xa68
[   59.469543]  kthread+0x464/0x810
[   59.472808]  ret_from_fork+0x14/0x20
[   59.476409] 
[   59.477935] Last potentially related work creation:
[   59.482849]  kasan_save_stack+0x30/0x4c
[   59.486724]  kasan_record_aux_stack+0x80/0x88
[   59.491119]  __call_rcu_common.constprop.0+0x98/0xb80
[   59.496215]  rcu_uaf+0x1a4/0x354
[   59.499481]  kunit_try_run_case+0x22c/0x5a8
[   59.503723]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.509277]  kthread+0x464/0x810
[   59.512542]  ret_from_fork+0x14/0x20
[   59.516143] 
[   59.517669] The buggy address belongs to the object at cc797a80
[   59.517669]  which belongs to the cache kmalloc-64 of size 64
[   59.529388] The buggy address is located 0 bytes inside of
[   59.529388]  freed 64-byte region [cc797a80, cc797ac0)
[   59.540100] 
[   59.541595] The buggy address belongs to the physical page:
[   59.547210] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   59.554504] flags: 0x0(zone=0)
[   59.557586] page_type: f5(slab)
[   59.560760] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   59.568908] raw: 00000000
[   59.571563] page dumped because: kasan: bad access detected
[   59.577178] 
[   59.578704] Memory state around the buggy address:
[   59.583526]  cc797980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.590118]  cc797a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.596679] >cc797a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.603271]            ^
[   59.605834]  cc797b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.612426]  cc797b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.618988] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   58.919952] ==================================================================
[   58.927246] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740
[   58.933624] Read of size 1 at addr cc78ef78 by task kunit_try_catch/248
[   58.940307] 
[   58.941802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.941833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.941833] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.941833] Call trace: 
[   58.941864]  unwind_backtrace from show_stack+0x18/0x1c
[   58.941894]  show_stack from dump_stack_lvl+0x70/0x90
[   58.941894]  dump_stack_lvl from print_report+0x158/0x528
[   58.941925]  print_report from kasan_report+0xdc/0x118
[   58.941955]  kasan_report from ksize_uaf+0x68c/0x740
[   58.941986]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.941986]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.942016]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.942047]  kthread from ret_from_fork+0x14/0x20
[   58.942077] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.942077] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.942108] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.942108] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.942138] 
[   59.046478] Allocated by task 248:
[   59.049896]  kasan_save_track+0x30/0x5c
[   59.053771]  __kasan_kmalloc+0x8c/0x94
[   59.057556]  ksize_uaf+0xd0/0x740
[   59.060882]  kunit_try_run_case+0x22c/0x5a8
[   59.065093]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.070648]  kthread+0x464/0x810
[   59.073883]  ret_from_fork+0x14/0x20
[   59.077484] 
[   59.079010] Freed by task 248:
[   59.082061]  kasan_save_track+0x30/0x5c
[   59.085937]  kasan_save_free_info+0x3c/0x48
[   59.090148]  __kasan_slab_free+0x40/0x50
[   59.094116]  kfree+0xe8/0x384
[   59.097106]  ksize_uaf+0x174/0x740
[   59.100524]  kunit_try_run_case+0x22c/0x5a8
[   59.104736]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.110290]  kthread+0x464/0x810
[   59.113525]  ret_from_fork+0x14/0x20
[   59.117126] 
[   59.118621] The buggy address belongs to the object at cc78ef00
[   59.118621]  which belongs to the cache kmalloc-128 of size 128
[   59.130523] The buggy address is located 120 bytes inside of
[   59.130523]  freed 128-byte region [cc78ef00, cc78ef80)
[   59.141479] 
[   59.142974] The buggy address belongs to the physical page:
[   59.148590] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   59.155853] flags: 0x0(zone=0)
[   59.158935] page_type: f5(slab)
[   59.162109] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   59.170227] raw: 00000000
[   59.172882] page dumped because: kasan: bad access detected
[   59.178497] 
[   59.179992] Memory state around the buggy address:
[   59.184814]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.191375]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.197967] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.204528]                                                         ^
[   59.210998]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.217559]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.224151] ==================================================================
[   58.612335] ==================================================================
[   58.619598] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740
[   58.626007] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248
[   58.632659] 
[   58.634155] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.634185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.634216] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.634216] Call trace: 
[   58.634216]  unwind_backtrace from show_stack+0x18/0x1c
[   58.634246]  show_stack from dump_stack_lvl+0x70/0x90
[   58.634277]  dump_stack_lvl from print_report+0x158/0x528
[   58.634307]  print_report from kasan_report+0xdc/0x118
[   58.634307]  kasan_report from ksize_uaf+0x6c8/0x740
[   58.634338]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.634368]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.634399]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.634429]  kthread from ret_from_fork+0x14/0x20
[   58.634429] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.634460] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.634460] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.634490] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.634490] 
[   58.738830] Allocated by task 248:
[   58.742279]  kasan_save_track+0x30/0x5c
[   58.746124]  __kasan_kmalloc+0x8c/0x94
[   58.749908]  ksize_uaf+0xd0/0x740
[   58.753265]  kunit_try_run_case+0x22c/0x5a8
[   58.757476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.763000]  kthread+0x464/0x810
[   58.766265]  ret_from_fork+0x14/0x20
[   58.769866] 
[   58.771362] Freed by task 248:
[   58.774444]  kasan_save_track+0x30/0x5c
[   58.778320]  kasan_save_free_info+0x3c/0x48
[   58.782531]  __kasan_slab_free+0x40/0x50
[   58.786468]  kfree+0xe8/0x384
[   58.789459]  ksize_uaf+0x174/0x740
[   58.792907]  kunit_try_run_case+0x22c/0x5a8
[   58.797119]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.802642]  kthread+0x464/0x810
[   58.805908]  ret_from_fork+0x14/0x20
[   58.809509] 
[   58.811004] The buggy address belongs to the object at cc78ef00
[   58.811004]  which belongs to the cache kmalloc-128 of size 128
[   58.822906] The buggy address is located 0 bytes inside of
[   58.822906]  freed 128-byte region [cc78ef00, cc78ef80)
[   58.833679] 
[   58.835174] The buggy address belongs to the physical page:
[   58.840789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.848052] flags: 0x0(zone=0)
[   58.851135] page_type: f5(slab)
[   58.854309] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.862426] raw: 00000000
[   58.865081] page dumped because: kasan: bad access detected
[   58.870697] 
[   58.872192] Memory state around the buggy address:
[   58.877014]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.883575]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.890167] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.896728]            ^
[   58.899261]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.905853]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.912414] ==================================================================
[   58.290374] ==================================================================
[   58.301940] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740
[   58.308349] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248
[   58.315002] 
[   58.316497] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.316528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.316558] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.316558] Call trace: 
[   58.316558]  unwind_backtrace from show_stack+0x18/0x1c
[   58.316589]  show_stack from dump_stack_lvl+0x70/0x90
[   58.316619]  dump_stack_lvl from print_report+0x158/0x528
[   58.316650]  print_report from kasan_report+0xdc/0x118
[   58.316650]  kasan_report from __kasan_check_byte+0x34/0x3c
[   58.316680]  __kasan_check_byte from ksize+0x20/0x3c
[   58.316711]  ksize from ksize_uaf+0x1f0/0x740
[   58.316711]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.316741]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.316772]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.316802]  kthread from ret_from_fork+0x14/0x20
[   58.316833] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.316833] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.316864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.316864] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.316894] 
[   58.431213] Allocated by task 248:
[   58.434631]  kasan_save_track+0x30/0x5c
[   58.438507]  __kasan_kmalloc+0x8c/0x94
[   58.442260]  ksize_uaf+0xd0/0x740
[   58.445617]  kunit_try_run_case+0x22c/0x5a8
[   58.449829]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.455352]  kthread+0x464/0x810
[   58.458618]  ret_from_fork+0x14/0x20
[   58.462219] 
[   58.463714] Freed by task 248:
[   58.466796]  kasan_save_track+0x30/0x5c
[   58.470672]  kasan_save_free_info+0x3c/0x48
[   58.474884]  __kasan_slab_free+0x40/0x50
[   58.478820]  kfree+0xe8/0x384
[   58.481842]  ksize_uaf+0x174/0x740
[   58.485260]  kunit_try_run_case+0x22c/0x5a8
[   58.489471]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.495025]  kthread+0x464/0x810
[   58.498260]  ret_from_fork+0x14/0x20
[   58.501861] 
[   58.503387] The buggy address belongs to the object at cc78ef00
[   58.503387]  which belongs to the cache kmalloc-128 of size 128
[   58.515258] The buggy address is located 0 bytes inside of
[   58.515258]  freed 128-byte region [cc78ef00, cc78ef80)
[   58.526031] 
[   58.527526] The buggy address belongs to the physical page:
[   58.533142] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.540405] flags: 0x0(zone=0)
[   58.543487] page_type: f5(slab)
[   58.546661] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.554809] raw: 00000000
[   58.557434] page dumped because: kasan: bad access detected
[   58.563049] 
[   58.564544] Memory state around the buggy address:
[   58.569366]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.575958]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.582519] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.589080]            ^
[   58.591644]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.598205]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.604766] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   57.735504] ==================================================================
[   57.742767] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f0/0x908
[   57.750213] Read of size 1 at addr cc78ee78 by task kunit_try_catch/246
[   57.756896] 
[   57.758392] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   57.758422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.758422] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.758422] Call trace: 
[   57.758453]  unwind_backtrace from show_stack+0x18/0x1c
[   57.758453]  show_stack from dump_stack_lvl+0x70/0x90
[   57.758483]  dump_stack_lvl from print_report+0x158/0x528
[   57.758514]  print_report from kasan_report+0xdc/0x118
[   57.758544]  kasan_report from ksize_unpoisons_memory+0x7f0/0x908
[   57.758575]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.758575]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.758605]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.758636]  kthread from ret_from_fork+0x14/0x20
[   57.758666] Exception stack(0xf232bfb0 to 0xf232bff8)
[   57.758666] bfa0:                                     00000000 00000000 00000000 00000000
[   57.758697] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.758697] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.758728] 
[   57.865325] Allocated by task 246:
[   57.868743]  kasan_save_track+0x30/0x5c
[   57.872619]  __kasan_kmalloc+0x8c/0x94
[   57.876403]  ksize_unpoisons_memory+0xe8/0x908
[   57.880889]  kunit_try_run_case+0x22c/0x5a8
[   57.885101]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.890624]  kthread+0x464/0x810
[   57.893890]  ret_from_fork+0x14/0x20
[   57.897491] 
[   57.898986] The buggy address belongs to the object at cc78ee00
[   57.898986]  which belongs to the cache kmalloc-128 of size 128
[   57.910888] The buggy address is located 5 bytes to the right of
[   57.910888]  allocated 115-byte region [cc78ee00, cc78ee73)
[   57.922546] 
[   57.924041] The buggy address belongs to the physical page:
[   57.929626] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   57.936920] flags: 0x0(zone=0)
[   57.939971] page_type: f5(slab)
[   57.943145] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.951293] raw: 00000000
[   57.953948] page dumped because: kasan: bad access detected
[   57.959533] 
[   57.961059] Memory state around the buggy address:
[   57.965881]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.972442]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.979003] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.985565]                                                         ^
[   57.992065]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.998626]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.005187] ==================================================================
[   57.454284] ==================================================================
[   57.465759] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7f8/0x908
[   57.473205] Read of size 1 at addr cc78ee73 by task kunit_try_catch/246
[   57.479858] 
[   57.481384] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   57.481414] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.481414] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.481414] Call trace: 
[   57.481445]  unwind_backtrace from show_stack+0x18/0x1c
[   57.481445]  show_stack from dump_stack_lvl+0x70/0x90
[   57.481475]  dump_stack_lvl from print_report+0x158/0x528
[   57.481506]  print_report from kasan_report+0xdc/0x118
[   57.481536]  kasan_report from ksize_unpoisons_memory+0x7f8/0x908
[   57.481567]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   57.481567]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.481597]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.481628]  kthread from ret_from_fork+0x14/0x20
[   57.481658] Exception stack(0xf232bfb0 to 0xf232bff8)
[   57.481658] bfa0:                                     00000000 00000000 00000000 00000000
[   57.481689] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.481689] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.481719] 
[   57.588317] Allocated by task 246:
[   57.591766]  kasan_save_track+0x30/0x5c
[   57.595611]  __kasan_kmalloc+0x8c/0x94
[   57.599395]  ksize_unpoisons_memory+0xe8/0x908
[   57.603881]  kunit_try_run_case+0x22c/0x5a8
[   57.608093]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.613616]  kthread+0x464/0x810
[   57.616882]  ret_from_fork+0x14/0x20
[   57.620483] 
[   57.621978] The buggy address belongs to the object at cc78ee00
[   57.621978]  which belongs to the cache kmalloc-128 of size 128
[   57.633880] The buggy address is located 0 bytes to the right of
[   57.633880]  allocated 115-byte region [cc78ee00, cc78ee73)
[   57.645538] 
[   57.647033] The buggy address belongs to the physical page:
[   57.652618] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   57.659912] flags: 0x0(zone=0)
[   57.662994] page_type: f5(slab)
[   57.666137] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   57.674285] raw: 00000000
[   57.676940] page dumped because: kasan: bad access detected
[   57.682556] 
[   57.684051] Memory state around the buggy address:
[   57.688873]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.695434]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.702026] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   57.708587]                                                      ^
[   57.714813]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.721374]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.727935] ==================================================================
[   58.012603] ==================================================================
[   58.019866] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x858/0x908
[   58.027313] Read of size 1 at addr cc78ee7f by task kunit_try_catch/246
[   58.033966] 
[   58.035461] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.035491] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.035522] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.035522] Call trace: 
[   58.035522]  unwind_backtrace from show_stack+0x18/0x1c
[   58.035552]  show_stack from dump_stack_lvl+0x70/0x90
[   58.035583]  dump_stack_lvl from print_report+0x158/0x528
[   58.035614]  print_report from kasan_report+0xdc/0x118
[   58.035614]  kasan_report from ksize_unpoisons_memory+0x858/0x908
[   58.035644]  ksize_unpoisons_memory from kunit_try_run_case+0x22c/0x5a8
[   58.035675]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.035705]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.035736]  kthread from ret_from_fork+0x14/0x20
[   58.035736] Exception stack(0xf232bfb0 to 0xf232bff8)
[   58.035766] bfa0:                                     00000000 00000000 00000000 00000000
[   58.035766] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.035797] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.035797] 
[   58.142425] Allocated by task 246:
[   58.145843]  kasan_save_track+0x30/0x5c
[   58.149719]  __kasan_kmalloc+0x8c/0x94
[   58.153503]  ksize_unpoisons_memory+0xe8/0x908
[   58.157958]  kunit_try_run_case+0x22c/0x5a8
[   58.162200]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.167724]  kthread+0x464/0x810
[   58.170959]  ret_from_fork+0x14/0x20
[   58.174591] 
[   58.176086] The buggy address belongs to the object at cc78ee00
[   58.176086]  which belongs to the cache kmalloc-128 of size 128
[   58.187988] The buggy address is located 12 bytes to the right of
[   58.187988]  allocated 115-byte region [cc78ee00, cc78ee73)
[   58.199707] 
[   58.201202] The buggy address belongs to the physical page:
[   58.206817] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.214080] flags: 0x0(zone=0)
[   58.217163] page_type: f5(slab)
[   58.220336] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.228454] raw: 00000000
[   58.231109] page dumped because: kasan: bad access detected
[   58.236724] 
[   58.238220] Memory state around the buggy address:
[   58.243041]  cc78ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.249603]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.256164] >cc78ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   58.262756]                                                         ^
[   58.269226]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.275787]  cc78ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.282379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmalloc_double_kzfree
[   57.130401] ==================================================================
[   57.137664] BUG: KASAN: double-free in kmalloc_double_kzfree+0x1f4/0x3a8
[   57.144439] Free of addr cc797880 by task kunit_try_catch/244
[   57.150207] 
[   57.151733] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   57.151733] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   57.151763] Hardware name: Generic DRA74X (Flattened Device Tree)
[   57.151763] Call trace: 
[   57.151763]  unwind_backtrace from show_stack+0x18/0x1c
[   57.151794]  show_stack from dump_stack_lvl+0x70/0x90
[   57.151824]  dump_stack_lvl from print_report+0x158/0x528
[   57.151855]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   57.151885]  kasan_report_invalid_free from check_slab_allocation+0xb8/0xd8
[   57.151885]  check_slab_allocation from kfree+0xc8/0x384
[   57.151916]  kfree from kmalloc_double_kzfree+0x1f4/0x3a8
[   57.151947]  kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8
[   57.151977]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.152008]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   57.152038]  kthread from ret_from_fork+0x14/0x20
[   57.152038] Exception stack(0xf2323fb0 to 0xf2323ff8)
[   57.152069] 3fa0:                                     00000000 00000000 00000000 00000000
[   57.152069] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   57.152099] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   57.152099] 
[   57.271301] Allocated by task 244:
[   57.274719]  kasan_save_track+0x30/0x5c
[   57.278594]  __kasan_kmalloc+0x8c/0x94
[   57.282379]  kmalloc_double_kzfree+0xcc/0x3a8
[   57.286743]  kunit_try_run_case+0x22c/0x5a8
[   57.290985]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.296508]  kthread+0x464/0x810
[   57.299774]  ret_from_fork+0x14/0x20
[   57.303375] 
[   57.304870] Freed by task 244:
[   57.307952]  kasan_save_track+0x30/0x5c
[   57.311798]  kasan_save_free_info+0x3c/0x48
[   57.316040]  __kasan_slab_free+0x40/0x50
[   57.319976]  kfree+0xe8/0x384
[   57.322967]  kmalloc_double_kzfree+0x174/0x3a8
[   57.327453]  kunit_try_run_case+0x22c/0x5a8
[   57.331665]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.337188]  kthread+0x464/0x810
[   57.340454]  ret_from_fork+0x14/0x20
[   57.344055] 
[   57.345550] The buggy address belongs to the object at cc797880
[   57.345550]  which belongs to the cache kmalloc-64 of size 64
[   57.357299] The buggy address is located 0 bytes inside of
[   57.357299]  64-byte region [cc797880, cc7978c0)
[   57.367431] 
[   57.368927] The buggy address belongs to the physical page:
[   57.374542] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   57.381805] flags: 0x0(zone=0)
[   57.384887] page_type: f5(slab)
[   57.388061] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   57.396209] raw: 00000000
[   57.398834] page dumped because: kasan: bad access detected
[   57.404449] 
[   57.405944] Memory state around the buggy address:
[   57.410766]  cc797780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.417358]  cc797800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.423919] >cc797880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.430480]            ^
[   57.433044]  cc797900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.439605]  cc797980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.446166] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   53.201721] ==================================================================
[   53.212402] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x4b0/0x520
[   53.219177] Write of size 16 at addr cc796680 by task kunit_try_catch/218
[   53.226013] 
[   53.227508] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   53.227539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.227539] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.227539] Call trace: 
[   53.227569]  unwind_backtrace from show_stack+0x18/0x1c
[   53.227569]  show_stack from dump_stack_lvl+0x70/0x90
[   53.227600]  dump_stack_lvl from print_report+0x158/0x528
[   53.227630]  print_report from kasan_report+0xdc/0x118
[   53.227661]  kasan_report from kmalloc_oob_16+0x4b0/0x520
[   53.227661]  kmalloc_oob_16 from kunit_try_run_case+0x22c/0x5a8
[   53.227691]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.227722]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.227752]  kthread from ret_from_fork+0x14/0x20
[   53.227783] Exception stack(0xf2253fb0 to 0xf2253ff8)
[   53.227783] 3fa0:                                     00000000 00000000 00000000 00000000
[   53.227813] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.227813] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.227813] 
[   53.333038] Allocated by task 218:
[   53.336486]  kasan_save_track+0x30/0x5c
[   53.340332]  __kasan_kmalloc+0x8c/0x94
[   53.344116]  kmalloc_oob_16+0xcc/0x520
[   53.347900]  kunit_try_run_case+0x22c/0x5a8
[   53.352111]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.357635]  kthread+0x464/0x810
[   53.360900]  ret_from_fork+0x14/0x20
[   53.364501] 
[   53.365997] The buggy address belongs to the object at cc796680
[   53.365997]  which belongs to the cache kmalloc-64 of size 64
[   53.377716] The buggy address is located 0 bytes inside of
[   53.377716]  allocated 13-byte region [cc796680, cc79668d)
[   53.388732] 
[   53.390258] The buggy address belongs to the physical page:
[   53.395843] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796
[   53.403137] flags: 0x0(zone=0)
[   53.406188] page_type: f5(slab)
[   53.409362] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   53.417510] raw: 00000000
[   53.420166] page dumped because: kasan: bad access detected
[   53.425750] 
[   53.427246] Memory state around the buggy address:
[   53.432098]  cc796580: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.438659]  cc796600: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.445220] >cc796680: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.451782]               ^
[   53.454620]  cc796700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.461181]  cc796780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.467742] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   56.798736] ==================================================================
[   56.813262] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x1f4/0x3a8
[   56.820709] Read of size 1 at addr cc797880 by task kunit_try_catch/244
[   56.827392] 
[   56.828887] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   56.828918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.828918] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.828918] Call trace: 
[   56.828948]  unwind_backtrace from show_stack+0x18/0x1c
[   56.828979]  show_stack from dump_stack_lvl+0x70/0x90
[   56.828979]  dump_stack_lvl from print_report+0x158/0x528
[   56.829010]  print_report from kasan_report+0xdc/0x118
[   56.829040]  kasan_report from __kasan_check_byte+0x34/0x3c
[   56.829071]  __kasan_check_byte from kfree_sensitive+0x20/0x6c
[   56.829071]  kfree_sensitive from kmalloc_double_kzfree+0x1f4/0x3a8
[   56.829101]  kmalloc_double_kzfree from kunit_try_run_case+0x22c/0x5a8
[   56.829132]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.829162]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.829193]  kthread from ret_from_fork+0x14/0x20
[   56.829223] Exception stack(0xf2323fb0 to 0xf2323ff8)
[   56.829223] 3fa0:                                     00000000 00000000 00000000 00000000
[   56.829254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.829254] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.829254] 
[   56.947418] Allocated by task 244:
[   56.950836]  kasan_save_track+0x30/0x5c
[   56.954711]  __kasan_kmalloc+0x8c/0x94
[   56.958496]  kmalloc_double_kzfree+0xcc/0x3a8
[   56.962890]  kunit_try_run_case+0x22c/0x5a8
[   56.967102]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.972625]  kthread+0x464/0x810
[   56.975891]  ret_from_fork+0x14/0x20
[   56.979492] 
[   56.980987] Freed by task 244:
[   56.984069]  kasan_save_track+0x30/0x5c
[   56.987915]  kasan_save_free_info+0x3c/0x48
[   56.992156]  __kasan_slab_free+0x40/0x50
[   56.996093]  kfree+0xe8/0x384
[   56.999084]  kmalloc_double_kzfree+0x174/0x3a8
[   57.003570]  kunit_try_run_case+0x22c/0x5a8
[   57.007781]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   57.013305]  kthread+0x464/0x810
[   57.016571]  ret_from_fork+0x14/0x20
[   57.020172] 
[   57.021667] The buggy address belongs to the object at cc797880
[   57.021667]  which belongs to the cache kmalloc-64 of size 64
[   57.033416] The buggy address is located 0 bytes inside of
[   57.033416]  freed 64-byte region [cc797880, cc7978c0)
[   57.044097] 
[   57.045593] The buggy address belongs to the physical page:
[   57.051177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   57.058471] flags: 0x0(zone=0)
[   57.061553] page_type: f5(slab)
[   57.064697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   57.072845] raw: 00000000
[   57.075500] page dumped because: kasan: bad access detected
[   57.081085] 
[   57.082611] Memory state around the buggy address:
[   57.087432]  cc797780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.093994]  cc797800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.100555] >cc797880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.107147]            ^
[   57.109680]  cc797900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.116271]  cc797980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.122833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   56.479766] ==================================================================
[   56.490966] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4d0/0x550
[   56.497650] Read of size 1 at addr cc7975a8 by task kunit_try_catch/240
[   56.504302] 
[   56.505798] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   56.505828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.505828] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.505859] Call trace: 
[   56.505859]  unwind_backtrace from show_stack+0x18/0x1c
[   56.505889]  show_stack from dump_stack_lvl+0x70/0x90
[   56.505920]  dump_stack_lvl from print_report+0x158/0x528
[   56.505920]  print_report from kasan_report+0xdc/0x118
[   56.505950]  kasan_report from kmalloc_uaf2+0x4d0/0x550
[   56.505981]  kmalloc_uaf2 from kunit_try_run_case+0x22c/0x5a8
[   56.506011]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.506042]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.506042]  kthread from ret_from_fork+0x14/0x20
[   56.506072] Exception stack(0xf2303fb0 to 0xf2303ff8)
[   56.506072] 3fa0:                                     00000000 00000000 00000000 00000000
[   56.506103] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.506134] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.506134] 
[   56.610992] Allocated by task 240:
[   56.614440]  kasan_save_track+0x30/0x5c
[   56.618286]  __kasan_kmalloc+0x8c/0x94
[   56.622070]  kmalloc_uaf2+0xd8/0x550
[   56.625671]  kunit_try_run_case+0x22c/0x5a8
[   56.629913]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.635437]  kthread+0x464/0x810
[   56.638671]  ret_from_fork+0x14/0x20
[   56.642272] 
[   56.643798] Freed by task 240:
[   56.646881]  kasan_save_track+0x30/0x5c
[   56.650726]  kasan_save_free_info+0x3c/0x48
[   56.654937]  __kasan_slab_free+0x40/0x50
[   56.658905]  kfree+0xe8/0x384
[   56.661895]  kmalloc_uaf2+0x184/0x550
[   56.665588]  kunit_try_run_case+0x22c/0x5a8
[   56.669799]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.675354]  kthread+0x464/0x810
[   56.678588]  ret_from_fork+0x14/0x20
[   56.682189] 
[   56.683685] The buggy address belongs to the object at cc797580
[   56.683685]  which belongs to the cache kmalloc-64 of size 64
[   56.695434] The buggy address is located 40 bytes inside of
[   56.695434]  freed 64-byte region [cc797580, cc7975c0)
[   56.706176] 
[   56.707702] The buggy address belongs to the physical page:
[   56.713287] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   56.720581] flags: 0x0(zone=0)
[   56.723663] page_type: f5(slab)
[   56.726806] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.734954] raw: 00000000
[   56.737609] page dumped because: kasan: bad access detected
[   56.743194] 
[   56.744720] Memory state around the buggy address:
[   56.749542]  cc797480: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.756103]  cc797500: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.762664] >cc797580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.769256]                           ^
[   56.773101]  cc797600: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   56.779693]  cc797680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.786254] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   56.152709] ==================================================================
[   56.163299] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1fc/0x3b0
[   56.170501] Write of size 33 at addr cc797400 by task kunit_try_catch/238
[   56.177337] 
[   56.178833] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   56.178863] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   56.178863] Hardware name: Generic DRA74X (Flattened Device Tree)
[   56.178894] Call trace: 
[   56.178894]  unwind_backtrace from show_stack+0x18/0x1c
[   56.178924]  show_stack from dump_stack_lvl+0x70/0x90
[   56.178955]  dump_stack_lvl from print_report+0x158/0x528
[   56.178955]  print_report from kasan_report+0xdc/0x118
[   56.178985]  kasan_report from kasan_check_range+0x14c/0x198
[   56.179016]  kasan_check_range from __asan_memset+0x20/0x3c
[   56.179016]  __asan_memset from kmalloc_uaf_memset+0x1fc/0x3b0
[   56.179046]  kmalloc_uaf_memset from kunit_try_run_case+0x22c/0x5a8
[   56.179077]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.179107]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   56.179138]  kthread from ret_from_fork+0x14/0x20
[   56.179138] Exception stack(0xf22f3fb0 to 0xf22f3ff8)
[   56.179168] 3fa0:                                     00000000 00000000 00000000 00000000
[   56.179168] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   56.179199] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   56.179199] 
[   56.296478] Allocated by task 238:
[   56.299896]  kasan_save_track+0x30/0x5c
[   56.303771]  __kasan_kmalloc+0x8c/0x94
[   56.307556]  kmalloc_uaf_memset+0xcc/0x3b0
[   56.311676]  kunit_try_run_case+0x22c/0x5a8
[   56.315917]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.321441]  kthread+0x464/0x810
[   56.324676]  ret_from_fork+0x14/0x20
[   56.328308] 
[   56.329803] Freed by task 238:
[   56.332855]  kasan_save_track+0x30/0x5c
[   56.336730]  kasan_save_free_info+0x3c/0x48
[   56.340942]  __kasan_slab_free+0x40/0x50
[   56.344909]  kfree+0xe8/0x384
[   56.347900]  kmalloc_uaf_memset+0x174/0x3b0
[   56.352111]  kunit_try_run_case+0x22c/0x5a8
[   56.356323]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.361877]  kthread+0x464/0x810
[   56.365112]  ret_from_fork+0x14/0x20
[   56.368713] 
[   56.370239] The buggy address belongs to the object at cc797400
[   56.370239]  which belongs to the cache kmalloc-64 of size 64
[   56.381958] The buggy address is located 0 bytes inside of
[   56.381958]  freed 64-byte region [cc797400, cc797440)
[   56.392639] 
[   56.394134] The buggy address belongs to the physical page:
[   56.399749] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   56.407012] flags: 0x0(zone=0)
[   56.410095] page_type: f5(slab)
[   56.413269] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.421417] raw: 00000000
[   56.424041] page dumped because: kasan: bad access detected
[   56.429656] 
[   56.431152] Memory state around the buggy address:
[   56.435974]  cc797300: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.442535]  cc797380: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.449127] >cc797400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.455688]            ^
[   56.458221]  cc797480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.464813]  cc797500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.471374] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   55.838623] ==================================================================
[   55.850708] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x398/0x3d8
[   55.857269] Read of size 1 at addr cc797288 by task kunit_try_catch/236
[   55.863952] 
[   55.865447] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   55.865478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.865478] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.865509] Call trace: 
[   55.865509]  unwind_backtrace from show_stack+0x18/0x1c
[   55.865539]  show_stack from dump_stack_lvl+0x70/0x90
[   55.865539]  dump_stack_lvl from print_report+0x158/0x528
[   55.865570]  print_report from kasan_report+0xdc/0x118
[   55.865600]  kasan_report from kmalloc_uaf+0x398/0x3d8
[   55.865631]  kmalloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   55.865631]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.865661]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.865692]  kthread from ret_from_fork+0x14/0x20
[   55.865722] Exception stack(0xf22e3fb0 to 0xf22e3ff8)
[   55.865722] 3fa0:                                     00000000 00000000 00000000 00000000
[   55.865753] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.865753] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.865783] 
[   55.970458] Allocated by task 236:
[   55.973907]  kasan_save_track+0x30/0x5c
[   55.977752]  __kasan_kmalloc+0x8c/0x94
[   55.981536]  kmalloc_uaf+0xcc/0x3d8
[   55.985046]  kunit_try_run_case+0x22c/0x5a8
[   55.989288]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.994812]  kthread+0x464/0x810
[   55.998046]  ret_from_fork+0x14/0x20
[   56.001647] 
[   56.003173] Freed by task 236:
[   56.006225]  kasan_save_track+0x30/0x5c
[   56.010101]  kasan_save_free_info+0x3c/0x48
[   56.014312]  __kasan_slab_free+0x40/0x50
[   56.018280]  kfree+0xe8/0x384
[   56.021270]  kmalloc_uaf+0x174/0x3d8
[   56.024871]  kunit_try_run_case+0x22c/0x5a8
[   56.029083]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   56.034606]  kthread+0x464/0x810
[   56.037872]  ret_from_fork+0x14/0x20
[   56.041473] 
[   56.042968] The buggy address belongs to the object at cc797280
[   56.042968]  which belongs to the cache kmalloc-64 of size 64
[   56.054718] The buggy address is located 8 bytes inside of
[   56.054718]  freed 64-byte region [cc797280, cc7972c0)
[   56.065368] 
[   56.066894] The buggy address belongs to the physical page:
[   56.072479] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   56.079772] flags: 0x0(zone=0)
[   56.082855] page_type: f5(slab)
[   56.085998] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   56.094146] raw: 00000000
[   56.096801] page dumped because: kasan: bad access detected
[   56.102386] 
[   56.103912] Memory state around the buggy address:
[   56.108734]  cc797180: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.115295]  cc797200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.121856] >cc797280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.128417]               ^
[   56.131256]  cc797300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.137817]  cc797380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.144378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   52.864105] ==================================================================
[   52.871368] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4
[   52.878051] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216
[   52.884704] 
[   52.886199] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   52.886230] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.886230] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.886260] Call trace: 
[   52.886260]  unwind_backtrace from show_stack+0x18/0x1c
[   52.886291]  show_stack from dump_stack_lvl+0x70/0x90
[   52.886322]  dump_stack_lvl from print_report+0x158/0x528
[   52.886322]  print_report from kasan_report+0xdc/0x118
[   52.886352]  kasan_report from krealloc_uaf+0x580/0x5d4
[   52.886383]  krealloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   52.886413]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.886444]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.886444]  kthread from ret_from_fork+0x14/0x20
[   52.886474] Exception stack(0xf2243fb0 to 0xf2243ff8)
[   52.886474] 3fa0:                                     00000000 00000000 00000000 00000000
[   52.886505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.886505] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.886535] 
[   52.991394] Allocated by task 216:
[   52.994812]  kasan_save_track+0x30/0x5c
[   52.998687]  __kasan_kmalloc+0x8c/0x94
[   53.002471]  krealloc_uaf+0xd8/0x5d4
[   53.006072]  kunit_try_run_case+0x22c/0x5a8
[   53.010284]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.015808]  kthread+0x464/0x810
[   53.019073]  ret_from_fork+0x14/0x20
[   53.022674] 
[   53.024169] Freed by task 216:
[   53.027252]  kasan_save_track+0x30/0x5c
[   53.031127]  kasan_save_free_info+0x3c/0x48
[   53.035339]  __kasan_slab_free+0x40/0x50
[   53.039276]  kfree+0xe8/0x384
[   53.042297]  krealloc_uaf+0x180/0x5d4
[   53.045989]  kunit_try_run_case+0x22c/0x5a8
[   53.050201]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.055725]  kthread+0x464/0x810
[   53.058990]  ret_from_fork+0x14/0x20
[   53.062591] 
[   53.064086] The buggy address belongs to the object at cb2c8000
[   53.064086]  which belongs to the cache kmalloc-256 of size 256
[   53.075988] The buggy address is located 0 bytes inside of
[   53.075988]  freed 256-byte region [cb2c8000, cb2c8100)
[   53.086730] 
[   53.088256] The buggy address belongs to the physical page:
[   53.093841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8
[   53.101135] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   53.108825] flags: 0x40(head|zone=0)
[   53.112426] page_type: f5(slab)
[   53.115600] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.123748] raw: 00000000
[   53.126373] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   53.134613] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff
[   53.142852] head: 00000000 00000002
[   53.146362] page dumped because: kasan: bad access detected
[   53.151977] 
[   53.153472] Memory state around the buggy address:
[   53.158294]  cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.164855]  cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.171417] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.178009]            ^
[   53.180541]  cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.187133]  cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.193695] ==================================================================
[   52.510711] ==================================================================
[   52.522369] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4
[   52.529022] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216
[   52.535675] 
[   52.537200] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   52.537200] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.537231] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.537231] Call trace: 
[   52.537231]  unwind_backtrace from show_stack+0x18/0x1c
[   52.537261]  show_stack from dump_stack_lvl+0x70/0x90
[   52.537292]  dump_stack_lvl from print_report+0x158/0x528
[   52.537322]  print_report from kasan_report+0xdc/0x118
[   52.537322]  kasan_report from __kasan_check_byte+0x34/0x3c
[   52.537353]  __kasan_check_byte from krealloc_noprof+0x30/0x2e4
[   52.537384]  krealloc_noprof from krealloc_uaf+0x208/0x5d4
[   52.537384]  krealloc_uaf from kunit_try_run_case+0x22c/0x5a8
[   52.537414]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.537445]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.537475]  kthread from ret_from_fork+0x14/0x20
[   52.537506] Exception stack(0xf2243fb0 to 0xf2243ff8)
[   52.537506] 3fa0:                                     00000000 00000000 00000000 00000000
[   52.537536] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.537536] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.537536] 
[   52.654205] Allocated by task 216:
[   52.657653]  kasan_save_track+0x30/0x5c
[   52.661499]  __kasan_kmalloc+0x8c/0x94
[   52.665283]  krealloc_uaf+0xd8/0x5d4
[   52.668884]  kunit_try_run_case+0x22c/0x5a8
[   52.673126]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.678649]  kthread+0x464/0x810
[   52.681884]  ret_from_fork+0x14/0x20
[   52.685485] 
[   52.687011] Freed by task 216:
[   52.690063]  kasan_save_track+0x30/0x5c
[   52.693939]  kasan_save_free_info+0x3c/0x48
[   52.698150]  __kasan_slab_free+0x40/0x50
[   52.702117]  kfree+0xe8/0x384
[   52.705108]  krealloc_uaf+0x180/0x5d4
[   52.708801]  kunit_try_run_case+0x22c/0x5a8
[   52.713012]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.718536]  kthread+0x464/0x810
[   52.721801]  ret_from_fork+0x14/0x20
[   52.725402] 
[   52.726898] The buggy address belongs to the object at cb2c8000
[   52.726898]  which belongs to the cache kmalloc-256 of size 256
[   52.738800] The buggy address is located 0 bytes inside of
[   52.738800]  freed 256-byte region [cb2c8000, cb2c8100)
[   52.749572] 
[   52.751068] The buggy address belongs to the physical page:
[   52.756683] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8
[   52.763946] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.771667] flags: 0x40(head|zone=0)
[   52.775268] page_type: f5(slab)
[   52.778442] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   52.786560] raw: 00000000
[   52.789215] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   52.797454] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.805694] head: 00000000 00000002
[   52.809204] page dumped because: kasan: bad access detected
[   52.814788] 
[   52.816314] Memory state around the buggy address:
[   52.821136]  cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.827697]  cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.834259] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.840850]            ^
[   52.843383]  cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.849945]  cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.856536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   49.845367] ==================================================================
[   49.852630] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   49.860260] Write of size 1 at addr cb2c3eda by task kunit_try_catch/210
[   49.867004] 
[   49.868499] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   49.868530] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.868560] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.868560] Call trace: 
[   49.868560]  unwind_backtrace from show_stack+0x18/0x1c
[   49.868591]  show_stack from dump_stack_lvl+0x70/0x90
[   49.868621]  dump_stack_lvl from print_report+0x158/0x528
[   49.868652]  print_report from kasan_report+0xdc/0x118
[   49.868652]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   49.868682]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.868713]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.868743]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.868774]  kthread from ret_from_fork+0x14/0x20
[   49.868774] Exception stack(0xf221bfb0 to 0xf221bff8)
[   49.868804] bfa0:                                     00000000 00000000 00000000 00000000
[   49.868804] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.868835] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.868835] 
[   49.975799] Allocated by task 210:
[   49.979217]  kasan_save_track+0x30/0x5c
[   49.983093]  __kasan_krealloc+0xf4/0x140
[   49.987030]  krealloc_noprof+0x104/0x2e4
[   49.990997]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.995727]  kunit_try_run_case+0x22c/0x5a8
[   49.999969]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.005493]  kthread+0x464/0x810
[   50.008728]  ret_from_fork+0x14/0x20
[   50.012329] 
[   50.013854] The buggy address belongs to the object at cb2c3e00
[   50.013854]  which belongs to the cache kmalloc-256 of size 256
[   50.025726] The buggy address is located 17 bytes to the right of
[   50.025726]  allocated 201-byte region [cb2c3e00, cb2c3ec9)
[   50.037475] 
[   50.038970] The buggy address belongs to the physical page:
[   50.044586] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   50.051849] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.059539] flags: 0x40(head|zone=0)
[   50.063140] page_type: f5(slab)
[   50.066314] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.074462] raw: 00000000
[   50.077117] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.085327] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.093566] head: 00000000 00000002
[   50.097076] page dumped because: kasan: bad access detected
[   50.102691] 
[   50.104187] Memory state around the buggy address:
[   50.109008]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.115570]  cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.122161] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.128723]                                             ^
[   50.134155]  cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.140716]  cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.147277] ==================================================================
[   49.536499] ==================================================================
[   49.543762] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   49.551391] Write of size 1 at addr cb2c3ed0 by task kunit_try_catch/210
[   49.558135] 
[   49.559631] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   49.559661] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.559661] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.559661] Call trace: 
[   49.559692]  unwind_backtrace from show_stack+0x18/0x1c
[   49.559692]  show_stack from dump_stack_lvl+0x70/0x90
[   49.559722]  dump_stack_lvl from print_report+0x158/0x528
[   49.559753]  print_report from kasan_report+0xdc/0x118
[   49.559783]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   49.559783]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.559814]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.559844]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.559875]  kthread from ret_from_fork+0x14/0x20
[   49.559906] Exception stack(0xf221bfb0 to 0xf221bff8)
[   49.559906] bfa0:                                     00000000 00000000 00000000 00000000
[   49.559936] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.559936] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.559936] 
[   49.666900] Allocated by task 210:
[   49.670349]  kasan_save_track+0x30/0x5c
[   49.674194]  __kasan_krealloc+0xf4/0x140
[   49.678161]  krealloc_noprof+0x104/0x2e4
[   49.682098]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.686859]  kunit_try_run_case+0x22c/0x5a8
[   49.691070]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.696594]  kthread+0x464/0x810
[   49.699859]  ret_from_fork+0x14/0x20
[   49.703460] 
[   49.704956] The buggy address belongs to the object at cb2c3e00
[   49.704956]  which belongs to the cache kmalloc-256 of size 256
[   49.716857] The buggy address is located 7 bytes to the right of
[   49.716857]  allocated 201-byte region [cb2c3e00, cb2c3ec9)
[   49.728485] 
[   49.729980] The buggy address belongs to the physical page:
[   49.735595] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   49.742858] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.750579] flags: 0x40(head|zone=0)
[   49.754180] page_type: f5(slab)
[   49.757354] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.765502] raw: 00000000
[   49.768127] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.776367] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.784606] head: 00000000 00000002
[   49.788116] page dumped because: kasan: bad access detected
[   49.793701] 
[   49.795227] Memory state around the buggy address:
[   49.800048]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.806610]  cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.813171] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   49.819732]                                          ^
[   49.824920]  cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.831481]  cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.838073] ==================================================================
[   50.154602] ==================================================================
[   50.161895] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   50.169494] Write of size 1 at addr cb2c3eea by task kunit_try_catch/210
[   50.176269] 
[   50.177764] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   50.177795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.177795] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.177795] Call trace: 
[   50.177825]  unwind_backtrace from show_stack+0x18/0x1c
[   50.177825]  show_stack from dump_stack_lvl+0x70/0x90
[   50.177856]  dump_stack_lvl from print_report+0x158/0x528
[   50.177886]  print_report from kasan_report+0xdc/0x118
[   50.177917]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   50.177917]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.177947]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.177978]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.178009]  kthread from ret_from_fork+0x14/0x20
[   50.178039] Exception stack(0xf221bfb0 to 0xf221bff8)
[   50.178039] bfa0:                                     00000000 00000000 00000000 00000000
[   50.178070] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.178070] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.178070] 
[   50.285034] Allocated by task 210:
[   50.288482]  kasan_save_track+0x30/0x5c
[   50.292327]  __kasan_krealloc+0xf4/0x140
[   50.296295]  krealloc_noprof+0x104/0x2e4
[   50.300231]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.304992]  kunit_try_run_case+0x22c/0x5a8
[   50.309204]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.314727]  kthread+0x464/0x810
[   50.317993]  ret_from_fork+0x14/0x20
[   50.321594] 
[   50.323089] The buggy address belongs to the object at cb2c3e00
[   50.323089]  which belongs to the cache kmalloc-256 of size 256
[   50.334991] The buggy address is located 33 bytes to the right of
[   50.334991]  allocated 201-byte region [cb2c3e00, cb2c3ec9)
[   50.346710] 
[   50.348205] The buggy address belongs to the physical page:
[   50.353820] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   50.361083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.368804] flags: 0x40(head|zone=0)
[   50.372406] page_type: f5(slab)
[   50.375579] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.383697] raw: 00000000
[   50.386352] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.394592] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.402832] head: 00000000 00000002
[   50.406341] page dumped because: kasan: bad access detected
[   50.411926] 
[   50.413421] Memory state around the buggy address:
[   50.418273]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.424835]  cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.431396] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.437957]                                                   ^
[   50.443939]  cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.450500]  cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.457061] ==================================================================
[   51.523834] ==================================================================
[   51.531097] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xdd0/0xea4
[   51.538726] Write of size 1 at addr cc74e0d0 by task kunit_try_catch/214
[   51.545471] 
[   51.546966] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   51.546997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.547027] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.547027] Call trace: 
[   51.547027]  unwind_backtrace from show_stack+0x18/0x1c
[   51.547058]  show_stack from dump_stack_lvl+0x70/0x90
[   51.547088]  dump_stack_lvl from print_report+0x158/0x528
[   51.547119]  print_report from kasan_report+0xdc/0x118
[   51.547119]  kasan_report from krealloc_less_oob_helper+0xdd0/0xea4
[   51.547149]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.547180]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.547210]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.547241]  kthread from ret_from_fork+0x14/0x20
[   51.547241] Exception stack(0xf2233fb0 to 0xf2233ff8)
[   51.547271] 3fa0:                                     00000000 00000000 00000000 00000000
[   51.547271] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.547302] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.547302] 
[   51.654266] The buggy address belongs to the physical page:
[   51.659881] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   51.667144] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.674835] flags: 0x40(head|zone=0)
[   51.678466] page_type: f8(unknown)
[   51.681884] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.690032] raw: 00000000
[   51.692657] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.700897] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.709136] head: 00000000 00000004
[   51.712646] page dumped because: kasan: bad access detected
[   51.718231] 
[   51.719757] Memory state around the buggy address:
[   51.724578]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.731140]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.737701] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   51.744293]                                          ^
[   51.749450]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.756011]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.762573] ==================================================================
[   51.273590] ==================================================================
[   51.285217] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   51.292846] Write of size 1 at addr cc74e0c9 by task kunit_try_catch/214
[   51.299591] 
[   51.301116] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   51.301116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.301147] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.301147] Call trace: 
[   51.301147]  unwind_backtrace from show_stack+0x18/0x1c
[   51.301177]  show_stack from dump_stack_lvl+0x70/0x90
[   51.301208]  dump_stack_lvl from print_report+0x158/0x528
[   51.301239]  print_report from kasan_report+0xdc/0x118
[   51.301239]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   51.301269]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.301300]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.301330]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.301361]  kthread from ret_from_fork+0x14/0x20
[   51.301361] Exception stack(0xf2233fb0 to 0xf2233ff8)
[   51.301391] 3fa0:                                     00000000 00000000 00000000 00000000
[   51.301391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.301422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.301422] 
[   51.408386] The buggy address belongs to the physical page:
[   51.414001] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   51.421264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.428985] flags: 0x40(head|zone=0)
[   51.432586] page_type: f8(unknown)
[   51.436004] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.444152] raw: 00000000
[   51.446807] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.455017] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.463256] head: 00000000 00000004
[   51.466766] page dumped because: kasan: bad access detected
[   51.472381] 
[   51.473876] Memory state around the buggy address:
[   51.478698]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.485260]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.491851] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   51.498413]                                       ^
[   51.503326]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.509887]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.516448] ==================================================================
[   51.769927] ==================================================================
[   51.777191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd18/0xea4
[   51.784820] Write of size 1 at addr cc74e0da by task kunit_try_catch/214
[   51.791564] 
[   51.793060] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   51.793090] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.793121] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.793121] Call trace: 
[   51.793121]  unwind_backtrace from show_stack+0x18/0x1c
[   51.793151]  show_stack from dump_stack_lvl+0x70/0x90
[   51.793182]  dump_stack_lvl from print_report+0x158/0x528
[   51.793212]  print_report from kasan_report+0xdc/0x118
[   51.793212]  kasan_report from krealloc_less_oob_helper+0xd18/0xea4
[   51.793243]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.793273]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.793304]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.793334]  kthread from ret_from_fork+0x14/0x20
[   51.793334] Exception stack(0xf2233fb0 to 0xf2233ff8)
[   51.793365] 3fa0:                                     00000000 00000000 00000000 00000000
[   51.793365] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.793395] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.793395] 
[   51.900360] The buggy address belongs to the physical page:
[   51.905975] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   51.913238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.920959] flags: 0x40(head|zone=0)
[   51.924560] page_type: f8(unknown)
[   51.927978] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.936126] raw: 00000000
[   51.938751] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.946990] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.955230] head: 00000000 00000004
[   51.958740] page dumped because: kasan: bad access detected
[   51.964355] 
[   51.965850] Memory state around the buggy address:
[   51.970672]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.977233]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.983825] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   51.990386]                                             ^
[   51.995819]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.002380]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.008941] ==================================================================
[   52.263153] ==================================================================
[   52.270416] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   52.278045] Write of size 1 at addr cc74e0eb by task kunit_try_catch/214
[   52.284790] 
[   52.286285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   52.286315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.286315] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.286315] Call trace: 
[   52.286346]  unwind_backtrace from show_stack+0x18/0x1c
[   52.286346]  show_stack from dump_stack_lvl+0x70/0x90
[   52.286376]  dump_stack_lvl from print_report+0x158/0x528
[   52.286407]  print_report from kasan_report+0xdc/0x118
[   52.286437]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   52.286437]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.286468]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.286499]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.286529]  kthread from ret_from_fork+0x14/0x20
[   52.286560] Exception stack(0xf2233fb0 to 0xf2233ff8)
[   52.286560] 3fa0:                                     00000000 00000000 00000000 00000000
[   52.286590] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.286590] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.286590] 
[   52.393554] The buggy address belongs to the physical page:
[   52.399169] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   52.406433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.414154] flags: 0x40(head|zone=0)
[   52.417755] page_type: f8(unknown)
[   52.421173] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.429321] raw: 00000000
[   52.431976] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.440216] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.448425] head: 00000000 00000004
[   52.451934] page dumped because: kasan: bad access detected
[   52.457550] 
[   52.459045] Memory state around the buggy address:
[   52.463867]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.470458]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.477020] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.483581]                                                   ^
[   52.489532]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.496124]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.502685] ==================================================================
[   49.223968] ==================================================================
[   49.235107] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xcf4/0xea4
[   49.242736] Write of size 1 at addr cb2c3ec9 by task kunit_try_catch/210
[   49.249481] 
[   49.250976] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   49.251007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   49.251007] Hardware name: Generic DRA74X (Flattened Device Tree)
[   49.251037] Call trace: 
[   49.251037]  unwind_backtrace from show_stack+0x18/0x1c
[   49.251068]  show_stack from dump_stack_lvl+0x70/0x90
[   49.251068]  dump_stack_lvl from print_report+0x158/0x528
[   49.251098]  print_report from kasan_report+0xdc/0x118
[   49.251129]  kasan_report from krealloc_less_oob_helper+0xcf4/0xea4
[   49.251159]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   49.251190]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.251190]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   49.251220]  kthread from ret_from_fork+0x14/0x20
[   49.251251] Exception stack(0xf221bfb0 to 0xf221bff8)
[   49.251251] bfa0:                                     00000000 00000000 00000000 00000000
[   49.251281] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   49.251281] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   49.251312] 
[   49.358276] Allocated by task 210:
[   49.361694]  kasan_save_track+0x30/0x5c
[   49.365570]  __kasan_krealloc+0xf4/0x140
[   49.369506]  krealloc_noprof+0x104/0x2e4
[   49.373474]  krealloc_less_oob_helper+0x1d8/0xea4
[   49.378204]  kunit_try_run_case+0x22c/0x5a8
[   49.382415]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.387969]  kthread+0x464/0x810
[   49.391204]  ret_from_fork+0x14/0x20
[   49.394805] 
[   49.396331] The buggy address belongs to the object at cb2c3e00
[   49.396331]  which belongs to the cache kmalloc-256 of size 256
[   49.408203] The buggy address is located 0 bytes to the right of
[   49.408203]  allocated 201-byte region [cb2c3e00, cb2c3ec9)
[   49.419860] 
[   49.421356] The buggy address belongs to the physical page:
[   49.426971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   49.434234] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.441955] flags: 0x40(head|zone=0)
[   49.445556] page_type: f5(slab)
[   49.448730] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.456848] raw: 00000000
[   49.459503] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.467742] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.475982] head: 00000000 00000002
[   49.479492] page dumped because: kasan: bad access detected
[   49.485076] 
[   49.486602] Memory state around the buggy address:
[   49.491424]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.497985]  cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.504547] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   49.511108]                                       ^
[   49.516021]  cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.522613]  cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.529174] ==================================================================
[   52.016265] ==================================================================
[   52.023529] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd58/0xea4
[   52.031158] Write of size 1 at addr cc74e0ea by task kunit_try_catch/214
[   52.037902] 
[   52.039428] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   52.039428] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   52.039459] Hardware name: Generic DRA74X (Flattened Device Tree)
[   52.039459] Call trace: 
[   52.039459]  unwind_backtrace from show_stack+0x18/0x1c
[   52.039489]  show_stack from dump_stack_lvl+0x70/0x90
[   52.039520]  dump_stack_lvl from print_report+0x158/0x528
[   52.039550]  print_report from kasan_report+0xdc/0x118
[   52.039550]  kasan_report from krealloc_less_oob_helper+0xd58/0xea4
[   52.039581]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   52.039611]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   52.039642]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   52.039672]  kthread from ret_from_fork+0x14/0x20
[   52.039672] Exception stack(0xf2233fb0 to 0xf2233ff8)
[   52.039703] 3fa0:                                     00000000 00000000 00000000 00000000
[   52.039703] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   52.039733] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   52.039733] 
[   52.146697] The buggy address belongs to the physical page:
[   52.152313] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   52.159576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.167297] flags: 0x40(head|zone=0)
[   52.170898] page_type: f8(unknown)
[   52.174316] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.182464] raw: 00000000
[   52.185119] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   52.193328] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   52.201568] head: 00000000 00000004
[   52.205078] page dumped because: kasan: bad access detected
[   52.210693] 
[   52.212188] Memory state around the buggy address:
[   52.217010]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.223571]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.230163] >cc74e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   52.236724]                                                   ^
[   52.242675]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.249237]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   52.255828] ==================================================================
[   50.464385] ==================================================================
[   50.471649] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd00/0xea4
[   50.479278] Write of size 1 at addr cb2c3eeb by task kunit_try_catch/210
[   50.486022] 
[   50.487518] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   50.487548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.487579] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.487579] Call trace: 
[   50.487579]  unwind_backtrace from show_stack+0x18/0x1c
[   50.487609]  show_stack from dump_stack_lvl+0x70/0x90
[   50.487640]  dump_stack_lvl from print_report+0x158/0x528
[   50.487640]  print_report from kasan_report+0xdc/0x118
[   50.487670]  kasan_report from krealloc_less_oob_helper+0xd00/0xea4
[   50.487701]  krealloc_less_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.487731]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.487762]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.487792]  kthread from ret_from_fork+0x14/0x20
[   50.487792] Exception stack(0xf221bfb0 to 0xf221bff8)
[   50.487823] bfa0:                                     00000000 00000000 00000000 00000000
[   50.487823] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.487854] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.487854] 
[   50.594818] Allocated by task 210:
[   50.598236]  kasan_save_track+0x30/0x5c
[   50.602111]  __kasan_krealloc+0xf4/0x140
[   50.606048]  krealloc_noprof+0x104/0x2e4
[   50.610015]  krealloc_less_oob_helper+0x1d8/0xea4
[   50.614746]  kunit_try_run_case+0x22c/0x5a8
[   50.618988]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.624511]  kthread+0x464/0x810
[   50.627746]  ret_from_fork+0x14/0x20
[   50.631347] 
[   50.632873] The buggy address belongs to the object at cb2c3e00
[   50.632873]  which belongs to the cache kmalloc-256 of size 256
[   50.644775] The buggy address is located 34 bytes to the right of
[   50.644775]  allocated 201-byte region [cb2c3e00, cb2c3ec9)
[   50.656494] 
[   50.657989] The buggy address belongs to the physical page:
[   50.663604] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   50.670867] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.678558] flags: 0x40(head|zone=0)
[   50.682159] page_type: f5(slab)
[   50.685333] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.693481] raw: 00000000
[   50.696136] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   50.704345] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.712585] head: 00000000 00000002
[   50.716094] page dumped because: kasan: bad access detected
[   50.721710] 
[   50.723205] Memory state around the buggy address:
[   50.728027]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.734588]  cb2c3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.741180] >cb2c3e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   50.747741]                                                   ^
[   50.753692]  cb2c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.760253]  cb2c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.766845] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   55.544464] ==================================================================
[   55.556640] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.564605] Read of size 64 at addr cc797104 by task kunit_try_catch/234
[   55.571380] 
[   55.572875] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   55.572906] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.572906] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.572937] Call trace: 
[   55.572937]  unwind_backtrace from show_stack+0x18/0x1c
[   55.572967]  show_stack from dump_stack_lvl+0x70/0x90
[   55.572967]  dump_stack_lvl from print_report+0x158/0x528
[   55.572998]  print_report from kasan_report+0xdc/0x118
[   55.573028]  kasan_report from kasan_check_range+0x14c/0x198
[   55.573059]  kasan_check_range from __asan_memmove+0x28/0x68
[   55.573059]  __asan_memmove from kmalloc_memmove_invalid_size+0x1b4/0x360
[   55.573089]  kmalloc_memmove_invalid_size from kunit_try_run_case+0x22c/0x5a8
[   55.573120]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.573150]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.573181]  kthread from ret_from_fork+0x14/0x20
[   55.573211] Exception stack(0xf22d3fb0 to 0xf22d3ff8)
[   55.573211] 3fa0:                                     00000000 00000000 00000000 00000000
[   55.573242] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.573242] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.573272] 
[   55.692443] Allocated by task 234:
[   55.695892]  kasan_save_track+0x30/0x5c
[   55.699737]  __kasan_kmalloc+0x8c/0x94
[   55.703521]  kmalloc_memmove_invalid_size+0xd0/0x360
[   55.708526]  kunit_try_run_case+0x22c/0x5a8
[   55.712738]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.718292]  kthread+0x464/0x810
[   55.721527]  ret_from_fork+0x14/0x20
[   55.725128] 
[   55.726654] The buggy address belongs to the object at cc797100
[   55.726654]  which belongs to the cache kmalloc-64 of size 64
[   55.738372] The buggy address is located 4 bytes inside of
[   55.738372]  allocated 64-byte region [cc797100, cc797140)
[   55.749389] 
[   55.750885] The buggy address belongs to the physical page:
[   55.756500] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797
[   55.763763] flags: 0x0(zone=0)
[   55.766845] page_type: f5(slab)
[   55.770019] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   55.778167] raw: 00000000
[   55.780792] page dumped because: kasan: bad access detected
[   55.786407] 
[   55.787902] Memory state around the buggy address:
[   55.792724]  cc797000: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.799316]  cc797080: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.805877] >cc797100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.812438]                                    ^
[   55.817108]  cc797180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.823669]  cc797200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.830230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   55.253387] ==================================================================
[   55.264862] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x1b4/0x360
[   55.272491] Read of size 4294967294 at addr cc796f84 by task kunit_try_catch/232
[   55.279937] 
[   55.281433] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   55.281463] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   55.281494] Hardware name: Generic DRA74X (Flattened Device Tree)
[   55.281494] Call trace: 
[   55.281494]  unwind_backtrace from show_stack+0x18/0x1c
[   55.281524]  show_stack from dump_stack_lvl+0x70/0x90
[   55.281555]  dump_stack_lvl from print_report+0x158/0x528
[   55.281585]  print_report from kasan_report+0xdc/0x118
[   55.281585]  kasan_report from kasan_check_range+0x14c/0x198
[   55.281616]  kasan_check_range from __asan_memmove+0x28/0x68
[   55.281646]  __asan_memmove from kmalloc_memmove_negative_size+0x1b4/0x360
[   55.281677]  kmalloc_memmove_negative_size from kunit_try_run_case+0x22c/0x5a8
[   55.281707]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.281738]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   55.281738]  kthread from ret_from_fork+0x14/0x20
[   55.281768] Exception stack(0xf22c3fb0 to 0xf22c3ff8)
[   55.281768] 3fa0:                                     00000000 00000000 00000000 00000000
[   55.281799] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   55.281829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   55.281829] 
[   55.401184] Allocated by task 232:
[   55.404632]  kasan_save_track+0x30/0x5c
[   55.408477]  __kasan_kmalloc+0x8c/0x94
[   55.412261]  kmalloc_memmove_negative_size+0xd0/0x360
[   55.417358]  kunit_try_run_case+0x22c/0x5a8
[   55.421569]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.427093]  kthread+0x464/0x810
[   55.430358]  ret_from_fork+0x14/0x20
[   55.433959] 
[   55.435455] The buggy address belongs to the object at cc796f80
[   55.435455]  which belongs to the cache kmalloc-64 of size 64
[   55.447174] The buggy address is located 4 bytes inside of
[   55.447174]  64-byte region [cc796f80, cc796fc0)
[   55.457336] 
[   55.458831] The buggy address belongs to the physical page:
[   55.464447] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796
[   55.471710] flags: 0x0(zone=0)
[   55.474792] page_type: f5(slab)
[   55.477966] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   55.486114] raw: 00000000
[   55.488739] page dumped because: kasan: bad access detected
[   55.494354] 
[   55.495849] Memory state around the buggy address:
[   55.500671]  cc796e80: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.507232]  cc796f00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.513824] >cc796f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.520385]            ^
[   55.522949]  cc797000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.529510]  cc797080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   55.536071] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   54.960357] ==================================================================
[   54.971740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x1b0/0x35c
[   54.979095] Write of size 16 at addr cc78ed69 by task kunit_try_catch/230
[   54.985931] 
[   54.987457] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   54.987487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.987487] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.987487] Call trace: 
[   54.987487]  unwind_backtrace from show_stack+0x18/0x1c
[   54.987518]  show_stack from dump_stack_lvl+0x70/0x90
[   54.987548]  dump_stack_lvl from print_report+0x158/0x528
[   54.987579]  print_report from kasan_report+0xdc/0x118
[   54.987609]  kasan_report from kasan_check_range+0x14c/0x198
[   54.987609]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.987640]  __asan_memset from kmalloc_oob_memset_16+0x1b0/0x35c
[   54.987670]  kmalloc_oob_memset_16 from kunit_try_run_case+0x22c/0x5a8
[   54.987670]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.987701]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.987731]  kthread from ret_from_fork+0x14/0x20
[   54.987762] Exception stack(0xf22b3fb0 to 0xf22b3ff8)
[   54.987762] 3fa0:                                     00000000 00000000 00000000 00000000
[   54.987792] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.987792] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.987823] 
[   55.105621] Allocated by task 230:
[   55.109039]  kasan_save_track+0x30/0x5c
[   55.112915]  __kasan_kmalloc+0x8c/0x94
[   55.116668]  kmalloc_oob_memset_16+0xcc/0x35c
[   55.121063]  kunit_try_run_case+0x22c/0x5a8
[   55.125305]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   55.130828]  kthread+0x464/0x810
[   55.134063]  ret_from_fork+0x14/0x20
[   55.137664] 
[   55.139190] The buggy address belongs to the object at cc78ed00
[   55.139190]  which belongs to the cache kmalloc-128 of size 128
[   55.151062] The buggy address is located 105 bytes inside of
[   55.151062]  allocated 120-byte region [cc78ed00, cc78ed78)
[   55.162353] 
[   55.163879] The buggy address belongs to the physical page:
[   55.169464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   55.176757] flags: 0x0(zone=0)
[   55.179809] page_type: f5(slab)
[   55.182983] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   55.191131] raw: 00000000
[   55.193756] page dumped because: kasan: bad access detected
[   55.199371] 
[   55.200866] Memory state around the buggy address:
[   55.205688]  cc78ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.212280]  cc78ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.218841] >cc78ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.225402]                                                         ^
[   55.231903]  cc78ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.238464]  cc78ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.245025] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   54.667785] ==================================================================
[   54.679168] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x1b0/0x35c
[   54.686462] Write of size 8 at addr cc78ec71 by task kunit_try_catch/228
[   54.693206] 
[   54.694702] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   54.694732] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.694732] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.694763] Call trace: 
[   54.694763]  unwind_backtrace from show_stack+0x18/0x1c
[   54.694793]  show_stack from dump_stack_lvl+0x70/0x90
[   54.694793]  dump_stack_lvl from print_report+0x158/0x528
[   54.694824]  print_report from kasan_report+0xdc/0x118
[   54.694854]  kasan_report from kasan_check_range+0x14c/0x198
[   54.694885]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.694885]  __asan_memset from kmalloc_oob_memset_8+0x1b0/0x35c
[   54.694915]  kmalloc_oob_memset_8 from kunit_try_run_case+0x22c/0x5a8
[   54.694946]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.694976]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.695007]  kthread from ret_from_fork+0x14/0x20
[   54.695007] Exception stack(0xf22a3fb0 to 0xf22a3ff8)
[   54.695037] 3fa0:                                     00000000 00000000 00000000 00000000
[   54.695037] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.695068] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.695068] 
[   54.812683] Allocated by task 228:
[   54.816131]  kasan_save_track+0x30/0x5c
[   54.819976]  __kasan_kmalloc+0x8c/0x94
[   54.823760]  kmalloc_oob_memset_8+0xcc/0x35c
[   54.828063]  kunit_try_run_case+0x22c/0x5a8
[   54.832275]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.837829]  kthread+0x464/0x810
[   54.841064]  ret_from_fork+0x14/0x20
[   54.844696] 
[   54.846191] The buggy address belongs to the object at cc78ec00
[   54.846191]  which belongs to the cache kmalloc-128 of size 128
[   54.858093] The buggy address is located 113 bytes inside of
[   54.858093]  allocated 120-byte region [cc78ec00, cc78ec78)
[   54.869354] 
[   54.870880] The buggy address belongs to the physical page:
[   54.876464] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   54.883758] flags: 0x0(zone=0)
[   54.886810] page_type: f5(slab)
[   54.889984] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.898132] raw: 00000000
[   54.900787] page dumped because: kasan: bad access detected
[   54.906372] 
[   54.907897] Memory state around the buggy address:
[   54.912719]  cc78eb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.919281]  cc78eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.925842] >cc78ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.932403]                                                         ^
[   54.938903]  cc78ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.945465]  cc78ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.952026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   51.025756] ==================================================================
[   51.033020] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808
[   51.040649] Write of size 1 at addr cc74e0f0 by task kunit_try_catch/212
[   51.047393] 
[   51.048919] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   51.048919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   51.048950] Hardware name: Generic DRA74X (Flattened Device Tree)
[   51.048950] Call trace: 
[   51.048950]  unwind_backtrace from show_stack+0x18/0x1c
[   51.048980]  show_stack from dump_stack_lvl+0x70/0x90
[   51.049011]  dump_stack_lvl from print_report+0x158/0x528
[   51.049041]  print_report from kasan_report+0xdc/0x118
[   51.049041]  kasan_report from krealloc_more_oob_helper+0x72c/0x808
[   51.049072]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   51.049102]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   51.049133]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   51.049163]  kthread from ret_from_fork+0x14/0x20
[   51.049163] Exception stack(0xf222bfb0 to 0xf222bff8)
[   51.049194] bfa0:                                     00000000 00000000 00000000 00000000
[   51.049194] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   51.049224] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   51.049224] 
[   51.156188] The buggy address belongs to the physical page:
[   51.161804] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   51.169067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.176788] flags: 0x40(head|zone=0)
[   51.180389] page_type: f8(unknown)
[   51.183807] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.191955] raw: 00000000
[   51.194610] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   51.202819] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   51.211059] head: 00000000 00000004
[   51.214569] page dumped because: kasan: bad access detected
[   51.220184] 
[   51.221679] Memory state around the buggy address:
[   51.226501]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.233062]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.239654] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   51.246215]                                                      ^
[   51.252441]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.259002]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.265563] ==================================================================
[   48.599609] ==================================================================
[   48.610473] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808
[   48.618103] Write of size 1 at addr cb2c3ceb by task kunit_try_catch/208
[   48.624847] 
[   48.626373] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   48.626403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.626403] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.626403] Call trace: 
[   48.626403]  unwind_backtrace from show_stack+0x18/0x1c
[   48.626434]  show_stack from dump_stack_lvl+0x70/0x90
[   48.626464]  dump_stack_lvl from print_report+0x158/0x528
[   48.626495]  print_report from kasan_report+0xdc/0x118
[   48.626525]  kasan_report from krealloc_more_oob_helper+0x77c/0x808
[   48.626525]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   48.626556]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.626586]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.626617]  kthread from ret_from_fork+0x14/0x20
[   48.626647] Exception stack(0xf2213fb0 to 0xf2213ff8)
[   48.626647] 3fa0:                                     00000000 00000000 00000000 00000000
[   48.626678] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.626678] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.626678] 
[   48.733673] Allocated by task 208:
[   48.737091]  kasan_save_track+0x30/0x5c
[   48.740936]  __kasan_krealloc+0xf4/0x140
[   48.744903]  krealloc_noprof+0x104/0x2e4
[   48.748870]  krealloc_more_oob_helper+0x1e0/0x808
[   48.753601]  kunit_try_run_case+0x22c/0x5a8
[   48.757812]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.763336]  kthread+0x464/0x810
[   48.766601]  ret_from_fork+0x14/0x20
[   48.770202] 
[   48.771697] The buggy address belongs to the object at cb2c3c00
[   48.771697]  which belongs to the cache kmalloc-256 of size 256
[   48.783599] The buggy address is located 0 bytes to the right of
[   48.783599]  allocated 235-byte region [cb2c3c00, cb2c3ceb)
[   48.795227] 
[   48.796752] The buggy address belongs to the physical page:
[   48.802337] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   48.809631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.817321] flags: 0x40(head|zone=0)
[   48.820922] page_type: f5(slab)
[   48.824096] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   48.832244] raw: 00000000
[   48.834869] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   48.843109] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   48.851348] head: 00000000 00000002
[   48.854858] page dumped because: kasan: bad access detected
[   48.860473] 
[   48.861968] Memory state around the buggy address:
[   48.866790]  cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.873352]  cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.879943] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   48.886505]                                                   ^
[   48.892456]  cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.899017]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.905609] ==================================================================
[   50.774871] ==================================================================
[   50.785980] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x77c/0x808
[   50.793609] Write of size 1 at addr cc74e0eb by task kunit_try_catch/212
[   50.800354] 
[   50.801879] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   50.801910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   50.801910] Hardware name: Generic DRA74X (Flattened Device Tree)
[   50.801910] Call trace: 
[   50.801910]  unwind_backtrace from show_stack+0x18/0x1c
[   50.801940]  show_stack from dump_stack_lvl+0x70/0x90
[   50.801971]  dump_stack_lvl from print_report+0x158/0x528
[   50.802001]  print_report from kasan_report+0xdc/0x118
[   50.802032]  kasan_report from krealloc_more_oob_helper+0x77c/0x808
[   50.802032]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   50.802062]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   50.802093]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   50.802124]  kthread from ret_from_fork+0x14/0x20
[   50.802154] Exception stack(0xf222bfb0 to 0xf222bff8)
[   50.802154] bfa0:                                     00000000 00000000 00000000 00000000
[   50.802185] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   50.802185] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   50.802185] 
[   50.909149] The buggy address belongs to the physical page:
[   50.914764] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   50.922027] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.929748] flags: 0x40(head|zone=0)
[   50.933349] page_type: f8(unknown)
[   50.936767] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   50.944915] raw: 00000000
[   50.947570] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   50.955810] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   50.964019] head: 00000000 00000004
[   50.967529] page dumped because: kasan: bad access detected
[   50.973144] 
[   50.974639] Memory state around the buggy address:
[   50.979461]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.986022]  cc74e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.992614] >cc74e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   50.999176]                                                   ^
[   51.005126]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.011688]  cc74e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   51.018280] ==================================================================
[   48.913116] ==================================================================
[   48.920379] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x72c/0x808
[   48.928009] Write of size 1 at addr cb2c3cf0 by task kunit_try_catch/208
[   48.934753] 
[   48.936248] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   48.936279] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.936279] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.936309] Call trace: 
[   48.936309]  unwind_backtrace from show_stack+0x18/0x1c
[   48.936340]  show_stack from dump_stack_lvl+0x70/0x90
[   48.936340]  dump_stack_lvl from print_report+0x158/0x528
[   48.936370]  print_report from kasan_report+0xdc/0x118
[   48.936401]  kasan_report from krealloc_more_oob_helper+0x72c/0x808
[   48.936431]  krealloc_more_oob_helper from kunit_try_run_case+0x22c/0x5a8
[   48.936462]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.936462]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.936492]  kthread from ret_from_fork+0x14/0x20
[   48.936523] Exception stack(0xf2213fb0 to 0xf2213ff8)
[   48.936523] 3fa0:                                     00000000 00000000 00000000 00000000
[   48.936553] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.936553] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.936584] 
[   49.043548] Allocated by task 208:
[   49.046966]  kasan_save_track+0x30/0x5c
[   49.050842]  __kasan_krealloc+0xf4/0x140
[   49.054779]  krealloc_noprof+0x104/0x2e4
[   49.058746]  krealloc_more_oob_helper+0x1e0/0x808
[   49.063476]  kunit_try_run_case+0x22c/0x5a8
[   49.067687]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   49.073242]  kthread+0x464/0x810
[   49.076477]  ret_from_fork+0x14/0x20
[   49.080078] 
[   49.081573] The buggy address belongs to the object at cb2c3c00
[   49.081573]  which belongs to the cache kmalloc-256 of size 256
[   49.093475] The buggy address is located 5 bytes to the right of
[   49.093475]  allocated 235-byte region [cb2c3c00, cb2c3ceb)
[   49.105133] 
[   49.106628] The buggy address belongs to the physical page:
[   49.112243] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c2
[   49.119506] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.127197] flags: 0x40(head|zone=0)
[   49.130798] page_type: f5(slab)
[   49.133972] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.142120] raw: 00000000
[   49.144775] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000
[   49.152984] head: 00000000 00000001 eeb91349 ffffffff 00000000 ffffffff 00000000 ffffffff
[   49.161224] head: 00000000 00000002
[   49.164733] page dumped because: kasan: bad access detected
[   49.170349] 
[   49.171844] Memory state around the buggy address:
[   49.176666]  cb2c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.183227]  cb2c3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.189819] >cb2c3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   49.196380]                                                      ^
[   49.202606]  cb2c3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.209167]  cb2c3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.215728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   54.375183] ==================================================================
[   54.386566] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x1b0/0x35c
[   54.393829] Write of size 4 at addr cc78eb75 by task kunit_try_catch/226
[   54.400573] 
[   54.402099] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   54.402130] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.402130] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.402130] Call trace: 
[   54.402130]  unwind_backtrace from show_stack+0x18/0x1c
[   54.402160]  show_stack from dump_stack_lvl+0x70/0x90
[   54.402191]  dump_stack_lvl from print_report+0x158/0x528
[   54.402221]  print_report from kasan_report+0xdc/0x118
[   54.402221]  kasan_report from kasan_check_range+0x14c/0x198
[   54.402252]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.402282]  __asan_memset from kmalloc_oob_memset_4+0x1b0/0x35c
[   54.402313]  kmalloc_oob_memset_4 from kunit_try_run_case+0x22c/0x5a8
[   54.402313]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.402343]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.402374]  kthread from ret_from_fork+0x14/0x20
[   54.402404] Exception stack(0xf2293fb0 to 0xf2293ff8)
[   54.402404] 3fa0:                                     00000000 00000000 00000000 00000000
[   54.402435] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.402435] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.402465] 
[   54.520080] Allocated by task 226:
[   54.523498]  kasan_save_track+0x30/0x5c
[   54.527374]  __kasan_kmalloc+0x8c/0x94
[   54.531158]  kmalloc_oob_memset_4+0xcc/0x35c
[   54.535461]  kunit_try_run_case+0x22c/0x5a8
[   54.539672]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.545196]  kthread+0x464/0x810
[   54.548461]  ret_from_fork+0x14/0x20
[   54.552062] 
[   54.553558] The buggy address belongs to the object at cc78eb00
[   54.553558]  which belongs to the cache kmalloc-128 of size 128
[   54.565460] The buggy address is located 117 bytes inside of
[   54.565460]  allocated 120-byte region [cc78eb00, cc78eb78)
[   54.576751] 
[   54.578247] The buggy address belongs to the physical page:
[   54.583862] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   54.591125] flags: 0x0(zone=0)
[   54.594207] page_type: f5(slab)
[   54.597381] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.605499] raw: 00000000
[   54.608154] page dumped because: kasan: bad access detected
[   54.613769] 
[   54.615264] Memory state around the buggy address:
[   54.620086]  cc78ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.626647]  cc78ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.633209] >cc78eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.639801]                                                         ^
[   54.646270]  cc78eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.652832]  cc78ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.659393] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   54.082397] ==================================================================
[   54.093872] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x1b0/0x35c
[   54.101135] Write of size 2 at addr cc78ea77 by task kunit_try_catch/224
[   54.107879] 
[   54.109405] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   54.109436] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   54.109436] Hardware name: Generic DRA74X (Flattened Device Tree)
[   54.109436] Call trace: 
[   54.109436]  unwind_backtrace from show_stack+0x18/0x1c
[   54.109466]  show_stack from dump_stack_lvl+0x70/0x90
[   54.109497]  dump_stack_lvl from print_report+0x158/0x528
[   54.109527]  print_report from kasan_report+0xdc/0x118
[   54.109558]  kasan_report from kasan_check_range+0x14c/0x198
[   54.109558]  kasan_check_range from __asan_memset+0x20/0x3c
[   54.109588]  __asan_memset from kmalloc_oob_memset_2+0x1b0/0x35c
[   54.109619]  kmalloc_oob_memset_2 from kunit_try_run_case+0x22c/0x5a8
[   54.109649]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.109680]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   54.109680]  kthread from ret_from_fork+0x14/0x20
[   54.109710] Exception stack(0xf2283fb0 to 0xf2283ff8)
[   54.109710] 3fa0:                                     00000000 00000000 00000000 00000000
[   54.109741] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   54.109741] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   54.109771] 
[   54.227386] Allocated by task 224:
[   54.230834]  kasan_save_track+0x30/0x5c
[   54.234680]  __kasan_kmalloc+0x8c/0x94
[   54.238464]  kmalloc_oob_memset_2+0xcc/0x35c
[   54.242767]  kunit_try_run_case+0x22c/0x5a8
[   54.246978]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   54.252502]  kthread+0x464/0x810
[   54.255767]  ret_from_fork+0x14/0x20
[   54.259368] 
[   54.260864] The buggy address belongs to the object at cc78ea00
[   54.260864]  which belongs to the cache kmalloc-128 of size 128
[   54.272766] The buggy address is located 119 bytes inside of
[   54.272766]  allocated 120-byte region [cc78ea00, cc78ea78)
[   54.284057] 
[   54.285552] The buggy address belongs to the physical page:
[   54.291168] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   54.298431] flags: 0x0(zone=0)
[   54.301513] page_type: f5(slab)
[   54.304687] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.312835] raw: 00000000
[   54.315460] page dumped because: kasan: bad access detected
[   54.321075] 
[   54.322570] Memory state around the buggy address:
[   54.327392]  cc78e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.333984]  cc78e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.340545] >cc78ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.347106]                                                         ^
[   54.353576]  cc78ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.360168]  cc78eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.366729] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   53.789947] ==================================================================
[   53.800811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x1a4/0x350
[   53.808197] Write of size 128 at addr cc78e900 by task kunit_try_catch/222
[   53.815093] 
[   53.816619] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   53.816650] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.816650] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.816650] Call trace: 
[   53.816650]  unwind_backtrace from show_stack+0x18/0x1c
[   53.816680]  show_stack from dump_stack_lvl+0x70/0x90
[   53.816711]  dump_stack_lvl from print_report+0x158/0x528
[   53.816741]  print_report from kasan_report+0xdc/0x118
[   53.816772]  kasan_report from kasan_check_range+0x14c/0x198
[   53.816772]  kasan_check_range from __asan_memset+0x20/0x3c
[   53.816802]  __asan_memset from kmalloc_oob_in_memset+0x1a4/0x350
[   53.816833]  kmalloc_oob_in_memset from kunit_try_run_case+0x22c/0x5a8
[   53.816833]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.816864]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.816894]  kthread from ret_from_fork+0x14/0x20
[   53.816925] Exception stack(0xf2273fb0 to 0xf2273ff8)
[   53.816925] 3fa0:                                     00000000 00000000 00000000 00000000
[   53.816955] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.816955] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.816986] 
[   53.934783] Allocated by task 222:
[   53.938201]  kasan_save_track+0x30/0x5c
[   53.942077]  __kasan_kmalloc+0x8c/0x94
[   53.945831]  kmalloc_oob_in_memset+0xd0/0x350
[   53.950225]  kunit_try_run_case+0x22c/0x5a8
[   53.954467]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.959991]  kthread+0x464/0x810
[   53.963226]  ret_from_fork+0x14/0x20
[   53.966827] 
[   53.968353] The buggy address belongs to the object at cc78e900
[   53.968353]  which belongs to the cache kmalloc-128 of size 128
[   53.980224] The buggy address is located 0 bytes inside of
[   53.980224]  allocated 120-byte region [cc78e900, cc78e978)
[   53.991363] 
[   53.992858] The buggy address belongs to the physical page:
[   53.998474] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   54.005737] flags: 0x0(zone=0)
[   54.008819] page_type: f5(slab)
[   54.011962] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   54.020111] raw: 00000000
[   54.022766] page dumped because: kasan: bad access detected
[   54.028350] 
[   54.029876] Memory state around the buggy address:
[   54.034698]  cc78e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.041259]  cc78e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.047821] >cc78e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.054412]                                                         ^
[   54.060882]  cc78e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.067443]  cc78ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.074005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   53.475921] ==================================================================
[   53.486785] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x484/0x518
[   53.493621] Read of size 16 at addr cc796900 by task kunit_try_catch/220
[   53.500366] 
[   53.501892] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   53.501922] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   53.501922] Hardware name: Generic DRA74X (Flattened Device Tree)
[   53.501922] Call trace: 
[   53.501922]  unwind_backtrace from show_stack+0x18/0x1c
[   53.501953]  show_stack from dump_stack_lvl+0x70/0x90
[   53.501983]  dump_stack_lvl from print_report+0x158/0x528
[   53.502014]  print_report from kasan_report+0xdc/0x118
[   53.502044]  kasan_report from kmalloc_uaf_16+0x484/0x518
[   53.502044]  kmalloc_uaf_16 from kunit_try_run_case+0x22c/0x5a8
[   53.502075]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.502105]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   53.502136]  kthread from ret_from_fork+0x14/0x20
[   53.502136] Exception stack(0xf2263fb0 to 0xf2263ff8)
[   53.502166] 3fa0:                                     00000000 00000000 00000000 00000000
[   53.502166] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   53.502197] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   53.502197] 
[   53.607421] Allocated by task 220:
[   53.610839]  kasan_save_track+0x30/0x5c
[   53.614715]  __kasan_kmalloc+0x8c/0x94
[   53.618499]  kmalloc_uaf_16+0x1b0/0x518
[   53.622344]  kunit_try_run_case+0x22c/0x5a8
[   53.626586]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.632110]  kthread+0x464/0x810
[   53.635345]  ret_from_fork+0x14/0x20
[   53.638977] 
[   53.640472] Freed by task 220:
[   53.643524]  kasan_save_track+0x30/0x5c
[   53.647399]  kasan_save_free_info+0x3c/0x48
[   53.651611]  __kasan_slab_free+0x40/0x50
[   53.655578]  kfree+0xe8/0x384
[   53.658569]  kmalloc_uaf_16+0x234/0x518
[   53.662445]  kunit_try_run_case+0x22c/0x5a8
[   53.666656]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   53.672180]  kthread+0x464/0x810
[   53.675445]  ret_from_fork+0x14/0x20
[   53.679046] 
[   53.680541] The buggy address belongs to the object at cc796900
[   53.680541]  which belongs to the cache kmalloc-64 of size 64
[   53.692260] The buggy address is located 0 bytes inside of
[   53.692260]  freed 64-byte region [cc796900, cc796940)
[   53.702941] 
[   53.704437] The buggy address belongs to the physical page:
[   53.710052] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c796
[   53.717315] flags: 0x0(zone=0)
[   53.720397] page_type: f5(slab)
[   53.723571] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   53.731689] raw: 00000000
[   53.734344] page dumped because: kasan: bad access detected
[   53.739959] 
[   53.741455] Memory state around the buggy address:
[   53.746276]  cc796800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.752838]  cc796880: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.759429] >cc796900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.765991]            ^
[   53.768524]  cc796980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.775115]  cc796a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.781677] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmalloc_large_invalid_free
[   48.117706] ==================================================================
[   48.128723] BUG: KASAN: invalid-free in kmalloc_large_invalid_free+0x14c/0x2dc
[   48.135986] Free of addr cc74c001 by task kunit_try_catch/202
[   48.141784] 
[   48.143280] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   48.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   48.143341] Hardware name: Generic DRA74X (Flattened Device Tree)
[   48.143341] Call trace: 
[   48.143341]  unwind_backtrace from show_stack+0x18/0x1c
[   48.143371]  show_stack from dump_stack_lvl+0x70/0x90
[   48.143402]  dump_stack_lvl from print_report+0x158/0x528
[   48.143432]  print_report from kasan_report_invalid_free+0xc0/0xf4
[   48.143432]  kasan_report_invalid_free from free_large_kmalloc+0x54/0x194
[   48.143463]  free_large_kmalloc from kmalloc_large_invalid_free+0x14c/0x2dc
[   48.143493]  kmalloc_large_invalid_free from kunit_try_run_case+0x22c/0x5a8
[   48.143524]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   48.143554]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   48.143585]  kthread from ret_from_fork+0x14/0x20
[   48.143585] Exception stack(0xf21f3fb0 to 0xf21f3ff8)
[   48.143615] 3fa0:                                     00000000 00000000 00000000 00000000
[   48.143615] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   48.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   48.143646] 
[   48.259338] The buggy address belongs to the physical page:
[   48.264953] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   48.272216] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.279937] flags: 0x40(head|zone=0)
[   48.283538] page_type: f8(unknown)
[   48.286956] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.295104] raw: 00000000
[   48.297760] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   48.305999] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   48.314208] head: 00000000 00000004
[   48.317718] page dumped because: kasan: bad access detected
[   48.323333] 
[   48.324829] Memory state around the buggy address:
[   48.329650]  cc74bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.336242]  cc74bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.342803] >cc74c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.349365]            ^
[   48.351928]  cc74c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.358489]  cc74c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.365051] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   47.903015] ==================================================================
[   47.914581] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x358/0x388
[   47.921234] Read of size 1 at addr cc74c000 by task kunit_try_catch/200
[   47.927886] 
[   47.929412] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   47.929412] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.929443] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.929443] Call trace: 
[   47.929443]  unwind_backtrace from show_stack+0x18/0x1c
[   47.929473]  show_stack from dump_stack_lvl+0x70/0x90
[   47.929504]  dump_stack_lvl from print_report+0x158/0x528
[   47.929534]  print_report from kasan_report+0xdc/0x118
[   47.929534]  kasan_report from kmalloc_large_uaf+0x358/0x388
[   47.929565]  kmalloc_large_uaf from kunit_try_run_case+0x22c/0x5a8
[   47.929595]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.929626]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.929656]  kthread from ret_from_fork+0x14/0x20
[   47.929656] Exception stack(0xf21e3fb0 to 0xf21e3ff8)
[   47.929687] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.929687] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.929718] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.929718] 
[   48.035461] The buggy address belongs to the physical page:
[   48.041076] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   48.048339] flags: 0x0(zone=0)
[   48.051422] raw: 00000000 eebbf744 e8a3ac4c 00000000 00000000 00000000 ffffffff 00000000
[   48.059570] raw: 00000000
[   48.062194] page dumped because: kasan: bad access detected
[   48.067810] 
[   48.069305] Memory state around the buggy address:
[   48.074127]  cc74bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.080718]  cc74bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.087280] >cc74c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.093841]            ^
[   48.096405]  cc74c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.102966]  cc74c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.109527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   47.654663] ==================================================================
[   47.666046] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e8/0x330
[   47.673583] Write of size 1 at addr cc74e00a by task kunit_try_catch/198
[   47.680328] 
[   47.681823] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   47.681854] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.681884] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.681884] Call trace: 
[   47.681884]  unwind_backtrace from show_stack+0x18/0x1c
[   47.681915]  show_stack from dump_stack_lvl+0x70/0x90
[   47.681945]  dump_stack_lvl from print_report+0x158/0x528
[   47.681976]  print_report from kasan_report+0xdc/0x118
[   47.681976]  kasan_report from kmalloc_large_oob_right+0x2e8/0x330
[   47.682006]  kmalloc_large_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.682037]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.682067]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.682098]  kthread from ret_from_fork+0x14/0x20
[   47.682098] Exception stack(0xf21d3fb0 to 0xf21d3ff8)
[   47.682128] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.682128] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.682159] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.682159] 
[   47.788940] The buggy address belongs to the physical page:
[   47.794555] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c74c
[   47.801818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.809539] flags: 0x40(head|zone=0)
[   47.813140] page_type: f8(unknown)
[   47.816558] raw: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   47.824707] raw: 00000000
[   47.827362] head: 00000040 00000000 00000122 00000000 00000000 00000000 f8000000 00000001
[   47.835601] head: 00000000 00000002 eebbf6b1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   47.843811] head: 00000000 00000004
[   47.847320] page dumped because: kasan: bad access detected
[   47.852935] 
[   47.854431] Memory state around the buggy address:
[   47.859252]  cc74df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.865844]  cc74df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.872406] >cc74e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.878967]               ^
[   47.881774]  cc74e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.888366]  cc74e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.894927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   47.347839] ==================================================================
[   47.359985] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x324/0x37c
[   47.367370] Write of size 1 at addr ca82df00 by task kunit_try_catch/196
[   47.374114] 
[   47.375610] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   47.375640] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.375640] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.375671] Call trace: 
[   47.375671]  unwind_backtrace from show_stack+0x18/0x1c
[   47.375701]  show_stack from dump_stack_lvl+0x70/0x90
[   47.375701]  dump_stack_lvl from print_report+0x158/0x528
[   47.375732]  print_report from kasan_report+0xdc/0x118
[   47.375762]  kasan_report from kmalloc_big_oob_right+0x324/0x37c
[   47.375793]  kmalloc_big_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.375793]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.375823]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.375854]  kthread from ret_from_fork+0x14/0x20
[   47.375885] Exception stack(0xf21c3fb0 to 0xf21c3ff8)
[   47.375885] 3fa0:                                     00000000 00000000 00000000 00000000
[   47.375915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.375915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.375946] 
[   47.482360] Allocated by task 196:
[   47.485809]  kasan_save_track+0x30/0x5c
[   47.489654]  __kasan_kmalloc+0x8c/0x94
[   47.493438]  kmalloc_big_oob_right+0xd0/0x37c
[   47.497833]  kunit_try_run_case+0x22c/0x5a8
[   47.502044]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.507568]  kthread+0x464/0x810
[   47.510833]  ret_from_fork+0x14/0x20
[   47.514434] 
[   47.515930] The buggy address belongs to the object at ca82c000
[   47.515930]  which belongs to the cache kmalloc-8k of size 8192
[   47.527832] The buggy address is located 0 bytes to the right of
[   47.527832]  allocated 7936-byte region [ca82c000, ca82df00)
[   47.539550] 
[   47.541046] The buggy address belongs to the physical page:
[   47.546661] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8a828
[   47.553924] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.561645] flags: 0x40(head|zone=0)
[   47.565246] page_type: f5(slab)
[   47.568420] raw: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.576568] raw: 00000000
[   47.579193] head: 00000040 c7001a00 00000122 00000000 00000000 80020002 f5000000 00000000
[   47.587432] head: 00000000 00000003 eeb795a1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   47.595672] head: 00000000 00000008
[   47.599182] page dumped because: kasan: bad access detected
[   47.604797] 
[   47.606292] Memory state around the buggy address:
[   47.611114]  ca82de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.617675]  ca82de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.624237] >ca82df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.630828]            ^
[   47.633361]  ca82df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.639923]  ca82e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.646514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   47.061279] ==================================================================
[   47.068572] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.076721] Write of size 1 at addr cc78e878 by task kunit_try_catch/194
[   47.083465] 
[   47.084960] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   47.084991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.084991] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.085021] Call trace: 
[   47.085021]  unwind_backtrace from show_stack+0x18/0x1c
[   47.085052]  show_stack from dump_stack_lvl+0x70/0x90
[   47.085052]  dump_stack_lvl from print_report+0x158/0x528
[   47.085083]  print_report from kasan_report+0xdc/0x118
[   47.085113]  kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.085144]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.085174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.085205]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.085205]  kthread from ret_from_fork+0x14/0x20
[   47.085235] Exception stack(0xf21bbfb0 to 0xf21bbff8)
[   47.085235] bfa0:                                     00000000 00000000 00000000 00000000
[   47.085266] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.085266] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.085296] 
[   47.193298] Allocated by task 194:
[   47.196716]  kasan_save_track+0x30/0x5c
[   47.200592]  __kasan_kmalloc+0x8c/0x94
[   47.204376]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.209991]  kmalloc_track_caller_oob_right+0x1c4/0x548
[   47.215240]  kunit_try_run_case+0x22c/0x5a8
[   47.219482]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.225006]  kthread+0x464/0x810
[   47.228271]  ret_from_fork+0x14/0x20
[   47.231872] 
[   47.233367] The buggy address belongs to the object at cc78e800
[   47.233367]  which belongs to the cache kmalloc-128 of size 128
[   47.245269] The buggy address is located 0 bytes to the right of
[   47.245269]  allocated 120-byte region [cc78e800, cc78e878)
[   47.256896] 
[   47.258392] The buggy address belongs to the physical page:
[   47.264007] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   47.271270] flags: 0x0(zone=0)
[   47.274353] page_type: f5(slab)
[   47.277526] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.285675] raw: 00000000
[   47.288299] page dumped because: kasan: bad access detected
[   47.293914] 
[   47.295410] Memory state around the buggy address:
[   47.300231]  cc78e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.306793]  cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.313385] >cc78e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.319946]                                                         ^
[   47.326416]  cc78e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.332977]  cc78e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.339569] ==================================================================
[   46.771270] ==================================================================
[   46.782745] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548
[   46.790924] Write of size 1 at addr cc78e778 by task kunit_try_catch/194
[   46.797668] 
[   46.799163] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   46.799194] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.799194] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.799224] Call trace: 
[   46.799224]  unwind_backtrace from show_stack+0x18/0x1c
[   46.799255]  show_stack from dump_stack_lvl+0x70/0x90
[   46.799255]  dump_stack_lvl from print_report+0x158/0x528
[   46.799285]  print_report from kasan_report+0xdc/0x118
[   46.799316]  kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548
[   46.799346]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.799377]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.799407]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.799407]  kthread from ret_from_fork+0x14/0x20
[   46.799438] Exception stack(0xf21bbfb0 to 0xf21bbff8)
[   46.799438] bfa0:                                     00000000 00000000 00000000 00000000
[   46.799468] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.799468] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.799499] 
[   46.907501] Allocated by task 194:
[   46.910949]  kasan_save_track+0x30/0x5c
[   46.914794]  __kasan_kmalloc+0x8c/0x94
[   46.918579]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   46.924194]  kmalloc_track_caller_oob_right+0x98/0x548
[   46.929382]  kunit_try_run_case+0x22c/0x5a8
[   46.933593]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.939117]  kthread+0x464/0x810
[   46.942382]  ret_from_fork+0x14/0x20
[   46.945983] 
[   46.947479] The buggy address belongs to the object at cc78e700
[   46.947479]  which belongs to the cache kmalloc-128 of size 128
[   46.959381] The buggy address is located 0 bytes to the right of
[   46.959381]  allocated 120-byte region [cc78e700, cc78e778)
[   46.971008] 
[   46.972503] The buggy address belongs to the physical page:
[   46.978118] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   46.985382] flags: 0x0(zone=0)
[   46.988464] page_type: f5(slab)
[   46.991638] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.999786] raw: 00000000
[   47.002410] page dumped because: kasan: bad access detected
[   47.008026] 
[   47.009521] Memory state around the buggy address:
[   47.014343]  cc78e600: 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc fc
[   47.020904]  cc78e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.027496] >cc78e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.034057]                                                         ^
[   47.040527]  cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.047119]  cc78e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.053680] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[  103.254486] WARNING: CPU: 1 PID: 700 at lib/math/int_log.c:120 intlog10+0x10c/0x140
[  103.262237] Modules linked in:
[  103.265747] CPU: 1 UID: 0 PID: 700 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  103.265777] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  103.265777] Hardware name: Generic DRA74X (Flattened Device Tree)
[  103.265777] Call trace: 
[  103.265808]  unwind_backtrace from show_stack+0x18/0x1c
[  103.265838]  show_stack from dump_stack_lvl+0x70/0x90
[  103.265869]  dump_stack_lvl from __warn+0x154/0x2e0
[  103.265899]  __warn from warn_slowpath_fmt+0x24c/0x258
[  103.265930]  warn_slowpath_fmt from intlog10+0x10c/0x140
[  103.265930]  intlog10 from intlog10_test+0x124/0x258
[  103.265960]  intlog10_test from kunit_try_run_case+0x22c/0x5a8
[  103.265991]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  103.266021]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  103.266052]  kthread from ret_from_fork+0x14/0x20
[  103.266082] Exception stack(0xf3003fb0 to 0xf3003ff8)
[  103.266113] 3fa0:                                     00000000 00000000 00000000 00000000
[  103.266113] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  103.266143] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  103.266143] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   46.465454] ==================================================================
[   46.476409] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x380/0x3c4
[   46.483886] Read of size 1 at addr cc7ab000 by task kunit_try_catch/192
[   46.490539] 
[   46.492034] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   46.492065] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.492065] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.492095] Call trace: 
[   46.492095]  unwind_backtrace from show_stack+0x18/0x1c
[   46.492126]  show_stack from dump_stack_lvl+0x70/0x90
[   46.492156]  dump_stack_lvl from print_report+0x158/0x528
[   46.492156]  print_report from kasan_report+0xdc/0x118
[   46.492187]  kasan_report from kmalloc_node_oob_right+0x380/0x3c4
[   46.492218]  kmalloc_node_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.492248]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.492279]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.492309]  kthread from ret_from_fork+0x14/0x20
[   46.492309] Exception stack(0xf21abfb0 to 0xf21abff8)
[   46.492340] bfa0:                                     00000000 00000000 00000000 00000000
[   46.492340] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.492370] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.492370] 
[   46.598968] Allocated by task 192:
[   46.602416]  kasan_save_track+0x30/0x5c
[   46.606262]  __kasan_kmalloc+0x8c/0x94
[   46.610046]  kmalloc_node_oob_right+0xd4/0x3c4
[   46.614532]  kunit_try_run_case+0x22c/0x5a8
[   46.618743]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.624267]  kthread+0x464/0x810
[   46.627532]  ret_from_fork+0x14/0x20
[   46.631134] 
[   46.632629] The buggy address belongs to the object at cc7aa000
[   46.632629]  which belongs to the cache kmalloc-4k of size 4096
[   46.644531] The buggy address is located 0 bytes to the right of
[   46.644531]  allocated 4096-byte region [cc7aa000, cc7ab000)
[   46.656249] 
[   46.657775] The buggy address belongs to the physical page:
[   46.663391] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7a8
[   46.670654] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.678344] flags: 0x40(head|zone=0)
[   46.681945] page_type: f5(slab)
[   46.685119] raw: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000
[   46.693267] raw: 00000000
[   46.695922] head: 00000040 c7001900 00000122 00000000 00000000 80040004 f5000000 00000000
[   46.704162] head: 00000000 00000003 eebc03a1 ffffffff 00000000 ffffffff 00000000 ffffffff
[   46.712371] head: 00000000 00000008
[   46.715881] page dumped because: kasan: bad access detected
[   46.721496] 
[   46.722991] Memory state around the buggy address:
[   46.727813]  cc7aaf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.734405]  cc7aaf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.740966] >cc7ab000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.747528]            ^
[   46.750091]  cc7ab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.756652]  cc7ab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.763214] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   46.143371] ==================================================================
[   46.154418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x378/0x3b8
[   46.161346] Read of size 1 at addr cc795a7f by task kunit_try_catch/190
[   46.167999] 
[   46.169494] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   46.169525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.169525] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.169555] Call trace: 
[   46.169555]  unwind_backtrace from show_stack+0x18/0x1c
[   46.169586]  show_stack from dump_stack_lvl+0x70/0x90
[   46.169616]  dump_stack_lvl from print_report+0x158/0x528
[   46.169647]  print_report from kasan_report+0xdc/0x118
[   46.169647]  kasan_report from kmalloc_oob_left+0x378/0x3b8
[   46.169677]  kmalloc_oob_left from kunit_try_run_case+0x22c/0x5a8
[   46.169708]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.169738]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.169769]  kthread from ret_from_fork+0x14/0x20
[   46.169769] Exception stack(0xf219bfb0 to 0xf219bff8)
[   46.169799] bfa0:                                     00000000 00000000 00000000 00000000
[   46.169799] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.169830] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.169830] 
[   46.275390] Allocated by task 189:
[   46.278839]  kasan_save_track+0x30/0x5c
[   46.282684]  __kasan_kmalloc+0x8c/0x94
[   46.286468]  kmem_cache_free+0x1e0/0x470
[   46.290435]  release_task+0xcb8/0x175c
[   46.294219]  do_exit+0x14b8/0x2584
[   46.297637]  kthread_exit+0x208/0x25c
[   46.301330]  kthread+0x420/0x810
[   46.304595]  ret_from_fork+0x14/0x20
[   46.308197] 
[   46.309692] Last potentially related work creation:
[   46.314605]  kasan_save_stack+0x30/0x4c
[   46.318481]  kasan_record_aux_stack+0x80/0x88
[   46.322875]  __call_rcu_common.constprop.0+0x98/0xb80
[   46.327972]  kmem_cache_free+0x204/0x470
[   46.331909]  release_task+0xcb8/0x175c
[   46.335693]  do_exit+0x14b8/0x2584
[   46.339141]  kthread_exit+0x208/0x25c
[   46.342834]  kthread+0x420/0x810
[   46.346069]  ret_from_fork+0x14/0x20
[   46.349670] 
[   46.351196] The buggy address belongs to the object at cc795a00
[   46.351196]  which belongs to the cache kmalloc-64 of size 64
[   46.362915] The buggy address is located 115 bytes to the right of
[   46.362915]  allocated 12-byte region [cc795a00, cc795a0c)
[   46.374633] 
[   46.376129] The buggy address belongs to the physical page:
[   46.381744] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c795
[   46.389007] flags: 0x0(zone=0)
[   46.392089] page_type: f5(slab)
[   46.395263] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   46.403411] raw: 00000000
[   46.406036] page dumped because: kasan: bad access detected
[   46.411651] 
[   46.413146] Memory state around the buggy address:
[   46.417968]  cc795900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.424530]  cc795980: 00 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc
[   46.431121] >cc795a00: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.437683]                                                         ^
[   46.444152]  cc795a80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.450744]  cc795b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.457305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   45.316314] ==================================================================
[   45.323577] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6a4/0x744
[   45.330596] Write of size 1 at addr cc7d8173 by task kunit_try_catch/188
[   45.337371] 
[   45.338867] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G        W        N  6.15.0-next-20250530 #1 NONE 
[   45.338928] Tainted: [W]=WARN, [N]=TEST
[   45.338928] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.338928] Call trace: 
[   45.338958]  unwind_backtrace from show_stack+0x18/0x1c
[   45.338989]  show_stack from dump_stack_lvl+0x70/0x90
[   45.339019]  dump_stack_lvl from print_report+0x158/0x528
[   45.339050]  print_report from kasan_report+0xdc/0x118
[   45.339080]  kasan_report from kmalloc_oob_right+0x6a4/0x744
[   45.339111]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.339141]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.339172]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.339202]  kthread from ret_from_fork+0x14/0x20
[   45.339233] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.339263] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.339294] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.339294] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.339324] 
[   45.443847] Allocated by task 188:
[   45.447265]  kasan_save_track+0x30/0x5c
[   45.451141]  __kasan_kmalloc+0x8c/0x94
[   45.454925]  kmalloc_oob_right+0xcc/0x744
[   45.458953]  kunit_try_run_case+0x22c/0x5a8
[   45.463195]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.468719]  kthread+0x464/0x810
[   45.471984]  ret_from_fork+0x14/0x20
[   45.475585] 
[   45.477081] The buggy address belongs to the object at cc7d8100
[   45.477081]  which belongs to the cache kmalloc-128 of size 128
[   45.488983] The buggy address is located 0 bytes to the right of
[   45.488983]  allocated 115-byte region [cc7d8100, cc7d8173)
[   45.500610] 
[   45.502105] The buggy address belongs to the physical page:
[   45.507720] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   45.514984] flags: 0x0(zone=0)
[   45.518066] page_type: f5(slab)
[   45.521240] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.529388] raw: 00000000
[   45.532043] page dumped because: kasan: bad access detected
[   45.537628] 
[   45.539154] Memory state around the buggy address:
[   45.543975]  cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   45.550537]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.557098] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.563659]                                                      ^
[   45.569885]  cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.576477]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.583038] ==================================================================
[   45.595733] ==================================================================
[   45.602996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x660/0x744
[   45.610015] Write of size 1 at addr cc7d8178 by task kunit_try_catch/188
[   45.616760] 
[   45.618286] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   45.618316] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.618316] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.618316] Call trace: 
[   45.618316]  unwind_backtrace from show_stack+0x18/0x1c
[   45.618347]  show_stack from dump_stack_lvl+0x70/0x90
[   45.618377]  dump_stack_lvl from print_report+0x158/0x528
[   45.618408]  print_report from kasan_report+0xdc/0x118
[   45.618438]  kasan_report from kmalloc_oob_right+0x660/0x744
[   45.618438]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.618469]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.618499]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.618530]  kthread from ret_from_fork+0x14/0x20
[   45.618530] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.618560] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.618560] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.618591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.618591] 
[   45.724334] Allocated by task 188:
[   45.727783]  kasan_save_track+0x30/0x5c
[   45.731628]  __kasan_kmalloc+0x8c/0x94
[   45.735412]  kmalloc_oob_right+0xcc/0x744
[   45.739440]  kunit_try_run_case+0x22c/0x5a8
[   45.743682]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.749206]  kthread+0x464/0x810
[   45.752471]  ret_from_fork+0x14/0x20
[   45.756072] 
[   45.757568] The buggy address belongs to the object at cc7d8100
[   45.757568]  which belongs to the cache kmalloc-128 of size 128
[   45.769470] The buggy address is located 5 bytes to the right of
[   45.769470]  allocated 115-byte region [cc7d8100, cc7d8173)
[   45.781097] 
[   45.782592] The buggy address belongs to the physical page:
[   45.788208] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   45.795471] flags: 0x0(zone=0)
[   45.798553] page_type: f5(slab)
[   45.801727] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   45.809875] raw: 00000000
[   45.812499] page dumped because: kasan: bad access detected
[   45.818115] 
[   45.819610] Memory state around the buggy address:
[   45.824432]  cc7d8000: 00 00 00 00 00 00 00 00 00 00 04 fc fc fc fc fc
[   45.830993]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.837585] >cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   45.844146]                                                         ^
[   45.850616]  cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.857177]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.863769] ==================================================================
[   45.871093] ==================================================================
[   45.878356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6c0/0x744
[   45.885375] Read of size 1 at addr cc7d8180 by task kunit_try_catch/188
[   45.892028] 
[   45.893524] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   45.893554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   45.893554] Hardware name: Generic DRA74X (Flattened Device Tree)
[   45.893585] Call trace: 
[   45.893585]  unwind_backtrace from show_stack+0x18/0x1c
[   45.893615]  show_stack from dump_stack_lvl+0x70/0x90
[   45.893615]  dump_stack_lvl from print_report+0x158/0x528
[   45.893646]  print_report from kasan_report+0xdc/0x118
[   45.893676]  kasan_report from kmalloc_oob_right+0x6c0/0x744
[   45.893707]  kmalloc_oob_right from kunit_try_run_case+0x22c/0x5a8
[   45.893707]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   45.893737]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   45.893768]  kthread from ret_from_fork+0x14/0x20
[   45.893798] Exception stack(0xf2193fb0 to 0xf2193ff8)
[   45.893798] 3fa0:                                     00000000 00000000 00000000 00000000
[   45.893829] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   45.893829] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   45.893859] 
[   45.999603] Allocated by task 188:
[   46.003021]  kasan_save_track+0x30/0x5c
[   46.006896]  __kasan_kmalloc+0x8c/0x94
[   46.010650]  kmalloc_oob_right+0xcc/0x744
[   46.014709]  kunit_try_run_case+0x22c/0x5a8
[   46.018920]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.024444]  kthread+0x464/0x810
[   46.027709]  ret_from_fork+0x14/0x20
[   46.031311] 
[   46.032806] The buggy address belongs to the object at cc7d8100
[   46.032806]  which belongs to the cache kmalloc-128 of size 128
[   46.044708] The buggy address is located 13 bytes to the right of
[   46.044708]  allocated 115-byte region [cc7d8100, cc7d8173)
[   46.056427] 
[   46.057922] The buggy address belongs to the physical page:
[   46.063537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c7d8
[   46.070800] flags: 0x0(zone=0)
[   46.073883] page_type: f5(slab)
[   46.077056] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.085205] raw: 00000000
[   46.087829] page dumped because: kasan: bad access detected
[   46.093444] 
[   46.094940] Memory state around the buggy address:
[   46.099761]  cc7d8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.106323]  cc7d8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.112915] >cc7d8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.119476]            ^
[   46.122039]  cc7d8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.128601]  cc7d8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.135162] ==================================================================
Failure - log-parser-boot - exception-rtc_time64_to_tm_test_date_range_160000speed-slow
------------[ cut here ]------------
[  228.757141]     # rtc_time64_to_tm_test_date_range_160000.speed: slow
[  228.761413] WARNING: CPU: 0 PID: 77 at drivers/bus/omap_l3_noc.c:133 l3_interrupt_handler+0x6e0/0xb2c
[  228.761444]     ok 2 rtc_time64_to_tm_test_date_range_160000
[  228.767913] 44000000.l3-noc:L3 Custom Error: MASTER MPU TARGET L4_PER1_P3 (Read): Data Access in User mode during Functional access
[  228.767944] Modules linked in:
[  228.767944] CPU: 0 UID: 0 PID: 77 Comm: irq/115-4807000 Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  228.767974] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  228.768005] Hardware name: Generic DRA74X (Flattened Device Tree)
[  228.768005] Call trace: 
[  228.768005]  unwind_backtrace from show_stack+0x18/0x1c
[  228.768035]  show_stack from dump_stack_lvl+0x70/0x90
[  228.768066]  dump_stack_lvl from __warn+0x154/0x2e0
[  228.768096]  __warn from warn_slowpath_fmt+0x200/0x258
[  228.768127]  warn_slowpath_fmt from l3_interrupt_handler+0x6e0/0xb2c
[  228.768157]  l3_interrupt_handler from __handle_irq_event_percpu+0x25c/0x5ec
[  228.768188]  __handle_irq_event_percpu from handle_irq_event+0x10c/0x268
[  228.768218]  handle_irq_event from handle_fasteoi_irq+0x27c/0x9e4
[  228.768249]  handle_fasteoi_irq from handle_irq_desc+0x128/0x17c
[  228.768280]  handle_irq_desc from gic_handle_irq+0xc8/0x138
[  228.768310]  gic_handle_irq from generic_handle_arch_irq+0x30/0x40
[  228.768341]  generic_handle_arch_irq from call_with_stack+0x18/0x20
[  228.768371]  call_with_stack from __irq_svc+0x90/0xac
[  228.768371] Exception stack(0xf14a3d40 to 0xf14a3d88)
[  228.768402] 3d40: c50e40e2 00000028 00000000 00000000 ca7fa840 194ff509 194ff50f 194ff508
[  228.768432] 3d60: 00000000 00000007 00000007 c50e40e0 00000000 f14a3d90 c33c1260 c33c0498
[  228.768432] 3d80: 60000113 ffffffff
[  228.768432]  __irq_svc from omap_i2c_xfer_data+0xbd4/0x136c
[  228.768493]  omap_i2c_xfer_data from omap_i2c_isr_thread+0x18/0x88
[  228.768524]  omap_i2c_isr_thread from irq_thread_fn+0xb8/0x19c
[  228.768554]  irq_thread_fn from irq_thread+0x40c/0x76c
[  228.768554]  irq_thread from kthread+0x464/0x810
[  228.768585]  kthread from ret_from_fork+0x14/0x20
[  228.768615] Exception stack(0xf14a3fb0 to 0xf14a3ff8)
[  228.768615] 3fa0:                                     00000000 00000000 00000000 00000000
[  228.768646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  228.768646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  228.768676] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_vscale
------------[ cut here ]------------
[  186.530181] WARNING: CPU: 1 PID: 3030 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0
[  186.540130] Modules linked in:
[  186.543701] CPU: 1 UID: 0 PID: 3030 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  186.543731] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  186.543731] Hardware name: Generic DRA74X (Flattened Device Tree)
[  186.543731] Call trace: 
[  186.543731]  unwind_backtrace from show_stack+0x18/0x1c
[  186.543792]  show_stack from dump_stack_lvl+0x70/0x90
[  186.543792]  dump_stack_lvl from __warn+0x154/0x2e0
[  186.543823]  __warn from warn_slowpath_fmt+0x24c/0x258
[  186.543853]  warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0
[  186.543884]  drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4
[  186.543914]  drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8
[  186.543945]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  186.543975]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  186.544006]  kthread from ret_from_fork+0x14/0x20
[  186.544036] Exception stack(0xf260bfb0 to 0xf260bff8)
[  186.544036] bfa0:                                     00000000 00000000 00000000 00000000
[  186.544067] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  186.544067] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  186.544067] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  186.388671] WARNING: CPU: 1 PID: 3028 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_vscale+0x180/0x1d0
[  186.398498] Modules linked in:
[  186.401611] CPU: 1 UID: 0 PID: 3028 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  186.401641] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  186.401641] Hardware name: Generic DRA74X (Flattened Device Tree)
[  186.401641] Call trace: 
[  186.401641]  unwind_backtrace from show_stack+0x18/0x1c
[  186.401672]  show_stack from dump_stack_lvl+0x70/0x90
[  186.401702]  dump_stack_lvl from __warn+0x154/0x2e0
[  186.401733]  __warn from warn_slowpath_fmt+0x24c/0x258
[  186.401733]  warn_slowpath_fmt from drm_rect_calc_vscale+0x180/0x1d0
[  186.401763]  drm_rect_calc_vscale from drm_test_rect_calc_vscale+0x134/0x2c4
[  186.401794]  drm_test_rect_calc_vscale from kunit_try_run_case+0x22c/0x5a8
[  186.401794]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  186.401824]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  186.401855]  kthread from ret_from_fork+0x14/0x20
[  186.401855] Exception stack(0xf25fbfb0 to 0xf25fbff8)
[  186.401885] bfa0:                                     00000000 00000000 00000000 00000000
[  186.401885] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  186.401916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  186.401916] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_rect-drm_rect_calc_hscale
------------[ cut here ]------------
[  186.207672] WARNING: CPU: 1 PID: 3018 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0
[  186.217529] Modules linked in:
[  186.220611] CPU: 1 UID: 0 PID: 3018 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  186.220642] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  186.220642] Hardware name: Generic DRA74X (Flattened Device Tree)
[  186.220642] Call trace: 
[  186.220672]  unwind_backtrace from show_stack+0x18/0x1c
[  186.220672]  show_stack from dump_stack_lvl+0x70/0x90
[  186.220703]  dump_stack_lvl from __warn+0x154/0x2e0
[  186.220733]  __warn from warn_slowpath_fmt+0x24c/0x258
[  186.220764]  warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0
[  186.220764]  drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4
[  186.220794]  drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8
[  186.220825]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  186.220825]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  186.220855]  kthread from ret_from_fork+0x14/0x20
[  186.220886] Exception stack(0xf25abfb0 to 0xf25abff8)
[  186.220886] bfa0:                                     00000000 00000000 00000000 00000000
[  186.220916] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  186.220916] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  186.220916] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  186.066955] WARNING: CPU: 1 PID: 3016 at drivers/gpu/drm/drm_rect.c:137 drm_rect_calc_hscale+0x178/0x1d0
[  186.076660] Modules linked in:
[  186.079772] CPU: 1 UID: 0 PID: 3016 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  186.079803] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  186.079803] Hardware name: Generic DRA74X (Flattened Device Tree)
[  186.079803] Call trace: 
[  186.079803]  unwind_backtrace from show_stack+0x18/0x1c
[  186.079833]  show_stack from dump_stack_lvl+0x70/0x90
[  186.079864]  dump_stack_lvl from __warn+0x154/0x2e0
[  186.079895]  __warn from warn_slowpath_fmt+0x24c/0x258
[  186.079925]  warn_slowpath_fmt from drm_rect_calc_hscale+0x178/0x1d0
[  186.079925]  drm_rect_calc_hscale from drm_test_rect_calc_hscale+0x134/0x2c4
[  186.079956]  drm_test_rect_calc_hscale from kunit_try_run_case+0x22c/0x5a8
[  186.079986]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  186.080017]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  186.080047]  kthread from ret_from_fork+0x14/0x20
[  186.080047] Exception stack(0xf259bfb0 to 0xf259bff8)
[  186.080078] bfa0:                                     00000000 00000000 00000000 00000000
[  186.080078] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  186.080078] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  186.080108] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[  103.065460] WARNING: CPU: 1 PID: 682 at lib/math/int_log.c:63 intlog2+0xf8/0x12c
[  103.072967] Modules linked in:
[  103.076049] CPU: 1 UID: 0 PID: 682 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  103.076080] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  103.076080] Hardware name: Generic DRA74X (Flattened Device Tree)
[  103.076080] Call trace: 
[  103.076110]  unwind_backtrace from show_stack+0x18/0x1c
[  103.076141]  show_stack from dump_stack_lvl+0x70/0x90
[  103.076171]  dump_stack_lvl from __warn+0x154/0x2e0
[  103.076171]  __warn from warn_slowpath_fmt+0x24c/0x258
[  103.076202]  warn_slowpath_fmt from intlog2+0xf8/0x12c
[  103.076232]  intlog2 from intlog2_test+0x124/0x258
[  103.076232]  intlog2_test from kunit_try_run_case+0x22c/0x5a8
[  103.076263]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  103.076293]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  103.076324]  kthread from ret_from_fork+0x14/0x20
[  103.076324] Exception stack(0xf2f7bfb0 to 0xf2f7bff8)
[  103.076354] bfa0:                                     00000000 00000000 00000000 00000000
[  103.076354] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  103.076385] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  103.076385] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-unable-to-handle-kernel-paging-request-at-virtual-address-when-read
--- cut here ---
[  101.439697] Unable to handle kernel paging request at virtual address 9f000000 when read
[  101.448059] [9f000000] *pgd=80000080206003, *pmd=00000000
[  101.453735] Internal error: Oops: 206 [#1] SMP ARM
[  101.458557] Modules linked in:
[  101.461639] CPU: 0 UID: 0 PID: 576 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[  101.472259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[  101.477325] Hardware name: Generic DRA74X (Flattened Device Tree)
[  101.483459] PC is at kunit_test_null_dereference+0x74/0x1a0
[  101.489074] LR is at kunit_generic_run_threadfn_adapter+0xc4/0x128
[  101.495330] pc : [<c169c598>]    lr : [<c1691e50>]    psr: 60000013
[  101.501617] sp : f2c73e48  ip : 41b58ab3  fp : ccd33cd0
[  101.506866] r10: b89a679a  r9 : ccd11c00  r8 : c169c524
[  101.512145] r7 : b895b4f0  r6 : ccada784  r5 : bd58e7cc  r4 : f0013b40
[  101.518707] r3 : f2c73ec0  r2 : ccd33ac0  r1 : 9f000000  r0 : 00000000
[  101.525268] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  101.532470] Control: 30c5387d  Table: 8c910200  DAC: fffffffd
[  101.538238] Register r0 information: NULL pointer
[  101.542999] Register r1 information: non-paged memory
[  101.548065] Register r2 information: slab task_struct start ccd33ac0 pointer offset 0 size 2880
[  101.556854] Register r3 information: 4-page vmalloc region starting at 0xf2c70000 allocated at kernel_clone+0x174/0x794
[  101.567718] Register r4 information: 4-page vmalloc region starting at 0xf0010000 allocated at kernel_clone+0x174/0x794
[  101.578582] Register r5 information: non-paged memory
[  101.583679] Register r6 information: slab kmalloc-64 start ccada780 pointer offset 4 size 64
[  101.592193] Register r7 information: non-paged memory
[  101.597290] Register r8 information: non-slab/vmalloc memory
[  101.602996] Register r9 information: slab kmalloc-128 start ccd11c00 pointer offset 0 size 128
[  101.611694] Register r10 information: non-paged memory
[  101.616882] Register r11 information: slab task_struct start ccd33ac0 pointer offset 528 size 2880
[  101.625915] Register r12 information: non-paged memory
[  101.631103] Process kunit_try_catch (pid: 576, stack limit = 0x2d1e9673)
[  101.637847] Stack: (0xf2c73e48 to 0xf2c74000)
[  101.642242] 3e40:                   c05d5740 00000000 00000000 00000000 00000000 00000000
[  101.650482] 3e60: 41b58ab3 c577f404 c169c524 c5cc6574 c69ce280 c42f9064 22d6e000 ccd342d4
[  101.658691] 3e80: ccd33ac0 ccd11c00 199a6798 c0892e20 ccd342d4 60000013 00000003 c69cd480
[  101.666931] 3ea0: ccd342d4 ccd33ac0 ccd11c00 c42f9064 c69cd484 00000007 00000003 c058dfc0
[  101.675170] 3ec0: 00000003 ccd33cc0 00000003 199a2380 00000000 62e9436f f2c73ef4 ccada780
[  101.683410] 3ee0: 00000004 c1691e50 ccd11c00 ccd33ac0 f2c73f80 c1691d8c ccada780 c058ee00
[  101.691619] 3f00: 22d6e000 00000000 22d6e000 00000000 f2c73f8c c0892e20 e8a37500 c5cc9500
[  101.699859] 3f20: 41b58ab3 c57224b8 c058e99c 22d6e000 00000000 c05bb77c 00000000 00000000
[  101.708099] 3f40: fefefefe 00000000 00000000 00000000 c05c8f34 c5cc6574 c69ce280 c053fd38
[  101.716308] 3f60: 22d6e000 00000000 00000000 00000000 00000000 c0892e20 ccd39cc0 ccd34274
[  101.724548] 3f80: ccd33ac0 62e9436f 00000000 ccada880 c058e99c 00000000 00000000 00000000
[  101.732788] 3fa0: 00000000 00000000 00000000 c0400254 00000000 00000000 00000000 00000000
[  101.740997] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  101.749237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[  101.757476] Call trace: 
[  101.757476]  kunit_test_null_dereference from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  101.768432]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  101.775207]  kthread from ret_from_fork+0x14/0x20
[  101.779937] Exception stack(0xf2c73fb0 to 0xf2c73ff8)
[  101.785034] 3fa0:                                     00000000 00000000 00000000 00000000
[  101.793273] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  101.801483] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  101.808166] Code: e1a04000 e5920678 e58d008c e3a00000 (e1d110d0) 
[  101.814544] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_gem_shmem_helper-drm_gem_shmem_free
------------[ cut here ]------------
[  184.686126] WARNING: CPU: 1 PID: 2833 at drivers/gpu/drm/drm_gem_shmem_helper.c:180 drm_gem_shmem_free+0x74c/0x95c
[  184.697082] drm-kunit-mock-device drm_gem_shmem_test_get_pages_sgt.drm-kunit-mock-device: [drm] drm_WARN_ON(refcount_read(&shmem->pages_pin_count))
[  184.697082] Modules linked in:
[  184.713500] CPU: 1 UID: 0 PID: 2833 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  184.713531] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  184.713531] Hardware name: Generic DRA74X (Flattened Device Tree)
[  184.713562] Call trace: 
[  184.713562]  unwind_backtrace from show_stack+0x18/0x1c
[  184.713592]  show_stack from dump_stack_lvl+0x70/0x90
[  184.713623]  dump_stack_lvl from __warn+0x154/0x2e0
[  184.713653]  __warn from warn_slowpath_fmt+0x200/0x258
[  184.713653]  warn_slowpath_fmt from drm_gem_shmem_free+0x74c/0x95c
[  184.713684]  drm_gem_shmem_free from kunit_remove_resource+0x1ac/0x264
[  184.713714]  kunit_remove_resource from kunit_cleanup+0x78/0x13c
[  184.713745]  kunit_cleanup from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  184.713775]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  184.713775]  kthread from ret_from_fork+0x14/0x20
[  184.713806] Exception stack(0xf20cbfb0 to 0xf20cbff8)
[  184.713806] bfa0:                                     00000000 00000000 00000000 00000000
[  184.713836] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  184.713836] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  184.713836] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_init
------------[ cut here ]------------
[  184.389801] WARNING: CPU: 1 PID: 2814 at drivers/gpu/drm/drm_framebuffer.c:867 drm_framebuffer_init+0x2f4/0x384
[  184.399993] Modules linked in:
[  184.403106] CPU: 1 UID: 0 PID: 2814 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  184.403137] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  184.403167] Hardware name: Generic DRA74X (Flattened Device Tree)
[  184.403167] Call trace: 
[  184.403167]  unwind_backtrace from show_stack+0x18/0x1c
[  184.403198]  show_stack from dump_stack_lvl+0x70/0x90
[  184.403228]  dump_stack_lvl from __warn+0x154/0x2e0
[  184.403259]  __warn from warn_slowpath_fmt+0x24c/0x258
[  184.403259]  warn_slowpath_fmt from drm_framebuffer_init+0x2f4/0x384
[  184.403289]  drm_framebuffer_init from drm_test_framebuffer_init_bad_format+0x110/0x24c
[  184.403320]  drm_test_framebuffer_init_bad_format from kunit_try_run_case+0x22c/0x5a8
[  184.403350]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  184.403381]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  184.403381]  kthread from ret_from_fork+0x14/0x20
[  184.403411] Exception stack(0xf208bfb0 to 0xf208bff8)
[  184.403411] bfa0:                                     00000000 00000000 00000000 00000000
[  184.403442] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  184.403442] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  184.403472] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_framebuffer-drm_framebuffer_free
------------[ cut here ]------------
[  184.224517] WARNING: CPU: 1 PID: 2810 at drivers/gpu/drm/drm_framebuffer.c:832 drm_framebuffer_free+0x1e0/0x28c
[  184.234771] drm-kunit-mock-device drm_test_framebuffer_free.drm-kunit-mock-device: [drm] drm_WARN_ON(!list_empty(&fb->filp_head))
[  184.234802] Modules linked in:
[  184.249603] CPU: 1 UID: 0 PID: 2810 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  184.249633] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  184.249664] Hardware name: Generic DRA74X (Flattened Device Tree)
[  184.249664] Call trace: 
[  184.249664]  unwind_backtrace from show_stack+0x18/0x1c
[  184.249694]  show_stack from dump_stack_lvl+0x70/0x90
[  184.249725]  dump_stack_lvl from __warn+0x154/0x2e0
[  184.249755]  __warn from warn_slowpath_fmt+0x200/0x258
[  184.249786]  warn_slowpath_fmt from drm_framebuffer_free+0x1e0/0x28c
[  184.249786]  drm_framebuffer_free from drm_test_framebuffer_free+0x1fc/0x5b8
[  184.249816]  drm_test_framebuffer_free from kunit_try_run_case+0x22c/0x5a8
[  184.249847]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  184.249877]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  184.249908]  kthread from ret_from_fork+0x14/0x20
[  184.249908] Exception stack(0xf182bfb0 to 0xf182bff8)
[  184.249938] bfa0:                                     00000000 00000000 00000000 00000000
[  184.249938] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  184.249938] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  184.249969] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_dynamic_register
------------[ cut here ]------------
[  180.823913] WARNING: CPU: 1 PID: 2248 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c
[  180.834991] Modules linked in:
[  180.838104] CPU: 1 UID: 0 PID: 2248 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  180.838104] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  180.838134] Hardware name: Generic DRA74X (Flattened Device Tree)
[  180.838134] Call trace: 
[  180.838134]  unwind_backtrace from show_stack+0x18/0x1c
[  180.838165]  show_stack from dump_stack_lvl+0x70/0x90
[  180.838195]  dump_stack_lvl from __warn+0x154/0x2e0
[  180.838226]  __warn from warn_slowpath_fmt+0x24c/0x258
[  180.838226]  warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c
[  180.838256]  drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_no_init+0x12c/0x2c4
[  180.838287]  drm_test_drm_connector_dynamic_register_no_init from kunit_try_run_case+0x22c/0x5a8
[  180.838317]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  180.838348]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  180.838348]  kthread from ret_from_fork+0x14/0x20
[  180.838378] Exception stack(0xf6d0bfb0 to 0xf6d0bff8)
[  180.838378] bfa0:                                     00000000 00000000 00000000 00000000
[  180.838409] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  180.838409] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  180.838439] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  180.539215] WARNING: CPU: 1 PID: 2240 at drivers/gpu/drm/drm_connector.c:861 drm_connector_dynamic_register+0x11c/0x14c
[  180.550201] Modules linked in:
[  180.553344] CPU: 1 UID: 0 PID: 2240 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  180.553375] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  180.553375] Hardware name: Generic DRA74X (Flattened Device Tree)
[  180.553375] Call trace: 
[  180.553405]  unwind_backtrace from show_stack+0x18/0x1c
[  180.553436]  show_stack from dump_stack_lvl+0x70/0x90
[  180.553466]  dump_stack_lvl from __warn+0x154/0x2e0
[  180.553497]  __warn from warn_slowpath_fmt+0x24c/0x258
[  180.553527]  warn_slowpath_fmt from drm_connector_dynamic_register+0x11c/0x14c
[  180.553558]  drm_connector_dynamic_register from drm_test_drm_connector_dynamic_register_early_no_init+0x12c/0x2c4
[  180.553588]  drm_test_drm_connector_dynamic_register_early_no_init from kunit_try_run_case+0x22c/0x5a8
[  180.553619]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  180.553649]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  180.553680]  kthread from ret_from_fork+0x14/0x20
[  180.553710] Exception stack(0xf6cf3fb0 to 0xf6cf3ff8)
[  180.553710] 3fa0:                                     00000000 00000000 00000000 00000000
[  180.553741] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  180.553741] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  180.553771] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-driversgpudrmdrm_connector-drm_connector_init_only
------------[ cut here ]------------
[  177.606109] WARNING: CPU: 0 PID: 1838 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  177.616821] Modules linked in:
[  177.619934] CPU: 0 UID: 0 PID: 1838 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  177.619964] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  177.619964] Hardware name: Generic DRA74X (Flattened Device Tree)
[  177.619964] Call trace: 
[  177.619995]  unwind_backtrace from show_stack+0x18/0x1c
[  177.620025]  show_stack from dump_stack_lvl+0x70/0x90
[  177.620056]  dump_stack_lvl from __warn+0x154/0x2e0
[  177.620086]  __warn from warn_slowpath_fmt+0x24c/0x258
[  177.620117]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  177.620147]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  177.620147]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  177.620178]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  177.620208]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  177.620239]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  177.620269]  kthread from ret_from_fork+0x14/0x20
[  177.620300] Exception stack(0xf655bfb0 to 0xf655bff8)
[  177.620300] bfa0:                                     00000000 00000000 00000000 00000000
[  177.620330] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  177.620361] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  177.620361] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  176.974151] WARNING: CPU: 0 PID: 1830 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  176.984893] Modules linked in:
[  176.988006] CPU: 0 UID: 0 PID: 1830 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  176.988037] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  176.988037] Hardware name: Generic DRA74X (Flattened Device Tree)
[  176.988037] Call trace: 
[  176.988067]  unwind_backtrace from show_stack+0x18/0x1c
[  176.988098]  show_stack from dump_stack_lvl+0x70/0x90
[  176.988098]  dump_stack_lvl from __warn+0x154/0x2e0
[  176.988128]  __warn from warn_slowpath_fmt+0x24c/0x258
[  176.988159]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  176.988189]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  176.988189]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  176.988220]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  176.988250]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  176.988281]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  176.988281]  kthread from ret_from_fork+0x14/0x20
[  176.988311] Exception stack(0xf6523fb0 to 0xf6523ff8)
[  176.988311] 3fa0:                                     00000000 00000000 00000000 00000000
[  176.988342] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  176.988342] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  176.988342] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  177.139343] WARNING: CPU: 0 PID: 1832 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  177.149749] Modules linked in:
[  177.152923] CPU: 0 UID: 0 PID: 1832 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  177.152954] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  177.152954] Hardware name: Generic DRA74X (Flattened Device Tree)
[  177.152954] Call trace: 
[  177.152984]  unwind_backtrace from show_stack+0x18/0x1c
[  177.153015]  show_stack from dump_stack_lvl+0x70/0x90
[  177.153045]  dump_stack_lvl from __warn+0x154/0x2e0
[  177.153076]  __warn from warn_slowpath_fmt+0x24c/0x258
[  177.153106]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  177.153137]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  177.153137]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  177.153167]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  177.153198]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  177.153228]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  177.153259]  kthread from ret_from_fork+0x14/0x20
[  177.153289] Exception stack(0xf6533fb0 to 0xf6533ff8)
[  177.153320] 3fa0:                                     00000000 00000000 00000000 00000000
[  177.153320] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  177.153350] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  177.153350] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  177.450653] WARNING: CPU: 0 PID: 1836 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  177.461364] Modules linked in:
[  177.464752] CPU: 0 UID: 0 PID: 1836 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  177.464782] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  177.464782] Hardware name: Generic DRA74X (Flattened Device Tree)
[  177.464813] Call trace: 
[  177.464813]  unwind_backtrace from show_stack+0x18/0x1c
[  177.464843]  show_stack from dump_stack_lvl+0x70/0x90
[  177.464874]  dump_stack_lvl from __warn+0x154/0x2e0
[  177.464904]  __warn from warn_slowpath_fmt+0x24c/0x258
[  177.464935]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  177.464935]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  177.464965]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  177.464996]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  177.465026]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  177.465057]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  177.465087]  kthread from ret_from_fork+0x14/0x20
[  177.465118] Exception stack(0xf654bfb0 to 0xf654bff8)
[  177.465118] bfa0:                                     00000000 00000000 00000000 00000000
[  177.465148] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  177.465148] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  177.465179] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[  177.294464] WARNING: CPU: 0 PID: 1834 at drivers/gpu/drm/drm_connector.c:233 drm_connector_init_only+0x238/0x1308
[  177.305206] Modules linked in:
[  177.308319] CPU: 0 UID: 0 PID: 1834 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  177.308349] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  177.308349] Hardware name: Generic DRA74X (Flattened Device Tree)
[  177.308380] Call trace: 
[  177.308380]  unwind_backtrace from show_stack+0x18/0x1c
[  177.308410]  show_stack from dump_stack_lvl+0x70/0x90
[  177.308441]  dump_stack_lvl from __warn+0x154/0x2e0
[  177.308471]  __warn from warn_slowpath_fmt+0x24c/0x258
[  177.308502]  warn_slowpath_fmt from drm_connector_init_only+0x238/0x1308
[  177.308532]  drm_connector_init_only from drmm_connector_init+0x158/0x218
[  177.308563]  drmm_connector_init from drm_client_modeset_test_init+0x3b4/0x704
[  177.308593]  drm_client_modeset_test_init from kunit_try_run_case+0x1e0/0x5a8
[  177.308624]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  177.308654]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  177.308685]  kthread from ret_from_fork+0x14/0x20
[  177.308715] Exception stack(0xf6543fb0 to 0xf6543ff8)
[  177.308715] 3fa0:                                     00000000 00000000 00000000 00000000
[  177.308746] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  177.308746] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  177.308776] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-kerneltraceftrace-ftrace_bug
------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at kernel/trace/ftrace.c:2213 ftrace_bug+0x548/0x5b8
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W           6.15.0-next-20250530 #1 NONE 
[    0.000000] Tainted: [W]=WARN
[    0.000000] Hardware name: Generic DRA74X (Flattened Device Tree)
[    0.000000] Call trace: 
[    0.000000]  unwind_backtrace from show_stack+0x18/0x1c
[    0.000000]  show_stack from dump_stack_lvl+0x70/0x90
[    0.000000]  dump_stack_lvl from __warn+0x154/0x2e0
[    0.000000]  __warn from warn_slowpath_fmt+0x24c/0x258
[    0.000000]  warn_slowpath_fmt from ftrace_bug+0x548/0x5b8
[    0.000000]  ftrace_bug from ftrace_process_locs+0xe88/0xeb0
[    0.000000]  ftrace_process_locs from ftrace_init+0x6c/0x140
[    0.000000]  ftrace_init from start_kernel+0x1a8/0x3bc
[    0.000000]  start_kernel from 0x0
[    0.000000] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-archarmkernelinsn-__arm_gen_branch
------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at arch/arm/kernel/insn.c:48 __arm_gen_branch+0x74/0x7c
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.15.0-next-20250530 #1 NONE 
[    0.000000] Hardware name: Generic DRA74X (Flattened Device Tree)
[    0.000000] Call trace: 
[    0.000000]  unwind_backtrace from show_stack+0x18/0x1c
[    0.000000]  show_stack from dump_stack_lvl+0x70/0x90
[    0.000000]  dump_stack_lvl from __warn+0x154/0x2e0
[    0.000000]  __warn from warn_slowpath_fmt+0x24c/0x258
[    0.000000]  warn_slowpath_fmt from __arm_gen_branch+0x74/0x7c
[    0.000000]  __arm_gen_branch from ftrace_make_nop+0x10c/0x24c
[    0.000000]  ftrace_make_nop from ftrace_process_locs+0x490/0xeb0
[    0.000000]  ftrace_process_locs from ftrace_init+0x6c/0x140
[    0.000000]  ftrace_init from start_kernel+0x1a8/0x3bc
[    0.000000]  start_kernel from 0x0
[    0.000000] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - uboot-action
(no logs available)
Failure - lava - uboot-commands
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)