Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   81.858337] ==================================================================
[   81.865600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0
[   81.873046] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.879730] 
[   81.881225] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.881256] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.881256] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.881286] Call trace: 
[   81.881286]  unwind_backtrace from show_stack+0x18/0x1c
[   81.881317]  show_stack from dump_stack_lvl+0x70/0x90
[   81.881317]  dump_stack_lvl from print_report+0x158/0x528
[   81.881347]  print_report from kasan_report+0xdc/0x118
[   81.881378]  kasan_report from kasan_check_range+0x14c/0x198
[   81.881408]  kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0
[   81.881439]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.881439]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.881469]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.881500]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.881530]  kthread from ret_from_fork+0x14/0x20
[   81.881561] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.881561] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.881591] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.881591] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.881622] 
[   81.998718] Allocated by task 321:
[   82.002136]  kasan_save_track+0x30/0x5c
[   82.006011]  __kasan_kmalloc+0x8c/0x94
[   82.009796]  kasan_atomics+0xc0/0x33c
[   82.013488]  kunit_try_run_case+0x22c/0x5a8
[   82.017700]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.023223]  kthread+0x464/0x810
[   82.026489]  ret_from_fork+0x14/0x20
[   82.030090] 
[   82.031616] The buggy address belongs to the object at cc23e880
[   82.031616]  which belongs to the cache kmalloc-64 of size 64
[   82.043334] The buggy address is located 0 bytes to the right of
[   82.043334]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.054870] 
[   82.056396] The buggy address belongs to the physical page:
[   82.061981] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.069274] flags: 0x0(zone=0)
[   82.072357] page_type: f5(slab)
[   82.075500] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.083648] raw: 00000000
[   82.086303] page dumped because: kasan: bad access detected
[   82.091918] 
[   82.093414] Memory state around the buggy address:
[   82.098236]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.104797]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.111389] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.117950]                              ^
[   82.122070]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.128662]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.135223] ==================================================================
[   83.267395] ==================================================================
[   83.274658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0
[   83.282104] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.288879] 
[   83.290374] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.290405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.290405] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.290435] Call trace: 
[   83.290435]  unwind_backtrace from show_stack+0x18/0x1c
[   83.290466]  show_stack from dump_stack_lvl+0x70/0x90
[   83.290466]  dump_stack_lvl from print_report+0x158/0x528
[   83.290496]  print_report from kasan_report+0xdc/0x118
[   83.290527]  kasan_report from kasan_check_range+0x14c/0x198
[   83.290557]  kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0
[   83.290588]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.290588]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.290618]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.290649]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.290679]  kthread from ret_from_fork+0x14/0x20
[   83.290710] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.290710] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.290740] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.290740] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.290771] 
[   83.407867] Allocated by task 321:
[   83.411285]  kasan_save_track+0x30/0x5c
[   83.415161]  __kasan_kmalloc+0x8c/0x94
[   83.418945]  kasan_atomics+0xc0/0x33c
[   83.422637]  kunit_try_run_case+0x22c/0x5a8
[   83.426849]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.432403]  kthread+0x464/0x810
[   83.435638]  ret_from_fork+0x14/0x20
[   83.439239] 
[   83.440765] The buggy address belongs to the object at cc23e880
[   83.440765]  which belongs to the cache kmalloc-64 of size 64
[   83.452484] The buggy address is located 0 bytes to the right of
[   83.452484]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.464019] 
[   83.465545] The buggy address belongs to the physical page:
[   83.471130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.478424] flags: 0x0(zone=0)
[   83.481506] page_type: f5(slab)
[   83.484680] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.492797] raw: 00000000
[   83.495452] page dumped because: kasan: bad access detected
[   83.501068] 
[   83.502563] Memory state around the buggy address:
[   83.507385]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.513946]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.520538] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.527099]                              ^
[   83.531219]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.537811]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.544372] ==================================================================
[   75.062286] ==================================================================
[   75.069549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0
[   75.076904] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.083648] 
[   75.085174] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.085205] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.085205] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.085205] Call trace: 
[   75.085235]  unwind_backtrace from show_stack+0x18/0x1c
[   75.085235]  show_stack from dump_stack_lvl+0x70/0x90
[   75.085266]  dump_stack_lvl from print_report+0x158/0x528
[   75.085296]  print_report from kasan_report+0xdc/0x118
[   75.085327]  kasan_report from kasan_check_range+0x14c/0x198
[   75.085357]  kasan_check_range from kasan_atomics_helper+0x648/0x5ab0
[   75.085357]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.085388]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.085418]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.085449]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.085479]  kthread from ret_from_fork+0x14/0x20
[   75.085510] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.085510] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.085540] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.085540] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.085571] 
[   75.202575] Allocated by task 321:
[   75.205993]  kasan_save_track+0x30/0x5c
[   75.209869]  __kasan_kmalloc+0x8c/0x94
[   75.213653]  kasan_atomics+0xc0/0x33c
[   75.217346]  kunit_try_run_case+0x22c/0x5a8
[   75.221557]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.227111]  kthread+0x464/0x810
[   75.230346]  ret_from_fork+0x14/0x20
[   75.233947] 
[   75.235473] The buggy address belongs to the object at cc23e880
[   75.235473]  which belongs to the cache kmalloc-64 of size 64
[   75.247192] The buggy address is located 0 bytes to the right of
[   75.247192]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.258728] 
[   75.260253] The buggy address belongs to the physical page:
[   75.265838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.273132] flags: 0x0(zone=0)
[   75.276214] page_type: f5(slab)
[   75.279388] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.287536] raw: 00000000
[   75.290161] page dumped because: kasan: bad access detected
[   75.295776] 
[   75.297271] Memory state around the buggy address:
[   75.302093]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.308685]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315246] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.321807]                              ^
[   75.325927]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.332519]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.339080] ==================================================================
[   79.886871] ==================================================================
[   79.894134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0
[   79.901611] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.908355] 
[   79.909851] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.909881] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.909881] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.909912] Call trace: 
[   79.909912]  unwind_backtrace from show_stack+0x18/0x1c
[   79.909942]  show_stack from dump_stack_lvl+0x70/0x90
[   79.909973]  dump_stack_lvl from print_report+0x158/0x528
[   79.910003]  print_report from kasan_report+0xdc/0x118
[   79.910003]  kasan_report from kasan_check_range+0x14c/0x198
[   79.910034]  kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0
[   79.910064]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.910095]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.910125]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.910125]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.910156]  kthread from ret_from_fork+0x14/0x20
[   79.910186] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.910186] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.910217] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.910247] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.910247] 
[   80.027343] Allocated by task 321:
[   80.030792]  kasan_save_track+0x30/0x5c
[   80.034667]  __kasan_kmalloc+0x8c/0x94
[   80.038452]  kasan_atomics+0xc0/0x33c
[   80.042144]  kunit_try_run_case+0x22c/0x5a8
[   80.046356]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.051879]  kthread+0x464/0x810
[   80.055145]  ret_from_fork+0x14/0x20
[   80.058746] 
[   80.060241] The buggy address belongs to the object at cc23e880
[   80.060241]  which belongs to the cache kmalloc-64 of size 64
[   80.071960] The buggy address is located 0 bytes to the right of
[   80.071960]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.083526] 
[   80.085021] The buggy address belongs to the physical page:
[   80.090637] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.097900] flags: 0x0(zone=0)
[   80.100982] page_type: f5(slab)
[   80.104156] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.112304] raw: 00000000
[   80.114929] page dumped because: kasan: bad access detected
[   80.120544] 
[   80.122039] Memory state around the buggy address:
[   80.126861]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.133453]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.140014] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.146575]                              ^
[   80.150726]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.157287]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.163848] ==================================================================
[   73.937713] ==================================================================
[   73.945007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0
[   73.952453] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.959106] 
[   73.960632] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.960632] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.960662] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.960662] Call trace: 
[   73.960662]  unwind_backtrace from show_stack+0x18/0x1c
[   73.960693]  show_stack from dump_stack_lvl+0x70/0x90
[   73.960723]  dump_stack_lvl from print_report+0x158/0x528
[   73.960754]  print_report from kasan_report+0xdc/0x118
[   73.960784]  kasan_report from kasan_atomics_helper+0x5200/0x5ab0
[   73.960815]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.960815]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.960845]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.960876]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.960906]  kthread from ret_from_fork+0x14/0x20
[   73.960937] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.960937] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.960968] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.960968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.960998] 
[   74.071990] Allocated by task 321:
[   74.075408]  kasan_save_track+0x30/0x5c
[   74.079284]  __kasan_kmalloc+0x8c/0x94
[   74.083068]  kasan_atomics+0xc0/0x33c
[   74.086761]  kunit_try_run_case+0x22c/0x5a8
[   74.090972]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.096496]  kthread+0x464/0x810
[   74.099761]  ret_from_fork+0x14/0x20
[   74.103363] 
[   74.104858] The buggy address belongs to the object at cc23e880
[   74.104858]  which belongs to the cache kmalloc-64 of size 64
[   74.116607] The buggy address is located 0 bytes to the right of
[   74.116607]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.128143] 
[   74.129638] The buggy address belongs to the physical page:
[   74.135253] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.142517] flags: 0x0(zone=0)
[   74.145599] page_type: f5(slab)
[   74.148773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.156921] raw: 00000000
[   74.159545] page dumped because: kasan: bad access detected
[   74.165161] 
[   74.166687] Memory state around the buggy address:
[   74.171508]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.178070]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.184631] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.191223]                              ^
[   74.195343]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.201904]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.208496] ==================================================================
[   82.142547] ==================================================================
[   82.149810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0
[   82.157287] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.163940] 
[   82.165435] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.165466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.165466] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.165496] Call trace: 
[   82.165496]  unwind_backtrace from show_stack+0x18/0x1c
[   82.165527]  show_stack from dump_stack_lvl+0x70/0x90
[   82.165557]  dump_stack_lvl from print_report+0x158/0x528
[   82.165588]  print_report from kasan_report+0xdc/0x118
[   82.165588]  kasan_report from kasan_atomics_helper+0x52e4/0x5ab0
[   82.165618]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.165649]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.165679]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.165710]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.165710]  kthread from ret_from_fork+0x14/0x20
[   82.165740] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.165771] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.165771] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.165802] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.165802] 
[   82.276794] Allocated by task 321:
[   82.280212]  kasan_save_track+0x30/0x5c
[   82.284088]  __kasan_kmalloc+0x8c/0x94
[   82.287872]  kasan_atomics+0xc0/0x33c
[   82.291564]  kunit_try_run_case+0x22c/0x5a8
[   82.295776]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.301330]  kthread+0x464/0x810
[   82.304565]  ret_from_fork+0x14/0x20
[   82.308197] 
[   82.309692] The buggy address belongs to the object at cc23e880
[   82.309692]  which belongs to the cache kmalloc-64 of size 64
[   82.321411] The buggy address is located 0 bytes to the right of
[   82.321411]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.332946] 
[   82.334472] The buggy address belongs to the physical page:
[   82.340057] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.347351] flags: 0x0(zone=0)
[   82.350433] page_type: f5(slab)
[   82.353576] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.361724] raw: 00000000
[   82.364379] page dumped because: kasan: bad access detected
[   82.369995] 
[   82.371490] Memory state around the buggy address:
[   82.376312]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.382873]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.389465] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.396026]                              ^
[   82.400146]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.406738]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.413299] ==================================================================
[   77.051239] ==================================================================
[   77.058502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0
[   77.065887] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.072631] 
[   77.074127] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.074157] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.074157] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.074188] Call trace: 
[   77.074188]  unwind_backtrace from show_stack+0x18/0x1c
[   77.074218]  show_stack from dump_stack_lvl+0x70/0x90
[   77.074249]  dump_stack_lvl from print_report+0x158/0x528
[   77.074279]  print_report from kasan_report+0xdc/0x118
[   77.074279]  kasan_report from kasan_check_range+0x14c/0x198
[   77.074310]  kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0
[   77.074340]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.074371]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.074401]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.074401]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.074432]  kthread from ret_from_fork+0x14/0x20
[   77.074462] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.074462] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.074493] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.074523] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.074523] 
[   77.191528] Allocated by task 321:
[   77.194976]  kasan_save_track+0x30/0x5c
[   77.198822]  __kasan_kmalloc+0x8c/0x94
[   77.202606]  kasan_atomics+0xc0/0x33c
[   77.206298]  kunit_try_run_case+0x22c/0x5a8
[   77.210540]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.216064]  kthread+0x464/0x810
[   77.219329]  ret_from_fork+0x14/0x20
[   77.222930] 
[   77.224426] The buggy address belongs to the object at cc23e880
[   77.224426]  which belongs to the cache kmalloc-64 of size 64
[   77.236145] The buggy address is located 0 bytes to the right of
[   77.236145]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.247711] 
[   77.249206] The buggy address belongs to the physical page:
[   77.254821] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.262084] flags: 0x0(zone=0)
[   77.265167] page_type: f5(slab)
[   77.268341] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.276489] raw: 00000000
[   77.279113] page dumped because: kasan: bad access detected
[   77.284729] 
[   77.286224] Memory state around the buggy address:
[   77.291046]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297637]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.304199] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.310760]                              ^
[   77.314910]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.321472]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.328033] ==================================================================
[   85.257537] ==================================================================
[   85.264801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0
[   85.272247] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.278991] 
[   85.280517] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.280548] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.280548] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.280548] Call trace: 
[   85.280578]  unwind_backtrace from show_stack+0x18/0x1c
[   85.280578]  show_stack from dump_stack_lvl+0x70/0x90
[   85.280609]  dump_stack_lvl from print_report+0x158/0x528
[   85.280639]  print_report from kasan_report+0xdc/0x118
[   85.280670]  kasan_report from kasan_check_range+0x14c/0x198
[   85.280700]  kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0
[   85.280700]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.280731]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.280761]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.280792]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.280822]  kthread from ret_from_fork+0x14/0x20
[   85.280822] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.280853] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.280883] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.280883] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.280914] 
[   85.398010] Allocated by task 321:
[   85.401428]  kasan_save_track+0x30/0x5c
[   85.405303]  __kasan_kmalloc+0x8c/0x94
[   85.409088]  kasan_atomics+0xc0/0x33c
[   85.412780]  kunit_try_run_case+0x22c/0x5a8
[   85.416992]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.422515]  kthread+0x464/0x810
[   85.425781]  ret_from_fork+0x14/0x20
[   85.429382] 
[   85.430877] The buggy address belongs to the object at cc23e880
[   85.430877]  which belongs to the cache kmalloc-64 of size 64
[   85.442626] The buggy address is located 0 bytes to the right of
[   85.442626]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.454162] 
[   85.455657] The buggy address belongs to the physical page:
[   85.461273] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.468536] flags: 0x0(zone=0)
[   85.471618] page_type: f5(slab)
[   85.474792] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.482940] raw: 00000000
[   85.485595] page dumped because: kasan: bad access detected
[   85.491180] 
[   85.492706] Memory state around the buggy address:
[   85.497528]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.504089]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.510650] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.517242]                              ^
[   85.521362]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.527923]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.534515] ==================================================================
[   77.903656] ==================================================================
[   77.910949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0
[   77.918304] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.925048] 
[   77.926544] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.926574] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.926605] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.926605] Call trace: 
[   77.926605]  unwind_backtrace from show_stack+0x18/0x1c
[   77.926635]  show_stack from dump_stack_lvl+0x70/0x90
[   77.926666]  dump_stack_lvl from print_report+0x158/0x528
[   77.926696]  print_report from kasan_report+0xdc/0x118
[   77.926727]  kasan_report from kasan_check_range+0x14c/0x198
[   77.926727]  kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0
[   77.926757]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.926788]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.926818]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.926849]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.926879]  kthread from ret_from_fork+0x14/0x20
[   77.926879] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.926910] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.926910] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.926940] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.926940] 
[   78.043975] Allocated by task 321:
[   78.047393]  kasan_save_track+0x30/0x5c
[   78.051269]  __kasan_kmalloc+0x8c/0x94
[   78.055053]  kasan_atomics+0xc0/0x33c
[   78.058746]  kunit_try_run_case+0x22c/0x5a8
[   78.062957]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.068481]  kthread+0x464/0x810
[   78.071746]  ret_from_fork+0x14/0x20
[   78.075347] 
[   78.076843] The buggy address belongs to the object at cc23e880
[   78.076843]  which belongs to the cache kmalloc-64 of size 64
[   78.088592] The buggy address is located 0 bytes to the right of
[   78.088592]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.100128] 
[   78.101623] The buggy address belongs to the physical page:
[   78.107238] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.114532] flags: 0x0(zone=0)
[   78.117584] page_type: f5(slab)
[   78.120758] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.128906] raw: 00000000
[   78.131561] page dumped because: kasan: bad access detected
[   78.137145] 
[   78.138671] Memory state around the buggy address:
[   78.143493]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.150054]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.156616] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.163208]                              ^
[   78.167327]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.173889]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.180480] ==================================================================
[   80.171173] ==================================================================
[   80.178466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0
[   80.185913] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.192657] 
[   80.194152] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.194183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.194183] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.194213] Call trace: 
[   80.194213]  unwind_backtrace from show_stack+0x18/0x1c
[   80.194244]  show_stack from dump_stack_lvl+0x70/0x90
[   80.194274]  dump_stack_lvl from print_report+0x158/0x528
[   80.194305]  print_report from kasan_report+0xdc/0x118
[   80.194305]  kasan_report from kasan_check_range+0x14c/0x198
[   80.194335]  kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0
[   80.194366]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.194396]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.194427]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.194427]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.194458]  kthread from ret_from_fork+0x14/0x20
[   80.194488] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.194488] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.194519] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.194549] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.194549] 
[   80.311645] Allocated by task 321:
[   80.315093]  kasan_save_track+0x30/0x5c
[   80.318939]  __kasan_kmalloc+0x8c/0x94
[   80.322723]  kasan_atomics+0xc0/0x33c
[   80.326416]  kunit_try_run_case+0x22c/0x5a8
[   80.330657]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.336181]  kthread+0x464/0x810
[   80.339447]  ret_from_fork+0x14/0x20
[   80.343048] 
[   80.344543] The buggy address belongs to the object at cc23e880
[   80.344543]  which belongs to the cache kmalloc-64 of size 64
[   80.356262] The buggy address is located 0 bytes to the right of
[   80.356262]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.367828] 
[   80.369323] The buggy address belongs to the physical page:
[   80.374938] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.382202] flags: 0x0(zone=0)
[   80.385284] page_type: f5(slab)
[   80.388458] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.396606] raw: 00000000
[   80.399230] page dumped because: kasan: bad access detected
[   80.404846] 
[   80.406341] Memory state around the buggy address:
[   80.411163]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.417755]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.424316] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.430877]                              ^
[   80.435028]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.441589]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.448150] ==================================================================
[   86.957092] ==================================================================
[   86.964355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0
[   86.971801] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.978546] 
[   86.980072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.980102] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.980102] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.980102] Call trace: 
[   86.980133]  unwind_backtrace from show_stack+0x18/0x1c
[   86.980163]  show_stack from dump_stack_lvl+0x70/0x90
[   86.980163]  dump_stack_lvl from print_report+0x158/0x528
[   86.980194]  print_report from kasan_report+0xdc/0x118
[   86.980224]  kasan_report from kasan_check_range+0x14c/0x198
[   86.980255]  kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0
[   86.980285]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.980285]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.980316]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.980346]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.980377]  kthread from ret_from_fork+0x14/0x20
[   86.980407] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.980407] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.980438] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.980438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.980468] 
[   87.097564] Allocated by task 321:
[   87.100982]  kasan_save_track+0x30/0x5c
[   87.104858]  __kasan_kmalloc+0x8c/0x94
[   87.108642]  kasan_atomics+0xc0/0x33c
[   87.112335]  kunit_try_run_case+0x22c/0x5a8
[   87.116546]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.122070]  kthread+0x464/0x810
[   87.125335]  ret_from_fork+0x14/0x20
[   87.128936] 
[   87.130432] The buggy address belongs to the object at cc23e880
[   87.130432]  which belongs to the cache kmalloc-64 of size 64
[   87.142150] The buggy address is located 0 bytes to the right of
[   87.142150]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.153717] 
[   87.155212] The buggy address belongs to the physical page:
[   87.160827] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.168090] flags: 0x0(zone=0)
[   87.171173] page_type: f5(slab)
[   87.174346] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.182495] raw: 00000000
[   87.185150] page dumped because: kasan: bad access detected
[   87.190734] 
[   87.192230] Memory state around the buggy address:
[   87.197082]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.203643]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.210205] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.216766]                              ^
[   87.220916]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.227478]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.234039] ==================================================================
[   85.826110] ==================================================================
[   85.833404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0
[   85.840850] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.847595] 
[   85.849090] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.849121] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.849121] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.849151] Call trace: 
[   85.849151]  unwind_backtrace from show_stack+0x18/0x1c
[   85.849182]  show_stack from dump_stack_lvl+0x70/0x90
[   85.849212]  dump_stack_lvl from print_report+0x158/0x528
[   85.849243]  print_report from kasan_report+0xdc/0x118
[   85.849243]  kasan_report from kasan_check_range+0x14c/0x198
[   85.849273]  kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0
[   85.849304]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.849334]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.849365]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.849365]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.849395]  kthread from ret_from_fork+0x14/0x20
[   85.849426] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.849426] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.849456] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.849487] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.849487] 
[   85.966583] Allocated by task 321:
[   85.970031]  kasan_save_track+0x30/0x5c
[   85.973876]  __kasan_kmalloc+0x8c/0x94
[   85.977661]  kasan_atomics+0xc0/0x33c
[   85.981353]  kunit_try_run_case+0x22c/0x5a8
[   85.985595]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.991119]  kthread+0x464/0x810
[   85.994354]  ret_from_fork+0x14/0x20
[   85.997985] 
[   85.999481] The buggy address belongs to the object at cc23e880
[   85.999481]  which belongs to the cache kmalloc-64 of size 64
[   86.011199] The buggy address is located 0 bytes to the right of
[   86.011199]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.022766] 
[   86.024261] The buggy address belongs to the physical page:
[   86.029876] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.037139] flags: 0x0(zone=0)
[   86.040222] page_type: f5(slab)
[   86.043395] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.051513] raw: 00000000
[   86.054168] page dumped because: kasan: bad access detected
[   86.059783] 
[   86.061279] Memory state around the buggy address:
[   86.066101]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.072662]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.079254] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.085815]                              ^
[   86.089935]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.096527]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.103088] ==================================================================
[   79.602569] ==================================================================
[   79.609832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0
[   79.617279] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.624023] 
[   79.625549] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.625579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.625579] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.625579] Call trace: 
[   79.625610]  unwind_backtrace from show_stack+0x18/0x1c
[   79.625640]  show_stack from dump_stack_lvl+0x70/0x90
[   79.625640]  dump_stack_lvl from print_report+0x158/0x528
[   79.625671]  print_report from kasan_report+0xdc/0x118
[   79.625701]  kasan_report from kasan_check_range+0x14c/0x198
[   79.625732]  kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0
[   79.625762]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.625762]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.625793]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.625823]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.625854]  kthread from ret_from_fork+0x14/0x20
[   79.625885] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.625885] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.625915] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.625915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.625946] 
[   79.743041] Allocated by task 321:
[   79.746459]  kasan_save_track+0x30/0x5c
[   79.750335]  __kasan_kmalloc+0x8c/0x94
[   79.754119]  kasan_atomics+0xc0/0x33c
[   79.757812]  kunit_try_run_case+0x22c/0x5a8
[   79.762023]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.767578]  kthread+0x464/0x810
[   79.770812]  ret_from_fork+0x14/0x20
[   79.774414] 
[   79.775939] The buggy address belongs to the object at cc23e880
[   79.775939]  which belongs to the cache kmalloc-64 of size 64
[   79.787658] The buggy address is located 0 bytes to the right of
[   79.787658]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.799194] 
[   79.800720] The buggy address belongs to the physical page:
[   79.806304] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.813598] flags: 0x0(zone=0)
[   79.816680] page_type: f5(slab)
[   79.819824] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.827972] raw: 00000000
[   79.830627] page dumped because: kasan: bad access detected
[   79.836242] 
[   79.837738] Memory state around the buggy address:
[   79.842559]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.849121]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.855712] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.862274]                              ^
[   79.866394]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.872985]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.879547] ==================================================================
[   87.809936] ==================================================================
[   87.817230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0
[   87.824676] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.831420] 
[   87.832916] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.832946] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.832946] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.832977] Call trace: 
[   87.832977]  unwind_backtrace from show_stack+0x18/0x1c
[   87.833007]  show_stack from dump_stack_lvl+0x70/0x90
[   87.833038]  dump_stack_lvl from print_report+0x158/0x528
[   87.833068]  print_report from kasan_report+0xdc/0x118
[   87.833068]  kasan_report from kasan_check_range+0x14c/0x198
[   87.833099]  kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0
[   87.833129]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.833160]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.833190]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.833190]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.833221]  kthread from ret_from_fork+0x14/0x20
[   87.833251] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.833251] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.833282] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.833312] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.833312] 
[   87.950408] Allocated by task 321:
[   87.953857]  kasan_save_track+0x30/0x5c
[   87.957702]  __kasan_kmalloc+0x8c/0x94
[   87.961486]  kasan_atomics+0xc0/0x33c
[   87.965179]  kunit_try_run_case+0x22c/0x5a8
[   87.969421]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.974945]  kthread+0x464/0x810
[   87.978210]  ret_from_fork+0x14/0x20
[   87.981811] 
[   87.983306] The buggy address belongs to the object at cc23e880
[   87.983306]  which belongs to the cache kmalloc-64 of size 64
[   87.995025] The buggy address is located 0 bytes to the right of
[   87.995025]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.006591] 
[   88.008087] The buggy address belongs to the physical page:
[   88.013702] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.020965] flags: 0x0(zone=0)
[   88.024047] page_type: f5(slab)
[   88.027221] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.035369] raw: 00000000
[   88.037994] page dumped because: kasan: bad access detected
[   88.043609] 
[   88.045104] Memory state around the buggy address:
[   88.049926]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.056488]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.063079] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.069641]                              ^
[   88.073760]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.080352]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.086914] ==================================================================
[   86.110412] ==================================================================
[   86.117706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0
[   86.125152] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.131896] 
[   86.133392] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.133422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.133453] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.133453] Call trace: 
[   86.133453]  unwind_backtrace from show_stack+0x18/0x1c
[   86.133483]  show_stack from dump_stack_lvl+0x70/0x90
[   86.133514]  dump_stack_lvl from print_report+0x158/0x528
[   86.133544]  print_report from kasan_report+0xdc/0x118
[   86.133575]  kasan_report from kasan_check_range+0x14c/0x198
[   86.133575]  kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0
[   86.133605]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.133636]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.133666]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.133697]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.133697]  kthread from ret_from_fork+0x14/0x20
[   86.133728] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.133758] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.133758] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.133789] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.133789] 
[   86.250915] Allocated by task 321:
[   86.254333]  kasan_save_track+0x30/0x5c
[   86.258209]  __kasan_kmalloc+0x8c/0x94
[   86.261993]  kasan_atomics+0xc0/0x33c
[   86.265686]  kunit_try_run_case+0x22c/0x5a8
[   86.269897]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.275421]  kthread+0x464/0x810
[   86.278686]  ret_from_fork+0x14/0x20
[   86.282287] 
[   86.283782] The buggy address belongs to the object at cc23e880
[   86.283782]  which belongs to the cache kmalloc-64 of size 64
[   86.295501] The buggy address is located 0 bytes to the right of
[   86.295501]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.307067] 
[   86.308563] The buggy address belongs to the physical page:
[   86.314178] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.321441] flags: 0x0(zone=0)
[   86.324523] page_type: f5(slab)
[   86.327697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.335845] raw: 00000000
[   86.338470] page dumped because: kasan: bad access detected
[   86.344085] 
[   86.345581] Memory state around the buggy address:
[   86.350402]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.356994]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.363555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.370117]                              ^
[   86.374237]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.380828]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.387390] ==================================================================
[   89.225158] ==================================================================
[   89.232421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0
[   89.239898] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.246551] 
[   89.248046] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.248077] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.248107] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.248107] Call trace: 
[   89.248107]  unwind_backtrace from show_stack+0x18/0x1c
[   89.248138]  show_stack from dump_stack_lvl+0x70/0x90
[   89.248168]  dump_stack_lvl from print_report+0x158/0x528
[   89.248199]  print_report from kasan_report+0xdc/0x118
[   89.248199]  kasan_report from kasan_atomics_helper+0x54f4/0x5ab0
[   89.248229]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.248260]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.248291]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.248321]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.248352]  kthread from ret_from_fork+0x14/0x20
[   89.248352] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.248382] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.248382] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.248413] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.248413] 
[   89.359405] Allocated by task 321:
[   89.362823]  kasan_save_track+0x30/0x5c
[   89.366699]  __kasan_kmalloc+0x8c/0x94
[   89.370483]  kasan_atomics+0xc0/0x33c
[   89.374176]  kunit_try_run_case+0x22c/0x5a8
[   89.378387]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.383941]  kthread+0x464/0x810
[   89.387176]  ret_from_fork+0x14/0x20
[   89.390777] 
[   89.392303] The buggy address belongs to the object at cc23e880
[   89.392303]  which belongs to the cache kmalloc-64 of size 64
[   89.404022] The buggy address is located 0 bytes to the right of
[   89.404022]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.415557] 
[   89.417083] The buggy address belongs to the physical page:
[   89.422668] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.429962] flags: 0x0(zone=0)
[   89.433044] page_type: f5(slab)
[   89.436187] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.444335] raw: 00000000
[   89.446990] page dumped because: kasan: bad access detected
[   89.452606] 
[   89.454101] Memory state around the buggy address:
[   89.458923]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.465484]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.472076] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.478637]                              ^
[   89.482757]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.489318]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.495910] ==================================================================
[   88.094238] ==================================================================
[   88.101501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0
[   88.108947] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.115692] 
[   88.117218] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.117248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.117248] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.117279] Call trace: 
[   88.117279]  unwind_backtrace from show_stack+0x18/0x1c
[   88.117309]  show_stack from dump_stack_lvl+0x70/0x90
[   88.117309]  dump_stack_lvl from print_report+0x158/0x528
[   88.117340]  print_report from kasan_report+0xdc/0x118
[   88.117370]  kasan_report from kasan_check_range+0x14c/0x198
[   88.117401]  kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0
[   88.117431]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.117431]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.117462]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.117492]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.117523]  kthread from ret_from_fork+0x14/0x20
[   88.117553] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.117553] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.117584] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.117584] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.117614] 
[   88.234710] Allocated by task 321:
[   88.238128]  kasan_save_track+0x30/0x5c
[   88.242004]  __kasan_kmalloc+0x8c/0x94
[   88.245788]  kasan_atomics+0xc0/0x33c
[   88.249481]  kunit_try_run_case+0x22c/0x5a8
[   88.253692]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.259216]  kthread+0x464/0x810
[   88.262481]  ret_from_fork+0x14/0x20
[   88.266082] 
[   88.267578] The buggy address belongs to the object at cc23e880
[   88.267578]  which belongs to the cache kmalloc-64 of size 64
[   88.279296] The buggy address is located 0 bytes to the right of
[   88.279296]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.290863] 
[   88.292358] The buggy address belongs to the physical page:
[   88.297973] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.305236] flags: 0x0(zone=0)
[   88.308319] page_type: f5(slab)
[   88.311492] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.319641] raw: 00000000
[   88.322265] page dumped because: kasan: bad access detected
[   88.327880] 
[   88.329376] Memory state around the buggy address:
[   88.334197]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.340789]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.347351] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.353912]                              ^
[   88.358062]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.364624]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.371185] ==================================================================
[   81.295959] ==================================================================
[   81.303222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0
[   81.310668] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.317413] 
[   81.318939] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.318969] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.318969] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.318969] Call trace: 
[   81.318969]  unwind_backtrace from show_stack+0x18/0x1c
[   81.319000]  show_stack from dump_stack_lvl+0x70/0x90
[   81.319030]  dump_stack_lvl from print_report+0x158/0x528
[   81.319061]  print_report from kasan_report+0xdc/0x118
[   81.319091]  kasan_report from kasan_check_range+0x14c/0x198
[   81.319091]  kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0
[   81.319122]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.319152]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.319183]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.319213]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.319244]  kthread from ret_from_fork+0x14/0x20
[   81.319244] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.319274] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.319305] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.319305] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.319335] 
[   81.436431] Allocated by task 321:
[   81.439849]  kasan_save_track+0x30/0x5c
[   81.443725]  __kasan_kmalloc+0x8c/0x94
[   81.447509]  kasan_atomics+0xc0/0x33c
[   81.451202]  kunit_try_run_case+0x22c/0x5a8
[   81.455413]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.460937]  kthread+0x464/0x810
[   81.464202]  ret_from_fork+0x14/0x20
[   81.467803] 
[   81.469299] The buggy address belongs to the object at cc23e880
[   81.469299]  which belongs to the cache kmalloc-64 of size 64
[   81.481048] The buggy address is located 0 bytes to the right of
[   81.481048]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.492584] 
[   81.494079] The buggy address belongs to the physical page:
[   81.499694] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.506958] flags: 0x0(zone=0)
[   81.510040] page_type: f5(slab)
[   81.513214] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.521362] raw: 00000000
[   81.523986] page dumped because: kasan: bad access detected
[   81.529602] 
[   81.531127] Memory state around the buggy address:
[   81.535949]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.542510]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.549072] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.555664]                              ^
[   81.559783]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.566345]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.572937] ==================================================================
[   76.482971] ==================================================================
[   76.490234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0
[   76.497589] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.504333] 
[   76.505859] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.505889] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.505889] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.505889] Call trace: 
[   76.505920]  unwind_backtrace from show_stack+0x18/0x1c
[   76.505950]  show_stack from dump_stack_lvl+0x70/0x90
[   76.505950]  dump_stack_lvl from print_report+0x158/0x528
[   76.505981]  print_report from kasan_report+0xdc/0x118
[   76.506011]  kasan_report from kasan_check_range+0x14c/0x198
[   76.506042]  kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0
[   76.506072]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.506072]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.506103]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.506134]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.506164]  kthread from ret_from_fork+0x14/0x20
[   76.506195] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.506195] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.506225] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.506225] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.506256] 
[   76.623260] Allocated by task 321:
[   76.626678]  kasan_save_track+0x30/0x5c
[   76.630554]  __kasan_kmalloc+0x8c/0x94
[   76.634338]  kasan_atomics+0xc0/0x33c
[   76.638031]  kunit_try_run_case+0x22c/0x5a8
[   76.642242]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.647796]  kthread+0x464/0x810
[   76.651031]  ret_from_fork+0x14/0x20
[   76.654632] 
[   76.656158] The buggy address belongs to the object at cc23e880
[   76.656158]  which belongs to the cache kmalloc-64 of size 64
[   76.667877] The buggy address is located 0 bytes to the right of
[   76.667877]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.679412] 
[   76.680938] The buggy address belongs to the physical page:
[   76.686523] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.693817] flags: 0x0(zone=0)
[   76.696899] page_type: f5(slab)
[   76.700073] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.708190] raw: 00000000
[   76.710845] page dumped because: kasan: bad access detected
[   76.716461] 
[   76.717956] Memory state around the buggy address:
[   76.722778]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.729339]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.735931] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.742492]                              ^
[   76.746612]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.753204]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.759765] ==================================================================
[   88.378540] ==================================================================
[   88.385803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0
[   88.393249] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.399993] 
[   88.401489] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.401519] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.401550] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.401550] Call trace: 
[   88.401550]  unwind_backtrace from show_stack+0x18/0x1c
[   88.401580]  show_stack from dump_stack_lvl+0x70/0x90
[   88.401611]  dump_stack_lvl from print_report+0x158/0x528
[   88.401641]  print_report from kasan_report+0xdc/0x118
[   88.401672]  kasan_report from kasan_check_range+0x14c/0x198
[   88.401672]  kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0
[   88.401702]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.401733]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.401763]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.401794]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.401794]  kthread from ret_from_fork+0x14/0x20
[   88.401824] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.401855] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.401855] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.401885] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.401885] 
[   88.518981] Allocated by task 321:
[   88.522430]  kasan_save_track+0x30/0x5c
[   88.526275]  __kasan_kmalloc+0x8c/0x94
[   88.530059]  kasan_atomics+0xc0/0x33c
[   88.533782]  kunit_try_run_case+0x22c/0x5a8
[   88.537994]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.543518]  kthread+0x464/0x810
[   88.546783]  ret_from_fork+0x14/0x20
[   88.550384] 
[   88.551879] The buggy address belongs to the object at cc23e880
[   88.551879]  which belongs to the cache kmalloc-64 of size 64
[   88.563598] The buggy address is located 0 bytes to the right of
[   88.563598]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.575164] 
[   88.576660] The buggy address belongs to the physical page:
[   88.582275] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.589538] flags: 0x0(zone=0)
[   88.592620] page_type: f5(slab)
[   88.595794] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.603942] raw: 00000000
[   88.606567] page dumped because: kasan: bad access detected
[   88.612182] 
[   88.613677] Memory state around the buggy address:
[   88.618499]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.625061]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.631652] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.638214]                              ^
[   88.642333]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.648925]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.655487] ==================================================================
[   85.541839] ==================================================================
[   85.549102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0
[   85.556549] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   85.563293] 
[   85.564819] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   85.564849] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.564849] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.564849] Call trace: 
[   85.564849]  unwind_backtrace from show_stack+0x18/0x1c
[   85.564880]  show_stack from dump_stack_lvl+0x70/0x90
[   85.564910]  dump_stack_lvl from print_report+0x158/0x528
[   85.564941]  print_report from kasan_report+0xdc/0x118
[   85.564971]  kasan_report from kasan_check_range+0x14c/0x198
[   85.564971]  kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0
[   85.565002]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.565032]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.565063]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.565093]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.565124]  kthread from ret_from_fork+0x14/0x20
[   85.565124] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   85.565155] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.565155] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.565185] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.565185] 
[   85.682312] Allocated by task 321:
[   85.685729]  kasan_save_track+0x30/0x5c
[   85.689605]  __kasan_kmalloc+0x8c/0x94
[   85.693389]  kasan_atomics+0xc0/0x33c
[   85.697082]  kunit_try_run_case+0x22c/0x5a8
[   85.701293]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.706817]  kthread+0x464/0x810
[   85.710083]  ret_from_fork+0x14/0x20
[   85.713684] 
[   85.715179] The buggy address belongs to the object at cc23e880
[   85.715179]  which belongs to the cache kmalloc-64 of size 64
[   85.726928] The buggy address is located 0 bytes to the right of
[   85.726928]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.738464] 
[   85.739959] The buggy address belongs to the physical page:
[   85.745574] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.752838] flags: 0x0(zone=0)
[   85.755920] page_type: f5(slab)
[   85.759094] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.767242] raw: 00000000
[   85.769897] page dumped because: kasan: bad access detected
[   85.775482] 
[   85.776977] Memory state around the buggy address:
[   85.781799]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.788391]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.794952] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.801544]                              ^
[   85.805664]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.812225]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.818786] ==================================================================
[   78.749999] ==================================================================
[   78.757263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0
[   78.764648] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.771392] 
[   78.772888] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.772918] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.772918] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.772949] Call trace: 
[   78.772949]  unwind_backtrace from show_stack+0x18/0x1c
[   78.772979]  show_stack from dump_stack_lvl+0x70/0x90
[   78.773010]  dump_stack_lvl from print_report+0x158/0x528
[   78.773040]  print_report from kasan_report+0xdc/0x118
[   78.773040]  kasan_report from kasan_check_range+0x14c/0x198
[   78.773071]  kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0
[   78.773101]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.773132]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.773162]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.773162]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.773193]  kthread from ret_from_fork+0x14/0x20
[   78.773223] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.773223] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.773254] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.773284] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.773284] 
[   78.890289] Allocated by task 321:
[   78.893737]  kasan_save_track+0x30/0x5c
[   78.897613]  __kasan_kmalloc+0x8c/0x94
[   78.901367]  kasan_atomics+0xc0/0x33c
[   78.905090]  kunit_try_run_case+0x22c/0x5a8
[   78.909301]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.914825]  kthread+0x464/0x810
[   78.918090]  ret_from_fork+0x14/0x20
[   78.921691] 
[   78.923187] The buggy address belongs to the object at cc23e880
[   78.923187]  which belongs to the cache kmalloc-64 of size 64
[   78.934906] The buggy address is located 0 bytes to the right of
[   78.934906]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.946472] 
[   78.947967] The buggy address belongs to the physical page:
[   78.953582] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.960845] flags: 0x0(zone=0)
[   78.963928] page_type: f5(slab)
[   78.967102] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.975250] raw: 00000000
[   78.977874] page dumped because: kasan: bad access detected
[   78.983489] 
[   78.984985] Memory state around the buggy address:
[   78.989807]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.996398]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.002960] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.009521]                              ^
[   79.013671]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.020233]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.026794] ==================================================================
[   74.499969] ==================================================================
[   74.507232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0
[   74.514678] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.521423] 
[   74.522949] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.522979] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.522979] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.522979] Call trace: 
[   74.523010]  unwind_backtrace from show_stack+0x18/0x1c
[   74.523040]  show_stack from dump_stack_lvl+0x70/0x90
[   74.523040]  dump_stack_lvl from print_report+0x158/0x528
[   74.523071]  print_report from kasan_report+0xdc/0x118
[   74.523101]  kasan_report from kasan_atomics_helper+0x50bc/0x5ab0
[   74.523132]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.523162]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.523162]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.523193]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.523223]  kthread from ret_from_fork+0x14/0x20
[   74.523254] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.523254] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.523284] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.523315] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.523315] 
[   74.634307] Allocated by task 321:
[   74.637725]  kasan_save_track+0x30/0x5c
[   74.641601]  __kasan_kmalloc+0x8c/0x94
[   74.645385]  kasan_atomics+0xc0/0x33c
[   74.649078]  kunit_try_run_case+0x22c/0x5a8
[   74.653289]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.658813]  kthread+0x464/0x810
[   74.662078]  ret_from_fork+0x14/0x20
[   74.665679] 
[   74.667175] The buggy address belongs to the object at cc23e880
[   74.667175]  which belongs to the cache kmalloc-64 of size 64
[   74.678924] The buggy address is located 0 bytes to the right of
[   74.678924]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.690460] 
[   74.691955] The buggy address belongs to the physical page:
[   74.697570] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.704833] flags: 0x0(zone=0)
[   74.707916] page_type: f5(slab)
[   74.711090] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.719238] raw: 00000000
[   74.721893] page dumped because: kasan: bad access detected
[   74.727478] 
[   74.729003] Memory state around the buggy address:
[   74.733825]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.740386]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.746948] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.753540]                              ^
[   74.757659]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.764221]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.770812] ==================================================================
[   82.704925] ==================================================================
[   82.712188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0
[   82.719635] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.726409] 
[   82.727905] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.727935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.727935] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.727966] Call trace: 
[   82.727966]  unwind_backtrace from show_stack+0x18/0x1c
[   82.727996]  show_stack from dump_stack_lvl+0x70/0x90
[   82.727996]  dump_stack_lvl from print_report+0x158/0x528
[   82.728027]  print_report from kasan_report+0xdc/0x118
[   82.728057]  kasan_report from kasan_atomics_helper+0x52cc/0x5ab0
[   82.728088]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.728118]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.728149]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.728149]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.728179]  kthread from ret_from_fork+0x14/0x20
[   82.728210] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.728210] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.728240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.728271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.728271] 
[   82.839263] Allocated by task 321:
[   82.842681]  kasan_save_track+0x30/0x5c
[   82.846557]  __kasan_kmalloc+0x8c/0x94
[   82.850341]  kasan_atomics+0xc0/0x33c
[   82.854034]  kunit_try_run_case+0x22c/0x5a8
[   82.858245]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.863769]  kthread+0x464/0x810
[   82.867034]  ret_from_fork+0x14/0x20
[   82.870635] 
[   82.872131] The buggy address belongs to the object at cc23e880
[   82.872131]  which belongs to the cache kmalloc-64 of size 64
[   82.883880] The buggy address is located 0 bytes to the right of
[   82.883880]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.895416] 
[   82.896911] The buggy address belongs to the physical page:
[   82.902526] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.909790] flags: 0x0(zone=0)
[   82.912872] page_type: f5(slab)
[   82.916046] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.924194] raw: 00000000
[   82.926849] page dumped because: kasan: bad access detected
[   82.932434] 
[   82.933959] Memory state around the buggy address:
[   82.938781]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.945343]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.951934] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.958496]                              ^
[   82.962615]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.969177]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.975769] ==================================================================
[   86.672790] ==================================================================
[   86.680053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0
[   86.687530] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.694274] 
[   86.695770] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.695800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.695800] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.695831] Call trace: 
[   86.695831]  unwind_backtrace from show_stack+0x18/0x1c
[   86.695861]  show_stack from dump_stack_lvl+0x70/0x90
[   86.695892]  dump_stack_lvl from print_report+0x158/0x528
[   86.695892]  print_report from kasan_report+0xdc/0x118
[   86.695922]  kasan_report from kasan_check_range+0x14c/0x198
[   86.695953]  kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0
[   86.695983]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.696014]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.696014]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.696044]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.696075]  kthread from ret_from_fork+0x14/0x20
[   86.696105] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.696105] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.696136] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.696136] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.696166] 
[   86.813262] Allocated by task 321:
[   86.816680]  kasan_save_track+0x30/0x5c
[   86.820556]  __kasan_kmalloc+0x8c/0x94
[   86.824340]  kasan_atomics+0xc0/0x33c
[   86.828033]  kunit_try_run_case+0x22c/0x5a8
[   86.832244]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.837799]  kthread+0x464/0x810
[   86.841033]  ret_from_fork+0x14/0x20
[   86.844635] 
[   86.846160] The buggy address belongs to the object at cc23e880
[   86.846160]  which belongs to the cache kmalloc-64 of size 64
[   86.857879] The buggy address is located 0 bytes to the right of
[   86.857879]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.869415] 
[   86.870941] The buggy address belongs to the physical page:
[   86.876525] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.883819] flags: 0x0(zone=0)
[   86.886901] page_type: f5(slab)
[   86.890075] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.898193] raw: 00000000
[   86.900848] page dumped because: kasan: bad access detected
[   86.906463] 
[   86.907958] Memory state around the buggy address:
[   86.912780]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.919342]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.925933] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.932495]                              ^
[   86.936614]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.943206]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.949768] ==================================================================
[   79.034149] ==================================================================
[   79.041412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0
[   79.048767] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.055511] 
[   79.057037] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.057037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.057067] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.057067] Call trace: 
[   79.057067]  unwind_backtrace from show_stack+0x18/0x1c
[   79.057098]  show_stack from dump_stack_lvl+0x70/0x90
[   79.057128]  dump_stack_lvl from print_report+0x158/0x528
[   79.057159]  print_report from kasan_report+0xdc/0x118
[   79.057189]  kasan_report from kasan_check_range+0x14c/0x198
[   79.057189]  kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0
[   79.057220]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.057250]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.057281]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.057312]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.057342]  kthread from ret_from_fork+0x14/0x20
[   79.057342] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.057373] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.057373] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.057403] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.057403] 
[   79.174438] Allocated by task 321:
[   79.177856]  kasan_save_track+0x30/0x5c
[   79.181732]  __kasan_kmalloc+0x8c/0x94
[   79.185516]  kasan_atomics+0xc0/0x33c
[   79.189208]  kunit_try_run_case+0x22c/0x5a8
[   79.193420]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.198944]  kthread+0x464/0x810
[   79.202209]  ret_from_fork+0x14/0x20
[   79.205810] 
[   79.207305] The buggy address belongs to the object at cc23e880
[   79.207305]  which belongs to the cache kmalloc-64 of size 64
[   79.219055] The buggy address is located 0 bytes to the right of
[   79.219055]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.230590] 
[   79.232086] The buggy address belongs to the physical page:
[   79.237701] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.244964] flags: 0x0(zone=0)
[   79.248046] page_type: f5(slab)
[   79.251220] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.259368] raw: 00000000
[   79.262023] page dumped because: kasan: bad access detected
[   79.267608] 
[   79.269134] Memory state around the buggy address:
[   79.273956]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.280517]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.287078] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.293670]                              ^
[   79.297790]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.304351]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.310943] ==================================================================
[   79.318267] ==================================================================
[   79.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0
[   79.332977] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   79.339721] 
[   79.341247] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   79.341278] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.341278] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.341278] Call trace: 
[   79.341308]  unwind_backtrace from show_stack+0x18/0x1c
[   79.341308]  show_stack from dump_stack_lvl+0x70/0x90
[   79.341339]  dump_stack_lvl from print_report+0x158/0x528
[   79.341369]  print_report from kasan_report+0xdc/0x118
[   79.341400]  kasan_report from kasan_check_range+0x14c/0x198
[   79.341430]  kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0
[   79.341430]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.341461]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.341491]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.341522]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.341552]  kthread from ret_from_fork+0x14/0x20
[   79.341552] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   79.341583] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.341613] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.341613] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.341644] 
[   79.458740] Allocated by task 321:
[   79.462158]  kasan_save_track+0x30/0x5c
[   79.466033]  __kasan_kmalloc+0x8c/0x94
[   79.469818]  kasan_atomics+0xc0/0x33c
[   79.473510]  kunit_try_run_case+0x22c/0x5a8
[   79.477722]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.483245]  kthread+0x464/0x810
[   79.486511]  ret_from_fork+0x14/0x20
[   79.490112] 
[   79.491638] The buggy address belongs to the object at cc23e880
[   79.491638]  which belongs to the cache kmalloc-64 of size 64
[   79.503356] The buggy address is located 0 bytes to the right of
[   79.503356]  allocated 48-byte region [cc23e880, cc23e8b0)
[   79.514892] 
[   79.516418] The buggy address belongs to the physical page:
[   79.522003] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   79.529296] flags: 0x0(zone=0)
[   79.532379] page_type: f5(slab)
[   79.535522] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.543670] raw: 00000000
[   79.546325] page dumped because: kasan: bad access detected
[   79.551940] 
[   79.553436] Memory state around the buggy address:
[   79.558258]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.564819]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.571380] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.577972]                              ^
[   79.582092]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.588653]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.595245] ==================================================================
[   80.733581] ==================================================================
[   80.740844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0
[   80.748291] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.755035] 
[   80.756561] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.756561] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.756591] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.756591] Call trace: 
[   80.756591]  unwind_backtrace from show_stack+0x18/0x1c
[   80.756622]  show_stack from dump_stack_lvl+0x70/0x90
[   80.756652]  dump_stack_lvl from print_report+0x158/0x528
[   80.756683]  print_report from kasan_report+0xdc/0x118
[   80.756713]  kasan_report from kasan_check_range+0x14c/0x198
[   80.756713]  kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0
[   80.756744]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.756774]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.756805]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.756835]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.756866]  kthread from ret_from_fork+0x14/0x20
[   80.756866] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.756896] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.756896] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.756927] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.756927] 
[   80.874053] Allocated by task 321:
[   80.877471]  kasan_save_track+0x30/0x5c
[   80.881347]  __kasan_kmalloc+0x8c/0x94
[   80.885131]  kasan_atomics+0xc0/0x33c
[   80.888824]  kunit_try_run_case+0x22c/0x5a8
[   80.893035]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.898559]  kthread+0x464/0x810
[   80.901824]  ret_from_fork+0x14/0x20
[   80.905426] 
[   80.906921] The buggy address belongs to the object at cc23e880
[   80.906921]  which belongs to the cache kmalloc-64 of size 64
[   80.918640] The buggy address is located 0 bytes to the right of
[   80.918640]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.930206] 
[   80.931701] The buggy address belongs to the physical page:
[   80.937316] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.944580] flags: 0x0(zone=0)
[   80.947662] page_type: f5(slab)
[   80.950836] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.958984] raw: 00000000
[   80.961608] page dumped because: kasan: bad access detected
[   80.967224] 
[   80.968719] Memory state around the buggy address:
[   80.973541]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.980133]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.986694] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.993286]                              ^
[   80.997406]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.003967]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.010528] ==================================================================
[   75.630554] ==================================================================
[   75.637817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0
[   75.645202] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.651947] 
[   75.653442] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.653472] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.653472] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.653503] Call trace: 
[   75.653503]  unwind_backtrace from show_stack+0x18/0x1c
[   75.653533]  show_stack from dump_stack_lvl+0x70/0x90
[   75.653564]  dump_stack_lvl from print_report+0x158/0x528
[   75.653564]  print_report from kasan_report+0xdc/0x118
[   75.653594]  kasan_report from kasan_check_range+0x14c/0x198
[   75.653625]  kasan_check_range from kasan_atomics_helper+0x790/0x5ab0
[   75.653656]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.653686]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.653686]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.653717]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.653747]  kthread from ret_from_fork+0x14/0x20
[   75.653778] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.653778] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.653808] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.653839] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.653839] 
[   75.770843] Allocated by task 321:
[   75.774291]  kasan_save_track+0x30/0x5c
[   75.778137]  __kasan_kmalloc+0x8c/0x94
[   75.781951]  kasan_atomics+0xc0/0x33c
[   75.785644]  kunit_try_run_case+0x22c/0x5a8
[   75.789855]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.795379]  kthread+0x464/0x810
[   75.798645]  ret_from_fork+0x14/0x20
[   75.802246] 
[   75.803741] The buggy address belongs to the object at cc23e880
[   75.803741]  which belongs to the cache kmalloc-64 of size 64
[   75.815490] The buggy address is located 0 bytes to the right of
[   75.815490]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.827026] 
[   75.828521] The buggy address belongs to the physical page:
[   75.834136] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.841400] flags: 0x0(zone=0)
[   75.844482] page_type: f5(slab)
[   75.847656] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.855804] raw: 00000000
[   75.858459] page dumped because: kasan: bad access detected
[   75.864044] 
[   75.865570] Memory state around the buggy address:
[   75.870391]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.876953]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.883514] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.890106]                              ^
[   75.894226]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.900787]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.907379] ==================================================================
[   86.394714] ==================================================================
[   86.401977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0
[   86.409454] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   86.416107] 
[   86.417602] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   86.417633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.417633] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.417663] Call trace: 
[   86.417663]  unwind_backtrace from show_stack+0x18/0x1c
[   86.417694]  show_stack from dump_stack_lvl+0x70/0x90
[   86.417724]  dump_stack_lvl from print_report+0x158/0x528
[   86.417755]  print_report from kasan_report+0xdc/0x118
[   86.417755]  kasan_report from kasan_atomics_helper+0x544c/0x5ab0
[   86.417785]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.417816]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.417846]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.417877]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.417907]  kthread from ret_from_fork+0x14/0x20
[   86.417907] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   86.417938] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.417938] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.417968] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.417968] 
[   86.528961] Allocated by task 321:
[   86.532379]  kasan_save_track+0x30/0x5c
[   86.536254]  __kasan_kmalloc+0x8c/0x94
[   86.540039]  kasan_atomics+0xc0/0x33c
[   86.543731]  kunit_try_run_case+0x22c/0x5a8
[   86.547943]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.553497]  kthread+0x464/0x810
[   86.556732]  ret_from_fork+0x14/0x20
[   86.560333] 
[   86.561859] The buggy address belongs to the object at cc23e880
[   86.561859]  which belongs to the cache kmalloc-64 of size 64
[   86.573577] The buggy address is located 0 bytes to the right of
[   86.573577]  allocated 48-byte region [cc23e880, cc23e8b0)
[   86.585113] 
[   86.586639] The buggy address belongs to the physical page:
[   86.592224] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   86.599517] flags: 0x0(zone=0)
[   86.602600] page_type: f5(slab)
[   86.605773] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.613891] raw: 00000000
[   86.616546] page dumped because: kasan: bad access detected
[   86.622161] 
[   86.623657] Memory state around the buggy address:
[   86.628479]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.635040]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.641632] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.648193]                              ^
[   86.652313]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.658905]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.665466] ==================================================================
[   74.778137] ==================================================================
[   74.785400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0
[   74.792785] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.799530] 
[   74.801025] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.801055] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.801055] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.801086] Call trace: 
[   74.801086]  unwind_backtrace from show_stack+0x18/0x1c
[   74.801116]  show_stack from dump_stack_lvl+0x70/0x90
[   74.801147]  dump_stack_lvl from print_report+0x158/0x528
[   74.801177]  print_report from kasan_report+0xdc/0x118
[   74.801177]  kasan_report from kasan_check_range+0x14c/0x198
[   74.801208]  kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0
[   74.801239]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.801269]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.801269]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.801300]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.801330]  kthread from ret_from_fork+0x14/0x20
[   74.801361] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.801361] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.801391] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.801422] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.801422] 
[   74.918426] Allocated by task 321:
[   74.921874]  kasan_save_track+0x30/0x5c
[   74.925720]  __kasan_kmalloc+0x8c/0x94
[   74.929504]  kasan_atomics+0xc0/0x33c
[   74.933227]  kunit_try_run_case+0x22c/0x5a8
[   74.937438]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.942962]  kthread+0x464/0x810
[   74.946228]  ret_from_fork+0x14/0x20
[   74.949829] 
[   74.951324] The buggy address belongs to the object at cc23e880
[   74.951324]  which belongs to the cache kmalloc-64 of size 64
[   74.963043] The buggy address is located 0 bytes to the right of
[   74.963043]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.974609] 
[   74.976104] The buggy address belongs to the physical page:
[   74.981719] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.988983] flags: 0x0(zone=0)
[   74.992065] page_type: f5(slab)
[   74.995239] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.003387] raw: 00000000
[   75.006011] page dumped because: kasan: bad access detected
[   75.011627] 
[   75.013153] Memory state around the buggy address:
[   75.017974]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024536]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.031097] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.037689]                              ^
[   75.041809]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.048370]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.054962] ==================================================================
[   84.404602] ==================================================================
[   84.411865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0
[   84.419342] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.426086] 
[   84.427581] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.427612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.427612] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.427642] Call trace: 
[   84.427642]  unwind_backtrace from show_stack+0x18/0x1c
[   84.427673]  show_stack from dump_stack_lvl+0x70/0x90
[   84.427703]  dump_stack_lvl from print_report+0x158/0x528
[   84.427734]  print_report from kasan_report+0xdc/0x118
[   84.427734]  kasan_report from kasan_check_range+0x14c/0x198
[   84.427764]  kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0
[   84.427795]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.427825]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.427856]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.427856]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.427886]  kthread from ret_from_fork+0x14/0x20
[   84.427917] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.427917] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.427947] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.427978] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.427978] 
[   84.545074] Allocated by task 321:
[   84.548522]  kasan_save_track+0x30/0x5c
[   84.552368]  __kasan_kmalloc+0x8c/0x94
[   84.556152]  kasan_atomics+0xc0/0x33c
[   84.559875]  kunit_try_run_case+0x22c/0x5a8
[   84.564086]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.569610]  kthread+0x464/0x810
[   84.572875]  ret_from_fork+0x14/0x20
[   84.576477] 
[   84.577972] The buggy address belongs to the object at cc23e880
[   84.577972]  which belongs to the cache kmalloc-64 of size 64
[   84.589691] The buggy address is located 0 bytes to the right of
[   84.589691]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.601257] 
[   84.602752] The buggy address belongs to the physical page:
[   84.608367] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.615631] flags: 0x0(zone=0)
[   84.618713] page_type: f5(slab)
[   84.621887] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.630035] raw: 00000000
[   84.632659] page dumped because: kasan: bad access detected
[   84.638275] 
[   84.639770] Memory state around the buggy address:
[   84.644592]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.651184]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.657745] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.664306]                              ^
[   84.668457]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.675018]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.681579] ==================================================================
[   88.662811] ==================================================================
[   88.670074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0
[   88.677520] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.684204] 
[   88.685699] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.685729] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.685729] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.685760] Call trace: 
[   88.685760]  unwind_backtrace from show_stack+0x18/0x1c
[   88.685791]  show_stack from dump_stack_lvl+0x70/0x90
[   88.685791]  dump_stack_lvl from print_report+0x158/0x528
[   88.685821]  print_report from kasan_report+0xdc/0x118
[   88.685852]  kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0
[   88.685882]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.685913]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.685943]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.685943]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.685974]  kthread from ret_from_fork+0x14/0x20
[   88.686004] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.686004] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.686035] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.686065] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.686065] 
[   88.797058] Allocated by task 321:
[   88.800476]  kasan_save_track+0x30/0x5c
[   88.804351]  __kasan_kmalloc+0x8c/0x94
[   88.808135]  kasan_atomics+0xc0/0x33c
[   88.811828]  kunit_try_run_case+0x22c/0x5a8
[   88.816040]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.821563]  kthread+0x464/0x810
[   88.824829]  ret_from_fork+0x14/0x20
[   88.828430] 
[   88.829925] The buggy address belongs to the object at cc23e880
[   88.829925]  which belongs to the cache kmalloc-64 of size 64
[   88.841644] The buggy address is located 0 bytes to the right of
[   88.841644]  allocated 48-byte region [cc23e880, cc23e8b0)
[   88.853210] 
[   88.854705] The buggy address belongs to the physical page:
[   88.860321] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   88.867584] flags: 0x0(zone=0)
[   88.870666] page_type: f5(slab)
[   88.873840] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.881988] raw: 00000000
[   88.884613] page dumped because: kasan: bad access detected
[   88.890228] 
[   88.891723] Memory state around the buggy address:
[   88.896545]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.903137]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.909698] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.916259]                              ^
[   88.920379]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.926971]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.933532] ==================================================================
[   82.983093] ==================================================================
[   82.990356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0
[   82.997802] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.004547] 
[   83.006072] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.006103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.006103] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.006103] Call trace: 
[   83.006134]  unwind_backtrace from show_stack+0x18/0x1c
[   83.006134]  show_stack from dump_stack_lvl+0x70/0x90
[   83.006164]  dump_stack_lvl from print_report+0x158/0x528
[   83.006195]  print_report from kasan_report+0xdc/0x118
[   83.006225]  kasan_report from kasan_check_range+0x14c/0x198
[   83.006256]  kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0
[   83.006256]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.006286]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.006317]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.006347]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.006378]  kthread from ret_from_fork+0x14/0x20
[   83.006378] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.006408] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.006439] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.006439] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.006469] 
[   83.123565] Allocated by task 321:
[   83.126983]  kasan_save_track+0x30/0x5c
[   83.130859]  __kasan_kmalloc+0x8c/0x94
[   83.134643]  kasan_atomics+0xc0/0x33c
[   83.138336]  kunit_try_run_case+0x22c/0x5a8
[   83.142547]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.148071]  kthread+0x464/0x810
[   83.151336]  ret_from_fork+0x14/0x20
[   83.154937] 
[   83.156433] The buggy address belongs to the object at cc23e880
[   83.156433]  which belongs to the cache kmalloc-64 of size 64
[   83.168182] The buggy address is located 0 bytes to the right of
[   83.168182]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.179718] 
[   83.181213] The buggy address belongs to the physical page:
[   83.186828] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.194091] flags: 0x0(zone=0)
[   83.197174] page_type: f5(slab)
[   83.200347] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.208496] raw: 00000000
[   83.211151] page dumped because: kasan: bad access detected
[   83.216735] 
[   83.218261] Memory state around the buggy address:
[   83.223083]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.229644]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.236206] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.242797]                              ^
[   83.246917]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.253479]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.260070] ==================================================================
[   74.215820] ==================================================================
[   74.223083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0
[   74.230468] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   74.237213] 
[   74.238708] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   74.238739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.238769] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.238769] Call trace: 
[   74.238769]  unwind_backtrace from show_stack+0x18/0x1c
[   74.238800]  show_stack from dump_stack_lvl+0x70/0x90
[   74.238830]  dump_stack_lvl from print_report+0x158/0x528
[   74.238861]  print_report from kasan_report+0xdc/0x118
[   74.238891]  kasan_report from kasan_check_range+0x14c/0x198
[   74.238891]  kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0
[   74.238922]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.238952]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.238983]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.239013]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.239044]  kthread from ret_from_fork+0x14/0x20
[   74.239044] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   74.239074] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.239074] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.239105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.239105] 
[   74.356140] Allocated by task 321:
[   74.359558]  kasan_save_track+0x30/0x5c
[   74.363433]  __kasan_kmalloc+0x8c/0x94
[   74.367218]  kasan_atomics+0xc0/0x33c
[   74.370910]  kunit_try_run_case+0x22c/0x5a8
[   74.375122]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.380645]  kthread+0x464/0x810
[   74.383911]  ret_from_fork+0x14/0x20
[   74.387512] 
[   74.389007] The buggy address belongs to the object at cc23e880
[   74.389007]  which belongs to the cache kmalloc-64 of size 64
[   74.400756] The buggy address is located 0 bytes to the right of
[   74.400756]  allocated 48-byte region [cc23e880, cc23e8b0)
[   74.412292] 
[   74.413818] The buggy address belongs to the physical page:
[   74.419403] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   74.426696] flags: 0x0(zone=0)
[   74.429779] page_type: f5(slab)
[   74.432922] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.441070] raw: 00000000
[   74.443725] page dumped because: kasan: bad access detected
[   74.449340] 
[   74.450836] Memory state around the buggy address:
[   74.455657]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.462219]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468811] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.475372]                              ^
[   74.479492]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.486083]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.492645] ==================================================================
[   75.914703] ==================================================================
[   75.921966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0
[   75.929321] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.936065] 
[   75.937591] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.937622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.937622] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.937652] Call trace: 
[   75.937652]  unwind_backtrace from show_stack+0x18/0x1c
[   75.937683]  show_stack from dump_stack_lvl+0x70/0x90
[   75.937683]  dump_stack_lvl from print_report+0x158/0x528
[   75.937713]  print_report from kasan_report+0xdc/0x118
[   75.937744]  kasan_report from kasan_check_range+0x14c/0x198
[   75.937774]  kasan_check_range from kasan_atomics_helper+0x834/0x5ab0
[   75.937805]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.937805]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.937835]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.937866]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.937896]  kthread from ret_from_fork+0x14/0x20
[   75.937927] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.937927] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.937957] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.937957] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.937988] 
[   76.054992] Allocated by task 321:
[   76.058410]  kasan_save_track+0x30/0x5c
[   76.062286]  __kasan_kmalloc+0x8c/0x94
[   76.066070]  kasan_atomics+0xc0/0x33c
[   76.069763]  kunit_try_run_case+0x22c/0x5a8
[   76.073974]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.079528]  kthread+0x464/0x810
[   76.082763]  ret_from_fork+0x14/0x20
[   76.086364] 
[   76.087890] The buggy address belongs to the object at cc23e880
[   76.087890]  which belongs to the cache kmalloc-64 of size 64
[   76.099609] The buggy address is located 0 bytes to the right of
[   76.099609]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.111145] 
[   76.112670] The buggy address belongs to the physical page:
[   76.118255] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.125549] flags: 0x0(zone=0)
[   76.128631] page_type: f5(slab)
[   76.131805] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.139953] raw: 00000000
[   76.142578] page dumped because: kasan: bad access detected
[   76.148193] 
[   76.149688] Memory state around the buggy address:
[   76.154510]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.161071]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.167663] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.174224]                              ^
[   76.178344]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.184936]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.191497] ==================================================================
[   73.653686] ==================================================================
[   73.660949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0
[   73.668304] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.674957] 
[   73.676483] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.676513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.676513] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.676513] Call trace: 
[   73.676544]  unwind_backtrace from show_stack+0x18/0x1c
[   73.676574]  show_stack from dump_stack_lvl+0x70/0x90
[   73.676574]  dump_stack_lvl from print_report+0x158/0x528
[   73.676605]  print_report from kasan_report+0xdc/0x118
[   73.676635]  kasan_report from kasan_check_range+0x14c/0x198
[   73.676666]  kasan_check_range from kasan_atomics_helper+0x420/0x5ab0
[   73.676696]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.676696]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.676727]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.676757]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.676788]  kthread from ret_from_fork+0x14/0x20
[   73.676818] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.676818] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.676849] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.676849] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.676879] 
[   73.793884] Allocated by task 321:
[   73.797302]  kasan_save_track+0x30/0x5c
[   73.801177]  __kasan_kmalloc+0x8c/0x94
[   73.804962]  kasan_atomics+0xc0/0x33c
[   73.808654]  kunit_try_run_case+0x22c/0x5a8
[   73.812866]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.818420]  kthread+0x464/0x810
[   73.821655]  ret_from_fork+0x14/0x20
[   73.825286] 
[   73.826782] The buggy address belongs to the object at cc23e880
[   73.826782]  which belongs to the cache kmalloc-64 of size 64
[   73.838500] The buggy address is located 0 bytes to the right of
[   73.838500]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.850067] 
[   73.851562] The buggy address belongs to the physical page:
[   73.857177] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.864440] flags: 0x0(zone=0)
[   73.867523] page_type: f5(slab)
[   73.870697] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.878845] raw: 00000000
[   73.881469] page dumped because: kasan: bad access detected
[   73.887084] 
[   73.888580] Memory state around the buggy address:
[   73.893402]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.899993]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.906555] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.913116]                              ^
[   73.917266]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.923828]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.930389] ==================================================================
[   81.580261] ==================================================================
[   81.587524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0
[   81.594970] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.601623] 
[   81.603149] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.603179] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.603179] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.603179] Call trace: 
[   81.603210]  unwind_backtrace from show_stack+0x18/0x1c
[   81.603210]  show_stack from dump_stack_lvl+0x70/0x90
[   81.603240]  dump_stack_lvl from print_report+0x158/0x528
[   81.603271]  print_report from kasan_report+0xdc/0x118
[   81.603302]  kasan_report from kasan_atomics_helper+0x52d8/0x5ab0
[   81.603332]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.603332]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.603363]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.603393]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.603424]  kthread from ret_from_fork+0x14/0x20
[   81.603454] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.603454] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.603485] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.603485] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.603515] 
[   81.714508] Allocated by task 321:
[   81.717926]  kasan_save_track+0x30/0x5c
[   81.721801]  __kasan_kmalloc+0x8c/0x94
[   81.725585]  kasan_atomics+0xc0/0x33c
[   81.729278]  kunit_try_run_case+0x22c/0x5a8
[   81.733489]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.739013]  kthread+0x464/0x810
[   81.742279]  ret_from_fork+0x14/0x20
[   81.745880] 
[   81.747375] The buggy address belongs to the object at cc23e880
[   81.747375]  which belongs to the cache kmalloc-64 of size 64
[   81.759094] The buggy address is located 0 bytes to the right of
[   81.759094]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.770660] 
[   81.772155] The buggy address belongs to the physical page:
[   81.777770] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.785034] flags: 0x0(zone=0)
[   81.788116] page_type: f5(slab)
[   81.791290] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.799438] raw: 00000000
[   81.802093] page dumped because: kasan: bad access detected
[   81.807678] 
[   81.809204] Memory state around the buggy address:
[   81.814025]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.820587]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.827148] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.833740]                              ^
[   81.837860]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.844421]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.850982] ==================================================================
[   83.551696] ==================================================================
[   83.558959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0
[   83.566436] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.573181] 
[   83.574676] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.574707] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.574707] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.574737] Call trace: 
[   83.574737]  unwind_backtrace from show_stack+0x18/0x1c
[   83.574768]  show_stack from dump_stack_lvl+0x70/0x90
[   83.574798]  dump_stack_lvl from print_report+0x158/0x528
[   83.574829]  print_report from kasan_report+0xdc/0x118
[   83.574829]  kasan_report from kasan_check_range+0x14c/0x198
[   83.574859]  kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0
[   83.574890]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.574920]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.574920]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.574951]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.574981]  kthread from ret_from_fork+0x14/0x20
[   83.575012] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.575012] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.575042] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.575073] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.575073] 
[   83.692169] Allocated by task 321:
[   83.695617]  kasan_save_track+0x30/0x5c
[   83.699462]  __kasan_kmalloc+0x8c/0x94
[   83.703247]  kasan_atomics+0xc0/0x33c
[   83.706939]  kunit_try_run_case+0x22c/0x5a8
[   83.711181]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.716705]  kthread+0x464/0x810
[   83.719940]  ret_from_fork+0x14/0x20
[   83.723571] 
[   83.725067] The buggy address belongs to the object at cc23e880
[   83.725067]  which belongs to the cache kmalloc-64 of size 64
[   83.736785] The buggy address is located 0 bytes to the right of
[   83.736785]  allocated 48-byte region [cc23e880, cc23e8b0)
[   83.748321] 
[   83.749847] The buggy address belongs to the physical page:
[   83.755432] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   83.762725] flags: 0x0(zone=0)
[   83.765808] page_type: f5(slab)
[   83.768981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.777099] raw: 00000000
[   83.779754] page dumped because: kasan: bad access detected
[   83.785369] 
[   83.786865] Memory state around the buggy address:
[   83.791687]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.798248]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.804840] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.811401]                              ^
[   83.815521]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.822113]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.828674] ==================================================================
[   72.819213] ==================================================================
[   72.826477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0
[   72.833923] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   72.840667] 
[   72.842193] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.842224] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.842224] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.842254] Call trace: 
[   72.842254]  unwind_backtrace from show_stack+0x18/0x1c
[   72.842285]  show_stack from dump_stack_lvl+0x70/0x90
[   72.842285]  dump_stack_lvl from print_report+0x158/0x528
[   72.842315]  print_report from kasan_report+0xdc/0x118
[   72.842346]  kasan_report from kasan_atomics_helper+0x514c/0x5ab0
[   72.842376]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.842407]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.842437]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.842437]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.842468]  kthread from ret_from_fork+0x14/0x20
[   72.842498] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   72.842498] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.842529] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.842559] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.842559] 
[   72.953552] Allocated by task 321:
[   72.956970]  kasan_save_track+0x30/0x5c
[   72.960845]  __kasan_kmalloc+0x8c/0x94
[   72.964630]  kasan_atomics+0xc0/0x33c
[   72.968322]  kunit_try_run_case+0x22c/0x5a8
[   72.972534]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.978088]  kthread+0x464/0x810
[   72.981323]  ret_from_fork+0x14/0x20
[   72.984924] 
[   72.986450] The buggy address belongs to the object at cc23e880
[   72.986450]  which belongs to the cache kmalloc-64 of size 64
[   72.998168] The buggy address is located 0 bytes to the right of
[   72.998168]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.009735] 
[   73.011230] The buggy address belongs to the physical page:
[   73.016845] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.024108] flags: 0x0(zone=0)
[   73.027191] page_type: f5(slab)
[   73.030364] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.038513] raw: 00000000
[   73.041137] page dumped because: kasan: bad access detected
[   73.046752] 
[   73.048248] Memory state around the buggy address:
[   73.053070]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.059661]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.066223] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.072784]                              ^
[   73.076904]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.083496]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.090057] ==================================================================
[   77.335388] ==================================================================
[   77.342651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0
[   77.350036] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.356781] 
[   77.358276] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.358306] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.358306] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.358337] Call trace: 
[   77.358337]  unwind_backtrace from show_stack+0x18/0x1c
[   77.358367]  show_stack from dump_stack_lvl+0x70/0x90
[   77.358398]  dump_stack_lvl from print_report+0x158/0x528
[   77.358428]  print_report from kasan_report+0xdc/0x118
[   77.358428]  kasan_report from kasan_check_range+0x14c/0x198
[   77.358459]  kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0
[   77.358489]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.358520]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.358551]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.358551]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.358581]  kthread from ret_from_fork+0x14/0x20
[   77.358612] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.358642] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.358642] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.358673] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.358673] 
[   77.475708] Allocated by task 321:
[   77.479125]  kasan_save_track+0x30/0x5c
[   77.483001]  __kasan_kmalloc+0x8c/0x94
[   77.486755]  kasan_atomics+0xc0/0x33c
[   77.490478]  kunit_try_run_case+0x22c/0x5a8
[   77.494689]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.500213]  kthread+0x464/0x810
[   77.503479]  ret_from_fork+0x14/0x20
[   77.507080] 
[   77.508575] The buggy address belongs to the object at cc23e880
[   77.508575]  which belongs to the cache kmalloc-64 of size 64
[   77.520294] The buggy address is located 0 bytes to the right of
[   77.520294]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.531860] 
[   77.533355] The buggy address belongs to the physical page:
[   77.538970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.546234] flags: 0x0(zone=0)
[   77.549316] page_type: f5(slab)
[   77.552490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.560638] raw: 00000000
[   77.563262] page dumped because: kasan: bad access detected
[   77.568878] 
[   77.570373] Memory state around the buggy address:
[   77.575195]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.581787]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.588348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.594940]                              ^
[   77.599060]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.605621]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.612182] ==================================================================
[   84.688934] ==================================================================
[   84.696197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0
[   84.703643] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.710388] 
[   84.711914] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.711944] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.711944] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.711944] Call trace: 
[   84.711944]  unwind_backtrace from show_stack+0x18/0x1c
[   84.711975]  show_stack from dump_stack_lvl+0x70/0x90
[   84.712005]  dump_stack_lvl from print_report+0x158/0x528
[   84.712036]  print_report from kasan_report+0xdc/0x118
[   84.712066]  kasan_report from kasan_check_range+0x14c/0x198
[   84.712066]  kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0
[   84.712097]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.712127]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.712158]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.712188]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.712219]  kthread from ret_from_fork+0x14/0x20
[   84.712219] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.712249] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.712249] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.712280] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.712280] 
[   84.829406] Allocated by task 321:
[   84.832824]  kasan_save_track+0x30/0x5c
[   84.836700]  __kasan_kmalloc+0x8c/0x94
[   84.840484]  kasan_atomics+0xc0/0x33c
[   84.844177]  kunit_try_run_case+0x22c/0x5a8
[   84.848388]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.853912]  kthread+0x464/0x810
[   84.857177]  ret_from_fork+0x14/0x20
[   84.860778] 
[   84.862274] The buggy address belongs to the object at cc23e880
[   84.862274]  which belongs to the cache kmalloc-64 of size 64
[   84.873992] The buggy address is located 0 bytes to the right of
[   84.873992]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.885559] 
[   84.887054] The buggy address belongs to the physical page:
[   84.892669] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.899932] flags: 0x0(zone=0)
[   84.903015] page_type: f5(slab)
[   84.906188] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.914337] raw: 00000000
[   84.916961] page dumped because: kasan: bad access detected
[   84.922576] 
[   84.924072] Memory state around the buggy address:
[   84.928924]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.935485]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.942047] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.948638]                              ^
[   84.952758]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.959320]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.965881] ==================================================================
[   88.940856] ==================================================================
[   88.948150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0
[   88.955596] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   88.962341] 
[   88.963836] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   88.963867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.963897] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.963897] Call trace: 
[   88.963897]  unwind_backtrace from show_stack+0x18/0x1c
[   88.963928]  show_stack from dump_stack_lvl+0x70/0x90
[   88.963958]  dump_stack_lvl from print_report+0x158/0x528
[   88.963989]  print_report from kasan_report+0xdc/0x118
[   88.964019]  kasan_report from kasan_check_range+0x14c/0x198
[   88.964019]  kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0
[   88.964050]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.964080]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.964111]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.964141]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.964141]  kthread from ret_from_fork+0x14/0x20
[   88.964172] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   88.964202] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.964202] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.964233] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.964233] 
[   89.081359] Allocated by task 321:
[   89.084777]  kasan_save_track+0x30/0x5c
[   89.088653]  __kasan_kmalloc+0x8c/0x94
[   89.092437]  kasan_atomics+0xc0/0x33c
[   89.096130]  kunit_try_run_case+0x22c/0x5a8
[   89.100341]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.105865]  kthread+0x464/0x810
[   89.109130]  ret_from_fork+0x14/0x20
[   89.112731] 
[   89.114227] The buggy address belongs to the object at cc23e880
[   89.114227]  which belongs to the cache kmalloc-64 of size 64
[   89.125946] The buggy address is located 0 bytes to the right of
[   89.125946]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.137512] 
[   89.139007] The buggy address belongs to the physical page:
[   89.144622] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.151885] flags: 0x0(zone=0)
[   89.154968] page_type: f5(slab)
[   89.158142] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.166290] raw: 00000000
[   89.168914] page dumped because: kasan: bad access detected
[   89.174530] 
[   89.176025] Memory state around the buggy address:
[   89.180847]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.187438]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.194000] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.200561]                              ^
[   89.204681]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.211273]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.217834] ==================================================================
[   76.767089] ==================================================================
[   76.774353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0
[   76.781738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.788482] 
[   76.789978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.790008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.790039] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.790039] Call trace: 
[   76.790039]  unwind_backtrace from show_stack+0x18/0x1c
[   76.790069]  show_stack from dump_stack_lvl+0x70/0x90
[   76.790100]  dump_stack_lvl from print_report+0x158/0x528
[   76.790130]  print_report from kasan_report+0xdc/0x118
[   76.790130]  kasan_report from kasan_check_range+0x14c/0x198
[   76.790161]  kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0
[   76.790191]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.790222]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.790252]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.790283]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.790283]  kthread from ret_from_fork+0x14/0x20
[   76.790313] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.790344] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.790344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.790374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.790374] 
[   76.907409] Allocated by task 321:
[   76.910827]  kasan_save_track+0x30/0x5c
[   76.914703]  __kasan_kmalloc+0x8c/0x94
[   76.918487]  kasan_atomics+0xc0/0x33c
[   76.922180]  kunit_try_run_case+0x22c/0x5a8
[   76.926391]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.931915]  kthread+0x464/0x810
[   76.935180]  ret_from_fork+0x14/0x20
[   76.938781] 
[   76.940277] The buggy address belongs to the object at cc23e880
[   76.940277]  which belongs to the cache kmalloc-64 of size 64
[   76.951995] The buggy address is located 0 bytes to the right of
[   76.951995]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.963562] 
[   76.965057] The buggy address belongs to the physical page:
[   76.970672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.977935] flags: 0x0(zone=0)
[   76.981018] page_type: f5(slab)
[   76.984191] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.992340] raw: 00000000
[   76.994995] page dumped because: kasan: bad access detected
[   77.000579] 
[   77.002105] Memory state around the buggy address:
[   77.006927]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.013488]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.020050] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.026641]                              ^
[   77.030761]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.037322]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.043914] ==================================================================
[   73.375488] ==================================================================
[   73.382751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0
[   73.390197] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.396972] 
[   73.398468] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.398498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.398498] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.398529] Call trace: 
[   73.398529]  unwind_backtrace from show_stack+0x18/0x1c
[   73.398559]  show_stack from dump_stack_lvl+0x70/0x90
[   73.398590]  dump_stack_lvl from print_report+0x158/0x528
[   73.398590]  print_report from kasan_report+0xdc/0x118
[   73.398620]  kasan_report from kasan_atomics_helper+0x550c/0x5ab0
[   73.398651]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.398681]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.398712]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.398712]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.398742]  kthread from ret_from_fork+0x14/0x20
[   73.398773] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.398803] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.398803] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.398834] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.398834] 
[   73.509826] Allocated by task 321:
[   73.513244]  kasan_save_track+0x30/0x5c
[   73.517120]  __kasan_kmalloc+0x8c/0x94
[   73.520904]  kasan_atomics+0xc0/0x33c
[   73.524597]  kunit_try_run_case+0x22c/0x5a8
[   73.528808]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.534332]  kthread+0x464/0x810
[   73.537597]  ret_from_fork+0x14/0x20
[   73.541198] 
[   73.542724] The buggy address belongs to the object at cc23e880
[   73.542724]  which belongs to the cache kmalloc-64 of size 64
[   73.554443] The buggy address is located 0 bytes to the right of
[   73.554443]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.565979] 
[   73.567504] The buggy address belongs to the physical page:
[   73.573089] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.580383] flags: 0x0(zone=0)
[   73.583465] page_type: f5(slab)
[   73.586639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.594787] raw: 00000000
[   73.597412] page dumped because: kasan: bad access detected
[   73.603027] 
[   73.604522] Memory state around the buggy address:
[   73.609344]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.615905]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.622497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.629058]                              ^
[   73.633178]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.639770]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.646331] ==================================================================
[   75.346405] ==================================================================
[   75.353698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0
[   75.361053] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   75.367797] 
[   75.369323] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   75.369323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.369354] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.369354] Call trace: 
[   75.369354]  unwind_backtrace from show_stack+0x18/0x1c
[   75.369384]  show_stack from dump_stack_lvl+0x70/0x90
[   75.369415]  dump_stack_lvl from print_report+0x158/0x528
[   75.369445]  print_report from kasan_report+0xdc/0x118
[   75.369476]  kasan_report from kasan_check_range+0x14c/0x198
[   75.369476]  kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0
[   75.369506]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.369537]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.369567]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.369598]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.369628]  kthread from ret_from_fork+0x14/0x20
[   75.369628] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   75.369659] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.369659] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.369689] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.369689] 
[   75.486724] Allocated by task 321:
[   75.490142]  kasan_save_track+0x30/0x5c
[   75.494018]  __kasan_kmalloc+0x8c/0x94
[   75.497802]  kasan_atomics+0xc0/0x33c
[   75.501495]  kunit_try_run_case+0x22c/0x5a8
[   75.505706]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.511230]  kthread+0x464/0x810
[   75.514495]  ret_from_fork+0x14/0x20
[   75.518096] 
[   75.519592] The buggy address belongs to the object at cc23e880
[   75.519592]  which belongs to the cache kmalloc-64 of size 64
[   75.531311] The buggy address is located 0 bytes to the right of
[   75.531311]  allocated 48-byte region [cc23e880, cc23e8b0)
[   75.542877] 
[   75.544372] The buggy address belongs to the physical page:
[   75.549987] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   75.557250] flags: 0x0(zone=0)
[   75.560333] page_type: f5(slab)
[   75.563507] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.571655] raw: 00000000
[   75.574310] page dumped because: kasan: bad access detected
[   75.579895] 
[   75.581420] Memory state around the buggy address:
[   75.586242]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.592803]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.599365] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.605957]                              ^
[   75.610076]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.616638]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.623229] ==================================================================
[   78.465881] ==================================================================
[   78.473144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0
[   78.480499] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.487243] 
[   78.488769] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.488800] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.488800] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.488800] Call trace: 
[   78.488830]  unwind_backtrace from show_stack+0x18/0x1c
[   78.488861]  show_stack from dump_stack_lvl+0x70/0x90
[   78.488861]  dump_stack_lvl from print_report+0x158/0x528
[   78.488891]  print_report from kasan_report+0xdc/0x118
[   78.488922]  kasan_report from kasan_check_range+0x14c/0x198
[   78.488952]  kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0
[   78.488952]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.488983]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.489013]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.489044]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.489074]  kthread from ret_from_fork+0x14/0x20
[   78.489105] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.489105] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.489135] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.489135] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.489166] 
[   78.606170] Allocated by task 321:
[   78.609588]  kasan_save_track+0x30/0x5c
[   78.613464]  __kasan_kmalloc+0x8c/0x94
[   78.617248]  kasan_atomics+0xc0/0x33c
[   78.620941]  kunit_try_run_case+0x22c/0x5a8
[   78.625152]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.630706]  kthread+0x464/0x810
[   78.633941]  ret_from_fork+0x14/0x20
[   78.637542] 
[   78.639068] The buggy address belongs to the object at cc23e880
[   78.639068]  which belongs to the cache kmalloc-64 of size 64
[   78.650787] The buggy address is located 0 bytes to the right of
[   78.650787]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.662322] 
[   78.663848] The buggy address belongs to the physical page:
[   78.669433] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.676727] flags: 0x0(zone=0)
[   78.679809] page_type: f5(slab)
[   78.682983] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.691101] raw: 00000000
[   78.693756] page dumped because: kasan: bad access detected
[   78.699371] 
[   78.700866] Memory state around the buggy address:
[   78.705688]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.712249]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.718841] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.725402]                              ^
[   78.729522]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.736114]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.742675] ==================================================================
[   89.503234] ==================================================================
[   89.510498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0
[   89.517944] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.524688] 
[   89.526214] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.526245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.526245] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.526245] Call trace: 
[   89.526275]  unwind_backtrace from show_stack+0x18/0x1c
[   89.526275]  show_stack from dump_stack_lvl+0x70/0x90
[   89.526306]  dump_stack_lvl from print_report+0x158/0x528
[   89.526336]  print_report from kasan_report+0xdc/0x118
[   89.526367]  kasan_report from kasan_check_range+0x14c/0x198
[   89.526397]  kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0
[   89.526397]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.526428]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.526458]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.526489]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.526519]  kthread from ret_from_fork+0x14/0x20
[   89.526519] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.526550] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.526580] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.526580] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.526611] 
[   89.643707] Allocated by task 321:
[   89.647125]  kasan_save_track+0x30/0x5c
[   89.651000]  __kasan_kmalloc+0x8c/0x94
[   89.654785]  kasan_atomics+0xc0/0x33c
[   89.658477]  kunit_try_run_case+0x22c/0x5a8
[   89.662689]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.668212]  kthread+0x464/0x810
[   89.671478]  ret_from_fork+0x14/0x20
[   89.675079] 
[   89.676574] The buggy address belongs to the object at cc23e880
[   89.676574]  which belongs to the cache kmalloc-64 of size 64
[   89.688293] The buggy address is located 0 bytes to the right of
[   89.688293]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.699859] 
[   89.701354] The buggy address belongs to the physical page:
[   89.706970] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.714233] flags: 0x0(zone=0)
[   89.717315] page_type: f5(slab)
[   89.720489] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.728637] raw: 00000000
[   89.731262] page dumped because: kasan: bad access detected
[   89.736877] 
[   89.738372] Memory state around the buggy address:
[   89.743194]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.749786]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.756347] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.762908]                              ^
[   89.767028]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.773620]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.780181] ==================================================================
[   82.420623] ==================================================================
[   82.427886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0
[   82.435333] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   82.442108] 
[   82.443603] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   82.443634] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.443634] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.443664] Call trace: 
[   82.443664]  unwind_backtrace from show_stack+0x18/0x1c
[   82.443695]  show_stack from dump_stack_lvl+0x70/0x90
[   82.443725]  dump_stack_lvl from print_report+0x158/0x528
[   82.443725]  print_report from kasan_report+0xdc/0x118
[   82.443756]  kasan_report from kasan_check_range+0x14c/0x198
[   82.443786]  kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0
[   82.443817]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.443847]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.443847]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.443878]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.443908]  kthread from ret_from_fork+0x14/0x20
[   82.443939] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   82.443939] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.443969] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.443969] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.444000] 
[   82.561096] Allocated by task 321:
[   82.564514]  kasan_save_track+0x30/0x5c
[   82.568389]  __kasan_kmalloc+0x8c/0x94
[   82.572174]  kasan_atomics+0xc0/0x33c
[   82.575866]  kunit_try_run_case+0x22c/0x5a8
[   82.580078]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.585632]  kthread+0x464/0x810
[   82.588867]  ret_from_fork+0x14/0x20
[   82.592468] 
[   82.593994] The buggy address belongs to the object at cc23e880
[   82.593994]  which belongs to the cache kmalloc-64 of size 64
[   82.605712] The buggy address is located 0 bytes to the right of
[   82.605712]  allocated 48-byte region [cc23e880, cc23e8b0)
[   82.617248] 
[   82.618774] The buggy address belongs to the physical page:
[   82.624359] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   82.631652] flags: 0x0(zone=0)
[   82.634735] page_type: f5(slab)
[   82.637878] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.646026] raw: 00000000
[   82.648681] page dumped because: kasan: bad access detected
[   82.654296] 
[   82.655792] Memory state around the buggy address:
[   82.660614]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.667175]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.673767] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.680328]                              ^
[   82.684448]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.691009]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.697601] ==================================================================
[   87.241363] ==================================================================
[   87.248657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0
[   87.256103] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.262847] 
[   87.264343] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.264373] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.264404] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.264404] Call trace: 
[   87.264404]  unwind_backtrace from show_stack+0x18/0x1c
[   87.264434]  show_stack from dump_stack_lvl+0x70/0x90
[   87.264465]  dump_stack_lvl from print_report+0x158/0x528
[   87.264495]  print_report from kasan_report+0xdc/0x118
[   87.264495]  kasan_report from kasan_check_range+0x14c/0x198
[   87.264526]  kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0
[   87.264556]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.264587]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.264617]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.264648]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.264648]  kthread from ret_from_fork+0x14/0x20
[   87.264678] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.264709] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.264709] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.264739] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.264739] 
[   87.381835] Allocated by task 321:
[   87.385284]  kasan_save_track+0x30/0x5c
[   87.389129]  __kasan_kmalloc+0x8c/0x94
[   87.392913]  kasan_atomics+0xc0/0x33c
[   87.396606]  kunit_try_run_case+0x22c/0x5a8
[   87.400848]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.406372]  kthread+0x464/0x810
[   87.409606]  ret_from_fork+0x14/0x20
[   87.413238] 
[   87.414733] The buggy address belongs to the object at cc23e880
[   87.414733]  which belongs to the cache kmalloc-64 of size 64
[   87.426452] The buggy address is located 0 bytes to the right of
[   87.426452]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.437988] 
[   87.439514] The buggy address belongs to the physical page:
[   87.445098] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.452392] flags: 0x0(zone=0)
[   87.455474] page_type: f5(slab)
[   87.458648] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.466766] raw: 00000000
[   87.469421] page dumped because: kasan: bad access detected
[   87.475036] 
[   87.476531] Memory state around the buggy address:
[   87.481353]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.487915]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.494506] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.501068]                              ^
[   87.505187]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.511749]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.518341] ==================================================================
[   83.835998] ==================================================================
[   83.843261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0
[   83.850738] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   83.857482] 
[   83.858978] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   83.859008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.859008] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.859039] Call trace: 
[   83.859039]  unwind_backtrace from show_stack+0x18/0x1c
[   83.859069]  show_stack from dump_stack_lvl+0x70/0x90
[   83.859100]  dump_stack_lvl from print_report+0x158/0x528
[   83.859130]  print_report from kasan_report+0xdc/0x118
[   83.859130]  kasan_report from kasan_check_range+0x14c/0x198
[   83.859161]  kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0
[   83.859191]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.859222]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.859252]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.859252]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.859283]  kthread from ret_from_fork+0x14/0x20
[   83.859313] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   83.859313] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.859344] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.859374] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.859374] 
[   83.976470] Allocated by task 321:
[   83.979919]  kasan_save_track+0x30/0x5c
[   83.983764]  __kasan_kmalloc+0x8c/0x94
[   83.987548]  kasan_atomics+0xc0/0x33c
[   83.991241]  kunit_try_run_case+0x22c/0x5a8
[   83.995483]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.001007]  kthread+0x464/0x810
[   84.004272]  ret_from_fork+0x14/0x20
[   84.007873] 
[   84.009368] The buggy address belongs to the object at cc23e880
[   84.009368]  which belongs to the cache kmalloc-64 of size 64
[   84.021087] The buggy address is located 0 bytes to the right of
[   84.021087]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.032653] 
[   84.034149] The buggy address belongs to the physical page:
[   84.039764] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.047027] flags: 0x0(zone=0)
[   84.050109] page_type: f5(slab)
[   84.053283] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.061431] raw: 00000000
[   84.064056] page dumped because: kasan: bad access detected
[   84.069671] 
[   84.071166] Memory state around the buggy address:
[   84.075988]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.082580]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.089141] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.095703]                              ^
[   84.099822]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.106414]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.112976] ==================================================================
[   81.017883] ==================================================================
[   81.025146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0
[   81.032592] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   81.039245] 
[   81.040771] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   81.040802] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.040802] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.040802] Call trace: 
[   81.040832]  unwind_backtrace from show_stack+0x18/0x1c
[   81.040832]  show_stack from dump_stack_lvl+0x70/0x90
[   81.040863]  dump_stack_lvl from print_report+0x158/0x528
[   81.040893]  print_report from kasan_report+0xdc/0x118
[   81.040924]  kasan_report from kasan_atomics_helper+0x520c/0x5ab0
[   81.040954]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.040954]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.040985]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.041015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.041046]  kthread from ret_from_fork+0x14/0x20
[   81.041076] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   81.041076] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.041107] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.041107] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.041137] 
[   81.152130] Allocated by task 321:
[   81.155548]  kasan_save_track+0x30/0x5c
[   81.159423]  __kasan_kmalloc+0x8c/0x94
[   81.163208]  kasan_atomics+0xc0/0x33c
[   81.166900]  kunit_try_run_case+0x22c/0x5a8
[   81.171112]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.176635]  kthread+0x464/0x810
[   81.179901]  ret_from_fork+0x14/0x20
[   81.183502] 
[   81.184997] The buggy address belongs to the object at cc23e880
[   81.184997]  which belongs to the cache kmalloc-64 of size 64
[   81.196716] The buggy address is located 0 bytes to the right of
[   81.196716]  allocated 48-byte region [cc23e880, cc23e8b0)
[   81.208282] 
[   81.209777] The buggy address belongs to the physical page:
[   81.215393] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   81.222656] flags: 0x0(zone=0)
[   81.225738] page_type: f5(slab)
[   81.228912] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.237060] raw: 00000000
[   81.239715] page dumped because: kasan: bad access detected
[   81.245300] 
[   81.246826] Memory state around the buggy address:
[   81.251647]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.258209]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.264770] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.271362]                              ^
[   81.275482]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.282043]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.288635] ==================================================================
[   84.973236] ==================================================================
[   84.980499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0
[   84.987945] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.994689] 
[   84.996215] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.996215] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.996246] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.996246] Call trace: 
[   84.996246]  unwind_backtrace from show_stack+0x18/0x1c
[   84.996276]  show_stack from dump_stack_lvl+0x70/0x90
[   84.996307]  dump_stack_lvl from print_report+0x158/0x528
[   84.996337]  print_report from kasan_report+0xdc/0x118
[   84.996368]  kasan_report from kasan_check_range+0x14c/0x198
[   84.996368]  kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0
[   84.996398]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.996429]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.996459]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.996490]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.996520]  kthread from ret_from_fork+0x14/0x20
[   84.996520] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.996551] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.996551] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.996582] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.996582] 
[   85.113708] Allocated by task 321:
[   85.117126]  kasan_save_track+0x30/0x5c
[   85.121002]  __kasan_kmalloc+0x8c/0x94
[   85.124786]  kasan_atomics+0xc0/0x33c
[   85.128479]  kunit_try_run_case+0x22c/0x5a8
[   85.132690]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.138214]  kthread+0x464/0x810
[   85.141479]  ret_from_fork+0x14/0x20
[   85.145080] 
[   85.146575] The buggy address belongs to the object at cc23e880
[   85.146575]  which belongs to the cache kmalloc-64 of size 64
[   85.158294] The buggy address is located 0 bytes to the right of
[   85.158294]  allocated 48-byte region [cc23e880, cc23e8b0)
[   85.169860] 
[   85.171356] The buggy address belongs to the physical page:
[   85.176971] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   85.184234] flags: 0x0(zone=0)
[   85.187316] page_type: f5(slab)
[   85.190490] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.198638] raw: 00000000
[   85.201263] page dumped because: kasan: bad access detected
[   85.206878] 
[   85.208374] Memory state around the buggy address:
[   85.213226]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.219787]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.226348] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.232940]                              ^
[   85.237060]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.243621]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.250213] ==================================================================
[   73.097381] ==================================================================
[   73.104644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0
[   73.112091] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   73.118743] 
[   73.120269] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   73.120300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.120300] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.120330] Call trace: 
[   73.120330]  unwind_backtrace from show_stack+0x18/0x1c
[   73.120361]  show_stack from dump_stack_lvl+0x70/0x90
[   73.120361]  dump_stack_lvl from print_report+0x158/0x528
[   73.120391]  print_report from kasan_report+0xdc/0x118
[   73.120422]  kasan_report from kasan_atomics_helper+0x5170/0x5ab0
[   73.120452]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.120483]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.120483]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.120513]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.120544]  kthread from ret_from_fork+0x14/0x20
[   73.120574] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   73.120574] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.120605] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.120635] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.120635] 
[   73.231628] Allocated by task 321:
[   73.235046]  kasan_save_track+0x30/0x5c
[   73.238922]  __kasan_kmalloc+0x8c/0x94
[   73.242706]  kasan_atomics+0xc0/0x33c
[   73.246398]  kunit_try_run_case+0x22c/0x5a8
[   73.250610]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.256134]  kthread+0x464/0x810
[   73.259399]  ret_from_fork+0x14/0x20
[   73.263000] 
[   73.264495] The buggy address belongs to the object at cc23e880
[   73.264495]  which belongs to the cache kmalloc-64 of size 64
[   73.276245] The buggy address is located 0 bytes to the right of
[   73.276245]  allocated 48-byte region [cc23e880, cc23e8b0)
[   73.287780] 
[   73.289276] The buggy address belongs to the physical page:
[   73.294891] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   73.302154] flags: 0x0(zone=0)
[   73.305236] page_type: f5(slab)
[   73.308410] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.316558] raw: 00000000
[   73.319213] page dumped because: kasan: bad access detected
[   73.324798] 
[   73.326324] Memory state around the buggy address:
[   73.331146]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.337707]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.344299] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.350860]                              ^
[   73.354980]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.361541]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.368133] ==================================================================
[   78.187805] ==================================================================
[   78.195068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0
[   78.202514] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   78.209197] 
[   78.210693] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   78.210723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.210723] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.210754] Call trace: 
[   78.210754]  unwind_backtrace from show_stack+0x18/0x1c
[   78.210784]  show_stack from dump_stack_lvl+0x70/0x90
[   78.210784]  dump_stack_lvl from print_report+0x158/0x528
[   78.210815]  print_report from kasan_report+0xdc/0x118
[   78.210845]  kasan_report from kasan_atomics_helper+0x5404/0x5ab0
[   78.210876]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.210906]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.210937]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.210937]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.210968]  kthread from ret_from_fork+0x14/0x20
[   78.210998] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   78.210998] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.211029] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.211059] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.211059] 
[   78.322052] Allocated by task 321:
[   78.325469]  kasan_save_track+0x30/0x5c
[   78.329345]  __kasan_kmalloc+0x8c/0x94
[   78.333129]  kasan_atomics+0xc0/0x33c
[   78.336822]  kunit_try_run_case+0x22c/0x5a8
[   78.341033]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.346557]  kthread+0x464/0x810
[   78.349822]  ret_from_fork+0x14/0x20
[   78.353424] 
[   78.354919] The buggy address belongs to the object at cc23e880
[   78.354919]  which belongs to the cache kmalloc-64 of size 64
[   78.366668] The buggy address is located 0 bytes to the right of
[   78.366668]  allocated 48-byte region [cc23e880, cc23e8b0)
[   78.378204] 
[   78.379699] The buggy address belongs to the physical page:
[   78.385314] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   78.392578] flags: 0x0(zone=0)
[   78.395660] page_type: f5(slab)
[   78.398834] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.406982] raw: 00000000
[   78.409637] page dumped because: kasan: bad access detected
[   78.415222] 
[   78.416748] Memory state around the buggy address:
[   78.421569]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.428131]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.434692] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.441284]                              ^
[   78.445404]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.451965]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.458557] ==================================================================
[   84.120300] ==================================================================
[   84.127563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0
[   84.135009] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   84.141784] 
[   84.143280] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   84.143310] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.143310] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.143341] Call trace: 
[   84.143341]  unwind_backtrace from show_stack+0x18/0x1c
[   84.143371]  show_stack from dump_stack_lvl+0x70/0x90
[   84.143402]  dump_stack_lvl from print_report+0x158/0x528
[   84.143402]  print_report from kasan_report+0xdc/0x118
[   84.143432]  kasan_report from kasan_check_range+0x14c/0x198
[   84.143463]  kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0
[   84.143493]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.143524]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.143524]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.143554]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.143585]  kthread from ret_from_fork+0x14/0x20
[   84.143615] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   84.143615] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.143646] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.143646] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.143676] 
[   84.260772] Allocated by task 321:
[   84.264190]  kasan_save_track+0x30/0x5c
[   84.268066]  __kasan_kmalloc+0x8c/0x94
[   84.271850]  kasan_atomics+0xc0/0x33c
[   84.275543]  kunit_try_run_case+0x22c/0x5a8
[   84.279754]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.285308]  kthread+0x464/0x810
[   84.288543]  ret_from_fork+0x14/0x20
[   84.292144] 
[   84.293670] The buggy address belongs to the object at cc23e880
[   84.293670]  which belongs to the cache kmalloc-64 of size 64
[   84.305389] The buggy address is located 0 bytes to the right of
[   84.305389]  allocated 48-byte region [cc23e880, cc23e8b0)
[   84.316925] 
[   84.318450] The buggy address belongs to the physical page:
[   84.324035] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   84.331329] flags: 0x0(zone=0)
[   84.334411] page_type: f5(slab)
[   84.337585] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.345733] raw: 00000000
[   84.348358] page dumped because: kasan: bad access detected
[   84.353973] 
[   84.355468] Memory state around the buggy address:
[   84.360290]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.366882]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.373443] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.380004]                              ^
[   84.384124]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.390716]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.397277] ==================================================================
[   87.525665] ==================================================================
[   87.532928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0
[   87.540405] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   87.547149] 
[   87.548645] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   87.548675] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.548675] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.548706] Call trace: 
[   87.548706]  unwind_backtrace from show_stack+0x18/0x1c
[   87.548736]  show_stack from dump_stack_lvl+0x70/0x90
[   87.548736]  dump_stack_lvl from print_report+0x158/0x528
[   87.548767]  print_report from kasan_report+0xdc/0x118
[   87.548797]  kasan_report from kasan_check_range+0x14c/0x198
[   87.548828]  kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0
[   87.548858]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.548858]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.548889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.548919]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.548950]  kthread from ret_from_fork+0x14/0x20
[   87.548980] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   87.548980] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.549011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.549011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.549041] 
[   87.666137] Allocated by task 321:
[   87.669555]  kasan_save_track+0x30/0x5c
[   87.673431]  __kasan_kmalloc+0x8c/0x94
[   87.677215]  kasan_atomics+0xc0/0x33c
[   87.680908]  kunit_try_run_case+0x22c/0x5a8
[   87.685119]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.690643]  kthread+0x464/0x810
[   87.693908]  ret_from_fork+0x14/0x20
[   87.697509] 
[   87.699005] The buggy address belongs to the object at cc23e880
[   87.699005]  which belongs to the cache kmalloc-64 of size 64
[   87.710723] The buggy address is located 0 bytes to the right of
[   87.710723]  allocated 48-byte region [cc23e880, cc23e8b0)
[   87.722290] 
[   87.723785] The buggy address belongs to the physical page:
[   87.729400] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   87.736663] flags: 0x0(zone=0)
[   87.739746] page_type: f5(slab)
[   87.742919] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.751068] raw: 00000000
[   87.753692] page dumped because: kasan: bad access detected
[   87.759307] 
[   87.760803] Memory state around the buggy address:
[   87.765624]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.772216]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.778778] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.785339]                              ^
[   87.789489]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.796051]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.802612] ==================================================================
[   76.198822] ==================================================================
[   76.206115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0
[   76.213470] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   76.220214] 
[   76.221710] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   76.221740] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.221771] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.221771] Call trace: 
[   76.221771]  unwind_backtrace from show_stack+0x18/0x1c
[   76.221801]  show_stack from dump_stack_lvl+0x70/0x90
[   76.221832]  dump_stack_lvl from print_report+0x158/0x528
[   76.221862]  print_report from kasan_report+0xdc/0x118
[   76.221893]  kasan_report from kasan_check_range+0x14c/0x198
[   76.221893]  kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0
[   76.221923]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.221954]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.221984]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.222015]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.222045]  kthread from ret_from_fork+0x14/0x20
[   76.222045] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   76.222076] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.222076] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.222106] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.222106] 
[   76.339141] Allocated by task 321:
[   76.342559]  kasan_save_track+0x30/0x5c
[   76.346435]  __kasan_kmalloc+0x8c/0x94
[   76.350219]  kasan_atomics+0xc0/0x33c
[   76.353912]  kunit_try_run_case+0x22c/0x5a8
[   76.358123]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.363647]  kthread+0x464/0x810
[   76.366912]  ret_from_fork+0x14/0x20
[   76.370513] 
[   76.372009] The buggy address belongs to the object at cc23e880
[   76.372009]  which belongs to the cache kmalloc-64 of size 64
[   76.383728] The buggy address is located 0 bytes to the right of
[   76.383728]  allocated 48-byte region [cc23e880, cc23e8b0)
[   76.395294] 
[   76.396789] The buggy address belongs to the physical page:
[   76.402404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   76.409667] flags: 0x0(zone=0)
[   76.412750] page_type: f5(slab)
[   76.415924] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.424072] raw: 00000000
[   76.426696] page dumped because: kasan: bad access detected
[   76.432312] 
[   76.433837] Memory state around the buggy address:
[   76.438659]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.445220]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.451782] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.458374]                              ^
[   76.462493]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.469055]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.475646] ==================================================================
[   80.455474] ==================================================================
[   80.462768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0
[   80.470214] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   80.476867] 
[   80.478393] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   80.478393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.478424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.478424] Call trace: 
[   80.478424]  unwind_backtrace from show_stack+0x18/0x1c
[   80.478454]  show_stack from dump_stack_lvl+0x70/0x90
[   80.478485]  dump_stack_lvl from print_report+0x158/0x528
[   80.478515]  print_report from kasan_report+0xdc/0x118
[   80.478546]  kasan_report from kasan_atomics_helper+0x5218/0x5ab0
[   80.478576]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.478576]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.478607]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.478637]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.478668]  kthread from ret_from_fork+0x14/0x20
[   80.478698] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   80.478698] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.478729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.478729] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.478759] 
[   80.589721] Allocated by task 321:
[   80.593170]  kasan_save_track+0x30/0x5c
[   80.597015]  __kasan_kmalloc+0x8c/0x94
[   80.600799]  kasan_atomics+0xc0/0x33c
[   80.604492]  kunit_try_run_case+0x22c/0x5a8
[   80.608734]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.614257]  kthread+0x464/0x810
[   80.617523]  ret_from_fork+0x14/0x20
[   80.621124] 
[   80.622619] The buggy address belongs to the object at cc23e880
[   80.622619]  which belongs to the cache kmalloc-64 of size 64
[   80.634338] The buggy address is located 0 bytes to the right of
[   80.634338]  allocated 48-byte region [cc23e880, cc23e8b0)
[   80.645904] 
[   80.647399] The buggy address belongs to the physical page:
[   80.653015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   80.660278] flags: 0x0(zone=0)
[   80.663360] page_type: f5(slab)
[   80.666534] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.674682] raw: 00000000
[   80.677307] page dumped because: kasan: bad access detected
[   80.682922] 
[   80.684417] Memory state around the buggy address:
[   80.689239]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.695831]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.702392] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.708953]                              ^
[   80.713104]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.719665]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.726226] ==================================================================
[   72.533111] ==================================================================
[   72.548065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0
[   72.555541] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   72.562194] 
[   72.563690] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   72.563720] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.563751] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.563751] Call trace: 
[   72.563751]  unwind_backtrace from show_stack+0x18/0x1c
[   72.563781]  show_stack from dump_stack_lvl+0x70/0x90
[   72.563812]  dump_stack_lvl from print_report+0x158/0x528
[   72.563842]  print_report from kasan_report+0xdc/0x118
[   72.563873]  kasan_report from kasan_atomics_helper+0x5044/0x5ab0
[   72.563873]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.563903]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.563934]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.563964]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.563995]  kthread from ret_from_fork+0x14/0x20
[   72.564025] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   72.564025] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.564056] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.564056] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.564086] 
[   72.675079] Allocated by task 321:
[   72.678497]  kasan_save_track+0x30/0x5c
[   72.682373]  __kasan_kmalloc+0x8c/0x94
[   72.686157]  kasan_atomics+0xc0/0x33c
[   72.689849]  kunit_try_run_case+0x22c/0x5a8
[   72.694061]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.699584]  kthread+0x464/0x810
[   72.702850]  ret_from_fork+0x14/0x20
[   72.706451] 
[   72.707977] The buggy address belongs to the object at cc23e880
[   72.707977]  which belongs to the cache kmalloc-64 of size 64
[   72.719696] The buggy address is located 0 bytes to the right of
[   72.719696]  allocated 48-byte region [cc23e880, cc23e8b0)
[   72.731231] 
[   72.732757] The buggy address belongs to the physical page:
[   72.738342] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   72.745635] flags: 0x0(zone=0)
[   72.748718] page_type: f5(slab)
[   72.751892] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.760009] raw: 00000000
[   72.762664] page dumped because: kasan: bad access detected
[   72.768280] 
[   72.769775] Memory state around the buggy address:
[   72.774597]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.781158]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.787750] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.794311]                              ^
[   72.798431]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.805023]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.811584] ==================================================================
[   77.619537] ==================================================================
[   77.626800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0
[   77.634185] Write of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   77.640930] 
[   77.642425] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   77.642456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.642456] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.642486] Call trace: 
[   77.642486]  unwind_backtrace from show_stack+0x18/0x1c
[   77.642517]  show_stack from dump_stack_lvl+0x70/0x90
[   77.642547]  dump_stack_lvl from print_report+0x158/0x528
[   77.642547]  print_report from kasan_report+0xdc/0x118
[   77.642578]  kasan_report from kasan_check_range+0x14c/0x198
[   77.642608]  kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0
[   77.642639]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.642669]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.642669]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.642700]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.642730]  kthread from ret_from_fork+0x14/0x20
[   77.642761] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   77.642761] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.642791] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.642822] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.642822] 
[   77.759826] Allocated by task 321:
[   77.763275]  kasan_save_track+0x30/0x5c
[   77.767120]  __kasan_kmalloc+0x8c/0x94
[   77.770904]  kasan_atomics+0xc0/0x33c
[   77.774597]  kunit_try_run_case+0x22c/0x5a8
[   77.778839]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.784362]  kthread+0x464/0x810
[   77.787597]  ret_from_fork+0x14/0x20
[   77.791229] 
[   77.792724] The buggy address belongs to the object at cc23e880
[   77.792724]  which belongs to the cache kmalloc-64 of size 64
[   77.804443] The buggy address is located 0 bytes to the right of
[   77.804443]  allocated 48-byte region [cc23e880, cc23e8b0)
[   77.816009] 
[   77.817504] The buggy address belongs to the physical page:
[   77.823120] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   77.830383] flags: 0x0(zone=0)
[   77.833465] page_type: f5(slab)
[   77.836639] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.844787] raw: 00000000
[   77.847412] page dumped because: kasan: bad access detected
[   77.853027] 
[   77.854522] Memory state around the buggy address:
[   77.859344]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.865936]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.872497] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.879058]                              ^
[   77.883209]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.889770]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.896331] ==================================================================
[   89.787506] ==================================================================
[   89.794769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0
[   89.802215] Read of size 4 at addr cc23e8b0 by task kunit_try_catch/321
[   89.808898] 
[   89.810394] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   89.810424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.810424] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.810455] Call trace: 
[   89.810455]  unwind_backtrace from show_stack+0x18/0x1c
[   89.810485]  show_stack from dump_stack_lvl+0x70/0x90
[   89.810516]  dump_stack_lvl from print_report+0x158/0x528
[   89.810516]  print_report from kasan_report+0xdc/0x118
[   89.810546]  kasan_report from kasan_atomics_helper+0x5500/0x5ab0
[   89.810577]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.810607]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.810638]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.810638]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.810668]  kthread from ret_from_fork+0x14/0x20
[   89.810699] Exception stack(0xf26f3fb0 to 0xf26f3ff8)
[   89.810729] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.810729] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.810760] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.810760] 
[   89.921752] Allocated by task 321:
[   89.925170]  kasan_save_track+0x30/0x5c
[   89.929046]  __kasan_kmalloc+0x8c/0x94
[   89.932830]  kasan_atomics+0xc0/0x33c
[   89.936523]  kunit_try_run_case+0x22c/0x5a8
[   89.940734]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.946258]  kthread+0x464/0x810
[   89.949523]  ret_from_fork+0x14/0x20
[   89.953124] 
[   89.954620] The buggy address belongs to the object at cc23e880
[   89.954620]  which belongs to the cache kmalloc-64 of size 64
[   89.966369] The buggy address is located 0 bytes to the right of
[   89.966369]  allocated 48-byte region [cc23e880, cc23e8b0)
[   89.977905] 
[   89.979400] The buggy address belongs to the physical page:
[   89.985015] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c23e
[   89.992279] flags: 0x0(zone=0)
[   89.995361] page_type: f5(slab)
[   89.998535] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   90.006683] raw: 00000000
[   90.009338] page dumped because: kasan: bad access detected
[   90.014923] 
[   90.016448] Memory state around the buggy address:
[   90.021270]  cc23e780: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.027832]  cc23e800: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.034393] >cc23e880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   90.040985]                              ^
[   90.045104]  cc23e900: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.051666]  cc23e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   90.058227] ==================================================================

[   64.520218] ==================================================================
[   64.527446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   64.534840] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.542239] 
[   64.543740] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.543747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.543749] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.543753] Call Trace:
[   64.543754]  <TASK>
[   64.543756]  dump_stack_lvl+0x73/0xb0
[   64.543760]  print_report+0xd1/0x650
[   64.543764]  ? __virt_addr_valid+0x1db/0x2d0
[   64.543768]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.543777]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543781]  kasan_report+0x141/0x180
[   64.543785]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.543790]  __asan_report_store8_noabort+0x1b/0x30
[   64.543794]  kasan_atomics_helper+0x50d4/0x5450
[   64.543798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.543803]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.543807]  ? kasan_atomics+0x152/0x310
[   64.543811]  kasan_atomics+0x1dc/0x310
[   64.543814]  ? __pfx_kasan_atomics+0x10/0x10
[   64.543818]  ? ktime_get_ts64+0x83/0x230
[   64.543823]  kunit_try_run_case+0x1a2/0x480
[   64.543827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.543832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.543837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.543841]  ? __kthread_parkme+0x82/0x180
[   64.543845]  ? preempt_count_sub+0x50/0x80
[   64.543850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.543855]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.543859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.543863]  kthread+0x334/0x6f0
[   64.543867]  ? trace_preempt_on+0x20/0xc0
[   64.543872]  ? __pfx_kthread+0x10/0x10
[   64.543876]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.543881]  ? calculate_sigpending+0x7b/0xa0
[   64.543885]  ? __pfx_kthread+0x10/0x10
[   64.543889]  ret_from_fork+0x3e/0x80
[   64.543894]  ? __pfx_kthread+0x10/0x10
[   64.543898]  ret_from_fork_asm+0x1a/0x30
[   64.543904]  </TASK>
[   64.543906] 
[   64.721510] Allocated by task 308:
[   64.724916]  kasan_save_stack+0x45/0x70
[   64.728755]  kasan_save_track+0x18/0x40
[   64.732594]  kasan_save_alloc_info+0x3b/0x50
[   64.736866]  __kasan_kmalloc+0xb7/0xc0
[   64.740618]  __kmalloc_cache_noprof+0x189/0x420
[   64.745151]  kasan_atomics+0x95/0x310
[   64.748819]  kunit_try_run_case+0x1a2/0x480
[   64.753013]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.758412]  kthread+0x334/0x6f0
[   64.761652]  ret_from_fork+0x3e/0x80
[   64.765232]  ret_from_fork_asm+0x1a/0x30
[   64.769164] 
[   64.770664] The buggy address belongs to the object at ffff8881061f7500
[   64.770664]  which belongs to the cache kmalloc-64 of size 64
[   64.783023] The buggy address is located 0 bytes to the right of
[   64.783023]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.795884] 
[   64.797384] The buggy address belongs to the physical page:
[   64.802954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.810954] flags: 0x200000000000000(node=0|zone=2)
[   64.815833] page_type: f5(slab)
[   64.818982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.826737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.834484] page dumped because: kasan: bad access detected
[   64.840057] 
[   64.841556] Memory state around the buggy address:
[   64.846347]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.853568]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.860795] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.868021]                                      ^
[   64.872815]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.880035]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.887262] ==================================================================
[   55.483797] ==================================================================
[   55.491027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   55.498333] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.505741] 
[   55.507243] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.507251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.507253] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.507257] Call Trace:
[   55.507258]  <TASK>
[   55.507260]  dump_stack_lvl+0x73/0xb0
[   55.507264]  print_report+0xd1/0x650
[   55.507268]  ? __virt_addr_valid+0x1db/0x2d0
[   55.507272]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.507280]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507285]  kasan_report+0x141/0x180
[   55.507289]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.507294]  kasan_check_range+0x10c/0x1c0
[   55.507299]  __kasan_check_write+0x18/0x20
[   55.507303]  kasan_atomics_helper+0x8f9/0x5450
[   55.507307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.507312]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.507316]  ? kasan_atomics+0x152/0x310
[   55.507320]  kasan_atomics+0x1dc/0x310
[   55.507323]  ? __pfx_kasan_atomics+0x10/0x10
[   55.507327]  ? ktime_get_ts64+0x83/0x230
[   55.507332]  kunit_try_run_case+0x1a2/0x480
[   55.507336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.507341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.507345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.507350]  ? __kthread_parkme+0x82/0x180
[   55.507355]  ? preempt_count_sub+0x50/0x80
[   55.507359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.507364]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.507368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.507373]  kthread+0x334/0x6f0
[   55.507377]  ? trace_preempt_on+0x20/0xc0
[   55.507381]  ? __pfx_kthread+0x10/0x10
[   55.507386]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.507390]  ? calculate_sigpending+0x7b/0xa0
[   55.507394]  ? __pfx_kthread+0x10/0x10
[   55.507399]  ret_from_fork+0x3e/0x80
[   55.507403]  ? __pfx_kthread+0x10/0x10
[   55.507407]  ret_from_fork_asm+0x1a/0x30
[   55.507413]  </TASK>
[   55.507415] 
[   55.687994] Allocated by task 308:
[   55.691400]  kasan_save_stack+0x45/0x70
[   55.695249]  kasan_save_track+0x18/0x40
[   55.699088]  kasan_save_alloc_info+0x3b/0x50
[   55.703358]  __kasan_kmalloc+0xb7/0xc0
[   55.707113]  __kmalloc_cache_noprof+0x189/0x420
[   55.711645]  kasan_atomics+0x95/0x310
[   55.715311]  kunit_try_run_case+0x1a2/0x480
[   55.719505]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.724903]  kthread+0x334/0x6f0
[   55.728136]  ret_from_fork+0x3e/0x80
[   55.731735]  ret_from_fork_asm+0x1a/0x30
[   55.735666] 
[   55.737191] The buggy address belongs to the object at ffff8881061f7500
[   55.737191]  which belongs to the cache kmalloc-64 of size 64
[   55.749525] The buggy address is located 0 bytes to the right of
[   55.749525]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.762386] 
[   55.763885] The buggy address belongs to the physical page:
[   55.769457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.777456] flags: 0x200000000000000(node=0|zone=2)
[   55.782333] page_type: f5(slab)
[   55.785481] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.793219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.800958] page dumped because: kasan: bad access detected
[   55.806532] 
[   55.808031] Memory state around the buggy address:
[   55.812822]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.820043]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.827269] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.834488]                                      ^
[   55.839283]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.846508]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.853735] ==================================================================
[   64.142438] ==================================================================
[   64.149668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   64.157111] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.164511] 
[   64.166013] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.166020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.166022] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.166026] Call Trace:
[   64.166028]  <TASK>
[   64.166029]  dump_stack_lvl+0x73/0xb0
[   64.166033]  print_report+0xd1/0x650
[   64.166037]  ? __virt_addr_valid+0x1db/0x2d0
[   64.166041]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.166050]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166054]  kasan_report+0x141/0x180
[   64.166058]  ? kasan_atomics_helper+0x1467/0x5450
[   64.166063]  kasan_check_range+0x10c/0x1c0
[   64.166068]  __kasan_check_write+0x18/0x20
[   64.166072]  kasan_atomics_helper+0x1467/0x5450
[   64.166076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.166081]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.166085]  ? kasan_atomics+0x152/0x310
[   64.166089]  kasan_atomics+0x1dc/0x310
[   64.166092]  ? __pfx_kasan_atomics+0x10/0x10
[   64.166096]  ? ktime_get_ts64+0x83/0x230
[   64.166101]  kunit_try_run_case+0x1a2/0x480
[   64.166106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.166110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.166115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.166119]  ? __kthread_parkme+0x82/0x180
[   64.166124]  ? preempt_count_sub+0x50/0x80
[   64.166129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.166133]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.166137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.166142]  kthread+0x334/0x6f0
[   64.166146]  ? trace_preempt_on+0x20/0xc0
[   64.166150]  ? __pfx_kthread+0x10/0x10
[   64.166155]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.166159]  ? calculate_sigpending+0x7b/0xa0
[   64.166163]  ? __pfx_kthread+0x10/0x10
[   64.166168]  ret_from_fork+0x3e/0x80
[   64.166172]  ? __pfx_kthread+0x10/0x10
[   64.166176]  ret_from_fork_asm+0x1a/0x30
[   64.166182]  </TASK>
[   64.166184] 
[   64.347154] Allocated by task 308:
[   64.350560]  kasan_save_stack+0x45/0x70
[   64.354407]  kasan_save_track+0x18/0x40
[   64.358247]  kasan_save_alloc_info+0x3b/0x50
[   64.362527]  __kasan_kmalloc+0xb7/0xc0
[   64.366280]  __kmalloc_cache_noprof+0x189/0x420
[   64.370813]  kasan_atomics+0x95/0x310
[   64.374477]  kunit_try_run_case+0x1a2/0x480
[   64.378664]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.384096]  kthread+0x334/0x6f0
[   64.387330]  ret_from_fork+0x3e/0x80
[   64.390909]  ret_from_fork_asm+0x1a/0x30
[   64.394836] 
[   64.396334] The buggy address belongs to the object at ffff8881061f7500
[   64.396334]  which belongs to the cache kmalloc-64 of size 64
[   64.408691] The buggy address is located 0 bytes to the right of
[   64.408691]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.421578] 
[   64.423078] The buggy address belongs to the physical page:
[   64.428650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.436649] flags: 0x200000000000000(node=0|zone=2)
[   64.441527] page_type: f5(slab)
[   64.444691] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.452441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.460188] page dumped because: kasan: bad access detected
[   64.465760] 
[   64.467257] Memory state around the buggy address:
[   64.472051]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.479272]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.486500] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.493742]                                      ^
[   64.498535]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.505755]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.512974] ==================================================================
[   54.729077] ==================================================================
[   54.736310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   54.743623] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   54.751023] 
[   54.752525] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   54.752533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.752535] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.752538] Call Trace:
[   54.752540]  <TASK>
[   54.752542]  dump_stack_lvl+0x73/0xb0
[   54.752546]  print_report+0xd1/0x650
[   54.752550]  ? __virt_addr_valid+0x1db/0x2d0
[   54.752554]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752558]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.752562]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752567]  kasan_report+0x141/0x180
[   54.752571]  ? kasan_atomics_helper+0x7c7/0x5450
[   54.752576]  kasan_check_range+0x10c/0x1c0
[   54.752581]  __kasan_check_write+0x18/0x20
[   54.752584]  kasan_atomics_helper+0x7c7/0x5450
[   54.752589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.752593]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.752597]  ? kasan_atomics+0x152/0x310
[   54.752601]  kasan_atomics+0x1dc/0x310
[   54.752605]  ? __pfx_kasan_atomics+0x10/0x10
[   54.752609]  ? ktime_get_ts64+0x83/0x230
[   54.752614]  kunit_try_run_case+0x1a2/0x480
[   54.752618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.752623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.752627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.752632]  ? __kthread_parkme+0x82/0x180
[   54.752636]  ? preempt_count_sub+0x50/0x80
[   54.752641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.752646]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.752650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.752654]  kthread+0x334/0x6f0
[   54.752658]  ? trace_preempt_on+0x20/0xc0
[   54.752663]  ? __pfx_kthread+0x10/0x10
[   54.752667]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.752689]  ? calculate_sigpending+0x7b/0xa0
[   54.752693]  ? __pfx_kthread+0x10/0x10
[   54.752698]  ret_from_fork+0x3e/0x80
[   54.752702]  ? __pfx_kthread+0x10/0x10
[   54.752707]  ret_from_fork_asm+0x1a/0x30
[   54.752725]  </TASK>
[   54.752727] 
[   54.933413] Allocated by task 308:
[   54.936819]  kasan_save_stack+0x45/0x70
[   54.940659]  kasan_save_track+0x18/0x40
[   54.944533]  kasan_save_alloc_info+0x3b/0x50
[   54.948804]  __kasan_kmalloc+0xb7/0xc0
[   54.952558]  __kmalloc_cache_noprof+0x189/0x420
[   54.957091]  kasan_atomics+0x95/0x310
[   54.960757]  kunit_try_run_case+0x1a2/0x480
[   54.964948]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.970348]  kthread+0x334/0x6f0
[   54.973582]  ret_from_fork+0x3e/0x80
[   54.977171]  ret_from_fork_asm+0x1a/0x30
[   54.981104] 
[   54.982604] The buggy address belongs to the object at ffff8881061f7500
[   54.982604]  which belongs to the cache kmalloc-64 of size 64
[   54.994945] The buggy address is located 0 bytes to the right of
[   54.994945]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.007812] 
[   55.009312] The buggy address belongs to the physical page:
[   55.014884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.022885] flags: 0x200000000000000(node=0|zone=2)
[   55.027763] page_type: f5(slab)
[   55.030909] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.038648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.046386] page dumped because: kasan: bad access detected
[   55.051959] 
[   55.053457] Memory state around the buggy address:
[   55.058251]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.065469]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.072718] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.079941]                                      ^
[   55.084739]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.091962]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.099183] ==================================================================
[   69.049053] ==================================================================
[   69.056272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   69.063663] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.071084] 
[   69.072582] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.072589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.072592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.072595] Call Trace:
[   69.072597]  <TASK>
[   69.072598]  dump_stack_lvl+0x73/0xb0
[   69.072602]  print_report+0xd1/0x650
[   69.072606]  ? __virt_addr_valid+0x1db/0x2d0
[   69.072610]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.072618]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072622]  kasan_report+0x141/0x180
[   69.072627]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.072632]  kasan_check_range+0x10c/0x1c0
[   69.072637]  __kasan_check_write+0x18/0x20
[   69.072640]  kasan_atomics_helper+0x1c18/0x5450
[   69.072645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.072649]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.072653]  ? kasan_atomics+0x152/0x310
[   69.072657]  kasan_atomics+0x1dc/0x310
[   69.072660]  ? __pfx_kasan_atomics+0x10/0x10
[   69.072664]  ? ktime_get_ts64+0x83/0x230
[   69.072669]  kunit_try_run_case+0x1a2/0x480
[   69.072691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.072695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.072700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.072717]  ? __kthread_parkme+0x82/0x180
[   69.072722]  ? preempt_count_sub+0x50/0x80
[   69.072726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.072731]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.072735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.072739]  kthread+0x334/0x6f0
[   69.072743]  ? trace_preempt_on+0x20/0xc0
[   69.072748]  ? __pfx_kthread+0x10/0x10
[   69.072752]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.072757]  ? calculate_sigpending+0x7b/0xa0
[   69.072761]  ? __pfx_kthread+0x10/0x10
[   69.072765]  ret_from_fork+0x3e/0x80
[   69.072769]  ? __pfx_kthread+0x10/0x10
[   69.072773]  ret_from_fork_asm+0x1a/0x30
[   69.072779]  </TASK>
[   69.072781] 
[   69.253863] Allocated by task 308:
[   69.257269]  kasan_save_stack+0x45/0x70
[   69.261109]  kasan_save_track+0x18/0x40
[   69.264946]  kasan_save_alloc_info+0x3b/0x50
[   69.269219]  __kasan_kmalloc+0xb7/0xc0
[   69.272971]  __kmalloc_cache_noprof+0x189/0x420
[   69.277503]  kasan_atomics+0x95/0x310
[   69.281170]  kunit_try_run_case+0x1a2/0x480
[   69.285357]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.290754]  kthread+0x334/0x6f0
[   69.293988]  ret_from_fork+0x3e/0x80
[   69.297568]  ret_from_fork_asm+0x1a/0x30
[   69.301502] 
[   69.303001] The buggy address belongs to the object at ffff8881061f7500
[   69.303001]  which belongs to the cache kmalloc-64 of size 64
[   69.315341] The buggy address is located 0 bytes to the right of
[   69.315341]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   69.328202] 
[   69.329707] The buggy address belongs to the physical page:
[   69.335308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   69.343308] flags: 0x200000000000000(node=0|zone=2)
[   69.348186] page_type: f5(slab)
[   69.351334] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.359080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.366819] page dumped because: kasan: bad access detected
[   69.372393] 
[   69.373890] Memory state around the buggy address:
[   69.378705]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.385946]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.393164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.400383]                                      ^
[   69.405176]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.412396]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.419624] ==================================================================
[   64.894503] ==================================================================
[   64.901742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   64.909134] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   64.916528] 
[   64.918026] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   64.918034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.918036] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.918039] Call Trace:
[   64.918041]  <TASK>
[   64.918043]  dump_stack_lvl+0x73/0xb0
[   64.918046]  print_report+0xd1/0x650
[   64.918051]  ? __virt_addr_valid+0x1db/0x2d0
[   64.918054]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.918063]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918067]  kasan_report+0x141/0x180
[   64.918072]  ? kasan_atomics_helper+0x151d/0x5450
[   64.918077]  kasan_check_range+0x10c/0x1c0
[   64.918082]  __kasan_check_write+0x18/0x20
[   64.918085]  kasan_atomics_helper+0x151d/0x5450
[   64.918090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.918094]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.918098]  ? kasan_atomics+0x152/0x310
[   64.918102]  kasan_atomics+0x1dc/0x310
[   64.918105]  ? __pfx_kasan_atomics+0x10/0x10
[   64.918109]  ? ktime_get_ts64+0x83/0x230
[   64.918114]  kunit_try_run_case+0x1a2/0x480
[   64.918119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.918123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.918128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.918132]  ? __kthread_parkme+0x82/0x180
[   64.918137]  ? preempt_count_sub+0x50/0x80
[   64.918141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.918146]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.918150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.918154]  kthread+0x334/0x6f0
[   64.918158]  ? trace_preempt_on+0x20/0xc0
[   64.918163]  ? __pfx_kthread+0x10/0x10
[   64.918167]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.918171]  ? calculate_sigpending+0x7b/0xa0
[   64.918175]  ? __pfx_kthread+0x10/0x10
[   64.918180]  ret_from_fork+0x3e/0x80
[   64.918184]  ? __pfx_kthread+0x10/0x10
[   64.918189]  ret_from_fork_asm+0x1a/0x30
[   64.918194]  </TASK>
[   64.918196] 
[   65.099135] Allocated by task 308:
[   65.102540]  kasan_save_stack+0x45/0x70
[   65.106387]  kasan_save_track+0x18/0x40
[   65.110227]  kasan_save_alloc_info+0x3b/0x50
[   65.114500]  __kasan_kmalloc+0xb7/0xc0
[   65.118253]  __kmalloc_cache_noprof+0x189/0x420
[   65.122784]  kasan_atomics+0x95/0x310
[   65.126449]  kunit_try_run_case+0x1a2/0x480
[   65.130635]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.136033]  kthread+0x334/0x6f0
[   65.139267]  ret_from_fork+0x3e/0x80
[   65.142846]  ret_from_fork_asm+0x1a/0x30
[   65.146771] 
[   65.148271] The buggy address belongs to the object at ffff8881061f7500
[   65.148271]  which belongs to the cache kmalloc-64 of size 64
[   65.160614] The buggy address is located 0 bytes to the right of
[   65.160614]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.173482] 
[   65.174981] The buggy address belongs to the physical page:
[   65.180554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.188560] flags: 0x200000000000000(node=0|zone=2)
[   65.193440] page_type: f5(slab)
[   65.196588] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.204333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.212072] page dumped because: kasan: bad access detected
[   65.217644] 
[   65.219144] Memory state around the buggy address:
[   65.223936]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.231156]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.238374] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.245593]                                      ^
[   65.250385]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.257607]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.264834] ==================================================================
[   54.351904] ==================================================================
[   54.359125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   54.366432] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   54.373825] 
[   54.375326] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   54.375334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.375336] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.375339] Call Trace:
[   54.375341]  <TASK>
[   54.375343]  dump_stack_lvl+0x73/0xb0
[   54.375346]  print_report+0xd1/0x650
[   54.375351]  ? __virt_addr_valid+0x1db/0x2d0
[   54.375355]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.375363]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375368]  kasan_report+0x141/0x180
[   54.375372]  ? kasan_atomics_helper+0x72f/0x5450
[   54.375377]  kasan_check_range+0x10c/0x1c0
[   54.375382]  __kasan_check_write+0x18/0x20
[   54.375386]  kasan_atomics_helper+0x72f/0x5450
[   54.375390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.375394]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.375398]  ? kasan_atomics+0x152/0x310
[   54.375402]  kasan_atomics+0x1dc/0x310
[   54.375406]  ? __pfx_kasan_atomics+0x10/0x10
[   54.375410]  ? ktime_get_ts64+0x83/0x230
[   54.375415]  kunit_try_run_case+0x1a2/0x480
[   54.375419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.375424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.375428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.375433]  ? __kthread_parkme+0x82/0x180
[   54.375437]  ? preempt_count_sub+0x50/0x80
[   54.375442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.375446]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.375451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.375455]  kthread+0x334/0x6f0
[   54.375459]  ? trace_preempt_on+0x20/0xc0
[   54.375463]  ? __pfx_kthread+0x10/0x10
[   54.375468]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.375472]  ? calculate_sigpending+0x7b/0xa0
[   54.375476]  ? __pfx_kthread+0x10/0x10
[   54.375481]  ret_from_fork+0x3e/0x80
[   54.375485]  ? __pfx_kthread+0x10/0x10
[   54.375489]  ret_from_fork_asm+0x1a/0x30
[   54.375495]  </TASK>
[   54.375496] 
[   54.556126] Allocated by task 308:
[   54.559532]  kasan_save_stack+0x45/0x70
[   54.563373]  kasan_save_track+0x18/0x40
[   54.567211]  kasan_save_alloc_info+0x3b/0x50
[   54.571486]  __kasan_kmalloc+0xb7/0xc0
[   54.575246]  __kmalloc_cache_noprof+0x189/0x420
[   54.579777]  kasan_atomics+0x95/0x310
[   54.583443]  kunit_try_run_case+0x1a2/0x480
[   54.587628]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.593028]  kthread+0x334/0x6f0
[   54.596262]  ret_from_fork+0x3e/0x80
[   54.599849]  ret_from_fork_asm+0x1a/0x30
[   54.603775] 
[   54.605275] The buggy address belongs to the object at ffff8881061f7500
[   54.605275]  which belongs to the cache kmalloc-64 of size 64
[   54.617615] The buggy address is located 0 bytes to the right of
[   54.617615]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   54.630474] 
[   54.631973] The buggy address belongs to the physical page:
[   54.637549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   54.645554] flags: 0x200000000000000(node=0|zone=2)
[   54.650433] page_type: f5(slab)
[   54.653581] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.661327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.669065] page dumped because: kasan: bad access detected
[   54.674640] 
[   54.676138] Memory state around the buggy address:
[   54.680932]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.688158]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.695378] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.702596]                                      ^
[   54.707387]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.714609]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.721836] ==================================================================
[   52.468093] ==================================================================
[   52.475323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   52.482637] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.490030] 
[   52.491528] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.491536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.491538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.491541] Call Trace:
[   52.491543]  <TASK>
[   52.491545]  dump_stack_lvl+0x73/0xb0
[   52.491549]  print_report+0xd1/0x650
[   52.491553]  ? __virt_addr_valid+0x1db/0x2d0
[   52.491557]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.491565]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491570]  kasan_report+0x141/0x180
[   52.491574]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.491579]  kasan_check_range+0x10c/0x1c0
[   52.491584]  __kasan_check_write+0x18/0x20
[   52.491588]  kasan_atomics_helper+0x4a0/0x5450
[   52.491592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.491597]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.491601]  ? kasan_atomics+0x152/0x310
[   52.491605]  kasan_atomics+0x1dc/0x310
[   52.491608]  ? __pfx_kasan_atomics+0x10/0x10
[   52.491612]  ? ktime_get_ts64+0x83/0x230
[   52.491617]  kunit_try_run_case+0x1a2/0x480
[   52.491621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.491626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.491630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.491635]  ? __kthread_parkme+0x82/0x180
[   52.491639]  ? preempt_count_sub+0x50/0x80
[   52.491644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.491649]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.491653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.491657]  kthread+0x334/0x6f0
[   52.491661]  ? trace_preempt_on+0x20/0xc0
[   52.491666]  ? __pfx_kthread+0x10/0x10
[   52.491687]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.491692]  ? calculate_sigpending+0x7b/0xa0
[   52.491696]  ? __pfx_kthread+0x10/0x10
[   52.491701]  ret_from_fork+0x3e/0x80
[   52.491705]  ? __pfx_kthread+0x10/0x10
[   52.491722]  ret_from_fork_asm+0x1a/0x30
[   52.491728]  </TASK>
[   52.491729] 
[   52.672418] Allocated by task 308:
[   52.675824]  kasan_save_stack+0x45/0x70
[   52.679666]  kasan_save_track+0x18/0x40
[   52.683528]  kasan_save_alloc_info+0x3b/0x50
[   52.687802]  __kasan_kmalloc+0xb7/0xc0
[   52.691555]  __kmalloc_cache_noprof+0x189/0x420
[   52.696088]  kasan_atomics+0x95/0x310
[   52.699753]  kunit_try_run_case+0x1a2/0x480
[   52.703939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.709345]  kthread+0x334/0x6f0
[   52.712579]  ret_from_fork+0x3e/0x80
[   52.716166]  ret_from_fork_asm+0x1a/0x30
[   52.720091] 
[   52.721591] The buggy address belongs to the object at ffff8881061f7500
[   52.721591]  which belongs to the cache kmalloc-64 of size 64
[   52.733933] The buggy address is located 0 bytes to the right of
[   52.733933]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   52.746801] 
[   52.748300] The buggy address belongs to the physical page:
[   52.753875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.761881] flags: 0x200000000000000(node=0|zone=2)
[   52.766760] page_type: f5(slab)
[   52.769906] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.777646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.785383] page dumped because: kasan: bad access detected
[   52.790958] 
[   52.792457] Memory state around the buggy address:
[   52.797250]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.804478]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.811703] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.818948]                                      ^
[   52.823752]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.830977]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.838198] ==================================================================
[   55.860990] ==================================================================
[   55.868208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   55.875516] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.882915] 
[   55.884416] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.884423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.884426] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.884429] Call Trace:
[   55.884431]  <TASK>
[   55.884432]  dump_stack_lvl+0x73/0xb0
[   55.884436]  print_report+0xd1/0x650
[   55.884440]  ? __virt_addr_valid+0x1db/0x2d0
[   55.884444]  ? kasan_atomics_helper+0x992/0x5450
[   55.884448]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.884453]  ? kasan_atomics_helper+0x992/0x5450
[   55.884457]  kasan_report+0x141/0x180
[   55.884461]  ? kasan_atomics_helper+0x992/0x5450
[   55.884466]  kasan_check_range+0x10c/0x1c0
[   55.884471]  __kasan_check_write+0x18/0x20
[   55.884475]  kasan_atomics_helper+0x992/0x5450
[   55.884480]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.884484]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.884488]  ? kasan_atomics+0x152/0x310
[   55.884492]  kasan_atomics+0x1dc/0x310
[   55.884496]  ? __pfx_kasan_atomics+0x10/0x10
[   55.884500]  ? ktime_get_ts64+0x83/0x230
[   55.884504]  kunit_try_run_case+0x1a2/0x480
[   55.884509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.884513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.884518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.884523]  ? __kthread_parkme+0x82/0x180
[   55.884527]  ? preempt_count_sub+0x50/0x80
[   55.884532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.884537]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.884541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.884545]  kthread+0x334/0x6f0
[   55.884550]  ? trace_preempt_on+0x20/0xc0
[   55.884554]  ? __pfx_kthread+0x10/0x10
[   55.884558]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.884563]  ? calculate_sigpending+0x7b/0xa0
[   55.884567]  ? __pfx_kthread+0x10/0x10
[   55.884571]  ret_from_fork+0x3e/0x80
[   55.884575]  ? __pfx_kthread+0x10/0x10
[   55.884580]  ret_from_fork_asm+0x1a/0x30
[   55.884586]  </TASK>
[   55.884587] 
[   56.065246] Allocated by task 308:
[   56.068650]  kasan_save_stack+0x45/0x70
[   56.072489]  kasan_save_track+0x18/0x40
[   56.076329]  kasan_save_alloc_info+0x3b/0x50
[   56.080602]  __kasan_kmalloc+0xb7/0xc0
[   56.084355]  __kmalloc_cache_noprof+0x189/0x420
[   56.088887]  kasan_atomics+0x95/0x310
[   56.092553]  kunit_try_run_case+0x1a2/0x480
[   56.096748]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.102155]  kthread+0x334/0x6f0
[   56.105388]  ret_from_fork+0x3e/0x80
[   56.108967]  ret_from_fork_asm+0x1a/0x30
[   56.112899] 
[   56.114399] The buggy address belongs to the object at ffff8881061f7500
[   56.114399]  which belongs to the cache kmalloc-64 of size 64
[   56.126741] The buggy address is located 0 bytes to the right of
[   56.126741]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.139603] 
[   56.141099] The buggy address belongs to the physical page:
[   56.146691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.154719] flags: 0x200000000000000(node=0|zone=2)
[   56.159605] page_type: f5(slab)
[   56.162752] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.170497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.178237] page dumped because: kasan: bad access detected
[   56.183810] 
[   56.185307] Memory state around the buggy address:
[   56.190099]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.197320]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.204538] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.211757]                                      ^
[   56.216549]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.223769]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.230988] ==================================================================
[   57.747478] ==================================================================
[   57.754719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   57.762126] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.769433] 
[   57.770932] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.770939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.770942] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.770945] Call Trace:
[   57.770947]  <TASK>
[   57.770948]  dump_stack_lvl+0x73/0xb0
[   57.770952]  print_report+0xd1/0x650
[   57.770956]  ? __virt_addr_valid+0x1db/0x2d0
[   57.770960]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.770969]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770973]  kasan_report+0x141/0x180
[   57.770978]  ? kasan_atomics_helper+0x4a84/0x5450
[   57.770983]  __asan_report_load4_noabort+0x18/0x20
[   57.770987]  kasan_atomics_helper+0x4a84/0x5450
[   57.770991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.770995]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.770999]  ? kasan_atomics+0x152/0x310
[   57.771004]  kasan_atomics+0x1dc/0x310
[   57.771007]  ? __pfx_kasan_atomics+0x10/0x10
[   57.771011]  ? ktime_get_ts64+0x83/0x230
[   57.771016]  kunit_try_run_case+0x1a2/0x480
[   57.771020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.771025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.771029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.771034]  ? __kthread_parkme+0x82/0x180
[   57.771038]  ? preempt_count_sub+0x50/0x80
[   57.771043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.771048]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.771052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.771056]  kthread+0x334/0x6f0
[   57.771061]  ? trace_preempt_on+0x20/0xc0
[   57.771065]  ? __pfx_kthread+0x10/0x10
[   57.771070]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.771074]  ? calculate_sigpending+0x7b/0xa0
[   57.771078]  ? __pfx_kthread+0x10/0x10
[   57.771083]  ret_from_fork+0x3e/0x80
[   57.771087]  ? __pfx_kthread+0x10/0x10
[   57.771091]  ret_from_fork_asm+0x1a/0x30
[   57.771097]  </TASK>
[   57.771099] 
[   57.948734] Allocated by task 308:
[   57.952142]  kasan_save_stack+0x45/0x70
[   57.955981]  kasan_save_track+0x18/0x40
[   57.959821]  kasan_save_alloc_info+0x3b/0x50
[   57.964095]  __kasan_kmalloc+0xb7/0xc0
[   57.967854]  __kmalloc_cache_noprof+0x189/0x420
[   57.972387]  kasan_atomics+0x95/0x310
[   57.976051]  kunit_try_run_case+0x1a2/0x480
[   57.980237]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.985637]  kthread+0x334/0x6f0
[   57.988870]  ret_from_fork+0x3e/0x80
[   57.992448]  ret_from_fork_asm+0x1a/0x30
[   57.996375] 
[   57.997874] The buggy address belongs to the object at ffff8881061f7500
[   57.997874]  which belongs to the cache kmalloc-64 of size 64
[   58.010215] The buggy address is located 0 bytes to the right of
[   58.010215]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.023077] 
[   58.024574] The buggy address belongs to the physical page:
[   58.030149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.038155] flags: 0x200000000000000(node=0|zone=2)
[   58.043035] page_type: f5(slab)
[   58.046181] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.053930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.061703] page dumped because: kasan: bad access detected
[   58.067300] 
[   58.068798] Memory state around the buggy address:
[   58.073591]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.080811]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.088029] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.095250]                                      ^
[   58.100041]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.107259]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.114478] ==================================================================
[   52.845466] ==================================================================
[   52.852719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   52.860122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.867522] 
[   52.869022] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.869030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.869032] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.869036] Call Trace:
[   52.869038]  <TASK>
[   52.869040]  dump_stack_lvl+0x73/0xb0
[   52.869043]  print_report+0xd1/0x650
[   52.869048]  ? __virt_addr_valid+0x1db/0x2d0
[   52.869052]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.869061]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869065]  kasan_report+0x141/0x180
[   52.869069]  ? kasan_atomics_helper+0x4b3a/0x5450
[   52.869075]  __asan_report_store4_noabort+0x1b/0x30
[   52.869079]  kasan_atomics_helper+0x4b3a/0x5450
[   52.869083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.869088]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.869092]  ? kasan_atomics+0x152/0x310
[   52.869096]  kasan_atomics+0x1dc/0x310
[   52.869100]  ? __pfx_kasan_atomics+0x10/0x10
[   52.869104]  ? ktime_get_ts64+0x83/0x230
[   52.869108]  kunit_try_run_case+0x1a2/0x480
[   52.869113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.869118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.869122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.869127]  ? __kthread_parkme+0x82/0x180
[   52.869131]  ? preempt_count_sub+0x50/0x80
[   52.869136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.869141]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.869145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.869149]  kthread+0x334/0x6f0
[   52.869154]  ? trace_preempt_on+0x20/0xc0
[   52.869158]  ? __pfx_kthread+0x10/0x10
[   52.869163]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.869167]  ? calculate_sigpending+0x7b/0xa0
[   52.869171]  ? __pfx_kthread+0x10/0x10
[   52.869176]  ret_from_fork+0x3e/0x80
[   52.869180]  ? __pfx_kthread+0x10/0x10
[   52.869184]  ret_from_fork_asm+0x1a/0x30
[   52.869190]  </TASK>
[   52.869192] 
[   53.046862] Allocated by task 308:
[   53.050267]  kasan_save_stack+0x45/0x70
[   53.054108]  kasan_save_track+0x18/0x40
[   53.057946]  kasan_save_alloc_info+0x3b/0x50
[   53.062219]  __kasan_kmalloc+0xb7/0xc0
[   53.065973]  __kmalloc_cache_noprof+0x189/0x420
[   53.070512]  kasan_atomics+0x95/0x310
[   53.074179]  kunit_try_run_case+0x1a2/0x480
[   53.078375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.083781]  kthread+0x334/0x6f0
[   53.087015]  ret_from_fork+0x3e/0x80
[   53.090602]  ret_from_fork_asm+0x1a/0x30
[   53.094536] 
[   53.096034] The buggy address belongs to the object at ffff8881061f7500
[   53.096034]  which belongs to the cache kmalloc-64 of size 64
[   53.108366] The buggy address is located 0 bytes to the right of
[   53.108366]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.121227] 
[   53.122740] The buggy address belongs to the physical page:
[   53.128318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.136324] flags: 0x200000000000000(node=0|zone=2)
[   53.141204] page_type: f5(slab)
[   53.144349] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.152088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.159828] page dumped because: kasan: bad access detected
[   53.165400] 
[   53.166900] Memory state around the buggy address:
[   53.171719]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.178945]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.186164] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.193384]                                      ^
[   53.198175]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.205394]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.212615] ==================================================================
[   73.244500] ==================================================================
[   73.251744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   73.259141] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   73.266534] 
[   73.268036] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   73.268044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.268046] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.268049] Call Trace:
[   73.268051]  <TASK>
[   73.268053]  dump_stack_lvl+0x73/0xb0
[   73.268057]  print_report+0xd1/0x650
[   73.268061]  ? __virt_addr_valid+0x1db/0x2d0
[   73.268065]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.268073]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268078]  kasan_report+0x141/0x180
[   73.268082]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.268087]  kasan_check_range+0x10c/0x1c0
[   73.268092]  __kasan_check_write+0x18/0x20
[   73.268096]  kasan_atomics_helper+0x20c8/0x5450
[   73.268100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.268105]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.268109]  ? kasan_atomics+0x152/0x310
[   73.268113]  kasan_atomics+0x1dc/0x310
[   73.268116]  ? __pfx_kasan_atomics+0x10/0x10
[   73.268120]  ? ktime_get_ts64+0x83/0x230
[   73.268125]  kunit_try_run_case+0x1a2/0x480
[   73.268130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.268134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.268139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.268144]  ? __kthread_parkme+0x82/0x180
[   73.268148]  ? preempt_count_sub+0x50/0x80
[   73.268153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.268157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.268162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.268166]  kthread+0x334/0x6f0
[   73.268170]  ? trace_preempt_on+0x20/0xc0
[   73.268175]  ? __pfx_kthread+0x10/0x10
[   73.268179]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.268183]  ? calculate_sigpending+0x7b/0xa0
[   73.268187]  ? __pfx_kthread+0x10/0x10
[   73.268192]  ret_from_fork+0x3e/0x80
[   73.268196]  ? __pfx_kthread+0x10/0x10
[   73.268201]  ret_from_fork_asm+0x1a/0x30
[   73.268207]  </TASK>
[   73.268208] 
[   73.449203] Allocated by task 308:
[   73.452608]  kasan_save_stack+0x45/0x70
[   73.456454]  kasan_save_track+0x18/0x40
[   73.460295]  kasan_save_alloc_info+0x3b/0x50
[   73.464568]  __kasan_kmalloc+0xb7/0xc0
[   73.468319]  __kmalloc_cache_noprof+0x189/0x420
[   73.472851]  kasan_atomics+0x95/0x310
[   73.476519]  kunit_try_run_case+0x1a2/0x480
[   73.480734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.486138]  kthread+0x334/0x6f0
[   73.489378]  ret_from_fork+0x3e/0x80
[   73.492958]  ret_from_fork_asm+0x1a/0x30
[   73.496883] 
[   73.498384] The buggy address belongs to the object at ffff8881061f7500
[   73.498384]  which belongs to the cache kmalloc-64 of size 64
[   73.510746] The buggy address is located 0 bytes to the right of
[   73.510746]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.523612] 
[   73.525109] The buggy address belongs to the physical page:
[   73.530718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.538739] flags: 0x200000000000000(node=0|zone=2)
[   73.543621] page_type: f5(slab)
[   73.546769] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.554516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.562263] page dumped because: kasan: bad access detected
[   73.567834] 
[   73.569332] Memory state around the buggy address:
[   73.574125]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.581344]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.588565] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.595785]                                      ^
[   73.600574]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.607795]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.615015] ==================================================================
[   51.342423] ==================================================================
[   51.349653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   51.357052] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   51.364445] 
[   51.365946] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   51.365954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.365956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.365960] Call Trace:
[   51.365962]  <TASK>
[   51.365963]  dump_stack_lvl+0x73/0xb0
[   51.365967]  print_report+0xd1/0x650
[   51.365971]  ? __virt_addr_valid+0x1db/0x2d0
[   51.365975]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.365984]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365988]  kasan_report+0x141/0x180
[   51.365993]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.365998]  __asan_report_store4_noabort+0x1b/0x30
[   51.366002]  kasan_atomics_helper+0x4b6e/0x5450
[   51.366006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.366011]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.366015]  ? kasan_atomics+0x152/0x310
[   51.366019]  kasan_atomics+0x1dc/0x310
[   51.366022]  ? __pfx_kasan_atomics+0x10/0x10
[   51.366026]  ? ktime_get_ts64+0x83/0x230
[   51.366031]  kunit_try_run_case+0x1a2/0x480
[   51.366036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.366040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.366045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.366050]  ? __kthread_parkme+0x82/0x180
[   51.366054]  ? preempt_count_sub+0x50/0x80
[   51.366059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.366063]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.366068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.366072]  kthread+0x334/0x6f0
[   51.366076]  ? trace_preempt_on+0x20/0xc0
[   51.366081]  ? __pfx_kthread+0x10/0x10
[   51.366085]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.366089]  ? calculate_sigpending+0x7b/0xa0
[   51.366094]  ? __pfx_kthread+0x10/0x10
[   51.366098]  ret_from_fork+0x3e/0x80
[   51.366102]  ? __pfx_kthread+0x10/0x10
[   51.366107]  ret_from_fork_asm+0x1a/0x30
[   51.366113]  </TASK>
[   51.366115] 
[   51.543882] Allocated by task 308:
[   51.547288]  kasan_save_stack+0x45/0x70
[   51.551134]  kasan_save_track+0x18/0x40
[   51.554975]  kasan_save_alloc_info+0x3b/0x50
[   51.559245]  __kasan_kmalloc+0xb7/0xc0
[   51.563000]  __kmalloc_cache_noprof+0x189/0x420
[   51.567531]  kasan_atomics+0x95/0x310
[   51.571196]  kunit_try_run_case+0x1a2/0x480
[   51.575384]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.580790]  kthread+0x334/0x6f0
[   51.584024]  ret_from_fork+0x3e/0x80
[   51.587611]  ret_from_fork_asm+0x1a/0x30
[   51.591536] 
[   51.593035] The buggy address belongs to the object at ffff8881061f7500
[   51.593035]  which belongs to the cache kmalloc-64 of size 64
[   51.605367] The buggy address is located 0 bytes to the right of
[   51.605367]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.618230] 
[   51.619733] The buggy address belongs to the physical page:
[   51.625310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   51.633316] flags: 0x200000000000000(node=0|zone=2)
[   51.638195] page_type: f5(slab)
[   51.641342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.649089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.656828] page dumped because: kasan: bad access detected
[   51.662400] 
[   51.663901] Memory state around the buggy address:
[   51.668718]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.675948]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.683173] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.690394]                                      ^
[   51.695186]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.702412]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.709633] ==================================================================
[   73.622258] ==================================================================
[   73.629485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   73.636879] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   73.644183] 
[   73.645718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   73.645725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   73.645728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.645731] Call Trace:
[   73.645733]  <TASK>
[   73.645735]  dump_stack_lvl+0x73/0xb0
[   73.645738]  print_report+0xd1/0x650
[   73.645743]  ? __virt_addr_valid+0x1db/0x2d0
[   73.645746]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.645755]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645759]  kasan_report+0x141/0x180
[   73.645764]  ? kasan_atomics_helper+0x4fb2/0x5450
[   73.645769]  __asan_report_load8_noabort+0x18/0x20
[   73.645773]  kasan_atomics_helper+0x4fb2/0x5450
[   73.645777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.645782]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.645786]  ? kasan_atomics+0x152/0x310
[   73.645790]  kasan_atomics+0x1dc/0x310
[   73.645793]  ? __pfx_kasan_atomics+0x10/0x10
[   73.645797]  ? ktime_get_ts64+0x83/0x230
[   73.645802]  kunit_try_run_case+0x1a2/0x480
[   73.645807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.645811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.645816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.645821]  ? __kthread_parkme+0x82/0x180
[   73.645825]  ? preempt_count_sub+0x50/0x80
[   73.645830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.645834]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.645839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.645843]  kthread+0x334/0x6f0
[   73.645847]  ? trace_preempt_on+0x20/0xc0
[   73.645852]  ? __pfx_kthread+0x10/0x10
[   73.645856]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.645861]  ? calculate_sigpending+0x7b/0xa0
[   73.645865]  ? __pfx_kthread+0x10/0x10
[   73.645869]  ret_from_fork+0x3e/0x80
[   73.645873]  ? __pfx_kthread+0x10/0x10
[   73.645878]  ret_from_fork_asm+0x1a/0x30
[   73.645884]  </TASK>
[   73.645886] 
[   73.823462] Allocated by task 308:
[   73.826869]  kasan_save_stack+0x45/0x70
[   73.830709]  kasan_save_track+0x18/0x40
[   73.834573]  kasan_save_alloc_info+0x3b/0x50
[   73.838846]  __kasan_kmalloc+0xb7/0xc0
[   73.842597]  __kmalloc_cache_noprof+0x189/0x420
[   73.847132]  kasan_atomics+0x95/0x310
[   73.850797]  kunit_try_run_case+0x1a2/0x480
[   73.854984]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.860391]  kthread+0x334/0x6f0
[   73.863622]  ret_from_fork+0x3e/0x80
[   73.867203]  ret_from_fork_asm+0x1a/0x30
[   73.871136] 
[   73.872636] The buggy address belongs to the object at ffff8881061f7500
[   73.872636]  which belongs to the cache kmalloc-64 of size 64
[   73.884978] The buggy address is located 0 bytes to the right of
[   73.884978]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.897847] 
[   73.899345] The buggy address belongs to the physical page:
[   73.904917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.912917] flags: 0x200000000000000(node=0|zone=2)
[   73.917794] page_type: f5(slab)
[   73.920944] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.928707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.936472] page dumped because: kasan: bad access detected
[   73.942044] 
[   73.943544] Memory state around the buggy address:
[   73.948336]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.955565]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.962792] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.970018]                                      ^
[   73.974810]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982031]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.989257] ==================================================================
[   56.615566] ==================================================================
[   56.622799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   56.630112] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   56.637504] 
[   56.639005] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   56.639012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.639015] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.639018] Call Trace:
[   56.639020]  <TASK>
[   56.639022]  dump_stack_lvl+0x73/0xb0
[   56.639025]  print_report+0xd1/0x650
[   56.639030]  ? __virt_addr_valid+0x1db/0x2d0
[   56.639033]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.639042]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639046]  kasan_report+0x141/0x180
[   56.639051]  ? kasan_atomics_helper+0xac7/0x5450
[   56.639056]  kasan_check_range+0x10c/0x1c0
[   56.639061]  __kasan_check_write+0x18/0x20
[   56.639064]  kasan_atomics_helper+0xac7/0x5450
[   56.639069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.639073]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.639077]  ? kasan_atomics+0x152/0x310
[   56.639081]  kasan_atomics+0x1dc/0x310
[   56.639084]  ? __pfx_kasan_atomics+0x10/0x10
[   56.639088]  ? ktime_get_ts64+0x83/0x230
[   56.639093]  kunit_try_run_case+0x1a2/0x480
[   56.639098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.639102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.639106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.639111]  ? __kthread_parkme+0x82/0x180
[   56.639115]  ? preempt_count_sub+0x50/0x80
[   56.639120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.639125]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.639129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.639133]  kthread+0x334/0x6f0
[   56.639137]  ? trace_preempt_on+0x20/0xc0
[   56.639142]  ? __pfx_kthread+0x10/0x10
[   56.639146]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.639150]  ? calculate_sigpending+0x7b/0xa0
[   56.639154]  ? __pfx_kthread+0x10/0x10
[   56.639159]  ret_from_fork+0x3e/0x80
[   56.639163]  ? __pfx_kthread+0x10/0x10
[   56.639167]  ret_from_fork_asm+0x1a/0x30
[   56.639173]  </TASK>
[   56.639175] 
[   56.819912] Allocated by task 308:
[   56.823317]  kasan_save_stack+0x45/0x70
[   56.827157]  kasan_save_track+0x18/0x40
[   56.830996]  kasan_save_alloc_info+0x3b/0x50
[   56.835268]  __kasan_kmalloc+0xb7/0xc0
[   56.839021]  __kmalloc_cache_noprof+0x189/0x420
[   56.843552]  kasan_atomics+0x95/0x310
[   56.847220]  kunit_try_run_case+0x1a2/0x480
[   56.851406]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.856804]  kthread+0x334/0x6f0
[   56.860036]  ret_from_fork+0x3e/0x80
[   56.863615]  ret_from_fork_asm+0x1a/0x30
[   56.867542] 
[   56.869042] The buggy address belongs to the object at ffff8881061f7500
[   56.869042]  which belongs to the cache kmalloc-64 of size 64
[   56.881381] The buggy address is located 0 bytes to the right of
[   56.881381]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.894244] 
[   56.895741] The buggy address belongs to the physical page:
[   56.901315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.909322] flags: 0x200000000000000(node=0|zone=2)
[   56.914202] page_type: f5(slab)
[   56.917347] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.925086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.932824] page dumped because: kasan: bad access detected
[   56.938399] 
[   56.939898] Memory state around the buggy address:
[   56.944706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.951943]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.959162] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.966381]                                      ^
[   56.971174]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.978391]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.985611] ==================================================================
[   60.382472] ==================================================================
[   60.389716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   60.397122] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.404521] 
[   60.406024] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.406031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.406033] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.406037] Call Trace:
[   60.406039]  <TASK>
[   60.406040]  dump_stack_lvl+0x73/0xb0
[   60.406044]  print_report+0xd1/0x650
[   60.406048]  ? __virt_addr_valid+0x1db/0x2d0
[   60.406052]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.406061]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406065]  kasan_report+0x141/0x180
[   60.406069]  ? kasan_atomics_helper+0x1079/0x5450
[   60.406075]  kasan_check_range+0x10c/0x1c0
[   60.406079]  __kasan_check_write+0x18/0x20
[   60.406083]  kasan_atomics_helper+0x1079/0x5450
[   60.406087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.406092]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.406096]  ? kasan_atomics+0x152/0x310
[   60.406100]  kasan_atomics+0x1dc/0x310
[   60.406104]  ? __pfx_kasan_atomics+0x10/0x10
[   60.406107]  ? ktime_get_ts64+0x83/0x230
[   60.406112]  kunit_try_run_case+0x1a2/0x480
[   60.406117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.406121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.406126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.406131]  ? __kthread_parkme+0x82/0x180
[   60.406135]  ? preempt_count_sub+0x50/0x80
[   60.406139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.406144]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.406148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.406153]  kthread+0x334/0x6f0
[   60.406157]  ? trace_preempt_on+0x20/0xc0
[   60.406161]  ? __pfx_kthread+0x10/0x10
[   60.406166]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.406170]  ? calculate_sigpending+0x7b/0xa0
[   60.406174]  ? __pfx_kthread+0x10/0x10
[   60.406179]  ret_from_fork+0x3e/0x80
[   60.406183]  ? __pfx_kthread+0x10/0x10
[   60.406187]  ret_from_fork_asm+0x1a/0x30
[   60.406193]  </TASK>
[   60.406195] 
[   60.587223] Allocated by task 308:
[   60.590632]  kasan_save_stack+0x45/0x70
[   60.594478]  kasan_save_track+0x18/0x40
[   60.598316]  kasan_save_alloc_info+0x3b/0x50
[   60.602589]  __kasan_kmalloc+0xb7/0xc0
[   60.606343]  __kmalloc_cache_noprof+0x189/0x420
[   60.610875]  kasan_atomics+0x95/0x310
[   60.614541]  kunit_try_run_case+0x1a2/0x480
[   60.618734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.624133]  kthread+0x334/0x6f0
[   60.627368]  ret_from_fork+0x3e/0x80
[   60.630955]  ret_from_fork_asm+0x1a/0x30
[   60.634887] 
[   60.636388] The buggy address belongs to the object at ffff8881061f7500
[   60.636388]  which belongs to the cache kmalloc-64 of size 64
[   60.648740] The buggy address is located 0 bytes to the right of
[   60.648740]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   60.661608] 
[   60.663105] The buggy address belongs to the physical page:
[   60.668707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   60.676741] flags: 0x200000000000000(node=0|zone=2)
[   60.681618] page_type: f5(slab)
[   60.684763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.692502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.700241] page dumped because: kasan: bad access detected
[   60.705813] 
[   60.707314] Memory state around the buggy address:
[   60.712104]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.719324]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.726543] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.733762]                                      ^
[   60.738556]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.745782]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.753003] ==================================================================
[   50.968124] ==================================================================
[   50.975375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   50.982776] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.990088] 
[   50.991590] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.991598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.991600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.991603] Call Trace:
[   50.991605]  <TASK>
[   50.991607]  dump_stack_lvl+0x73/0xb0
[   50.991610]  print_report+0xd1/0x650
[   50.991615]  ? __virt_addr_valid+0x1db/0x2d0
[   50.991619]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.991627]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991631]  kasan_report+0x141/0x180
[   50.991636]  ? kasan_atomics_helper+0x4b88/0x5450
[   50.991641]  __asan_report_load4_noabort+0x18/0x20
[   50.991645]  kasan_atomics_helper+0x4b88/0x5450
[   50.991649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.991654]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.991657]  ? kasan_atomics+0x152/0x310
[   50.991662]  kasan_atomics+0x1dc/0x310
[   50.991665]  ? __pfx_kasan_atomics+0x10/0x10
[   50.991669]  ? ktime_get_ts64+0x83/0x230
[   50.991691]  kunit_try_run_case+0x1a2/0x480
[   50.991695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.991700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.991705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.991722]  ? __kthread_parkme+0x82/0x180
[   50.991726]  ? preempt_count_sub+0x50/0x80
[   50.991731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.991736]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.991740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.991745]  kthread+0x334/0x6f0
[   50.991749]  ? trace_preempt_on+0x20/0xc0
[   50.991753]  ? __pfx_kthread+0x10/0x10
[   50.991758]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.991762]  ? calculate_sigpending+0x7b/0xa0
[   50.991766]  ? __pfx_kthread+0x10/0x10
[   50.991771]  ret_from_fork+0x3e/0x80
[   50.991775]  ? __pfx_kthread+0x10/0x10
[   50.991779]  ret_from_fork_asm+0x1a/0x30
[   50.991785]  </TASK>
[   50.991787] 
[   51.169412] Allocated by task 308:
[   51.172819]  kasan_save_stack+0x45/0x70
[   51.176666]  kasan_save_track+0x18/0x40
[   51.180531]  kasan_save_alloc_info+0x3b/0x50
[   51.184803]  __kasan_kmalloc+0xb7/0xc0
[   51.188554]  __kmalloc_cache_noprof+0x189/0x420
[   51.193086]  kasan_atomics+0x95/0x310
[   51.196753]  kunit_try_run_case+0x1a2/0x480
[   51.200939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.206339]  kthread+0x334/0x6f0
[   51.209570]  ret_from_fork+0x3e/0x80
[   51.213149]  ret_from_fork_asm+0x1a/0x30
[   51.217077] 
[   51.218574] The buggy address belongs to the object at ffff8881061f7500
[   51.218574]  which belongs to the cache kmalloc-64 of size 64
[   51.230916] The buggy address is located 0 bytes to the right of
[   51.230916]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.243779] 
[   51.245277] The buggy address belongs to the physical page:
[   51.250847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   51.258848] flags: 0x200000000000000(node=0|zone=2)
[   51.263741] page_type: f5(slab)
[   51.266892] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.274638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.282386] page dumped because: kasan: bad access detected
[   51.287956] 
[   51.289456] Memory state around the buggy address:
[   51.294250]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.301470]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.308704] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.315949]                                      ^
[   51.320743]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.327961]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.335181] ==================================================================
[   50.593723] ==================================================================
[   50.600999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   50.608391] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.615786] 
[   50.617285] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.617293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.617295] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.617299] Call Trace:
[   50.617300]  <TASK>
[   50.617302]  dump_stack_lvl+0x73/0xb0
[   50.617306]  print_report+0xd1/0x650
[   50.617311]  ? __virt_addr_valid+0x1db/0x2d0
[   50.617315]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.617323]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617327]  kasan_report+0x141/0x180
[   50.617332]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.617337]  __asan_report_store4_noabort+0x1b/0x30
[   50.617341]  kasan_atomics_helper+0x4ba2/0x5450
[   50.617345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.617349]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.617353]  ? kasan_atomics+0x152/0x310
[   50.617358]  kasan_atomics+0x1dc/0x310
[   50.617361]  ? __pfx_kasan_atomics+0x10/0x10
[   50.617365]  ? ktime_get_ts64+0x83/0x230
[   50.617370]  kunit_try_run_case+0x1a2/0x480
[   50.617374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.617378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.617383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.617388]  ? __kthread_parkme+0x82/0x180
[   50.617392]  ? preempt_count_sub+0x50/0x80
[   50.617397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.617401]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.617406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.617410]  kthread+0x334/0x6f0
[   50.617414]  ? trace_preempt_on+0x20/0xc0
[   50.617419]  ? __pfx_kthread+0x10/0x10
[   50.617423]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.617427]  ? calculate_sigpending+0x7b/0xa0
[   50.617432]  ? __pfx_kthread+0x10/0x10
[   50.617436]  ret_from_fork+0x3e/0x80
[   50.617440]  ? __pfx_kthread+0x10/0x10
[   50.617445]  ret_from_fork_asm+0x1a/0x30
[   50.617451]  </TASK>
[   50.617452] 
[   50.795117] Allocated by task 308:
[   50.798522]  kasan_save_stack+0x45/0x70
[   50.802361]  kasan_save_track+0x18/0x40
[   50.806199]  kasan_save_alloc_info+0x3b/0x50
[   50.810474]  __kasan_kmalloc+0xb7/0xc0
[   50.814232]  __kmalloc_cache_noprof+0x189/0x420
[   50.818766]  kasan_atomics+0x95/0x310
[   50.822432]  kunit_try_run_case+0x1a2/0x480
[   50.826625]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.832025]  kthread+0x334/0x6f0
[   50.835258]  ret_from_fork+0x3e/0x80
[   50.838835]  ret_from_fork_asm+0x1a/0x30
[   50.842761] 
[   50.844261] The buggy address belongs to the object at ffff8881061f7500
[   50.844261]  which belongs to the cache kmalloc-64 of size 64
[   50.856604] The buggy address is located 0 bytes to the right of
[   50.856604]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   50.869473] 
[   50.870973] The buggy address belongs to the physical page:
[   50.876545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   50.884553] flags: 0x200000000000000(node=0|zone=2)
[   50.889440] page_type: f5(slab)
[   50.892587] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.900332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.908072] page dumped because: kasan: bad access detected
[   50.913644] 
[   50.915143] Memory state around the buggy address:
[   50.919937]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.927165]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.934392] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.941617]                                      ^
[   50.946410]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.953631]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.960848] ==================================================================
[   53.219864] ==================================================================
[   53.227095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   53.234399] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.241792] 
[   53.243293] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.243300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.243302] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.243306] Call Trace:
[   53.243308]  <TASK>
[   53.243309]  dump_stack_lvl+0x73/0xb0
[   53.243313]  print_report+0xd1/0x650
[   53.243318]  ? __virt_addr_valid+0x1db/0x2d0
[   53.243321]  ? kasan_atomics_helper+0x565/0x5450
[   53.243325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.243330]  ? kasan_atomics_helper+0x565/0x5450
[   53.243334]  kasan_report+0x141/0x180
[   53.243338]  ? kasan_atomics_helper+0x565/0x5450
[   53.243344]  kasan_check_range+0x10c/0x1c0
[   53.243348]  __kasan_check_write+0x18/0x20
[   53.243352]  kasan_atomics_helper+0x565/0x5450
[   53.243357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.243361]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.243365]  ? kasan_atomics+0x152/0x310
[   53.243369]  kasan_atomics+0x1dc/0x310
[   53.243372]  ? __pfx_kasan_atomics+0x10/0x10
[   53.243376]  ? ktime_get_ts64+0x83/0x230
[   53.243381]  kunit_try_run_case+0x1a2/0x480
[   53.243386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.243390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.243395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.243400]  ? __kthread_parkme+0x82/0x180
[   53.243404]  ? preempt_count_sub+0x50/0x80
[   53.243409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.243413]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.243417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.243421]  kthread+0x334/0x6f0
[   53.243426]  ? trace_preempt_on+0x20/0xc0
[   53.243430]  ? __pfx_kthread+0x10/0x10
[   53.243435]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.243439]  ? calculate_sigpending+0x7b/0xa0
[   53.243443]  ? __pfx_kthread+0x10/0x10
[   53.243447]  ret_from_fork+0x3e/0x80
[   53.243452]  ? __pfx_kthread+0x10/0x10
[   53.243456]  ret_from_fork_asm+0x1a/0x30
[   53.243462]  </TASK>
[   53.243463] 
[   53.424217] Allocated by task 308:
[   53.427623]  kasan_save_stack+0x45/0x70
[   53.431464]  kasan_save_track+0x18/0x40
[   53.435311]  kasan_save_alloc_info+0x3b/0x50
[   53.439583]  __kasan_kmalloc+0xb7/0xc0
[   53.443336]  __kmalloc_cache_noprof+0x189/0x420
[   53.447868]  kasan_atomics+0x95/0x310
[   53.451534]  kunit_try_run_case+0x1a2/0x480
[   53.455738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.461146]  kthread+0x334/0x6f0
[   53.464378]  ret_from_fork+0x3e/0x80
[   53.467955]  ret_from_fork_asm+0x1a/0x30
[   53.471881] 
[   53.473381] The buggy address belongs to the object at ffff8881061f7500
[   53.473381]  which belongs to the cache kmalloc-64 of size 64
[   53.485742] The buggy address is located 0 bytes to the right of
[   53.485742]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.498610] 
[   53.500108] The buggy address belongs to the physical page:
[   53.505705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.513745] flags: 0x200000000000000(node=0|zone=2)
[   53.518630] page_type: f5(slab)
[   53.521774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.529513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.537252] page dumped because: kasan: bad access detected
[   53.542824] 
[   53.544323] Memory state around the buggy address:
[   53.549115]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.556335]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.563553] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.570772]                                      ^
[   53.575568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.582794]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.590012] ==================================================================
[   61.886452] ==================================================================
[   61.893707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   61.901126] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.908519] 
[   61.910017] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.910024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.910026] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.910030] Call Trace:
[   61.910032]  <TASK>
[   61.910033]  dump_stack_lvl+0x73/0xb0
[   61.910037]  print_report+0xd1/0x650
[   61.910041]  ? __virt_addr_valid+0x1db/0x2d0
[   61.910045]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.910053]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910058]  kasan_report+0x141/0x180
[   61.910062]  ? kasan_atomics_helper+0x1217/0x5450
[   61.910067]  kasan_check_range+0x10c/0x1c0
[   61.910072]  __kasan_check_write+0x18/0x20
[   61.910076]  kasan_atomics_helper+0x1217/0x5450
[   61.910080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.910085]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.910089]  ? kasan_atomics+0x152/0x310
[   61.910093]  kasan_atomics+0x1dc/0x310
[   61.910096]  ? __pfx_kasan_atomics+0x10/0x10
[   61.910100]  ? ktime_get_ts64+0x83/0x230
[   61.910105]  kunit_try_run_case+0x1a2/0x480
[   61.910109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.910114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.910118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.910123]  ? __kthread_parkme+0x82/0x180
[   61.910127]  ? preempt_count_sub+0x50/0x80
[   61.910132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.910137]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.910141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.910145]  kthread+0x334/0x6f0
[   61.910149]  ? trace_preempt_on+0x20/0xc0
[   61.910154]  ? __pfx_kthread+0x10/0x10
[   61.910158]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.910163]  ? calculate_sigpending+0x7b/0xa0
[   61.910167]  ? __pfx_kthread+0x10/0x10
[   61.910171]  ret_from_fork+0x3e/0x80
[   61.910176]  ? __pfx_kthread+0x10/0x10
[   61.910180]  ret_from_fork_asm+0x1a/0x30
[   61.910186]  </TASK>
[   61.910188] 
[   62.091193] Allocated by task 308:
[   62.094600]  kasan_save_stack+0x45/0x70
[   62.098439]  kasan_save_track+0x18/0x40
[   62.102277]  kasan_save_alloc_info+0x3b/0x50
[   62.106550]  __kasan_kmalloc+0xb7/0xc0
[   62.110304]  __kmalloc_cache_noprof+0x189/0x420
[   62.114836]  kasan_atomics+0x95/0x310
[   62.118500]  kunit_try_run_case+0x1a2/0x480
[   62.122708]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.128131]  kthread+0x334/0x6f0
[   62.131371]  ret_from_fork+0x3e/0x80
[   62.134951]  ret_from_fork_asm+0x1a/0x30
[   62.138875] 
[   62.140376] The buggy address belongs to the object at ffff8881061f7500
[   62.140376]  which belongs to the cache kmalloc-64 of size 64
[   62.152735] The buggy address is located 0 bytes to the right of
[   62.152735]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.165595] 
[   62.167093] The buggy address belongs to the physical page:
[   62.172666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.180708] flags: 0x200000000000000(node=0|zone=2)
[   62.185612] page_type: f5(slab)
[   62.188760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.196507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.204246] page dumped because: kasan: bad access detected
[   62.209817] 
[   62.211317] Memory state around the buggy address:
[   62.216110]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.223331]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.230555] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.237775]                                      ^
[   62.242568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.249786]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.257007] ==================================================================
[   61.134462] ==================================================================
[   61.141706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   61.149120] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.156520] 
[   61.158021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.158029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.158031] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.158034] Call Trace:
[   61.158036]  <TASK>
[   61.158038]  dump_stack_lvl+0x73/0xb0
[   61.158042]  print_report+0xd1/0x650
[   61.158046]  ? __virt_addr_valid+0x1db/0x2d0
[   61.158050]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.158058]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158063]  kasan_report+0x141/0x180
[   61.158067]  ? kasan_atomics_helper+0x1148/0x5450
[   61.158072]  kasan_check_range+0x10c/0x1c0
[   61.158077]  __kasan_check_write+0x18/0x20
[   61.158081]  kasan_atomics_helper+0x1148/0x5450
[   61.158086]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.158090]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.158094]  ? kasan_atomics+0x152/0x310
[   61.158098]  kasan_atomics+0x1dc/0x310
[   61.158102]  ? __pfx_kasan_atomics+0x10/0x10
[   61.158105]  ? ktime_get_ts64+0x83/0x230
[   61.158110]  kunit_try_run_case+0x1a2/0x480
[   61.158115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.158119]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.158124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.158129]  ? __kthread_parkme+0x82/0x180
[   61.158133]  ? preempt_count_sub+0x50/0x80
[   61.158138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.158142]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.158147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.158151]  kthread+0x334/0x6f0
[   61.158155]  ? trace_preempt_on+0x20/0xc0
[   61.158160]  ? __pfx_kthread+0x10/0x10
[   61.158164]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.158168]  ? calculate_sigpending+0x7b/0xa0
[   61.158172]  ? __pfx_kthread+0x10/0x10
[   61.158177]  ret_from_fork+0x3e/0x80
[   61.158181]  ? __pfx_kthread+0x10/0x10
[   61.158186]  ret_from_fork_asm+0x1a/0x30
[   61.158191]  </TASK>
[   61.158193] 
[   61.339223] Allocated by task 308:
[   61.342628]  kasan_save_stack+0x45/0x70
[   61.346467]  kasan_save_track+0x18/0x40
[   61.350308]  kasan_save_alloc_info+0x3b/0x50
[   61.354586]  __kasan_kmalloc+0xb7/0xc0
[   61.358341]  __kmalloc_cache_noprof+0x189/0x420
[   61.362882]  kasan_atomics+0x95/0x310
[   61.366548]  kunit_try_run_case+0x1a2/0x480
[   61.370742]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.376139]  kthread+0x334/0x6f0
[   61.379373]  ret_from_fork+0x3e/0x80
[   61.382952]  ret_from_fork_asm+0x1a/0x30
[   61.386878] 
[   61.388377] The buggy address belongs to the object at ffff8881061f7500
[   61.388377]  which belongs to the cache kmalloc-64 of size 64
[   61.400742] The buggy address is located 0 bytes to the right of
[   61.400742]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.413607] 
[   61.415103] The buggy address belongs to the physical page:
[   61.420703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.428735] flags: 0x200000000000000(node=0|zone=2)
[   61.433614] page_type: f5(slab)
[   61.436762] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.444511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.452256] page dumped because: kasan: bad access detected
[   61.457829] 
[   61.459329] Memory state around the buggy address:
[   61.464122]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.471348]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.478569] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.485796]                                      ^
[   61.490587]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.497806]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.505024] ==================================================================
[   67.915853] ==================================================================
[   67.923096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   67.930491] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.937890] 
[   67.939392] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.939399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.939401] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.939405] Call Trace:
[   67.939407]  <TASK>
[   67.939408]  dump_stack_lvl+0x73/0xb0
[   67.939412]  print_report+0xd1/0x650
[   67.939416]  ? __virt_addr_valid+0x1db/0x2d0
[   67.939420]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.939428]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939433]  kasan_report+0x141/0x180
[   67.939437]  ? kasan_atomics_helper+0x19e3/0x5450
[   67.939442]  kasan_check_range+0x10c/0x1c0
[   67.939447]  __kasan_check_write+0x18/0x20
[   67.939451]  kasan_atomics_helper+0x19e3/0x5450
[   67.939455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.939459]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.939463]  ? kasan_atomics+0x152/0x310
[   67.939467]  kasan_atomics+0x1dc/0x310
[   67.939471]  ? __pfx_kasan_atomics+0x10/0x10
[   67.939475]  ? ktime_get_ts64+0x83/0x230
[   67.939479]  kunit_try_run_case+0x1a2/0x480
[   67.939484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.939488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.939493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.939498]  ? __kthread_parkme+0x82/0x180
[   67.939502]  ? preempt_count_sub+0x50/0x80
[   67.939507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.939511]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.939515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.939520]  kthread+0x334/0x6f0
[   67.939524]  ? trace_preempt_on+0x20/0xc0
[   67.939529]  ? __pfx_kthread+0x10/0x10
[   67.939533]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.939537]  ? calculate_sigpending+0x7b/0xa0
[   67.939541]  ? __pfx_kthread+0x10/0x10
[   67.939546]  ret_from_fork+0x3e/0x80
[   67.939550]  ? __pfx_kthread+0x10/0x10
[   67.939554]  ret_from_fork_asm+0x1a/0x30
[   67.939560]  </TASK>
[   67.939562] 
[   68.120557] Allocated by task 308:
[   68.123964]  kasan_save_stack+0x45/0x70
[   68.127810]  kasan_save_track+0x18/0x40
[   68.131650]  kasan_save_alloc_info+0x3b/0x50
[   68.135924]  __kasan_kmalloc+0xb7/0xc0
[   68.139703]  __kmalloc_cache_noprof+0x189/0x420
[   68.144259]  kasan_atomics+0x95/0x310
[   68.147927]  kunit_try_run_case+0x1a2/0x480
[   68.152122]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.157529]  kthread+0x334/0x6f0
[   68.160760]  ret_from_fork+0x3e/0x80
[   68.164339]  ret_from_fork_asm+0x1a/0x30
[   68.168265] 
[   68.169764] The buggy address belongs to the object at ffff8881061f7500
[   68.169764]  which belongs to the cache kmalloc-64 of size 64
[   68.182096] The buggy address is located 0 bytes to the right of
[   68.182096]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.194957] 
[   68.196456] The buggy address belongs to the physical page:
[   68.202030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.210038] flags: 0x200000000000000(node=0|zone=2)
[   68.214916] page_type: f5(slab)
[   68.218064] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.225811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.233558] page dumped because: kasan: bad access detected
[   68.239130] 
[   68.240629] Memory state around the buggy address:
[   68.245422]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.252641]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.259859] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.267079]                                      ^
[   68.271873]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.279099]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.286317] ==================================================================
[   57.370133] ==================================================================
[   57.377354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   57.384666] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.392086] 
[   57.393584] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.393592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.393594] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.393597] Call Trace:
[   57.393599]  <TASK>
[   57.393601]  dump_stack_lvl+0x73/0xb0
[   57.393605]  print_report+0xd1/0x650
[   57.393609]  ? __virt_addr_valid+0x1db/0x2d0
[   57.393613]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.393621]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393626]  kasan_report+0x141/0x180
[   57.393630]  ? kasan_atomics_helper+0xc70/0x5450
[   57.393635]  kasan_check_range+0x10c/0x1c0
[   57.393640]  __kasan_check_write+0x18/0x20
[   57.393644]  kasan_atomics_helper+0xc70/0x5450
[   57.393648]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.393653]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.393657]  ? kasan_atomics+0x152/0x310
[   57.393661]  kasan_atomics+0x1dc/0x310
[   57.393665]  ? __pfx_kasan_atomics+0x10/0x10
[   57.393669]  ? ktime_get_ts64+0x83/0x230
[   57.393691]  kunit_try_run_case+0x1a2/0x480
[   57.393695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.393700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.393717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.393722]  ? __kthread_parkme+0x82/0x180
[   57.393726]  ? preempt_count_sub+0x50/0x80
[   57.393732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.393736]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.393740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.393745]  kthread+0x334/0x6f0
[   57.393749]  ? trace_preempt_on+0x20/0xc0
[   57.393754]  ? __pfx_kthread+0x10/0x10
[   57.393758]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.393763]  ? calculate_sigpending+0x7b/0xa0
[   57.393767]  ? __pfx_kthread+0x10/0x10
[   57.393771]  ret_from_fork+0x3e/0x80
[   57.393775]  ? __pfx_kthread+0x10/0x10
[   57.393780]  ret_from_fork_asm+0x1a/0x30
[   57.393786]  </TASK>
[   57.393788] 
[   57.574440] Allocated by task 308:
[   57.577846]  kasan_save_stack+0x45/0x70
[   57.581706]  kasan_save_track+0x18/0x40
[   57.585568]  kasan_save_alloc_info+0x3b/0x50
[   57.589839]  __kasan_kmalloc+0xb7/0xc0
[   57.593592]  __kmalloc_cache_noprof+0x189/0x420
[   57.598124]  kasan_atomics+0x95/0x310
[   57.601792]  kunit_try_run_case+0x1a2/0x480
[   57.605986]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.611386]  kthread+0x334/0x6f0
[   57.614626]  ret_from_fork+0x3e/0x80
[   57.618206]  ret_from_fork_asm+0x1a/0x30
[   57.622130] 
[   57.623631] The buggy address belongs to the object at ffff8881061f7500
[   57.623631]  which belongs to the cache kmalloc-64 of size 64
[   57.635971] The buggy address is located 0 bytes to the right of
[   57.635971]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   57.648831] 
[   57.650330] The buggy address belongs to the physical page:
[   57.655902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   57.663903] flags: 0x200000000000000(node=0|zone=2)
[   57.668792] page_type: f5(slab)
[   57.671938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.679719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.687466] page dumped because: kasan: bad access detected
[   57.693038] 
[   57.694539] Memory state around the buggy address:
[   57.699331]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.706548]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.713768] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.720986]                                      ^
[   57.725781]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.733009]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.740234] ==================================================================
[   70.178881] ==================================================================
[   70.186109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   70.193502] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.200896] 
[   70.202397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.202404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.202407] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.202410] Call Trace:
[   70.202412]  <TASK>
[   70.202414]  dump_stack_lvl+0x73/0xb0
[   70.202417]  print_report+0xd1/0x650
[   70.202422]  ? __virt_addr_valid+0x1db/0x2d0
[   70.202425]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.202434]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202438]  kasan_report+0x141/0x180
[   70.202443]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.202448]  kasan_check_range+0x10c/0x1c0
[   70.202452]  __kasan_check_write+0x18/0x20
[   70.202456]  kasan_atomics_helper+0x1d7a/0x5450
[   70.202461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.202465]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.202469]  ? kasan_atomics+0x152/0x310
[   70.202473]  kasan_atomics+0x1dc/0x310
[   70.202476]  ? __pfx_kasan_atomics+0x10/0x10
[   70.202480]  ? ktime_get_ts64+0x83/0x230
[   70.202485]  kunit_try_run_case+0x1a2/0x480
[   70.202489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.202494]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.202498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.202503]  ? __kthread_parkme+0x82/0x180
[   70.202507]  ? preempt_count_sub+0x50/0x80
[   70.202512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.202516]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.202521]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.202525]  kthread+0x334/0x6f0
[   70.202529]  ? trace_preempt_on+0x20/0xc0
[   70.202533]  ? __pfx_kthread+0x10/0x10
[   70.202538]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.202542]  ? calculate_sigpending+0x7b/0xa0
[   70.202546]  ? __pfx_kthread+0x10/0x10
[   70.202550]  ret_from_fork+0x3e/0x80
[   70.202555]  ? __pfx_kthread+0x10/0x10
[   70.202559]  ret_from_fork_asm+0x1a/0x30
[   70.202565]  </TASK>
[   70.202566] 
[   70.383535] Allocated by task 308:
[   70.386943]  kasan_save_stack+0x45/0x70
[   70.390781]  kasan_save_track+0x18/0x40
[   70.394619]  kasan_save_alloc_info+0x3b/0x50
[   70.398892]  __kasan_kmalloc+0xb7/0xc0
[   70.402645]  __kmalloc_cache_noprof+0x189/0x420
[   70.407179]  kasan_atomics+0x95/0x310
[   70.410844]  kunit_try_run_case+0x1a2/0x480
[   70.415028]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.420427]  kthread+0x334/0x6f0
[   70.423660]  ret_from_fork+0x3e/0x80
[   70.427266]  ret_from_fork_asm+0x1a/0x30
[   70.431192] 
[   70.432707] The buggy address belongs to the object at ffff8881061f7500
[   70.432707]  which belongs to the cache kmalloc-64 of size 64
[   70.445066] The buggy address is located 0 bytes to the right of
[   70.445066]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.457929] 
[   70.459425] The buggy address belongs to the physical page:
[   70.465001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.473006] flags: 0x200000000000000(node=0|zone=2)
[   70.477885] page_type: f5(slab)
[   70.481034] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.488781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.496527] page dumped because: kasan: bad access detected
[   70.502100] 
[   70.503599] Memory state around the buggy address:
[   70.508392]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.515618]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.522837] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.530057]                                      ^
[   70.534849]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.542069]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.549287] ==================================================================
[   60.760266] ==================================================================
[   60.767501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   60.774901] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.782214] 
[   60.783737] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.783745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.783747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.783750] Call Trace:
[   60.783752]  <TASK>
[   60.783754]  dump_stack_lvl+0x73/0xb0
[   60.783757]  print_report+0xd1/0x650
[   60.783762]  ? __virt_addr_valid+0x1db/0x2d0
[   60.783766]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.783774]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783778]  kasan_report+0x141/0x180
[   60.783782]  ? kasan_atomics_helper+0x4a1c/0x5450
[   60.783788]  __asan_report_load4_noabort+0x18/0x20
[   60.783791]  kasan_atomics_helper+0x4a1c/0x5450
[   60.783796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.783800]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.783804]  ? kasan_atomics+0x152/0x310
[   60.783808]  kasan_atomics+0x1dc/0x310
[   60.783812]  ? __pfx_kasan_atomics+0x10/0x10
[   60.783816]  ? ktime_get_ts64+0x83/0x230
[   60.783821]  kunit_try_run_case+0x1a2/0x480
[   60.783825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.783830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.783834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.783839]  ? __kthread_parkme+0x82/0x180
[   60.783843]  ? preempt_count_sub+0x50/0x80
[   60.783848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.783853]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.783857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.783861]  kthread+0x334/0x6f0
[   60.783865]  ? trace_preempt_on+0x20/0xc0
[   60.783870]  ? __pfx_kthread+0x10/0x10
[   60.783874]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.783879]  ? calculate_sigpending+0x7b/0xa0
[   60.783883]  ? __pfx_kthread+0x10/0x10
[   60.783887]  ret_from_fork+0x3e/0x80
[   60.783891]  ? __pfx_kthread+0x10/0x10
[   60.783896]  ret_from_fork_asm+0x1a/0x30
[   60.783901]  </TASK>
[   60.783903] 
[   60.961460] Allocated by task 308:
[   60.964867]  kasan_save_stack+0x45/0x70
[   60.968737]  kasan_save_track+0x18/0x40
[   60.972579]  kasan_save_alloc_info+0x3b/0x50
[   60.976853]  __kasan_kmalloc+0xb7/0xc0
[   60.980613]  __kmalloc_cache_noprof+0x189/0x420
[   60.985145]  kasan_atomics+0x95/0x310
[   60.988810]  kunit_try_run_case+0x1a2/0x480
[   60.992995]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.998397]  kthread+0x334/0x6f0
[   61.001636]  ret_from_fork+0x3e/0x80
[   61.005214]  ret_from_fork_asm+0x1a/0x30
[   61.009141] 
[   61.010641] The buggy address belongs to the object at ffff8881061f7500
[   61.010641]  which belongs to the cache kmalloc-64 of size 64
[   61.022981] The buggy address is located 0 bytes to the right of
[   61.022981]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.035842] 
[   61.037343] The buggy address belongs to the physical page:
[   61.042914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.050912] flags: 0x200000000000000(node=0|zone=2)
[   61.055792] page_type: f5(slab)
[   61.058938] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.066716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.074467] page dumped because: kasan: bad access detected
[   61.080042] 
[   61.081539] Memory state around the buggy address:
[   61.086333]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.093551]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.100771] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.107989]                                      ^
[   61.112782]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.119999]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.127218] ==================================================================
[   55.106458] ==================================================================
[   55.113707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   55.121037] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   55.128431] 
[   55.129931] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   55.129939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.129941] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.129945] Call Trace:
[   55.129946]  <TASK>
[   55.129948]  dump_stack_lvl+0x73/0xb0
[   55.129952]  print_report+0xd1/0x650
[   55.129956]  ? __virt_addr_valid+0x1db/0x2d0
[   55.129960]  ? kasan_atomics_helper+0x860/0x5450
[   55.129964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.129969]  ? kasan_atomics_helper+0x860/0x5450
[   55.129973]  kasan_report+0x141/0x180
[   55.129978]  ? kasan_atomics_helper+0x860/0x5450
[   55.129983]  kasan_check_range+0x10c/0x1c0
[   55.129988]  __kasan_check_write+0x18/0x20
[   55.129992]  kasan_atomics_helper+0x860/0x5450
[   55.129996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.130000]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.130004]  ? kasan_atomics+0x152/0x310
[   55.130009]  kasan_atomics+0x1dc/0x310
[   55.130012]  ? __pfx_kasan_atomics+0x10/0x10
[   55.130016]  ? ktime_get_ts64+0x83/0x230
[   55.130021]  kunit_try_run_case+0x1a2/0x480
[   55.130026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.130030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.130035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.130040]  ? __kthread_parkme+0x82/0x180
[   55.130044]  ? preempt_count_sub+0x50/0x80
[   55.130049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.130054]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.130058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.130062]  kthread+0x334/0x6f0
[   55.130067]  ? trace_preempt_on+0x20/0xc0
[   55.130071]  ? __pfx_kthread+0x10/0x10
[   55.130076]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.130080]  ? calculate_sigpending+0x7b/0xa0
[   55.130084]  ? __pfx_kthread+0x10/0x10
[   55.130089]  ret_from_fork+0x3e/0x80
[   55.130093]  ? __pfx_kthread+0x10/0x10
[   55.130098]  ret_from_fork_asm+0x1a/0x30
[   55.130104]  </TASK>
[   55.130105] 
[   55.310856] Allocated by task 308:
[   55.314262]  kasan_save_stack+0x45/0x70
[   55.318109]  kasan_save_track+0x18/0x40
[   55.321949]  kasan_save_alloc_info+0x3b/0x50
[   55.326230]  __kasan_kmalloc+0xb7/0xc0
[   55.329990]  __kmalloc_cache_noprof+0x189/0x420
[   55.334523]  kasan_atomics+0x95/0x310
[   55.338189]  kunit_try_run_case+0x1a2/0x480
[   55.342375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.347774]  kthread+0x334/0x6f0
[   55.351005]  ret_from_fork+0x3e/0x80
[   55.354585]  ret_from_fork_asm+0x1a/0x30
[   55.358511] 
[   55.360009] The buggy address belongs to the object at ffff8881061f7500
[   55.360009]  which belongs to the cache kmalloc-64 of size 64
[   55.372342] The buggy address is located 0 bytes to the right of
[   55.372342]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   55.385205] 
[   55.386706] The buggy address belongs to the physical page:
[   55.392275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   55.400281] flags: 0x200000000000000(node=0|zone=2)
[   55.405162] page_type: f5(slab)
[   55.408308] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.416047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.423794] page dumped because: kasan: bad access detected
[   55.429368] 
[   55.430866] Memory state around the buggy address:
[   55.435658]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.442877]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.450097] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.457316]                                      ^
[   55.462109]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.469335]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.476554] ==================================================================
[   50.211763] ==================================================================
[   50.226645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   50.234051] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   50.241360] 
[   50.242861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   50.242869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.242872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.242875] Call Trace:
[   50.242877]  <TASK>
[   50.242879]  dump_stack_lvl+0x73/0xb0
[   50.242884]  print_report+0xd1/0x650
[   50.242888]  ? __virt_addr_valid+0x1db/0x2d0
[   50.242892]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.242901]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242905]  kasan_report+0x141/0x180
[   50.242910]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.242915]  __asan_report_load4_noabort+0x18/0x20
[   50.242919]  kasan_atomics_helper+0x4bbc/0x5450
[   50.242923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.242927]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.242931]  ? kasan_atomics+0x152/0x310
[   50.242935]  kasan_atomics+0x1dc/0x310
[   50.242939]  ? __pfx_kasan_atomics+0x10/0x10
[   50.242943]  ? ktime_get_ts64+0x83/0x230
[   50.242948]  kunit_try_run_case+0x1a2/0x480
[   50.242952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.242957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.242961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.242966]  ? __kthread_parkme+0x82/0x180
[   50.242970]  ? preempt_count_sub+0x50/0x80
[   50.242975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.242980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.242984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.242988]  kthread+0x334/0x6f0
[   50.242993]  ? trace_preempt_on+0x20/0xc0
[   50.242997]  ? __pfx_kthread+0x10/0x10
[   50.243002]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.243006]  ? calculate_sigpending+0x7b/0xa0
[   50.243010]  ? __pfx_kthread+0x10/0x10
[   50.243015]  ret_from_fork+0x3e/0x80
[   50.243019]  ? __pfx_kthread+0x10/0x10
[   50.243023]  ret_from_fork_asm+0x1a/0x30
[   50.243029]  </TASK>
[   50.243031] 
[   50.420629] Allocated by task 308:
[   50.424036]  kasan_save_stack+0x45/0x70
[   50.427882]  kasan_save_track+0x18/0x40
[   50.431722]  kasan_save_alloc_info+0x3b/0x50
[   50.436020]  __kasan_kmalloc+0xb7/0xc0
[   50.439774]  __kmalloc_cache_noprof+0x189/0x420
[   50.444313]  kasan_atomics+0x95/0x310
[   50.447978]  kunit_try_run_case+0x1a2/0x480
[   50.452165]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.457564]  kthread+0x334/0x6f0
[   50.460796]  ret_from_fork+0x3e/0x80
[   50.464377]  ret_from_fork_asm+0x1a/0x30
[   50.468309] 
[   50.469809] The buggy address belongs to the object at ffff8881061f7500
[   50.469809]  which belongs to the cache kmalloc-64 of size 64
[   50.482151] The buggy address is located 0 bytes to the right of
[   50.482151]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   50.495011] 
[   50.496512] The buggy address belongs to the physical page:
[   50.502085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   50.510089] flags: 0x200000000000000(node=0|zone=2)
[   50.514969] page_type: f5(slab)
[   50.518118] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.525864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.533610] page dumped because: kasan: bad access detected
[   50.539183] 
[   50.540703] Memory state around the buggy address:
[   50.545502]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.552740]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.559966] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.567185]                                      ^
[   50.571977]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.579197]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.586422] ==================================================================
[   62.638486] ==================================================================
[   62.645737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   62.653131] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   62.660525] 
[   62.662025] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   62.662033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.662035] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.662038] Call Trace:
[   62.662040]  <TASK>
[   62.662041]  dump_stack_lvl+0x73/0xb0
[   62.662045]  print_report+0xd1/0x650
[   62.662049]  ? __virt_addr_valid+0x1db/0x2d0
[   62.662053]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.662062]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662066]  kasan_report+0x141/0x180
[   62.662070]  ? kasan_atomics_helper+0x12e6/0x5450
[   62.662075]  kasan_check_range+0x10c/0x1c0
[   62.662080]  __kasan_check_write+0x18/0x20
[   62.662084]  kasan_atomics_helper+0x12e6/0x5450
[   62.662088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.662093]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.662097]  ? kasan_atomics+0x152/0x310
[   62.662101]  kasan_atomics+0x1dc/0x310
[   62.662104]  ? __pfx_kasan_atomics+0x10/0x10
[   62.662108]  ? ktime_get_ts64+0x83/0x230
[   62.662113]  kunit_try_run_case+0x1a2/0x480
[   62.662117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.662122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.662126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.662131]  ? __kthread_parkme+0x82/0x180
[   62.662136]  ? preempt_count_sub+0x50/0x80
[   62.662140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.662145]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.662149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.662153]  kthread+0x334/0x6f0
[   62.662158]  ? trace_preempt_on+0x20/0xc0
[   62.662162]  ? __pfx_kthread+0x10/0x10
[   62.662167]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.662171]  ? calculate_sigpending+0x7b/0xa0
[   62.662175]  ? __pfx_kthread+0x10/0x10
[   62.662180]  ret_from_fork+0x3e/0x80
[   62.662184]  ? __pfx_kthread+0x10/0x10
[   62.662188]  ret_from_fork_asm+0x1a/0x30
[   62.662194]  </TASK>
[   62.662196] 
[   62.843226] Allocated by task 308:
[   62.846634]  kasan_save_stack+0x45/0x70
[   62.850481]  kasan_save_track+0x18/0x40
[   62.854318]  kasan_save_alloc_info+0x3b/0x50
[   62.858592]  __kasan_kmalloc+0xb7/0xc0
[   62.862345]  __kmalloc_cache_noprof+0x189/0x420
[   62.866876]  kasan_atomics+0x95/0x310
[   62.870542]  kunit_try_run_case+0x1a2/0x480
[   62.874749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.880155]  kthread+0x334/0x6f0
[   62.883396]  ret_from_fork+0x3e/0x80
[   62.886984]  ret_from_fork_asm+0x1a/0x30
[   62.890917] 
[   62.892416] The buggy address belongs to the object at ffff8881061f7500
[   62.892416]  which belongs to the cache kmalloc-64 of size 64
[   62.904756] The buggy address is located 0 bytes to the right of
[   62.904756]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.917618] 
[   62.919118] The buggy address belongs to the physical page:
[   62.924717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.932735] flags: 0x200000000000000(node=0|zone=2)
[   62.937619] page_type: f5(slab)
[   62.940768] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.948514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.956261] page dumped because: kasan: bad access detected
[   62.961833] 
[   62.963333] Memory state around the buggy address:
[   62.968127]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.975353]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.982571] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.989790]                                      ^
[   62.994584]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.001812]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.009031] ==================================================================
[   70.934251] ==================================================================
[   70.941480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   70.948880] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.956273] 
[   70.957774] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.957782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.957784] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.957787] Call Trace:
[   70.957789]  <TASK>
[   70.957791]  dump_stack_lvl+0x73/0xb0
[   70.957795]  print_report+0xd1/0x650
[   70.957799]  ? __virt_addr_valid+0x1db/0x2d0
[   70.957803]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.957811]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957816]  kasan_report+0x141/0x180
[   70.957820]  ? kasan_atomics_helper+0x1eaa/0x5450
[   70.957825]  kasan_check_range+0x10c/0x1c0
[   70.957830]  __kasan_check_write+0x18/0x20
[   70.957834]  kasan_atomics_helper+0x1eaa/0x5450
[   70.957838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.957843]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.957847]  ? kasan_atomics+0x152/0x310
[   70.957851]  kasan_atomics+0x1dc/0x310
[   70.957854]  ? __pfx_kasan_atomics+0x10/0x10
[   70.957858]  ? ktime_get_ts64+0x83/0x230
[   70.957863]  kunit_try_run_case+0x1a2/0x480
[   70.957867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.957872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.957876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.957881]  ? __kthread_parkme+0x82/0x180
[   70.957885]  ? preempt_count_sub+0x50/0x80
[   70.957890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.957895]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.957899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.957903]  kthread+0x334/0x6f0
[   70.957907]  ? trace_preempt_on+0x20/0xc0
[   70.957912]  ? __pfx_kthread+0x10/0x10
[   70.957916]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.957921]  ? calculate_sigpending+0x7b/0xa0
[   70.957925]  ? __pfx_kthread+0x10/0x10
[   70.957929]  ret_from_fork+0x3e/0x80
[   70.957933]  ? __pfx_kthread+0x10/0x10
[   70.957938]  ret_from_fork_asm+0x1a/0x30
[   70.957944]  </TASK>
[   70.957945] 
[   71.138912] Allocated by task 308:
[   71.142321]  kasan_save_stack+0x45/0x70
[   71.146167]  kasan_save_track+0x18/0x40
[   71.150006]  kasan_save_alloc_info+0x3b/0x50
[   71.154279]  __kasan_kmalloc+0xb7/0xc0
[   71.158032]  __kmalloc_cache_noprof+0x189/0x420
[   71.162563]  kasan_atomics+0x95/0x310
[   71.166231]  kunit_try_run_case+0x1a2/0x480
[   71.170424]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.175823]  kthread+0x334/0x6f0
[   71.179056]  ret_from_fork+0x3e/0x80
[   71.182635]  ret_from_fork_asm+0x1a/0x30
[   71.186561] 
[   71.188060] The buggy address belongs to the object at ffff8881061f7500
[   71.188060]  which belongs to the cache kmalloc-64 of size 64
[   71.200402] The buggy address is located 0 bytes to the right of
[   71.200402]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   71.213263] 
[   71.214693] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[   71.214760] The buggy address belongs to the physical page:
[   71.220854] rcu: 	2-....: (54 ticks this GP) idle=3e8c/1/0x4000000000000000 softirq=317/318 fqs=230
[   71.226423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   71.235455] rcu: 	(detected by 1, t=21023 jiffies, g=-359, q=45 ncpus=4)
[   71.243444] flags: 0x200000000000000(node=0|zone=2)
[   71.250136] Sending NMI from CPU 1 to CPUs 2:
[   71.250143] NMI backtrace for cpu 2
[   71.250146] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   71.250154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.250156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.250160] RIP: 0010:io_serial_out+0x6c/0xa0
[   71.250166] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 af 5b 07 ff 8b
[   71.250174] RSP: 0000:ffff8881080272e0 EFLAGS: 00000006
[   71.250179] RAX: 0000000000000000 RBX: ffffffffbb4d8b80 RCX: 1ffffffff769b171
[   71.250183] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffbb4d8b88
[   71.250187] RBP: ffff8881080272f0 R08: 0000000000000001 R09: ffffffffbb434940
[   71.250190] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000
[   71.250194] R13: ffffffffbb4d8de0 R14: ffffffffba5ce9c0 R15: ffffffffbb4d8b80
[   71.250198] FS:  0000000000000000(0000) GS:ffff88846433b000(0000) knlGS:0000000000000000
[   71.250202] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.250206] CR2: 0000000000000000 CR3: 000000023f4ba001 CR4: 00000000003726f0
[   71.250210] DR0: ffffffffbb488880 DR1: ffffffffbb488881 DR2: ffffffffbb488882
[   71.250213] DR3: ffffffffbb488883 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   71.250217] Call Trace:
[   71.250218]  <TASK>
[   71.250221]  serial8250_clear_IER+0x8c/0xb0
[   71.250226]  serial8250_console_write+0x1bd/0x1810
[   71.250231]  ? __pfx_serial8250_console_write+0x10/0x10
[   71.250236]  ? __kasan_check_write+0x18/0x20
[   71.250240]  ? _raw_spin_lock+0x8b/0xe0
[   71.250245]  ? __pfx__raw_spin_lock+0x10/0x10
[   71.250250]  univ8250_console_write+0x57/0x80
[   71.250254]  ? _raw_spin_unlock+0x41/0x70
[   71.250258]  console_flush_all+0x57b/0xc00
[   71.250263]  ? __pfx_console_flush_all+0x10/0x10
[   71.250268]  ? __pfx_vprintk_store+0x10/0x10
[   71.250273]  ? __kasan_check_read+0x15/0x20
[   71.250277]  console_unlock+0xf2/0x1f0
[   71.250281]  ? __pfx_console_unlock+0x10/0x10
[   71.250285]  ? __kasan_check_write+0x18/0x20
[   71.250289]  ? _raw_spin_lock+0x8b/0xe0
[   71.250294]  vprintk_emit+0x1e9/0x480
[   71.250299]  ? __pfx_vprintk_emit+0x10/0x10
[   71.250303]  ? _raw_spin_unlock+0x41/0x70
[   71.250308]  vprintk_default+0x21/0x30
[   71.250312]  vprintk+0x12/0x20
[   71.250316]  _printk+0xc3/0xf0
[   71.250319]  ? __pfx__printk+0x10/0x10
[   71.250323]  ? __pfx_vprintk_store+0x10/0x10
[   71.250328]  __dump_page+0x33a/0x8d0
[   71.250333]  ? __pfx___dump_page+0x10/0x10
[   71.250337]  ? __kasan_check_write+0x18/0x20
[   71.250344]  ? _printk+0xc3/0xf0
[   71.250347]  ? __pfx__printk+0x10/0x10
[   71.250351]  ? ret_from_fork_asm+0x1a/0x30
[   71.250356]  dump_page+0x3a/0x80
[   71.250360]  ? dump_page+0x3a/0x80
[   71.250364]  print_report+0x26e/0x650
[   71.250368]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.250377]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250381]  kasan_report+0x141/0x180
[   71.250386]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.250391]  kasan_check_range+0x10c/0x1c0
[   71.250396]  __kasan_check_write+0x18/0x20
[   71.250399]  kasan_atomics_helper+0x1eaa/0x5450
[   71.250404]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.250408]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.250412]  ? kasan_atomics+0x152/0x310
[   71.250416]  kasan_atomics+0x1dc/0x310
[   71.250420]  ? __pfx_kasan_atomics+0x10/0x10
[   71.250424]  ? ktime_get_ts64+0x83/0x230
[   71.250429]  kunit_try_run_case+0x1a2/0x480
[   71.250433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.250438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.250442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.250447]  ? __kthread_parkme+0x82/0x180
[   71.250452]  ? preempt_count_sub+0x50/0x80
[   71.250456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.250461]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.250465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.250470]  kthread+0x334/0x6f0
[   71.250474]  ? trace_preempt_on+0x20/0xc0
[   71.250478]  ? __pfx_kthread+0x10/0x10
[   71.250483]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.250487]  ? calculate_sigpending+0x7b/0xa0
[   71.250492]  ? __pfx_kthread+0x10/0x10
[   71.250496]  ret_from_fork+0x3e/0x80
[   71.250501]  ? __pfx_kthread+0x10/0x10
[   71.250505]  ret_from_fork_asm+0x1a/0x30
[   71.250511]  </TASK>
[   71.661921] page_type: f5(slab)
[   71.665079] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   71.672826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.680564] page dumped because: kasan: bad access detected
[   71.686138] 
[   71.687636] Memory state around the buggy address:
[   71.692428]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.699648]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.706865] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.714084]                                      ^
[   71.718878]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.726096]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.733317] ==================================================================
[   72.118425] ==================================================================
[   72.125656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   72.133056] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.140363] 
[   72.141861] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.141869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.141871] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.141874] Call Trace:
[   72.141876]  <TASK>
[   72.141878]  dump_stack_lvl+0x73/0xb0
[   72.141881]  print_report+0xd1/0x650
[   72.141886]  ? __virt_addr_valid+0x1db/0x2d0
[   72.141890]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.141898]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141903]  kasan_report+0x141/0x180
[   72.141907]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.141912]  __asan_report_load8_noabort+0x18/0x20
[   72.141916]  kasan_atomics_helper+0x4f71/0x5450
[   72.141921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.141925]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.141929]  ? kasan_atomics+0x152/0x310
[   72.141933]  kasan_atomics+0x1dc/0x310
[   72.141937]  ? __pfx_kasan_atomics+0x10/0x10
[   72.141940]  ? ktime_get_ts64+0x83/0x230
[   72.141945]  kunit_try_run_case+0x1a2/0x480
[   72.141950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.141954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.141959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.141963]  ? __kthread_parkme+0x82/0x180
[   72.141968]  ? preempt_count_sub+0x50/0x80
[   72.141972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.141977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.141981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.141985]  kthread+0x334/0x6f0
[   72.141990]  ? trace_preempt_on+0x20/0xc0
[   72.141994]  ? __pfx_kthread+0x10/0x10
[   72.141999]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.142003]  ? calculate_sigpending+0x7b/0xa0
[   72.142007]  ? __pfx_kthread+0x10/0x10
[   72.142011]  ret_from_fork+0x3e/0x80
[   72.142015]  ? __pfx_kthread+0x10/0x10
[   72.142020]  ret_from_fork_asm+0x1a/0x30
[   72.142026]  </TASK>
[   72.142027] 
[   72.319555] Allocated by task 308:
[   72.322959]  kasan_save_stack+0x45/0x70
[   72.326799]  kasan_save_track+0x18/0x40
[   72.330640]  kasan_save_alloc_info+0x3b/0x50
[   72.334920]  __kasan_kmalloc+0xb7/0xc0
[   72.338688]  __kmalloc_cache_noprof+0x189/0x420
[   72.343231]  kasan_atomics+0x95/0x310
[   72.346896]  kunit_try_run_case+0x1a2/0x480
[   72.351083]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.356489]  kthread+0x334/0x6f0
[   72.359738]  ret_from_fork+0x3e/0x80
[   72.363318]  ret_from_fork_asm+0x1a/0x30
[   72.367245] 
[   72.368747] The buggy address belongs to the object at ffff8881061f7500
[   72.368747]  which belongs to the cache kmalloc-64 of size 64
[   72.381086] The buggy address is located 0 bytes to the right of
[   72.381086]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.393946] 
[   72.395446] The buggy address belongs to the physical page:
[   72.401016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.409016] flags: 0x200000000000000(node=0|zone=2)
[   72.413894] page_type: f5(slab)
[   72.417043] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.424789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.432528] page dumped because: kasan: bad access detected
[   72.438099] 
[   72.439599] Memory state around the buggy address:
[   72.444391]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.451613]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.458838] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.466059]                                      ^
[   72.470852]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.478069]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.485286] ==================================================================
[   56.238232] ==================================================================
[   56.245459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   56.252767] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   56.260168] 
[   56.261667] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   56.261692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.261694] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.261697] Call Trace:
[   56.261699]  <TASK>
[   56.261701]  dump_stack_lvl+0x73/0xb0
[   56.261717]  print_report+0xd1/0x650
[   56.261721]  ? __virt_addr_valid+0x1db/0x2d0
[   56.261725]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.261734]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261738]  kasan_report+0x141/0x180
[   56.261742]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.261747]  kasan_check_range+0x10c/0x1c0
[   56.261752]  __kasan_check_write+0x18/0x20
[   56.261756]  kasan_atomics_helper+0xa2b/0x5450
[   56.261760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.261765]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.261769]  ? kasan_atomics+0x152/0x310
[   56.261773]  kasan_atomics+0x1dc/0x310
[   56.261776]  ? __pfx_kasan_atomics+0x10/0x10
[   56.261780]  ? ktime_get_ts64+0x83/0x230
[   56.261785]  kunit_try_run_case+0x1a2/0x480
[   56.261789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.261793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.261798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.261803]  ? __kthread_parkme+0x82/0x180
[   56.261807]  ? preempt_count_sub+0x50/0x80
[   56.261812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.261816]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.261821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.261825]  kthread+0x334/0x6f0
[   56.261829]  ? trace_preempt_on+0x20/0xc0
[   56.261833]  ? __pfx_kthread+0x10/0x10
[   56.261838]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.261842]  ? calculate_sigpending+0x7b/0xa0
[   56.261846]  ? __pfx_kthread+0x10/0x10
[   56.261851]  ret_from_fork+0x3e/0x80
[   56.261855]  ? __pfx_kthread+0x10/0x10
[   56.261859]  ret_from_fork_asm+0x1a/0x30
[   56.261865]  </TASK>
[   56.261867] 
[   56.442616] Allocated by task 308:
[   56.446022]  kasan_save_stack+0x45/0x70
[   56.449863]  kasan_save_track+0x18/0x40
[   56.453711]  kasan_save_alloc_info+0x3b/0x50
[   56.457982]  __kasan_kmalloc+0xb7/0xc0
[   56.461743]  __kmalloc_cache_noprof+0x189/0x420
[   56.466278]  kasan_atomics+0x95/0x310
[   56.469941]  kunit_try_run_case+0x1a2/0x480
[   56.474128]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.479527]  kthread+0x334/0x6f0
[   56.482761]  ret_from_fork+0x3e/0x80
[   56.486347]  ret_from_fork_asm+0x1a/0x30
[   56.490272] 
[   56.491773] The buggy address belongs to the object at ffff8881061f7500
[   56.491773]  which belongs to the cache kmalloc-64 of size 64
[   56.504114] The buggy address is located 0 bytes to the right of
[   56.504114]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   56.516975] 
[   56.518475] The buggy address belongs to the physical page:
[   56.524047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   56.532052] flags: 0x200000000000000(node=0|zone=2)
[   56.536932] page_type: f5(slab)
[   56.540081] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.547826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.555565] page dumped because: kasan: bad access detected
[   56.561136] 
[   56.562637] Memory state around the buggy address:
[   56.567428]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.574647]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.581867] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.589085]                                      ^
[   56.593880]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.601106]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.608326] ==================================================================
[   66.782868] ==================================================================
[   66.790105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   66.797497] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.804898] 
[   66.806397] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.806404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.806406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.806410] Call Trace:
[   66.806412]  <TASK>
[   66.806413]  dump_stack_lvl+0x73/0xb0
[   66.806417]  print_report+0xd1/0x650
[   66.806421]  ? __virt_addr_valid+0x1db/0x2d0
[   66.806425]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.806434]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806438]  kasan_report+0x141/0x180
[   66.806443]  ? kasan_atomics_helper+0x1818/0x5450
[   66.806448]  kasan_check_range+0x10c/0x1c0
[   66.806453]  __kasan_check_write+0x18/0x20
[   66.806456]  kasan_atomics_helper+0x1818/0x5450
[   66.806461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.806465]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.806469]  ? kasan_atomics+0x152/0x310
[   66.806474]  kasan_atomics+0x1dc/0x310
[   66.806477]  ? __pfx_kasan_atomics+0x10/0x10
[   66.806481]  ? ktime_get_ts64+0x83/0x230
[   66.806486]  kunit_try_run_case+0x1a2/0x480
[   66.806491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.806495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.806500]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.806505]  ? __kthread_parkme+0x82/0x180
[   66.806509]  ? preempt_count_sub+0x50/0x80
[   66.806514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.806518]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.806522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.806527]  kthread+0x334/0x6f0
[   66.806531]  ? trace_preempt_on+0x20/0xc0
[   66.806535]  ? __pfx_kthread+0x10/0x10
[   66.806540]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.806544]  ? calculate_sigpending+0x7b/0xa0
[   66.806548]  ? __pfx_kthread+0x10/0x10
[   66.806553]  ret_from_fork+0x3e/0x80
[   66.806557]  ? __pfx_kthread+0x10/0x10
[   66.806561]  ret_from_fork_asm+0x1a/0x30
[   66.806567]  </TASK>
[   66.806569] 
[   66.987479] Allocated by task 308:
[   66.990885]  kasan_save_stack+0x45/0x70
[   66.994736]  kasan_save_track+0x18/0x40
[   66.998579]  kasan_save_alloc_info+0x3b/0x50
[   67.002853]  __kasan_kmalloc+0xb7/0xc0
[   67.006604]  __kmalloc_cache_noprof+0x189/0x420
[   67.011136]  kasan_atomics+0x95/0x310
[   67.014802]  kunit_try_run_case+0x1a2/0x480
[   67.018987]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.024388]  kthread+0x334/0x6f0
[   67.027620]  ret_from_fork+0x3e/0x80
[   67.031199]  ret_from_fork_asm+0x1a/0x30
[   67.035124] 
[   67.036624] The buggy address belongs to the object at ffff8881061f7500
[   67.036624]  which belongs to the cache kmalloc-64 of size 64
[   67.048966] The buggy address is located 0 bytes to the right of
[   67.048966]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.061825] 
[   67.063325] The buggy address belongs to the physical page:
[   67.068899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.076905] flags: 0x200000000000000(node=0|zone=2)
[   67.081784] page_type: f5(slab)
[   67.084932] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.092689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.100461] page dumped because: kasan: bad access detected
[   67.106032] 
[   67.107532] Memory state around the buggy address:
[   67.112325]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.119543]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.126764] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.133982]                                      ^
[   67.138774]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.145992]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.153213] ==================================================================
[   71.740559] ==================================================================
[   71.747790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   71.755189] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   71.762581] 
[   71.764084] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   71.764092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   71.764094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.764097] Call Trace:
[   71.764099]  <TASK>
[   71.764101]  dump_stack_lvl+0x73/0xb0
[   71.764105]  print_report+0xd1/0x650
[   71.764109]  ? __virt_addr_valid+0x1db/0x2d0
[   71.764113]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.764121]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764126]  kasan_report+0x141/0x180
[   71.764130]  ? kasan_atomics_helper+0x1f43/0x5450
[   71.764135]  kasan_check_range+0x10c/0x1c0
[   71.764140]  __kasan_check_write+0x18/0x20
[   71.764144]  kasan_atomics_helper+0x1f43/0x5450
[   71.764148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.764152]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.764156]  ? kasan_atomics+0x152/0x310
[   71.764161]  kasan_atomics+0x1dc/0x310
[   71.764164]  ? __pfx_kasan_atomics+0x10/0x10
[   71.764168]  ? ktime_get_ts64+0x83/0x230
[   71.764173]  kunit_try_run_case+0x1a2/0x480
[   71.764177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.764182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.764186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.764191]  ? __kthread_parkme+0x82/0x180
[   71.764195]  ? preempt_count_sub+0x50/0x80
[   71.764200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.764205]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.764209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.764213]  kthread+0x334/0x6f0
[   71.764218]  ? trace_preempt_on+0x20/0xc0
[   71.764222]  ? __pfx_kthread+0x10/0x10
[   71.764227]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.764231]  ? calculate_sigpending+0x7b/0xa0
[   71.764235]  ? __pfx_kthread+0x10/0x10
[   71.764239]  ret_from_fork+0x3e/0x80
[   71.764243]  ? __pfx_kthread+0x10/0x10
[   71.764248]  ret_from_fork_asm+0x1a/0x30
[   71.764254]  </TASK>
[   71.764255] 
[   71.945414] Allocated by task 308:
[   71.948820]  kasan_save_stack+0x45/0x70
[   71.952660]  kasan_save_track+0x18/0x40
[   71.956533]  kasan_save_alloc_info+0x3b/0x50
[   71.960805]  __kasan_kmalloc+0xb7/0xc0
[   71.964557]  __kmalloc_cache_noprof+0x189/0x420
[   71.969089]  kasan_atomics+0x95/0x310
[   71.972757]  kunit_try_run_case+0x1a2/0x480
[   71.976951]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.982359]  kthread+0x334/0x6f0
[   71.985592]  ret_from_fork+0x3e/0x80
[   71.989171]  ret_from_fork_asm+0x1a/0x30
[   71.993105] 
[   71.994605] The buggy address belongs to the object at ffff8881061f7500
[   71.994605]  which belongs to the cache kmalloc-64 of size 64
[   72.006943] The buggy address is located 0 bytes to the right of
[   72.006943]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.019806] 
[   72.021306] The buggy address belongs to the physical page:
[   72.026878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.034886] flags: 0x200000000000000(node=0|zone=2)
[   72.039763] page_type: f5(slab)
[   72.042910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.050651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.058397] page dumped because: kasan: bad access detected
[   72.063969] 
[   72.065466] Memory state around the buggy address:
[   72.070262]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.077487]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.084722] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.091953]                                      ^
[   72.096746]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.103964]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.111183] ==================================================================
[   72.870251] ==================================================================
[   72.877478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   72.884872] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.892177] 
[   72.893718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.893725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.893728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.893731] Call Trace:
[   72.893733]  <TASK>
[   72.893734]  dump_stack_lvl+0x73/0xb0
[   72.893738]  print_report+0xd1/0x650
[   72.893742]  ? __virt_addr_valid+0x1db/0x2d0
[   72.893746]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.893755]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893759]  kasan_report+0x141/0x180
[   72.893763]  ? kasan_atomics_helper+0x4f98/0x5450
[   72.893768]  __asan_report_load8_noabort+0x18/0x20
[   72.893772]  kasan_atomics_helper+0x4f98/0x5450
[   72.893777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.893781]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.893785]  ? kasan_atomics+0x152/0x310
[   72.893789]  kasan_atomics+0x1dc/0x310
[   72.893793]  ? __pfx_kasan_atomics+0x10/0x10
[   72.893797]  ? ktime_get_ts64+0x83/0x230
[   72.893802]  kunit_try_run_case+0x1a2/0x480
[   72.893806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.893810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.893815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.893820]  ? __kthread_parkme+0x82/0x180
[   72.893824]  ? preempt_count_sub+0x50/0x80
[   72.893829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.893834]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.893838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.893842]  kthread+0x334/0x6f0
[   72.893846]  ? trace_preempt_on+0x20/0xc0
[   72.893851]  ? __pfx_kthread+0x10/0x10
[   72.893855]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.893859]  ? calculate_sigpending+0x7b/0xa0
[   72.893863]  ? __pfx_kthread+0x10/0x10
[   72.893868]  ret_from_fork+0x3e/0x80
[   72.893872]  ? __pfx_kthread+0x10/0x10
[   72.893877]  ret_from_fork_asm+0x1a/0x30
[   72.893883]  </TASK>
[   72.893884] 
[   73.071458] Allocated by task 308:
[   73.074862]  kasan_save_stack+0x45/0x70
[   73.078708]  kasan_save_track+0x18/0x40
[   73.082567]  kasan_save_alloc_info+0x3b/0x50
[   73.086840]  __kasan_kmalloc+0xb7/0xc0
[   73.090593]  __kmalloc_cache_noprof+0x189/0x420
[   73.095133]  kasan_atomics+0x95/0x310
[   73.098798]  kunit_try_run_case+0x1a2/0x480
[   73.102983]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.108383]  kthread+0x334/0x6f0
[   73.111615]  ret_from_fork+0x3e/0x80
[   73.115196]  ret_from_fork_asm+0x1a/0x30
[   73.119122] 
[   73.120619] The buggy address belongs to the object at ffff8881061f7500
[   73.120619]  which belongs to the cache kmalloc-64 of size 64
[   73.132952] The buggy address is located 0 bytes to the right of
[   73.132952]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   73.145814] 
[   73.147312] The buggy address belongs to the physical page:
[   73.152885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   73.160882] flags: 0x200000000000000(node=0|zone=2)
[   73.165763] page_type: f5(slab)
[   73.168910] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.176650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.184394] page dumped because: kasan: bad access detected
[   73.189968] 
[   73.191468] Memory state around the buggy address:
[   73.196260]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.203479]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.210708] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.217953]                                      ^
[   73.222745]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.229972]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.237190] ==================================================================
[   70.556540] ==================================================================
[   70.563759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   70.571154] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   70.578552] 
[   70.580053] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   70.580061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.580063] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.580066] Call Trace:
[   70.580068]  <TASK>
[   70.580070]  dump_stack_lvl+0x73/0xb0
[   70.580074]  print_report+0xd1/0x650
[   70.580078]  ? __virt_addr_valid+0x1db/0x2d0
[   70.580082]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580086]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.580090]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580094]  kasan_report+0x141/0x180
[   70.580099]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.580104]  kasan_check_range+0x10c/0x1c0
[   70.580109]  __kasan_check_write+0x18/0x20
[   70.580113]  kasan_atomics_helper+0x1e12/0x5450
[   70.580117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.580121]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.580125]  ? kasan_atomics+0x152/0x310
[   70.580129]  kasan_atomics+0x1dc/0x310
[   70.580133]  ? __pfx_kasan_atomics+0x10/0x10
[   70.580137]  ? ktime_get_ts64+0x83/0x230
[   70.580142]  kunit_try_run_case+0x1a2/0x480
[   70.580146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.580150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.580155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.580160]  ? __kthread_parkme+0x82/0x180
[   70.580164]  ? preempt_count_sub+0x50/0x80
[   70.580169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.580173]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.580178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.580182]  kthread+0x334/0x6f0
[   70.580186]  ? trace_preempt_on+0x20/0xc0
[   70.580191]  ? __pfx_kthread+0x10/0x10
[   70.580195]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.580199]  ? calculate_sigpending+0x7b/0xa0
[   70.580203]  ? __pfx_kthread+0x10/0x10
[   70.580208]  ret_from_fork+0x3e/0x80
[   70.580212]  ? __pfx_kthread+0x10/0x10
[   70.580216]  ret_from_fork_asm+0x1a/0x30
[   70.580222]  </TASK>
[   70.580224] 
[   70.761246] Allocated by task 308:
[   70.764652]  kasan_save_stack+0x45/0x70
[   70.768491]  kasan_save_track+0x18/0x40
[   70.772330]  kasan_save_alloc_info+0x3b/0x50
[   70.776603]  __kasan_kmalloc+0xb7/0xc0
[   70.780357]  __kmalloc_cache_noprof+0x189/0x420
[   70.784889]  kasan_atomics+0x95/0x310
[   70.788556]  kunit_try_run_case+0x1a2/0x480
[   70.792749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.798147]  kthread+0x334/0x6f0
[   70.801380]  ret_from_fork+0x3e/0x80
[   70.804960]  ret_from_fork_asm+0x1a/0x30
[   70.808887] 
[   70.810384] The buggy address belongs to the object at ffff8881061f7500
[   70.810384]  which belongs to the cache kmalloc-64 of size 64
[   70.822735] The buggy address is located 0 bytes to the right of
[   70.822735]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.835604] 
[   70.837104] The buggy address belongs to the physical page:
[   70.842702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.850734] flags: 0x200000000000000(node=0|zone=2)
[   70.855613] page_type: f5(slab)
[   70.858760] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.866501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.874246] page dumped because: kasan: bad access detected
[   70.879819] 
[   70.881318] Memory state around the buggy address:
[   70.886112]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.893339]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.900556] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.907775]                                      ^
[   70.912568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.919788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.927008] ==================================================================
[   63.768063] ==================================================================
[   63.775285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   63.782718] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.790034] 
[   63.791533] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.791541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.791543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.791546] Call Trace:
[   63.791548]  <TASK>
[   63.791550]  dump_stack_lvl+0x73/0xb0
[   63.791553]  print_report+0xd1/0x650
[   63.791558]  ? __virt_addr_valid+0x1db/0x2d0
[   63.791562]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.791570]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791574]  kasan_report+0x141/0x180
[   63.791579]  ? kasan_atomics_helper+0x4eae/0x5450
[   63.791584]  __asan_report_load8_noabort+0x18/0x20
[   63.791588]  kasan_atomics_helper+0x4eae/0x5450
[   63.791592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.791597]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.791601]  ? kasan_atomics+0x152/0x310
[   63.791605]  kasan_atomics+0x1dc/0x310
[   63.791609]  ? __pfx_kasan_atomics+0x10/0x10
[   63.791612]  ? ktime_get_ts64+0x83/0x230
[   63.791617]  kunit_try_run_case+0x1a2/0x480
[   63.791622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.791626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.791631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.791636]  ? __kthread_parkme+0x82/0x180
[   63.791640]  ? preempt_count_sub+0x50/0x80
[   63.791645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.791650]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.791654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.791658]  kthread+0x334/0x6f0
[   63.791662]  ? trace_preempt_on+0x20/0xc0
[   63.791667]  ? __pfx_kthread+0x10/0x10
[   63.791689]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.791693]  ? calculate_sigpending+0x7b/0xa0
[   63.791697]  ? __pfx_kthread+0x10/0x10
[   63.791702]  ret_from_fork+0x3e/0x80
[   63.791719]  ? __pfx_kthread+0x10/0x10
[   63.791723]  ret_from_fork_asm+0x1a/0x30
[   63.791729]  </TASK>
[   63.791731] 
[   63.969417] Allocated by task 308:
[   63.972822]  kasan_save_stack+0x45/0x70
[   63.976662]  kasan_save_track+0x18/0x40
[   63.980534]  kasan_save_alloc_info+0x3b/0x50
[   63.984809]  __kasan_kmalloc+0xb7/0xc0
[   63.988569]  __kmalloc_cache_noprof+0x189/0x420
[   63.993102]  kasan_atomics+0x95/0x310
[   63.996766]  kunit_try_run_case+0x1a2/0x480
[   64.000954]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.006362]  kthread+0x334/0x6f0
[   64.009601]  ret_from_fork+0x3e/0x80
[   64.013180]  ret_from_fork_asm+0x1a/0x30
[   64.017108] 
[   64.018607] The buggy address belongs to the object at ffff8881061f7500
[   64.018607]  which belongs to the cache kmalloc-64 of size 64
[   64.030948] The buggy address is located 0 bytes to the right of
[   64.030948]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   64.043817] 
[   64.045317] The buggy address belongs to the physical page:
[   64.050888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   64.058888] flags: 0x200000000000000(node=0|zone=2)
[   64.063768] page_type: f5(slab)
[   64.066913] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.074653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.082398] page dumped because: kasan: bad access detected
[   64.087971] 
[   64.089469] Memory state around the buggy address:
[   64.094262]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.101484]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.108710] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.115954]                                      ^
[   64.120748]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.127974]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.135193] ==================================================================
[   52.093859] ==================================================================
[   52.101106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   52.108505] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   52.115813] 
[   52.117311] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   52.117318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.117321] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.117324] Call Trace:
[   52.117326]  <TASK>
[   52.117328]  dump_stack_lvl+0x73/0xb0
[   52.117331]  print_report+0xd1/0x650
[   52.117336]  ? __virt_addr_valid+0x1db/0x2d0
[   52.117339]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.117348]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117352]  kasan_report+0x141/0x180
[   52.117357]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.117362]  __asan_report_load4_noabort+0x18/0x20
[   52.117366]  kasan_atomics_helper+0x4b54/0x5450
[   52.117370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.117375]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.117379]  ? kasan_atomics+0x152/0x310
[   52.117383]  kasan_atomics+0x1dc/0x310
[   52.117386]  ? __pfx_kasan_atomics+0x10/0x10
[   52.117390]  ? ktime_get_ts64+0x83/0x230
[   52.117395]  kunit_try_run_case+0x1a2/0x480
[   52.117399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.117404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.117409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.117413]  ? __kthread_parkme+0x82/0x180
[   52.117418]  ? preempt_count_sub+0x50/0x80
[   52.117422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.117427]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.117431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.117436]  kthread+0x334/0x6f0
[   52.117440]  ? trace_preempt_on+0x20/0xc0
[   52.117444]  ? __pfx_kthread+0x10/0x10
[   52.117449]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.117453]  ? calculate_sigpending+0x7b/0xa0
[   52.117457]  ? __pfx_kthread+0x10/0x10
[   52.117462]  ret_from_fork+0x3e/0x80
[   52.117466]  ? __pfx_kthread+0x10/0x10
[   52.117470]  ret_from_fork_asm+0x1a/0x30
[   52.117476]  </TASK>
[   52.117478] 
[   52.295134] Allocated by task 308:
[   52.298541]  kasan_save_stack+0x45/0x70
[   52.302387]  kasan_save_track+0x18/0x40
[   52.306226]  kasan_save_alloc_info+0x3b/0x50
[   52.310497]  __kasan_kmalloc+0xb7/0xc0
[   52.314251]  __kmalloc_cache_noprof+0x189/0x420
[   52.318784]  kasan_atomics+0x95/0x310
[   52.322448]  kunit_try_run_case+0x1a2/0x480
[   52.326637]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.332044]  kthread+0x334/0x6f0
[   52.335277]  ret_from_fork+0x3e/0x80
[   52.338864]  ret_from_fork_asm+0x1a/0x30
[   52.342799] 
[   52.344298] The buggy address belongs to the object at ffff8881061f7500
[   52.344298]  which belongs to the cache kmalloc-64 of size 64
[   52.356638] The buggy address is located 0 bytes to the right of
[   52.356638]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   52.369499] 
[   52.370998] The buggy address belongs to the physical page:
[   52.376570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.384570] flags: 0x200000000000000(node=0|zone=2)
[   52.389447] page_type: f5(slab)
[   52.392596] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.400342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.408081] page dumped because: kasan: bad access detected
[   52.413653] 
[   52.415152] Memory state around the buggy address:
[   52.419947]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.427172]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.434394] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.441620]                                      ^
[   52.446413]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.453632]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.460851] ==================================================================
[   59.253469] ==================================================================
[   59.260735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   59.268044] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   59.275436] 
[   59.276930] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   59.276938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.276940] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.276943] Call Trace:
[   59.276945]  <TASK>
[   59.276947]  dump_stack_lvl+0x73/0xb0
[   59.276950]  print_report+0xd1/0x650
[   59.276955]  ? __virt_addr_valid+0x1db/0x2d0
[   59.276958]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.276967]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276971]  kasan_report+0x141/0x180
[   59.276975]  ? kasan_atomics_helper+0xf10/0x5450
[   59.276980]  kasan_check_range+0x10c/0x1c0
[   59.276985]  __kasan_check_write+0x18/0x20
[   59.276989]  kasan_atomics_helper+0xf10/0x5450
[   59.276993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.276998]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.277002]  ? kasan_atomics+0x152/0x310
[   59.277006]  kasan_atomics+0x1dc/0x310
[   59.277009]  ? __pfx_kasan_atomics+0x10/0x10
[   59.277013]  ? ktime_get_ts64+0x83/0x230
[   59.277018]  kunit_try_run_case+0x1a2/0x480
[   59.277022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.277027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.277031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.277036]  ? __kthread_parkme+0x82/0x180
[   59.277040]  ? preempt_count_sub+0x50/0x80
[   59.277045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.277050]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.277054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.277058]  kthread+0x334/0x6f0
[   59.277063]  ? trace_preempt_on+0x20/0xc0
[   59.277067]  ? __pfx_kthread+0x10/0x10
[   59.277072]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.277076]  ? calculate_sigpending+0x7b/0xa0
[   59.277080]  ? __pfx_kthread+0x10/0x10
[   59.277084]  ret_from_fork+0x3e/0x80
[   59.277089]  ? __pfx_kthread+0x10/0x10
[   59.277093]  ret_from_fork_asm+0x1a/0x30
[   59.277099]  </TASK>
[   59.277101] 
[   59.457837] Allocated by task 308:
[   59.461242]  kasan_save_stack+0x45/0x70
[   59.465081]  kasan_save_track+0x18/0x40
[   59.468922]  kasan_save_alloc_info+0x3b/0x50
[   59.473194]  __kasan_kmalloc+0xb7/0xc0
[   59.476947]  __kmalloc_cache_noprof+0x189/0x420
[   59.481477]  kasan_atomics+0x95/0x310
[   59.485144]  kunit_try_run_case+0x1a2/0x480
[   59.489329]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.494735]  kthread+0x334/0x6f0
[   59.497969]  ret_from_fork+0x3e/0x80
[   59.501548]  ret_from_fork_asm+0x1a/0x30
[   59.505475] 
[   59.506974] The buggy address belongs to the object at ffff8881061f7500
[   59.506974]  which belongs to the cache kmalloc-64 of size 64
[   59.519317] The buggy address is located 0 bytes to the right of
[   59.519317]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.532186] 
[   59.533703] The buggy address belongs to the physical page:
[   59.539299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.547297] flags: 0x200000000000000(node=0|zone=2)
[   59.552179] page_type: f5(slab)
[   59.555324] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.563064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.570810] page dumped because: kasan: bad access detected
[   59.576382] 
[   59.577882] Memory state around the buggy address:
[   59.582692]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.589945]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.597165] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.604393]                                      ^
[   59.609186]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.616413]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.623630] ==================================================================
[   69.426875] ==================================================================
[   69.434105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   69.441503] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.448811] 
[   69.450309] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.450317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.450319] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.450322] Call Trace:
[   69.450324]  <TASK>
[   69.450326]  dump_stack_lvl+0x73/0xb0
[   69.450330]  print_report+0xd1/0x650
[   69.450334]  ? __virt_addr_valid+0x1db/0x2d0
[   69.450338]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.450346]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450350]  kasan_report+0x141/0x180
[   69.450355]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.450360]  __asan_report_load8_noabort+0x18/0x20
[   69.450364]  kasan_atomics_helper+0x4f30/0x5450
[   69.450368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.450373]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.450377]  ? kasan_atomics+0x152/0x310
[   69.450381]  kasan_atomics+0x1dc/0x310
[   69.450384]  ? __pfx_kasan_atomics+0x10/0x10
[   69.450388]  ? ktime_get_ts64+0x83/0x230
[   69.450393]  kunit_try_run_case+0x1a2/0x480
[   69.450397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.450406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.450411]  ? __kthread_parkme+0x82/0x180
[   69.450415]  ? preempt_count_sub+0x50/0x80
[   69.450420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450424]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.450429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.450433]  kthread+0x334/0x6f0
[   69.450437]  ? trace_preempt_on+0x20/0xc0
[   69.450441]  ? __pfx_kthread+0x10/0x10
[   69.450446]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.450450]  ? calculate_sigpending+0x7b/0xa0
[   69.450454]  ? __pfx_kthread+0x10/0x10
[   69.450459]  ret_from_fork+0x3e/0x80
[   69.450463]  ? __pfx_kthread+0x10/0x10
[   69.450467]  ret_from_fork_asm+0x1a/0x30
[   69.450473]  </TASK>
[   69.450475] 
[   69.628106] Allocated by task 308:
[   69.631513]  kasan_save_stack+0x45/0x70
[   69.635360]  kasan_save_track+0x18/0x40
[   69.639199]  kasan_save_alloc_info+0x3b/0x50
[   69.643471]  __kasan_kmalloc+0xb7/0xc0
[   69.647224]  __kmalloc_cache_noprof+0x189/0x420
[   69.651757]  kasan_atomics+0x95/0x310
[   69.655423]  kunit_try_run_case+0x1a2/0x480
[   69.659608]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.665009]  kthread+0x334/0x6f0
[   69.668250]  ret_from_fork+0x3e/0x80
[   69.671835]  ret_from_fork_asm+0x1a/0x30
[   69.675761] 
[   69.677261] The buggy address belongs to the object at ffff8881061f7500
[   69.677261]  which belongs to the cache kmalloc-64 of size 64
[   69.689603] The buggy address is located 0 bytes to the right of
[   69.689603]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   69.702471] 
[   69.703971] The buggy address belongs to the physical page:
[   69.709542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   69.717543] flags: 0x200000000000000(node=0|zone=2)
[   69.722420] page_type: f5(slab)
[   69.725569] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.733315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.741055] page dumped because: kasan: bad access detected
[   69.746626] 
[   69.748125] Memory state around the buggy address:
[   69.752919]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.760145]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.767364] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.774583]                                      ^
[   69.779377]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.786596]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.793814] ==================================================================
[   73.996520] ==================================================================
[   74.003744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   74.011139] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.018533] 
[   74.020031] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.020039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.020041] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.020045] Call Trace:
[   74.020046]  <TASK>
[   74.020048]  dump_stack_lvl+0x73/0xb0
[   74.020052]  print_report+0xd1/0x650
[   74.020056]  ? __virt_addr_valid+0x1db/0x2d0
[   74.020060]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.020069]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020073]  kasan_report+0x141/0x180
[   74.020077]  ? kasan_atomics_helper+0x218a/0x5450
[   74.020082]  kasan_check_range+0x10c/0x1c0
[   74.020087]  __kasan_check_write+0x18/0x20
[   74.020091]  kasan_atomics_helper+0x218a/0x5450
[   74.020096]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.020100]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.020104]  ? kasan_atomics+0x152/0x310
[   74.020108]  kasan_atomics+0x1dc/0x310
[   74.020112]  ? __pfx_kasan_atomics+0x10/0x10
[   74.020116]  ? ktime_get_ts64+0x83/0x230
[   74.020120]  kunit_try_run_case+0x1a2/0x480
[   74.020125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.020129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.020134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.020139]  ? __kthread_parkme+0x82/0x180
[   74.020143]  ? preempt_count_sub+0x50/0x80
[   74.020148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.020153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.020157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.020161]  kthread+0x334/0x6f0
[   74.020165]  ? trace_preempt_on+0x20/0xc0
[   74.020170]  ? __pfx_kthread+0x10/0x10
[   74.020174]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.020179]  ? calculate_sigpending+0x7b/0xa0
[   74.020183]  ? __pfx_kthread+0x10/0x10
[   74.020187]  ret_from_fork+0x3e/0x80
[   74.020192]  ? __pfx_kthread+0x10/0x10
[   74.020196]  ret_from_fork_asm+0x1a/0x30
[   74.020202]  </TASK>
[   74.020204] 
[   74.201217] Allocated by task 308:
[   74.204622]  kasan_save_stack+0x45/0x70
[   74.208461]  kasan_save_track+0x18/0x40
[   74.212301]  kasan_save_alloc_info+0x3b/0x50
[   74.216572]  __kasan_kmalloc+0xb7/0xc0
[   74.220325]  __kmalloc_cache_noprof+0x189/0x420
[   74.224860]  kasan_atomics+0x95/0x310
[   74.228533]  kunit_try_run_case+0x1a2/0x480
[   74.232734]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.238136]  kthread+0x334/0x6f0
[   74.241367]  ret_from_fork+0x3e/0x80
[   74.244948]  ret_from_fork_asm+0x1a/0x30
[   74.248880] 
[   74.250380] The buggy address belongs to the object at ffff8881061f7500
[   74.250380]  which belongs to the cache kmalloc-64 of size 64
[   74.262741] The buggy address is located 0 bytes to the right of
[   74.262741]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   74.275607] 
[   74.277107] The buggy address belongs to the physical page:
[   74.282706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   74.290733] flags: 0x200000000000000(node=0|zone=2)
[   74.295618] page_type: f5(slab)
[   74.298765] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.306505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.314244] page dumped because: kasan: bad access detected
[   74.319814] 
[   74.321315] Memory state around the buggy address:
[   74.326107]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.333325]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.340545] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.347762]                                      ^
[   74.352555]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.359774]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.366996] ==================================================================
[   68.293583] ==================================================================
[   68.300800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   68.308198] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   68.315593] 
[   68.317094] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   68.317101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.317104] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.317107] Call Trace:
[   68.317109]  <TASK>
[   68.317111]  dump_stack_lvl+0x73/0xb0
[   68.317114]  print_report+0xd1/0x650
[   68.317119]  ? __virt_addr_valid+0x1db/0x2d0
[   68.317123]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.317131]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317135]  kasan_report+0x141/0x180
[   68.317140]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.317145]  kasan_check_range+0x10c/0x1c0
[   68.317150]  __kasan_check_write+0x18/0x20
[   68.317154]  kasan_atomics_helper+0x1a7f/0x5450
[   68.317158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.317163]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.317167]  ? kasan_atomics+0x152/0x310
[   68.317171]  kasan_atomics+0x1dc/0x310
[   68.317174]  ? __pfx_kasan_atomics+0x10/0x10
[   68.317178]  ? ktime_get_ts64+0x83/0x230
[   68.317183]  kunit_try_run_case+0x1a2/0x480
[   68.317188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.317192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.317197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.317202]  ? __kthread_parkme+0x82/0x180
[   68.317206]  ? preempt_count_sub+0x50/0x80
[   68.317211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.317215]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.317219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.317224]  kthread+0x334/0x6f0
[   68.317228]  ? trace_preempt_on+0x20/0xc0
[   68.317233]  ? __pfx_kthread+0x10/0x10
[   68.317237]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.317241]  ? calculate_sigpending+0x7b/0xa0
[   68.317246]  ? __pfx_kthread+0x10/0x10
[   68.317250]  ret_from_fork+0x3e/0x80
[   68.317254]  ? __pfx_kthread+0x10/0x10
[   68.317259]  ret_from_fork_asm+0x1a/0x30
[   68.317265]  </TASK>
[   68.317267] 
[   68.498302] Allocated by task 308:
[   68.501721]  kasan_save_stack+0x45/0x70
[   68.505574]  kasan_save_track+0x18/0x40
[   68.509412]  kasan_save_alloc_info+0x3b/0x50
[   68.513707]  __kasan_kmalloc+0xb7/0xc0
[   68.517481]  __kmalloc_cache_noprof+0x189/0x420
[   68.522013]  kasan_atomics+0x95/0x310
[   68.525720]  kunit_try_run_case+0x1a2/0x480
[   68.529916]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.535315]  kthread+0x334/0x6f0
[   68.538549]  ret_from_fork+0x3e/0x80
[   68.542128]  ret_from_fork_asm+0x1a/0x30
[   68.546054] 
[   68.547553] The buggy address belongs to the object at ffff8881061f7500
[   68.547553]  which belongs to the cache kmalloc-64 of size 64
[   68.559895] The buggy address is located 0 bytes to the right of
[   68.559895]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.572755] 
[   68.574253] The buggy address belongs to the physical page:
[   68.579827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.587835] flags: 0x200000000000000(node=0|zone=2)
[   68.592745] page_type: f5(slab)
[   68.595896] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.603643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.611389] page dumped because: kasan: bad access detected
[   68.616961] 
[   68.618462] Memory state around the buggy address:
[   68.623254]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.630472]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.637719] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.644944]                                      ^
[   68.649746]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.656967]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.664193] ==================================================================
[   75.126181] ==================================================================
[   75.133411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   75.140804] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   75.148112] 
[   75.149610] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   75.149617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.149619] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.149623] Call Trace:
[   75.149624]  <TASK>
[   75.149626]  dump_stack_lvl+0x73/0xb0
[   75.149630]  print_report+0xd1/0x650
[   75.149634]  ? __virt_addr_valid+0x1db/0x2d0
[   75.149638]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.149646]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149651]  kasan_report+0x141/0x180
[   75.149655]  ? kasan_atomics_helper+0x5115/0x5450
[   75.149660]  __asan_report_load8_noabort+0x18/0x20
[   75.149664]  kasan_atomics_helper+0x5115/0x5450
[   75.149668]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.149673]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.149694]  ? kasan_atomics+0x152/0x310
[   75.149698]  kasan_atomics+0x1dc/0x310
[   75.149702]  ? __pfx_kasan_atomics+0x10/0x10
[   75.149706]  ? ktime_get_ts64+0x83/0x230
[   75.149723]  kunit_try_run_case+0x1a2/0x480
[   75.149728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.149732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.149737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.149742]  ? __kthread_parkme+0x82/0x180
[   75.149746]  ? preempt_count_sub+0x50/0x80
[   75.149751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.149755]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.149759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.149764]  kthread+0x334/0x6f0
[   75.149768]  ? trace_preempt_on+0x20/0xc0
[   75.149772]  ? __pfx_kthread+0x10/0x10
[   75.149777]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.149781]  ? calculate_sigpending+0x7b/0xa0
[   75.149785]  ? __pfx_kthread+0x10/0x10
[   75.149790]  ret_from_fork+0x3e/0x80
[   75.149794]  ? __pfx_kthread+0x10/0x10
[   75.149798]  ret_from_fork_asm+0x1a/0x30
[   75.149804]  </TASK>
[   75.149806] 
[   75.327475] Allocated by task 308:
[   75.330883]  kasan_save_stack+0x45/0x70
[   75.334750]  kasan_save_track+0x18/0x40
[   75.338596]  kasan_save_alloc_info+0x3b/0x50
[   75.342868]  __kasan_kmalloc+0xb7/0xc0
[   75.346618]  __kmalloc_cache_noprof+0x189/0x420
[   75.351154]  kasan_atomics+0x95/0x310
[   75.354817]  kunit_try_run_case+0x1a2/0x480
[   75.359003]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.364405]  kthread+0x334/0x6f0
[   75.367644]  ret_from_fork+0x3e/0x80
[   75.371223]  ret_from_fork_asm+0x1a/0x30
[   75.375151] 
[   75.376650] The buggy address belongs to the object at ffff8881061f7500
[   75.376650]  which belongs to the cache kmalloc-64 of size 64
[   75.388991] The buggy address is located 0 bytes to the right of
[   75.388991]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   75.401859] 
[   75.403359] The buggy address belongs to the physical page:
[   75.408931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   75.416939] flags: 0x200000000000000(node=0|zone=2)
[   75.421818] page_type: f5(slab)
[   75.424965] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.432724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.440475] page dumped because: kasan: bad access detected
[   75.446049] 
[   75.447547] Memory state around the buggy address:
[   75.452340]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.459560]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.466777] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.473996]                                      ^
[   75.478788]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.486010]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.493235] ==================================================================
[   63.016352] ==================================================================
[   63.023571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   63.030965] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.038279] 
[   63.039779] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.039786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.039789] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.039792] Call Trace:
[   63.039794]  <TASK>
[   63.039796]  dump_stack_lvl+0x73/0xb0
[   63.039799]  print_report+0xd1/0x650
[   63.039803]  ? __virt_addr_valid+0x1db/0x2d0
[   63.039807]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.039816]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039820]  kasan_report+0x141/0x180
[   63.039824]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.039829]  __asan_report_load4_noabort+0x18/0x20
[   63.039833]  kasan_atomics_helper+0x49ce/0x5450
[   63.039838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.039842]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.039846]  ? kasan_atomics+0x152/0x310
[   63.039850]  kasan_atomics+0x1dc/0x310
[   63.039854]  ? __pfx_kasan_atomics+0x10/0x10
[   63.039857]  ? ktime_get_ts64+0x83/0x230
[   63.039862]  kunit_try_run_case+0x1a2/0x480
[   63.039867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.039871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.039876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.039881]  ? __kthread_parkme+0x82/0x180
[   63.039885]  ? preempt_count_sub+0x50/0x80
[   63.039890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.039894]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.039899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.039903]  kthread+0x334/0x6f0
[   63.039907]  ? trace_preempt_on+0x20/0xc0
[   63.039912]  ? __pfx_kthread+0x10/0x10
[   63.039916]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.039920]  ? calculate_sigpending+0x7b/0xa0
[   63.039924]  ? __pfx_kthread+0x10/0x10
[   63.039929]  ret_from_fork+0x3e/0x80
[   63.039933]  ? __pfx_kthread+0x10/0x10
[   63.039937]  ret_from_fork_asm+0x1a/0x30
[   63.039943]  </TASK>
[   63.039945] 
[   63.217461] Allocated by task 308:
[   63.220868]  kasan_save_stack+0x45/0x70
[   63.224706]  kasan_save_track+0x18/0x40
[   63.228571]  kasan_save_alloc_info+0x3b/0x50
[   63.232844]  __kasan_kmalloc+0xb7/0xc0
[   63.236598]  __kmalloc_cache_noprof+0x189/0x420
[   63.241130]  kasan_atomics+0x95/0x310
[   63.244796]  kunit_try_run_case+0x1a2/0x480
[   63.248991]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.254398]  kthread+0x334/0x6f0
[   63.257631]  ret_from_fork+0x3e/0x80
[   63.261219]  ret_from_fork_asm+0x1a/0x30
[   63.265151] 
[   63.266651] The buggy address belongs to the object at ffff8881061f7500
[   63.266651]  which belongs to the cache kmalloc-64 of size 64
[   63.278993] The buggy address is located 0 bytes to the right of
[   63.278993]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   63.291861] 
[   63.293362] The buggy address belongs to the physical page:
[   63.298935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   63.306940] flags: 0x200000000000000(node=0|zone=2)
[   63.311819] page_type: f5(slab)
[   63.314968] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.322726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.330480] page dumped because: kasan: bad access detected
[   63.336050] 
[   63.337551] Memory state around the buggy address:
[   63.342343]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.349562]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.356781] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.363998]                                      ^
[   63.368794]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.376020]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.383239] ==================================================================
[   58.876248] ==================================================================
[   58.883480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   58.890786] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.898176] 
[   58.899718] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.899726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.899728] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.899732] Call Trace:
[   58.899733]  <TASK>
[   58.899735]  dump_stack_lvl+0x73/0xb0
[   58.899739]  print_report+0xd1/0x650
[   58.899743]  ? __virt_addr_valid+0x1db/0x2d0
[   58.899747]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.899755]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899760]  kasan_report+0x141/0x180
[   58.899764]  ? kasan_atomics_helper+0xe78/0x5450
[   58.899769]  kasan_check_range+0x10c/0x1c0
[   58.899774]  __kasan_check_write+0x18/0x20
[   58.899778]  kasan_atomics_helper+0xe78/0x5450
[   58.899782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.899786]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.899790]  ? kasan_atomics+0x152/0x310
[   58.899794]  kasan_atomics+0x1dc/0x310
[   58.899798]  ? __pfx_kasan_atomics+0x10/0x10
[   58.899802]  ? ktime_get_ts64+0x83/0x230
[   58.899806]  kunit_try_run_case+0x1a2/0x480
[   58.899811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.899815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.899820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.899825]  ? __kthread_parkme+0x82/0x180
[   58.899829]  ? preempt_count_sub+0x50/0x80
[   58.899834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.899838]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.899842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.899846]  kthread+0x334/0x6f0
[   58.899850]  ? trace_preempt_on+0x20/0xc0
[   58.899855]  ? __pfx_kthread+0x10/0x10
[   58.899859]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.899863]  ? calculate_sigpending+0x7b/0xa0
[   58.899867]  ? __pfx_kthread+0x10/0x10
[   58.899872]  ret_from_fork+0x3e/0x80
[   58.899876]  ? __pfx_kthread+0x10/0x10
[   58.899880]  ret_from_fork_asm+0x1a/0x30
[   58.899886]  </TASK>
[   58.899888] 
[   59.080508] Allocated by task 308:
[   59.083915]  kasan_save_stack+0x45/0x70
[   59.087763]  kasan_save_track+0x18/0x40
[   59.091609]  kasan_save_alloc_info+0x3b/0x50
[   59.095880]  __kasan_kmalloc+0xb7/0xc0
[   59.099635]  __kmalloc_cache_noprof+0x189/0x420
[   59.104175]  kasan_atomics+0x95/0x310
[   59.107840]  kunit_try_run_case+0x1a2/0x480
[   59.112027]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.117426]  kthread+0x334/0x6f0
[   59.120657]  ret_from_fork+0x3e/0x80
[   59.124236]  ret_from_fork_asm+0x1a/0x30
[   59.128164] 
[   59.129664] The buggy address belongs to the object at ffff8881061f7500
[   59.129664]  which belongs to the cache kmalloc-64 of size 64
[   59.142021] The buggy address is located 0 bytes to the right of
[   59.142021]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.154880] 
[   59.156382] The buggy address belongs to the physical page:
[   59.161955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.169961] flags: 0x200000000000000(node=0|zone=2)
[   59.174841] page_type: f5(slab)
[   59.177988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.185742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.193480] page dumped because: kasan: bad access detected
[   59.199052] 
[   59.200552] Memory state around the buggy address:
[   59.205346]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.212564]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.219782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.227002]                                      ^
[   59.231795]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.239015]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.246241] ==================================================================
[   62.264278] ==================================================================
[   62.271513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   62.278907] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   62.286219] 
[   62.287738] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   62.287745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.287747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.287751] Call Trace:
[   62.287752]  <TASK>
[   62.287754]  dump_stack_lvl+0x73/0xb0
[   62.287758]  print_report+0xd1/0x650
[   62.287762]  ? __virt_addr_valid+0x1db/0x2d0
[   62.287766]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.287774]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287778]  kasan_report+0x141/0x180
[   62.287783]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.287788]  __asan_report_load4_noabort+0x18/0x20
[   62.287792]  kasan_atomics_helper+0x49e8/0x5450
[   62.287796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.287801]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.287805]  ? kasan_atomics+0x152/0x310
[   62.287809]  kasan_atomics+0x1dc/0x310
[   62.287812]  ? __pfx_kasan_atomics+0x10/0x10
[   62.287816]  ? ktime_get_ts64+0x83/0x230
[   62.287821]  kunit_try_run_case+0x1a2/0x480
[   62.287825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.287830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.287834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.287839]  ? __kthread_parkme+0x82/0x180
[   62.287843]  ? preempt_count_sub+0x50/0x80
[   62.287848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.287852]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.287857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.287861]  kthread+0x334/0x6f0
[   62.287865]  ? trace_preempt_on+0x20/0xc0
[   62.287869]  ? __pfx_kthread+0x10/0x10
[   62.287874]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.287878]  ? calculate_sigpending+0x7b/0xa0
[   62.287882]  ? __pfx_kthread+0x10/0x10
[   62.287887]  ret_from_fork+0x3e/0x80
[   62.287891]  ? __pfx_kthread+0x10/0x10
[   62.287895]  ret_from_fork_asm+0x1a/0x30
[   62.287901]  </TASK>
[   62.287903] 
[   62.465473] Allocated by task 308:
[   62.468878]  kasan_save_stack+0x45/0x70
[   62.472734]  kasan_save_track+0x18/0x40
[   62.476573]  kasan_save_alloc_info+0x3b/0x50
[   62.480848]  __kasan_kmalloc+0xb7/0xc0
[   62.484608]  __kmalloc_cache_noprof+0x189/0x420
[   62.489140]  kasan_atomics+0x95/0x310
[   62.492805]  kunit_try_run_case+0x1a2/0x480
[   62.496991]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.502393]  kthread+0x334/0x6f0
[   62.505632]  ret_from_fork+0x3e/0x80
[   62.509212]  ret_from_fork_asm+0x1a/0x30
[   62.513137] 
[   62.514638] The buggy address belongs to the object at ffff8881061f7500
[   62.514638]  which belongs to the cache kmalloc-64 of size 64
[   62.526977] The buggy address is located 0 bytes to the right of
[   62.526977]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   62.539840] 
[   62.541337] The buggy address belongs to the physical page:
[   62.546910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   62.554918] flags: 0x200000000000000(node=0|zone=2)
[   62.559798] page_type: f5(slab)
[   62.562942] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.570705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.578465] page dumped because: kasan: bad access detected
[   62.584045] 
[   62.585545] Memory state around the buggy address:
[   62.590338]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.597563]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.604782] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.612003]                                      ^
[   62.616793]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.624015]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.631240] ==================================================================
[   65.272073] ==================================================================
[   65.279305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   65.286707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   65.294124] 
[   65.295626] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   65.295634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.295636] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.295639] Call Trace:
[   65.295641]  <TASK>
[   65.295643]  dump_stack_lvl+0x73/0xb0
[   65.295646]  print_report+0xd1/0x650
[   65.295651]  ? __virt_addr_valid+0x1db/0x2d0
[   65.295655]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.295663]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295668]  kasan_report+0x141/0x180
[   65.295689]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.295694]  kasan_check_range+0x10c/0x1c0
[   65.295700]  __kasan_check_write+0x18/0x20
[   65.295703]  kasan_atomics_helper+0x15b6/0x5450
[   65.295720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.295725]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.295729]  ? kasan_atomics+0x152/0x310
[   65.295733]  kasan_atomics+0x1dc/0x310
[   65.295736]  ? __pfx_kasan_atomics+0x10/0x10
[   65.295740]  ? ktime_get_ts64+0x83/0x230
[   65.295745]  kunit_try_run_case+0x1a2/0x480
[   65.295750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.295754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.295759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.295764]  ? __kthread_parkme+0x82/0x180
[   65.295768]  ? preempt_count_sub+0x50/0x80
[   65.295773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.295777]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.295781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.295786]  kthread+0x334/0x6f0
[   65.295790]  ? trace_preempt_on+0x20/0xc0
[   65.295794]  ? __pfx_kthread+0x10/0x10
[   65.295799]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.295803]  ? calculate_sigpending+0x7b/0xa0
[   65.295807]  ? __pfx_kthread+0x10/0x10
[   65.295812]  ret_from_fork+0x3e/0x80
[   65.295816]  ? __pfx_kthread+0x10/0x10
[   65.295820]  ret_from_fork_asm+0x1a/0x30
[   65.295826]  </TASK>
[   65.295828] 
[   65.476862] Allocated by task 308:
[   65.480266]  kasan_save_stack+0x45/0x70
[   65.484107]  kasan_save_track+0x18/0x40
[   65.487946]  kasan_save_alloc_info+0x3b/0x50
[   65.492217]  __kasan_kmalloc+0xb7/0xc0
[   65.495972]  __kmalloc_cache_noprof+0x189/0x420
[   65.500504]  kasan_atomics+0x95/0x310
[   65.504170]  kunit_try_run_case+0x1a2/0x480
[   65.508365]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.513770]  kthread+0x334/0x6f0
[   65.517002]  ret_from_fork+0x3e/0x80
[   65.520583]  ret_from_fork_asm+0x1a/0x30
[   65.524509] 
[   65.526008] The buggy address belongs to the object at ffff8881061f7500
[   65.526008]  which belongs to the cache kmalloc-64 of size 64
[   65.538348] The buggy address is located 0 bytes to the right of
[   65.538348]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.551209] 
[   65.552707] The buggy address belongs to the physical page:
[   65.558308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.566316] flags: 0x200000000000000(node=0|zone=2)
[   65.571194] page_type: f5(slab)
[   65.574342] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.582089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.589834] page dumped because: kasan: bad access detected
[   65.595406] 
[   65.596907] Memory state around the buggy address:
[   65.601706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.608926]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.616147] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.623374]                                      ^
[   65.628166]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.635385]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.642605] ==================================================================
[   66.027453] ==================================================================
[   66.034720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   66.042117] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.049512] 
[   66.051011] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.051018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.051020] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.051024] Call Trace:
[   66.051025]  <TASK>
[   66.051027]  dump_stack_lvl+0x73/0xb0
[   66.051031]  print_report+0xd1/0x650
[   66.051035]  ? __virt_addr_valid+0x1db/0x2d0
[   66.051039]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.051047]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051052]  kasan_report+0x141/0x180
[   66.051056]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.051061]  kasan_check_range+0x10c/0x1c0
[   66.051066]  __kasan_check_write+0x18/0x20
[   66.051070]  kasan_atomics_helper+0x16e7/0x5450
[   66.051074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.051079]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.051083]  ? kasan_atomics+0x152/0x310
[   66.051087]  kasan_atomics+0x1dc/0x310
[   66.051090]  ? __pfx_kasan_atomics+0x10/0x10
[   66.051094]  ? ktime_get_ts64+0x83/0x230
[   66.051099]  kunit_try_run_case+0x1a2/0x480
[   66.051104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.051108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.051113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.051118]  ? __kthread_parkme+0x82/0x180
[   66.051122]  ? preempt_count_sub+0x50/0x80
[   66.051127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.051131]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.051135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.051140]  kthread+0x334/0x6f0
[   66.051144]  ? trace_preempt_on+0x20/0xc0
[   66.051148]  ? __pfx_kthread+0x10/0x10
[   66.051153]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.051157]  ? calculate_sigpending+0x7b/0xa0
[   66.051161]  ? __pfx_kthread+0x10/0x10
[   66.051166]  ret_from_fork+0x3e/0x80
[   66.051170]  ? __pfx_kthread+0x10/0x10
[   66.051175]  ret_from_fork_asm+0x1a/0x30
[   66.051180]  </TASK>
[   66.051182] 
[   66.232154] Allocated by task 308:
[   66.235560]  kasan_save_stack+0x45/0x70
[   66.239405]  kasan_save_track+0x18/0x40
[   66.243247]  kasan_save_alloc_info+0x3b/0x50
[   66.247518]  __kasan_kmalloc+0xb7/0xc0
[   66.251270]  __kmalloc_cache_noprof+0x189/0x420
[   66.255803]  kasan_atomics+0x95/0x310
[   66.259468]  kunit_try_run_case+0x1a2/0x480
[   66.263655]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.269054]  kthread+0x334/0x6f0
[   66.272285]  ret_from_fork+0x3e/0x80
[   66.275866]  ret_from_fork_asm+0x1a/0x30
[   66.279800] 
[   66.281299] The buggy address belongs to the object at ffff8881061f7500
[   66.281299]  which belongs to the cache kmalloc-64 of size 64
[   66.293639] The buggy address is located 0 bytes to the right of
[   66.293639]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   66.306501] 
[   66.307999] The buggy address belongs to the physical page:
[   66.313572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   66.321571] flags: 0x200000000000000(node=0|zone=2)
[   66.326451] page_type: f5(slab)
[   66.329598] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.337343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.345083] page dumped because: kasan: bad access detected
[   66.350655] 
[   66.352155] Memory state around the buggy address:
[   66.356949]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.364176]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.371401] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.378622]                                      ^
[   66.383412]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.390633]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.397853] ==================================================================
[   65.649830] ==================================================================
[   65.657077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   65.664470] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   65.671871] 
[   65.673369] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   65.673376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.673378] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.673382] Call Trace:
[   65.673383]  <TASK>
[   65.673385]  dump_stack_lvl+0x73/0xb0
[   65.673389]  print_report+0xd1/0x650
[   65.673393]  ? __virt_addr_valid+0x1db/0x2d0
[   65.673397]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.673405]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673409]  kasan_report+0x141/0x180
[   65.673414]  ? kasan_atomics_helper+0x164f/0x5450
[   65.673419]  kasan_check_range+0x10c/0x1c0
[   65.673424]  __kasan_check_write+0x18/0x20
[   65.673428]  kasan_atomics_helper+0x164f/0x5450
[   65.673432]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.673436]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.673440]  ? kasan_atomics+0x152/0x310
[   65.673445]  kasan_atomics+0x1dc/0x310
[   65.673448]  ? __pfx_kasan_atomics+0x10/0x10
[   65.673452]  ? ktime_get_ts64+0x83/0x230
[   65.673457]  kunit_try_run_case+0x1a2/0x480
[   65.673461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.673466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.673470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.673475]  ? __kthread_parkme+0x82/0x180
[   65.673479]  ? preempt_count_sub+0x50/0x80
[   65.673484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.673489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.673493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.673497]  kthread+0x334/0x6f0
[   65.673501]  ? trace_preempt_on+0x20/0xc0
[   65.673506]  ? __pfx_kthread+0x10/0x10
[   65.673510]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.673515]  ? calculate_sigpending+0x7b/0xa0
[   65.673519]  ? __pfx_kthread+0x10/0x10
[   65.673523]  ret_from_fork+0x3e/0x80
[   65.673528]  ? __pfx_kthread+0x10/0x10
[   65.673532]  ret_from_fork_asm+0x1a/0x30
[   65.673538]  </TASK>
[   65.673540] 
[   65.854485] Allocated by task 308:
[   65.857890]  kasan_save_stack+0x45/0x70
[   65.861734]  kasan_save_track+0x18/0x40
[   65.865579]  kasan_save_alloc_info+0x3b/0x50
[   65.869859]  __kasan_kmalloc+0xb7/0xc0
[   65.873611]  __kmalloc_cache_noprof+0x189/0x420
[   65.878144]  kasan_atomics+0x95/0x310
[   65.881809]  kunit_try_run_case+0x1a2/0x480
[   65.885995]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.891396]  kthread+0x334/0x6f0
[   65.894626]  ret_from_fork+0x3e/0x80
[   65.898206]  ret_from_fork_asm+0x1a/0x30
[   65.902132] 
[   65.903632] The buggy address belongs to the object at ffff8881061f7500
[   65.903632]  which belongs to the cache kmalloc-64 of size 64
[   65.915974] The buggy address is located 0 bytes to the right of
[   65.915974]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   65.928833] 
[   65.930332] The buggy address belongs to the physical page:
[   65.935903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   65.943903] flags: 0x200000000000000(node=0|zone=2)
[   65.948784] page_type: f5(slab)
[   65.951930] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.959718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.967466] page dumped because: kasan: bad access detected
[   65.973039] 
[   65.974539] Memory state around the buggy address:
[   65.979332]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.986550]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.993772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.000999]                                      ^
[   66.005789]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.013010]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.020228] ==================================================================
[   68.671437] ==================================================================
[   68.678667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   68.686082] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   68.693476] 
[   68.694976] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   68.694983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   68.694985] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.694989] Call Trace:
[   68.694990]  <TASK>
[   68.694992]  dump_stack_lvl+0x73/0xb0
[   68.694996]  print_report+0xd1/0x650
[   68.695000]  ? __virt_addr_valid+0x1db/0x2d0
[   68.695004]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.695012]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695017]  kasan_report+0x141/0x180
[   68.695021]  ? kasan_atomics_helper+0x1b22/0x5450
[   68.695026]  kasan_check_range+0x10c/0x1c0
[   68.695031]  __kasan_check_write+0x18/0x20
[   68.695035]  kasan_atomics_helper+0x1b22/0x5450
[   68.695040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.695044]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.695048]  ? kasan_atomics+0x152/0x310
[   68.695052]  kasan_atomics+0x1dc/0x310
[   68.695055]  ? __pfx_kasan_atomics+0x10/0x10
[   68.695059]  ? ktime_get_ts64+0x83/0x230
[   68.695064]  kunit_try_run_case+0x1a2/0x480
[   68.695069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.695073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.695078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.695082]  ? __kthread_parkme+0x82/0x180
[   68.695087]  ? preempt_count_sub+0x50/0x80
[   68.695091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.695096]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.695100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.695105]  kthread+0x334/0x6f0
[   68.695109]  ? trace_preempt_on+0x20/0xc0
[   68.695113]  ? __pfx_kthread+0x10/0x10
[   68.695118]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.695122]  ? calculate_sigpending+0x7b/0xa0
[   68.695126]  ? __pfx_kthread+0x10/0x10
[   68.695131]  ret_from_fork+0x3e/0x80
[   68.695135]  ? __pfx_kthread+0x10/0x10
[   68.695139]  ret_from_fork_asm+0x1a/0x30
[   68.695145]  </TASK>
[   68.695147] 
[   68.876109] Allocated by task 308:
[   68.879513]  kasan_save_stack+0x45/0x70
[   68.883355]  kasan_save_track+0x18/0x40
[   68.887202]  kasan_save_alloc_info+0x3b/0x50
[   68.891475]  __kasan_kmalloc+0xb7/0xc0
[   68.895228]  __kmalloc_cache_noprof+0x189/0x420
[   68.899759]  kasan_atomics+0x95/0x310
[   68.903426]  kunit_try_run_case+0x1a2/0x480
[   68.907611]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.913009]  kthread+0x334/0x6f0
[   68.916243]  ret_from_fork+0x3e/0x80
[   68.919821]  ret_from_fork_asm+0x1a/0x30
[   68.923748] 
[   68.925245] The buggy address belongs to the object at ffff8881061f7500
[   68.925245]  which belongs to the cache kmalloc-64 of size 64
[   68.937580] The buggy address is located 0 bytes to the right of
[   68.937580]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   68.950440] 
[   68.951940] The buggy address belongs to the physical page:
[   68.957512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   68.965520] flags: 0x200000000000000(node=0|zone=2)
[   68.970398] page_type: f5(slab)
[   68.973545] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.981294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.989040] page dumped because: kasan: bad access detected
[   68.994610] 
[   68.996109] Memory state around the buggy address:
[   69.000904]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.008130]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.015350] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.022567]                                      ^
[   69.027362]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.034580]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.041800] ==================================================================
[   56.992852] ==================================================================
[   57.000085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   57.007398] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   57.014791] 
[   57.016290] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   57.016297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.016299] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.016303] Call Trace:
[   57.016305]  <TASK>
[   57.016306]  dump_stack_lvl+0x73/0xb0
[   57.016310]  print_report+0xd1/0x650
[   57.016314]  ? __virt_addr_valid+0x1db/0x2d0
[   57.016318]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016322]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.016327]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016331]  kasan_report+0x141/0x180
[   57.016336]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.016341]  kasan_check_range+0x10c/0x1c0
[   57.016346]  __kasan_check_write+0x18/0x20
[   57.016349]  kasan_atomics_helper+0xb6a/0x5450
[   57.016354]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.016358]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.016362]  ? kasan_atomics+0x152/0x310
[   57.016366]  kasan_atomics+0x1dc/0x310
[   57.016370]  ? __pfx_kasan_atomics+0x10/0x10
[   57.016374]  ? ktime_get_ts64+0x83/0x230
[   57.016378]  kunit_try_run_case+0x1a2/0x480
[   57.016383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.016387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.016392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.016397]  ? __kthread_parkme+0x82/0x180
[   57.016401]  ? preempt_count_sub+0x50/0x80
[   57.016406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.016410]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.016415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.016419]  kthread+0x334/0x6f0
[   57.016423]  ? trace_preempt_on+0x20/0xc0
[   57.016427]  ? __pfx_kthread+0x10/0x10
[   57.016432]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.016436]  ? calculate_sigpending+0x7b/0xa0
[   57.016440]  ? __pfx_kthread+0x10/0x10
[   57.016445]  ret_from_fork+0x3e/0x80
[   57.016449]  ? __pfx_kthread+0x10/0x10
[   57.016453]  ret_from_fork_asm+0x1a/0x30
[   57.016459]  </TASK>
[   57.016461] 
[   57.197145] Allocated by task 308:
[   57.200552]  kasan_save_stack+0x45/0x70
[   57.204390]  kasan_save_track+0x18/0x40
[   57.208231]  kasan_save_alloc_info+0x3b/0x50
[   57.212503]  __kasan_kmalloc+0xb7/0xc0
[   57.216254]  __kmalloc_cache_noprof+0x189/0x420
[   57.220786]  kasan_atomics+0x95/0x310
[   57.224454]  kunit_try_run_case+0x1a2/0x480
[   57.228641]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.234047]  kthread+0x334/0x6f0
[   57.237279]  ret_from_fork+0x3e/0x80
[   57.240858]  ret_from_fork_asm+0x1a/0x30
[   57.244784] 
[   57.246283] The buggy address belongs to the object at ffff8881061f7500
[   57.246283]  which belongs to the cache kmalloc-64 of size 64
[   57.258615] The buggy address is located 0 bytes to the right of
[   57.258615]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   57.271478] 
[   57.272976] The buggy address belongs to the physical page:
[   57.278547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   57.286548] flags: 0x200000000000000(node=0|zone=2)
[   57.291436] page_type: f5(slab)
[   57.294583] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.302330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.310077] page dumped because: kasan: bad access detected
[   57.315647] 
[   57.317149] Memory state around the buggy address:
[   57.321942]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.329169]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.336389] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.343614]                                      ^
[   57.348407]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.355627]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.362845] ==================================================================
[   74.374244] ==================================================================
[   74.381474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   74.388868] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.396174] 
[   74.397691] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.397699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.397701] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.397705] Call Trace:
[   74.397706]  <TASK>
[   74.397708]  dump_stack_lvl+0x73/0xb0
[   74.397712]  print_report+0xd1/0x650
[   74.397717]  ? __virt_addr_valid+0x1db/0x2d0
[   74.397733]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.397742]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397746]  kasan_report+0x141/0x180
[   74.397750]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.397755]  __asan_report_load8_noabort+0x18/0x20
[   74.397759]  kasan_atomics_helper+0x4fa5/0x5450
[   74.397764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.397768]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.397772]  ? kasan_atomics+0x152/0x310
[   74.397776]  kasan_atomics+0x1dc/0x310
[   74.397780]  ? __pfx_kasan_atomics+0x10/0x10
[   74.397784]  ? ktime_get_ts64+0x83/0x230
[   74.397789]  kunit_try_run_case+0x1a2/0x480
[   74.397793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.397797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.397802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.397807]  ? __kthread_parkme+0x82/0x180
[   74.397811]  ? preempt_count_sub+0x50/0x80
[   74.397816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.397821]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.397825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.397829]  kthread+0x334/0x6f0
[   74.397833]  ? trace_preempt_on+0x20/0xc0
[   74.397838]  ? __pfx_kthread+0x10/0x10
[   74.397842]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.397847]  ? calculate_sigpending+0x7b/0xa0
[   74.397851]  ? __pfx_kthread+0x10/0x10
[   74.397855]  ret_from_fork+0x3e/0x80
[   74.397859]  ? __pfx_kthread+0x10/0x10
[   74.397864]  ret_from_fork_asm+0x1a/0x30
[   74.397870]  </TASK>
[   74.397871] 
[   74.575470] Allocated by task 308:
[   74.578876]  kasan_save_stack+0x45/0x70
[   74.582739]  kasan_save_track+0x18/0x40
[   74.586581]  kasan_save_alloc_info+0x3b/0x50
[   74.590852]  __kasan_kmalloc+0xb7/0xc0
[   74.594606]  __kmalloc_cache_noprof+0x189/0x420
[   74.599147]  kasan_atomics+0x95/0x310
[   74.602812]  kunit_try_run_case+0x1a2/0x480
[   74.606996]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.612398]  kthread+0x334/0x6f0
[   74.615637]  ret_from_fork+0x3e/0x80
[   74.619216]  ret_from_fork_asm+0x1a/0x30
[   74.623142] 
[   74.624642] The buggy address belongs to the object at ffff8881061f7500
[   74.624642]  which belongs to the cache kmalloc-64 of size 64
[   74.636975] The buggy address is located 0 bytes to the right of
[   74.636975]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   74.649836] 
[   74.651333] The buggy address belongs to the physical page:
[   74.656907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   74.664914] flags: 0x200000000000000(node=0|zone=2)
[   74.669793] page_type: f5(slab)
[   74.672939] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.680717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.688469] page dumped because: kasan: bad access detected
[   74.694043] 
[   74.695541] Memory state around the buggy address:
[   74.700333]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.707552]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.714772] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.721991]                                      ^
[   74.726782]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734001]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.741221] ==================================================================
[   58.121723] ==================================================================
[   58.128968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   58.136274] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.143666] 
[   58.145192] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.145200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.145202] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.145205] Call Trace:
[   58.145207]  <TASK>
[   58.145209]  dump_stack_lvl+0x73/0xb0
[   58.145213]  print_report+0xd1/0x650
[   58.145217]  ? __virt_addr_valid+0x1db/0x2d0
[   58.145221]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145225]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.145229]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145233]  kasan_report+0x141/0x180
[   58.145238]  ? kasan_atomics_helper+0xd47/0x5450
[   58.145243]  kasan_check_range+0x10c/0x1c0
[   58.145248]  __kasan_check_write+0x18/0x20
[   58.145251]  kasan_atomics_helper+0xd47/0x5450
[   58.145255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.145260]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.145264]  ? kasan_atomics+0x152/0x310
[   58.145268]  kasan_atomics+0x1dc/0x310
[   58.145271]  ? __pfx_kasan_atomics+0x10/0x10
[   58.145275]  ? ktime_get_ts64+0x83/0x230
[   58.145280]  kunit_try_run_case+0x1a2/0x480
[   58.145285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.145289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.145294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.145298]  ? __kthread_parkme+0x82/0x180
[   58.145302]  ? preempt_count_sub+0x50/0x80
[   58.145307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.145312]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.145316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.145320]  kthread+0x334/0x6f0
[   58.145324]  ? trace_preempt_on+0x20/0xc0
[   58.145329]  ? __pfx_kthread+0x10/0x10
[   58.145333]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.145337]  ? calculate_sigpending+0x7b/0xa0
[   58.145341]  ? __pfx_kthread+0x10/0x10
[   58.145346]  ret_from_fork+0x3e/0x80
[   58.145350]  ? __pfx_kthread+0x10/0x10
[   58.145354]  ret_from_fork_asm+0x1a/0x30
[   58.145360]  </TASK>
[   58.145362] 
[   58.325995] Allocated by task 308:
[   58.329403]  kasan_save_stack+0x45/0x70
[   58.333242]  kasan_save_track+0x18/0x40
[   58.337082]  kasan_save_alloc_info+0x3b/0x50
[   58.341352]  __kasan_kmalloc+0xb7/0xc0
[   58.345105]  __kmalloc_cache_noprof+0x189/0x420
[   58.349639]  kasan_atomics+0x95/0x310
[   58.353304]  kunit_try_run_case+0x1a2/0x480
[   58.357489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.362890]  kthread+0x334/0x6f0
[   58.366120]  ret_from_fork+0x3e/0x80
[   58.369705]  ret_from_fork_asm+0x1a/0x30
[   58.373660] 
[   58.375187] The buggy address belongs to the object at ffff8881061f7500
[   58.375187]  which belongs to the cache kmalloc-64 of size 64
[   58.387528] The buggy address is located 0 bytes to the right of
[   58.387528]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.400396] 
[   58.401895] The buggy address belongs to the physical page:
[   58.407467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.415465] flags: 0x200000000000000(node=0|zone=2)
[   58.420346] page_type: f5(slab)
[   58.423494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.431242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.438987] page dumped because: kasan: bad access detected
[   58.444561] 
[   58.446059] Memory state around the buggy address:
[   58.450852]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.458072]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.465299] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.472516]                                      ^
[   58.477311]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.484538]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.491755] ==================================================================
[   53.597277] ==================================================================
[   53.604495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   53.611808] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.619200] 
[   53.620719] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.620727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.620729] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.620733] Call Trace:
[   53.620735]  <TASK>
[   53.620737]  dump_stack_lvl+0x73/0xb0
[   53.620740]  print_report+0xd1/0x650
[   53.620744]  ? __virt_addr_valid+0x1db/0x2d0
[   53.620748]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.620757]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620761]  kasan_report+0x141/0x180
[   53.620766]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.620771]  kasan_check_range+0x10c/0x1c0
[   53.620775]  __kasan_check_write+0x18/0x20
[   53.620779]  kasan_atomics_helper+0x5fe/0x5450
[   53.620783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.620788]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.620792]  ? kasan_atomics+0x152/0x310
[   53.620796]  kasan_atomics+0x1dc/0x310
[   53.620799]  ? __pfx_kasan_atomics+0x10/0x10
[   53.620803]  ? ktime_get_ts64+0x83/0x230
[   53.620808]  kunit_try_run_case+0x1a2/0x480
[   53.620812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.620817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.620822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.620826]  ? __kthread_parkme+0x82/0x180
[   53.620830]  ? preempt_count_sub+0x50/0x80
[   53.620835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.620840]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.620844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.620848]  kthread+0x334/0x6f0
[   53.620852]  ? trace_preempt_on+0x20/0xc0
[   53.620857]  ? __pfx_kthread+0x10/0x10
[   53.620861]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.620866]  ? calculate_sigpending+0x7b/0xa0
[   53.620870]  ? __pfx_kthread+0x10/0x10
[   53.620874]  ret_from_fork+0x3e/0x80
[   53.620878]  ? __pfx_kthread+0x10/0x10
[   53.620882]  ret_from_fork_asm+0x1a/0x30
[   53.620888]  </TASK>
[   53.620890] 
[   53.801512] Allocated by task 308:
[   53.804917]  kasan_save_stack+0x45/0x70
[   53.808758]  kasan_save_track+0x18/0x40
[   53.812595]  kasan_save_alloc_info+0x3b/0x50
[   53.816870]  __kasan_kmalloc+0xb7/0xc0
[   53.820629]  __kmalloc_cache_noprof+0x189/0x420
[   53.825162]  kasan_atomics+0x95/0x310
[   53.828828]  kunit_try_run_case+0x1a2/0x480
[   53.833014]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.838414]  kthread+0x334/0x6f0
[   53.841647]  ret_from_fork+0x3e/0x80
[   53.845234]  ret_from_fork_asm+0x1a/0x30
[   53.849159] 
[   53.850659] The buggy address belongs to the object at ffff8881061f7500
[   53.850659]  which belongs to the cache kmalloc-64 of size 64
[   53.863025] The buggy address is located 0 bytes to the right of
[   53.863025]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   53.875888] 
[   53.877385] The buggy address belongs to the physical page:
[   53.882960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   53.890966] flags: 0x200000000000000(node=0|zone=2)
[   53.895845] page_type: f5(slab)
[   53.898991] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.906739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.914486] page dumped because: kasan: bad access detected
[   53.920058] 
[   53.921558] Memory state around the buggy address:
[   53.926349]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.933569]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.940789] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.948007]                                      ^
[   53.952801]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.960027]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.967246] ==================================================================
[   51.716860] ==================================================================
[   51.724104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   51.731409] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   51.738735] 
[   51.740235] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   51.740243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.740245] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.740248] Call Trace:
[   51.740250]  <TASK>
[   51.740252]  dump_stack_lvl+0x73/0xb0
[   51.740255]  print_report+0xd1/0x650
[   51.740260]  ? __virt_addr_valid+0x1db/0x2d0
[   51.740263]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.740272]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740276]  kasan_report+0x141/0x180
[   51.740280]  ? kasan_atomics_helper+0x3df/0x5450
[   51.740286]  kasan_check_range+0x10c/0x1c0
[   51.740290]  __kasan_check_read+0x15/0x20
[   51.740294]  kasan_atomics_helper+0x3df/0x5450
[   51.740299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.740303]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.740307]  ? kasan_atomics+0x152/0x310
[   51.740311]  kasan_atomics+0x1dc/0x310
[   51.740315]  ? __pfx_kasan_atomics+0x10/0x10
[   51.740318]  ? ktime_get_ts64+0x83/0x230
[   51.740323]  kunit_try_run_case+0x1a2/0x480
[   51.740328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.740332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.740337]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.740342]  ? __kthread_parkme+0x82/0x180
[   51.740346]  ? preempt_count_sub+0x50/0x80
[   51.740351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.740355]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.740359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.740364]  kthread+0x334/0x6f0
[   51.740368]  ? trace_preempt_on+0x20/0xc0
[   51.740372]  ? __pfx_kthread+0x10/0x10
[   51.740377]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.740381]  ? calculate_sigpending+0x7b/0xa0
[   51.740385]  ? __pfx_kthread+0x10/0x10
[   51.740390]  ret_from_fork+0x3e/0x80
[   51.740394]  ? __pfx_kthread+0x10/0x10
[   51.740399]  ret_from_fork_asm+0x1a/0x30
[   51.740405]  </TASK>
[   51.740406] 
[   51.920906] Allocated by task 308:
[   51.924313]  kasan_save_stack+0x45/0x70
[   51.928151]  kasan_save_track+0x18/0x40
[   51.931990]  kasan_save_alloc_info+0x3b/0x50
[   51.936264]  __kasan_kmalloc+0xb7/0xc0
[   51.940016]  __kmalloc_cache_noprof+0x189/0x420
[   51.944548]  kasan_atomics+0x95/0x310
[   51.948214]  kunit_try_run_case+0x1a2/0x480
[   51.952399]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.957800]  kthread+0x334/0x6f0
[   51.961041]  ret_from_fork+0x3e/0x80
[   51.964628]  ret_from_fork_asm+0x1a/0x30
[   51.968555] 
[   51.970052] The buggy address belongs to the object at ffff8881061f7500
[   51.970052]  which belongs to the cache kmalloc-64 of size 64
[   51.982386] The buggy address is located 0 bytes to the right of
[   51.982386]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   51.995248] 
[   51.996746] The buggy address belongs to the physical page:
[   52.002318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   52.010324] flags: 0x200000000000000(node=0|zone=2)
[   52.015205] page_type: f5(slab)
[   52.018351] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.026090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.033829] page dumped because: kasan: bad access detected
[   52.039400] 
[   52.040899] Memory state around the buggy address:
[   52.045707]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.052955]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.060175] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.067394]                                      ^
[   52.072184]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.079406]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.086633] ==================================================================
[   60.008096] ==================================================================
[   60.015311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   60.022706] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   60.030036] 
[   60.031537] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   60.031544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.031546] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.031550] Call Trace:
[   60.031552]  <TASK>
[   60.031553]  dump_stack_lvl+0x73/0xb0
[   60.031557]  print_report+0xd1/0x650
[   60.031561]  ? __virt_addr_valid+0x1db/0x2d0
[   60.031565]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.031573]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031578]  kasan_report+0x141/0x180
[   60.031582]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.031587]  __asan_report_load4_noabort+0x18/0x20
[   60.031591]  kasan_atomics_helper+0x4a36/0x5450
[   60.031595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.031600]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.031604]  ? kasan_atomics+0x152/0x310
[   60.031608]  kasan_atomics+0x1dc/0x310
[   60.031611]  ? __pfx_kasan_atomics+0x10/0x10
[   60.031615]  ? ktime_get_ts64+0x83/0x230
[   60.031620]  kunit_try_run_case+0x1a2/0x480
[   60.031625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.031629]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.031634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.031638]  ? __kthread_parkme+0x82/0x180
[   60.031643]  ? preempt_count_sub+0x50/0x80
[   60.031647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.031652]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.031656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.031661]  kthread+0x334/0x6f0
[   60.031665]  ? trace_preempt_on+0x20/0xc0
[   60.031669]  ? __pfx_kthread+0x10/0x10
[   60.031691]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.031696]  ? calculate_sigpending+0x7b/0xa0
[   60.031700]  ? __pfx_kthread+0x10/0x10
[   60.031704]  ret_from_fork+0x3e/0x80
[   60.031721]  ? __pfx_kthread+0x10/0x10
[   60.031726]  ret_from_fork_asm+0x1a/0x30
[   60.031732]  </TASK>
[   60.031733] 
[   60.209445] Allocated by task 308:
[   60.212849]  kasan_save_stack+0x45/0x70
[   60.216707]  kasan_save_track+0x18/0x40
[   60.220571]  kasan_save_alloc_info+0x3b/0x50
[   60.224844]  __kasan_kmalloc+0xb7/0xc0
[   60.228596]  __kmalloc_cache_noprof+0x189/0x420
[   60.233130]  kasan_atomics+0x95/0x310
[   60.236797]  kunit_try_run_case+0x1a2/0x480
[   60.240989]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.246388]  kthread+0x334/0x6f0
[   60.249621]  ret_from_fork+0x3e/0x80
[   60.253201]  ret_from_fork_asm+0x1a/0x30
[   60.257136] 
[   60.258635] The buggy address belongs to the object at ffff8881061f7500
[   60.258635]  which belongs to the cache kmalloc-64 of size 64
[   60.270977] The buggy address is located 0 bytes to the right of
[   60.270977]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   60.283844] 
[   60.285344] The buggy address belongs to the physical page:
[   60.290915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   60.298916] flags: 0x200000000000000(node=0|zone=2)
[   60.303794] page_type: f5(slab)
[   60.306940] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.314717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.322460] page dumped because: kasan: bad access detected
[   60.328034] 
[   60.329534] Memory state around the buggy address:
[   60.334326]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.341546]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.348773] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.355993]                                      ^
[   60.360784]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.368004]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.375231] ==================================================================
[   61.512267] ==================================================================
[   61.519499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   61.526900] Read of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   61.534212] 
[   61.535735] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   61.535742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.535744] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.535748] Call Trace:
[   61.535750]  <TASK>
[   61.535751]  dump_stack_lvl+0x73/0xb0
[   61.535755]  print_report+0xd1/0x650
[   61.535759]  ? __virt_addr_valid+0x1db/0x2d0
[   61.535763]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.535772]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535776]  kasan_report+0x141/0x180
[   61.535780]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.535785]  __asan_report_load4_noabort+0x18/0x20
[   61.535789]  kasan_atomics_helper+0x4a02/0x5450
[   61.535794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.535798]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.535802]  ? kasan_atomics+0x152/0x310
[   61.535806]  kasan_atomics+0x1dc/0x310
[   61.535809]  ? __pfx_kasan_atomics+0x10/0x10
[   61.535813]  ? ktime_get_ts64+0x83/0x230
[   61.535818]  kunit_try_run_case+0x1a2/0x480
[   61.535823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.535827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.535832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.535837]  ? __kthread_parkme+0x82/0x180
[   61.535841]  ? preempt_count_sub+0x50/0x80
[   61.535846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.535850]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.535855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.535859]  kthread+0x334/0x6f0
[   61.535863]  ? trace_preempt_on+0x20/0xc0
[   61.535868]  ? __pfx_kthread+0x10/0x10
[   61.535872]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.535876]  ? calculate_sigpending+0x7b/0xa0
[   61.535880]  ? __pfx_kthread+0x10/0x10
[   61.535885]  ret_from_fork+0x3e/0x80
[   61.535889]  ? __pfx_kthread+0x10/0x10
[   61.535894]  ret_from_fork_asm+0x1a/0x30
[   61.535899]  </TASK>
[   61.535901] 
[   61.713440] Allocated by task 308:
[   61.716846]  kasan_save_stack+0x45/0x70
[   61.720703]  kasan_save_track+0x18/0x40
[   61.724568]  kasan_save_alloc_info+0x3b/0x50
[   61.728841]  __kasan_kmalloc+0xb7/0xc0
[   61.732594]  __kmalloc_cache_noprof+0x189/0x420
[   61.737126]  kasan_atomics+0x95/0x310
[   61.740790]  kunit_try_run_case+0x1a2/0x480
[   61.744977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.750375]  kthread+0x334/0x6f0
[   61.753608]  ret_from_fork+0x3e/0x80
[   61.757188]  ret_from_fork_asm+0x1a/0x30
[   61.761115] 
[   61.762612] The buggy address belongs to the object at ffff8881061f7500
[   61.762612]  which belongs to the cache kmalloc-64 of size 64
[   61.774955] The buggy address is located 0 bytes to the right of
[   61.774955]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   61.787824] 
[   61.789322] The buggy address belongs to the physical page:
[   61.794894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   61.802894] flags: 0x200000000000000(node=0|zone=2)
[   61.807772] page_type: f5(slab)
[   61.810918] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.818658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.826432] page dumped because: kasan: bad access detected
[   61.832002] 
[   61.833503] Memory state around the buggy address:
[   61.838296]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.845524]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.852755] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.859977]                                      ^
[   61.864770]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.871989]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.879208] ==================================================================
[   53.974488] ==================================================================
[   53.981742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   53.989051] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   53.996450] 
[   53.997950] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   53.997958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.997960] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.997964] Call Trace:
[   53.997965]  <TASK>
[   53.997967]  dump_stack_lvl+0x73/0xb0
[   53.997971]  print_report+0xd1/0x650
[   53.997975]  ? __virt_addr_valid+0x1db/0x2d0
[   53.997979]  ? kasan_atomics_helper+0x697/0x5450
[   53.997983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.997988]  ? kasan_atomics_helper+0x697/0x5450
[   53.997992]  kasan_report+0x141/0x180
[   53.997996]  ? kasan_atomics_helper+0x697/0x5450
[   53.998001]  kasan_check_range+0x10c/0x1c0
[   53.998006]  __kasan_check_write+0x18/0x20
[   53.998010]  kasan_atomics_helper+0x697/0x5450
[   53.998014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.998019]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.998023]  ? kasan_atomics+0x152/0x310
[   53.998027]  kasan_atomics+0x1dc/0x310
[   53.998030]  ? __pfx_kasan_atomics+0x10/0x10
[   53.998034]  ? ktime_get_ts64+0x83/0x230
[   53.998039]  kunit_try_run_case+0x1a2/0x480
[   53.998044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.998048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.998053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.998057]  ? __kthread_parkme+0x82/0x180
[   53.998062]  ? preempt_count_sub+0x50/0x80
[   53.998067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.998071]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.998075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.998080]  kthread+0x334/0x6f0
[   53.998084]  ? trace_preempt_on+0x20/0xc0
[   53.998088]  ? __pfx_kthread+0x10/0x10
[   53.998093]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.998097]  ? calculate_sigpending+0x7b/0xa0
[   53.998101]  ? __pfx_kthread+0x10/0x10
[   53.998106]  ret_from_fork+0x3e/0x80
[   53.998110]  ? __pfx_kthread+0x10/0x10
[   53.998114]  ret_from_fork_asm+0x1a/0x30
[   53.998120]  </TASK>
[   53.998122] 
[   54.178858] Allocated by task 308:
[   54.182264]  kasan_save_stack+0x45/0x70
[   54.186104]  kasan_save_track+0x18/0x40
[   54.189943]  kasan_save_alloc_info+0x3b/0x50
[   54.194217]  __kasan_kmalloc+0xb7/0xc0
[   54.197969]  __kmalloc_cache_noprof+0x189/0x420
[   54.202502]  kasan_atomics+0x95/0x310
[   54.206167]  kunit_try_run_case+0x1a2/0x480
[   54.210352]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.215752]  kthread+0x334/0x6f0
[   54.218984]  ret_from_fork+0x3e/0x80
[   54.222573]  ret_from_fork_asm+0x1a/0x30
[   54.226506] 
[   54.228005] The buggy address belongs to the object at ffff8881061f7500
[   54.228005]  which belongs to the cache kmalloc-64 of size 64
[   54.240337] The buggy address is located 0 bytes to the right of
[   54.240337]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   54.253197] 
[   54.254705] The buggy address belongs to the physical page:
[   54.260278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   54.268278] flags: 0x200000000000000(node=0|zone=2)
[   54.273156] page_type: f5(slab)
[   54.276304] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.284052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.291797] page dumped because: kasan: bad access detected
[   54.297369] 
[   54.298869] Memory state around the buggy address:
[   54.303662]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.310915]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.318134] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.325352]                                      ^
[   54.330147]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337367]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.344592] ==================================================================
[   69.801069] ==================================================================
[   69.808295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   69.815707] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   69.823124] 
[   69.824623] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   69.824631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   69.824633] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.824637] Call Trace:
[   69.824638]  <TASK>
[   69.824640]  dump_stack_lvl+0x73/0xb0
[   69.824644]  print_report+0xd1/0x650
[   69.824648]  ? __virt_addr_valid+0x1db/0x2d0
[   69.824652]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.824661]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824665]  kasan_report+0x141/0x180
[   69.824669]  ? kasan_atomics_helper+0x1ce1/0x5450
[   69.824691]  kasan_check_range+0x10c/0x1c0
[   69.824697]  __kasan_check_write+0x18/0x20
[   69.824700]  kasan_atomics_helper+0x1ce1/0x5450
[   69.824717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.824722]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.824726]  ? kasan_atomics+0x152/0x310
[   69.824730]  kasan_atomics+0x1dc/0x310
[   69.824733]  ? __pfx_kasan_atomics+0x10/0x10
[   69.824737]  ? ktime_get_ts64+0x83/0x230
[   69.824742]  kunit_try_run_case+0x1a2/0x480
[   69.824746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.824750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.824755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.824760]  ? __kthread_parkme+0x82/0x180
[   69.824764]  ? preempt_count_sub+0x50/0x80
[   69.824769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.824773]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.824777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.824782]  kthread+0x334/0x6f0
[   69.824786]  ? trace_preempt_on+0x20/0xc0
[   69.824790]  ? __pfx_kthread+0x10/0x10
[   69.824795]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.824799]  ? calculate_sigpending+0x7b/0xa0
[   69.824803]  ? __pfx_kthread+0x10/0x10
[   69.824807]  ret_from_fork+0x3e/0x80
[   69.824811]  ? __pfx_kthread+0x10/0x10
[   69.824816]  ret_from_fork_asm+0x1a/0x30
[   69.824822]  </TASK>
[   69.824823] 
[   70.005868] Allocated by task 308:
[   70.009275]  kasan_save_stack+0x45/0x70
[   70.013116]  kasan_save_track+0x18/0x40
[   70.016962]  kasan_save_alloc_info+0x3b/0x50
[   70.021236]  __kasan_kmalloc+0xb7/0xc0
[   70.024988]  __kmalloc_cache_noprof+0x189/0x420
[   70.029520]  kasan_atomics+0x95/0x310
[   70.033187]  kunit_try_run_case+0x1a2/0x480
[   70.037378]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.042777]  kthread+0x334/0x6f0
[   70.046012]  ret_from_fork+0x3e/0x80
[   70.049601]  ret_from_fork_asm+0x1a/0x30
[   70.053532] 
[   70.055034] The buggy address belongs to the object at ffff8881061f7500
[   70.055034]  which belongs to the cache kmalloc-64 of size 64
[   70.067375] The buggy address is located 0 bytes to the right of
[   70.067375]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   70.080234] 
[   70.081743] The buggy address belongs to the physical page:
[   70.087315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   70.095314] flags: 0x200000000000000(node=0|zone=2)
[   70.100194] page_type: f5(slab)
[   70.103339] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.111078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.118816] page dumped because: kasan: bad access detected
[   70.124388] 
[   70.125888] Memory state around the buggy address:
[   70.130707]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.137954]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.145181] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.152407]                                      ^
[   70.157199]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.164418]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.171637] ==================================================================
[   58.498998] ==================================================================
[   58.506229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   58.513543] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   58.520935] 
[   58.522436] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   58.522444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.522446] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.522449] Call Trace:
[   58.522451]  <TASK>
[   58.522453]  dump_stack_lvl+0x73/0xb0
[   58.522456]  print_report+0xd1/0x650
[   58.522461]  ? __virt_addr_valid+0x1db/0x2d0
[   58.522464]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.522473]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522477]  kasan_report+0x141/0x180
[   58.522481]  ? kasan_atomics_helper+0xde0/0x5450
[   58.522486]  kasan_check_range+0x10c/0x1c0
[   58.522491]  __kasan_check_write+0x18/0x20
[   58.522495]  kasan_atomics_helper+0xde0/0x5450
[   58.522499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.522504]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.522508]  ? kasan_atomics+0x152/0x310
[   58.522512]  kasan_atomics+0x1dc/0x310
[   58.522515]  ? __pfx_kasan_atomics+0x10/0x10
[   58.522519]  ? ktime_get_ts64+0x83/0x230
[   58.522524]  kunit_try_run_case+0x1a2/0x480
[   58.522529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.522533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.522538]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.522542]  ? __kthread_parkme+0x82/0x180
[   58.522547]  ? preempt_count_sub+0x50/0x80
[   58.522552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.522556]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.522560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.522565]  kthread+0x334/0x6f0
[   58.522569]  ? trace_preempt_on+0x20/0xc0
[   58.522573]  ? __pfx_kthread+0x10/0x10
[   58.522578]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.522582]  ? calculate_sigpending+0x7b/0xa0
[   58.522586]  ? __pfx_kthread+0x10/0x10
[   58.522590]  ret_from_fork+0x3e/0x80
[   58.522595]  ? __pfx_kthread+0x10/0x10
[   58.522599]  ret_from_fork_asm+0x1a/0x30
[   58.522605]  </TASK>
[   58.522607] 
[   58.703230] Allocated by task 308:
[   58.706636]  kasan_save_stack+0x45/0x70
[   58.710474]  kasan_save_track+0x18/0x40
[   58.714313]  kasan_save_alloc_info+0x3b/0x50
[   58.718586]  __kasan_kmalloc+0xb7/0xc0
[   58.722338]  __kmalloc_cache_noprof+0x189/0x420
[   58.726872]  kasan_atomics+0x95/0x310
[   58.730538]  kunit_try_run_case+0x1a2/0x480
[   58.734750]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.740156]  kthread+0x334/0x6f0
[   58.743389]  ret_from_fork+0x3e/0x80
[   58.746969]  ret_from_fork_asm+0x1a/0x30
[   58.750895] 
[   58.752394] The buggy address belongs to the object at ffff8881061f7500
[   58.752394]  which belongs to the cache kmalloc-64 of size 64
[   58.764738] The buggy address is located 0 bytes to the right of
[   58.764738]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   58.777605] 
[   58.779104] The buggy address belongs to the physical page:
[   58.784704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   58.792735] flags: 0x200000000000000(node=0|zone=2)
[   58.797614] page_type: f5(slab)
[   58.800763] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.808508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.816247] page dumped because: kasan: bad access detected
[   58.821821] 
[   58.823320] Memory state around the buggy address:
[   58.828113]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.835332]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.842557] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.849776]                                      ^
[   58.854568]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.861788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.869007] ==================================================================
[   74.748464] ==================================================================
[   74.755706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   74.763121] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   74.770521] 
[   74.772021] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   74.772028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.772030] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.772034] Call Trace:
[   74.772036]  <TASK>
[   74.772037]  dump_stack_lvl+0x73/0xb0
[   74.772041]  print_report+0xd1/0x650
[   74.772045]  ? __virt_addr_valid+0x1db/0x2d0
[   74.772049]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772053]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.772057]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772062]  kasan_report+0x141/0x180
[   74.772066]  ? kasan_atomics_helper+0x224c/0x5450
[   74.772071]  kasan_check_range+0x10c/0x1c0
[   74.772076]  __kasan_check_write+0x18/0x20
[   74.772080]  kasan_atomics_helper+0x224c/0x5450
[   74.772084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.772089]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.772092]  ? kasan_atomics+0x152/0x310
[   74.772097]  kasan_atomics+0x1dc/0x310
[   74.772100]  ? __pfx_kasan_atomics+0x10/0x10
[   74.772104]  ? ktime_get_ts64+0x83/0x230
[   74.772109]  kunit_try_run_case+0x1a2/0x480
[   74.772113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.772118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.772122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.772127]  ? __kthread_parkme+0x82/0x180
[   74.772131]  ? preempt_count_sub+0x50/0x80
[   74.772136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.772140]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.772144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.772149]  kthread+0x334/0x6f0
[   74.772153]  ? trace_preempt_on+0x20/0xc0
[   74.772157]  ? __pfx_kthread+0x10/0x10
[   74.772162]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.772166]  ? calculate_sigpending+0x7b/0xa0
[   74.772170]  ? __pfx_kthread+0x10/0x10
[   74.772175]  ret_from_fork+0x3e/0x80
[   74.772179]  ? __pfx_kthread+0x10/0x10
[   74.772183]  ret_from_fork_asm+0x1a/0x30
[   74.772189]  </TASK>
[   74.772191] 
[   74.953154] Allocated by task 308:
[   74.956561]  kasan_save_stack+0x45/0x70
[   74.960408]  kasan_save_track+0x18/0x40
[   74.964247]  kasan_save_alloc_info+0x3b/0x50
[   74.968520]  __kasan_kmalloc+0xb7/0xc0
[   74.972272]  __kmalloc_cache_noprof+0x189/0x420
[   74.976804]  kasan_atomics+0x95/0x310
[   74.980469]  kunit_try_run_case+0x1a2/0x480
[   74.984655]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.990057]  kthread+0x334/0x6f0
[   74.993295]  ret_from_fork+0x3e/0x80
[   74.996876]  ret_from_fork_asm+0x1a/0x30
[   75.000801] 
[   75.002301] The buggy address belongs to the object at ffff8881061f7500
[   75.002301]  which belongs to the cache kmalloc-64 of size 64
[   75.014641] The buggy address is located 0 bytes to the right of
[   75.014641]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   75.027501] 
[   75.029000] The buggy address belongs to the physical page:
[   75.034574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   75.042581] flags: 0x200000000000000(node=0|zone=2)
[   75.047460] page_type: f5(slab)
[   75.050609] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.058354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.066093] page dumped because: kasan: bad access detected
[   75.071665] 
[   75.073189] Memory state around the buggy address:
[   75.077982]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.085202]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.092423] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.099648]                                      ^
[   75.104442]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.111688]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.118940] ==================================================================
[   66.405096] ==================================================================
[   66.412323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   66.419735] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   66.427134] 
[   66.428634] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   66.428642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.428644] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.428648] Call Trace:
[   66.428649]  <TASK>
[   66.428651]  dump_stack_lvl+0x73/0xb0
[   66.428655]  print_report+0xd1/0x650
[   66.428659]  ? __virt_addr_valid+0x1db/0x2d0
[   66.428663]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.428688]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428693]  kasan_report+0x141/0x180
[   66.428697]  ? kasan_atomics_helper+0x177f/0x5450
[   66.428702]  kasan_check_range+0x10c/0x1c0
[   66.428720]  __kasan_check_write+0x18/0x20
[   66.428724]  kasan_atomics_helper+0x177f/0x5450
[   66.428728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.428732]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.428736]  ? kasan_atomics+0x152/0x310
[   66.428741]  kasan_atomics+0x1dc/0x310
[   66.428744]  ? __pfx_kasan_atomics+0x10/0x10
[   66.428748]  ? ktime_get_ts64+0x83/0x230
[   66.428753]  kunit_try_run_case+0x1a2/0x480
[   66.428757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.428762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.428767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.428771]  ? __kthread_parkme+0x82/0x180
[   66.428775]  ? preempt_count_sub+0x50/0x80
[   66.428780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.428785]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.428789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.428793]  kthread+0x334/0x6f0
[   66.428797]  ? trace_preempt_on+0x20/0xc0
[   66.428802]  ? __pfx_kthread+0x10/0x10
[   66.428806]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.428811]  ? calculate_sigpending+0x7b/0xa0
[   66.428815]  ? __pfx_kthread+0x10/0x10
[   66.428819]  ret_from_fork+0x3e/0x80
[   66.428823]  ? __pfx_kthread+0x10/0x10
[   66.428828]  ret_from_fork_asm+0x1a/0x30
[   66.428834]  </TASK>
[   66.428835] 
[   66.609882] Allocated by task 308:
[   66.613286]  kasan_save_stack+0x45/0x70
[   66.617126]  kasan_save_track+0x18/0x40
[   66.620965]  kasan_save_alloc_info+0x3b/0x50
[   66.625238]  __kasan_kmalloc+0xb7/0xc0
[   66.628990]  __kmalloc_cache_noprof+0x189/0x420
[   66.633522]  kasan_atomics+0x95/0x310
[   66.637187]  kunit_try_run_case+0x1a2/0x480
[   66.641373]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.646772]  kthread+0x334/0x6f0
[   66.650006]  ret_from_fork+0x3e/0x80
[   66.653584]  ret_from_fork_asm+0x1a/0x30
[   66.657509] 
[   66.659009] The buggy address belongs to the object at ffff8881061f7500
[   66.659009]  which belongs to the cache kmalloc-64 of size 64
[   66.671349] The buggy address is located 0 bytes to the right of
[   66.671349]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   66.684212] 
[   66.685710] The buggy address belongs to the physical page:
[   66.691281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   66.699282] flags: 0x200000000000000(node=0|zone=2)
[   66.704162] page_type: f5(slab)
[   66.707307] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.715047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.722793] page dumped because: kasan: bad access detected
[   66.728366] 
[   66.729865] Memory state around the buggy address:
[   66.734659]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.741911]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.749131] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.756351]                                      ^
[   66.761143]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.768369]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.775589] ==================================================================
[   59.630875] ==================================================================
[   59.638105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   59.645419] Write of size 4 at addr ffff8881061f7530 by task kunit_try_catch/308
[   59.652820] 
[   59.654321] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   59.654328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.654330] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.654334] Call Trace:
[   59.654335]  <TASK>
[   59.654337]  dump_stack_lvl+0x73/0xb0
[   59.654341]  print_report+0xd1/0x650
[   59.654345]  ? __virt_addr_valid+0x1db/0x2d0
[   59.654349]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.654357]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654362]  kasan_report+0x141/0x180
[   59.654366]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.654371]  kasan_check_range+0x10c/0x1c0
[   59.654376]  __kasan_check_write+0x18/0x20
[   59.654380]  kasan_atomics_helper+0xfa9/0x5450
[   59.654384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.654388]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.654392]  ? kasan_atomics+0x152/0x310
[   59.654396]  kasan_atomics+0x1dc/0x310
[   59.654400]  ? __pfx_kasan_atomics+0x10/0x10
[   59.654404]  ? ktime_get_ts64+0x83/0x230
[   59.654408]  kunit_try_run_case+0x1a2/0x480
[   59.654413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.654417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.654422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.654427]  ? __kthread_parkme+0x82/0x180
[   59.654431]  ? preempt_count_sub+0x50/0x80
[   59.654436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.654440]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.654445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.654449]  kthread+0x334/0x6f0
[   59.654453]  ? trace_preempt_on+0x20/0xc0
[   59.654458]  ? __pfx_kthread+0x10/0x10
[   59.654462]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.654467]  ? calculate_sigpending+0x7b/0xa0
[   59.654471]  ? __pfx_kthread+0x10/0x10
[   59.654475]  ret_from_fork+0x3e/0x80
[   59.654479]  ? __pfx_kthread+0x10/0x10
[   59.654484]  ret_from_fork_asm+0x1a/0x30
[   59.654490]  </TASK>
[   59.654491] 
[   59.835113] Allocated by task 308:
[   59.838521]  kasan_save_stack+0x45/0x70
[   59.842369]  kasan_save_track+0x18/0x40
[   59.846217]  kasan_save_alloc_info+0x3b/0x50
[   59.850497]  __kasan_kmalloc+0xb7/0xc0
[   59.854250]  __kmalloc_cache_noprof+0x189/0x420
[   59.858781]  kasan_atomics+0x95/0x310
[   59.862447]  kunit_try_run_case+0x1a2/0x480
[   59.866632]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.872032]  kthread+0x334/0x6f0
[   59.875266]  ret_from_fork+0x3e/0x80
[   59.878851]  ret_from_fork_asm+0x1a/0x30
[   59.882779] 
[   59.884277] The buggy address belongs to the object at ffff8881061f7500
[   59.884277]  which belongs to the cache kmalloc-64 of size 64
[   59.896610] The buggy address is located 0 bytes to the right of
[   59.896610]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   59.909471] 
[   59.910970] The buggy address belongs to the physical page:
[   59.916543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   59.924549] flags: 0x200000000000000(node=0|zone=2)
[   59.929429] page_type: f5(slab)
[   59.932575] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.940324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.948071] page dumped because: kasan: bad access detected
[   59.953641] 
[   59.955142] Memory state around the buggy address:
[   59.959936]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.967163]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.974381] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.981598]                                      ^
[   59.986392]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.993611]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.000830] ==================================================================
[   67.160462] ==================================================================
[   67.167705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   67.175120] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.182513] 
[   67.184014] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.184022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.184024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.184027] Call Trace:
[   67.184029]  <TASK>
[   67.184031]  dump_stack_lvl+0x73/0xb0
[   67.184034]  print_report+0xd1/0x650
[   67.184038]  ? __virt_addr_valid+0x1db/0x2d0
[   67.184042]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.184051]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184055]  kasan_report+0x141/0x180
[   67.184059]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.184064]  kasan_check_range+0x10c/0x1c0
[   67.184069]  __kasan_check_write+0x18/0x20
[   67.184073]  kasan_atomics_helper+0x18b1/0x5450
[   67.184077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.184082]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.184086]  ? kasan_atomics+0x152/0x310
[   67.184090]  kasan_atomics+0x1dc/0x310
[   67.184093]  ? __pfx_kasan_atomics+0x10/0x10
[   67.184097]  ? ktime_get_ts64+0x83/0x230
[   67.184102]  kunit_try_run_case+0x1a2/0x480
[   67.184106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.184110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.184115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.184120]  ? __kthread_parkme+0x82/0x180
[   67.184124]  ? preempt_count_sub+0x50/0x80
[   67.184129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.184134]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.184138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.184142]  kthread+0x334/0x6f0
[   67.184146]  ? trace_preempt_on+0x20/0xc0
[   67.184151]  ? __pfx_kthread+0x10/0x10
[   67.184155]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.184159]  ? calculate_sigpending+0x7b/0xa0
[   67.184163]  ? __pfx_kthread+0x10/0x10
[   67.184168]  ret_from_fork+0x3e/0x80
[   67.184172]  ? __pfx_kthread+0x10/0x10
[   67.184176]  ret_from_fork_asm+0x1a/0x30
[   67.184182]  </TASK>
[   67.184184] 
[   67.365129] Allocated by task 308:
[   67.368534]  kasan_save_stack+0x45/0x70
[   67.372372]  kasan_save_track+0x18/0x40
[   67.376212]  kasan_save_alloc_info+0x3b/0x50
[   67.380485]  __kasan_kmalloc+0xb7/0xc0
[   67.384236]  __kmalloc_cache_noprof+0x189/0x420
[   67.388771]  kasan_atomics+0x95/0x310
[   67.392435]  kunit_try_run_case+0x1a2/0x480
[   67.396621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.402019]  kthread+0x334/0x6f0
[   67.405253]  ret_from_fork+0x3e/0x80
[   67.408831]  ret_from_fork_asm+0x1a/0x30
[   67.412759] 
[   67.414258] The buggy address belongs to the object at ffff8881061f7500
[   67.414258]  which belongs to the cache kmalloc-64 of size 64
[   67.426599] The buggy address is located 0 bytes to the right of
[   67.426599]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.439468] 
[   67.440967] The buggy address belongs to the physical page:
[   67.446541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.454545] flags: 0x200000000000000(node=0|zone=2)
[   67.459426] page_type: f5(slab)
[   67.462573] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.470320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.478059] page dumped because: kasan: bad access detected
[   67.483630] 
[   67.485129] Memory state around the buggy address:
[   67.489923]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.497141]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.504359] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.511578]                                      ^
[   67.516372]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.523592]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.530810] ==================================================================
[   72.492514] ==================================================================
[   72.499761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   72.507161] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   72.514554] 
[   72.516055] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   72.516063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   72.516065] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.516069] Call Trace:
[   72.516070]  <TASK>
[   72.516072]  dump_stack_lvl+0x73/0xb0
[   72.516076]  print_report+0xd1/0x650
[   72.516080]  ? __virt_addr_valid+0x1db/0x2d0
[   72.516084]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.516093]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516097]  kasan_report+0x141/0x180
[   72.516101]  ? kasan_atomics_helper+0x2006/0x5450
[   72.516106]  kasan_check_range+0x10c/0x1c0
[   72.516111]  __kasan_check_write+0x18/0x20
[   72.516115]  kasan_atomics_helper+0x2006/0x5450
[   72.516119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.516124]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.516128]  ? kasan_atomics+0x152/0x310
[   72.516132]  kasan_atomics+0x1dc/0x310
[   72.516135]  ? __pfx_kasan_atomics+0x10/0x10
[   72.516139]  ? ktime_get_ts64+0x83/0x230
[   72.516144]  kunit_try_run_case+0x1a2/0x480
[   72.516149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.516153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.516158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.516162]  ? __kthread_parkme+0x82/0x180
[   72.516167]  ? preempt_count_sub+0x50/0x80
[   72.516171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.516176]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.516180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.516184]  kthread+0x334/0x6f0
[   72.516188]  ? trace_preempt_on+0x20/0xc0
[   72.516193]  ? __pfx_kthread+0x10/0x10
[   72.516197]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.516201]  ? calculate_sigpending+0x7b/0xa0
[   72.516205]  ? __pfx_kthread+0x10/0x10
[   72.516210]  ret_from_fork+0x3e/0x80
[   72.516214]  ? __pfx_kthread+0x10/0x10
[   72.516219]  ret_from_fork_asm+0x1a/0x30
[   72.516224]  </TASK>
[   72.516226] 
[   72.697240] Allocated by task 308:
[   72.700645]  kasan_save_stack+0x45/0x70
[   72.704485]  kasan_save_track+0x18/0x40
[   72.708324]  kasan_save_alloc_info+0x3b/0x50
[   72.712597]  __kasan_kmalloc+0xb7/0xc0
[   72.716356]  __kmalloc_cache_noprof+0x189/0x420
[   72.720890]  kasan_atomics+0x95/0x310
[   72.724556]  kunit_try_run_case+0x1a2/0x480
[   72.728749]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.734147]  kthread+0x334/0x6f0
[   72.737380]  ret_from_fork+0x3e/0x80
[   72.740959]  ret_from_fork_asm+0x1a/0x30
[   72.744886] 
[   72.746384] The buggy address belongs to the object at ffff8881061f7500
[   72.746384]  which belongs to the cache kmalloc-64 of size 64
[   72.758736] The buggy address is located 0 bytes to the right of
[   72.758736]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   72.771603] 
[   72.773103] The buggy address belongs to the physical page:
[   72.778694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   72.786718] flags: 0x200000000000000(node=0|zone=2)
[   72.791605] page_type: f5(slab)
[   72.794753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.802501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.810248] page dumped because: kasan: bad access detected
[   72.815820] 
[   72.817319] Memory state around the buggy address:
[   72.822112]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.829330]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.836549] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.843769]                                      ^
[   72.848561]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.855788]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.863005] ==================================================================
[   63.390483] ==================================================================
[   63.397735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   63.405131] Read of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   63.412435] 
[   63.413938] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   63.413945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.413947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.413951] Call Trace:
[   63.413952]  <TASK>
[   63.413954]  dump_stack_lvl+0x73/0xb0
[   63.413958]  print_report+0xd1/0x650
[   63.413962]  ? __virt_addr_valid+0x1db/0x2d0
[   63.413966]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.413974]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413978]  kasan_report+0x141/0x180
[   63.413983]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.413988]  kasan_check_range+0x10c/0x1c0
[   63.413993]  __kasan_check_read+0x15/0x20
[   63.413996]  kasan_atomics_helper+0x13b5/0x5450
[   63.414001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.414005]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.414009]  ? kasan_atomics+0x152/0x310
[   63.414013]  kasan_atomics+0x1dc/0x310
[   63.414016]  ? __pfx_kasan_atomics+0x10/0x10
[   63.414020]  ? ktime_get_ts64+0x83/0x230
[   63.414025]  kunit_try_run_case+0x1a2/0x480
[   63.414029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.414034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.414038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.414043]  ? __kthread_parkme+0x82/0x180
[   63.414047]  ? preempt_count_sub+0x50/0x80
[   63.414052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.414057]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.414061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.414065]  kthread+0x334/0x6f0
[   63.414069]  ? trace_preempt_on+0x20/0xc0
[   63.414074]  ? __pfx_kthread+0x10/0x10
[   63.414078]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.414082]  ? calculate_sigpending+0x7b/0xa0
[   63.414086]  ? __pfx_kthread+0x10/0x10
[   63.414091]  ret_from_fork+0x3e/0x80
[   63.414095]  ? __pfx_kthread+0x10/0x10
[   63.414100]  ret_from_fork_asm+0x1a/0x30
[   63.414105]  </TASK>
[   63.414107] 
[   63.595093] Allocated by task 308:
[   63.598502]  kasan_save_stack+0x45/0x70
[   63.602350]  kasan_save_track+0x18/0x40
[   63.606195]  kasan_save_alloc_info+0x3b/0x50
[   63.610470]  __kasan_kmalloc+0xb7/0xc0
[   63.614229]  __kmalloc_cache_noprof+0x189/0x420
[   63.618764]  kasan_atomics+0x95/0x310
[   63.622427]  kunit_try_run_case+0x1a2/0x480
[   63.626614]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.632014]  kthread+0x334/0x6f0
[   63.635253]  ret_from_fork+0x3e/0x80
[   63.638834]  ret_from_fork_asm+0x1a/0x30
[   63.642759] 
[   63.644259] The buggy address belongs to the object at ffff8881061f7500
[   63.644259]  which belongs to the cache kmalloc-64 of size 64
[   63.656599] The buggy address is located 0 bytes to the right of
[   63.656599]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   63.669459] 
[   63.670959] The buggy address belongs to the physical page:
[   63.676532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   63.684530] flags: 0x200000000000000(node=0|zone=2)
[   63.689411] page_type: f5(slab)
[   63.692558] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.700303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.708041] page dumped because: kasan: bad access detected
[   63.713613] 
[   63.715115] Memory state around the buggy address:
[   63.719907]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.727134]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.734353] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.741573]                                      ^
[   63.746365]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.753584]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.760811] ==================================================================
[   67.538082] ==================================================================
[   67.545325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   67.552740] Write of size 8 at addr ffff8881061f7530 by task kunit_try_catch/308
[   67.560136] 
[   67.561637] CPU: 2 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   67.561644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.561647] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.561650] Call Trace:
[   67.561652]  <TASK>
[   67.561653]  dump_stack_lvl+0x73/0xb0
[   67.561657]  print_report+0xd1/0x650
[   67.561661]  ? __virt_addr_valid+0x1db/0x2d0
[   67.561665]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.561691]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561695]  kasan_report+0x141/0x180
[   67.561700]  ? kasan_atomics_helper+0x194a/0x5450
[   67.561705]  kasan_check_range+0x10c/0x1c0
[   67.561710]  __kasan_check_write+0x18/0x20
[   67.561714]  kasan_atomics_helper+0x194a/0x5450
[   67.561731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.561736]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.561740]  ? kasan_atomics+0x152/0x310
[   67.561744]  kasan_atomics+0x1dc/0x310
[   67.561747]  ? __pfx_kasan_atomics+0x10/0x10
[   67.561751]  ? ktime_get_ts64+0x83/0x230
[   67.561756]  kunit_try_run_case+0x1a2/0x480
[   67.561761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.561765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.561770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.561774]  ? __kthread_parkme+0x82/0x180
[   67.561779]  ? preempt_count_sub+0x50/0x80
[   67.561784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.561788]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.561793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.561797]  kthread+0x334/0x6f0
[   67.561801]  ? trace_preempt_on+0x20/0xc0
[   67.561805]  ? __pfx_kthread+0x10/0x10
[   67.561810]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.561814]  ? calculate_sigpending+0x7b/0xa0
[   67.561818]  ? __pfx_kthread+0x10/0x10
[   67.561823]  ret_from_fork+0x3e/0x80
[   67.561827]  ? __pfx_kthread+0x10/0x10
[   67.561831]  ret_from_fork_asm+0x1a/0x30
[   67.561837]  </TASK>
[   67.561839] 
[   67.742872] Allocated by task 308:
[   67.746281]  kasan_save_stack+0x45/0x70
[   67.750126]  kasan_save_track+0x18/0x40
[   67.753966]  kasan_save_alloc_info+0x3b/0x50
[   67.758237]  __kasan_kmalloc+0xb7/0xc0
[   67.761990]  __kmalloc_cache_noprof+0x189/0x420
[   67.766523]  kasan_atomics+0x95/0x310
[   67.770188]  kunit_try_run_case+0x1a2/0x480
[   67.774375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.779774]  kthread+0x334/0x6f0
[   67.783007]  ret_from_fork+0x3e/0x80
[   67.786587]  ret_from_fork_asm+0x1a/0x30
[   67.790520] 
[   67.792020] The buggy address belongs to the object at ffff8881061f7500
[   67.792020]  which belongs to the cache kmalloc-64 of size 64
[   67.804362] The buggy address is located 0 bytes to the right of
[   67.804362]  allocated 48-byte region [ffff8881061f7500, ffff8881061f7530)
[   67.817230] 
[   67.818745] The buggy address belongs to the physical page:
[   67.824319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f7
[   67.832326] flags: 0x200000000000000(node=0|zone=2)
[   67.837207] page_type: f5(slab)
[   67.840352] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.848090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.855830] page dumped because: kasan: bad access detected
[   67.861402] 
[   67.862902] Memory state around the buggy address:
[   67.867706]  ffff8881061f7400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.874949]  ffff8881061f7480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.882166] >ffff8881061f7500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.889384]                                      ^
[   67.894178]  ffff8881061f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.901398]  ffff8881061f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.908625] ==================================================================