Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   60.660209] ==================================================================
[   60.667273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   60.674650] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.682029] 
[   60.683510] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.683558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.683574] Hardware name: WinLink E850-96 board (DT)
[   60.683593] Call trace:
[   60.683606]  show_stack+0x20/0x38 (C)
[   60.683638]  dump_stack_lvl+0x8c/0xd0
[   60.683668]  print_report+0x118/0x608
[   60.683697]  kasan_report+0xdc/0x128
[   60.683725]  kasan_check_range+0x100/0x1a8
[   60.683755]  __kasan_check_write+0x20/0x30
[   60.683785]  kasan_atomics_helper+0x175c/0x4858
[   60.683815]  kasan_atomics+0x198/0x2e0
[   60.683843]  kunit_try_run_case+0x170/0x3f0
[   60.683873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.683912]  kthread+0x328/0x630
[   60.683941]  ret_from_fork+0x10/0x20
[   60.683976] 
[   60.753815] Allocated by task 312:
[   60.757203]  kasan_save_stack+0x3c/0x68
[   60.761020]  kasan_save_track+0x20/0x40
[   60.764840]  kasan_save_alloc_info+0x40/0x58
[   60.769094]  __kasan_kmalloc+0xd4/0xd8
[   60.772826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.777339]  kasan_atomics+0xb8/0x2e0
[   60.780985]  kunit_try_run_case+0x170/0x3f0
[   60.785152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.790621]  kthread+0x328/0x630
[   60.793832]  ret_from_fork+0x10/0x20
[   60.797391] 
[   60.798869] The buggy address belongs to the object at ffff000800c2d400
[   60.798869]  which belongs to the cache kmalloc-64 of size 64
[   60.811194] The buggy address is located 0 bytes to the right of
[   60.811194]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.824040] 
[   60.825516] The buggy address belongs to the physical page:
[   60.831072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.839059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.845568] page_type: f5(slab)
[   60.848700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.856425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.864144] page dumped because: kasan: bad access detected
[   60.869699] 
[   60.871175] Memory state around the buggy address:
[   60.875955]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.883158]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.890363] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.897564]                                      ^
[   60.902341]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.909546]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.916747] ==================================================================
[   49.357630] ==================================================================
[   49.364667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   49.371956] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.379333] 
[   49.380816] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.380862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.380877] Hardware name: WinLink E850-96 board (DT)
[   49.380897] Call trace:
[   49.380908]  show_stack+0x20/0x38 (C)
[   49.380941]  dump_stack_lvl+0x8c/0xd0
[   49.380975]  print_report+0x118/0x608
[   49.381003]  kasan_report+0xdc/0x128
[   49.381031]  kasan_check_range+0x100/0x1a8
[   49.381061]  __kasan_check_write+0x20/0x30
[   49.381094]  kasan_atomics_helper+0x894/0x4858
[   49.381123]  kasan_atomics+0x198/0x2e0
[   49.381149]  kunit_try_run_case+0x170/0x3f0
[   49.381184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.381221]  kthread+0x328/0x630
[   49.381251]  ret_from_fork+0x10/0x20
[   49.381283] 
[   49.451034] Allocated by task 312:
[   49.454421]  kasan_save_stack+0x3c/0x68
[   49.458239]  kasan_save_track+0x20/0x40
[   49.462058]  kasan_save_alloc_info+0x40/0x58
[   49.466312]  __kasan_kmalloc+0xd4/0xd8
[   49.470044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.474558]  kasan_atomics+0xb8/0x2e0
[   49.478204]  kunit_try_run_case+0x170/0x3f0
[   49.482370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.487839]  kthread+0x328/0x630
[   49.491051]  ret_from_fork+0x10/0x20
[   49.494610] 
[   49.496085] The buggy address belongs to the object at ffff000800c2d400
[   49.496085]  which belongs to the cache kmalloc-64 of size 64
[   49.508412] The buggy address is located 0 bytes to the right of
[   49.508412]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.521259] 
[   49.522735] The buggy address belongs to the physical page:
[   49.528291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.536279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.542786] page_type: f5(slab)
[   49.545919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.553643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.561362] page dumped because: kasan: bad access detected
[   49.566917] 
[   49.568393] Memory state around the buggy address:
[   49.573173]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.580376]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.587581] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.594782]                                      ^
[   49.599560]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.606764]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.613966] ==================================================================
[   49.093862] ==================================================================
[   49.100956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   49.108245] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.115623] 
[   49.117105] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.117149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.117166] Hardware name: WinLink E850-96 board (DT)
[   49.117183] Call trace:
[   49.117196]  show_stack+0x20/0x38 (C)
[   49.117226]  dump_stack_lvl+0x8c/0xd0
[   49.117257]  print_report+0x118/0x608
[   49.117287]  kasan_report+0xdc/0x128
[   49.117314]  kasan_check_range+0x100/0x1a8
[   49.117347]  __kasan_check_write+0x20/0x30
[   49.117380]  kasan_atomics_helper+0x7cc/0x4858
[   49.117407]  kasan_atomics+0x198/0x2e0
[   49.117434]  kunit_try_run_case+0x170/0x3f0
[   49.117468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.117504]  kthread+0x328/0x630
[   49.117535]  ret_from_fork+0x10/0x20
[   49.117566] 
[   49.187322] Allocated by task 312:
[   49.190709]  kasan_save_stack+0x3c/0x68
[   49.194528]  kasan_save_track+0x20/0x40
[   49.198347]  kasan_save_alloc_info+0x40/0x58
[   49.202600]  __kasan_kmalloc+0xd4/0xd8
[   49.206333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.210847]  kasan_atomics+0xb8/0x2e0
[   49.214493]  kunit_try_run_case+0x170/0x3f0
[   49.218659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.224127]  kthread+0x328/0x630
[   49.227339]  ret_from_fork+0x10/0x20
[   49.230899] 
[   49.232374] The buggy address belongs to the object at ffff000800c2d400
[   49.232374]  which belongs to the cache kmalloc-64 of size 64
[   49.244701] The buggy address is located 0 bytes to the right of
[   49.244701]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.257547] 
[   49.259023] The buggy address belongs to the physical page:
[   49.264580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.272567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.279075] page_type: f5(slab)
[   49.282208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.289932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.297651] page dumped because: kasan: bad access detected
[   49.303206] 
[   49.304682] Memory state around the buggy address:
[   49.309461]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.316665]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.323869] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.331071]                                      ^
[   49.335849]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.343053]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.350255] ==================================================================
[   44.353258] ==================================================================
[   44.367351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   44.374722] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.382013] 
[   44.383500] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.383554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.383570] Hardware name: WinLink E850-96 board (DT)
[   44.383594] Call trace:
[   44.383607]  show_stack+0x20/0x38 (C)
[   44.383640]  dump_stack_lvl+0x8c/0xd0
[   44.383678]  print_report+0x118/0x608
[   44.383712]  kasan_report+0xdc/0x128
[   44.383742]  __asan_report_load4_noabort+0x20/0x30
[   44.383779]  kasan_atomics_helper+0x40a8/0x4858
[   44.383810]  kasan_atomics+0x198/0x2e0
[   44.383840]  kunit_try_run_case+0x170/0x3f0
[   44.383878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.383918]  kthread+0x328/0x630
[   44.383956]  ret_from_fork+0x10/0x20
[   44.383993] 
[   44.450416] Allocated by task 312:
[   44.453803]  kasan_save_stack+0x3c/0x68
[   44.457621]  kasan_save_track+0x20/0x40
[   44.461440]  kasan_save_alloc_info+0x40/0x58
[   44.465692]  __kasan_kmalloc+0xd4/0xd8
[   44.469425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.473938]  kasan_atomics+0xb8/0x2e0
[   44.477584]  kunit_try_run_case+0x170/0x3f0
[   44.481751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.487221]  kthread+0x328/0x630
[   44.490431]  ret_from_fork+0x10/0x20
[   44.493990] 
[   44.495469] The buggy address belongs to the object at ffff000800c2d400
[   44.495469]  which belongs to the cache kmalloc-64 of size 64
[   44.507795] The buggy address is located 0 bytes to the right of
[   44.507795]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   44.520639] 
[   44.522117] The buggy address belongs to the physical page:
[   44.527675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   44.535660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.542169] page_type: f5(slab)
[   44.545309] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.553024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.560745] page dumped because: kasan: bad access detected
[   44.566300] 
[   44.567774] Memory state around the buggy address:
[   44.572556]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.579757]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.586963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.594162]                                      ^
[   44.598941]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.606145]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.613348] ==================================================================
[   46.984209] ==================================================================
[   46.991263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   46.998554] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.005932] 
[   47.007415] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.007459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.007476] Hardware name: WinLink E850-96 board (DT)
[   47.007497] Call trace:
[   47.007511]  show_stack+0x20/0x38 (C)
[   47.007542]  dump_stack_lvl+0x8c/0xd0
[   47.007574]  print_report+0x118/0x608
[   47.007603]  kasan_report+0xdc/0x128
[   47.007631]  kasan_check_range+0x100/0x1a8
[   47.007664]  __kasan_check_write+0x20/0x30
[   47.007696]  kasan_atomics_helper+0x47c/0x4858
[   47.007724]  kasan_atomics+0x198/0x2e0
[   47.007752]  kunit_try_run_case+0x170/0x3f0
[   47.007784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.007822]  kthread+0x328/0x630
[   47.007855]  ret_from_fork+0x10/0x20
[   47.007889] 
[   47.077632] Allocated by task 312:
[   47.081020]  kasan_save_stack+0x3c/0x68
[   47.084837]  kasan_save_track+0x20/0x40
[   47.088656]  kasan_save_alloc_info+0x40/0x58
[   47.092910]  __kasan_kmalloc+0xd4/0xd8
[   47.096642]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.101156]  kasan_atomics+0xb8/0x2e0
[   47.104802]  kunit_try_run_case+0x170/0x3f0
[   47.108969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.114437]  kthread+0x328/0x630
[   47.117649]  ret_from_fork+0x10/0x20
[   47.121208] 
[   47.122686] The buggy address belongs to the object at ffff000800c2d400
[   47.122686]  which belongs to the cache kmalloc-64 of size 64
[   47.135010] The buggy address is located 0 bytes to the right of
[   47.135010]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.147857] 
[   47.149333] The buggy address belongs to the physical page:
[   47.154890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.162876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.169385] page_type: f5(slab)
[   47.172518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.180241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.187960] page dumped because: kasan: bad access detected
[   47.193516] 
[   47.194991] Memory state around the buggy address:
[   47.199771]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.206974]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.214179] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.221380]                                      ^
[   47.226158]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.233362]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.240564] ==================================================================
[   48.830174] ==================================================================
[   48.837243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   48.844533] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.851911] 
[   48.853393] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.853441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.853458] Hardware name: WinLink E850-96 board (DT)
[   48.853477] Call trace:
[   48.853488]  show_stack+0x20/0x38 (C)
[   48.853520]  dump_stack_lvl+0x8c/0xd0
[   48.853553]  print_report+0x118/0x608
[   48.853581]  kasan_report+0xdc/0x128
[   48.853609]  kasan_check_range+0x100/0x1a8
[   48.853639]  __kasan_check_write+0x20/0x30
[   48.853671]  kasan_atomics_helper+0x760/0x4858
[   48.853702]  kasan_atomics+0x198/0x2e0
[   48.853730]  kunit_try_run_case+0x170/0x3f0
[   48.853763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.853801]  kthread+0x328/0x630
[   48.853831]  ret_from_fork+0x10/0x20
[   48.853864] 
[   48.923612] Allocated by task 312:
[   48.926997]  kasan_save_stack+0x3c/0x68
[   48.930816]  kasan_save_track+0x20/0x40
[   48.934635]  kasan_save_alloc_info+0x40/0x58
[   48.938889]  __kasan_kmalloc+0xd4/0xd8
[   48.942622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.947135]  kasan_atomics+0xb8/0x2e0
[   48.950781]  kunit_try_run_case+0x170/0x3f0
[   48.954948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.960416]  kthread+0x328/0x630
[   48.963628]  ret_from_fork+0x10/0x20
[   48.967187] 
[   48.968663] The buggy address belongs to the object at ffff000800c2d400
[   48.968663]  which belongs to the cache kmalloc-64 of size 64
[   48.980989] The buggy address is located 0 bytes to the right of
[   48.980989]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.993836] 
[   48.995314] The buggy address belongs to the physical page:
[   49.000871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.015363] page_type: f5(slab)
[   49.018496] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.026221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.033940] page dumped because: kasan: bad access detected
[   49.039495] 
[   49.040971] Memory state around the buggy address:
[   49.045749]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.052954]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.060158] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.067359]                                      ^
[   49.072137]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.079342]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.086543] ==================================================================
[   55.396540] ==================================================================
[   55.403637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   55.410927] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.418306] 
[   55.419788] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.419835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.419854] Hardware name: WinLink E850-96 board (DT)
[   55.419873] Call trace:
[   55.419886]  show_stack+0x20/0x38 (C)
[   55.419916]  dump_stack_lvl+0x8c/0xd0
[   55.419948]  print_report+0x118/0x608
[   55.419976]  kasan_report+0xdc/0x128
[   55.420006]  kasan_check_range+0x100/0x1a8
[   55.420037]  __kasan_check_write+0x20/0x30
[   55.420072]  kasan_atomics_helper+0xff0/0x4858
[   55.420100]  kasan_atomics+0x198/0x2e0
[   55.420128]  kunit_try_run_case+0x170/0x3f0
[   55.420162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.420199]  kthread+0x328/0x630
[   55.420231]  ret_from_fork+0x10/0x20
[   55.420262] 
[   55.490006] Allocated by task 312:
[   55.493393]  kasan_save_stack+0x3c/0x68
[   55.497211]  kasan_save_track+0x20/0x40
[   55.501030]  kasan_save_alloc_info+0x40/0x58
[   55.505283]  __kasan_kmalloc+0xd4/0xd8
[   55.509016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.513530]  kasan_atomics+0xb8/0x2e0
[   55.517175]  kunit_try_run_case+0x170/0x3f0
[   55.521342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.526811]  kthread+0x328/0x630
[   55.530023]  ret_from_fork+0x10/0x20
[   55.533582] 
[   55.535057] The buggy address belongs to the object at ffff000800c2d400
[   55.535057]  which belongs to the cache kmalloc-64 of size 64
[   55.547384] The buggy address is located 0 bytes to the right of
[   55.547384]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.560230] 
[   55.561706] The buggy address belongs to the physical page:
[   55.567263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.575250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.581759] page_type: f5(slab)
[   55.584892] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.592615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.600334] page dumped because: kasan: bad access detected
[   55.605889] 
[   55.607365] Memory state around the buggy address:
[   55.612143]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.619348]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.626552] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.633754]                                      ^
[   55.638532]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.645736]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.652938] ==================================================================
[   45.672021] ==================================================================
[   45.679133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   45.686508] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.693799] 
[   45.695284] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.695332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.695348] Hardware name: WinLink E850-96 board (DT)
[   45.695371] Call trace:
[   45.695386]  show_stack+0x20/0x38 (C)
[   45.695418]  dump_stack_lvl+0x8c/0xd0
[   45.695453]  print_report+0x118/0x608
[   45.695484]  kasan_report+0xdc/0x128
[   45.695512]  __asan_report_load4_noabort+0x20/0x30
[   45.695547]  kasan_atomics_helper+0x40fc/0x4858
[   45.695576]  kasan_atomics+0x198/0x2e0
[   45.695606]  kunit_try_run_case+0x170/0x3f0
[   45.695641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.695677]  kthread+0x328/0x630
[   45.695708]  ret_from_fork+0x10/0x20
[   45.695741] 
[   45.762200] Allocated by task 312:
[   45.765586]  kasan_save_stack+0x3c/0x68
[   45.769406]  kasan_save_track+0x20/0x40
[   45.773225]  kasan_save_alloc_info+0x40/0x58
[   45.777478]  __kasan_kmalloc+0xd4/0xd8
[   45.781211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.785724]  kasan_atomics+0xb8/0x2e0
[   45.789370]  kunit_try_run_case+0x170/0x3f0
[   45.793537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.799006]  kthread+0x328/0x630
[   45.802217]  ret_from_fork+0x10/0x20
[   45.805776] 
[   45.807253] The buggy address belongs to the object at ffff000800c2d400
[   45.807253]  which belongs to the cache kmalloc-64 of size 64
[   45.819579] The buggy address is located 0 bytes to the right of
[   45.819579]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.832425] 
[   45.833902] The buggy address belongs to the physical page:
[   45.839460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.847445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.853952] page_type: f5(slab)
[   45.857088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.864810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.872528] page dumped because: kasan: bad access detected
[   45.878085] 
[   45.879560] Memory state around the buggy address:
[   45.884339]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.891542]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.898747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.905948]                                      ^
[   45.910726]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.917931]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.925132] ==================================================================
[   55.660301] ==================================================================
[   55.667349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   55.674726] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.682104] 
[   55.683585] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.683632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.683646] Hardware name: WinLink E850-96 board (DT)
[   55.683665] Call trace:
[   55.683677]  show_stack+0x20/0x38 (C)
[   55.683706]  dump_stack_lvl+0x8c/0xd0
[   55.683738]  print_report+0x118/0x608
[   55.683765]  kasan_report+0xdc/0x128
[   55.683793]  kasan_check_range+0x100/0x1a8
[   55.683823]  __kasan_check_write+0x20/0x30
[   55.683853]  kasan_atomics_helper+0x1058/0x4858
[   55.683882]  kasan_atomics+0x198/0x2e0
[   55.683909]  kunit_try_run_case+0x170/0x3f0
[   55.683943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.683981]  kthread+0x328/0x630
[   55.684013]  ret_from_fork+0x10/0x20
[   55.684045] 
[   55.753891] Allocated by task 312:
[   55.757278]  kasan_save_stack+0x3c/0x68
[   55.761096]  kasan_save_track+0x20/0x40
[   55.764915]  kasan_save_alloc_info+0x40/0x58
[   55.769169]  __kasan_kmalloc+0xd4/0xd8
[   55.772901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.777415]  kasan_atomics+0xb8/0x2e0
[   55.781061]  kunit_try_run_case+0x170/0x3f0
[   55.785227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.790696]  kthread+0x328/0x630
[   55.793908]  ret_from_fork+0x10/0x20
[   55.797466] 
[   55.798943] The buggy address belongs to the object at ffff000800c2d400
[   55.798943]  which belongs to the cache kmalloc-64 of size 64
[   55.811269] The buggy address is located 0 bytes to the right of
[   55.811269]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.824115] 
[   55.825591] The buggy address belongs to the physical page:
[   55.831149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.839136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.845643] page_type: f5(slab)
[   55.848776] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.856500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.864219] page dumped because: kasan: bad access detected
[   55.869774] 
[   55.871250] Memory state around the buggy address:
[   55.876030]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.883233]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.890437] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.897639]                                      ^
[   55.902417]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.909621]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.916822] ==================================================================
[   55.924168] ==================================================================
[   55.931234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   55.938611] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.945989] 
[   55.947472] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.947517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.947535] Hardware name: WinLink E850-96 board (DT)
[   55.947553] Call trace:
[   55.947565]  show_stack+0x20/0x38 (C)
[   55.947596]  dump_stack_lvl+0x8c/0xd0
[   55.947630]  print_report+0x118/0x608
[   55.947658]  kasan_report+0xdc/0x128
[   55.947686]  kasan_check_range+0x100/0x1a8
[   55.947718]  __kasan_check_write+0x20/0x30
[   55.947749]  kasan_atomics_helper+0x10c0/0x4858
[   55.947779]  kasan_atomics+0x198/0x2e0
[   55.947807]  kunit_try_run_case+0x170/0x3f0
[   55.947840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.947876]  kthread+0x328/0x630
[   55.947908]  ret_from_fork+0x10/0x20
[   55.947940] 
[   56.017776] Allocated by task 312:
[   56.021163]  kasan_save_stack+0x3c/0x68
[   56.024981]  kasan_save_track+0x20/0x40
[   56.028800]  kasan_save_alloc_info+0x40/0x58
[   56.033054]  __kasan_kmalloc+0xd4/0xd8
[   56.036786]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.041300]  kasan_atomics+0xb8/0x2e0
[   56.044945]  kunit_try_run_case+0x170/0x3f0
[   56.049112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.054581]  kthread+0x328/0x630
[   56.057793]  ret_from_fork+0x10/0x20
[   56.061351] 
[   56.062827] The buggy address belongs to the object at ffff000800c2d400
[   56.062827]  which belongs to the cache kmalloc-64 of size 64
[   56.075154] The buggy address is located 0 bytes to the right of
[   56.075154]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.088000] 
[   56.089476] The buggy address belongs to the physical page:
[   56.095032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.103021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.109529] page_type: f5(slab)
[   56.112662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.120385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.128104] page dumped because: kasan: bad access detected
[   56.133659] 
[   56.135135] Memory state around the buggy address:
[   56.139915]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.147118]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.154322] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.161524]                                      ^
[   56.166302]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.173506]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.180707] ==================================================================
[   46.196236] ==================================================================
[   46.203256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   46.210632] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.218010] 
[   46.219492] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.219541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.219559] Hardware name: WinLink E850-96 board (DT)
[   46.219579] Call trace:
[   46.219593]  show_stack+0x20/0x38 (C)
[   46.219629]  dump_stack_lvl+0x8c/0xd0
[   46.219661]  print_report+0x118/0x608
[   46.219694]  kasan_report+0xdc/0x128
[   46.219722]  __asan_report_store4_noabort+0x20/0x30
[   46.219754]  kasan_atomics_helper+0x3f94/0x4858
[   46.219785]  kasan_atomics+0x198/0x2e0
[   46.219813]  kunit_try_run_case+0x170/0x3f0
[   46.219846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.219883]  kthread+0x328/0x630
[   46.219913]  ret_from_fork+0x10/0x20
[   46.219945] 
[   46.286500] Allocated by task 312:
[   46.289884]  kasan_save_stack+0x3c/0x68
[   46.293703]  kasan_save_track+0x20/0x40
[   46.297523]  kasan_save_alloc_info+0x40/0x58
[   46.301776]  __kasan_kmalloc+0xd4/0xd8
[   46.305508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.310022]  kasan_atomics+0xb8/0x2e0
[   46.313668]  kunit_try_run_case+0x170/0x3f0
[   46.317835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.323303]  kthread+0x328/0x630
[   46.326515]  ret_from_fork+0x10/0x20
[   46.330074] 
[   46.331551] The buggy address belongs to the object at ffff000800c2d400
[   46.331551]  which belongs to the cache kmalloc-64 of size 64
[   46.343876] The buggy address is located 0 bytes to the right of
[   46.343876]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.356723] 
[   46.358200] The buggy address belongs to the physical page:
[   46.363758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.371742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.378250] page_type: f5(slab)
[   46.381383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.389107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.396826] page dumped because: kasan: bad access detected
[   46.402382] 
[   46.403857] Memory state around the buggy address:
[   46.408635]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.415840]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.423045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.430246]                                      ^
[   46.435024]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.442229]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.449430] ==================================================================
[   53.820699] ==================================================================
[   53.827794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.835170] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.842461] 
[   53.843943] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.843992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.844007] Hardware name: WinLink E850-96 board (DT)
[   53.844025] Call trace:
[   53.844037]  show_stack+0x20/0x38 (C)
[   53.844067]  dump_stack_lvl+0x8c/0xd0
[   53.844096]  print_report+0x118/0x608
[   53.844128]  kasan_report+0xdc/0x128
[   53.844158]  __asan_report_load8_noabort+0x20/0x30
[   53.844190]  kasan_atomics_helper+0x3f58/0x4858
[   53.844219]  kasan_atomics+0x198/0x2e0
[   53.844247]  kunit_try_run_case+0x170/0x3f0
[   53.844281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.844320]  kthread+0x328/0x630
[   53.844352]  ret_from_fork+0x10/0x20
[   53.844385] 
[   53.910863] Allocated by task 312:
[   53.914250]  kasan_save_stack+0x3c/0x68
[   53.918067]  kasan_save_track+0x20/0x40
[   53.921887]  kasan_save_alloc_info+0x40/0x58
[   53.926141]  __kasan_kmalloc+0xd4/0xd8
[   53.929873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.934387]  kasan_atomics+0xb8/0x2e0
[   53.938033]  kunit_try_run_case+0x170/0x3f0
[   53.942199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.947668]  kthread+0x328/0x630
[   53.950879]  ret_from_fork+0x10/0x20
[   53.954439] 
[   53.955914] The buggy address belongs to the object at ffff000800c2d400
[   53.955914]  which belongs to the cache kmalloc-64 of size 64
[   53.968241] The buggy address is located 0 bytes to the right of
[   53.968241]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.981087] 
[   53.982564] The buggy address belongs to the physical page:
[   53.988120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.996107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.002615] page_type: f5(slab)
[   54.005748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.013472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.021193] page dumped because: kasan: bad access detected
[   54.026746] 
[   54.028222] Memory state around the buggy address:
[   54.033000]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.040205]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.047410] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.054611]                                      ^
[   54.059388]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.066593]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.073794] ==================================================================
[   47.247916] ==================================================================
[   47.254976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   47.262265] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.269643] 
[   47.271126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.271173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.271192] Hardware name: WinLink E850-96 board (DT)
[   47.271212] Call trace:
[   47.271225]  show_stack+0x20/0x38 (C)
[   47.271257]  dump_stack_lvl+0x8c/0xd0
[   47.271290]  print_report+0x118/0x608
[   47.271319]  kasan_report+0xdc/0x128
[   47.271347]  kasan_check_range+0x100/0x1a8
[   47.271381]  __kasan_check_write+0x20/0x30
[   47.271414]  kasan_atomics_helper+0x4e4/0x4858
[   47.271443]  kasan_atomics+0x198/0x2e0
[   47.271471]  kunit_try_run_case+0x170/0x3f0
[   47.271505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.271541]  kthread+0x328/0x630
[   47.271573]  ret_from_fork+0x10/0x20
[   47.271605] 
[   47.341344] Allocated by task 312:
[   47.344731]  kasan_save_stack+0x3c/0x68
[   47.348548]  kasan_save_track+0x20/0x40
[   47.352368]  kasan_save_alloc_info+0x40/0x58
[   47.356621]  __kasan_kmalloc+0xd4/0xd8
[   47.360354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.364868]  kasan_atomics+0xb8/0x2e0
[   47.368513]  kunit_try_run_case+0x170/0x3f0
[   47.372680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.378148]  kthread+0x328/0x630
[   47.381360]  ret_from_fork+0x10/0x20
[   47.384919] 
[   47.386395] The buggy address belongs to the object at ffff000800c2d400
[   47.386395]  which belongs to the cache kmalloc-64 of size 64
[   47.398722] The buggy address is located 0 bytes to the right of
[   47.398722]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.411568] 
[   47.413044] The buggy address belongs to the physical page:
[   47.418600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.426589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.433096] page_type: f5(slab)
[   47.436230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.443953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.451672] page dumped because: kasan: bad access detected
[   47.457227] 
[   47.458703] Memory state around the buggy address:
[   47.463481]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.470686]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.477890] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.485091]                                      ^
[   47.489869]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.497074]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.504275] ==================================================================
[   48.039046] ==================================================================
[   48.046110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   48.053399] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.060777] 
[   48.062258] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.062307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.062324] Hardware name: WinLink E850-96 board (DT)
[   48.062343] Call trace:
[   48.062358]  show_stack+0x20/0x38 (C)
[   48.062389]  dump_stack_lvl+0x8c/0xd0
[   48.062421]  print_report+0x118/0x608
[   48.062451]  kasan_report+0xdc/0x128
[   48.062479]  kasan_check_range+0x100/0x1a8
[   48.062510]  __kasan_check_write+0x20/0x30
[   48.062543]  kasan_atomics_helper+0x61c/0x4858
[   48.062571]  kasan_atomics+0x198/0x2e0
[   48.062598]  kunit_try_run_case+0x170/0x3f0
[   48.062632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.062670]  kthread+0x328/0x630
[   48.062702]  ret_from_fork+0x10/0x20
[   48.062733] 
[   48.132477] Allocated by task 312:
[   48.135864]  kasan_save_stack+0x3c/0x68
[   48.139682]  kasan_save_track+0x20/0x40
[   48.143502]  kasan_save_alloc_info+0x40/0x58
[   48.147755]  __kasan_kmalloc+0xd4/0xd8
[   48.151488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.156001]  kasan_atomics+0xb8/0x2e0
[   48.159647]  kunit_try_run_case+0x170/0x3f0
[   48.163814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.169282]  kthread+0x328/0x630
[   48.172494]  ret_from_fork+0x10/0x20
[   48.176053] 
[   48.177529] The buggy address belongs to the object at ffff000800c2d400
[   48.177529]  which belongs to the cache kmalloc-64 of size 64
[   48.189855] The buggy address is located 0 bytes to the right of
[   48.189855]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.202702] 
[   48.204178] The buggy address belongs to the physical page:
[   48.209734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.217721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.224229] page_type: f5(slab)
[   48.227362] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.235087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.242806] page dumped because: kasan: bad access detected
[   48.248361] 
[   48.249837] Memory state around the buggy address:
[   48.254615]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.261820]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.269024] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.276225]                                      ^
[   48.281003]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.288208]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.295409] ==================================================================
[   56.979677] ==================================================================
[   56.986775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   56.994150] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.001528] 
[   57.003012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.003058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.003077] Hardware name: WinLink E850-96 board (DT)
[   57.003096] Call trace:
[   57.003109]  show_stack+0x20/0x38 (C)
[   57.003140]  dump_stack_lvl+0x8c/0xd0
[   57.003171]  print_report+0x118/0x608
[   57.003201]  kasan_report+0xdc/0x128
[   57.003228]  kasan_check_range+0x100/0x1a8
[   57.003259]  __kasan_check_write+0x20/0x30
[   57.003290]  kasan_atomics_helper+0x126c/0x4858
[   57.003318]  kasan_atomics+0x198/0x2e0
[   57.003345]  kunit_try_run_case+0x170/0x3f0
[   57.003378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.003416]  kthread+0x328/0x630
[   57.003448]  ret_from_fork+0x10/0x20
[   57.003482] 
[   57.073315] Allocated by task 312:
[   57.076702]  kasan_save_stack+0x3c/0x68
[   57.080520]  kasan_save_track+0x20/0x40
[   57.084340]  kasan_save_alloc_info+0x40/0x58
[   57.088593]  __kasan_kmalloc+0xd4/0xd8
[   57.092326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.096840]  kasan_atomics+0xb8/0x2e0
[   57.100485]  kunit_try_run_case+0x170/0x3f0
[   57.104652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.110120]  kthread+0x328/0x630
[   57.113332]  ret_from_fork+0x10/0x20
[   57.116891] 
[   57.118367] The buggy address belongs to the object at ffff000800c2d400
[   57.118367]  which belongs to the cache kmalloc-64 of size 64
[   57.130693] The buggy address is located 0 bytes to the right of
[   57.130693]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.143540] 
[   57.145016] The buggy address belongs to the physical page:
[   57.150575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.158559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.165069] page_type: f5(slab)
[   57.168200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.175924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.183644] page dumped because: kasan: bad access detected
[   57.189199] 
[   57.190674] Memory state around the buggy address:
[   57.195454]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.202657]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.209862] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.217063]                                      ^
[   57.221841]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.229046]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.236247] ==================================================================
[   57.771386] ==================================================================
[   57.778429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   57.785805] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.793096] 
[   57.794579] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.794627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.794642] Hardware name: WinLink E850-96 board (DT)
[   57.794664] Call trace:
[   57.794677]  show_stack+0x20/0x38 (C)
[   57.794707]  dump_stack_lvl+0x8c/0xd0
[   57.794739]  print_report+0x118/0x608
[   57.794766]  kasan_report+0xdc/0x128
[   57.794794]  __asan_report_load8_noabort+0x20/0x30
[   57.794829]  kasan_atomics_helper+0x3f04/0x4858
[   57.794858]  kasan_atomics+0x198/0x2e0
[   57.794885]  kunit_try_run_case+0x170/0x3f0
[   57.794917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.794956]  kthread+0x328/0x630
[   57.794992]  ret_from_fork+0x10/0x20
[   57.795024] 
[   57.861498] Allocated by task 312:
[   57.864885]  kasan_save_stack+0x3c/0x68
[   57.868703]  kasan_save_track+0x20/0x40
[   57.872522]  kasan_save_alloc_info+0x40/0x58
[   57.876776]  __kasan_kmalloc+0xd4/0xd8
[   57.880508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.885022]  kasan_atomics+0xb8/0x2e0
[   57.888667]  kunit_try_run_case+0x170/0x3f0
[   57.892834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.898303]  kthread+0x328/0x630
[   57.901515]  ret_from_fork+0x10/0x20
[   57.905074] 
[   57.906549] The buggy address belongs to the object at ffff000800c2d400
[   57.906549]  which belongs to the cache kmalloc-64 of size 64
[   57.918876] The buggy address is located 0 bytes to the right of
[   57.918876]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.931722] 
[   57.933200] The buggy address belongs to the physical page:
[   57.938754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.946742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.953250] page_type: f5(slab)
[   57.956383] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.964107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.971826] page dumped because: kasan: bad access detected
[   57.977382] 
[   57.978857] Memory state around the buggy address:
[   57.983637]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.990840]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.998045] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.005246]                                      ^
[   58.010024]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.017229]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.024430] ==================================================================
[   60.924118] ==================================================================
[   60.931158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   60.938535] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.945827] 
[   60.947309] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.947358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.947374] Hardware name: WinLink E850-96 board (DT)
[   60.947393] Call trace:
[   60.947406]  show_stack+0x20/0x38 (C)
[   60.947438]  dump_stack_lvl+0x8c/0xd0
[   60.947470]  print_report+0x118/0x608
[   60.947498]  kasan_report+0xdc/0x128
[   60.947526]  __asan_report_load8_noabort+0x20/0x30
[   60.947560]  kasan_atomics_helper+0x3e20/0x4858
[   60.947591]  kasan_atomics+0x198/0x2e0
[   60.947618]  kunit_try_run_case+0x170/0x3f0
[   60.947651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.947690]  kthread+0x328/0x630
[   60.947722]  ret_from_fork+0x10/0x20
[   60.947757] 
[   61.014229] Allocated by task 312:
[   61.017616]  kasan_save_stack+0x3c/0x68
[   61.021433]  kasan_save_track+0x20/0x40
[   61.025253]  kasan_save_alloc_info+0x40/0x58
[   61.029506]  __kasan_kmalloc+0xd4/0xd8
[   61.033239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.037753]  kasan_atomics+0xb8/0x2e0
[   61.041398]  kunit_try_run_case+0x170/0x3f0
[   61.045565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.051033]  kthread+0x328/0x630
[   61.054245]  ret_from_fork+0x10/0x20
[   61.057805] 
[   61.059280] The buggy address belongs to the object at ffff000800c2d400
[   61.059280]  which belongs to the cache kmalloc-64 of size 64
[   61.071607] The buggy address is located 0 bytes to the right of
[   61.071607]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   61.084453] 
[   61.085929] The buggy address belongs to the physical page:
[   61.091485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   61.099472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.105980] page_type: f5(slab)
[   61.109115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.116838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.124557] page dumped because: kasan: bad access detected
[   61.130112] 
[   61.131588] Memory state around the buggy address:
[   61.136367]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.143571]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.150775] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.157976]                                      ^
[   61.162754]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.169959]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.177160] ==================================================================
[   52.248527] ==================================================================
[   52.255594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   52.262971] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.270262] 
[   52.271746] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.271793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.271810] Hardware name: WinLink E850-96 board (DT)
[   52.271829] Call trace:
[   52.271843]  show_stack+0x20/0x38 (C)
[   52.271873]  dump_stack_lvl+0x8c/0xd0
[   52.271904]  print_report+0x118/0x608
[   52.271935]  kasan_report+0xdc/0x128
[   52.271964]  __asan_report_load4_noabort+0x20/0x30
[   52.271998]  kasan_atomics_helper+0x3de4/0x4858
[   52.272028]  kasan_atomics+0x198/0x2e0
[   52.272058]  kunit_try_run_case+0x170/0x3f0
[   52.272092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.272131]  kthread+0x328/0x630
[   52.272161]  ret_from_fork+0x10/0x20
[   52.272191] 
[   52.338664] Allocated by task 312:
[   52.342051]  kasan_save_stack+0x3c/0x68
[   52.345869]  kasan_save_track+0x20/0x40
[   52.349689]  kasan_save_alloc_info+0x40/0x58
[   52.353942]  __kasan_kmalloc+0xd4/0xd8
[   52.357674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.362188]  kasan_atomics+0xb8/0x2e0
[   52.365834]  kunit_try_run_case+0x170/0x3f0
[   52.370001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.375469]  kthread+0x328/0x630
[   52.378681]  ret_from_fork+0x10/0x20
[   52.382240] 
[   52.383716] The buggy address belongs to the object at ffff000800c2d400
[   52.383716]  which belongs to the cache kmalloc-64 of size 64
[   52.396042] The buggy address is located 0 bytes to the right of
[   52.396042]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.408889] 
[   52.410365] The buggy address belongs to the physical page:
[   52.415921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.423908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.430416] page_type: f5(slab)
[   52.433549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.441274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.448993] page dumped because: kasan: bad access detected
[   52.454548] 
[   52.456023] Memory state around the buggy address:
[   52.460803]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.468006]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.475211] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.482412]                                      ^
[   52.487190]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.494395]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.501596] ==================================================================
[   51.984792] ==================================================================
[   51.991883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   51.999173] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.006551] 
[   52.008034] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.008084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.008099] Hardware name: WinLink E850-96 board (DT)
[   52.008117] Call trace:
[   52.008130]  show_stack+0x20/0x38 (C)
[   52.008161]  dump_stack_lvl+0x8c/0xd0
[   52.008193]  print_report+0x118/0x608
[   52.008222]  kasan_report+0xdc/0x128
[   52.008252]  kasan_check_range+0x100/0x1a8
[   52.008284]  __kasan_check_write+0x20/0x30
[   52.008314]  kasan_atomics_helper+0xc08/0x4858
[   52.008343]  kasan_atomics+0x198/0x2e0
[   52.008372]  kunit_try_run_case+0x170/0x3f0
[   52.008406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.008444]  kthread+0x328/0x630
[   52.008475]  ret_from_fork+0x10/0x20
[   52.008507] 
[   52.078251] Allocated by task 312:
[   52.081639]  kasan_save_stack+0x3c/0x68
[   52.085456]  kasan_save_track+0x20/0x40
[   52.089276]  kasan_save_alloc_info+0x40/0x58
[   52.093529]  __kasan_kmalloc+0xd4/0xd8
[   52.097262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.101776]  kasan_atomics+0xb8/0x2e0
[   52.105421]  kunit_try_run_case+0x170/0x3f0
[   52.109588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.115056]  kthread+0x328/0x630
[   52.118268]  ret_from_fork+0x10/0x20
[   52.121827] 
[   52.123303] The buggy address belongs to the object at ffff000800c2d400
[   52.123303]  which belongs to the cache kmalloc-64 of size 64
[   52.135629] The buggy address is located 0 bytes to the right of
[   52.135629]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.148476] 
[   52.149952] The buggy address belongs to the physical page:
[   52.155508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.163495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.170004] page_type: f5(slab)
[   52.173138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.180861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.188580] page dumped because: kasan: bad access detected
[   52.194135] 
[   52.195611] Memory state around the buggy address:
[   52.200390]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.207593]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.214798] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.221999]                                      ^
[   52.226777]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.233982]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.241183] ==================================================================
[   58.295653] ==================================================================
[   58.302726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   58.310103] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.317481] 
[   58.318964] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.319011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.319025] Hardware name: WinLink E850-96 board (DT)
[   58.319042] Call trace:
[   58.319056]  show_stack+0x20/0x38 (C)
[   58.319085]  dump_stack_lvl+0x8c/0xd0
[   58.319116]  print_report+0x118/0x608
[   58.319145]  kasan_report+0xdc/0x128
[   58.319172]  kasan_check_range+0x100/0x1a8
[   58.319203]  __kasan_check_write+0x20/0x30
[   58.319234]  kasan_atomics_helper+0x147c/0x4858
[   58.319264]  kasan_atomics+0x198/0x2e0
[   58.319290]  kunit_try_run_case+0x170/0x3f0
[   58.319323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.319361]  kthread+0x328/0x630
[   58.319392]  ret_from_fork+0x10/0x20
[   58.319427] 
[   58.389268] Allocated by task 312:
[   58.392655]  kasan_save_stack+0x3c/0x68
[   58.396473]  kasan_save_track+0x20/0x40
[   58.400292]  kasan_save_alloc_info+0x40/0x58
[   58.404545]  __kasan_kmalloc+0xd4/0xd8
[   58.408278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.412792]  kasan_atomics+0xb8/0x2e0
[   58.416437]  kunit_try_run_case+0x170/0x3f0
[   58.420604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.426073]  kthread+0x328/0x630
[   58.429285]  ret_from_fork+0x10/0x20
[   58.432844] 
[   58.434319] The buggy address belongs to the object at ffff000800c2d400
[   58.434319]  which belongs to the cache kmalloc-64 of size 64
[   58.446646] The buggy address is located 0 bytes to the right of
[   58.446646]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.459492] 
[   58.460969] The buggy address belongs to the physical page:
[   58.466525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.474511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.481020] page_type: f5(slab)
[   58.484154] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.491877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.499596] page dumped because: kasan: bad access detected
[   58.505151] 
[   58.506627] Memory state around the buggy address:
[   58.511406]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.518610]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.525815] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.533016]                                      ^
[   58.537794]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.544998]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.552200] ==================================================================
[   51.200308] ==================================================================
[   51.207346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   51.214723] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.222014] 
[   51.223497] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.223549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.223563] Hardware name: WinLink E850-96 board (DT)
[   51.223584] Call trace:
[   51.223597]  show_stack+0x20/0x38 (C)
[   51.223626]  dump_stack_lvl+0x8c/0xd0
[   51.223660]  print_report+0x118/0x608
[   51.223691]  kasan_report+0xdc/0x128
[   51.223720]  __asan_report_load4_noabort+0x20/0x30
[   51.223753]  kasan_atomics_helper+0x3dcc/0x4858
[   51.223785]  kasan_atomics+0x198/0x2e0
[   51.223811]  kunit_try_run_case+0x170/0x3f0
[   51.223844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.223883]  kthread+0x328/0x630
[   51.223916]  ret_from_fork+0x10/0x20
[   51.223948] 
[   51.290416] Allocated by task 312:
[   51.293803]  kasan_save_stack+0x3c/0x68
[   51.297621]  kasan_save_track+0x20/0x40
[   51.301440]  kasan_save_alloc_info+0x40/0x58
[   51.305694]  __kasan_kmalloc+0xd4/0xd8
[   51.309426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.313940]  kasan_atomics+0xb8/0x2e0
[   51.317586]  kunit_try_run_case+0x170/0x3f0
[   51.321752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.327221]  kthread+0x328/0x630
[   51.330433]  ret_from_fork+0x10/0x20
[   51.333992] 
[   51.335467] The buggy address belongs to the object at ffff000800c2d400
[   51.335467]  which belongs to the cache kmalloc-64 of size 64
[   51.347794] The buggy address is located 0 bytes to the right of
[   51.347794]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.360641] 
[   51.362117] The buggy address belongs to the physical page:
[   51.367672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.375660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.382168] page_type: f5(slab)
[   51.385304] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.393025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.400744] page dumped because: kasan: bad access detected
[   51.406300] 
[   51.407776] Memory state around the buggy address:
[   51.412555]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.419758]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.426963] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.434164]                                      ^
[   51.438942]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.446147]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.453348] ==================================================================
[   51.460695] ==================================================================
[   51.467759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   51.475049] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.482427] 
[   51.483910] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.483961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.483977] Hardware name: WinLink E850-96 board (DT)
[   51.483996] Call trace:
[   51.484010]  show_stack+0x20/0x38 (C)
[   51.484042]  dump_stack_lvl+0x8c/0xd0
[   51.484071]  print_report+0x118/0x608
[   51.484100]  kasan_report+0xdc/0x128
[   51.484128]  kasan_check_range+0x100/0x1a8
[   51.484159]  __kasan_check_write+0x20/0x30
[   51.484191]  kasan_atomics_helper+0xb70/0x4858
[   51.484221]  kasan_atomics+0x198/0x2e0
[   51.484249]  kunit_try_run_case+0x170/0x3f0
[   51.484283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.484322]  kthread+0x328/0x630
[   51.484353]  ret_from_fork+0x10/0x20
[   51.484386] 
[   51.554127] Allocated by task 312:
[   51.557515]  kasan_save_stack+0x3c/0x68
[   51.561332]  kasan_save_track+0x20/0x40
[   51.565152]  kasan_save_alloc_info+0x40/0x58
[   51.569405]  __kasan_kmalloc+0xd4/0xd8
[   51.573138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.577651]  kasan_atomics+0xb8/0x2e0
[   51.581297]  kunit_try_run_case+0x170/0x3f0
[   51.585464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.590933]  kthread+0x328/0x630
[   51.594144]  ret_from_fork+0x10/0x20
[   51.597703] 
[   51.599180] The buggy address belongs to the object at ffff000800c2d400
[   51.599180]  which belongs to the cache kmalloc-64 of size 64
[   51.611506] The buggy address is located 0 bytes to the right of
[   51.611506]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.624352] 
[   51.625828] The buggy address belongs to the physical page:
[   51.631385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.639371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.645879] page_type: f5(slab)
[   51.649014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.656737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.664456] page dumped because: kasan: bad access detected
[   51.670011] 
[   51.671487] Memory state around the buggy address:
[   51.676266]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.683469]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.690674] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.697875]                                      ^
[   51.702653]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.709858]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.717059] ==================================================================
[   58.823436] ==================================================================
[   58.830495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   58.837873] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.845251] 
[   58.846734] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.846781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.846796] Hardware name: WinLink E850-96 board (DT)
[   58.846813] Call trace:
[   58.846826]  show_stack+0x20/0x38 (C)
[   58.846859]  dump_stack_lvl+0x8c/0xd0
[   58.846892]  print_report+0x118/0x608
[   58.846920]  kasan_report+0xdc/0x128
[   58.846948]  kasan_check_range+0x100/0x1a8
[   58.846978]  __kasan_check_write+0x20/0x30
[   58.847009]  kasan_atomics_helper+0x154c/0x4858
[   58.847040]  kasan_atomics+0x198/0x2e0
[   58.847064]  kunit_try_run_case+0x170/0x3f0
[   58.847095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.847130]  kthread+0x328/0x630
[   58.847163]  ret_from_fork+0x10/0x20
[   58.847194] 
[   58.917038] Allocated by task 312:
[   58.920425]  kasan_save_stack+0x3c/0x68
[   58.924243]  kasan_save_track+0x20/0x40
[   58.928062]  kasan_save_alloc_info+0x40/0x58
[   58.932315]  __kasan_kmalloc+0xd4/0xd8
[   58.936048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.940562]  kasan_atomics+0xb8/0x2e0
[   58.944208]  kunit_try_run_case+0x170/0x3f0
[   58.948374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.953842]  kthread+0x328/0x630
[   58.957055]  ret_from_fork+0x10/0x20
[   58.960614] 
[   58.962089] The buggy address belongs to the object at ffff000800c2d400
[   58.962089]  which belongs to the cache kmalloc-64 of size 64
[   58.974416] The buggy address is located 0 bytes to the right of
[   58.974416]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.987263] 
[   58.988738] The buggy address belongs to the physical page:
[   58.994294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.002282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.008790] page_type: f5(slab)
[   59.011922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.019647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.027366] page dumped because: kasan: bad access detected
[   59.032921] 
[   59.034397] Memory state around the buggy address:
[   59.039176]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.046380]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.053585] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.060786]                                      ^
[   59.065563]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.072768]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.079969] ==================================================================
[   53.296783] ==================================================================
[   53.303844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.311219] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.318511] 
[   53.319993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.320036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.320052] Hardware name: WinLink E850-96 board (DT)
[   53.320073] Call trace:
[   53.320085]  show_stack+0x20/0x38 (C)
[   53.320118]  dump_stack_lvl+0x8c/0xd0
[   53.320149]  print_report+0x118/0x608
[   53.320178]  kasan_report+0xdc/0x128
[   53.320206]  __asan_report_load4_noabort+0x20/0x30
[   53.320239]  kasan_atomics_helper+0x3e04/0x4858
[   53.320269]  kasan_atomics+0x198/0x2e0
[   53.320297]  kunit_try_run_case+0x170/0x3f0
[   53.320328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.320367]  kthread+0x328/0x630
[   53.320397]  ret_from_fork+0x10/0x20
[   53.320426] 
[   53.386912] Allocated by task 312:
[   53.390299]  kasan_save_stack+0x3c/0x68
[   53.394117]  kasan_save_track+0x20/0x40
[   53.397937]  kasan_save_alloc_info+0x40/0x58
[   53.402190]  __kasan_kmalloc+0xd4/0xd8
[   53.405923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.410436]  kasan_atomics+0xb8/0x2e0
[   53.414082]  kunit_try_run_case+0x170/0x3f0
[   53.418249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423717]  kthread+0x328/0x630
[   53.426929]  ret_from_fork+0x10/0x20
[   53.430488] 
[   53.431964] The buggy address belongs to the object at ffff000800c2d400
[   53.431964]  which belongs to the cache kmalloc-64 of size 64
[   53.444290] The buggy address is located 0 bytes to the right of
[   53.444290]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.457137] 
[   53.458613] The buggy address belongs to the physical page:
[   53.464171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.472156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.478665] page_type: f5(slab)
[   53.481799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.489522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.497241] page dumped because: kasan: bad access detected
[   53.502796] 
[   53.504272] Memory state around the buggy address:
[   53.509050]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.516254]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.523459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.530660]                                      ^
[   53.535438]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.542643]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.549844] ==================================================================
[   45.144774] ==================================================================
[   45.151883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   45.159172] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.166550] 
[   45.168035] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.168089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.168108] Hardware name: WinLink E850-96 board (DT)
[   45.168129] Call trace:
[   45.168145]  show_stack+0x20/0x38 (C)
[   45.168176]  dump_stack_lvl+0x8c/0xd0
[   45.168214]  print_report+0x118/0x608
[   45.168246]  kasan_report+0xdc/0x128
[   45.168275]  kasan_check_range+0x100/0x1a8
[   45.168308]  __kasan_check_write+0x20/0x30
[   45.168341]  kasan_atomics_helper+0x24c/0x4858
[   45.168372]  kasan_atomics+0x198/0x2e0
[   45.168400]  kunit_try_run_case+0x170/0x3f0
[   45.168433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.168472]  kthread+0x328/0x630
[   45.168505]  ret_from_fork+0x10/0x20
[   45.168540] 
[   45.238250] Allocated by task 312:
[   45.241636]  kasan_save_stack+0x3c/0x68
[   45.245455]  kasan_save_track+0x20/0x40
[   45.249274]  kasan_save_alloc_info+0x40/0x58
[   45.253528]  __kasan_kmalloc+0xd4/0xd8
[   45.257260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.261774]  kasan_atomics+0xb8/0x2e0
[   45.265420]  kunit_try_run_case+0x170/0x3f0
[   45.269587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.275055]  kthread+0x328/0x630
[   45.278267]  ret_from_fork+0x10/0x20
[   45.281826] 
[   45.283303] The buggy address belongs to the object at ffff000800c2d400
[   45.283303]  which belongs to the cache kmalloc-64 of size 64
[   45.295630] The buggy address is located 0 bytes to the right of
[   45.295630]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.308475] 
[   45.309952] The buggy address belongs to the physical page:
[   45.315509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.323495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.330004] page_type: f5(slab)
[   45.333136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.340859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.348578] page dumped because: kasan: bad access detected
[   45.354133] 
[   45.355609] Memory state around the buggy address:
[   45.360389]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.367592]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.374797] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.381998]                                      ^
[   45.386776]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.393980]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.401182] ==================================================================
[   50.145438] ==================================================================
[   50.152502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   50.159791] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.167169] 
[   50.168652] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.168697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.168713] Hardware name: WinLink E850-96 board (DT)
[   50.168734] Call trace:
[   50.168747]  show_stack+0x20/0x38 (C)
[   50.168778]  dump_stack_lvl+0x8c/0xd0
[   50.168809]  print_report+0x118/0x608
[   50.168837]  kasan_report+0xdc/0x128
[   50.168867]  kasan_check_range+0x100/0x1a8
[   50.168897]  __kasan_check_write+0x20/0x30
[   50.168929]  kasan_atomics_helper+0x99c/0x4858
[   50.168959]  kasan_atomics+0x198/0x2e0
[   50.168986]  kunit_try_run_case+0x170/0x3f0
[   50.169021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.169060]  kthread+0x328/0x630
[   50.169090]  ret_from_fork+0x10/0x20
[   50.169122] 
[   50.238869] Allocated by task 312:
[   50.242256]  kasan_save_stack+0x3c/0x68
[   50.246074]  kasan_save_track+0x20/0x40
[   50.249894]  kasan_save_alloc_info+0x40/0x58
[   50.254147]  __kasan_kmalloc+0xd4/0xd8
[   50.257880]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.262394]  kasan_atomics+0xb8/0x2e0
[   50.266039]  kunit_try_run_case+0x170/0x3f0
[   50.270206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.275675]  kthread+0x328/0x630
[   50.278886]  ret_from_fork+0x10/0x20
[   50.282445] 
[   50.283921] The buggy address belongs to the object at ffff000800c2d400
[   50.283921]  which belongs to the cache kmalloc-64 of size 64
[   50.296248] The buggy address is located 0 bytes to the right of
[   50.296248]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.309094] 
[   50.310570] The buggy address belongs to the physical page:
[   50.316126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.324113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.330622] page_type: f5(slab)
[   50.333756] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.341479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.349198] page dumped because: kasan: bad access detected
[   50.354753] 
[   50.356229] Memory state around the buggy address:
[   50.361008]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.368211]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.375416] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.382617]                                      ^
[   50.387395]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.394600]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.401802] ==================================================================
[   50.672852] ==================================================================
[   50.679923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   50.687214] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.694592] 
[   50.696074] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.696120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.696134] Hardware name: WinLink E850-96 board (DT)
[   50.696155] Call trace:
[   50.696165]  show_stack+0x20/0x38 (C)
[   50.696195]  dump_stack_lvl+0x8c/0xd0
[   50.696227]  print_report+0x118/0x608
[   50.696257]  kasan_report+0xdc/0x128
[   50.696286]  kasan_check_range+0x100/0x1a8
[   50.696318]  __kasan_check_write+0x20/0x30
[   50.696350]  kasan_atomics_helper+0xa6c/0x4858
[   50.696381]  kasan_atomics+0x198/0x2e0
[   50.696408]  kunit_try_run_case+0x170/0x3f0
[   50.696440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.696476]  kthread+0x328/0x630
[   50.696509]  ret_from_fork+0x10/0x20
[   50.696539] 
[   50.766292] Allocated by task 312:
[   50.769679]  kasan_save_stack+0x3c/0x68
[   50.773497]  kasan_save_track+0x20/0x40
[   50.777316]  kasan_save_alloc_info+0x40/0x58
[   50.781570]  __kasan_kmalloc+0xd4/0xd8
[   50.785302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.789816]  kasan_atomics+0xb8/0x2e0
[   50.793462]  kunit_try_run_case+0x170/0x3f0
[   50.797629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.803097]  kthread+0x328/0x630
[   50.806309]  ret_from_fork+0x10/0x20
[   50.809868] 
[   50.811344] The buggy address belongs to the object at ffff000800c2d400
[   50.811344]  which belongs to the cache kmalloc-64 of size 64
[   50.823670] The buggy address is located 0 bytes to the right of
[   50.823670]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.836517] 
[   50.837992] The buggy address belongs to the physical page:
[   50.843550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.851535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.858044] page_type: f5(slab)
[   50.861177] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.868901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.876621] page dumped because: kasan: bad access detected
[   50.882176] 
[   50.883651] Memory state around the buggy address:
[   50.888431]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.895634]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.902839] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.910040]                                      ^
[   50.914818]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.922022]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.929224] ==================================================================
[   59.351200] ==================================================================
[   59.358266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   59.365642] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.372934] 
[   59.374418] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.374467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.374483] Hardware name: WinLink E850-96 board (DT)
[   59.374503] Call trace:
[   59.374516]  show_stack+0x20/0x38 (C)
[   59.374545]  dump_stack_lvl+0x8c/0xd0
[   59.374579]  print_report+0x118/0x608
[   59.374609]  kasan_report+0xdc/0x128
[   59.374636]  __asan_report_load8_noabort+0x20/0x30
[   59.374670]  kasan_atomics_helper+0x3db0/0x4858
[   59.374699]  kasan_atomics+0x198/0x2e0
[   59.374727]  kunit_try_run_case+0x170/0x3f0
[   59.374760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.374795]  kthread+0x328/0x630
[   59.374825]  ret_from_fork+0x10/0x20
[   59.374861] 
[   59.441335] Allocated by task 312:
[   59.444722]  kasan_save_stack+0x3c/0x68
[   59.448541]  kasan_save_track+0x20/0x40
[   59.452360]  kasan_save_alloc_info+0x40/0x58
[   59.456613]  __kasan_kmalloc+0xd4/0xd8
[   59.460346]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.464860]  kasan_atomics+0xb8/0x2e0
[   59.468505]  kunit_try_run_case+0x170/0x3f0
[   59.472671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.478140]  kthread+0x328/0x630
[   59.481352]  ret_from_fork+0x10/0x20
[   59.484911] 
[   59.486387] The buggy address belongs to the object at ffff000800c2d400
[   59.486387]  which belongs to the cache kmalloc-64 of size 64
[   59.498713] The buggy address is located 0 bytes to the right of
[   59.498713]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.511560] 
[   59.513036] The buggy address belongs to the physical page:
[   59.518592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.526579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.533088] page_type: f5(slab)
[   59.536222] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.543945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.551664] page dumped because: kasan: bad access detected
[   59.557219] 
[   59.558695] Memory state around the buggy address:
[   59.563474]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.570677]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.577882] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.585083]                                      ^
[   59.589861]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.597066]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.604267] ==================================================================
[   50.409118] ==================================================================
[   50.416213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   50.423502] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.430880] 
[   50.432363] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.432412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.432426] Hardware name: WinLink E850-96 board (DT)
[   50.432444] Call trace:
[   50.432457]  show_stack+0x20/0x38 (C)
[   50.432486]  dump_stack_lvl+0x8c/0xd0
[   50.432520]  print_report+0x118/0x608
[   50.432550]  kasan_report+0xdc/0x128
[   50.432577]  kasan_check_range+0x100/0x1a8
[   50.432608]  __kasan_check_write+0x20/0x30
[   50.432639]  kasan_atomics_helper+0xa04/0x4858
[   50.432667]  kasan_atomics+0x198/0x2e0
[   50.432693]  kunit_try_run_case+0x170/0x3f0
[   50.432725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.432760]  kthread+0x328/0x630
[   50.432791]  ret_from_fork+0x10/0x20
[   50.432822] 
[   50.502581] Allocated by task 312:
[   50.505968]  kasan_save_stack+0x3c/0x68
[   50.509786]  kasan_save_track+0x20/0x40
[   50.513605]  kasan_save_alloc_info+0x40/0x58
[   50.517858]  __kasan_kmalloc+0xd4/0xd8
[   50.521591]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.526105]  kasan_atomics+0xb8/0x2e0
[   50.529750]  kunit_try_run_case+0x170/0x3f0
[   50.533917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.539385]  kthread+0x328/0x630
[   50.542598]  ret_from_fork+0x10/0x20
[   50.546157] 
[   50.547632] The buggy address belongs to the object at ffff000800c2d400
[   50.547632]  which belongs to the cache kmalloc-64 of size 64
[   50.559959] The buggy address is located 0 bytes to the right of
[   50.559959]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.572805] 
[   50.574281] The buggy address belongs to the physical page:
[   50.579837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.587824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.594333] page_type: f5(slab)
[   50.597466] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.605190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.612909] page dumped because: kasan: bad access detected
[   50.618465] 
[   50.619940] Memory state around the buggy address:
[   50.624719]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.631923]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.639127] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.646328]                                      ^
[   50.651107]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.658311]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.665512] ==================================================================
[   53.557191] ==================================================================
[   53.564257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.571545] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.578837] 
[   53.580319] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.580367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.580382] Hardware name: WinLink E850-96 board (DT)
[   53.580402] Call trace:
[   53.580416]  show_stack+0x20/0x38 (C)
[   53.580446]  dump_stack_lvl+0x8c/0xd0
[   53.580480]  print_report+0x118/0x608
[   53.580509]  kasan_report+0xdc/0x128
[   53.580537]  kasan_check_range+0x100/0x1a8
[   53.580569]  __kasan_check_read+0x20/0x30
[   53.580602]  kasan_atomics_helper+0xdd4/0x4858
[   53.580631]  kasan_atomics+0x198/0x2e0
[   53.580661]  kunit_try_run_case+0x170/0x3f0
[   53.580693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.580731]  kthread+0x328/0x630
[   53.580763]  ret_from_fork+0x10/0x20
[   53.580794] 
[   53.650450] Allocated by task 312:
[   53.653838]  kasan_save_stack+0x3c/0x68
[   53.657655]  kasan_save_track+0x20/0x40
[   53.661475]  kasan_save_alloc_info+0x40/0x58
[   53.665728]  __kasan_kmalloc+0xd4/0xd8
[   53.669460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.673974]  kasan_atomics+0xb8/0x2e0
[   53.677620]  kunit_try_run_case+0x170/0x3f0
[   53.681786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.687255]  kthread+0x328/0x630
[   53.690467]  ret_from_fork+0x10/0x20
[   53.694026] 
[   53.695501] The buggy address belongs to the object at ffff000800c2d400
[   53.695501]  which belongs to the cache kmalloc-64 of size 64
[   53.707828] The buggy address is located 0 bytes to the right of
[   53.707828]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.720675] 
[   53.722151] The buggy address belongs to the physical page:
[   53.727708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.735694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.742204] page_type: f5(slab)
[   53.745335] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.753059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.760778] page dumped because: kasan: bad access detected
[   53.766334] 
[   53.767809] Memory state around the buggy address:
[   53.772589]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.779792]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.786997] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.794198]                                      ^
[   53.798976]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.806180]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.813382] ==================================================================
[   54.344849] ==================================================================
[   54.351918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   54.359294] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.366672] 
[   54.368154] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.368202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.368219] Hardware name: WinLink E850-96 board (DT)
[   54.368239] Call trace:
[   54.368252]  show_stack+0x20/0x38 (C)
[   54.368284]  dump_stack_lvl+0x8c/0xd0
[   54.368316]  print_report+0x118/0x608
[   54.368345]  kasan_report+0xdc/0x128
[   54.368374]  __asan_report_store8_noabort+0x20/0x30
[   54.368408]  kasan_atomics_helper+0x3e5c/0x4858
[   54.368437]  kasan_atomics+0x198/0x2e0
[   54.368465]  kunit_try_run_case+0x170/0x3f0
[   54.368498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.368534]  kthread+0x328/0x630
[   54.368565]  ret_from_fork+0x10/0x20
[   54.368598] 
[   54.435160] Allocated by task 312:
[   54.438548]  kasan_save_stack+0x3c/0x68
[   54.442366]  kasan_save_track+0x20/0x40
[   54.446185]  kasan_save_alloc_info+0x40/0x58
[   54.450438]  __kasan_kmalloc+0xd4/0xd8
[   54.454171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.458685]  kasan_atomics+0xb8/0x2e0
[   54.462330]  kunit_try_run_case+0x170/0x3f0
[   54.466497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.471966]  kthread+0x328/0x630
[   54.475177]  ret_from_fork+0x10/0x20
[   54.478737] 
[   54.480213] The buggy address belongs to the object at ffff000800c2d400
[   54.480213]  which belongs to the cache kmalloc-64 of size 64
[   54.492539] The buggy address is located 0 bytes to the right of
[   54.492539]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.505385] 
[   54.506861] The buggy address belongs to the physical page:
[   54.512418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.520405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.526913] page_type: f5(slab)
[   54.530047] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.537770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.545489] page dumped because: kasan: bad access detected
[   54.551044] 
[   54.552520] Memory state around the buggy address:
[   54.557299]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.564502]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.571707] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.578908]                                      ^
[   54.583686]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.590891]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.598092] ==================================================================
[   48.302784] ==================================================================
[   48.309820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   48.317110] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.324488] 
[   48.325971] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.326019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.326037] Hardware name: WinLink E850-96 board (DT)
[   48.326057] Call trace:
[   48.326070]  show_stack+0x20/0x38 (C)
[   48.326100]  dump_stack_lvl+0x8c/0xd0
[   48.326133]  print_report+0x118/0x608
[   48.326161]  kasan_report+0xdc/0x128
[   48.326187]  kasan_check_range+0x100/0x1a8
[   48.326219]  __kasan_check_write+0x20/0x30
[   48.326248]  kasan_atomics_helper+0x684/0x4858
[   48.326280]  kasan_atomics+0x198/0x2e0
[   48.326308]  kunit_try_run_case+0x170/0x3f0
[   48.326342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.326379]  kthread+0x328/0x630
[   48.326409]  ret_from_fork+0x10/0x20
[   48.326443] 
[   48.396189] Allocated by task 312:
[   48.399575]  kasan_save_stack+0x3c/0x68
[   48.403394]  kasan_save_track+0x20/0x40
[   48.407213]  kasan_save_alloc_info+0x40/0x58
[   48.411466]  __kasan_kmalloc+0xd4/0xd8
[   48.415199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.419713]  kasan_atomics+0xb8/0x2e0
[   48.423359]  kunit_try_run_case+0x170/0x3f0
[   48.427525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.432994]  kthread+0x328/0x630
[   48.436206]  ret_from_fork+0x10/0x20
[   48.439765] 
[   48.441240] The buggy address belongs to the object at ffff000800c2d400
[   48.441240]  which belongs to the cache kmalloc-64 of size 64
[   48.453567] The buggy address is located 0 bytes to the right of
[   48.453567]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.466413] 
[   48.467889] The buggy address belongs to the physical page:
[   48.473445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.481432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.487941] page_type: f5(slab)
[   48.491074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.498798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.506517] page dumped because: kasan: bad access detected
[   48.512072] 
[   48.513548] Memory state around the buggy address:
[   48.518327]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.525531]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.532736] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.539937]                                      ^
[   48.544714]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.551919]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.559120] ==================================================================
[   56.715816] ==================================================================
[   56.722889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   56.730265] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.737644] 
[   56.739126] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.739173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.739188] Hardware name: WinLink E850-96 board (DT)
[   56.739209] Call trace:
[   56.739221]  show_stack+0x20/0x38 (C)
[   56.739252]  dump_stack_lvl+0x8c/0xd0
[   56.739285]  print_report+0x118/0x608
[   56.739316]  kasan_report+0xdc/0x128
[   56.739344]  kasan_check_range+0x100/0x1a8
[   56.739377]  __kasan_check_write+0x20/0x30
[   56.739407]  kasan_atomics_helper+0x11f8/0x4858
[   56.739438]  kasan_atomics+0x198/0x2e0
[   56.739464]  kunit_try_run_case+0x170/0x3f0
[   56.739497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.739535]  kthread+0x328/0x630
[   56.739564]  ret_from_fork+0x10/0x20
[   56.739597] 
[   56.809431] Allocated by task 312:
[   56.812818]  kasan_save_stack+0x3c/0x68
[   56.816636]  kasan_save_track+0x20/0x40
[   56.820455]  kasan_save_alloc_info+0x40/0x58
[   56.824708]  __kasan_kmalloc+0xd4/0xd8
[   56.828441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.832954]  kasan_atomics+0xb8/0x2e0
[   56.836600]  kunit_try_run_case+0x170/0x3f0
[   56.840767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.846236]  kthread+0x328/0x630
[   56.849447]  ret_from_fork+0x10/0x20
[   56.853006] 
[   56.854483] The buggy address belongs to the object at ffff000800c2d400
[   56.854483]  which belongs to the cache kmalloc-64 of size 64
[   56.866808] The buggy address is located 0 bytes to the right of
[   56.866808]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.879655] 
[   56.881131] The buggy address belongs to the physical page:
[   56.886687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.894674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.901183] page_type: f5(slab)
[   56.904315] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.912040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.919759] page dumped because: kasan: bad access detected
[   56.925315] 
[   56.926790] Memory state around the buggy address:
[   56.931569]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.938773]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.945977] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.953178]                                      ^
[   56.957956]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.965161]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.972362] ==================================================================
[   53.033089] ==================================================================
[   53.040131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.047421] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   53.054799] 
[   53.056283] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   53.056331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.056347] Hardware name: WinLink E850-96 board (DT)
[   53.056368] Call trace:
[   53.056379]  show_stack+0x20/0x38 (C)
[   53.056411]  dump_stack_lvl+0x8c/0xd0
[   53.056445]  print_report+0x118/0x608
[   53.056475]  kasan_report+0xdc/0x128
[   53.056504]  kasan_check_range+0x100/0x1a8
[   53.056534]  __kasan_check_write+0x20/0x30
[   53.056567]  kasan_atomics_helper+0xd3c/0x4858
[   53.056596]  kasan_atomics+0x198/0x2e0
[   53.056624]  kunit_try_run_case+0x170/0x3f0
[   53.056659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.056695]  kthread+0x328/0x630
[   53.056727]  ret_from_fork+0x10/0x20
[   53.056760] 
[   53.126500] Allocated by task 312:
[   53.129887]  kasan_save_stack+0x3c/0x68
[   53.133705]  kasan_save_track+0x20/0x40
[   53.137524]  kasan_save_alloc_info+0x40/0x58
[   53.141777]  __kasan_kmalloc+0xd4/0xd8
[   53.145510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.150024]  kasan_atomics+0xb8/0x2e0
[   53.153670]  kunit_try_run_case+0x170/0x3f0
[   53.157836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.163305]  kthread+0x328/0x630
[   53.166516]  ret_from_fork+0x10/0x20
[   53.170076] 
[   53.171551] The buggy address belongs to the object at ffff000800c2d400
[   53.171551]  which belongs to the cache kmalloc-64 of size 64
[   53.183878] The buggy address is located 0 bytes to the right of
[   53.183878]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   53.196724] 
[   53.198201] The buggy address belongs to the physical page:
[   53.203758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   53.211743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.218252] page_type: f5(slab)
[   53.221386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.229109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.236828] page dumped because: kasan: bad access detected
[   53.242383] 
[   53.243859] Memory state around the buggy address:
[   53.248637]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.255842]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.263046] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.270247]                                      ^
[   53.275025]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.282230]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.289431] ==================================================================
[   49.881752] ==================================================================
[   49.888790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   49.896080] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.903458] 
[   49.904939] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.904986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.905003] Hardware name: WinLink E850-96 board (DT)
[   49.905023] Call trace:
[   49.905036]  show_stack+0x20/0x38 (C)
[   49.905067]  dump_stack_lvl+0x8c/0xd0
[   49.905097]  print_report+0x118/0x608
[   49.905126]  kasan_report+0xdc/0x128
[   49.905156]  kasan_check_range+0x100/0x1a8
[   49.905185]  __kasan_check_write+0x20/0x30
[   49.905217]  kasan_atomics_helper+0x934/0x4858
[   49.905245]  kasan_atomics+0x198/0x2e0
[   49.905275]  kunit_try_run_case+0x170/0x3f0
[   49.905305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.905341]  kthread+0x328/0x630
[   49.905371]  ret_from_fork+0x10/0x20
[   49.905403] 
[   49.975158] Allocated by task 312:
[   49.978545]  kasan_save_stack+0x3c/0x68
[   49.982363]  kasan_save_track+0x20/0x40
[   49.986183]  kasan_save_alloc_info+0x40/0x58
[   49.990436]  __kasan_kmalloc+0xd4/0xd8
[   49.994168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.998682]  kasan_atomics+0xb8/0x2e0
[   50.002328]  kunit_try_run_case+0x170/0x3f0
[   50.006495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.011963]  kthread+0x328/0x630
[   50.015175]  ret_from_fork+0x10/0x20
[   50.018734] 
[   50.020209] The buggy address belongs to the object at ffff000800c2d400
[   50.020209]  which belongs to the cache kmalloc-64 of size 64
[   50.032536] The buggy address is located 0 bytes to the right of
[   50.032536]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   50.045383] 
[   50.046859] The buggy address belongs to the physical page:
[   50.052416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   50.060403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.066911] page_type: f5(slab)
[   50.070044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.077767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.085486] page dumped because: kasan: bad access detected
[   50.091042] 
[   50.092518] Memory state around the buggy address:
[   50.097297]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.104500]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.111705] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.118906]                                      ^
[   50.123684]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.130888]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.138090] ==================================================================
[   45.408496] ==================================================================
[   45.415594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   45.422883] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.430174] 
[   45.431660] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.431710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.431727] Hardware name: WinLink E850-96 board (DT)
[   45.431748] Call trace:
[   45.431762]  show_stack+0x20/0x38 (C)
[   45.431795]  dump_stack_lvl+0x8c/0xd0
[   45.431829]  print_report+0x118/0x608
[   45.431859]  kasan_report+0xdc/0x128
[   45.431888]  kasan_check_range+0x100/0x1a8
[   45.431920]  __kasan_check_read+0x20/0x30
[   45.431952]  kasan_atomics_helper+0x2b0/0x4858
[   45.431981]  kasan_atomics+0x198/0x2e0
[   45.432007]  kunit_try_run_case+0x170/0x3f0
[   45.432044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.432080]  kthread+0x328/0x630
[   45.432110]  ret_from_fork+0x10/0x20
[   45.432147] 
[   45.501787] Allocated by task 312:
[   45.505175]  kasan_save_stack+0x3c/0x68
[   45.508993]  kasan_save_track+0x20/0x40
[   45.512812]  kasan_save_alloc_info+0x40/0x58
[   45.517065]  __kasan_kmalloc+0xd4/0xd8
[   45.520798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.525312]  kasan_atomics+0xb8/0x2e0
[   45.528958]  kunit_try_run_case+0x170/0x3f0
[   45.533124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.538592]  kthread+0x328/0x630
[   45.541804]  ret_from_fork+0x10/0x20
[   45.545364] 
[   45.546841] The buggy address belongs to the object at ffff000800c2d400
[   45.546841]  which belongs to the cache kmalloc-64 of size 64
[   45.559166] The buggy address is located 0 bytes to the right of
[   45.559166]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.572012] 
[   45.573489] The buggy address belongs to the physical page:
[   45.579047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.587034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.593541] page_type: f5(slab)
[   45.596675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.604397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.612116] page dumped because: kasan: bad access detected
[   45.617672] 
[   45.619147] Memory state around the buggy address:
[   45.623928]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.631130]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.638334] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.645536]                                      ^
[   45.650314]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.657518]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.664720] ==================================================================
[   54.081167] ==================================================================
[   54.088208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   54.095496] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.102874] 
[   54.104356] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.104402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.104420] Hardware name: WinLink E850-96 board (DT)
[   54.104441] Call trace:
[   54.104456]  show_stack+0x20/0x38 (C)
[   54.104487]  dump_stack_lvl+0x8c/0xd0
[   54.104518]  print_report+0x118/0x608
[   54.104549]  kasan_report+0xdc/0x128
[   54.104578]  kasan_check_range+0x100/0x1a8
[   54.104610]  __kasan_check_write+0x20/0x30
[   54.104642]  kasan_atomics_helper+0xe44/0x4858
[   54.104670]  kasan_atomics+0x198/0x2e0
[   54.104698]  kunit_try_run_case+0x170/0x3f0
[   54.104732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.104769]  kthread+0x328/0x630
[   54.104799]  ret_from_fork+0x10/0x20
[   54.104831] 
[   54.174574] Allocated by task 312:
[   54.177961]  kasan_save_stack+0x3c/0x68
[   54.181779]  kasan_save_track+0x20/0x40
[   54.185598]  kasan_save_alloc_info+0x40/0x58
[   54.189852]  __kasan_kmalloc+0xd4/0xd8
[   54.193585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.198098]  kasan_atomics+0xb8/0x2e0
[   54.201744]  kunit_try_run_case+0x170/0x3f0
[   54.205911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.211379]  kthread+0x328/0x630
[   54.214591]  ret_from_fork+0x10/0x20
[   54.218150] 
[   54.219626] The buggy address belongs to the object at ffff000800c2d400
[   54.219626]  which belongs to the cache kmalloc-64 of size 64
[   54.231952] The buggy address is located 0 bytes to the right of
[   54.231952]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.244799] 
[   54.246275] The buggy address belongs to the physical page:
[   54.251831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.259818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.266328] page_type: f5(slab)
[   54.269461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.277183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.284902] page dumped because: kasan: bad access detected
[   54.290458] 
[   54.291934] Memory state around the buggy address:
[   54.296713]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.303916]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.311120] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.318322]                                      ^
[   54.323100]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.330305]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.337506] ==================================================================
[   57.507479] ==================================================================
[   57.514545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   57.521920] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.529298] 
[   57.530782] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.530829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.530847] Hardware name: WinLink E850-96 board (DT)
[   57.530864] Call trace:
[   57.530874]  show_stack+0x20/0x38 (C)
[   57.530906]  dump_stack_lvl+0x8c/0xd0
[   57.530936]  print_report+0x118/0x608
[   57.530966]  kasan_report+0xdc/0x128
[   57.530994]  kasan_check_range+0x100/0x1a8
[   57.531024]  __kasan_check_write+0x20/0x30
[   57.531055]  kasan_atomics_helper+0x1384/0x4858
[   57.531086]  kasan_atomics+0x198/0x2e0
[   57.531114]  kunit_try_run_case+0x170/0x3f0
[   57.531147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.531187]  kthread+0x328/0x630
[   57.531220]  ret_from_fork+0x10/0x20
[   57.531250] 
[   57.601085] Allocated by task 312:
[   57.604472]  kasan_save_stack+0x3c/0x68
[   57.608290]  kasan_save_track+0x20/0x40
[   57.612110]  kasan_save_alloc_info+0x40/0x58
[   57.616363]  __kasan_kmalloc+0xd4/0xd8
[   57.620095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.624609]  kasan_atomics+0xb8/0x2e0
[   57.628255]  kunit_try_run_case+0x170/0x3f0
[   57.632422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.637890]  kthread+0x328/0x630
[   57.641102]  ret_from_fork+0x10/0x20
[   57.644661] 
[   57.646136] The buggy address belongs to the object at ffff000800c2d400
[   57.646136]  which belongs to the cache kmalloc-64 of size 64
[   57.658463] The buggy address is located 0 bytes to the right of
[   57.658463]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.671310] 
[   57.672786] The buggy address belongs to the physical page:
[   57.678342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.686330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.692837] page_type: f5(slab)
[   57.695970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.703695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.711413] page dumped because: kasan: bad access detected
[   57.716969] 
[   57.718445] Memory state around the buggy address:
[   57.723224]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.730427]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.737632] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.744833]                                      ^
[   57.749611]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.756816]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.764017] ==================================================================
[   58.031775] ==================================================================
[   58.038840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   58.046218] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.053596] 
[   58.055077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.055125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.055142] Hardware name: WinLink E850-96 board (DT)
[   58.055161] Call trace:
[   58.055174]  show_stack+0x20/0x38 (C)
[   58.055205]  dump_stack_lvl+0x8c/0xd0
[   58.055236]  print_report+0x118/0x608
[   58.055265]  kasan_report+0xdc/0x128
[   58.055294]  kasan_check_range+0x100/0x1a8
[   58.055325]  __kasan_check_write+0x20/0x30
[   58.055357]  kasan_atomics_helper+0x1414/0x4858
[   58.055385]  kasan_atomics+0x198/0x2e0
[   58.055413]  kunit_try_run_case+0x170/0x3f0
[   58.055444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.055480]  kthread+0x328/0x630
[   58.055510]  ret_from_fork+0x10/0x20
[   58.055545] 
[   58.125383] Allocated by task 312:
[   58.128770]  kasan_save_stack+0x3c/0x68
[   58.132588]  kasan_save_track+0x20/0x40
[   58.136407]  kasan_save_alloc_info+0x40/0x58
[   58.140660]  __kasan_kmalloc+0xd4/0xd8
[   58.144393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.148907]  kasan_atomics+0xb8/0x2e0
[   58.152553]  kunit_try_run_case+0x170/0x3f0
[   58.156719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.162188]  kthread+0x328/0x630
[   58.165400]  ret_from_fork+0x10/0x20
[   58.168959] 
[   58.170434] The buggy address belongs to the object at ffff000800c2d400
[   58.170434]  which belongs to the cache kmalloc-64 of size 64
[   58.182761] The buggy address is located 0 bytes to the right of
[   58.182761]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.195607] 
[   58.197084] The buggy address belongs to the physical page:
[   58.202639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.210625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.217135] page_type: f5(slab)
[   58.220268] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.227992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.235711] page dumped because: kasan: bad access detected
[   58.241267] 
[   58.242742] Memory state around the buggy address:
[   58.247520]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.254725]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.261930] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.269131]                                      ^
[   58.273909]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.281113]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.288315] ==================================================================
[   56.188078] ==================================================================
[   56.195119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   56.202495] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.209874] 
[   56.211355] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.211403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.211417] Hardware name: WinLink E850-96 board (DT)
[   56.211438] Call trace:
[   56.211448]  show_stack+0x20/0x38 (C)
[   56.211478]  dump_stack_lvl+0x8c/0xd0
[   56.211511]  print_report+0x118/0x608
[   56.211541]  kasan_report+0xdc/0x128
[   56.211567]  kasan_check_range+0x100/0x1a8
[   56.211599]  __kasan_check_write+0x20/0x30
[   56.211630]  kasan_atomics_helper+0x1128/0x4858
[   56.211660]  kasan_atomics+0x198/0x2e0
[   56.211687]  kunit_try_run_case+0x170/0x3f0
[   56.211720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.211759]  kthread+0x328/0x630
[   56.211790]  ret_from_fork+0x10/0x20
[   56.211824] 
[   56.281661] Allocated by task 312:
[   56.285048]  kasan_save_stack+0x3c/0x68
[   56.288865]  kasan_save_track+0x20/0x40
[   56.292685]  kasan_save_alloc_info+0x40/0x58
[   56.296938]  __kasan_kmalloc+0xd4/0xd8
[   56.300671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.305184]  kasan_atomics+0xb8/0x2e0
[   56.308830]  kunit_try_run_case+0x170/0x3f0
[   56.312997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.318466]  kthread+0x328/0x630
[   56.321677]  ret_from_fork+0x10/0x20
[   56.325237] 
[   56.326712] The buggy address belongs to the object at ffff000800c2d400
[   56.326712]  which belongs to the cache kmalloc-64 of size 64
[   56.339039] The buggy address is located 0 bytes to the right of
[   56.339039]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.351885] 
[   56.353361] The buggy address belongs to the physical page:
[   56.358917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.366906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.373413] page_type: f5(slab)
[   56.376546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.384270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.391989] page dumped because: kasan: bad access detected
[   56.397544] 
[   56.399020] Memory state around the buggy address:
[   56.403800]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.411002]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.418207] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.425409]                                      ^
[   56.430186]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.437391]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.444592] ==================================================================
[   52.772654] ==================================================================
[   52.779718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   52.787095] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.794387] 
[   52.795871] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.795920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.795936] Hardware name: WinLink E850-96 board (DT)
[   52.795955] Call trace:
[   52.795967]  show_stack+0x20/0x38 (C)
[   52.795999]  dump_stack_lvl+0x8c/0xd0
[   52.796031]  print_report+0x118/0x608
[   52.796060]  kasan_report+0xdc/0x128
[   52.796090]  __asan_report_load4_noabort+0x20/0x30
[   52.796124]  kasan_atomics_helper+0x3dd8/0x4858
[   52.796153]  kasan_atomics+0x198/0x2e0
[   52.796182]  kunit_try_run_case+0x170/0x3f0
[   52.796215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.796253]  kthread+0x328/0x630
[   52.796283]  ret_from_fork+0x10/0x20
[   52.796315] 
[   52.862788] Allocated by task 312:
[   52.866176]  kasan_save_stack+0x3c/0x68
[   52.869993]  kasan_save_track+0x20/0x40
[   52.873812]  kasan_save_alloc_info+0x40/0x58
[   52.878066]  __kasan_kmalloc+0xd4/0xd8
[   52.881799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.886312]  kasan_atomics+0xb8/0x2e0
[   52.889958]  kunit_try_run_case+0x170/0x3f0
[   52.894125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.899593]  kthread+0x328/0x630
[   52.902805]  ret_from_fork+0x10/0x20
[   52.906364] 
[   52.907840] The buggy address belongs to the object at ffff000800c2d400
[   52.907840]  which belongs to the cache kmalloc-64 of size 64
[   52.920166] The buggy address is located 0 bytes to the right of
[   52.920166]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.933013] 
[   52.934489] The buggy address belongs to the physical page:
[   52.940046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.948032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.954541] page_type: f5(slab)
[   52.957675] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.965398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.973117] page dumped because: kasan: bad access detected
[   52.978672] 
[   52.980147] Memory state around the buggy address:
[   52.984927]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.992130]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.999335] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.006536]                                      ^
[   53.011314]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.018519]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.025720] ==================================================================
[   60.135885] ==================================================================
[   60.142976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   60.150353] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.157731] 
[   60.159213] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.159258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.159273] Hardware name: WinLink E850-96 board (DT)
[   60.159294] Call trace:
[   60.159307]  show_stack+0x20/0x38 (C)
[   60.159340]  dump_stack_lvl+0x8c/0xd0
[   60.159370]  print_report+0x118/0x608
[   60.159398]  kasan_report+0xdc/0x128
[   60.159425]  kasan_check_range+0x100/0x1a8
[   60.159455]  __kasan_check_write+0x20/0x30
[   60.159486]  kasan_atomics_helper+0x16d0/0x4858
[   60.159516]  kasan_atomics+0x198/0x2e0
[   60.159542]  kunit_try_run_case+0x170/0x3f0
[   60.159574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.159609]  kthread+0x328/0x630
[   60.159643]  ret_from_fork+0x10/0x20
[   60.159674] 
[   60.229518] Allocated by task 312:
[   60.232905]  kasan_save_stack+0x3c/0x68
[   60.236723]  kasan_save_track+0x20/0x40
[   60.240542]  kasan_save_alloc_info+0x40/0x58
[   60.244796]  __kasan_kmalloc+0xd4/0xd8
[   60.248528]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.253042]  kasan_atomics+0xb8/0x2e0
[   60.256688]  kunit_try_run_case+0x170/0x3f0
[   60.260854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.266323]  kthread+0x328/0x630
[   60.269535]  ret_from_fork+0x10/0x20
[   60.273094] 
[   60.274569] The buggy address belongs to the object at ffff000800c2d400
[   60.274569]  which belongs to the cache kmalloc-64 of size 64
[   60.286896] The buggy address is located 0 bytes to the right of
[   60.286896]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.299743] 
[   60.301218] The buggy address belongs to the physical page:
[   60.306774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.314762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.321272] page_type: f5(slab)
[   60.324405] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.332127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.339848] page dumped because: kasan: bad access detected
[   60.345401] 
[   60.346877] Memory state around the buggy address:
[   60.351657]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.358860]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.366065] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.373266]                                      ^
[   60.378044]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.385248]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.392450] ==================================================================
[   56.451938] ==================================================================
[   56.459003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   56.466381] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   56.473759] 
[   56.475241] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   56.475288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.475303] Hardware name: WinLink E850-96 board (DT)
[   56.475321] Call trace:
[   56.475331]  show_stack+0x20/0x38 (C)
[   56.475362]  dump_stack_lvl+0x8c/0xd0
[   56.475393]  print_report+0x118/0x608
[   56.475424]  kasan_report+0xdc/0x128
[   56.475453]  kasan_check_range+0x100/0x1a8
[   56.475484]  __kasan_check_write+0x20/0x30
[   56.475516]  kasan_atomics_helper+0x1190/0x4858
[   56.475544]  kasan_atomics+0x198/0x2e0
[   56.475572]  kunit_try_run_case+0x170/0x3f0
[   56.475603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.475639]  kthread+0x328/0x630
[   56.475671]  ret_from_fork+0x10/0x20
[   56.475701] 
[   56.545546] Allocated by task 312:
[   56.548933]  kasan_save_stack+0x3c/0x68
[   56.552751]  kasan_save_track+0x20/0x40
[   56.556570]  kasan_save_alloc_info+0x40/0x58
[   56.560823]  __kasan_kmalloc+0xd4/0xd8
[   56.564556]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.569069]  kasan_atomics+0xb8/0x2e0
[   56.572715]  kunit_try_run_case+0x170/0x3f0
[   56.576882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.582351]  kthread+0x328/0x630
[   56.585562]  ret_from_fork+0x10/0x20
[   56.589121] 
[   56.590597] The buggy address belongs to the object at ffff000800c2d400
[   56.590597]  which belongs to the cache kmalloc-64 of size 64
[   56.602924] The buggy address is located 0 bytes to the right of
[   56.602924]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   56.615770] 
[   56.617246] The buggy address belongs to the physical page:
[   56.622802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   56.630789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.637298] page_type: f5(slab)
[   56.640430] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.648155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.655874] page dumped because: kasan: bad access detected
[   56.661429] 
[   56.662905] Memory state around the buggy address:
[   56.667684]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.674888]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.682092] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.689294]                                      ^
[   56.694071]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.701276]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.708477] ==================================================================
[   44.620742] ==================================================================
[   44.627761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   44.635135] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.642513] 
[   44.643998] CPU: 5 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.644053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.644069] Hardware name: WinLink E850-96 board (DT)
[   44.644089] Call trace:
[   44.644101]  show_stack+0x20/0x38 (C)
[   44.644134]  dump_stack_lvl+0x8c/0xd0
[   44.644169]  print_report+0x118/0x608
[   44.644202]  kasan_report+0xdc/0x128
[   44.644233]  __asan_report_store4_noabort+0x20/0x30
[   44.644266]  kasan_atomics_helper+0x3f7c/0x4858
[   44.644296]  kasan_atomics+0x198/0x2e0
[   44.644325]  kunit_try_run_case+0x170/0x3f0
[   44.644360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.644397]  kthread+0x328/0x630
[   44.644433]  ret_from_fork+0x10/0x20
[   44.644467] 
[   44.711001] Allocated by task 312:
[   44.714388]  kasan_save_stack+0x3c/0x68
[   44.718206]  kasan_save_track+0x20/0x40
[   44.722025]  kasan_save_alloc_info+0x40/0x58
[   44.726279]  __kasan_kmalloc+0xd4/0xd8
[   44.730011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.734525]  kasan_atomics+0xb8/0x2e0
[   44.738171]  kunit_try_run_case+0x170/0x3f0
[   44.742337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.747807]  kthread+0x328/0x630
[   44.751018]  ret_from_fork+0x10/0x20
[   44.754577] 
[   44.756054] The buggy address belongs to the object at ffff000800c2d400
[   44.756054]  which belongs to the cache kmalloc-64 of size 64
[   44.768380] The buggy address is located 0 bytes to the right of
[   44.768380]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   44.781226] 
[   44.782705] The buggy address belongs to the physical page:
[   44.788261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   44.796246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.802755] page_type: f5(slab)
[   44.805889] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.813610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.821329] page dumped because: kasan: bad access detected
[   44.826884] 
[   44.828360] Memory state around the buggy address:
[   44.833140]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.840343]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.847548] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.854749]                                      ^
[   44.859527]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.866732]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.873933] ==================================================================
[   58.559517] ==================================================================
[   58.566610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   58.573988] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   58.581366] 
[   58.582849] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   58.582895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.582911] Hardware name: WinLink E850-96 board (DT)
[   58.582932] Call trace:
[   58.582945]  show_stack+0x20/0x38 (C)
[   58.582976]  dump_stack_lvl+0x8c/0xd0
[   58.583007]  print_report+0x118/0x608
[   58.583035]  kasan_report+0xdc/0x128
[   58.583065]  kasan_check_range+0x100/0x1a8
[   58.583095]  __kasan_check_write+0x20/0x30
[   58.583128]  kasan_atomics_helper+0x14e4/0x4858
[   58.583157]  kasan_atomics+0x198/0x2e0
[   58.583183]  kunit_try_run_case+0x170/0x3f0
[   58.583215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.583251]  kthread+0x328/0x630
[   58.583284]  ret_from_fork+0x10/0x20
[   58.583316] 
[   58.653153] Allocated by task 312:
[   58.656540]  kasan_save_stack+0x3c/0x68
[   58.660358]  kasan_save_track+0x20/0x40
[   58.664177]  kasan_save_alloc_info+0x40/0x58
[   58.668431]  __kasan_kmalloc+0xd4/0xd8
[   58.672163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.676677]  kasan_atomics+0xb8/0x2e0
[   58.680323]  kunit_try_run_case+0x170/0x3f0
[   58.684489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.689958]  kthread+0x328/0x630
[   58.693169]  ret_from_fork+0x10/0x20
[   58.696728] 
[   58.698204] The buggy address belongs to the object at ffff000800c2d400
[   58.698204]  which belongs to the cache kmalloc-64 of size 64
[   58.710531] The buggy address is located 0 bytes to the right of
[   58.710531]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   58.723377] 
[   58.724853] The buggy address belongs to the physical page:
[   58.730410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   58.738396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.744905] page_type: f5(slab)
[   58.748038] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.755762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.763481] page dumped because: kasan: bad access detected
[   58.769037] 
[   58.770512] Memory state around the buggy address:
[   58.775290]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.782495]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.789700] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.796901]                                      ^
[   58.801678]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.808883]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.816085] ==================================================================
[   59.611637] ==================================================================
[   59.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   59.626055] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.633433] 
[   59.634915] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.634961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.634976] Hardware name: WinLink E850-96 board (DT)
[   59.634993] Call trace:
[   59.635006]  show_stack+0x20/0x38 (C)
[   59.635036]  dump_stack_lvl+0x8c/0xd0
[   59.635066]  print_report+0x118/0x608
[   59.635097]  kasan_report+0xdc/0x128
[   59.635124]  kasan_check_range+0x100/0x1a8
[   59.635156]  __kasan_check_write+0x20/0x30
[   59.635187]  kasan_atomics_helper+0x1644/0x4858
[   59.635217]  kasan_atomics+0x198/0x2e0
[   59.635246]  kunit_try_run_case+0x170/0x3f0
[   59.635280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.635318]  kthread+0x328/0x630
[   59.635349]  ret_from_fork+0x10/0x20
[   59.635381] 
[   59.705220] Allocated by task 312:
[   59.708607]  kasan_save_stack+0x3c/0x68
[   59.712425]  kasan_save_track+0x20/0x40
[   59.716245]  kasan_save_alloc_info+0x40/0x58
[   59.720498]  __kasan_kmalloc+0xd4/0xd8
[   59.724231]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.728745]  kasan_atomics+0xb8/0x2e0
[   59.732390]  kunit_try_run_case+0x170/0x3f0
[   59.736557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.742025]  kthread+0x328/0x630
[   59.745237]  ret_from_fork+0x10/0x20
[   59.748796] 
[   59.750272] The buggy address belongs to the object at ffff000800c2d400
[   59.750272]  which belongs to the cache kmalloc-64 of size 64
[   59.762598] The buggy address is located 0 bytes to the right of
[   59.762598]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.775445] 
[   59.776921] The buggy address belongs to the physical page:
[   59.782477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.790464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.796972] page_type: f5(slab)
[   59.800105] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.807830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.815549] page dumped because: kasan: bad access detected
[   59.821104] 
[   59.822580] Memory state around the buggy address:
[   59.827359]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.834562]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.841767] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.848968]                                      ^
[   59.853746]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.860951]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.868152] ==================================================================
[   54.869155] ==================================================================
[   54.876216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   54.883505] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.890883] 
[   54.892366] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.892411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.892426] Hardware name: WinLink E850-96 board (DT)
[   54.892444] Call trace:
[   54.892459]  show_stack+0x20/0x38 (C)
[   54.892490]  dump_stack_lvl+0x8c/0xd0
[   54.892522]  print_report+0x118/0x608
[   54.892552]  kasan_report+0xdc/0x128
[   54.892582]  kasan_check_range+0x100/0x1a8
[   54.892613]  __kasan_check_write+0x20/0x30
[   54.892645]  kasan_atomics_helper+0xf20/0x4858
[   54.892673]  kasan_atomics+0x198/0x2e0
[   54.892702]  kunit_try_run_case+0x170/0x3f0
[   54.892735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.892772]  kthread+0x328/0x630
[   54.892803]  ret_from_fork+0x10/0x20
[   54.892834] 
[   54.962583] Allocated by task 312:
[   54.965971]  kasan_save_stack+0x3c/0x68
[   54.969788]  kasan_save_track+0x20/0x40
[   54.973608]  kasan_save_alloc_info+0x40/0x58
[   54.977861]  __kasan_kmalloc+0xd4/0xd8
[   54.981594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.986107]  kasan_atomics+0xb8/0x2e0
[   54.989753]  kunit_try_run_case+0x170/0x3f0
[   54.993920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.999388]  kthread+0x328/0x630
[   55.002600]  ret_from_fork+0x10/0x20
[   55.006159] 
[   55.007636] The buggy address belongs to the object at ffff000800c2d400
[   55.007636]  which belongs to the cache kmalloc-64 of size 64
[   55.019961] The buggy address is located 0 bytes to the right of
[   55.019961]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.032808] 
[   55.034284] The buggy address belongs to the physical page:
[   55.039839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.047827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.054336] page_type: f5(slab)
[   55.057468] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.065192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.072911] page dumped because: kasan: bad access detected
[   55.078467] 
[   55.079942] Memory state around the buggy address:
[   55.084722]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.091925]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.099130] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.106331]                                      ^
[   55.111109]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.118314]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.125515] ==================================================================
[   46.456790] ==================================================================
[   46.463841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   46.471131] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.478509] 
[   46.479993] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.480046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.480064] Hardware name: WinLink E850-96 board (DT)
[   46.480082] Call trace:
[   46.480093]  show_stack+0x20/0x38 (C)
[   46.480124]  dump_stack_lvl+0x8c/0xd0
[   46.480156]  print_report+0x118/0x608
[   46.480186]  kasan_report+0xdc/0x128
[   46.480215]  kasan_check_range+0x100/0x1a8
[   46.480246]  __kasan_check_write+0x20/0x30
[   46.480277]  kasan_atomics_helper+0x3ac/0x4858
[   46.480305]  kasan_atomics+0x198/0x2e0
[   46.480333]  kunit_try_run_case+0x170/0x3f0
[   46.480365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.480402]  kthread+0x328/0x630
[   46.480434]  ret_from_fork+0x10/0x20
[   46.480468] 
[   46.550210] Allocated by task 312:
[   46.553595]  kasan_save_stack+0x3c/0x68
[   46.557414]  kasan_save_track+0x20/0x40
[   46.561234]  kasan_save_alloc_info+0x40/0x58
[   46.565487]  __kasan_kmalloc+0xd4/0xd8
[   46.569220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.573733]  kasan_atomics+0xb8/0x2e0
[   46.577379]  kunit_try_run_case+0x170/0x3f0
[   46.581546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.587015]  kthread+0x328/0x630
[   46.590226]  ret_from_fork+0x10/0x20
[   46.593785] 
[   46.595260] The buggy address belongs to the object at ffff000800c2d400
[   46.595260]  which belongs to the cache kmalloc-64 of size 64
[   46.607587] The buggy address is located 0 bytes to the right of
[   46.607587]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.620434] 
[   46.621910] The buggy address belongs to the physical page:
[   46.627469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.635453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.641962] page_type: f5(slab)
[   46.645094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.652819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.660538] page dumped because: kasan: bad access detected
[   46.666093] 
[   46.667568] Memory state around the buggy address:
[   46.672348]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.679552]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.686756] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.693958]                                      ^
[   46.698735]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.705940]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.713141] ==================================================================
[   54.605459] ==================================================================
[   54.612503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   54.619794] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   54.627172] 
[   54.628653] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   54.628699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.628716] Hardware name: WinLink E850-96 board (DT)
[   54.628737] Call trace:
[   54.628748]  show_stack+0x20/0x38 (C)
[   54.628779]  dump_stack_lvl+0x8c/0xd0
[   54.628811]  print_report+0x118/0x608
[   54.628841]  kasan_report+0xdc/0x128
[   54.628868]  kasan_check_range+0x100/0x1a8
[   54.628898]  __kasan_check_write+0x20/0x30
[   54.628930]  kasan_atomics_helper+0xeb8/0x4858
[   54.628958]  kasan_atomics+0x198/0x2e0
[   54.628985]  kunit_try_run_case+0x170/0x3f0
[   54.629017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.629054]  kthread+0x328/0x630
[   54.629086]  ret_from_fork+0x10/0x20
[   54.629119] 
[   54.698872] Allocated by task 312:
[   54.702257]  kasan_save_stack+0x3c/0x68
[   54.706076]  kasan_save_track+0x20/0x40
[   54.709896]  kasan_save_alloc_info+0x40/0x58
[   54.714150]  __kasan_kmalloc+0xd4/0xd8
[   54.717882]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.722396]  kasan_atomics+0xb8/0x2e0
[   54.726042]  kunit_try_run_case+0x170/0x3f0
[   54.730208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.735677]  kthread+0x328/0x630
[   54.738889]  ret_from_fork+0x10/0x20
[   54.742447] 
[   54.743923] The buggy address belongs to the object at ffff000800c2d400
[   54.743923]  which belongs to the cache kmalloc-64 of size 64
[   54.756250] The buggy address is located 0 bytes to the right of
[   54.756250]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   54.769096] 
[   54.770572] The buggy address belongs to the physical page:
[   54.776128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   54.784116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.790624] page_type: f5(slab)
[   54.793758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.801481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.809200] page dumped because: kasan: bad access detected
[   54.814755] 
[   54.816231] Memory state around the buggy address:
[   54.821011]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.828214]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.835419] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.842620]                                      ^
[   54.847398]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.854602]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.861803] ==================================================================
[   45.932518] ==================================================================
[   45.939545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   45.946833] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   45.954212] 
[   45.955696] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   45.955750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.955766] Hardware name: WinLink E850-96 board (DT)
[   45.955786] Call trace:
[   45.955798]  show_stack+0x20/0x38 (C)
[   45.955828]  dump_stack_lvl+0x8c/0xd0
[   45.955863]  print_report+0x118/0x608
[   45.955893]  kasan_report+0xdc/0x128
[   45.955922]  kasan_check_range+0x100/0x1a8
[   45.955954]  __kasan_check_write+0x20/0x30
[   45.955986]  kasan_atomics_helper+0x32c/0x4858
[   45.956015]  kasan_atomics+0x198/0x2e0
[   45.956042]  kunit_try_run_case+0x170/0x3f0
[   45.956076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.956114]  kthread+0x328/0x630
[   45.956147]  ret_from_fork+0x10/0x20
[   45.956181] 
[   46.025912] Allocated by task 312:
[   46.029299]  kasan_save_stack+0x3c/0x68
[   46.033117]  kasan_save_track+0x20/0x40
[   46.036936]  kasan_save_alloc_info+0x40/0x58
[   46.041190]  __kasan_kmalloc+0xd4/0xd8
[   46.044922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.049436]  kasan_atomics+0xb8/0x2e0
[   46.053082]  kunit_try_run_case+0x170/0x3f0
[   46.057248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.062717]  kthread+0x328/0x630
[   46.065928]  ret_from_fork+0x10/0x20
[   46.069488] 
[   46.070965] The buggy address belongs to the object at ffff000800c2d400
[   46.070965]  which belongs to the cache kmalloc-64 of size 64
[   46.083290] The buggy address is located 0 bytes to the right of
[   46.083290]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.096137] 
[   46.097612] The buggy address belongs to the physical page:
[   46.103171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.111156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.117664] page_type: f5(slab)
[   46.120797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.128521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.136240] page dumped because: kasan: bad access detected
[   46.141795] 
[   46.143271] Memory state around the buggy address:
[   46.148050]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.155254]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.162459] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.169660]                                      ^
[   46.174437]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.181642]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.188843] ==================================================================
[   59.875469] ==================================================================
[   59.882564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   59.889940] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.897231] 
[   59.898714] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.898760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.898776] Hardware name: WinLink E850-96 board (DT)
[   59.898795] Call trace:
[   59.898806]  show_stack+0x20/0x38 (C)
[   59.898839]  dump_stack_lvl+0x8c/0xd0
[   59.898868]  print_report+0x118/0x608
[   59.898897]  kasan_report+0xdc/0x128
[   59.898925]  __asan_report_load8_noabort+0x20/0x30
[   59.898957]  kasan_atomics_helper+0x3df4/0x4858
[   59.898986]  kasan_atomics+0x198/0x2e0
[   59.899015]  kunit_try_run_case+0x170/0x3f0
[   59.899047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.899085]  kthread+0x328/0x630
[   59.899115]  ret_from_fork+0x10/0x20
[   59.899147] 
[   59.965633] Allocated by task 312:
[   59.969020]  kasan_save_stack+0x3c/0x68
[   59.972838]  kasan_save_track+0x20/0x40
[   59.976657]  kasan_save_alloc_info+0x40/0x58
[   59.980911]  __kasan_kmalloc+0xd4/0xd8
[   59.984643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.989157]  kasan_atomics+0xb8/0x2e0
[   59.992803]  kunit_try_run_case+0x170/0x3f0
[   59.996970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.002438]  kthread+0x328/0x630
[   60.005650]  ret_from_fork+0x10/0x20
[   60.009209] 
[   60.010685] The buggy address belongs to the object at ffff000800c2d400
[   60.010685]  which belongs to the cache kmalloc-64 of size 64
[   60.023011] The buggy address is located 0 bytes to the right of
[   60.023011]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.035858] 
[   60.037334] The buggy address belongs to the physical page:
[   60.042890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.050877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.057385] page_type: f5(slab)
[   60.060518] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.068243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.075961] page dumped because: kasan: bad access detected
[   60.081517] 
[   60.082992] Memory state around the buggy address:
[   60.087772]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.094975]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.102180] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.109381]                                      ^
[   60.114159]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.121363]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.128565] ==================================================================
[   61.184513] ==================================================================
[   61.191573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   61.198948] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   61.206326] 
[   61.207808] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.207857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.207873] Hardware name: WinLink E850-96 board (DT)
[   61.207891] Call trace:
[   61.207906]  show_stack+0x20/0x38 (C)
[   61.207938]  dump_stack_lvl+0x8c/0xd0
[   61.207970]  print_report+0x118/0x608
[   61.208000]  kasan_report+0xdc/0x128
[   61.208028]  kasan_check_range+0x100/0x1a8
[   61.208058]  __kasan_check_write+0x20/0x30
[   61.208089]  kasan_atomics_helper+0x17ec/0x4858
[   61.208120]  kasan_atomics+0x198/0x2e0
[   61.208148]  kunit_try_run_case+0x170/0x3f0
[   61.208180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.208215]  kthread+0x328/0x630
[   61.208247]  ret_from_fork+0x10/0x20
[   61.208278] 
[   61.278113] Allocated by task 312:
[   61.281500]  kasan_save_stack+0x3c/0x68
[   61.285318]  kasan_save_track+0x20/0x40
[   61.289138]  kasan_save_alloc_info+0x40/0x58
[   61.293391]  __kasan_kmalloc+0xd4/0xd8
[   61.297124]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.301637]  kasan_atomics+0xb8/0x2e0
[   61.305283]  kunit_try_run_case+0x170/0x3f0
[   61.309450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.314918]  kthread+0x328/0x630
[   61.318130]  ret_from_fork+0x10/0x20
[   61.321689] 
[   61.323165] The buggy address belongs to the object at ffff000800c2d400
[   61.323165]  which belongs to the cache kmalloc-64 of size 64
[   61.335492] The buggy address is located 0 bytes to the right of
[   61.335492]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   61.348338] 
[   61.349814] The buggy address belongs to the physical page:
[   61.355371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   61.363357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.369866] page_type: f5(slab)
[   61.373000] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.380723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.388442] page dumped because: kasan: bad access detected
[   61.393997] 
[   61.395473] Memory state around the buggy address:
[   61.400252]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.407455]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.414660] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.421861]                                      ^
[   61.426639]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.433843]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.441045] ==================================================================
[   44.881315] ==================================================================
[   44.888348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   44.895634] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   44.902925] 
[   44.904412] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   44.904465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.904482] Hardware name: WinLink E850-96 board (DT)
[   44.904504] Call trace:
[   44.904517]  show_stack+0x20/0x38 (C)
[   44.904552]  dump_stack_lvl+0x8c/0xd0
[   44.904585]  print_report+0x118/0x608
[   44.904616]  kasan_report+0xdc/0x128
[   44.904644]  kasan_check_range+0x100/0x1a8
[   44.904675]  __kasan_check_read+0x20/0x30
[   44.904708]  kasan_atomics_helper+0x1ec/0x4858
[   44.904737]  kasan_atomics+0x198/0x2e0
[   44.904763]  kunit_try_run_case+0x170/0x3f0
[   44.904799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.904838]  kthread+0x328/0x630
[   44.904872]  ret_from_fork+0x10/0x20
[   44.904908] 
[   44.974538] Allocated by task 312:
[   44.977926]  kasan_save_stack+0x3c/0x68
[   44.981744]  kasan_save_track+0x20/0x40
[   44.985563]  kasan_save_alloc_info+0x40/0x58
[   44.989816]  __kasan_kmalloc+0xd4/0xd8
[   44.993549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.998063]  kasan_atomics+0xb8/0x2e0
[   45.001709]  kunit_try_run_case+0x170/0x3f0
[   45.005875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.011345]  kthread+0x328/0x630
[   45.014555]  ret_from_fork+0x10/0x20
[   45.018114] 
[   45.019591] The buggy address belongs to the object at ffff000800c2d400
[   45.019591]  which belongs to the cache kmalloc-64 of size 64
[   45.031918] The buggy address is located 0 bytes to the right of
[   45.031918]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   45.044763] 
[   45.046240] The buggy address belongs to the physical page:
[   45.051799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   45.059783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.066292] page_type: f5(slab)
[   45.069428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.077148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.084867] page dumped because: kasan: bad access detected
[   45.090422] 
[   45.091898] Memory state around the buggy address:
[   45.096679]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.103881]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.111085] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.118287]                                      ^
[   45.123064]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.130269]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.137472] ==================================================================
[   47.511594] ==================================================================
[   47.518686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   47.525976] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.533355] 
[   47.534837] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.534884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.534902] Hardware name: WinLink E850-96 board (DT)
[   47.534920] Call trace:
[   47.534933]  show_stack+0x20/0x38 (C)
[   47.534965]  dump_stack_lvl+0x8c/0xd0
[   47.534998]  print_report+0x118/0x608
[   47.535028]  kasan_report+0xdc/0x128
[   47.535057]  kasan_check_range+0x100/0x1a8
[   47.535088]  __kasan_check_write+0x20/0x30
[   47.535121]  kasan_atomics_helper+0x54c/0x4858
[   47.535150]  kasan_atomics+0x198/0x2e0
[   47.535178]  kunit_try_run_case+0x170/0x3f0
[   47.535212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.535246]  kthread+0x328/0x630
[   47.535279]  ret_from_fork+0x10/0x20
[   47.535310] 
[   47.605055] Allocated by task 312:
[   47.608440]  kasan_save_stack+0x3c/0x68
[   47.612260]  kasan_save_track+0x20/0x40
[   47.616079]  kasan_save_alloc_info+0x40/0x58
[   47.620333]  __kasan_kmalloc+0xd4/0xd8
[   47.624065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.628579]  kasan_atomics+0xb8/0x2e0
[   47.632225]  kunit_try_run_case+0x170/0x3f0
[   47.636391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.641860]  kthread+0x328/0x630
[   47.645072]  ret_from_fork+0x10/0x20
[   47.648631] 
[   47.650106] The buggy address belongs to the object at ffff000800c2d400
[   47.650106]  which belongs to the cache kmalloc-64 of size 64
[   47.662433] The buggy address is located 0 bytes to the right of
[   47.662433]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.675279] 
[   47.676755] The buggy address belongs to the physical page:
[   47.682311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.690300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.696807] page_type: f5(slab)
[   47.699940] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.707664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.715383] page dumped because: kasan: bad access detected
[   47.720938] 
[   47.722414] Memory state around the buggy address:
[   47.727194]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.734397]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.741602] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.748803]                                      ^
[   47.753580]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.760785]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.767986] ==================================================================
[   52.508944] ==================================================================
[   52.516007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   52.523297] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   52.530675] 
[   52.532158] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   52.532204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.532221] Hardware name: WinLink E850-96 board (DT)
[   52.532241] Call trace:
[   52.532255]  show_stack+0x20/0x38 (C)
[   52.532287]  dump_stack_lvl+0x8c/0xd0
[   52.532317]  print_report+0x118/0x608
[   52.532347]  kasan_report+0xdc/0x128
[   52.532373]  kasan_check_range+0x100/0x1a8
[   52.532404]  __kasan_check_write+0x20/0x30
[   52.532435]  kasan_atomics_helper+0xca0/0x4858
[   52.532463]  kasan_atomics+0x198/0x2e0
[   52.532492]  kunit_try_run_case+0x170/0x3f0
[   52.532527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.532565]  kthread+0x328/0x630
[   52.532597]  ret_from_fork+0x10/0x20
[   52.532629] 
[   52.602375] Allocated by task 312:
[   52.605763]  kasan_save_stack+0x3c/0x68
[   52.609580]  kasan_save_track+0x20/0x40
[   52.613400]  kasan_save_alloc_info+0x40/0x58
[   52.617653]  __kasan_kmalloc+0xd4/0xd8
[   52.621386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.625900]  kasan_atomics+0xb8/0x2e0
[   52.629546]  kunit_try_run_case+0x170/0x3f0
[   52.633712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.639181]  kthread+0x328/0x630
[   52.642393]  ret_from_fork+0x10/0x20
[   52.645951] 
[   52.647427] The buggy address belongs to the object at ffff000800c2d400
[   52.647427]  which belongs to the cache kmalloc-64 of size 64
[   52.659754] The buggy address is located 0 bytes to the right of
[   52.659754]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   52.672600] 
[   52.674076] The buggy address belongs to the physical page:
[   52.679632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   52.687619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.694128] page_type: f5(slab)
[   52.697262] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.704985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.712704] page dumped because: kasan: bad access detected
[   52.718259] 
[   52.719735] Memory state around the buggy address:
[   52.724514]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.731718]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.738922] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.746123]                                      ^
[   52.750901]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.758106]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.765307] ==================================================================
[   46.720522] ==================================================================
[   46.727552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   46.734843] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   46.742221] 
[   46.743703] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   46.743754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.743773] Hardware name: WinLink E850-96 board (DT)
[   46.743795] Call trace:
[   46.743809]  show_stack+0x20/0x38 (C)
[   46.743840]  dump_stack_lvl+0x8c/0xd0
[   46.743871]  print_report+0x118/0x608
[   46.743900]  kasan_report+0xdc/0x128
[   46.743928]  kasan_check_range+0x100/0x1a8
[   46.743959]  __kasan_check_write+0x20/0x30
[   46.743988]  kasan_atomics_helper+0x414/0x4858
[   46.744019]  kasan_atomics+0x198/0x2e0
[   46.744045]  kunit_try_run_case+0x170/0x3f0
[   46.744078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.744117]  kthread+0x328/0x630
[   46.744148]  ret_from_fork+0x10/0x20
[   46.744182] 
[   46.813921] Allocated by task 312:
[   46.817307]  kasan_save_stack+0x3c/0x68
[   46.821126]  kasan_save_track+0x20/0x40
[   46.824945]  kasan_save_alloc_info+0x40/0x58
[   46.829199]  __kasan_kmalloc+0xd4/0xd8
[   46.832931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.837445]  kasan_atomics+0xb8/0x2e0
[   46.841091]  kunit_try_run_case+0x170/0x3f0
[   46.845257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.850726]  kthread+0x328/0x630
[   46.853938]  ret_from_fork+0x10/0x20
[   46.857497] 
[   46.858975] The buggy address belongs to the object at ffff000800c2d400
[   46.858975]  which belongs to the cache kmalloc-64 of size 64
[   46.871299] The buggy address is located 0 bytes to the right of
[   46.871299]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   46.884145] 
[   46.885621] The buggy address belongs to the physical page:
[   46.891177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   46.899166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.905673] page_type: f5(slab)
[   46.908806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.916530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.924249] page dumped because: kasan: bad access detected
[   46.929805] 
[   46.931280] Memory state around the buggy address:
[   46.936058]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.943263]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.950468] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.957669]                                      ^
[   46.962446]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.969651]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.976852] ==================================================================
[   55.132857] ==================================================================
[   55.139927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   55.147216] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   55.154594] 
[   55.156077] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   55.156127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.156140] Hardware name: WinLink E850-96 board (DT)
[   55.156159] Call trace:
[   55.156171]  show_stack+0x20/0x38 (C)
[   55.156203]  dump_stack_lvl+0x8c/0xd0
[   55.156234]  print_report+0x118/0x608
[   55.156262]  kasan_report+0xdc/0x128
[   55.156291]  kasan_check_range+0x100/0x1a8
[   55.156323]  __kasan_check_write+0x20/0x30
[   55.156354]  kasan_atomics_helper+0xf88/0x4858
[   55.156385]  kasan_atomics+0x198/0x2e0
[   55.156413]  kunit_try_run_case+0x170/0x3f0
[   55.156446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.156484]  kthread+0x328/0x630
[   55.156514]  ret_from_fork+0x10/0x20
[   55.156546] 
[   55.226294] Allocated by task 312:
[   55.229682]  kasan_save_stack+0x3c/0x68
[   55.233499]  kasan_save_track+0x20/0x40
[   55.237319]  kasan_save_alloc_info+0x40/0x58
[   55.241572]  __kasan_kmalloc+0xd4/0xd8
[   55.245305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.249818]  kasan_atomics+0xb8/0x2e0
[   55.253464]  kunit_try_run_case+0x170/0x3f0
[   55.257631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.263100]  kthread+0x328/0x630
[   55.266311]  ret_from_fork+0x10/0x20
[   55.269870] 
[   55.271346] The buggy address belongs to the object at ffff000800c2d400
[   55.271346]  which belongs to the cache kmalloc-64 of size 64
[   55.283672] The buggy address is located 0 bytes to the right of
[   55.283672]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   55.296519] 
[   55.297995] The buggy address belongs to the physical page:
[   55.303551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   55.311538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.318047] page_type: f5(slab)
[   55.321179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.328904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.336623] page dumped because: kasan: bad access detected
[   55.342178] 
[   55.343654] Memory state around the buggy address:
[   55.348433]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.355636]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.362841] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.370043]                                      ^
[   55.374820]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.382025]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.389226] ==================================================================
[   50.936574] ==================================================================
[   50.943635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   50.950925] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   50.958303] 
[   50.959786] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   50.959833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.959848] Hardware name: WinLink E850-96 board (DT)
[   50.959868] Call trace:
[   50.959882]  show_stack+0x20/0x38 (C)
[   50.959914]  dump_stack_lvl+0x8c/0xd0
[   50.959947]  print_report+0x118/0x608
[   50.959977]  kasan_report+0xdc/0x128
[   50.960006]  kasan_check_range+0x100/0x1a8
[   50.960037]  __kasan_check_write+0x20/0x30
[   50.960068]  kasan_atomics_helper+0xad4/0x4858
[   50.960096]  kasan_atomics+0x198/0x2e0
[   50.960124]  kunit_try_run_case+0x170/0x3f0
[   50.960158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.960198]  kthread+0x328/0x630
[   50.960230]  ret_from_fork+0x10/0x20
[   50.960261] 
[   51.030003] Allocated by task 312:
[   51.033390]  kasan_save_stack+0x3c/0x68
[   51.037209]  kasan_save_track+0x20/0x40
[   51.041027]  kasan_save_alloc_info+0x40/0x58
[   51.045281]  __kasan_kmalloc+0xd4/0xd8
[   51.049014]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.053527]  kasan_atomics+0xb8/0x2e0
[   51.057173]  kunit_try_run_case+0x170/0x3f0
[   51.061340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.066808]  kthread+0x328/0x630
[   51.070020]  ret_from_fork+0x10/0x20
[   51.073579] 
[   51.075056] The buggy address belongs to the object at ffff000800c2d400
[   51.075056]  which belongs to the cache kmalloc-64 of size 64
[   51.087381] The buggy address is located 0 bytes to the right of
[   51.087381]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.100228] 
[   51.101704] The buggy address belongs to the physical page:
[   51.107260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.115247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.121756] page_type: f5(slab)
[   51.124890] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.140332] page dumped because: kasan: bad access detected
[   51.145887] 
[   51.147363] Memory state around the buggy address:
[   51.152142]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.159345]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.166550] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.173751]                                      ^
[   51.178529]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.185734]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.192935] ==================================================================
[   59.087341] ==================================================================
[   59.094380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   59.101758] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   59.109135] 
[   59.110617] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   59.110668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.110684] Hardware name: WinLink E850-96 board (DT)
[   59.110705] Call trace:
[   59.110718]  show_stack+0x20/0x38 (C)
[   59.110750]  dump_stack_lvl+0x8c/0xd0
[   59.110782]  print_report+0x118/0x608
[   59.110810]  kasan_report+0xdc/0x128
[   59.110839]  kasan_check_range+0x100/0x1a8
[   59.110869]  __kasan_check_write+0x20/0x30
[   59.110901]  kasan_atomics_helper+0x15b4/0x4858
[   59.110931]  kasan_atomics+0x198/0x2e0
[   59.110957]  kunit_try_run_case+0x170/0x3f0
[   59.110990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.111027]  kthread+0x328/0x630
[   59.111058]  ret_from_fork+0x10/0x20
[   59.111088] 
[   59.180923] Allocated by task 312:
[   59.184310]  kasan_save_stack+0x3c/0x68
[   59.188127]  kasan_save_track+0x20/0x40
[   59.191947]  kasan_save_alloc_info+0x40/0x58
[   59.196200]  __kasan_kmalloc+0xd4/0xd8
[   59.199933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.204446]  kasan_atomics+0xb8/0x2e0
[   59.208092]  kunit_try_run_case+0x170/0x3f0
[   59.212259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.217728]  kthread+0x328/0x630
[   59.220939]  ret_from_fork+0x10/0x20
[   59.224499] 
[   59.225974] The buggy address belongs to the object at ffff000800c2d400
[   59.225974]  which belongs to the cache kmalloc-64 of size 64
[   59.238301] The buggy address is located 0 bytes to the right of
[   59.238301]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   59.251147] 
[   59.252623] The buggy address belongs to the physical page:
[   59.258181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   59.266166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.272676] page_type: f5(slab)
[   59.275810] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.283532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.291251] page dumped because: kasan: bad access detected
[   59.296806] 
[   59.298282] Memory state around the buggy address:
[   59.303062]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.310265]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.317469] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.324671]                                      ^
[   59.329449]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.336653]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.343854] ==================================================================
[   57.243617] ==================================================================
[   57.250660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   57.258035] Write of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   57.265413] 
[   57.266896] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   57.266945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.266962] Hardware name: WinLink E850-96 board (DT)
[   57.266981] Call trace:
[   57.266993]  show_stack+0x20/0x38 (C)
[   57.267025]  dump_stack_lvl+0x8c/0xd0
[   57.267056]  print_report+0x118/0x608
[   57.267085]  kasan_report+0xdc/0x128
[   57.267113]  kasan_check_range+0x100/0x1a8
[   57.267144]  __kasan_check_write+0x20/0x30
[   57.267175]  kasan_atomics_helper+0x12d8/0x4858
[   57.267204]  kasan_atomics+0x198/0x2e0
[   57.267233]  kunit_try_run_case+0x170/0x3f0
[   57.267264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.267302]  kthread+0x328/0x630
[   57.267333]  ret_from_fork+0x10/0x20
[   57.267366] 
[   57.337201] Allocated by task 312:
[   57.340587]  kasan_save_stack+0x3c/0x68
[   57.344405]  kasan_save_track+0x20/0x40
[   57.348225]  kasan_save_alloc_info+0x40/0x58
[   57.352478]  __kasan_kmalloc+0xd4/0xd8
[   57.356210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.360724]  kasan_atomics+0xb8/0x2e0
[   57.364370]  kunit_try_run_case+0x170/0x3f0
[   57.368537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.374005]  kthread+0x328/0x630
[   57.377217]  ret_from_fork+0x10/0x20
[   57.380776] 
[   57.382252] The buggy address belongs to the object at ffff000800c2d400
[   57.382252]  which belongs to the cache kmalloc-64 of size 64
[   57.394578] The buggy address is located 0 bytes to the right of
[   57.394578]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   57.407425] 
[   57.408901] The buggy address belongs to the physical page:
[   57.414456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   57.422444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.428954] page_type: f5(slab)
[   57.432088] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.439810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.447530] page dumped because: kasan: bad access detected
[   57.453084] 
[   57.454560] Memory state around the buggy address:
[   57.459338]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.466542]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.473747] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.480948]                                      ^
[   57.485726]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.492931]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.500132] ==================================================================
[   60.399820] ==================================================================
[   60.406862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   60.414238] Read of size 8 at addr ffff000800c2d430 by task kunit_try_catch/312
[   60.421529] 
[   60.423012] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   60.423063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.423077] Hardware name: WinLink E850-96 board (DT)
[   60.423098] Call trace:
[   60.423111]  show_stack+0x20/0x38 (C)
[   60.423145]  dump_stack_lvl+0x8c/0xd0
[   60.423174]  print_report+0x118/0x608
[   60.423203]  kasan_report+0xdc/0x128
[   60.423232]  __asan_report_load8_noabort+0x20/0x30
[   60.423267]  kasan_atomics_helper+0x3e10/0x4858
[   60.423296]  kasan_atomics+0x198/0x2e0
[   60.423324]  kunit_try_run_case+0x170/0x3f0
[   60.423355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.423393]  kthread+0x328/0x630
[   60.423423]  ret_from_fork+0x10/0x20
[   60.423457] 
[   60.489930] Allocated by task 312:
[   60.493318]  kasan_save_stack+0x3c/0x68
[   60.497136]  kasan_save_track+0x20/0x40
[   60.500955]  kasan_save_alloc_info+0x40/0x58
[   60.505208]  __kasan_kmalloc+0xd4/0xd8
[   60.508941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.513455]  kasan_atomics+0xb8/0x2e0
[   60.517101]  kunit_try_run_case+0x170/0x3f0
[   60.521267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.526736]  kthread+0x328/0x630
[   60.529948]  ret_from_fork+0x10/0x20
[   60.533507] 
[   60.534982] The buggy address belongs to the object at ffff000800c2d400
[   60.534982]  which belongs to the cache kmalloc-64 of size 64
[   60.547309] The buggy address is located 0 bytes to the right of
[   60.547309]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   60.560155] 
[   60.561631] The buggy address belongs to the physical page:
[   60.567187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   60.575175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.581683] page_type: f5(slab)
[   60.584816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.592540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.600259] page dumped because: kasan: bad access detected
[   60.605814] 
[   60.607290] Memory state around the buggy address:
[   60.612070]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.619273]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.626477] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.633679]                                      ^
[   60.638456]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.645661]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.652863] ==================================================================
[   51.724437] ==================================================================
[   51.731471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   51.738847] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   51.746138] 
[   51.747622] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   51.747671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.747686] Hardware name: WinLink E850-96 board (DT)
[   51.747706] Call trace:
[   51.747721]  show_stack+0x20/0x38 (C)
[   51.747753]  dump_stack_lvl+0x8c/0xd0
[   51.747786]  print_report+0x118/0x608
[   51.747817]  kasan_report+0xdc/0x128
[   51.747845]  __asan_report_load4_noabort+0x20/0x30
[   51.747879]  kasan_atomics_helper+0x3dbc/0x4858
[   51.747908]  kasan_atomics+0x198/0x2e0
[   51.747937]  kunit_try_run_case+0x170/0x3f0
[   51.747970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.748007]  kthread+0x328/0x630
[   51.748038]  ret_from_fork+0x10/0x20
[   51.748067] 
[   51.814540] Allocated by task 312:
[   51.817927]  kasan_save_stack+0x3c/0x68
[   51.821745]  kasan_save_track+0x20/0x40
[   51.825564]  kasan_save_alloc_info+0x40/0x58
[   51.829818]  __kasan_kmalloc+0xd4/0xd8
[   51.833551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.838064]  kasan_atomics+0xb8/0x2e0
[   51.841710]  kunit_try_run_case+0x170/0x3f0
[   51.845877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.851345]  kthread+0x328/0x630
[   51.854557]  ret_from_fork+0x10/0x20
[   51.858116] 
[   51.859591] The buggy address belongs to the object at ffff000800c2d400
[   51.859591]  which belongs to the cache kmalloc-64 of size 64
[   51.871918] The buggy address is located 0 bytes to the right of
[   51.871918]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   51.884765] 
[   51.886241] The buggy address belongs to the physical page:
[   51.891796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   51.899784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.906292] page_type: f5(slab)
[   51.909428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.917149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.924868] page dumped because: kasan: bad access detected
[   51.930424] 
[   51.931899] Memory state around the buggy address:
[   51.936678]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.943882]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.951087] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.958288]                                      ^
[   51.963066]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.970271]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.977472] ==================================================================
[   48.566473] ==================================================================
[   48.573531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   48.580822] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   48.588200] 
[   48.589681] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   48.589728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.589748] Hardware name: WinLink E850-96 board (DT)
[   48.589766] Call trace:
[   48.589779]  show_stack+0x20/0x38 (C)
[   48.589810]  dump_stack_lvl+0x8c/0xd0
[   48.589842]  print_report+0x118/0x608
[   48.589871]  kasan_report+0xdc/0x128
[   48.589899]  kasan_check_range+0x100/0x1a8
[   48.589930]  __kasan_check_write+0x20/0x30
[   48.589962]  kasan_atomics_helper+0x6ec/0x4858
[   48.589991]  kasan_atomics+0x198/0x2e0
[   48.590019]  kunit_try_run_case+0x170/0x3f0
[   48.590054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.590093]  kthread+0x328/0x630
[   48.590124]  ret_from_fork+0x10/0x20
[   48.590156] 
[   48.659900] Allocated by task 312:
[   48.663287]  kasan_save_stack+0x3c/0x68
[   48.667105]  kasan_save_track+0x20/0x40
[   48.670924]  kasan_save_alloc_info+0x40/0x58
[   48.675178]  __kasan_kmalloc+0xd4/0xd8
[   48.678910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.683424]  kasan_atomics+0xb8/0x2e0
[   48.687070]  kunit_try_run_case+0x170/0x3f0
[   48.691236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.696705]  kthread+0x328/0x630
[   48.699917]  ret_from_fork+0x10/0x20
[   48.703476] 
[   48.704951] The buggy address belongs to the object at ffff000800c2d400
[   48.704951]  which belongs to the cache kmalloc-64 of size 64
[   48.717278] The buggy address is located 0 bytes to the right of
[   48.717278]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   48.730125] 
[   48.731601] The buggy address belongs to the physical page:
[   48.737158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   48.745144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.751652] page_type: f5(slab)
[   48.754785] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.762510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.770228] page dumped because: kasan: bad access detected
[   48.775783] 
[   48.777259] Memory state around the buggy address:
[   48.782039]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.789242]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.796447] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.803648]                                      ^
[   48.808426]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.815630]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.822832] ==================================================================
[   49.621312] ==================================================================
[   49.628377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   49.635754] Read of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   49.643045] 
[   49.644528] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   49.644576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.644591] Hardware name: WinLink E850-96 board (DT)
[   49.644610] Call trace:
[   49.644623]  show_stack+0x20/0x38 (C)
[   49.644655]  dump_stack_lvl+0x8c/0xd0
[   49.644687]  print_report+0x118/0x608
[   49.644717]  kasan_report+0xdc/0x128
[   49.644745]  __asan_report_load4_noabort+0x20/0x30
[   49.644780]  kasan_atomics_helper+0x42d8/0x4858
[   49.644808]  kasan_atomics+0x198/0x2e0
[   49.644834]  kunit_try_run_case+0x170/0x3f0
[   49.644867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.644904]  kthread+0x328/0x630
[   49.644937]  ret_from_fork+0x10/0x20
[   49.644972] 
[   49.711448] Allocated by task 312:
[   49.714834]  kasan_save_stack+0x3c/0x68
[   49.718652]  kasan_save_track+0x20/0x40
[   49.722471]  kasan_save_alloc_info+0x40/0x58
[   49.726725]  __kasan_kmalloc+0xd4/0xd8
[   49.730457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.734971]  kasan_atomics+0xb8/0x2e0
[   49.738616]  kunit_try_run_case+0x170/0x3f0
[   49.742783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.748252]  kthread+0x328/0x630
[   49.751464]  ret_from_fork+0x10/0x20
[   49.755023] 
[   49.756500] The buggy address belongs to the object at ffff000800c2d400
[   49.756500]  which belongs to the cache kmalloc-64 of size 64
[   49.768825] The buggy address is located 0 bytes to the right of
[   49.768825]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   49.781671] 
[   49.783147] The buggy address belongs to the physical page:
[   49.788703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   49.796691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.803199] page_type: f5(slab)
[   49.806333] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.814056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.821775] page dumped because: kasan: bad access detected
[   49.827330] 
[   49.828806] Memory state around the buggy address:
[   49.833586]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.840789]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.847993] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.855195]                                      ^
[   49.859973]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.867177]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.874378] ==================================================================
[   47.775357] ==================================================================
[   47.782399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   47.789688] Write of size 4 at addr ffff000800c2d430 by task kunit_try_catch/312
[   47.797066] 
[   47.798548] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   47.798597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.798616] Hardware name: WinLink E850-96 board (DT)
[   47.798635] Call trace:
[   47.798648]  show_stack+0x20/0x38 (C)
[   47.798680]  dump_stack_lvl+0x8c/0xd0
[   47.798712]  print_report+0x118/0x608
[   47.798740]  kasan_report+0xdc/0x128
[   47.798767]  kasan_check_range+0x100/0x1a8
[   47.798799]  __kasan_check_write+0x20/0x30
[   47.798831]  kasan_atomics_helper+0x5b4/0x4858
[   47.798860]  kasan_atomics+0x198/0x2e0
[   47.798887]  kunit_try_run_case+0x170/0x3f0
[   47.798919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.798957]  kthread+0x328/0x630
[   47.798989]  ret_from_fork+0x10/0x20
[   47.799021] 
[   47.868766] Allocated by task 312:
[   47.872153]  kasan_save_stack+0x3c/0x68
[   47.875971]  kasan_save_track+0x20/0x40
[   47.879790]  kasan_save_alloc_info+0x40/0x58
[   47.884044]  __kasan_kmalloc+0xd4/0xd8
[   47.887776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.892290]  kasan_atomics+0xb8/0x2e0
[   47.895936]  kunit_try_run_case+0x170/0x3f0
[   47.900103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.905571]  kthread+0x328/0x630
[   47.908783]  ret_from_fork+0x10/0x20
[   47.912342] 
[   47.913817] The buggy address belongs to the object at ffff000800c2d400
[   47.913817]  which belongs to the cache kmalloc-64 of size 64
[   47.926144] The buggy address is located 0 bytes to the right of
[   47.926144]  allocated 48-byte region [ffff000800c2d400, ffff000800c2d430)
[   47.938991] 
[   47.940467] The buggy address belongs to the physical page:
[   47.946022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2d
[   47.954009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.960518] page_type: f5(slab)
[   47.963653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.971375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.979094] page dumped because: kasan: bad access detected
[   47.984650] 
[   47.986126] Memory state around the buggy address:
[   47.990905]  ffff000800c2d300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.998108]  ffff000800c2d380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.005313] >ffff000800c2d400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.012514]                                      ^
[   48.017292]  ffff000800c2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.024497]  ffff000800c2d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.031697] ==================================================================

[   21.023168] ==================================================================
[   21.023320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.023408] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.023551] 
[   21.023588] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.023693] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.023785] Hardware name: linux,dummy-virt (DT)
[   21.023818] Call trace:
[   21.023844]  show_stack+0x20/0x38 (C)
[   21.024051]  dump_stack_lvl+0x8c/0xd0
[   21.024119]  print_report+0x118/0x608
[   21.024167]  kasan_report+0xdc/0x128
[   21.024234]  kasan_check_range+0x100/0x1a8
[   21.024288]  __kasan_check_read+0x20/0x30
[   21.024342]  kasan_atomics_helper+0xdd4/0x4858
[   21.024405]  kasan_atomics+0x198/0x2e0
[   21.024510]  kunit_try_run_case+0x170/0x3f0
[   21.024574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.024649]  kthread+0x328/0x630
[   21.024706]  ret_from_fork+0x10/0x20
[   21.024758] 
[   21.024780] Allocated by task 268:
[   21.024812]  kasan_save_stack+0x3c/0x68
[   21.024854]  kasan_save_track+0x20/0x40
[   21.024894]  kasan_save_alloc_info+0x40/0x58
[   21.024936]  __kasan_kmalloc+0xd4/0xd8
[   21.024976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.025022]  kasan_atomics+0xb8/0x2e0
[   21.025069]  kunit_try_run_case+0x170/0x3f0
[   21.025112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.025162]  kthread+0x328/0x630
[   21.025201]  ret_from_fork+0x10/0x20
[   21.025240] 
[   21.025261] The buggy address belongs to the object at fff00000c3f85080
[   21.025261]  which belongs to the cache kmalloc-64 of size 64
[   21.025320] The buggy address is located 0 bytes to the right of
[   21.025320]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.025822] 
[   21.026125] The buggy address belongs to the physical page:
[   21.026421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.026509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.026652] page_type: f5(slab)
[   21.026705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.026866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.026934] page dumped because: kasan: bad access detected
[   21.027004] 
[   21.027205] Memory state around the buggy address:
[   21.027254]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.027312]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.027394] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.027527]                                      ^
[   21.027608]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027685]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.027829] ==================================================================
[   21.040542] ==================================================================
[   21.040711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.040885] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.040977] 
[   21.041027] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.041116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.041263] Hardware name: linux,dummy-virt (DT)
[   21.041310] Call trace:
[   21.041336]  show_stack+0x20/0x38 (C)
[   21.041497]  dump_stack_lvl+0x8c/0xd0
[   21.041695]  print_report+0x118/0x608
[   21.041754]  kasan_report+0xdc/0x128
[   21.041936]  __asan_report_store8_noabort+0x20/0x30
[   21.042010]  kasan_atomics_helper+0x3e5c/0x4858
[   21.042125]  kasan_atomics+0x198/0x2e0
[   21.042371]  kunit_try_run_case+0x170/0x3f0
[   21.042464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.042635]  kthread+0x328/0x630
[   21.042715]  ret_from_fork+0x10/0x20
[   21.042897] 
[   21.042934] Allocated by task 268:
[   21.042966]  kasan_save_stack+0x3c/0x68
[   21.043044]  kasan_save_track+0x20/0x40
[   21.043085]  kasan_save_alloc_info+0x40/0x58
[   21.043364]  __kasan_kmalloc+0xd4/0xd8
[   21.043414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.043599]  kasan_atomics+0xb8/0x2e0
[   21.043666]  kunit_try_run_case+0x170/0x3f0
[   21.043746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.044003]  kthread+0x328/0x630
[   21.044054]  ret_from_fork+0x10/0x20
[   21.044129] 
[   21.044252] The buggy address belongs to the object at fff00000c3f85080
[   21.044252]  which belongs to the cache kmalloc-64 of size 64
[   21.044340] The buggy address is located 0 bytes to the right of
[   21.044340]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.044502] 
[   21.044524] The buggy address belongs to the physical page:
[   21.044557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.044640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.044875] page_type: f5(slab)
[   21.044924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.045004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.045080] page dumped because: kasan: bad access detected
[   21.045299] 
[   21.045369] Memory state around the buggy address:
[   21.045408]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.045578]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.045630] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.045672]                                      ^
[   21.045962]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046088]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046209] ==================================================================
[   21.210735] ==================================================================
[   21.210788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.210985] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.211045] 
[   21.211076] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.211165] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.211255] Hardware name: linux,dummy-virt (DT)
[   21.211359] Call trace:
[   21.211387]  show_stack+0x20/0x38 (C)
[   21.211438]  dump_stack_lvl+0x8c/0xd0
[   21.211491]  print_report+0x118/0x608
[   21.211565]  kasan_report+0xdc/0x128
[   21.211775]  kasan_check_range+0x100/0x1a8
[   21.211900]  __kasan_check_write+0x20/0x30
[   21.211967]  kasan_atomics_helper+0x17ec/0x4858
[   21.212026]  kasan_atomics+0x198/0x2e0
[   21.212246]  kunit_try_run_case+0x170/0x3f0
[   21.212312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.212439]  kthread+0x328/0x630
[   21.212495]  ret_from_fork+0x10/0x20
[   21.212637] 
[   21.212707] Allocated by task 268:
[   21.212774]  kasan_save_stack+0x3c/0x68
[   21.212838]  kasan_save_track+0x20/0x40
[   21.212963]  kasan_save_alloc_info+0x40/0x58
[   21.213006]  __kasan_kmalloc+0xd4/0xd8
[   21.213047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.213093]  kasan_atomics+0xb8/0x2e0
[   21.213130]  kunit_try_run_case+0x170/0x3f0
[   21.213174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.213479]  kthread+0x328/0x630
[   21.213596]  ret_from_fork+0x10/0x20
[   21.213782] 
[   21.213852] The buggy address belongs to the object at fff00000c3f85080
[   21.213852]  which belongs to the cache kmalloc-64 of size 64
[   21.214006] The buggy address is located 0 bytes to the right of
[   21.214006]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.214368] 
[   21.214411] The buggy address belongs to the physical page:
[   21.214446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.214502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.214553] page_type: f5(slab)
[   21.214917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.215252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.215514] page dumped because: kasan: bad access detected
[   21.215592] 
[   21.215724] Memory state around the buggy address:
[   21.215946]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.216084]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.216149] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.216187]                                      ^
[   21.216545]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216716]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.216815] ==================================================================
[   21.016144] ==================================================================
[   21.016377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.016453] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.016532] 
[   21.016568] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.016757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.016866] Hardware name: linux,dummy-virt (DT)
[   21.016956] Call trace:
[   21.016998]  show_stack+0x20/0x38 (C)
[   21.017051]  dump_stack_lvl+0x8c/0xd0
[   21.017121]  print_report+0x118/0x608
[   21.017173]  kasan_report+0xdc/0x128
[   21.017388]  __asan_report_load4_noabort+0x20/0x30
[   21.017508]  kasan_atomics_helper+0x3e04/0x4858
[   21.017790]  kasan_atomics+0x198/0x2e0
[   21.017953]  kunit_try_run_case+0x170/0x3f0
[   21.018051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.018246]  kthread+0x328/0x630
[   21.018300]  ret_from_fork+0x10/0x20
[   21.018556] 
[   21.018584] Allocated by task 268:
[   21.018617]  kasan_save_stack+0x3c/0x68
[   21.018691]  kasan_save_track+0x20/0x40
[   21.018766]  kasan_save_alloc_info+0x40/0x58
[   21.018872]  __kasan_kmalloc+0xd4/0xd8
[   21.018938]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.019179]  kasan_atomics+0xb8/0x2e0
[   21.019335]  kunit_try_run_case+0x170/0x3f0
[   21.019413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.019551]  kthread+0x328/0x630
[   21.019636]  ret_from_fork+0x10/0x20
[   21.019678] 
[   21.019699] The buggy address belongs to the object at fff00000c3f85080
[   21.019699]  which belongs to the cache kmalloc-64 of size 64
[   21.020028] The buggy address is located 0 bytes to the right of
[   21.020028]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.020146] 
[   21.020363] The buggy address belongs to the physical page:
[   21.020425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.020606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.020701] page_type: f5(slab)
[   21.020799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.020853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.021019] page dumped because: kasan: bad access detected
[   21.021062] 
[   21.021115] Memory state around the buggy address:
[   21.021253]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.021327]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.021657] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.021840]                                      ^
[   21.021921]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.021997]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.022118] ==================================================================
[   21.204497] ==================================================================
[   21.204562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.204639] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.204692] 
[   21.204742] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.204827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.204933] Hardware name: linux,dummy-virt (DT)
[   21.205017] Call trace:
[   21.205075]  show_stack+0x20/0x38 (C)
[   21.205165]  dump_stack_lvl+0x8c/0xd0
[   21.205317]  print_report+0x118/0x608
[   21.205381]  kasan_report+0xdc/0x128
[   21.205428]  __asan_report_load8_noabort+0x20/0x30
[   21.205494]  kasan_atomics_helper+0x3e20/0x4858
[   21.205546]  kasan_atomics+0x198/0x2e0
[   21.205718]  kunit_try_run_case+0x170/0x3f0
[   21.205948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.206145]  kthread+0x328/0x630
[   21.206228]  ret_from_fork+0x10/0x20
[   21.206280] 
[   21.206302] Allocated by task 268:
[   21.206331]  kasan_save_stack+0x3c/0x68
[   21.206384]  kasan_save_track+0x20/0x40
[   21.206425]  kasan_save_alloc_info+0x40/0x58
[   21.206913]  __kasan_kmalloc+0xd4/0xd8
[   21.207027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.207192]  kasan_atomics+0xb8/0x2e0
[   21.207395]  kunit_try_run_case+0x170/0x3f0
[   21.207439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207550]  kthread+0x328/0x630
[   21.207648]  ret_from_fork+0x10/0x20
[   21.207821] 
[   21.207923] The buggy address belongs to the object at fff00000c3f85080
[   21.207923]  which belongs to the cache kmalloc-64 of size 64
[   21.208019] The buggy address is located 0 bytes to the right of
[   21.208019]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.208087] 
[   21.208108] The buggy address belongs to the physical page:
[   21.208295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.208362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.208457] page_type: f5(slab)
[   21.208623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.208716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.208971] page dumped because: kasan: bad access detected
[   21.209235] 
[   21.209358] Memory state around the buggy address:
[   21.209436]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.209579]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.209652] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.209691]                                      ^
[   21.209726]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209787]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.209828] ==================================================================
[   20.968369] ==================================================================
[   20.968434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   20.968502] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.968568] 
[   20.968600] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.968688] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.968747] Hardware name: linux,dummy-virt (DT)
[   20.968782] Call trace:
[   20.968818]  show_stack+0x20/0x38 (C)
[   20.968909]  dump_stack_lvl+0x8c/0xd0
[   20.968966]  print_report+0x118/0x608
[   20.969021]  kasan_report+0xdc/0x128
[   20.969068]  kasan_check_range+0x100/0x1a8
[   20.969119]  __kasan_check_write+0x20/0x30
[   20.969308]  kasan_atomics_helper+0xb70/0x4858
[   20.969414]  kasan_atomics+0x198/0x2e0
[   20.969502]  kunit_try_run_case+0x170/0x3f0
[   20.969630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.969726]  kthread+0x328/0x630
[   20.969833]  ret_from_fork+0x10/0x20
[   20.969976] 
[   20.970016] Allocated by task 268:
[   20.970081]  kasan_save_stack+0x3c/0x68
[   20.970259]  kasan_save_track+0x20/0x40
[   20.970429]  kasan_save_alloc_info+0x40/0x58
[   20.970496]  __kasan_kmalloc+0xd4/0xd8
[   20.970538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.970591]  kasan_atomics+0xb8/0x2e0
[   20.970630]  kunit_try_run_case+0x170/0x3f0
[   20.970673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.970723]  kthread+0x328/0x630
[   20.970978]  ret_from_fork+0x10/0x20
[   20.971040] 
[   20.971158] The buggy address belongs to the object at fff00000c3f85080
[   20.971158]  which belongs to the cache kmalloc-64 of size 64
[   20.971466] The buggy address is located 0 bytes to the right of
[   20.971466]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.971624] 
[   20.971928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.972875] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.974578] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.975818]  kunit_try_run_case+0x170/0x3f0
[   20.976131] 
[   20.976304] page_type: f5(slab)
[   20.977932]                                      ^
[   20.979750] 
[   20.981367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.983448] The buggy address is located 0 bytes to the right of
[   20.983448]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.984542]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.984934] ==================================================================
[   21.028166] ==================================================================
[   21.028308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.028382] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.028435] 
[   21.028470] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.028810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.028925] Hardware name: linux,dummy-virt (DT)
[   21.028961] Call trace:
[   21.029032]  show_stack+0x20/0x38 (C)
[   21.029109]  dump_stack_lvl+0x8c/0xd0
[   21.029175]  print_report+0x118/0x608
[   21.029313]  kasan_report+0xdc/0x128
[   21.029376]  __asan_report_load8_noabort+0x20/0x30
[   21.029432]  kasan_atomics_helper+0x3f58/0x4858
[   21.029490]  kasan_atomics+0x198/0x2e0
[   21.029539]  kunit_try_run_case+0x170/0x3f0
[   21.029864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.030070]  kthread+0x328/0x630
[   21.030313]  ret_from_fork+0x10/0x20
[   21.030549] 
[   21.030573] Allocated by task 268:
[   21.030629]  kasan_save_stack+0x3c/0x68
[   21.030682]  kasan_save_track+0x20/0x40
[   21.030911]  kasan_save_alloc_info+0x40/0x58
[   21.031140]  __kasan_kmalloc+0xd4/0xd8
[   21.031220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.031296]  kasan_atomics+0xb8/0x2e0
[   21.031590]  kunit_try_run_case+0x170/0x3f0
[   21.031766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.031841]  kthread+0x328/0x630
[   21.031905]  ret_from_fork+0x10/0x20
[   21.032139] 
[   21.032167] The buggy address belongs to the object at fff00000c3f85080
[   21.032167]  which belongs to the cache kmalloc-64 of size 64
[   21.032253] The buggy address is located 0 bytes to the right of
[   21.032253]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.032373] 
[   21.032417] The buggy address belongs to the physical page:
[   21.032685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.032880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.032936] page_type: f5(slab)
[   21.032985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.033214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.033290] page dumped because: kasan: bad access detected
[   21.033325] 
[   21.033371] Memory state around the buggy address:
[   21.033444]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.033727]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.033780] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.033961]                                      ^
[   21.034184]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034241]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034331] ==================================================================
[   20.946026] ==================================================================
[   20.946079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.946131] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.946184] 
[   20.946215] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.946646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.946729] Hardware name: linux,dummy-virt (DT)
[   20.946800] Call trace:
[   20.946840]  show_stack+0x20/0x38 (C)
[   20.946926]  dump_stack_lvl+0x8c/0xd0
[   20.947110]  print_report+0x118/0x608
[   20.947162]  kasan_report+0xdc/0x128
[   20.947243]  kasan_check_range+0x100/0x1a8
[   20.947366]  __kasan_check_write+0x20/0x30
[   20.947428]  kasan_atomics_helper+0x99c/0x4858
[   20.947479]  kasan_atomics+0x198/0x2e0
[   20.947534]  kunit_try_run_case+0x170/0x3f0
[   20.947598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947662]  kthread+0x328/0x630
[   20.947728]  ret_from_fork+0x10/0x20
[   20.947794] 
[   20.947821] Allocated by task 268:
[   20.947860]  kasan_save_stack+0x3c/0x68
[   20.947919]  kasan_save_track+0x20/0x40
[   20.947966]  kasan_save_alloc_info+0x40/0x58
[   20.948010]  __kasan_kmalloc+0xd4/0xd8
[   20.948054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.948109]  kasan_atomics+0xb8/0x2e0
[   20.948156]  kunit_try_run_case+0x170/0x3f0
[   20.948204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.948259]  kthread+0x328/0x630
[   20.948306]  ret_from_fork+0x10/0x20
[   20.948365] 
[   20.948387] The buggy address belongs to the object at fff00000c3f85080
[   20.948387]  which belongs to the cache kmalloc-64 of size 64
[   20.948445] The buggy address is located 0 bytes to the right of
[   20.948445]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.948509] 
[   20.948533] The buggy address belongs to the physical page:
[   20.948566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.948642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.948693] page_type: f5(slab)
[   20.948734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.948787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.948830] page dumped because: kasan: bad access detected
[   20.948863] 
[   20.948885] Memory state around the buggy address:
[   20.948921]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.948990]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.949050] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.949167]                                      ^
[   20.949222]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949298]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.949371] ==================================================================
[   21.089316] ==================================================================
[   21.091743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.091912] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.092298] 
[   21.092344] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.092448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.092732] Hardware name: linux,dummy-virt (DT)
[   21.093186] Call trace:
[   21.093482]  show_stack+0x20/0x38 (C)
[   21.094201]  dump_stack_lvl+0x8c/0xd0
[   21.095075]  print_report+0x118/0x608
[   21.095215]  kasan_report+0xdc/0x128
[   21.095282]  kasan_check_range+0x100/0x1a8
[   21.095583]  __kasan_check_write+0x20/0x30
[   21.095750]  kasan_atomics_helper+0x1128/0x4858
[   21.095816]  kasan_atomics+0x198/0x2e0
[   21.095974]  kunit_try_run_case+0x170/0x3f0
[   21.096059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.096182]  kthread+0x328/0x630
[   21.096269]  ret_from_fork+0x10/0x20
[   21.096401] 
[   21.096423] Allocated by task 268:
[   21.096464]  kasan_save_stack+0x3c/0x68
[   21.096569]  kasan_save_track+0x20/0x40
[   21.096834]  kasan_save_alloc_info+0x40/0x58
[   21.097055]  __kasan_kmalloc+0xd4/0xd8
[   21.097104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.097283]  kasan_atomics+0xb8/0x2e0
[   21.097369]  kunit_try_run_case+0x170/0x3f0
[   21.097415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.097515]  kthread+0x328/0x630
[   21.097667]  ret_from_fork+0x10/0x20
[   21.097745] 
[   21.097794] The buggy address belongs to the object at fff00000c3f85080
[   21.097794]  which belongs to the cache kmalloc-64 of size 64
[   21.098130] The buggy address is located 0 bytes to the right of
[   21.098130]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.098205] 
[   21.098250] The buggy address belongs to the physical page:
[   21.098292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.098600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.098739] page_type: f5(slab)
[   21.098850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.099064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.099137] page dumped because: kasan: bad access detected
[   21.099272] 
[   21.099325] Memory state around the buggy address:
[   21.099392]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.099439]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.099758] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.099830]                                      ^
[   21.099878]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099924]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099964] ==================================================================
[   21.127909] ==================================================================
[   21.127959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.128011] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.128064] 
[   21.128098] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.128183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.128240] Hardware name: linux,dummy-virt (DT)
[   21.128275] Call trace:
[   21.128372]  show_stack+0x20/0x38 (C)
[   21.128446]  dump_stack_lvl+0x8c/0xd0
[   21.128502]  print_report+0x118/0x608
[   21.128568]  kasan_report+0xdc/0x128
[   21.128665]  __asan_report_load8_noabort+0x20/0x30
[   21.128722]  kasan_atomics_helper+0x3f04/0x4858
[   21.128850]  kasan_atomics+0x198/0x2e0
[   21.128903]  kunit_try_run_case+0x170/0x3f0
[   21.128956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.129015]  kthread+0x328/0x630
[   21.129223]  ret_from_fork+0x10/0x20
[   21.129319] 
[   21.129554] Allocated by task 268:
[   21.129797]  kasan_save_stack+0x3c/0x68
[   21.129866]  kasan_save_track+0x20/0x40
[   21.129923]  kasan_save_alloc_info+0x40/0x58
[   21.130076]  __kasan_kmalloc+0xd4/0xd8
[   21.130143]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.130221]  kasan_atomics+0xb8/0x2e0
[   21.130323]  kunit_try_run_case+0x170/0x3f0
[   21.130389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.130631]  kthread+0x328/0x630
[   21.130682]  ret_from_fork+0x10/0x20
[   21.130774] 
[   21.130862] The buggy address belongs to the object at fff00000c3f85080
[   21.130862]  which belongs to the cache kmalloc-64 of size 64
[   21.130973] The buggy address is located 0 bytes to the right of
[   21.130973]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.131106] 
[   21.131257] The buggy address belongs to the physical page:
[   21.131584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.131658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.131712] page_type: f5(slab)
[   21.132174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132620] page dumped because: kasan: bad access detected
[   21.132667] 
[   21.132688] Memory state around the buggy address:
[   21.132745]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.133052]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.133136] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.133435]                                      ^
[   21.133672]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133726]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133820] ==================================================================
[   21.195260] ==================================================================
[   21.195307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.195373] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.195426] 
[   21.195460] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.195546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.195777] Hardware name: linux,dummy-virt (DT)
[   21.195839] Call trace:
[   21.195867]  show_stack+0x20/0x38 (C)
[   21.195984]  dump_stack_lvl+0x8c/0xd0
[   21.196089]  print_report+0x118/0x608
[   21.196259]  kasan_report+0xdc/0x128
[   21.196310]  __asan_report_load8_noabort+0x20/0x30
[   21.196386]  kasan_atomics_helper+0x3e10/0x4858
[   21.196528]  kasan_atomics+0x198/0x2e0
[   21.196584]  kunit_try_run_case+0x170/0x3f0
[   21.196658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.196721]  kthread+0x328/0x630
[   21.196770]  ret_from_fork+0x10/0x20
[   21.196857] 
[   21.196916] Allocated by task 268:
[   21.196966]  kasan_save_stack+0x3c/0x68
[   21.197050]  kasan_save_track+0x20/0x40
[   21.197125]  kasan_save_alloc_info+0x40/0x58
[   21.197169]  __kasan_kmalloc+0xd4/0xd8
[   21.197207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.197253]  kasan_atomics+0xb8/0x2e0
[   21.197306]  kunit_try_run_case+0x170/0x3f0
[   21.197359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.197408]  kthread+0x328/0x630
[   21.197694]  ret_from_fork+0x10/0x20
[   21.197798] 
[   21.197864] The buggy address belongs to the object at fff00000c3f85080
[   21.197864]  which belongs to the cache kmalloc-64 of size 64
[   21.198045] The buggy address is located 0 bytes to the right of
[   21.198045]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.198196] 
[   21.198396] The buggy address belongs to the physical page:
[   21.198578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.198677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.198751] page_type: f5(slab)
[   21.198794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.199314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.199379] page dumped because: kasan: bad access detected
[   21.199413] 
[   21.199435] Memory state around the buggy address:
[   21.199472]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.199517]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.199562] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.199601]                                      ^
[   21.199637]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.199683]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.199723] ==================================================================
[   21.200113] ==================================================================
[   21.200167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.200228] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.200281] 
[   21.200363] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.200454] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.200486] Hardware name: linux,dummy-virt (DT)
[   21.200520] Call trace:
[   21.200545]  show_stack+0x20/0x38 (C)
[   21.200610]  dump_stack_lvl+0x8c/0xd0
[   21.200661]  print_report+0x118/0x608
[   21.200709]  kasan_report+0xdc/0x128
[   21.200756]  kasan_check_range+0x100/0x1a8
[   21.200806]  __kasan_check_write+0x20/0x30
[   21.200858]  kasan_atomics_helper+0x175c/0x4858
[   21.200912]  kasan_atomics+0x198/0x2e0
[   21.200960]  kunit_try_run_case+0x170/0x3f0
[   21.201011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201069]  kthread+0x328/0x630
[   21.201118]  ret_from_fork+0x10/0x20
[   21.201169] 
[   21.201190] Allocated by task 268:
[   21.201231]  kasan_save_stack+0x3c/0x68
[   21.201275]  kasan_save_track+0x20/0x40
[   21.201314]  kasan_save_alloc_info+0x40/0x58
[   21.201365]  __kasan_kmalloc+0xd4/0xd8
[   21.201404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.201465]  kasan_atomics+0xb8/0x2e0
[   21.201514]  kunit_try_run_case+0x170/0x3f0
[   21.201557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201612]  kthread+0x328/0x630
[   21.201652]  ret_from_fork+0x10/0x20
[   21.201692] 
[   21.201722] The buggy address belongs to the object at fff00000c3f85080
[   21.201722]  which belongs to the cache kmalloc-64 of size 64
[   21.201782] The buggy address is located 0 bytes to the right of
[   21.201782]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.201849] 
[   21.201871] The buggy address belongs to the physical page:
[   21.201906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.201961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.202028] page_type: f5(slab)
[   21.202070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.202122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.202173] page dumped because: kasan: bad access detected
[   21.202206] 
[   21.202228] Memory state around the buggy address:
[   21.202263]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.202317]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.203300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.203436]                                      ^
[   21.203602]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204038]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204135] ==================================================================
[   20.963531] ==================================================================
[   20.963582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   20.963630] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.963682] 
[   20.963872] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.963983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.964065] Hardware name: linux,dummy-virt (DT)
[   20.964099] Call trace:
[   20.964141]  show_stack+0x20/0x38 (C)
[   20.964205]  dump_stack_lvl+0x8c/0xd0
[   20.964341]  print_report+0x118/0x608
[   20.964427]  kasan_report+0xdc/0x128
[   20.964492]  __asan_report_load4_noabort+0x20/0x30
[   20.964567]  kasan_atomics_helper+0x3dcc/0x4858
[   20.964620]  kasan_atomics+0x198/0x2e0
[   20.964695]  kunit_try_run_case+0x170/0x3f0
[   20.964771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964832]  kthread+0x328/0x630
[   20.964899]  ret_from_fork+0x10/0x20
[   20.964961] 
[   20.965014] Allocated by task 268:
[   20.965052]  kasan_save_stack+0x3c/0x68
[   20.965095]  kasan_save_track+0x20/0x40
[   20.965137]  kasan_save_alloc_info+0x40/0x58
[   20.965179]  __kasan_kmalloc+0xd4/0xd8
[   20.965218]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.965395]  kasan_atomics+0xb8/0x2e0
[   20.965481]  kunit_try_run_case+0x170/0x3f0
[   20.965555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.965623]  kthread+0x328/0x630
[   20.965709]  ret_from_fork+0x10/0x20
[   20.965826] 
[   20.965878] The buggy address belongs to the object at fff00000c3f85080
[   20.965878]  which belongs to the cache kmalloc-64 of size 64
[   20.965972] The buggy address is located 0 bytes to the right of
[   20.965972]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.966161] 
[   20.966302] The buggy address belongs to the physical page:
[   20.966380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.966478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.966551] page_type: f5(slab)
[   20.966659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.966737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.966810] page dumped because: kasan: bad access detected
[   20.966930] 
[   20.966949] Memory state around the buggy address:
[   20.966983]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.967033]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967099] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.967140]                                      ^
[   20.967422]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967545]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967586] ==================================================================
[   21.035462] ==================================================================
[   21.035532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.035834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.035910] 
[   21.035945] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.036035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.036185] Hardware name: linux,dummy-virt (DT)
[   21.036231] Call trace:
[   21.036256]  show_stack+0x20/0x38 (C)
[   21.036312]  dump_stack_lvl+0x8c/0xd0
[   21.036449]  print_report+0x118/0x608
[   21.036498]  kasan_report+0xdc/0x128
[   21.036556]  kasan_check_range+0x100/0x1a8
[   21.036607]  __kasan_check_write+0x20/0x30
[   21.036665]  kasan_atomics_helper+0xe44/0x4858
[   21.036716]  kasan_atomics+0x198/0x2e0
[   21.036771]  kunit_try_run_case+0x170/0x3f0
[   21.036824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.036883]  kthread+0x328/0x630
[   21.036938]  ret_from_fork+0x10/0x20
[   21.036995] 
[   21.037016] Allocated by task 268:
[   21.037048]  kasan_save_stack+0x3c/0x68
[   21.037090]  kasan_save_track+0x20/0x40
[   21.037130]  kasan_save_alloc_info+0x40/0x58
[   21.037184]  __kasan_kmalloc+0xd4/0xd8
[   21.037230]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.037283]  kasan_atomics+0xb8/0x2e0
[   21.037329]  kunit_try_run_case+0x170/0x3f0
[   21.037385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.037468]  kthread+0x328/0x630
[   21.037953]  ret_from_fork+0x10/0x20
[   21.038009] 
[   21.038034] The buggy address belongs to the object at fff00000c3f85080
[   21.038034]  which belongs to the cache kmalloc-64 of size 64
[   21.038104] The buggy address is located 0 bytes to the right of
[   21.038104]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.038170] 
[   21.038192] The buggy address belongs to the physical page:
[   21.038226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.038280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.038329] page_type: f5(slab)
[   21.038531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.038617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.038835] page dumped because: kasan: bad access detected
[   21.038901] 
[   21.039135] Memory state around the buggy address:
[   21.039209]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.039337]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.039649] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.039727]                                      ^
[   21.039788]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040049]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040129] ==================================================================
[   21.010668] ==================================================================
[   21.010726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.011269] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.011371] 
[   21.011483] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.011592] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.011628] Hardware name: linux,dummy-virt (DT)
[   21.011676] Call trace:
[   21.011723]  show_stack+0x20/0x38 (C)
[   21.011839]  dump_stack_lvl+0x8c/0xd0
[   21.011892]  print_report+0x118/0x608
[   21.012122]  kasan_report+0xdc/0x128
[   21.012196]  kasan_check_range+0x100/0x1a8
[   21.012256]  __kasan_check_write+0x20/0x30
[   21.012307]  kasan_atomics_helper+0xd3c/0x4858
[   21.012539]  kasan_atomics+0x198/0x2e0
[   21.012623]  kunit_try_run_case+0x170/0x3f0
[   21.012710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.012773]  kthread+0x328/0x630
[   21.012822]  ret_from_fork+0x10/0x20
[   21.012876] 
[   21.013032] Allocated by task 268:
[   21.013080]  kasan_save_stack+0x3c/0x68
[   21.013127]  kasan_save_track+0x20/0x40
[   21.013261]  kasan_save_alloc_info+0x40/0x58
[   21.013316]  __kasan_kmalloc+0xd4/0xd8
[   21.013368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.013415]  kasan_atomics+0xb8/0x2e0
[   21.013615]  kunit_try_run_case+0x170/0x3f0
[   21.013809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013874]  kthread+0x328/0x630
[   21.013914]  ret_from_fork+0x10/0x20
[   21.014116] 
[   21.014162] The buggy address belongs to the object at fff00000c3f85080
[   21.014162]  which belongs to the cache kmalloc-64 of size 64
[   21.014225] The buggy address is located 0 bytes to the right of
[   21.014225]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.014355] 
[   21.014412] The buggy address belongs to the physical page:
[   21.014470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.014533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.014595] page_type: f5(slab)
[   21.014643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.014713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.014756] page dumped because: kasan: bad access detected
[   21.014788] 
[   21.014810] Memory state around the buggy address:
[   21.014852]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.014919]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.014966] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.015019]                                      ^
[   21.015068]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.015126]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.015195] ==================================================================
[   21.118693] ==================================================================
[   21.118759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.118835] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.118889] 
[   21.118984] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.119110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.119412] Hardware name: linux,dummy-virt (DT)
[   21.119459] Call trace:
[   21.119486]  show_stack+0x20/0x38 (C)
[   21.119551]  dump_stack_lvl+0x8c/0xd0
[   21.119654]  print_report+0x118/0x608
[   21.119708]  kasan_report+0xdc/0x128
[   21.119755]  kasan_check_range+0x100/0x1a8
[   21.119929]  __kasan_check_write+0x20/0x30
[   21.120026]  kasan_atomics_helper+0x12d8/0x4858
[   21.120088]  kasan_atomics+0x198/0x2e0
[   21.120136]  kunit_try_run_case+0x170/0x3f0
[   21.120238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.120301]  kthread+0x328/0x630
[   21.120481]  ret_from_fork+0x10/0x20
[   21.120551] 
[   21.120603] Allocated by task 268:
[   21.120732]  kasan_save_stack+0x3c/0x68
[   21.120798]  kasan_save_track+0x20/0x40
[   21.120844]  kasan_save_alloc_info+0x40/0x58
[   21.120888]  __kasan_kmalloc+0xd4/0xd8
[   21.121196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.121287]  kasan_atomics+0xb8/0x2e0
[   21.121330]  kunit_try_run_case+0x170/0x3f0
[   21.121384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.121491]  kthread+0x328/0x630
[   21.121536]  ret_from_fork+0x10/0x20
[   21.121603] 
[   21.121792] The buggy address belongs to the object at fff00000c3f85080
[   21.121792]  which belongs to the cache kmalloc-64 of size 64
[   21.121901] The buggy address is located 0 bytes to the right of
[   21.121901]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.122057] 
[   21.122117] The buggy address belongs to the physical page:
[   21.122176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.122449] page_type: f5(slab)
[   21.122492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.122605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.122720] page dumped because: kasan: bad access detected
[   21.122782] 
[   21.122965] Memory state around the buggy address:
[   21.123036]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.123178]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.123233] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.123369]                                      ^
[   21.123409]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123455]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.123642] ==================================================================
[   21.175334] ==================================================================
[   21.175399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.175451] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.175502] 
[   21.175539] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.175625] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.175657] Hardware name: linux,dummy-virt (DT)
[   21.175692] Call trace:
[   21.175717]  show_stack+0x20/0x38 (C)
[   21.175767]  dump_stack_lvl+0x8c/0xd0
[   21.175820]  print_report+0x118/0x608
[   21.175867]  kasan_report+0xdc/0x128
[   21.175916]  __asan_report_load8_noabort+0x20/0x30
[   21.175971]  kasan_atomics_helper+0x3db0/0x4858
[   21.176020]  kasan_atomics+0x198/0x2e0
[   21.176068]  kunit_try_run_case+0x170/0x3f0
[   21.176119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176178]  kthread+0x328/0x630
[   21.176225]  ret_from_fork+0x10/0x20
[   21.176279] 
[   21.176298] Allocated by task 268:
[   21.176327]  kasan_save_stack+0x3c/0x68
[   21.179279]  kasan_save_track+0x20/0x40
[   21.179325]  kasan_save_alloc_info+0x40/0x58
[   21.179379]  __kasan_kmalloc+0xd4/0xd8
[   21.179419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.179465]  kasan_atomics+0xb8/0x2e0
[   21.179503]  kunit_try_run_case+0x170/0x3f0
[   21.179546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.179595]  kthread+0x328/0x630
[   21.179634]  ret_from_fork+0x10/0x20
[   21.179674] 
[   21.179695] The buggy address belongs to the object at fff00000c3f85080
[   21.179695]  which belongs to the cache kmalloc-64 of size 64
[   21.179757] The buggy address is located 0 bytes to the right of
[   21.179757]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.179823] 
[   21.179846] The buggy address belongs to the physical page:
[   21.179880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.179935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.179988] page_type: f5(slab)
[   21.180029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.180082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.180125] page dumped because: kasan: bad access detected
[   21.180159] 
[   21.180179] Memory state around the buggy address:
[   21.180211]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.180256]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.180300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.180343]                                      ^
[   21.180388]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.180434]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.180475] ==================================================================
[   21.190118] ==================================================================
[   21.190168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.190385] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.190543] 
[   21.190580] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.190708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.190758] Hardware name: linux,dummy-virt (DT)
[   21.190828] Call trace:
[   21.190875]  show_stack+0x20/0x38 (C)
[   21.190927]  dump_stack_lvl+0x8c/0xd0
[   21.191088]  print_report+0x118/0x608
[   21.191150]  kasan_report+0xdc/0x128
[   21.191266]  kasan_check_range+0x100/0x1a8
[   21.191325]  __kasan_check_write+0x20/0x30
[   21.191388]  kasan_atomics_helper+0x16d0/0x4858
[   21.191506]  kasan_atomics+0x198/0x2e0
[   21.191601]  kunit_try_run_case+0x170/0x3f0
[   21.191703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191793]  kthread+0x328/0x630
[   21.191879]  ret_from_fork+0x10/0x20
[   21.191931] 
[   21.191953] Allocated by task 268:
[   21.191984]  kasan_save_stack+0x3c/0x68
[   21.192159]  kasan_save_track+0x20/0x40
[   21.192203]  kasan_save_alloc_info+0x40/0x58
[   21.192317]  __kasan_kmalloc+0xd4/0xd8
[   21.192372]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.192420]  kasan_atomics+0xb8/0x2e0
[   21.192489]  kunit_try_run_case+0x170/0x3f0
[   21.192568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192643]  kthread+0x328/0x630
[   21.192725]  ret_from_fork+0x10/0x20
[   21.192970] 
[   21.193035] The buggy address belongs to the object at fff00000c3f85080
[   21.193035]  which belongs to the cache kmalloc-64 of size 64
[   21.193197] The buggy address is located 0 bytes to the right of
[   21.193197]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.193396] 
[   21.193454] The buggy address belongs to the physical page:
[   21.193530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.193610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.193691] page_type: f5(slab)
[   21.193742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.193802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.194055] page dumped because: kasan: bad access detected
[   21.194327] 
[   21.194411] Memory state around the buggy address:
[   21.194546]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.194826]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.194880] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.194930]                                      ^
[   21.194967]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195016]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.195057] ==================================================================
[   21.149487] ==================================================================
[   21.149565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.149727] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.150147] 
[   21.150208] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.150625] Hardware name: linux,dummy-virt (DT)
[   21.151017] Call trace:
[   21.151083]  show_stack+0x20/0x38 (C)
[   21.151224]  dump_stack_lvl+0x8c/0xd0
[   21.151282]  print_report+0x118/0x608
[   21.151331]  kasan_report+0xdc/0x128
[   21.151428]  kasan_check_range+0x100/0x1a8
[   21.151496]  __kasan_check_write+0x20/0x30
[   21.152165]  kasan_atomics_helper+0x14e4/0x4858
[   21.152251]  kasan_atomics+0x198/0x2e0
[   21.152336]  kunit_try_run_case+0x170/0x3f0
[   21.152504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.152579]  kthread+0x328/0x630
[   21.152968]  ret_from_fork+0x10/0x20
[   21.153631] 
[   21.153678] Allocated by task 268:
[   21.153715]  kasan_save_stack+0x3c/0x68
[   21.153762]  kasan_save_track+0x20/0x40
[   21.153802]  kasan_save_alloc_info+0x40/0x58
[   21.154156]  __kasan_kmalloc+0xd4/0xd8
[   21.154243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.154529]  kasan_atomics+0xb8/0x2e0
[   21.154919]  kunit_try_run_case+0x170/0x3f0
[   21.155034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155432]  kthread+0x328/0x630
[   21.156007]  ret_from_fork+0x10/0x20
[   21.156192] 
[   21.156273] The buggy address belongs to the object at fff00000c3f85080
[   21.156273]  which belongs to the cache kmalloc-64 of size 64
[   21.156345] The buggy address is located 0 bytes to the right of
[   21.156345]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.156462] 
[   21.156486] The buggy address belongs to the physical page:
[   21.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.156919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.157394] page_type: f5(slab)
[   21.157799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.158136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.158259] page dumped because: kasan: bad access detected
[   21.158343] 
[   21.158412] Memory state around the buggy address:
[   21.158533]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.158600]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.158813] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.158985]                                      ^
[   21.159054]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159403]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159519] ==================================================================
[   21.101032] ==================================================================
[   21.101091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.101199] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.101279] 
[   21.101425] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.101556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.101794] Hardware name: linux,dummy-virt (DT)
[   21.101852] Call trace:
[   21.101957]  show_stack+0x20/0x38 (C)
[   21.102055]  dump_stack_lvl+0x8c/0xd0
[   21.102135]  print_report+0x118/0x608
[   21.102221]  kasan_report+0xdc/0x128
[   21.102468]  kasan_check_range+0x100/0x1a8
[   21.102531]  __kasan_check_write+0x20/0x30
[   21.102593]  kasan_atomics_helper+0x1190/0x4858
[   21.102646]  kasan_atomics+0x198/0x2e0
[   21.102693]  kunit_try_run_case+0x170/0x3f0
[   21.102871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.102958]  kthread+0x328/0x630
[   21.103205]  ret_from_fork+0x10/0x20
[   21.103269] 
[   21.103392] Allocated by task 268:
[   21.103447]  kasan_save_stack+0x3c/0x68
[   21.103517]  kasan_save_track+0x20/0x40
[   21.103653]  kasan_save_alloc_info+0x40/0x58
[   21.103751]  __kasan_kmalloc+0xd4/0xd8
[   21.103830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.104176]  kasan_atomics+0xb8/0x2e0
[   21.104255]  kunit_try_run_case+0x170/0x3f0
[   21.104301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.104371]  kthread+0x328/0x630
[   21.104462]  ret_from_fork+0x10/0x20
[   21.104582] 
[   21.104631] The buggy address belongs to the object at fff00000c3f85080
[   21.104631]  which belongs to the cache kmalloc-64 of size 64
[   21.104748] The buggy address is located 0 bytes to the right of
[   21.104748]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.104976] 
[   21.105026] The buggy address belongs to the physical page:
[   21.105104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.105215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.105382] page_type: f5(slab)
[   21.105571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.105716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.105785] page dumped because: kasan: bad access detected
[   21.105881] 
[   21.105920] Memory state around the buggy address:
[   21.105970]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.106195]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106251] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.106311]                                      ^
[   21.106406]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106453]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106608] ==================================================================
[   21.068534] ==================================================================
[   21.068596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.068651] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.068850] 
[   21.068892] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.069062] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.069130] Hardware name: linux,dummy-virt (DT)
[   21.069165] Call trace:
[   21.069324]  show_stack+0x20/0x38 (C)
[   21.069412]  dump_stack_lvl+0x8c/0xd0
[   21.069476]  print_report+0x118/0x608
[   21.069527]  kasan_report+0xdc/0x128
[   21.069574]  kasan_check_range+0x100/0x1a8
[   21.069625]  __kasan_check_write+0x20/0x30
[   21.069675]  kasan_atomics_helper+0xff0/0x4858
[   21.069725]  kasan_atomics+0x198/0x2e0
[   21.069771]  kunit_try_run_case+0x170/0x3f0
[   21.069825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.070178]  kthread+0x328/0x630
[   21.070339]  ret_from_fork+0x10/0x20
[   21.070405] 
[   21.070428] Allocated by task 268:
[   21.070623]  kasan_save_stack+0x3c/0x68
[   21.070671]  kasan_save_track+0x20/0x40
[   21.070772]  kasan_save_alloc_info+0x40/0x58
[   21.070872]  __kasan_kmalloc+0xd4/0xd8
[   21.070981]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.071263]  kasan_atomics+0xb8/0x2e0
[   21.071418]  kunit_try_run_case+0x170/0x3f0
[   21.071467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.071546]  kthread+0x328/0x630
[   21.071732]  ret_from_fork+0x10/0x20
[   21.071787] 
[   21.071850] The buggy address belongs to the object at fff00000c3f85080
[   21.071850]  which belongs to the cache kmalloc-64 of size 64
[   21.071957] The buggy address is located 0 bytes to the right of
[   21.071957]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.072053] 
[   21.072282] The buggy address belongs to the physical page:
[   21.072341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.072433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.072577] page_type: f5(slab)
[   21.072622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.072675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.072871] page dumped because: kasan: bad access detected
[   21.072910] 
[   21.072933] Memory state around the buggy address:
[   21.073032]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.073109]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.073192] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.073359]                                      ^
[   21.073404]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073715]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073812] ==================================================================
[   20.999642] ==================================================================
[   20.999696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.000044] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.000132] 
[   21.000167] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.000257] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.000402] Hardware name: linux,dummy-virt (DT)
[   21.000449] Call trace:
[   21.000475]  show_stack+0x20/0x38 (C)
[   21.000531]  dump_stack_lvl+0x8c/0xd0
[   21.000763]  print_report+0x118/0x608
[   21.000899]  kasan_report+0xdc/0x128
[   21.000953]  __asan_report_load4_noabort+0x20/0x30
[   21.001163]  kasan_atomics_helper+0x3dd8/0x4858
[   21.001233]  kasan_atomics+0x198/0x2e0
[   21.001301]  kunit_try_run_case+0x170/0x3f0
[   21.001409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.001636]  kthread+0x328/0x630
[   21.001695]  ret_from_fork+0x10/0x20
[   21.001786] 
[   21.001893] Allocated by task 268:
[   21.001953]  kasan_save_stack+0x3c/0x68
[   21.002127]  kasan_save_track+0x20/0x40
[   21.002193]  kasan_save_alloc_info+0x40/0x58
[   21.002237]  __kasan_kmalloc+0xd4/0xd8
[   21.002277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.002360]  kasan_atomics+0xb8/0x2e0
[   21.002399]  kunit_try_run_case+0x170/0x3f0
[   21.002625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.002854]  kthread+0x328/0x630
[   21.002921]  ret_from_fork+0x10/0x20
[   21.003106] 
[   21.003196] The buggy address belongs to the object at fff00000c3f85080
[   21.003196]  which belongs to the cache kmalloc-64 of size 64
[   21.003323] The buggy address is located 0 bytes to the right of
[   21.003323]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.003468] 
[   21.003533] The buggy address belongs to the physical page:
[   21.005473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.006299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.006517] page_type: f5(slab)
[   21.006567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.008270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.008506] page dumped because: kasan: bad access detected
[   21.008558] 
[   21.008719] Memory state around the buggy address:
[   21.008794]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.008926]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.009002] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.009249]                                      ^
[   21.009440]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009543]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.009737] ==================================================================
[   21.053241] ==================================================================
[   21.053300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.053469] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.053564] 
[   21.053609] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.053708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.053860] Hardware name: linux,dummy-virt (DT)
[   21.053918] Call trace:
[   21.053964]  show_stack+0x20/0x38 (C)
[   21.054136]  dump_stack_lvl+0x8c/0xd0
[   21.054195]  print_report+0x118/0x608
[   21.054270]  kasan_report+0xdc/0x128
[   21.054560]  kasan_check_range+0x100/0x1a8
[   21.054738]  __kasan_check_write+0x20/0x30
[   21.054842]  kasan_atomics_helper+0xf20/0x4858
[   21.055006]  kasan_atomics+0x198/0x2e0
[   21.055123]  kunit_try_run_case+0x170/0x3f0
[   21.055302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.055422]  kthread+0x328/0x630
[   21.055498]  ret_from_fork+0x10/0x20
[   21.055674] 
[   21.055723] Allocated by task 268:
[   21.055779]  kasan_save_stack+0x3c/0x68
[   21.055825]  kasan_save_track+0x20/0x40
[   21.056043]  kasan_save_alloc_info+0x40/0x58
[   21.056099]  __kasan_kmalloc+0xd4/0xd8
[   21.056391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.056802]  kasan_atomics+0xb8/0x2e0
[   21.056859]  kunit_try_run_case+0x170/0x3f0
[   21.056956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057027]  kthread+0x328/0x630
[   21.057249]  ret_from_fork+0x10/0x20
[   21.057328] 
[   21.057405] The buggy address belongs to the object at fff00000c3f85080
[   21.057405]  which belongs to the cache kmalloc-64 of size 64
[   21.057679] The buggy address is located 0 bytes to the right of
[   21.057679]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.057776] 
[   21.057830] The buggy address belongs to the physical page:
[   21.057886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.058096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.058157] page_type: f5(slab)
[   21.058272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.058330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.058515] page dumped because: kasan: bad access detected
[   21.058589] 
[   21.058657] Memory state around the buggy address:
[   21.058953]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.059127]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.059185] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.059458]                                      ^
[   21.059515]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059613]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059692] ==================================================================
[   20.950025] ==================================================================
[   20.950078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.950141] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.950202] 
[   20.950248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.950338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.950505] Hardware name: linux,dummy-virt (DT)
[   20.950587] Call trace:
[   20.950663]  show_stack+0x20/0x38 (C)
[   20.950736]  dump_stack_lvl+0x8c/0xd0
[   20.950835]  print_report+0x118/0x608
[   20.950890]  kasan_report+0xdc/0x128
[   20.950956]  kasan_check_range+0x100/0x1a8
[   20.951017]  __kasan_check_write+0x20/0x30
[   20.951066]  kasan_atomics_helper+0xa04/0x4858
[   20.951117]  kasan_atomics+0x198/0x2e0
[   20.951165]  kunit_try_run_case+0x170/0x3f0
[   20.951472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.951534]  kthread+0x328/0x630
[   20.951632]  ret_from_fork+0x10/0x20
[   20.951715] 
[   20.951754] Allocated by task 268:
[   20.951803]  kasan_save_stack+0x3c/0x68
[   20.951859]  kasan_save_track+0x20/0x40
[   20.951899]  kasan_save_alloc_info+0x40/0x58
[   20.952023]  __kasan_kmalloc+0xd4/0xd8
[   20.952110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.952187]  kasan_atomics+0xb8/0x2e0
[   20.952247]  kunit_try_run_case+0x170/0x3f0
[   20.952291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.952338]  kthread+0x328/0x630
[   20.952417]  ret_from_fork+0x10/0x20
[   20.952514] 
[   20.952544] The buggy address belongs to the object at fff00000c3f85080
[   20.952544]  which belongs to the cache kmalloc-64 of size 64
[   20.952604] The buggy address is located 0 bytes to the right of
[   20.952604]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.952675] 
[   20.952704] The buggy address belongs to the physical page:
[   20.952739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.952791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.952852] page_type: f5(slab)
[   20.952910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.952963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.953019] page dumped because: kasan: bad access detected
[   20.953062] 
[   20.953091] Memory state around the buggy address:
[   20.953127]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.953173]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.953219] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.953259]                                      ^
[   20.953405]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953464]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.953506] ==================================================================
[   21.123970] ==================================================================
[   21.124024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.124077] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.124289] 
[   21.124336] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.124643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.124688] Hardware name: linux,dummy-virt (DT)
[   21.124724] Call trace:
[   21.124750]  show_stack+0x20/0x38 (C)
[   21.124805]  dump_stack_lvl+0x8c/0xd0
[   21.124886]  print_report+0x118/0x608
[   21.125080]  kasan_report+0xdc/0x128
[   21.125144]  kasan_check_range+0x100/0x1a8
[   21.125257]  __kasan_check_write+0x20/0x30
[   21.125323]  kasan_atomics_helper+0x1384/0x4858
[   21.125386]  kasan_atomics+0x198/0x2e0
[   21.125499]  kunit_try_run_case+0x170/0x3f0
[   21.125587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.125648]  kthread+0x328/0x630
[   21.125696]  ret_from_fork+0x10/0x20
[   21.125766] 
[   21.125787] Allocated by task 268:
[   21.125816]  kasan_save_stack+0x3c/0x68
[   21.125876]  kasan_save_track+0x20/0x40
[   21.125939]  kasan_save_alloc_info+0x40/0x58
[   21.125983]  __kasan_kmalloc+0xd4/0xd8
[   21.126023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.126069]  kasan_atomics+0xb8/0x2e0
[   21.126117]  kunit_try_run_case+0x170/0x3f0
[   21.126170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.126219]  kthread+0x328/0x630
[   21.126258]  ret_from_fork+0x10/0x20
[   21.126298] 
[   21.126328] The buggy address belongs to the object at fff00000c3f85080
[   21.126328]  which belongs to the cache kmalloc-64 of size 64
[   21.126408] The buggy address is located 0 bytes to the right of
[   21.126408]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.126486] 
[   21.126523] The buggy address belongs to the physical page:
[   21.126577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.126640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.126691] page_type: f5(slab)
[   21.126738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.126790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.126842] page dumped because: kasan: bad access detected
[   21.126885] 
[   21.126914] Memory state around the buggy address:
[   21.126956]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.127015]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.127072] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.127112]                                      ^
[   21.127149]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.127194]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.127235] ==================================================================
[   20.959740] ==================================================================
[   20.959796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.959849] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.959900] 
[   20.959933] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.960164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.960200] Hardware name: linux,dummy-virt (DT)
[   20.960234] Call trace:
[   20.960261]  show_stack+0x20/0x38 (C)
[   20.960315]  dump_stack_lvl+0x8c/0xd0
[   20.960376]  print_report+0x118/0x608
[   20.960581]  kasan_report+0xdc/0x128
[   20.960767]  kasan_check_range+0x100/0x1a8
[   20.960848]  __kasan_check_write+0x20/0x30
[   20.960900]  kasan_atomics_helper+0xad4/0x4858
[   20.960951]  kasan_atomics+0x198/0x2e0
[   20.960999]  kunit_try_run_case+0x170/0x3f0
[   20.961072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961132]  kthread+0x328/0x630
[   20.961180]  ret_from_fork+0x10/0x20
[   20.961232] 
[   20.961254] Allocated by task 268:
[   20.961486]  kasan_save_stack+0x3c/0x68
[   20.961537]  kasan_save_track+0x20/0x40
[   20.961579]  kasan_save_alloc_info+0x40/0x58
[   20.961622]  __kasan_kmalloc+0xd4/0xd8
[   20.961661]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.961707]  kasan_atomics+0xb8/0x2e0
[   20.961744]  kunit_try_run_case+0x170/0x3f0
[   20.961787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.961837]  kthread+0x328/0x630
[   20.961875]  ret_from_fork+0x10/0x20
[   20.961913] 
[   20.961936] The buggy address belongs to the object at fff00000c3f85080
[   20.961936]  which belongs to the cache kmalloc-64 of size 64
[   20.961997] The buggy address is located 0 bytes to the right of
[   20.961997]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.962063] 
[   20.962085] The buggy address belongs to the physical page:
[   20.962118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.962170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.962220] page_type: f5(slab)
[   20.962260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.962314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.962366] page dumped because: kasan: bad access detected
[   20.962453] 
[   20.962503] Memory state around the buggy address:
[   20.962552]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.962667]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.962722] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962791]                                      ^
[   20.962977]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963135]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963234] ==================================================================
[   21.180703] ==================================================================
[   21.180751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.180799] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.180850] 
[   21.180882] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.180968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.181000] Hardware name: linux,dummy-virt (DT)
[   21.181032] Call trace:
[   21.181056]  show_stack+0x20/0x38 (C)
[   21.181107]  dump_stack_lvl+0x8c/0xd0
[   21.181157]  print_report+0x118/0x608
[   21.181205]  kasan_report+0xdc/0x128
[   21.181252]  kasan_check_range+0x100/0x1a8
[   21.181303]  __kasan_check_write+0x20/0x30
[   21.181381]  kasan_atomics_helper+0x1644/0x4858
[   21.181518]  kasan_atomics+0x198/0x2e0
[   21.181591]  kunit_try_run_case+0x170/0x3f0
[   21.181644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.181702]  kthread+0x328/0x630
[   21.181749]  ret_from_fork+0x10/0x20
[   21.181802] 
[   21.181823] Allocated by task 268:
[   21.182143]  kasan_save_stack+0x3c/0x68
[   21.182189]  kasan_save_track+0x20/0x40
[   21.182267]  kasan_save_alloc_info+0x40/0x58
[   21.182391]  __kasan_kmalloc+0xd4/0xd8
[   21.182532]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.182628]  kasan_atomics+0xb8/0x2e0
[   21.182695]  kunit_try_run_case+0x170/0x3f0
[   21.182989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183070]  kthread+0x328/0x630
[   21.183171]  ret_from_fork+0x10/0x20
[   21.183213] 
[   21.183243] The buggy address belongs to the object at fff00000c3f85080
[   21.183243]  which belongs to the cache kmalloc-64 of size 64
[   21.183312] The buggy address is located 0 bytes to the right of
[   21.183312]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.183388] 
[   21.183412] The buggy address belongs to the physical page:
[   21.183445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.183520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.183572] page_type: f5(slab)
[   21.183614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.183681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.183724] page dumped because: kasan: bad access detected
[   21.183759] 
[   21.183780] Memory state around the buggy address:
[   21.183812]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.183858]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.183910] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.183950]                                      ^
[   21.183987]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.184031]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.184072] ==================================================================
[   21.107671] ==================================================================
[   21.107737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.107802] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.107854] 
[   21.107887] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.107977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.108010] Hardware name: linux,dummy-virt (DT)
[   21.108075] Call trace:
[   21.108116]  show_stack+0x20/0x38 (C)
[   21.108173]  dump_stack_lvl+0x8c/0xd0
[   21.108226]  print_report+0x118/0x608
[   21.108275]  kasan_report+0xdc/0x128
[   21.108321]  kasan_check_range+0x100/0x1a8
[   21.108392]  __kasan_check_write+0x20/0x30
[   21.108444]  kasan_atomics_helper+0x11f8/0x4858
[   21.108493]  kasan_atomics+0x198/0x2e0
[   21.108540]  kunit_try_run_case+0x170/0x3f0
[   21.108598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.108657]  kthread+0x328/0x630
[   21.108704]  ret_from_fork+0x10/0x20
[   21.108765] 
[   21.108794] Allocated by task 268:
[   21.108846]  kasan_save_stack+0x3c/0x68
[   21.108898]  kasan_save_track+0x20/0x40
[   21.108946]  kasan_save_alloc_info+0x40/0x58
[   21.108998]  __kasan_kmalloc+0xd4/0xd8
[   21.109038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.109084]  kasan_atomics+0xb8/0x2e0
[   21.109122]  kunit_try_run_case+0x170/0x3f0
[   21.109165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109214]  kthread+0x328/0x630
[   21.109261]  ret_from_fork+0x10/0x20
[   21.109302] 
[   21.109324] The buggy address belongs to the object at fff00000c3f85080
[   21.109324]  which belongs to the cache kmalloc-64 of size 64
[   21.109798] The buggy address is located 0 bytes to the right of
[   21.109798]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.110103] 
[   21.110181] The buggy address belongs to the physical page:
[   21.110233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.110291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.110361] page_type: f5(slab)
[   21.110410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.110465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.110509] page dumped because: kasan: bad access detected
[   21.110546] 
[   21.110566] Memory state around the buggy address:
[   21.110763]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.110847]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.110995] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.111271]                                      ^
[   21.111367]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111459]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111565] ==================================================================
[   21.047423] ==================================================================
[   21.047479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.047752] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.047842] 
[   21.047885] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.048072] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.048127] Hardware name: linux,dummy-virt (DT)
[   21.048184] Call trace:
[   21.048210]  show_stack+0x20/0x38 (C)
[   21.048264]  dump_stack_lvl+0x8c/0xd0
[   21.048401]  print_report+0x118/0x608
[   21.048448]  kasan_report+0xdc/0x128
[   21.048497]  kasan_check_range+0x100/0x1a8
[   21.048556]  __kasan_check_write+0x20/0x30
[   21.048623]  kasan_atomics_helper+0xeb8/0x4858
[   21.048672]  kasan_atomics+0x198/0x2e0
[   21.048718]  kunit_try_run_case+0x170/0x3f0
[   21.048777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.048836]  kthread+0x328/0x630
[   21.048885]  ret_from_fork+0x10/0x20
[   21.048937] 
[   21.048959] Allocated by task 268:
[   21.048991]  kasan_save_stack+0x3c/0x68
[   21.049035]  kasan_save_track+0x20/0x40
[   21.049075]  kasan_save_alloc_info+0x40/0x58
[   21.049118]  __kasan_kmalloc+0xd4/0xd8
[   21.049155]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.049200]  kasan_atomics+0xb8/0x2e0
[   21.049238]  kunit_try_run_case+0x170/0x3f0
[   21.049281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049338]  kthread+0x328/0x630
[   21.049388]  ret_from_fork+0x10/0x20
[   21.049442] 
[   21.050037] The buggy address belongs to the object at fff00000c3f85080
[   21.050037]  which belongs to the cache kmalloc-64 of size 64
[   21.050116] The buggy address is located 0 bytes to the right of
[   21.050116]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.050431] 
[   21.050506] The buggy address belongs to the physical page:
[   21.050565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.050787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.051033] page_type: f5(slab)
[   21.051103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.051206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.051269] page dumped because: kasan: bad access detected
[   21.051384] 
[   21.051445] Memory state around the buggy address:
[   21.051508]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.051727]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.051809] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.052006]                                      ^
[   21.052063]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052129]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052371] ==================================================================
[   20.937073] ==================================================================
[   20.937134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.937204] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.937707]  show_stack+0x20/0x38 (C)
[   20.939485] The buggy address is located 0 bytes to the right of
[   20.939485]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.940247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.940515]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.942598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.942675]  kthread+0x328/0x630
[   20.942724]  ret_from_fork+0x10/0x20
[   20.943054] 
[   20.943112] Allocated by task 268:
[   20.943169]  kasan_save_stack+0x3c/0x68
[   20.943213]  kasan_save_track+0x20/0x40
[   20.943269]  kasan_save_alloc_info+0x40/0x58
[   20.943326]  __kasan_kmalloc+0xd4/0xd8
[   20.943430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.943489]  kasan_atomics+0xb8/0x2e0
[   20.943548]  kunit_try_run_case+0x170/0x3f0
[   20.943702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.943753]  kthread+0x328/0x630
[   20.943801]  ret_from_fork+0x10/0x20
[   20.943874] 
[   20.943971] The buggy address belongs to the object at fff00000c3f85080
[   20.943971]  which belongs to the cache kmalloc-64 of size 64
[   20.944058] The buggy address is located 0 bytes to the right of
[   20.944058]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.944177] 
[   20.944227] The buggy address belongs to the physical page:
[   20.944285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.944385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.944472] page_type: f5(slab)
[   20.944537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.944635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.944706] page dumped because: kasan: bad access detected
[   20.944861] 
[   20.944883] Memory state around the buggy address:
[   20.944928]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.945045]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.945190] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.945283]                                      ^
[   20.945320]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945376]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945417] ==================================================================
[   21.160035] ==================================================================
[   21.160248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.160304] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.160703] 
[   21.160811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.160977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.161035] Hardware name: linux,dummy-virt (DT)
[   21.161081] Call trace:
[   21.161118]  show_stack+0x20/0x38 (C)
[   21.161181]  dump_stack_lvl+0x8c/0xd0
[   21.161237]  print_report+0x118/0x608
[   21.161403]  kasan_report+0xdc/0x128
[   21.161761]  kasan_check_range+0x100/0x1a8
[   21.161885]  __kasan_check_write+0x20/0x30
[   21.161961]  kasan_atomics_helper+0x154c/0x4858
[   21.162064]  kasan_atomics+0x198/0x2e0
[   21.162179]  kunit_try_run_case+0x170/0x3f0
[   21.162238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.162556]  kthread+0x328/0x630
[   21.162719]  ret_from_fork+0x10/0x20
[   21.163081] 
[   21.163153] Allocated by task 268:
[   21.163222]  kasan_save_stack+0x3c/0x68
[   21.163336]  kasan_save_track+0x20/0x40
[   21.163420]  kasan_save_alloc_info+0x40/0x58
[   21.163546]  __kasan_kmalloc+0xd4/0xd8
[   21.163615]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.163738]  kasan_atomics+0xb8/0x2e0
[   21.163808]  kunit_try_run_case+0x170/0x3f0
[   21.163918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.163983]  kthread+0x328/0x630
[   21.164023]  ret_from_fork+0x10/0x20
[   21.164089] 
[   21.164248] The buggy address belongs to the object at fff00000c3f85080
[   21.164248]  which belongs to the cache kmalloc-64 of size 64
[   21.164483] The buggy address is located 0 bytes to the right of
[   21.164483]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.164814] 
[   21.165207] The buggy address belongs to the physical page:
[   21.165271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.165372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.165597] page_type: f5(slab)
[   21.165650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.165761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.166010] page dumped because: kasan: bad access detected
[   21.166271] 
[   21.166440] Memory state around the buggy address:
[   21.166502]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.166714]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.166924] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.166987]                                      ^
[   21.167166]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.167421]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.167469] ==================================================================
[   21.080551] ==================================================================
[   21.080608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.080660] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.080712] 
[   21.080745] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.080834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.080874] Hardware name: linux,dummy-virt (DT)
[   21.080917] Call trace:
[   21.080942]  show_stack+0x20/0x38 (C)
[   21.080993]  dump_stack_lvl+0x8c/0xd0
[   21.081043]  print_report+0x118/0x608
[   21.081092]  kasan_report+0xdc/0x128
[   21.081138]  kasan_check_range+0x100/0x1a8
[   21.081194]  __kasan_check_write+0x20/0x30
[   21.081247]  kasan_atomics_helper+0x10c0/0x4858
[   21.081297]  kasan_atomics+0x198/0x2e0
[   21.081343]  kunit_try_run_case+0x170/0x3f0
[   21.081418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.081730]  kthread+0x328/0x630
[   21.081794]  ret_from_fork+0x10/0x20
[   21.081847] 
[   21.081877] Allocated by task 268:
[   21.081910]  kasan_save_stack+0x3c/0x68
[   21.081954]  kasan_save_track+0x20/0x40
[   21.081994]  kasan_save_alloc_info+0x40/0x58
[   21.082067]  __kasan_kmalloc+0xd4/0xd8
[   21.082108]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.082321]  kasan_atomics+0xb8/0x2e0
[   21.082690]  kunit_try_run_case+0x170/0x3f0
[   21.082761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.082995]  kthread+0x328/0x630
[   21.083065]  ret_from_fork+0x10/0x20
[   21.083142] 
[   21.083205] The buggy address belongs to the object at fff00000c3f85080
[   21.083205]  which belongs to the cache kmalloc-64 of size 64
[   21.083510] The buggy address is located 0 bytes to the right of
[   21.083510]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.083728] 
[   21.083789] The buggy address belongs to the physical page:
[   21.083940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.084024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.084225] page_type: f5(slab)
[   21.084282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.084368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.084471] page dumped because: kasan: bad access detected
[   21.084529] 
[   21.084549] Memory state around the buggy address:
[   21.084585]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.084783]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.084852] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.084900]                                      ^
[   21.084949]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.085058]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.085133] ==================================================================
[   21.184257] ==================================================================
[   21.184303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.184367] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.184419] 
[   21.184450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.184533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.184566] Hardware name: linux,dummy-virt (DT)
[   21.184628] Call trace:
[   21.184654]  show_stack+0x20/0x38 (C)
[   21.184707]  dump_stack_lvl+0x8c/0xd0
[   21.184757]  print_report+0x118/0x608
[   21.184980]  kasan_report+0xdc/0x128
[   21.185049]  __asan_report_load8_noabort+0x20/0x30
[   21.185104]  kasan_atomics_helper+0x3df4/0x4858
[   21.185156]  kasan_atomics+0x198/0x2e0
[   21.185202]  kunit_try_run_case+0x170/0x3f0
[   21.185276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185336]  kthread+0x328/0x630
[   21.185394]  ret_from_fork+0x10/0x20
[   21.185452] 
[   21.185508] Allocated by task 268:
[   21.185691]  kasan_save_stack+0x3c/0x68
[   21.185984]  kasan_save_track+0x20/0x40
[   21.186151]  kasan_save_alloc_info+0x40/0x58
[   21.186239]  __kasan_kmalloc+0xd4/0xd8
[   21.186439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.186507]  kasan_atomics+0xb8/0x2e0
[   21.186561]  kunit_try_run_case+0x170/0x3f0
[   21.186609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.186659]  kthread+0x328/0x630
[   21.186893]  ret_from_fork+0x10/0x20
[   21.186981] 
[   21.187041] The buggy address belongs to the object at fff00000c3f85080
[   21.187041]  which belongs to the cache kmalloc-64 of size 64
[   21.187284] The buggy address is located 0 bytes to the right of
[   21.187284]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.187428] 
[   21.187658] The buggy address belongs to the physical page:
[   21.187833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.187898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.188090] page_type: f5(slab)
[   21.188177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.188231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.188445] page dumped because: kasan: bad access detected
[   21.188596] 
[   21.188676] Memory state around the buggy address:
[   21.188744]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.188916]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.189046] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.189231]                                      ^
[   21.189295]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189525]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189674] ==================================================================
[   20.953635] ==================================================================
[   20.953710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.953786] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   20.953865] 
[   20.953920] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   20.954147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   20.954252] Hardware name: linux,dummy-virt (DT)
[   20.954400] Call trace:
[   20.954481]  show_stack+0x20/0x38 (C)
[   20.954565]  dump_stack_lvl+0x8c/0xd0
[   20.954646]  print_report+0x118/0x608
[   20.954695]  kasan_report+0xdc/0x128
[   20.954743]  kasan_check_range+0x100/0x1a8
[   20.954812]  __kasan_check_write+0x20/0x30
[   20.954863]  kasan_atomics_helper+0xa6c/0x4858
[   20.955034]  kasan_atomics+0x198/0x2e0
[   20.955083]  kunit_try_run_case+0x170/0x3f0
[   20.955136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.955210]  kthread+0x328/0x630
[   20.955286]  ret_from_fork+0x10/0x20
[   20.955407] 
[   20.955447] Allocated by task 268:
[   20.955510]  kasan_save_stack+0x3c/0x68
[   20.955570]  kasan_save_track+0x20/0x40
[   20.955712]  kasan_save_alloc_info+0x40/0x58
[   20.955800]  __kasan_kmalloc+0xd4/0xd8
[   20.955973]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.956051]  kasan_atomics+0xb8/0x2e0
[   20.956137]  kunit_try_run_case+0x170/0x3f0
[   20.956217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956313]  kthread+0x328/0x630
[   20.956437]  ret_from_fork+0x10/0x20
[   20.956516] 
[   20.956538] The buggy address belongs to the object at fff00000c3f85080
[   20.956538]  which belongs to the cache kmalloc-64 of size 64
[   20.956597] The buggy address is located 0 bytes to the right of
[   20.956597]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   20.956897] 
[   20.956968] The buggy address belongs to the physical page:
[   20.957068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   20.957155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.957229] page_type: f5(slab)
[   20.957271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.957329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.957383] page dumped because: kasan: bad access detected
[   20.957416] 
[   20.957436] Memory state around the buggy address:
[   20.957509]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.957555]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.957601] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.957639]                                      ^
[   20.957958]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.958088]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.958147] ==================================================================
[   21.074771] ==================================================================
[   21.075006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.075120] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.075174] 
[   21.075225] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.075437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.075483] Hardware name: linux,dummy-virt (DT)
[   21.075518] Call trace:
[   21.075545]  show_stack+0x20/0x38 (C)
[   21.075748]  dump_stack_lvl+0x8c/0xd0
[   21.075826]  print_report+0x118/0x608
[   21.075908]  kasan_report+0xdc/0x128
[   21.076007]  kasan_check_range+0x100/0x1a8
[   21.076075]  __kasan_check_write+0x20/0x30
[   21.076127]  kasan_atomics_helper+0x1058/0x4858
[   21.076317]  kasan_atomics+0x198/0x2e0
[   21.076385]  kunit_try_run_case+0x170/0x3f0
[   21.076457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076519]  kthread+0x328/0x630
[   21.076622]  ret_from_fork+0x10/0x20
[   21.076676] 
[   21.076717] Allocated by task 268:
[   21.076750]  kasan_save_stack+0x3c/0x68
[   21.076854]  kasan_save_track+0x20/0x40
[   21.076912]  kasan_save_alloc_info+0x40/0x58
[   21.077094]  __kasan_kmalloc+0xd4/0xd8
[   21.077153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.077224]  kasan_atomics+0xb8/0x2e0
[   21.077272]  kunit_try_run_case+0x170/0x3f0
[   21.077325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.077491]  kthread+0x328/0x630
[   21.077586]  ret_from_fork+0x10/0x20
[   21.077852] 
[   21.078126] The buggy address belongs to the object at fff00000c3f85080
[   21.078126]  which belongs to the cache kmalloc-64 of size 64
[   21.078245] The buggy address is located 0 bytes to the right of
[   21.078245]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.078335] 
[   21.078373] The buggy address belongs to the physical page:
[   21.078407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.078598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078679] page_type: f5(slab)
[   21.078730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.078885] page dumped because: kasan: bad access detected
[   21.078957] 
[   21.079055] Memory state around the buggy address:
[   21.079112]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.079188]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.079560] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.079628]                                      ^
[   21.079667]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079732]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.079827] ==================================================================
[   21.143113] ==================================================================
[   21.143427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.143601] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.143655] 
[   21.143700] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.143790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.143822] Hardware name: linux,dummy-virt (DT)
[   21.143858] Call trace:
[   21.143885]  show_stack+0x20/0x38 (C)
[   21.143936]  dump_stack_lvl+0x8c/0xd0
[   21.143990]  print_report+0x118/0x608
[   21.144038]  kasan_report+0xdc/0x128
[   21.144101]  kasan_check_range+0x100/0x1a8
[   21.144174]  __kasan_check_write+0x20/0x30
[   21.144228]  kasan_atomics_helper+0x147c/0x4858
[   21.144280]  kasan_atomics+0x198/0x2e0
[   21.144327]  kunit_try_run_case+0x170/0x3f0
[   21.144395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.144453]  kthread+0x328/0x630
[   21.144513]  ret_from_fork+0x10/0x20
[   21.144580] 
[   21.144606] Allocated by task 268:
[   21.144639]  kasan_save_stack+0x3c/0x68
[   21.144681]  kasan_save_track+0x20/0x40
[   21.144722]  kasan_save_alloc_info+0x40/0x58
[   21.144774]  __kasan_kmalloc+0xd4/0xd8
[   21.144822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.144869]  kasan_atomics+0xb8/0x2e0
[   21.144907]  kunit_try_run_case+0x170/0x3f0
[   21.144950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.145006]  kthread+0x328/0x630
[   21.145045]  ret_from_fork+0x10/0x20
[   21.145085] 
[   21.145115] The buggy address belongs to the object at fff00000c3f85080
[   21.145115]  which belongs to the cache kmalloc-64 of size 64
[   21.145174] The buggy address is located 0 bytes to the right of
[   21.145174]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.145257] 
[   21.145281] The buggy address belongs to the physical page:
[   21.145315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.146376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.146439] page_type: f5(slab)
[   21.146490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.146657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.146942] page dumped because: kasan: bad access detected
[   21.147303] 
[   21.147370] Memory state around the buggy address:
[   21.147423]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.147470]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.147843] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.147915]                                      ^
[   21.147963]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148020]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148060] ==================================================================
[   21.134715] ==================================================================
[   21.134772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.134834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.134889] 
[   21.135114] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.135384] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.135429] Hardware name: linux,dummy-virt (DT)
[   21.135465] Call trace:
[   21.135695]  show_stack+0x20/0x38 (C)
[   21.135768]  dump_stack_lvl+0x8c/0xd0
[   21.135926]  print_report+0x118/0x608
[   21.135988]  kasan_report+0xdc/0x128
[   21.136035]  kasan_check_range+0x100/0x1a8
[   21.136088]  __kasan_check_write+0x20/0x30
[   21.136141]  kasan_atomics_helper+0x1414/0x4858
[   21.136193]  kasan_atomics+0x198/0x2e0
[   21.136241]  kunit_try_run_case+0x170/0x3f0
[   21.136293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136855]  kthread+0x328/0x630
[   21.136934]  ret_from_fork+0x10/0x20
[   21.137056] 
[   21.137097] Allocated by task 268:
[   21.137134]  kasan_save_stack+0x3c/0x68
[   21.137190]  kasan_save_track+0x20/0x40
[   21.137314]  kasan_save_alloc_info+0x40/0x58
[   21.137401]  __kasan_kmalloc+0xd4/0xd8
[   21.137445]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.137908]  kasan_atomics+0xb8/0x2e0
[   21.137985]  kunit_try_run_case+0x170/0x3f0
[   21.138061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.138385]  kthread+0x328/0x630
[   21.138441]  ret_from_fork+0x10/0x20
[   21.138678] 
[   21.139053] The buggy address belongs to the object at fff00000c3f85080
[   21.139053]  which belongs to the cache kmalloc-64 of size 64
[   21.139164] The buggy address is located 0 bytes to the right of
[   21.139164]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.139444] 
[   21.139490] The buggy address belongs to the physical page:
[   21.139526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.139900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.140320] page_type: f5(slab)
[   21.140471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.140529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.140574] page dumped because: kasan: bad access detected
[   21.140868] 
[   21.141369] Memory state around the buggy address:
[   21.141449]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.141618]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.141686] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.142016]                                      ^
[   21.142147]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.142297]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.142421] ==================================================================
[   21.112582] ==================================================================
[   21.112657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.112721] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.112833] 
[   21.112868] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.113076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.113120] Hardware name: linux,dummy-virt (DT)
[   21.113261] Call trace:
[   21.113301]  show_stack+0x20/0x38 (C)
[   21.113375]  dump_stack_lvl+0x8c/0xd0
[   21.113582]  print_report+0x118/0x608
[   21.113672]  kasan_report+0xdc/0x128
[   21.113755]  kasan_check_range+0x100/0x1a8
[   21.113854]  __kasan_check_write+0x20/0x30
[   21.113944]  kasan_atomics_helper+0x126c/0x4858
[   21.114072]  kasan_atomics+0x198/0x2e0
[   21.114151]  kunit_try_run_case+0x170/0x3f0
[   21.114258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.114345]  kthread+0x328/0x630
[   21.114429]  ret_from_fork+0x10/0x20
[   21.114629] 
[   21.114653] Allocated by task 268:
[   21.114684]  kasan_save_stack+0x3c/0x68
[   21.114755]  kasan_save_track+0x20/0x40
[   21.114854]  kasan_save_alloc_info+0x40/0x58
[   21.114954]  __kasan_kmalloc+0xd4/0xd8
[   21.115075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.115280]  kasan_atomics+0xb8/0x2e0
[   21.115336]  kunit_try_run_case+0x170/0x3f0
[   21.115437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.115530]  kthread+0x328/0x630
[   21.115600]  ret_from_fork+0x10/0x20
[   21.115668] 
[   21.115805] The buggy address belongs to the object at fff00000c3f85080
[   21.115805]  which belongs to the cache kmalloc-64 of size 64
[   21.115869] The buggy address is located 0 bytes to the right of
[   21.115869]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.116078] 
[   21.116107] The buggy address belongs to the physical page:
[   21.116141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.116232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.116364] page_type: f5(slab)
[   21.116428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.116612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.116686] page dumped because: kasan: bad access detected
[   21.116723] 
[   21.116769] Memory state around the buggy address:
[   21.116819]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.116865]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.116909] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.117124]                                      ^
[   21.117224]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.117299]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.117362] ==================================================================
[   21.168232] ==================================================================
[   21.168293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.168361] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.168415] 
[   21.168450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.168539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.168963] Hardware name: linux,dummy-virt (DT)
[   21.169097] Call trace:
[   21.169221]  show_stack+0x20/0x38 (C)
[   21.169282]  dump_stack_lvl+0x8c/0xd0
[   21.169338]  print_report+0x118/0x608
[   21.169487]  kasan_report+0xdc/0x128
[   21.169598]  kasan_check_range+0x100/0x1a8
[   21.169698]  __kasan_check_write+0x20/0x30
[   21.169752]  kasan_atomics_helper+0x15b4/0x4858
[   21.169805]  kasan_atomics+0x198/0x2e0
[   21.169851]  kunit_try_run_case+0x170/0x3f0
[   21.170150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.170578]  kthread+0x328/0x630
[   21.170664]  ret_from_fork+0x10/0x20
[   21.170827] 
[   21.170878] Allocated by task 268:
[   21.170935]  kasan_save_stack+0x3c/0x68
[   21.171068]  kasan_save_track+0x20/0x40
[   21.171139]  kasan_save_alloc_info+0x40/0x58
[   21.171202]  __kasan_kmalloc+0xd4/0xd8
[   21.171243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.171896]  kasan_atomics+0xb8/0x2e0
[   21.171998]  kunit_try_run_case+0x170/0x3f0
[   21.172053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.173608]  kthread+0x328/0x630
[   21.173670]  ret_from_fork+0x10/0x20
[   21.173713] 
[   21.173737] The buggy address belongs to the object at fff00000c3f85080
[   21.173737]  which belongs to the cache kmalloc-64 of size 64
[   21.174391] The buggy address is located 0 bytes to the right of
[   21.174391]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.174473] 
[   21.174499] The buggy address belongs to the physical page:
[   21.174534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.174592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.174646] page_type: f5(slab)
[   21.174690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.174743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.174787] page dumped because: kasan: bad access detected
[   21.174822] 
[   21.174842] Memory state around the buggy address:
[   21.174878]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.174922]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.174969] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.175014]                                      ^
[   21.175050]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.175095]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.175134] ==================================================================
[   21.061162] ==================================================================
[   21.061223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.061280] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268
[   21.061365] 
[   21.061406] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.061605] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.061970] Hardware name: linux,dummy-virt (DT)
[   21.062040] Call trace:
[   21.062080]  show_stack+0x20/0x38 (C)
[   21.062144]  dump_stack_lvl+0x8c/0xd0
[   21.062221]  print_report+0x118/0x608
[   21.062270]  kasan_report+0xdc/0x128
[   21.062520]  kasan_check_range+0x100/0x1a8
[   21.062592]  __kasan_check_write+0x20/0x30
[   21.062843]  kasan_atomics_helper+0xf88/0x4858
[   21.062960]  kasan_atomics+0x198/0x2e0
[   21.063059]  kunit_try_run_case+0x170/0x3f0
[   21.063277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.063395]  kthread+0x328/0x630
[   21.063748]  ret_from_fork+0x10/0x20
[   21.064007] 
[   21.064076] Allocated by task 268:
[   21.064116]  kasan_save_stack+0x3c/0x68
[   21.064165]  kasan_save_track+0x20/0x40
[   21.064362]  kasan_save_alloc_info+0x40/0x58
[   21.064467]  __kasan_kmalloc+0xd4/0xd8
[   21.064643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.064823]  kasan_atomics+0xb8/0x2e0
[   21.064982]  kunit_try_run_case+0x170/0x3f0
[   21.065079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065193]  kthread+0x328/0x630
[   21.065238]  ret_from_fork+0x10/0x20
[   21.065435] 
[   21.065529] The buggy address belongs to the object at fff00000c3f85080
[   21.065529]  which belongs to the cache kmalloc-64 of size 64
[   21.065700] The buggy address is located 0 bytes to the right of
[   21.065700]  allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0)
[   21.066019] 
[   21.066091] The buggy address belongs to the physical page:
[   21.066146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85
[   21.066214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.066277] page_type: f5(slab)
[   21.066484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.066636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.066695] page dumped because: kasan: bad access detected
[   21.066774] 
[   21.066835] Memory state around the buggy address:
[   21.067006]  fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.067124]  fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.067178] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.067219]                                      ^
[   21.067257]  fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067423]  fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067496] ==================================================================

[   19.935853] ==================================================================
[   19.936500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   19.937008] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.937405] 
[   19.937675] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.937783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.937808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.937848] Call Trace:
[   19.937887]  <TASK>
[   19.937925]  dump_stack_lvl+0x73/0xb0
[   19.937983]  print_report+0xd1/0x650
[   19.938022]  ? __virt_addr_valid+0x1db/0x2d0
[   19.938062]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.938100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.938135]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.938172]  kasan_report+0x141/0x180
[   19.938208]  ? kasan_atomics_helper+0x4b3a/0x5450
[   19.938252]  __asan_report_store4_noabort+0x1b/0x30
[   19.938291]  kasan_atomics_helper+0x4b3a/0x5450
[   19.938337]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.938378]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.938415]  ? trace_hardirqs_on+0x37/0xe0
[   19.938451]  ? kasan_atomics+0x152/0x310
[   19.938488]  kasan_atomics+0x1dc/0x310
[   19.938521]  ? __pfx_kasan_atomics+0x10/0x10
[   19.938555]  ? __pfx_kasan_atomics+0x10/0x10
[   19.938593]  kunit_try_run_case+0x1a5/0x480
[   19.938635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.938672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.938713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.938804]  ? __kthread_parkme+0x82/0x180
[   19.938853]  ? preempt_count_sub+0x50/0x80
[   19.938904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.938956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.939030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.939081]  kthread+0x337/0x6f0
[   19.939141]  ? trace_preempt_on+0x20/0xc0
[   19.939197]  ? __pfx_kthread+0x10/0x10
[   19.939249]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.939288]  ? calculate_sigpending+0x7b/0xa0
[   19.939334]  ? __pfx_kthread+0x10/0x10
[   19.939375]  ret_from_fork+0x41/0x80
[   19.939428]  ? __pfx_kthread+0x10/0x10
[   19.939476]  ret_from_fork_asm+0x1a/0x30
[   19.939555]  </TASK>
[   19.939589] 
[   19.953507] Allocated by task 286:
[   19.953814]  kasan_save_stack+0x45/0x70
[   19.954132]  kasan_save_track+0x18/0x40
[   19.954451]  kasan_save_alloc_info+0x3b/0x50
[   19.958147]  __kasan_kmalloc+0xb7/0xc0
[   19.959064]  __kmalloc_cache_noprof+0x189/0x420
[   19.960389]  kasan_atomics+0x95/0x310
[   19.961879]  kunit_try_run_case+0x1a5/0x480
[   19.963066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.963488]  kthread+0x337/0x6f0
[   19.963777]  ret_from_fork+0x41/0x80
[   19.964039]  ret_from_fork_asm+0x1a/0x30
[   19.964346] 
[   19.964815] The buggy address belongs to the object at ffff888101e04b00
[   19.964815]  which belongs to the cache kmalloc-64 of size 64
[   19.965770] The buggy address is located 0 bytes to the right of
[   19.965770]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.966675] 
[   19.966857] The buggy address belongs to the physical page:
[   19.967095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.967677] flags: 0x200000000000000(node=0|zone=2)
[   19.968248] page_type: f5(slab)
[   19.968610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.969072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.969617] page dumped because: kasan: bad access detected
[   19.969881] 
[   19.970109] Memory state around the buggy address:
[   19.970610]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.971322]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.971798] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.972326]                                      ^
[   19.972570]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.973091]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.973665] ==================================================================
[   20.209804] ==================================================================
[   20.210615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   20.211384] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.211738] 
[   20.211932] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.212056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.212091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.212136] Call Trace:
[   20.212188]  <TASK>
[   20.212231]  dump_stack_lvl+0x73/0xb0
[   20.212307]  print_report+0xd1/0x650
[   20.212354]  ? __virt_addr_valid+0x1db/0x2d0
[   20.212405]  ? kasan_atomics_helper+0x992/0x5450
[   20.212447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.212489]  ? kasan_atomics_helper+0x992/0x5450
[   20.212526]  kasan_report+0x141/0x180
[   20.212573]  ? kasan_atomics_helper+0x992/0x5450
[   20.212630]  kasan_check_range+0x10c/0x1c0
[   20.212669]  __kasan_check_write+0x18/0x20
[   20.212705]  kasan_atomics_helper+0x992/0x5450
[   20.212767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.212819]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.212864]  ? trace_hardirqs_on+0x37/0xe0
[   20.212904]  ? kasan_atomics+0x152/0x310
[   20.213801]  kasan_atomics+0x1dc/0x310
[   20.213859]  ? __pfx_kasan_atomics+0x10/0x10
[   20.213904]  ? __pfx_kasan_atomics+0x10/0x10
[   20.213957]  kunit_try_run_case+0x1a5/0x480
[   20.214009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.214051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.214142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.214192]  ? __kthread_parkme+0x82/0x180
[   20.214239]  ? preempt_count_sub+0x50/0x80
[   20.214292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.214341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.214386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.214427]  kthread+0x337/0x6f0
[   20.214460]  ? trace_preempt_on+0x20/0xc0
[   20.214500]  ? __pfx_kthread+0x10/0x10
[   20.214534]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.214573]  ? calculate_sigpending+0x7b/0xa0
[   20.214617]  ? __pfx_kthread+0x10/0x10
[   20.214656]  ret_from_fork+0x41/0x80
[   20.214703]  ? __pfx_kthread+0x10/0x10
[   20.214743]  ret_from_fork_asm+0x1a/0x30
[   20.214823]  </TASK>
[   20.214849] 
[   20.230135] Allocated by task 286:
[   20.230668]  kasan_save_stack+0x45/0x70
[   20.231165]  kasan_save_track+0x18/0x40
[   20.231564]  kasan_save_alloc_info+0x3b/0x50
[   20.231947]  __kasan_kmalloc+0xb7/0xc0
[   20.232364]  __kmalloc_cache_noprof+0x189/0x420
[   20.232814]  kasan_atomics+0x95/0x310
[   20.233074]  kunit_try_run_case+0x1a5/0x480
[   20.233585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.234170]  kthread+0x337/0x6f0
[   20.234546]  ret_from_fork+0x41/0x80
[   20.234948]  ret_from_fork_asm+0x1a/0x30
[   20.235203] 
[   20.235432] The buggy address belongs to the object at ffff888101e04b00
[   20.235432]  which belongs to the cache kmalloc-64 of size 64
[   20.236281] The buggy address is located 0 bytes to the right of
[   20.236281]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.237166] 
[   20.237399] The buggy address belongs to the physical page:
[   20.237695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.238391] flags: 0x200000000000000(node=0|zone=2)
[   20.238798] page_type: f5(slab)
[   20.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.239735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.240320] page dumped because: kasan: bad access detected
[   20.240710] 
[   20.240928] Memory state around the buggy address:
[   20.241307]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.241842]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.242518] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.242879]                                      ^
[   20.243384]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.243810]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.244401] ==================================================================
[   21.068940] ==================================================================
[   21.069592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   21.070260] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.070927] 
[   21.071174] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.071311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.071337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.071377] Call Trace:
[   21.071415]  <TASK>
[   21.071453]  dump_stack_lvl+0x73/0xb0
[   21.071515]  print_report+0xd1/0x650
[   21.071559]  ? __virt_addr_valid+0x1db/0x2d0
[   21.071599]  ? kasan_atomics_helper+0x164f/0x5450
[   21.071648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.071685]  ? kasan_atomics_helper+0x164f/0x5450
[   21.071720]  kasan_report+0x141/0x180
[   21.071772]  ? kasan_atomics_helper+0x164f/0x5450
[   21.071818]  kasan_check_range+0x10c/0x1c0
[   21.071854]  __kasan_check_write+0x18/0x20
[   21.071887]  kasan_atomics_helper+0x164f/0x5450
[   21.071926]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.071963]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.071999]  ? trace_hardirqs_on+0x37/0xe0
[   21.072039]  ? kasan_atomics+0x152/0x310
[   21.072088]  kasan_atomics+0x1dc/0x310
[   21.072156]  ? __pfx_kasan_atomics+0x10/0x10
[   21.072215]  ? __pfx_kasan_atomics+0x10/0x10
[   21.072268]  kunit_try_run_case+0x1a5/0x480
[   21.072324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.072401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.072471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.072528]  ? __kthread_parkme+0x82/0x180
[   21.072579]  ? preempt_count_sub+0x50/0x80
[   21.072642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.072722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.072801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.072849]  kthread+0x337/0x6f0
[   21.072894]  ? trace_preempt_on+0x20/0xc0
[   21.072948]  ? __pfx_kthread+0x10/0x10
[   21.072995]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.073047]  ? calculate_sigpending+0x7b/0xa0
[   21.073102]  ? __pfx_kthread+0x10/0x10
[   21.073190]  ret_from_fork+0x41/0x80
[   21.073236]  ? __pfx_kthread+0x10/0x10
[   21.073277]  ret_from_fork_asm+0x1a/0x30
[   21.073381]  </TASK>
[   21.073417] 
[   21.085390] Allocated by task 286:
[   21.085828]  kasan_save_stack+0x45/0x70
[   21.086281]  kasan_save_track+0x18/0x40
[   21.086645]  kasan_save_alloc_info+0x3b/0x50
[   21.087068]  __kasan_kmalloc+0xb7/0xc0
[   21.087465]  __kmalloc_cache_noprof+0x189/0x420
[   21.087939]  kasan_atomics+0x95/0x310
[   21.088352]  kunit_try_run_case+0x1a5/0x480
[   21.088780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.089262]  kthread+0x337/0x6f0
[   21.089603]  ret_from_fork+0x41/0x80
[   21.089904]  ret_from_fork_asm+0x1a/0x30
[   21.090185] 
[   21.090407] The buggy address belongs to the object at ffff888101e04b00
[   21.090407]  which belongs to the cache kmalloc-64 of size 64
[   21.091319] The buggy address is located 0 bytes to the right of
[   21.091319]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.092052] 
[   21.092341] The buggy address belongs to the physical page:
[   21.092759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.093440] flags: 0x200000000000000(node=0|zone=2)
[   21.093896] page_type: f5(slab)
[   21.094247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.094762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.095066] page dumped because: kasan: bad access detected
[   21.095691] 
[   21.095947] Memory state around the buggy address:
[   21.096406]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.096851]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.097155] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.097711]                                      ^
[   21.098252]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.098845]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.099342] ==================================================================
[   21.129965] ==================================================================
[   21.130798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   21.131217] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.132021] 
[   21.132283] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.132396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.132418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.132456] Call Trace:
[   21.132494]  <TASK>
[   21.132532]  dump_stack_lvl+0x73/0xb0
[   21.132589]  print_report+0xd1/0x650
[   21.132627]  ? __virt_addr_valid+0x1db/0x2d0
[   21.132666]  ? kasan_atomics_helper+0x177f/0x5450
[   21.132701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.132742]  ? kasan_atomics_helper+0x177f/0x5450
[   21.132815]  kasan_report+0x141/0x180
[   21.132861]  ? kasan_atomics_helper+0x177f/0x5450
[   21.132941]  kasan_check_range+0x10c/0x1c0
[   21.132988]  __kasan_check_write+0x18/0x20
[   21.133032]  kasan_atomics_helper+0x177f/0x5450
[   21.133088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.133184]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.133252]  ? trace_hardirqs_on+0x37/0xe0
[   21.133303]  ? kasan_atomics+0x152/0x310
[   21.133368]  kasan_atomics+0x1dc/0x310
[   21.133418]  ? __pfx_kasan_atomics+0x10/0x10
[   21.133484]  ? __pfx_kasan_atomics+0x10/0x10
[   21.133542]  kunit_try_run_case+0x1a5/0x480
[   21.133611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.133663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.133736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.133800]  ? __kthread_parkme+0x82/0x180
[   21.133861]  ? preempt_count_sub+0x50/0x80
[   21.133936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.133993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.134042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.134092]  kthread+0x337/0x6f0
[   21.134177]  ? trace_preempt_on+0x20/0xc0
[   21.134249]  ? __pfx_kthread+0x10/0x10
[   21.134294]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.134345]  ? calculate_sigpending+0x7b/0xa0
[   21.134402]  ? __pfx_kthread+0x10/0x10
[   21.134465]  ret_from_fork+0x41/0x80
[   21.134522]  ? __pfx_kthread+0x10/0x10
[   21.134566]  ret_from_fork_asm+0x1a/0x30
[   21.134647]  </TASK>
[   21.134685] 
[   21.145453] Allocated by task 286:
[   21.145876]  kasan_save_stack+0x45/0x70
[   21.146221]  kasan_save_track+0x18/0x40
[   21.146558]  kasan_save_alloc_info+0x3b/0x50
[   21.146972]  __kasan_kmalloc+0xb7/0xc0
[   21.147333]  __kmalloc_cache_noprof+0x189/0x420
[   21.147610]  kasan_atomics+0x95/0x310
[   21.147990]  kunit_try_run_case+0x1a5/0x480
[   21.148413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.148763]  kthread+0x337/0x6f0
[   21.149135]  ret_from_fork+0x41/0x80
[   21.149425]  ret_from_fork_asm+0x1a/0x30
[   21.149807] 
[   21.149970] The buggy address belongs to the object at ffff888101e04b00
[   21.149970]  which belongs to the cache kmalloc-64 of size 64
[   21.150791] The buggy address is located 0 bytes to the right of
[   21.150791]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.151567] 
[   21.151812] The buggy address belongs to the physical page:
[   21.152169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.152664] flags: 0x200000000000000(node=0|zone=2)
[   21.152929] page_type: f5(slab)
[   21.153164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.153478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.153782] page dumped because: kasan: bad access detected
[   21.154260] 
[   21.154461] Memory state around the buggy address:
[   21.154892]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.155498]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.156035] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.156607]                                      ^
[   21.157066]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.157642]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159167] ==================================================================
[   21.222811] ==================================================================
[   21.223169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   21.224496] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.225254] 
[   21.225556] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.225723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.225770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.225824] Call Trace:
[   21.225870]  <TASK>
[   21.225917]  dump_stack_lvl+0x73/0xb0
[   21.226006]  print_report+0xd1/0x650
[   21.226062]  ? __virt_addr_valid+0x1db/0x2d0
[   21.226158]  ? kasan_atomics_helper+0x194a/0x5450
[   21.226199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.226226]  ? kasan_atomics_helper+0x194a/0x5450
[   21.226252]  kasan_report+0x141/0x180
[   21.226280]  ? kasan_atomics_helper+0x194a/0x5450
[   21.226310]  kasan_check_range+0x10c/0x1c0
[   21.226335]  __kasan_check_write+0x18/0x20
[   21.226359]  kasan_atomics_helper+0x194a/0x5450
[   21.226385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.226411]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.226436]  ? trace_hardirqs_on+0x37/0xe0
[   21.226462]  ? kasan_atomics+0x152/0x310
[   21.226489]  kasan_atomics+0x1dc/0x310
[   21.226511]  ? __pfx_kasan_atomics+0x10/0x10
[   21.226535]  ? __pfx_kasan_atomics+0x10/0x10
[   21.226562]  kunit_try_run_case+0x1a5/0x480
[   21.226590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.226615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.226643]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.226668]  ? __kthread_parkme+0x82/0x180
[   21.226694]  ? preempt_count_sub+0x50/0x80
[   21.226723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.226771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.226804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.226830]  kthread+0x337/0x6f0
[   21.226850]  ? trace_preempt_on+0x20/0xc0
[   21.226876]  ? __pfx_kthread+0x10/0x10
[   21.226898]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.226922]  ? calculate_sigpending+0x7b/0xa0
[   21.226948]  ? __pfx_kthread+0x10/0x10
[   21.226972]  ret_from_fork+0x41/0x80
[   21.226998]  ? __pfx_kthread+0x10/0x10
[   21.227021]  ret_from_fork_asm+0x1a/0x30
[   21.227057]  </TASK>
[   21.227073] 
[   21.239609] Allocated by task 286:
[   21.239981]  kasan_save_stack+0x45/0x70
[   21.240442]  kasan_save_track+0x18/0x40
[   21.240823]  kasan_save_alloc_info+0x3b/0x50
[   21.241235]  __kasan_kmalloc+0xb7/0xc0
[   21.241597]  __kmalloc_cache_noprof+0x189/0x420
[   21.242021]  kasan_atomics+0x95/0x310
[   21.242384]  kunit_try_run_case+0x1a5/0x480
[   21.242786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.243223]  kthread+0x337/0x6f0
[   21.243548]  ret_from_fork+0x41/0x80
[   21.243782]  ret_from_fork_asm+0x1a/0x30
[   21.244004] 
[   21.244170] The buggy address belongs to the object at ffff888101e04b00
[   21.244170]  which belongs to the cache kmalloc-64 of size 64
[   21.244667] The buggy address is located 0 bytes to the right of
[   21.244667]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.245679] 
[   21.245890] The buggy address belongs to the physical page:
[   21.246377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.247009] flags: 0x200000000000000(node=0|zone=2)
[   21.247295] page_type: f5(slab)
[   21.247507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.247867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.248473] page dumped because: kasan: bad access detected
[   21.248934] 
[   21.249153] Memory state around the buggy address:
[   21.249598]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.249935]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.250257] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.250547]                                      ^
[   21.250785]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.251359]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.251946] ==================================================================
[   21.831703] ==================================================================
[   21.832116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   21.834243] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.834854] 
[   21.835138] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.835546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.835575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.835615] Call Trace:
[   21.835669]  <TASK>
[   21.835710]  dump_stack_lvl+0x73/0xb0
[   21.835808]  print_report+0xd1/0x650
[   21.835851]  ? __virt_addr_valid+0x1db/0x2d0
[   21.835892]  ? kasan_atomics_helper+0x5115/0x5450
[   21.835927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.835962]  ? kasan_atomics_helper+0x5115/0x5450
[   21.835997]  kasan_report+0x141/0x180
[   21.836035]  ? kasan_atomics_helper+0x5115/0x5450
[   21.836079]  __asan_report_load8_noabort+0x18/0x20
[   21.836116]  kasan_atomics_helper+0x5115/0x5450
[   21.836155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.836196]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.836236]  ? trace_hardirqs_on+0x37/0xe0
[   21.836277]  ? kasan_atomics+0x152/0x310
[   21.836312]  kasan_atomics+0x1dc/0x310
[   21.836335]  ? __pfx_kasan_atomics+0x10/0x10
[   21.836359]  ? __pfx_kasan_atomics+0x10/0x10
[   21.836386]  kunit_try_run_case+0x1a5/0x480
[   21.836416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.836441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.836469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.836496]  ? __kthread_parkme+0x82/0x180
[   21.836521]  ? preempt_count_sub+0x50/0x80
[   21.836551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.836577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.836603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.836632]  kthread+0x337/0x6f0
[   21.836652]  ? trace_preempt_on+0x20/0xc0
[   21.836678]  ? __pfx_kthread+0x10/0x10
[   21.836699]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.836723]  ? calculate_sigpending+0x7b/0xa0
[   21.836775]  ? __pfx_kthread+0x10/0x10
[   21.836802]  ret_from_fork+0x41/0x80
[   21.836829]  ? __pfx_kthread+0x10/0x10
[   21.836850]  ret_from_fork_asm+0x1a/0x30
[   21.836886]  </TASK>
[   21.836903] 
[   21.848204] Allocated by task 286:
[   21.848679]  kasan_save_stack+0x45/0x70
[   21.849227]  kasan_save_track+0x18/0x40
[   21.849623]  kasan_save_alloc_info+0x3b/0x50
[   21.850046]  __kasan_kmalloc+0xb7/0xc0
[   21.850478]  __kmalloc_cache_noprof+0x189/0x420
[   21.850923]  kasan_atomics+0x95/0x310
[   21.851352]  kunit_try_run_case+0x1a5/0x480
[   21.851701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.852199]  kthread+0x337/0x6f0
[   21.852576]  ret_from_fork+0x41/0x80
[   21.852856]  ret_from_fork_asm+0x1a/0x30
[   21.853288] 
[   21.853498] The buggy address belongs to the object at ffff888101e04b00
[   21.853498]  which belongs to the cache kmalloc-64 of size 64
[   21.854344] The buggy address is located 0 bytes to the right of
[   21.854344]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.855064] 
[   21.855330] The buggy address belongs to the physical page:
[   21.855695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.856383] flags: 0x200000000000000(node=0|zone=2)
[   21.856827] page_type: f5(slab)
[   21.857224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.857755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.858324] page dumped because: kasan: bad access detected
[   21.858680] 
[   21.858886] Memory state around the buggy address:
[   21.859180]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.859829]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.860478] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.860949]                                      ^
[   21.861372]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.861829]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.862430] ==================================================================
[   19.845945] ==================================================================
[   19.846651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   19.847198] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.847644] 
[   19.847893] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.848045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.848094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.848171] Call Trace:
[   19.848217]  <TASK>
[   19.848266]  dump_stack_lvl+0x73/0xb0
[   19.848370]  print_report+0xd1/0x650
[   19.848421]  ? __virt_addr_valid+0x1db/0x2d0
[   19.848479]  ? kasan_atomics_helper+0x3df/0x5450
[   19.848527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.848578]  ? kasan_atomics_helper+0x3df/0x5450
[   19.848626]  kasan_report+0x141/0x180
[   19.848678]  ? kasan_atomics_helper+0x3df/0x5450
[   19.848733]  kasan_check_range+0x10c/0x1c0
[   19.848793]  __kasan_check_read+0x15/0x20
[   19.848840]  kasan_atomics_helper+0x3df/0x5450
[   19.848913]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.848964]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.849018]  ? trace_hardirqs_on+0x37/0xe0
[   19.849072]  ? kasan_atomics+0x152/0x310
[   19.849166]  kasan_atomics+0x1dc/0x310
[   19.849214]  ? __pfx_kasan_atomics+0x10/0x10
[   19.849262]  ? __pfx_kasan_atomics+0x10/0x10
[   19.849336]  kunit_try_run_case+0x1a5/0x480
[   19.849390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.849434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.849491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.849540]  ? __kthread_parkme+0x82/0x180
[   19.849573]  ? preempt_count_sub+0x50/0x80
[   19.849604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.849632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.849658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.849684]  kthread+0x337/0x6f0
[   19.849705]  ? trace_preempt_on+0x20/0xc0
[   19.849731]  ? __pfx_kthread+0x10/0x10
[   19.849778]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.849809]  ? calculate_sigpending+0x7b/0xa0
[   19.849890]  ? __pfx_kthread+0x10/0x10
[   19.849915]  ret_from_fork+0x41/0x80
[   19.849943]  ? __pfx_kthread+0x10/0x10
[   19.849964]  ret_from_fork_asm+0x1a/0x30
[   19.850002]  </TASK>
[   19.850019] 
[   19.860968] Allocated by task 286:
[   19.861392]  kasan_save_stack+0x45/0x70
[   19.861739]  kasan_save_track+0x18/0x40
[   19.862116]  kasan_save_alloc_info+0x3b/0x50
[   19.862413]  __kasan_kmalloc+0xb7/0xc0
[   19.862721]  __kmalloc_cache_noprof+0x189/0x420
[   19.863158]  kasan_atomics+0x95/0x310
[   19.863509]  kunit_try_run_case+0x1a5/0x480
[   19.863901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.864274]  kthread+0x337/0x6f0
[   19.864598]  ret_from_fork+0x41/0x80
[   19.864887]  ret_from_fork_asm+0x1a/0x30
[   19.865257] 
[   19.865465] The buggy address belongs to the object at ffff888101e04b00
[   19.865465]  which belongs to the cache kmalloc-64 of size 64
[   19.866150] The buggy address is located 0 bytes to the right of
[   19.866150]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.866671] 
[   19.866854] The buggy address belongs to the physical page:
[   19.867337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.867974] flags: 0x200000000000000(node=0|zone=2)
[   19.868419] page_type: f5(slab)
[   19.868766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.869392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.869907] page dumped because: kasan: bad access detected
[   19.870257] 
[   19.870453] Memory state around the buggy address:
[   19.870782]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.871337]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.871865] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.872339]                                      ^
[   19.872688]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.873159]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.873608] ==================================================================
[   20.896035] ==================================================================
[   20.896440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   20.897153] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.897578] 
[   20.897773] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.897891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.897934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.897981] Call Trace:
[   20.898044]  <TASK>
[   20.898093]  dump_stack_lvl+0x73/0xb0
[   20.898171]  print_report+0xd1/0x650
[   20.898229]  ? __virt_addr_valid+0x1db/0x2d0
[   20.898287]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.898353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.898403]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.898453]  kasan_report+0x141/0x180
[   20.898502]  ? kasan_atomics_helper+0x4eae/0x5450
[   20.898575]  __asan_report_load8_noabort+0x18/0x20
[   20.898644]  kasan_atomics_helper+0x4eae/0x5450
[   20.898698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.898766]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.898824]  ? trace_hardirqs_on+0x37/0xe0
[   20.898892]  ? kasan_atomics+0x152/0x310
[   20.898948]  kasan_atomics+0x1dc/0x310
[   20.898981]  ? __pfx_kasan_atomics+0x10/0x10
[   20.899006]  ? __pfx_kasan_atomics+0x10/0x10
[   20.899033]  kunit_try_run_case+0x1a5/0x480
[   20.899064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.899093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.899138]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.899182]  ? __kthread_parkme+0x82/0x180
[   20.899231]  ? preempt_count_sub+0x50/0x80
[   20.899286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.899350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.899421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.899470]  kthread+0x337/0x6f0
[   20.899511]  ? trace_preempt_on+0x20/0xc0
[   20.899562]  ? __pfx_kthread+0x10/0x10
[   20.899619]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.899699]  ? calculate_sigpending+0x7b/0xa0
[   20.899758]  ? __pfx_kthread+0x10/0x10
[   20.899803]  ret_from_fork+0x41/0x80
[   20.899836]  ? __pfx_kthread+0x10/0x10
[   20.899859]  ret_from_fork_asm+0x1a/0x30
[   20.899914]  </TASK>
[   20.899933] 
[   20.913339] Allocated by task 286:
[   20.913853]  kasan_save_stack+0x45/0x70
[   20.914346]  kasan_save_track+0x18/0x40
[   20.914701]  kasan_save_alloc_info+0x3b/0x50
[   20.915200]  __kasan_kmalloc+0xb7/0xc0
[   20.915558]  __kmalloc_cache_noprof+0x189/0x420
[   20.916071]  kasan_atomics+0x95/0x310
[   20.916491]  kunit_try_run_case+0x1a5/0x480
[   20.916993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.917419]  kthread+0x337/0x6f0
[   20.917803]  ret_from_fork+0x41/0x80
[   20.918144]  ret_from_fork_asm+0x1a/0x30
[   20.918476] 
[   20.918729] The buggy address belongs to the object at ffff888101e04b00
[   20.918729]  which belongs to the cache kmalloc-64 of size 64
[   20.919600] The buggy address is located 0 bytes to the right of
[   20.919600]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.920653] 
[   20.920898] The buggy address belongs to the physical page:
[   20.921381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.922033] flags: 0x200000000000000(node=0|zone=2)
[   20.922440] page_type: f5(slab)
[   20.922822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.923349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.924034] page dumped because: kasan: bad access detected
[   20.924518] 
[   20.924872] Memory state around the buggy address:
[   20.925133]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.925862]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.926380] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.926836]                                      ^
[   20.927407]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.927813]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.928448] ==================================================================
[   20.176117] ==================================================================
[   20.176854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   20.177235] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.177935] 
[   20.178124] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.178230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.178262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.178311] Call Trace:
[   20.178358]  <TASK>
[   20.178396]  dump_stack_lvl+0x73/0xb0
[   20.178458]  print_report+0xd1/0x650
[   20.178501]  ? __virt_addr_valid+0x1db/0x2d0
[   20.178540]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.178575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.178613]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.178648]  kasan_report+0x141/0x180
[   20.178685]  ? kasan_atomics_helper+0x8f9/0x5450
[   20.178731]  kasan_check_range+0x10c/0x1c0
[   20.178784]  __kasan_check_write+0x18/0x20
[   20.178823]  kasan_atomics_helper+0x8f9/0x5450
[   20.178861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.178897]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.178934]  ? trace_hardirqs_on+0x37/0xe0
[   20.178971]  ? kasan_atomics+0x152/0x310
[   20.179017]  kasan_atomics+0x1dc/0x310
[   20.179060]  ? __pfx_kasan_atomics+0x10/0x10
[   20.179105]  ? __pfx_kasan_atomics+0x10/0x10
[   20.179587]  kunit_try_run_case+0x1a5/0x480
[   20.179677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.179729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.179788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.179817]  ? __kthread_parkme+0x82/0x180
[   20.179844]  ? preempt_count_sub+0x50/0x80
[   20.179875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.179902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.179928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.179954]  kthread+0x337/0x6f0
[   20.179976]  ? trace_preempt_on+0x20/0xc0
[   20.180002]  ? __pfx_kthread+0x10/0x10
[   20.180024]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.180048]  ? calculate_sigpending+0x7b/0xa0
[   20.180074]  ? __pfx_kthread+0x10/0x10
[   20.180096]  ret_from_fork+0x41/0x80
[   20.180171]  ? __pfx_kthread+0x10/0x10
[   20.180196]  ret_from_fork_asm+0x1a/0x30
[   20.180233]  </TASK>
[   20.180251] 
[   20.193282] Allocated by task 286:
[   20.193687]  kasan_save_stack+0x45/0x70
[   20.194157]  kasan_save_track+0x18/0x40
[   20.194448]  kasan_save_alloc_info+0x3b/0x50
[   20.194832]  __kasan_kmalloc+0xb7/0xc0
[   20.195236]  __kmalloc_cache_noprof+0x189/0x420
[   20.195487]  kasan_atomics+0x95/0x310
[   20.195804]  kunit_try_run_case+0x1a5/0x480
[   20.196168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.196634]  kthread+0x337/0x6f0
[   20.196943]  ret_from_fork+0x41/0x80
[   20.197150]  ret_from_fork_asm+0x1a/0x30
[   20.197378] 
[   20.197516] The buggy address belongs to the object at ffff888101e04b00
[   20.197516]  which belongs to the cache kmalloc-64 of size 64
[   20.198195] The buggy address is located 0 bytes to the right of
[   20.198195]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.200160] 
[   20.200888] The buggy address belongs to the physical page:
[   20.201544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.202512] flags: 0x200000000000000(node=0|zone=2)
[   20.202828] page_type: f5(slab)
[   20.202953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.203330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.203957] page dumped because: kasan: bad access detected
[   20.204453] 
[   20.204651] Memory state around the buggy address:
[   20.205007]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.205450]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.206727] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.207245]                                      ^
[   20.207672]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208163]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208616] ==================================================================
[   20.604381] ==================================================================
[   20.605043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   20.605819] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.606455] 
[   20.606676] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.606809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.606867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.606916] Call Trace:
[   20.606963]  <TASK>
[   20.607010]  dump_stack_lvl+0x73/0xb0
[   20.607137]  print_report+0xd1/0x650
[   20.607210]  ? __virt_addr_valid+0x1db/0x2d0
[   20.607269]  ? kasan_atomics_helper+0x1079/0x5450
[   20.607319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.607369]  ? kasan_atomics_helper+0x1079/0x5450
[   20.607423]  kasan_report+0x141/0x180
[   20.607475]  ? kasan_atomics_helper+0x1079/0x5450
[   20.607530]  kasan_check_range+0x10c/0x1c0
[   20.607576]  __kasan_check_write+0x18/0x20
[   20.607637]  kasan_atomics_helper+0x1079/0x5450
[   20.607698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.607765]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.607810]  ? trace_hardirqs_on+0x37/0xe0
[   20.607840]  ? kasan_atomics+0x152/0x310
[   20.607869]  kasan_atomics+0x1dc/0x310
[   20.607892]  ? __pfx_kasan_atomics+0x10/0x10
[   20.607916]  ? __pfx_kasan_atomics+0x10/0x10
[   20.607943]  kunit_try_run_case+0x1a5/0x480
[   20.607974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.607999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.608028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.608054]  ? __kthread_parkme+0x82/0x180
[   20.608080]  ? preempt_count_sub+0x50/0x80
[   20.608132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.608174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.608201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.608227]  kthread+0x337/0x6f0
[   20.608248]  ? trace_preempt_on+0x20/0xc0
[   20.608274]  ? __pfx_kthread+0x10/0x10
[   20.608295]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.608320]  ? calculate_sigpending+0x7b/0xa0
[   20.608346]  ? __pfx_kthread+0x10/0x10
[   20.608368]  ret_from_fork+0x41/0x80
[   20.608394]  ? __pfx_kthread+0x10/0x10
[   20.608418]  ret_from_fork_asm+0x1a/0x30
[   20.608454]  </TASK>
[   20.608472] 
[   20.621602] Allocated by task 286:
[   20.621995]  kasan_save_stack+0x45/0x70
[   20.622308]  kasan_save_track+0x18/0x40
[   20.622520]  kasan_save_alloc_info+0x3b/0x50
[   20.622743]  __kasan_kmalloc+0xb7/0xc0
[   20.623088]  __kmalloc_cache_noprof+0x189/0x420
[   20.623526]  kasan_atomics+0x95/0x310
[   20.623929]  kunit_try_run_case+0x1a5/0x480
[   20.624413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.624941]  kthread+0x337/0x6f0
[   20.625319]  ret_from_fork+0x41/0x80
[   20.625730]  ret_from_fork_asm+0x1a/0x30
[   20.626240] 
[   20.626480] The buggy address belongs to the object at ffff888101e04b00
[   20.626480]  which belongs to the cache kmalloc-64 of size 64
[   20.626953] The buggy address is located 0 bytes to the right of
[   20.626953]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.627447] 
[   20.627587] The buggy address belongs to the physical page:
[   20.628025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.628734] flags: 0x200000000000000(node=0|zone=2)
[   20.629238] page_type: f5(slab)
[   20.629633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.630266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.630574] page dumped because: kasan: bad access detected
[   20.630822] 
[   20.630944] Memory state around the buggy address:
[   20.631231]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.631724]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.632323] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.632691]                                      ^
[   20.632941]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.633248]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.633790] ==================================================================
[   21.189157] ==================================================================
[   21.191017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   21.192303] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.193660] 
[   21.194148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.194285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.194323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.194377] Call Trace:
[   21.194426]  <TASK>
[   21.194475]  dump_stack_lvl+0x73/0xb0
[   21.194561]  print_report+0xd1/0x650
[   21.194621]  ? __virt_addr_valid+0x1db/0x2d0
[   21.194674]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.194718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.194782]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.194830]  kasan_report+0x141/0x180
[   21.194891]  ? kasan_atomics_helper+0x18b1/0x5450
[   21.194974]  kasan_check_range+0x10c/0x1c0
[   21.195022]  __kasan_check_write+0x18/0x20
[   21.195063]  kasan_atomics_helper+0x18b1/0x5450
[   21.195111]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.195171]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.195220]  ? trace_hardirqs_on+0x37/0xe0
[   21.195282]  ? kasan_atomics+0x152/0x310
[   21.195359]  kasan_atomics+0x1dc/0x310
[   21.195405]  ? __pfx_kasan_atomics+0x10/0x10
[   21.195453]  ? __pfx_kasan_atomics+0x10/0x10
[   21.195485]  kunit_try_run_case+0x1a5/0x480
[   21.195528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.195556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.195603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.195652]  ? __kthread_parkme+0x82/0x180
[   21.195682]  ? preempt_count_sub+0x50/0x80
[   21.195722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.195773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.195806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.195833]  kthread+0x337/0x6f0
[   21.195863]  ? trace_preempt_on+0x20/0xc0
[   21.195889]  ? __pfx_kthread+0x10/0x10
[   21.195910]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.195945]  ? calculate_sigpending+0x7b/0xa0
[   21.195971]  ? __pfx_kthread+0x10/0x10
[   21.195993]  ret_from_fork+0x41/0x80
[   21.196028]  ? __pfx_kthread+0x10/0x10
[   21.196052]  ret_from_fork_asm+0x1a/0x30
[   21.196097]  </TASK>
[   21.196122] 
[   21.207359] Allocated by task 286:
[   21.207810]  kasan_save_stack+0x45/0x70
[   21.208248]  kasan_save_track+0x18/0x40
[   21.208583]  kasan_save_alloc_info+0x3b/0x50
[   21.208966]  __kasan_kmalloc+0xb7/0xc0
[   21.209355]  __kmalloc_cache_noprof+0x189/0x420
[   21.209685]  kasan_atomics+0x95/0x310
[   21.209901]  kunit_try_run_case+0x1a5/0x480
[   21.210329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.210765]  kthread+0x337/0x6f0
[   21.211076]  ret_from_fork+0x41/0x80
[   21.211362]  ret_from_fork_asm+0x1a/0x30
[   21.211581] 
[   21.211728] The buggy address belongs to the object at ffff888101e04b00
[   21.211728]  which belongs to the cache kmalloc-64 of size 64
[   21.212183] The buggy address is located 0 bytes to the right of
[   21.212183]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.212659] 
[   21.212854] The buggy address belongs to the physical page:
[   21.213370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.214015] flags: 0x200000000000000(node=0|zone=2)
[   21.214583] page_type: f5(slab)
[   21.214925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.215685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.216288] page dumped because: kasan: bad access detected
[   21.216700] 
[   21.216842] Memory state around the buggy address:
[   21.217057]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.217616]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.218156] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.218864]                                      ^
[   21.219786]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.221040]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.221640] ==================================================================
[   20.275485] ==================================================================
[   20.276802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   20.277790] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.278422] 
[   20.278659] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.278839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.278877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.278928] Call Trace:
[   20.278975]  <TASK>
[   20.279023]  dump_stack_lvl+0x73/0xb0
[   20.279178]  print_report+0xd1/0x650
[   20.279240]  ? __virt_addr_valid+0x1db/0x2d0
[   20.279297]  ? kasan_atomics_helper+0xac7/0x5450
[   20.279379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.279437]  ? kasan_atomics_helper+0xac7/0x5450
[   20.279488]  kasan_report+0x141/0x180
[   20.279534]  ? kasan_atomics_helper+0xac7/0x5450
[   20.279567]  kasan_check_range+0x10c/0x1c0
[   20.279591]  __kasan_check_write+0x18/0x20
[   20.279614]  kasan_atomics_helper+0xac7/0x5450
[   20.279661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.279703]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.279760]  ? trace_hardirqs_on+0x37/0xe0
[   20.279811]  ? kasan_atomics+0x152/0x310
[   20.279903]  kasan_atomics+0x1dc/0x310
[   20.279950]  ? __pfx_kasan_atomics+0x10/0x10
[   20.280000]  ? __pfx_kasan_atomics+0x10/0x10
[   20.280056]  kunit_try_run_case+0x1a5/0x480
[   20.280182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.280234]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.280286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.280331]  ? __kthread_parkme+0x82/0x180
[   20.280361]  ? preempt_count_sub+0x50/0x80
[   20.280392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.280420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.280447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.280473]  kthread+0x337/0x6f0
[   20.280494]  ? trace_preempt_on+0x20/0xc0
[   20.280522]  ? __pfx_kthread+0x10/0x10
[   20.280543]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.280568]  ? calculate_sigpending+0x7b/0xa0
[   20.280593]  ? __pfx_kthread+0x10/0x10
[   20.280616]  ret_from_fork+0x41/0x80
[   20.280642]  ? __pfx_kthread+0x10/0x10
[   20.280665]  ret_from_fork_asm+0x1a/0x30
[   20.280701]  </TASK>
[   20.280718] 
[   20.291641] Allocated by task 286:
[   20.292141]  kasan_save_stack+0x45/0x70
[   20.292473]  kasan_save_track+0x18/0x40
[   20.292834]  kasan_save_alloc_info+0x3b/0x50
[   20.293243]  __kasan_kmalloc+0xb7/0xc0
[   20.293490]  __kmalloc_cache_noprof+0x189/0x420
[   20.293760]  kasan_atomics+0x95/0x310
[   20.294136]  kunit_try_run_case+0x1a5/0x480
[   20.294511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.294987]  kthread+0x337/0x6f0
[   20.295332]  ret_from_fork+0x41/0x80
[   20.295694]  ret_from_fork_asm+0x1a/0x30
[   20.296066] 
[   20.296238] The buggy address belongs to the object at ffff888101e04b00
[   20.296238]  which belongs to the cache kmalloc-64 of size 64
[   20.296696] The buggy address is located 0 bytes to the right of
[   20.296696]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.297710] 
[   20.297952] The buggy address belongs to the physical page:
[   20.298448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.299006] flags: 0x200000000000000(node=0|zone=2)
[   20.299354] page_type: f5(slab)
[   20.299662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.300251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.300561] page dumped because: kasan: bad access detected
[   20.300832] 
[   20.301056] Memory state around the buggy address:
[   20.301523]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.302126]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.302699] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.303086]                                      ^
[   20.303543]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.303902]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.304263] ==================================================================
[   19.903555] ==================================================================
[   19.904305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   19.904909] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.905476] 
[   19.905732] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.905885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.905920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.905984] Call Trace:
[   19.906043]  <TASK>
[   19.906127]  dump_stack_lvl+0x73/0xb0
[   19.906215]  print_report+0xd1/0x650
[   19.906282]  ? __virt_addr_valid+0x1db/0x2d0
[   19.906347]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.906390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.906429]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.906468]  kasan_report+0x141/0x180
[   19.906517]  ? kasan_atomics_helper+0x4a0/0x5450
[   19.906567]  kasan_check_range+0x10c/0x1c0
[   19.906606]  __kasan_check_write+0x18/0x20
[   19.906652]  kasan_atomics_helper+0x4a0/0x5450
[   19.906724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.906786]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.906855]  ? trace_hardirqs_on+0x37/0xe0
[   19.906901]  ? kasan_atomics+0x152/0x310
[   19.906949]  kasan_atomics+0x1dc/0x310
[   19.906998]  ? __pfx_kasan_atomics+0x10/0x10
[   19.907063]  ? __pfx_kasan_atomics+0x10/0x10
[   19.907147]  kunit_try_run_case+0x1a5/0x480
[   19.907208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.907258]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.907317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.907372]  ? __kthread_parkme+0x82/0x180
[   19.907411]  ? preempt_count_sub+0x50/0x80
[   19.907469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.907527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.907584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.907654]  kthread+0x337/0x6f0
[   19.907700]  ? trace_preempt_on+0x20/0xc0
[   19.907764]  ? __pfx_kthread+0x10/0x10
[   19.907814]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.907867]  ? calculate_sigpending+0x7b/0xa0
[   19.907925]  ? __pfx_kthread+0x10/0x10
[   19.907974]  ret_from_fork+0x41/0x80
[   19.908028]  ? __pfx_kthread+0x10/0x10
[   19.908077]  ret_from_fork_asm+0x1a/0x30
[   19.908184]  </TASK>
[   19.908217] 
[   19.919785] Allocated by task 286:
[   19.920281]  kasan_save_stack+0x45/0x70
[   19.920640]  kasan_save_track+0x18/0x40
[   19.920988]  kasan_save_alloc_info+0x3b/0x50
[   19.921257]  __kasan_kmalloc+0xb7/0xc0
[   19.921465]  __kmalloc_cache_noprof+0x189/0x420
[   19.921699]  kasan_atomics+0x95/0x310
[   19.921912]  kunit_try_run_case+0x1a5/0x480
[   19.922164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.922532]  kthread+0x337/0x6f0
[   19.922876]  ret_from_fork+0x41/0x80
[   19.923289]  ret_from_fork_asm+0x1a/0x30
[   19.923704] 
[   19.923927] The buggy address belongs to the object at ffff888101e04b00
[   19.923927]  which belongs to the cache kmalloc-64 of size 64
[   19.926075] The buggy address is located 0 bytes to the right of
[   19.926075]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.927095] 
[   19.927687] The buggy address belongs to the physical page:
[   19.928189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.928477] flags: 0x200000000000000(node=0|zone=2)
[   19.929019] page_type: f5(slab)
[   19.929521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.930270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.930576] page dumped because: kasan: bad access detected
[   19.931018] 
[   19.931176] Memory state around the buggy address:
[   19.931648]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.932082]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.932755] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.933286]                                      ^
[   19.933624]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.934005]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.934513] ==================================================================
[   20.143152] ==================================================================
[   20.143699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   20.144650] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.145253] 
[   20.145500] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.145629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.145666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.145722] Call Trace:
[   20.145780]  <TASK>
[   20.145830]  dump_stack_lvl+0x73/0xb0
[   20.145913]  print_report+0xd1/0x650
[   20.145971]  ? __virt_addr_valid+0x1db/0x2d0
[   20.146031]  ? kasan_atomics_helper+0x860/0x5450
[   20.146087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.146154]  ? kasan_atomics_helper+0x860/0x5450
[   20.146212]  kasan_report+0x141/0x180
[   20.146268]  ? kasan_atomics_helper+0x860/0x5450
[   20.146335]  kasan_check_range+0x10c/0x1c0
[   20.146389]  __kasan_check_write+0x18/0x20
[   20.146429]  kasan_atomics_helper+0x860/0x5450
[   20.146475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.146525]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.146573]  ? trace_hardirqs_on+0x37/0xe0
[   20.146621]  ? kasan_atomics+0x152/0x310
[   20.146678]  kasan_atomics+0x1dc/0x310
[   20.146721]  ? __pfx_kasan_atomics+0x10/0x10
[   20.146809]  ? __pfx_kasan_atomics+0x10/0x10
[   20.146857]  kunit_try_run_case+0x1a5/0x480
[   20.146914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.146965]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.147021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.147076]  ? __kthread_parkme+0x82/0x180
[   20.147118]  ? preempt_count_sub+0x50/0x80
[   20.147177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.147208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.147235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.147260]  kthread+0x337/0x6f0
[   20.147282]  ? trace_preempt_on+0x20/0xc0
[   20.147307]  ? __pfx_kthread+0x10/0x10
[   20.147329]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.147353]  ? calculate_sigpending+0x7b/0xa0
[   20.147378]  ? __pfx_kthread+0x10/0x10
[   20.147400]  ret_from_fork+0x41/0x80
[   20.147425]  ? __pfx_kthread+0x10/0x10
[   20.147447]  ret_from_fork_asm+0x1a/0x30
[   20.147483]  </TASK>
[   20.147500] 
[   20.159420] Allocated by task 286:
[   20.159859]  kasan_save_stack+0x45/0x70
[   20.160288]  kasan_save_track+0x18/0x40
[   20.160790]  kasan_save_alloc_info+0x3b/0x50
[   20.161283]  __kasan_kmalloc+0xb7/0xc0
[   20.161770]  __kmalloc_cache_noprof+0x189/0x420
[   20.162231]  kasan_atomics+0x95/0x310
[   20.162557]  kunit_try_run_case+0x1a5/0x480
[   20.162923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.163397]  kthread+0x337/0x6f0
[   20.163779]  ret_from_fork+0x41/0x80
[   20.164125]  ret_from_fork_asm+0x1a/0x30
[   20.164419] 
[   20.164658] The buggy address belongs to the object at ffff888101e04b00
[   20.164658]  which belongs to the cache kmalloc-64 of size 64
[   20.165457] The buggy address is located 0 bytes to the right of
[   20.165457]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.166107] 
[   20.166325] The buggy address belongs to the physical page:
[   20.166733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.167364] flags: 0x200000000000000(node=0|zone=2)
[   20.167685] page_type: f5(slab)
[   20.168438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.169541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.169883] page dumped because: kasan: bad access detected
[   20.170543] 
[   20.170886] Memory state around the buggy address:
[   20.171139]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.171731]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.172177] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.172583]                                      ^
[   20.172999]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.173612]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.174225] ==================================================================
[   20.078488] ==================================================================
[   20.078883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   20.079528] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.079952] 
[   20.080271] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.080393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.080428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.080474] Call Trace:
[   20.080523]  <TASK>
[   20.080569]  dump_stack_lvl+0x73/0xb0
[   20.080648]  print_report+0xd1/0x650
[   20.080697]  ? __virt_addr_valid+0x1db/0x2d0
[   20.080772]  ? kasan_atomics_helper+0x72f/0x5450
[   20.080822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.080877]  ? kasan_atomics_helper+0x72f/0x5450
[   20.080931]  kasan_report+0x141/0x180
[   20.080988]  ? kasan_atomics_helper+0x72f/0x5450
[   20.081053]  kasan_check_range+0x10c/0x1c0
[   20.081132]  __kasan_check_write+0x18/0x20
[   20.081169]  kasan_atomics_helper+0x72f/0x5450
[   20.081196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.081222]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.081248]  ? trace_hardirqs_on+0x37/0xe0
[   20.081274]  ? kasan_atomics+0x152/0x310
[   20.081301]  kasan_atomics+0x1dc/0x310
[   20.081323]  ? __pfx_kasan_atomics+0x10/0x10
[   20.081347]  ? __pfx_kasan_atomics+0x10/0x10
[   20.081374]  kunit_try_run_case+0x1a5/0x480
[   20.081405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.081430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.081459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.081484]  ? __kthread_parkme+0x82/0x180
[   20.081511]  ? preempt_count_sub+0x50/0x80
[   20.081540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.081567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.081592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.081618]  kthread+0x337/0x6f0
[   20.081639]  ? trace_preempt_on+0x20/0xc0
[   20.081665]  ? __pfx_kthread+0x10/0x10
[   20.081686]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.081710]  ? calculate_sigpending+0x7b/0xa0
[   20.081736]  ? __pfx_kthread+0x10/0x10
[   20.081783]  ret_from_fork+0x41/0x80
[   20.081811]  ? __pfx_kthread+0x10/0x10
[   20.081835]  ret_from_fork_asm+0x1a/0x30
[   20.081872]  </TASK>
[   20.081888] 
[   20.094588] Allocated by task 286:
[   20.095065]  kasan_save_stack+0x45/0x70
[   20.095377]  kasan_save_track+0x18/0x40
[   20.095602]  kasan_save_alloc_info+0x3b/0x50
[   20.095854]  __kasan_kmalloc+0xb7/0xc0
[   20.096071]  __kmalloc_cache_noprof+0x189/0x420
[   20.096454]  kasan_atomics+0x95/0x310
[   20.097054]  kunit_try_run_case+0x1a5/0x480
[   20.097728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.098296]  kthread+0x337/0x6f0
[   20.098651]  ret_from_fork+0x41/0x80
[   20.099040]  ret_from_fork_asm+0x1a/0x30
[   20.099460] 
[   20.099713] The buggy address belongs to the object at ffff888101e04b00
[   20.099713]  which belongs to the cache kmalloc-64 of size 64
[   20.100628] The buggy address is located 0 bytes to the right of
[   20.100628]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.101364] 
[   20.101528] The buggy address belongs to the physical page:
[   20.102042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.102809] flags: 0x200000000000000(node=0|zone=2)
[   20.103167] page_type: f5(slab)
[   20.103391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.104072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.104759] page dumped because: kasan: bad access detected
[   20.105267] 
[   20.105466] Memory state around the buggy address:
[   20.106146]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.106599]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.107064] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.107455]                                      ^
[   20.107863]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.108384]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.108856] ==================================================================
[   19.874857] ==================================================================
[   19.875599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   19.876022] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.876419] 
[   19.876617] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.876732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.876826] Call Trace:
[   19.876874]  <TASK>
[   19.876922]  dump_stack_lvl+0x73/0xb0
[   19.876997]  print_report+0xd1/0x650
[   19.877055]  ? __virt_addr_valid+0x1db/0x2d0
[   19.877149]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.877207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.877264]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.877317]  kasan_report+0x141/0x180
[   19.877374]  ? kasan_atomics_helper+0x4b54/0x5450
[   19.877426]  __asan_report_load4_noabort+0x18/0x20
[   19.877470]  kasan_atomics_helper+0x4b54/0x5450
[   19.877521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.877594]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.877648]  ? trace_hardirqs_on+0x37/0xe0
[   19.877715]  ? kasan_atomics+0x152/0x310
[   19.877790]  kasan_atomics+0x1dc/0x310
[   19.877834]  ? __pfx_kasan_atomics+0x10/0x10
[   19.877879]  ? __pfx_kasan_atomics+0x10/0x10
[   19.877933]  kunit_try_run_case+0x1a5/0x480
[   19.877995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.878049]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.878141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.878195]  ? __kthread_parkme+0x82/0x180
[   19.878240]  ? preempt_count_sub+0x50/0x80
[   19.878288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.878339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.878414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.878465]  kthread+0x337/0x6f0
[   19.878507]  ? trace_preempt_on+0x20/0xc0
[   19.878560]  ? __pfx_kthread+0x10/0x10
[   19.878604]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.878655]  ? calculate_sigpending+0x7b/0xa0
[   19.878726]  ? __pfx_kthread+0x10/0x10
[   19.878783]  ret_from_fork+0x41/0x80
[   19.878838]  ? __pfx_kthread+0x10/0x10
[   19.878881]  ret_from_fork_asm+0x1a/0x30
[   19.878955]  </TASK>
[   19.879004] 
[   19.890155] Allocated by task 286:
[   19.890445]  kasan_save_stack+0x45/0x70
[   19.890867]  kasan_save_track+0x18/0x40
[   19.891193]  kasan_save_alloc_info+0x3b/0x50
[   19.891531]  __kasan_kmalloc+0xb7/0xc0
[   19.891836]  __kmalloc_cache_noprof+0x189/0x420
[   19.892092]  kasan_atomics+0x95/0x310
[   19.892315]  kunit_try_run_case+0x1a5/0x480
[   19.892525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.892789]  kthread+0x337/0x6f0
[   19.892977]  ret_from_fork+0x41/0x80
[   19.893220]  ret_from_fork_asm+0x1a/0x30
[   19.893437] 
[   19.893625] The buggy address belongs to the object at ffff888101e04b00
[   19.893625]  which belongs to the cache kmalloc-64 of size 64
[   19.894653] The buggy address is located 0 bytes to the right of
[   19.894653]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.895687] 
[   19.895918] The buggy address belongs to the physical page:
[   19.896423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.897070] flags: 0x200000000000000(node=0|zone=2)
[   19.897409] page_type: f5(slab)
[   19.897613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.897939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.898275] page dumped because: kasan: bad access detected
[   19.898516] 
[   19.898645] Memory state around the buggy address:
[   19.898978]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.899616]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.900285] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.900897]                                      ^
[   19.901346]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.901906]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.902266] ==================================================================
[   20.830165] ==================================================================
[   20.831722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   20.832122] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.832628] 
[   20.832798] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.832917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.832967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.833026] Call Trace:
[   20.833081]  <TASK>
[   20.833140]  dump_stack_lvl+0x73/0xb0
[   20.833224]  print_report+0xd1/0x650
[   20.833272]  ? __virt_addr_valid+0x1db/0x2d0
[   20.833324]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.833373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.833420]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.833649]  kasan_report+0x141/0x180
[   20.833725]  ? kasan_atomics_helper+0x49ce/0x5450
[   20.833796]  __asan_report_load4_noabort+0x18/0x20
[   20.833847]  kasan_atomics_helper+0x49ce/0x5450
[   20.833902]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.833958]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.834013]  ? trace_hardirqs_on+0x37/0xe0
[   20.834064]  ? kasan_atomics+0x152/0x310
[   20.834156]  kasan_atomics+0x1dc/0x310
[   20.834205]  ? __pfx_kasan_atomics+0x10/0x10
[   20.834243]  ? __pfx_kasan_atomics+0x10/0x10
[   20.834276]  kunit_try_run_case+0x1a5/0x480
[   20.834308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.834333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.834376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.834404]  ? __kthread_parkme+0x82/0x180
[   20.834430]  ? preempt_count_sub+0x50/0x80
[   20.834460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.834487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.834513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.834565]  kthread+0x337/0x6f0
[   20.834602]  ? trace_preempt_on+0x20/0xc0
[   20.834635]  ? __pfx_kthread+0x10/0x10
[   20.834657]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.834681]  ? calculate_sigpending+0x7b/0xa0
[   20.834706]  ? __pfx_kthread+0x10/0x10
[   20.834728]  ret_from_fork+0x41/0x80
[   20.834774]  ? __pfx_kthread+0x10/0x10
[   20.834806]  ret_from_fork_asm+0x1a/0x30
[   20.834855]  </TASK>
[   20.834872] 
[   20.848989] Allocated by task 286:
[   20.849479]  kasan_save_stack+0x45/0x70
[   20.849969]  kasan_save_track+0x18/0x40
[   20.850204]  kasan_save_alloc_info+0x3b/0x50
[   20.850579]  __kasan_kmalloc+0xb7/0xc0
[   20.850954]  __kmalloc_cache_noprof+0x189/0x420
[   20.851255]  kasan_atomics+0x95/0x310
[   20.851579]  kunit_try_run_case+0x1a5/0x480
[   20.851983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.852333]  kthread+0x337/0x6f0
[   20.852556]  ret_from_fork+0x41/0x80
[   20.852954]  ret_from_fork_asm+0x1a/0x30
[   20.853260] 
[   20.853470] The buggy address belongs to the object at ffff888101e04b00
[   20.853470]  which belongs to the cache kmalloc-64 of size 64
[   20.854272] The buggy address is located 0 bytes to the right of
[   20.854272]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.855053] 
[   20.855299] The buggy address belongs to the physical page:
[   20.855658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.856050] flags: 0x200000000000000(node=0|zone=2)
[   20.856518] page_type: f5(slab)
[   20.856872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.857415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.857876] page dumped because: kasan: bad access detected
[   20.858202] 
[   20.858404] Memory state around the buggy address:
[   20.858694]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859017]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859597] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.860218]                                      ^
[   20.860644]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.861018]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.861545] ==================================================================
[   20.998359] ==================================================================
[   20.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   20.999795] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.000243] 
[   21.000547] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.000668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.000967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.001024] Call Trace:
[   21.001098]  <TASK>
[   21.001163]  dump_stack_lvl+0x73/0xb0
[   21.001257]  print_report+0xd1/0x650
[   21.001316]  ? __virt_addr_valid+0x1db/0x2d0
[   21.001375]  ? kasan_atomics_helper+0x151d/0x5450
[   21.001431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.001486]  ? kasan_atomics_helper+0x151d/0x5450
[   21.001543]  kasan_report+0x141/0x180
[   21.001630]  ? kasan_atomics_helper+0x151d/0x5450
[   21.001695]  kasan_check_range+0x10c/0x1c0
[   21.001758]  __kasan_check_write+0x18/0x20
[   21.001811]  kasan_atomics_helper+0x151d/0x5450
[   21.001863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.001940]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.002012]  ? trace_hardirqs_on+0x37/0xe0
[   21.002069]  ? kasan_atomics+0x152/0x310
[   21.002128]  kasan_atomics+0x1dc/0x310
[   21.002173]  ? __pfx_kasan_atomics+0x10/0x10
[   21.002207]  ? __pfx_kasan_atomics+0x10/0x10
[   21.002236]  kunit_try_run_case+0x1a5/0x480
[   21.002269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.002293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.002321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.002347]  ? __kthread_parkme+0x82/0x180
[   21.002372]  ? preempt_count_sub+0x50/0x80
[   21.002405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.002431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.002457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.002483]  kthread+0x337/0x6f0
[   21.002504]  ? trace_preempt_on+0x20/0xc0
[   21.002530]  ? __pfx_kthread+0x10/0x10
[   21.002551]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.002575]  ? calculate_sigpending+0x7b/0xa0
[   21.002600]  ? __pfx_kthread+0x10/0x10
[   21.002622]  ret_from_fork+0x41/0x80
[   21.002649]  ? __pfx_kthread+0x10/0x10
[   21.002670]  ret_from_fork_asm+0x1a/0x30
[   21.002708]  </TASK>
[   21.002724] 
[   21.015981] Allocated by task 286:
[   21.016231]  kasan_save_stack+0x45/0x70
[   21.016625]  kasan_save_track+0x18/0x40
[   21.018111]  kasan_save_alloc_info+0x3b/0x50
[   21.019019]  __kasan_kmalloc+0xb7/0xc0
[   21.020505]  __kmalloc_cache_noprof+0x189/0x420
[   21.021537]  kasan_atomics+0x95/0x310
[   21.022165]  kunit_try_run_case+0x1a5/0x480
[   21.022617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.023131]  kthread+0x337/0x6f0
[   21.023441]  ret_from_fork+0x41/0x80
[   21.023796]  ret_from_fork_asm+0x1a/0x30
[   21.024509] 
[   21.024723] The buggy address belongs to the object at ffff888101e04b00
[   21.024723]  which belongs to the cache kmalloc-64 of size 64
[   21.026401] The buggy address is located 0 bytes to the right of
[   21.026401]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.027220] 
[   21.027363] The buggy address belongs to the physical page:
[   21.027604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.027947] flags: 0x200000000000000(node=0|zone=2)
[   21.028180] page_type: f5(slab)
[   21.028419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.029357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.030839] page dumped because: kasan: bad access detected
[   21.031355] 
[   21.031569] Memory state around the buggy address:
[   21.031955]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.032525]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.033039] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.033558]                                      ^
[   21.033934]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034465]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.035129] ==================================================================
[   21.788764] ==================================================================
[   21.789876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   21.790542] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.791181] 
[   21.791438] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.791565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.791600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.791664] Call Trace:
[   21.791714]  <TASK>
[   21.791764]  dump_stack_lvl+0x73/0xb0
[   21.791847]  print_report+0xd1/0x650
[   21.791905]  ? __virt_addr_valid+0x1db/0x2d0
[   21.791962]  ? kasan_atomics_helper+0x224c/0x5450
[   21.792017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.792074]  ? kasan_atomics_helper+0x224c/0x5450
[   21.792578]  kasan_report+0x141/0x180
[   21.792647]  ? kasan_atomics_helper+0x224c/0x5450
[   21.793080]  kasan_check_range+0x10c/0x1c0
[   21.793167]  __kasan_check_write+0x18/0x20
[   21.793196]  kasan_atomics_helper+0x224c/0x5450
[   21.793224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.793254]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.793280]  ? trace_hardirqs_on+0x37/0xe0
[   21.793306]  ? kasan_atomics+0x152/0x310
[   21.793333]  kasan_atomics+0x1dc/0x310
[   21.793356]  ? __pfx_kasan_atomics+0x10/0x10
[   21.793379]  ? __pfx_kasan_atomics+0x10/0x10
[   21.793407]  kunit_try_run_case+0x1a5/0x480
[   21.793437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.793462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.793491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.793518]  ? __kthread_parkme+0x82/0x180
[   21.793544]  ? preempt_count_sub+0x50/0x80
[   21.793573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.793601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.793626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.793653]  kthread+0x337/0x6f0
[   21.793673]  ? trace_preempt_on+0x20/0xc0
[   21.793699]  ? __pfx_kthread+0x10/0x10
[   21.793721]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.793764]  ? calculate_sigpending+0x7b/0xa0
[   21.793801]  ? __pfx_kthread+0x10/0x10
[   21.793824]  ret_from_fork+0x41/0x80
[   21.793851]  ? __pfx_kthread+0x10/0x10
[   21.793873]  ret_from_fork_asm+0x1a/0x30
[   21.793909]  </TASK>
[   21.793925] 
[   21.807784] Allocated by task 286:
[   21.808320]  kasan_save_stack+0x45/0x70
[   21.808815]  kasan_save_track+0x18/0x40
[   21.809262]  kasan_save_alloc_info+0x3b/0x50
[   21.809706]  __kasan_kmalloc+0xb7/0xc0
[   21.810057]  __kmalloc_cache_noprof+0x189/0x420
[   21.810456]  kasan_atomics+0x95/0x310
[   21.811510]  kunit_try_run_case+0x1a5/0x480
[   21.811856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.812569]  kthread+0x337/0x6f0
[   21.813180]  ret_from_fork+0x41/0x80
[   21.813766]  ret_from_fork_asm+0x1a/0x30
[   21.813990] 
[   21.814103] The buggy address belongs to the object at ffff888101e04b00
[   21.814103]  which belongs to the cache kmalloc-64 of size 64
[   21.816384] The buggy address is located 0 bytes to the right of
[   21.816384]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.818502] 
[   21.819073] The buggy address belongs to the physical page:
[   21.820354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.821337] flags: 0x200000000000000(node=0|zone=2)
[   21.822336] page_type: f5(slab)
[   21.823357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.824714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.825853] page dumped because: kasan: bad access detected
[   21.826292] 
[   21.826422] Memory state around the buggy address:
[   21.827217]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.827640]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.828369] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.828792]                                      ^
[   21.829382]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.829791]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.830393] ==================================================================
[   20.044154] ==================================================================
[   20.045095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   20.045475] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.045778] 
[   20.045939] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.046007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.046025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.046050] Call Trace:
[   20.046076]  <TASK>
[   20.046104]  dump_stack_lvl+0x73/0xb0
[   20.046620]  print_report+0xd1/0x650
[   20.047010]  ? __virt_addr_valid+0x1db/0x2d0
[   20.047098]  ? kasan_atomics_helper+0x697/0x5450
[   20.047146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.047197]  ? kasan_atomics_helper+0x697/0x5450
[   20.047258]  kasan_report+0x141/0x180
[   20.047315]  ? kasan_atomics_helper+0x697/0x5450
[   20.047355]  kasan_check_range+0x10c/0x1c0
[   20.047380]  __kasan_check_write+0x18/0x20
[   20.047404]  kasan_atomics_helper+0x697/0x5450
[   20.047431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.047458]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.047483]  ? trace_hardirqs_on+0x37/0xe0
[   20.047510]  ? kasan_atomics+0x152/0x310
[   20.047537]  kasan_atomics+0x1dc/0x310
[   20.047559]  ? __pfx_kasan_atomics+0x10/0x10
[   20.047582]  ? __pfx_kasan_atomics+0x10/0x10
[   20.047609]  kunit_try_run_case+0x1a5/0x480
[   20.047653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.047679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.047708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.047736]  ? __kthread_parkme+0x82/0x180
[   20.047787]  ? preempt_count_sub+0x50/0x80
[   20.047817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.047843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.047870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.047895]  kthread+0x337/0x6f0
[   20.047916]  ? trace_preempt_on+0x20/0xc0
[   20.047942]  ? __pfx_kthread+0x10/0x10
[   20.047964]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.047988]  ? calculate_sigpending+0x7b/0xa0
[   20.048013]  ? __pfx_kthread+0x10/0x10
[   20.048035]  ret_from_fork+0x41/0x80
[   20.048061]  ? __pfx_kthread+0x10/0x10
[   20.048082]  ret_from_fork_asm+0x1a/0x30
[   20.048148]  </TASK>
[   20.048168] 
[   20.061704] Allocated by task 286:
[   20.062279]  kasan_save_stack+0x45/0x70
[   20.062623]  kasan_save_track+0x18/0x40
[   20.062862]  kasan_save_alloc_info+0x3b/0x50
[   20.063384]  __kasan_kmalloc+0xb7/0xc0
[   20.063853]  __kmalloc_cache_noprof+0x189/0x420
[   20.064426]  kasan_atomics+0x95/0x310
[   20.064652]  kunit_try_run_case+0x1a5/0x480
[   20.065028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.065799]  kthread+0x337/0x6f0
[   20.066043]  ret_from_fork+0x41/0x80
[   20.066491]  ret_from_fork_asm+0x1a/0x30
[   20.066944] 
[   20.067246] The buggy address belongs to the object at ffff888101e04b00
[   20.067246]  which belongs to the cache kmalloc-64 of size 64
[   20.068085] The buggy address is located 0 bytes to the right of
[   20.068085]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.068971] 
[   20.069252] The buggy address belongs to the physical page:
[   20.069655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.070238] flags: 0x200000000000000(node=0|zone=2)
[   20.070725] page_type: f5(slab)
[   20.071002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.071615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.072096] page dumped because: kasan: bad access detected
[   20.072597] 
[   20.072811] Memory state around the buggy address:
[   20.073083]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.073668]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.074144] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.074730]                                      ^
[   20.075370]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.075941]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.076476] ==================================================================
[   20.635046] ==================================================================
[   20.636175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   20.636672] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.636938] 
[   20.637061] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.637153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.637171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.637198] Call Trace:
[   20.637225]  <TASK>
[   20.637253]  dump_stack_lvl+0x73/0xb0
[   20.637291]  print_report+0xd1/0x650
[   20.637319]  ? __virt_addr_valid+0x1db/0x2d0
[   20.637347]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.637373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.637400]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.637426]  kasan_report+0x141/0x180
[   20.637452]  ? kasan_atomics_helper+0x4a1c/0x5450
[   20.637483]  __asan_report_load4_noabort+0x18/0x20
[   20.637508]  kasan_atomics_helper+0x4a1c/0x5450
[   20.637535]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.637560]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.637585]  ? trace_hardirqs_on+0x37/0xe0
[   20.637611]  ? kasan_atomics+0x152/0x310
[   20.637639]  kasan_atomics+0x1dc/0x310
[   20.637662]  ? __pfx_kasan_atomics+0x10/0x10
[   20.637685]  ? __pfx_kasan_atomics+0x10/0x10
[   20.637712]  kunit_try_run_case+0x1a5/0x480
[   20.637741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.638008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.638064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.638129]  ? __kthread_parkme+0x82/0x180
[   20.638186]  ? preempt_count_sub+0x50/0x80
[   20.638249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.638308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.638368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.638419]  kthread+0x337/0x6f0
[   20.638459]  ? trace_preempt_on+0x20/0xc0
[   20.638897]  ? __pfx_kthread+0x10/0x10
[   20.638990]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.639050]  ? calculate_sigpending+0x7b/0xa0
[   20.639114]  ? __pfx_kthread+0x10/0x10
[   20.639165]  ret_from_fork+0x41/0x80
[   20.639227]  ? __pfx_kthread+0x10/0x10
[   20.639274]  ret_from_fork_asm+0x1a/0x30
[   20.639343]  </TASK>
[   20.639365] 
[   20.652302] Allocated by task 286:
[   20.652739]  kasan_save_stack+0x45/0x70
[   20.653246]  kasan_save_track+0x18/0x40
[   20.653603]  kasan_save_alloc_info+0x3b/0x50
[   20.653885]  __kasan_kmalloc+0xb7/0xc0
[   20.654279]  __kmalloc_cache_noprof+0x189/0x420
[   20.654584]  kasan_atomics+0x95/0x310
[   20.654897]  kunit_try_run_case+0x1a5/0x480
[   20.655328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.655705]  kthread+0x337/0x6f0
[   20.655918]  ret_from_fork+0x41/0x80
[   20.656146]  ret_from_fork_asm+0x1a/0x30
[   20.656547] 
[   20.656761] The buggy address belongs to the object at ffff888101e04b00
[   20.656761]  which belongs to the cache kmalloc-64 of size 64
[   20.657707] The buggy address is located 0 bytes to the right of
[   20.657707]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.658444] 
[   20.658677] The buggy address belongs to the physical page:
[   20.659018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.659629] flags: 0x200000000000000(node=0|zone=2)
[   20.659931] page_type: f5(slab)
[   20.660300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.660702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.661023] page dumped because: kasan: bad access detected
[   20.661514] 
[   20.661715] Memory state around the buggy address:
[   20.662165]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.662565]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663096] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.663539]                                      ^
[   20.663957]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.664407]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.664698] ==================================================================
[   21.405941] ==================================================================
[   21.406634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   21.407147] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.407563] 
[   21.407795] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.407911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.407938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.407967] Call Trace:
[   21.407994]  <TASK>
[   21.408022]  dump_stack_lvl+0x73/0xb0
[   21.408076]  print_report+0xd1/0x650
[   21.408158]  ? __virt_addr_valid+0x1db/0x2d0
[   21.408205]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.408249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.408300]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.408345]  kasan_report+0x141/0x180
[   21.408387]  ? kasan_atomics_helper+0x1ce1/0x5450
[   21.408438]  kasan_check_range+0x10c/0x1c0
[   21.408480]  __kasan_check_write+0x18/0x20
[   21.408525]  kasan_atomics_helper+0x1ce1/0x5450
[   21.408576]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.408626]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.408674]  ? trace_hardirqs_on+0x37/0xe0
[   21.408723]  ? kasan_atomics+0x152/0x310
[   21.408793]  kasan_atomics+0x1dc/0x310
[   21.408845]  ? __pfx_kasan_atomics+0x10/0x10
[   21.408886]  ? __pfx_kasan_atomics+0x10/0x10
[   21.408942]  kunit_try_run_case+0x1a5/0x480
[   21.408996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.409042]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.409093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.409186]  ? __kthread_parkme+0x82/0x180
[   21.409237]  ? preempt_count_sub+0x50/0x80
[   21.409289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.409343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.409391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.409436]  kthread+0x337/0x6f0
[   21.409475]  ? trace_preempt_on+0x20/0xc0
[   21.409525]  ? __pfx_kthread+0x10/0x10
[   21.409567]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.409618]  ? calculate_sigpending+0x7b/0xa0
[   21.409672]  ? __pfx_kthread+0x10/0x10
[   21.409721]  ret_from_fork+0x41/0x80
[   21.409785]  ? __pfx_kthread+0x10/0x10
[   21.409826]  ret_from_fork_asm+0x1a/0x30
[   21.409885]  </TASK>
[   21.409914] 
[   21.420096] Allocated by task 286:
[   21.420523]  kasan_save_stack+0x45/0x70
[   21.420929]  kasan_save_track+0x18/0x40
[   21.421300]  kasan_save_alloc_info+0x3b/0x50
[   21.421690]  __kasan_kmalloc+0xb7/0xc0
[   21.422033]  __kmalloc_cache_noprof+0x189/0x420
[   21.422460]  kasan_atomics+0x95/0x310
[   21.422805]  kunit_try_run_case+0x1a5/0x480
[   21.423163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.423592]  kthread+0x337/0x6f0
[   21.423871]  ret_from_fork+0x41/0x80
[   21.424083]  ret_from_fork_asm+0x1a/0x30
[   21.424456] 
[   21.424643] The buggy address belongs to the object at ffff888101e04b00
[   21.424643]  which belongs to the cache kmalloc-64 of size 64
[   21.425335] The buggy address is located 0 bytes to the right of
[   21.425335]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.426078] 
[   21.426289] The buggy address belongs to the physical page:
[   21.426629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.427170] flags: 0x200000000000000(node=0|zone=2)
[   21.427570] page_type: f5(slab)
[   21.427836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.428343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.428717] page dumped because: kasan: bad access detected
[   21.429145] 
[   21.429277] Memory state around the buggy address:
[   21.429512]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.429809]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.430383] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.430948]                                      ^
[   21.431361]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.431845]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.432291] ==================================================================
[   20.376279] ==================================================================
[   20.377241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   20.377804] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.378347] 
[   20.378640] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.378778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.378808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.378857] Call Trace:
[   20.378902]  <TASK>
[   20.378949]  dump_stack_lvl+0x73/0xb0
[   20.379009]  print_report+0xd1/0x650
[   20.379039]  ? __virt_addr_valid+0x1db/0x2d0
[   20.379069]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.379093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.379187]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.379243]  kasan_report+0x141/0x180
[   20.379296]  ? kasan_atomics_helper+0x4a84/0x5450
[   20.379361]  __asan_report_load4_noabort+0x18/0x20
[   20.379415]  kasan_atomics_helper+0x4a84/0x5450
[   20.379473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.379524]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.379573]  ? trace_hardirqs_on+0x37/0xe0
[   20.379632]  ? kasan_atomics+0x152/0x310
[   20.379732]  kasan_atomics+0x1dc/0x310
[   20.379790]  ? __pfx_kasan_atomics+0x10/0x10
[   20.379841]  ? __pfx_kasan_atomics+0x10/0x10
[   20.379898]  kunit_try_run_case+0x1a5/0x480
[   20.379997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.380047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.380103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.380185]  ? __kthread_parkme+0x82/0x180
[   20.380241]  ? preempt_count_sub+0x50/0x80
[   20.380303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.380354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.380406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.380493]  kthread+0x337/0x6f0
[   20.380537]  ? trace_preempt_on+0x20/0xc0
[   20.380590]  ? __pfx_kthread+0x10/0x10
[   20.380633]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.380675]  ? calculate_sigpending+0x7b/0xa0
[   20.380709]  ? __pfx_kthread+0x10/0x10
[   20.380731]  ret_from_fork+0x41/0x80
[   20.380782]  ? __pfx_kthread+0x10/0x10
[   20.380807]  ret_from_fork_asm+0x1a/0x30
[   20.380845]  </TASK>
[   20.380862] 
[   20.393699] Allocated by task 286:
[   20.394302]  kasan_save_stack+0x45/0x70
[   20.394878]  kasan_save_track+0x18/0x40
[   20.395240]  kasan_save_alloc_info+0x3b/0x50
[   20.395580]  __kasan_kmalloc+0xb7/0xc0
[   20.396023]  __kmalloc_cache_noprof+0x189/0x420
[   20.396494]  kasan_atomics+0x95/0x310
[   20.396884]  kunit_try_run_case+0x1a5/0x480
[   20.397324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.397838]  kthread+0x337/0x6f0
[   20.398115]  ret_from_fork+0x41/0x80
[   20.398459]  ret_from_fork_asm+0x1a/0x30
[   20.398689] 
[   20.398836] The buggy address belongs to the object at ffff888101e04b00
[   20.398836]  which belongs to the cache kmalloc-64 of size 64
[   20.399949] The buggy address is located 0 bytes to the right of
[   20.399949]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.400858] 
[   20.401012] The buggy address belongs to the physical page:
[   20.401270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.401616] flags: 0x200000000000000(node=0|zone=2)
[   20.402167] page_type: f5(slab)
[   20.402602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.403337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.403983] page dumped because: kasan: bad access detected
[   20.404457] 
[   20.404708] Memory state around the buggy address:
[   20.405111]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.405628]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.405947] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.406247]                                      ^
[   20.406764]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.407532]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.408179] ==================================================================
[   19.814426] ==================================================================
[   19.815080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   19.815679] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.816001] 
[   19.816179] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.816296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.816371] Call Trace:
[   19.816412]  <TASK>
[   19.816458]  dump_stack_lvl+0x73/0xb0
[   19.816529]  print_report+0xd1/0x650
[   19.816588]  ? __virt_addr_valid+0x1db/0x2d0
[   19.816645]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.816699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.816798]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.816844]  kasan_report+0x141/0x180
[   19.816890]  ? kasan_atomics_helper+0x4b6e/0x5450
[   19.816949]  __asan_report_store4_noabort+0x1b/0x30
[   19.816994]  kasan_atomics_helper+0x4b6e/0x5450
[   19.817045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.817098]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.817189]  ? trace_hardirqs_on+0x37/0xe0
[   19.817247]  ? kasan_atomics+0x152/0x310
[   19.817291]  kasan_atomics+0x1dc/0x310
[   19.817324]  ? __pfx_kasan_atomics+0x10/0x10
[   19.817357]  ? __pfx_kasan_atomics+0x10/0x10
[   19.817396]  kunit_try_run_case+0x1a5/0x480
[   19.817438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.817514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.817552]  ? __kthread_parkme+0x82/0x180
[   19.817588]  ? preempt_count_sub+0x50/0x80
[   19.817631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.817668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.817705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.817740]  kthread+0x337/0x6f0
[   19.817786]  ? trace_preempt_on+0x20/0xc0
[   19.817824]  ? __pfx_kthread+0x10/0x10
[   19.817855]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.817891]  ? calculate_sigpending+0x7b/0xa0
[   19.817930]  ? __pfx_kthread+0x10/0x10
[   19.817963]  ret_from_fork+0x41/0x80
[   19.818001]  ? __pfx_kthread+0x10/0x10
[   19.818034]  ret_from_fork_asm+0x1a/0x30
[   19.818090]  </TASK>
[   19.818146] 
[   19.829480] Allocated by task 286:
[   19.829807]  kasan_save_stack+0x45/0x70
[   19.830300]  kasan_save_track+0x18/0x40
[   19.830671]  kasan_save_alloc_info+0x3b/0x50
[   19.831068]  __kasan_kmalloc+0xb7/0xc0
[   19.832968]  __kmalloc_cache_noprof+0x189/0x420
[   19.833770]  kasan_atomics+0x95/0x310
[   19.834094]  kunit_try_run_case+0x1a5/0x480
[   19.834532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.834902]  kthread+0x337/0x6f0
[   19.835280]  ret_from_fork+0x41/0x80
[   19.835684]  ret_from_fork_asm+0x1a/0x30
[   19.835965] 
[   19.836206] The buggy address belongs to the object at ffff888101e04b00
[   19.836206]  which belongs to the cache kmalloc-64 of size 64
[   19.837006] The buggy address is located 0 bytes to the right of
[   19.837006]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.837713] 
[   19.837996] The buggy address belongs to the physical page:
[   19.838261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.838880] flags: 0x200000000000000(node=0|zone=2)
[   19.839353] page_type: f5(slab)
[   19.839713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.840246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.840680] page dumped because: kasan: bad access detected
[   19.840998] 
[   19.841232] Memory state around the buggy address:
[   19.841624]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.842231]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.842648] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.843020]                                      ^
[   19.843427]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843800]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.844384] ==================================================================
[   20.793974] ==================================================================
[   20.795497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   20.796343] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.797300] 
[   20.797559] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.797682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.797703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.797730] Call Trace:
[   20.797775]  <TASK>
[   20.797805]  dump_stack_lvl+0x73/0xb0
[   20.797876]  print_report+0xd1/0x650
[   20.797921]  ? __virt_addr_valid+0x1db/0x2d0
[   20.797975]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.798022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.798070]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.798117]  kasan_report+0x141/0x180
[   20.798169]  ? kasan_atomics_helper+0x12e6/0x5450
[   20.798249]  kasan_check_range+0x10c/0x1c0
[   20.798280]  __kasan_check_write+0x18/0x20
[   20.798304]  kasan_atomics_helper+0x12e6/0x5450
[   20.798332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.798357]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.798383]  ? trace_hardirqs_on+0x37/0xe0
[   20.798410]  ? kasan_atomics+0x152/0x310
[   20.798438]  kasan_atomics+0x1dc/0x310
[   20.798461]  ? __pfx_kasan_atomics+0x10/0x10
[   20.798485]  ? __pfx_kasan_atomics+0x10/0x10
[   20.798513]  kunit_try_run_case+0x1a5/0x480
[   20.798542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.798567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.798595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.798621]  ? __kthread_parkme+0x82/0x180
[   20.798647]  ? preempt_count_sub+0x50/0x80
[   20.798676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.798704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.798729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.798778]  kthread+0x337/0x6f0
[   20.798803]  ? trace_preempt_on+0x20/0xc0
[   20.798828]  ? __pfx_kthread+0x10/0x10
[   20.798850]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.798874]  ? calculate_sigpending+0x7b/0xa0
[   20.798899]  ? __pfx_kthread+0x10/0x10
[   20.798922]  ret_from_fork+0x41/0x80
[   20.798949]  ? __pfx_kthread+0x10/0x10
[   20.799245]  ret_from_fork_asm+0x1a/0x30
[   20.799300]  </TASK>
[   20.799320] 
[   20.814176] Allocated by task 286:
[   20.814756]  kasan_save_stack+0x45/0x70
[   20.815054]  kasan_save_track+0x18/0x40
[   20.815250]  kasan_save_alloc_info+0x3b/0x50
[   20.815656]  __kasan_kmalloc+0xb7/0xc0
[   20.815937]  __kmalloc_cache_noprof+0x189/0x420
[   20.816229]  kasan_atomics+0x95/0x310
[   20.816783]  kunit_try_run_case+0x1a5/0x480
[   20.817534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.817968]  kthread+0x337/0x6f0
[   20.818408]  ret_from_fork+0x41/0x80
[   20.818673]  ret_from_fork_asm+0x1a/0x30
[   20.818930] 
[   20.819139] The buggy address belongs to the object at ffff888101e04b00
[   20.819139]  which belongs to the cache kmalloc-64 of size 64
[   20.819883] The buggy address is located 0 bytes to the right of
[   20.819883]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.820856] 
[   20.821075] The buggy address belongs to the physical page:
[   20.821687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.822385] flags: 0x200000000000000(node=0|zone=2)
[   20.822963] page_type: f5(slab)
[   20.823332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.823915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.824523] page dumped because: kasan: bad access detected
[   20.824792] 
[   20.824998] Memory state around the buggy address:
[   20.825483]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.826048]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.826944] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.827251]                                      ^
[   20.827485]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827776]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.828825] ==================================================================
[   21.530520] ==================================================================
[   21.531037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   21.531546] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.532043] 
[   21.532265] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.532387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.532420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.532468] Call Trace:
[   21.532539]  <TASK>
[   21.532585]  dump_stack_lvl+0x73/0xb0
[   21.532672]  print_report+0xd1/0x650
[   21.532723]  ? __virt_addr_valid+0x1db/0x2d0
[   21.532791]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.532861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.532927]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.532994]  kasan_report+0x141/0x180
[   21.533063]  ? kasan_atomics_helper+0x1f43/0x5450
[   21.533153]  kasan_check_range+0x10c/0x1c0
[   21.533205]  __kasan_check_write+0x18/0x20
[   21.533250]  kasan_atomics_helper+0x1f43/0x5450
[   21.533307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.533364]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.533418]  ? trace_hardirqs_on+0x37/0xe0
[   21.533471]  ? kasan_atomics+0x152/0x310
[   21.533527]  kasan_atomics+0x1dc/0x310
[   21.533575]  ? __pfx_kasan_atomics+0x10/0x10
[   21.533627]  ? __pfx_kasan_atomics+0x10/0x10
[   21.533686]  kunit_try_run_case+0x1a5/0x480
[   21.533758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.533805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.533859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.533935]  ? __kthread_parkme+0x82/0x180
[   21.533984]  ? preempt_count_sub+0x50/0x80
[   21.534043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.534127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.534206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.534260]  kthread+0x337/0x6f0
[   21.534304]  ? trace_preempt_on+0x20/0xc0
[   21.534360]  ? __pfx_kthread+0x10/0x10
[   21.534401]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.534440]  ? calculate_sigpending+0x7b/0xa0
[   21.534475]  ? __pfx_kthread+0x10/0x10
[   21.534498]  ret_from_fork+0x41/0x80
[   21.534526]  ? __pfx_kthread+0x10/0x10
[   21.534548]  ret_from_fork_asm+0x1a/0x30
[   21.534584]  </TASK>
[   21.534601] 
[   21.547050] Allocated by task 286:
[   21.547423]  kasan_save_stack+0x45/0x70
[   21.548501]  kasan_save_track+0x18/0x40
[   21.549634]  kasan_save_alloc_info+0x3b/0x50
[   21.549895]  __kasan_kmalloc+0xb7/0xc0
[   21.550082]  __kmalloc_cache_noprof+0x189/0x420
[   21.550278]  kasan_atomics+0x95/0x310
[   21.550450]  kunit_try_run_case+0x1a5/0x480
[   21.550632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.552942]  kthread+0x337/0x6f0
[   21.553660]  ret_from_fork+0x41/0x80
[   21.554600]  ret_from_fork_asm+0x1a/0x30
[   21.556288] 
[   21.556879] The buggy address belongs to the object at ffff888101e04b00
[   21.556879]  which belongs to the cache kmalloc-64 of size 64
[   21.559349] The buggy address is located 0 bytes to the right of
[   21.559349]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.560946] 
[   21.561194] The buggy address belongs to the physical page:
[   21.561702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.562109] flags: 0x200000000000000(node=0|zone=2)
[   21.562807] page_type: f5(slab)
[   21.563340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.563792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.564184] page dumped because: kasan: bad access detected
[   21.564512] 
[   21.565169] Memory state around the buggy address:
[   21.565532]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.566094]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.566484] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.566866]                                      ^
[   21.567158]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.567641]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.568091] ==================================================================
[   19.752543] ==================================================================
[   19.752981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   19.753503] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.754134] 
[   19.754366] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.754520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.754547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.754591] Call Trace:
[   19.754635]  <TASK>
[   19.754678]  dump_stack_lvl+0x73/0xb0
[   19.754763]  print_report+0xd1/0x650
[   19.754820]  ? __virt_addr_valid+0x1db/0x2d0
[   19.754878]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.754930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.754980]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.755032]  kasan_report+0x141/0x180
[   19.755080]  ? kasan_atomics_helper+0x4ba2/0x5450
[   19.755181]  __asan_report_store4_noabort+0x1b/0x30
[   19.755230]  kasan_atomics_helper+0x4ba2/0x5450
[   19.755269]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.755307]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.755343]  ? trace_hardirqs_on+0x37/0xe0
[   19.755378]  ? kasan_atomics+0x152/0x310
[   19.755419]  kasan_atomics+0x1dc/0x310
[   19.755456]  ? __pfx_kasan_atomics+0x10/0x10
[   19.755496]  ? __pfx_kasan_atomics+0x10/0x10
[   19.755542]  kunit_try_run_case+0x1a5/0x480
[   19.755658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.755704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.755793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.755868]  ? __kthread_parkme+0x82/0x180
[   19.755920]  ? preempt_count_sub+0x50/0x80
[   19.755987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.756038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.756089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.756175]  kthread+0x337/0x6f0
[   19.756242]  ? trace_preempt_on+0x20/0xc0
[   19.756296]  ? __pfx_kthread+0x10/0x10
[   19.756341]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.756390]  ? calculate_sigpending+0x7b/0xa0
[   19.756432]  ? __pfx_kthread+0x10/0x10
[   19.756482]  ret_from_fork+0x41/0x80
[   19.756520]  ? __pfx_kthread+0x10/0x10
[   19.756550]  ret_from_fork_asm+0x1a/0x30
[   19.756599]  </TASK>
[   19.756621] 
[   19.770908] Allocated by task 286:
[   19.771384]  kasan_save_stack+0x45/0x70
[   19.771828]  kasan_save_track+0x18/0x40
[   19.772195]  kasan_save_alloc_info+0x3b/0x50
[   19.772433]  __kasan_kmalloc+0xb7/0xc0
[   19.772803]  __kmalloc_cache_noprof+0x189/0x420
[   19.773083]  kasan_atomics+0x95/0x310
[   19.773394]  kunit_try_run_case+0x1a5/0x480
[   19.773617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.774129]  kthread+0x337/0x6f0
[   19.774454]  ret_from_fork+0x41/0x80
[   19.774823]  ret_from_fork_asm+0x1a/0x30
[   19.775131] 
[   19.775287] The buggy address belongs to the object at ffff888101e04b00
[   19.775287]  which belongs to the cache kmalloc-64 of size 64
[   19.775733] The buggy address is located 0 bytes to the right of
[   19.775733]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.776714] 
[   19.776929] The buggy address belongs to the physical page:
[   19.777305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.777637] flags: 0x200000000000000(node=0|zone=2)
[   19.778077] page_type: f5(slab)
[   19.778422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.779039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.779492] page dumped because: kasan: bad access detected
[   19.779809] 
[   19.779938] Memory state around the buggy address:
[   19.780370]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.780956]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.781385] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.781672]                                      ^
[   19.782085]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.782700]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.783204] ==================================================================
[   20.508998] ==================================================================
[   20.509601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   20.509952] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.510602] 
[   20.510833] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.510956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.510990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.511037] Call Trace:
[   20.511085]  <TASK>
[   20.511167]  dump_stack_lvl+0x73/0xb0
[   20.511241]  print_report+0xd1/0x650
[   20.511291]  ? __virt_addr_valid+0x1db/0x2d0
[   20.511345]  ? kasan_atomics_helper+0xf10/0x5450
[   20.511386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.511439]  ? kasan_atomics_helper+0xf10/0x5450
[   20.511486]  kasan_report+0x141/0x180
[   20.511540]  ? kasan_atomics_helper+0xf10/0x5450
[   20.511601]  kasan_check_range+0x10c/0x1c0
[   20.511660]  __kasan_check_write+0x18/0x20
[   20.511706]  kasan_atomics_helper+0xf10/0x5450
[   20.511770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.511824]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.511874]  ? trace_hardirqs_on+0x37/0xe0
[   20.511928]  ? kasan_atomics+0x152/0x310
[   20.511988]  kasan_atomics+0x1dc/0x310
[   20.512033]  ? __pfx_kasan_atomics+0x10/0x10
[   20.512059]  ? __pfx_kasan_atomics+0x10/0x10
[   20.512087]  kunit_try_run_case+0x1a5/0x480
[   20.512165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.512195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.512224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.512251]  ? __kthread_parkme+0x82/0x180
[   20.512278]  ? preempt_count_sub+0x50/0x80
[   20.512308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.512335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.512362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.512387]  kthread+0x337/0x6f0
[   20.512409]  ? trace_preempt_on+0x20/0xc0
[   20.512436]  ? __pfx_kthread+0x10/0x10
[   20.512457]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.512482]  ? calculate_sigpending+0x7b/0xa0
[   20.512507]  ? __pfx_kthread+0x10/0x10
[   20.512529]  ret_from_fork+0x41/0x80
[   20.512554]  ? __pfx_kthread+0x10/0x10
[   20.512577]  ret_from_fork_asm+0x1a/0x30
[   20.512613]  </TASK>
[   20.512629] 
[   20.524924] Allocated by task 286:
[   20.525301]  kasan_save_stack+0x45/0x70
[   20.525712]  kasan_save_track+0x18/0x40
[   20.526041]  kasan_save_alloc_info+0x3b/0x50
[   20.526299]  __kasan_kmalloc+0xb7/0xc0
[   20.526509]  __kmalloc_cache_noprof+0x189/0x420
[   20.526802]  kasan_atomics+0x95/0x310
[   20.527209]  kunit_try_run_case+0x1a5/0x480
[   20.527604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.528070]  kthread+0x337/0x6f0
[   20.528409]  ret_from_fork+0x41/0x80
[   20.528783]  ret_from_fork_asm+0x1a/0x30
[   20.529144] 
[   20.529325] The buggy address belongs to the object at ffff888101e04b00
[   20.529325]  which belongs to the cache kmalloc-64 of size 64
[   20.529931] The buggy address is located 0 bytes to the right of
[   20.529931]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.530850] 
[   20.531055] The buggy address belongs to the physical page:
[   20.531522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.531994] flags: 0x200000000000000(node=0|zone=2)
[   20.532489] page_type: f5(slab)
[   20.532825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.533337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.533677] page dumped because: kasan: bad access detected
[   20.534221] 
[   20.534432] Memory state around the buggy address:
[   20.534881]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.535495]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.535820] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.536081]                                      ^
[   20.536600]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.536924]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.537866] ==================================================================
[   20.665999] ==================================================================
[   20.666700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   20.667349] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.667857] 
[   20.668152] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.668285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.668320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.668384] Call Trace:
[   20.668431]  <TASK>
[   20.668478]  dump_stack_lvl+0x73/0xb0
[   20.668564]  print_report+0xd1/0x650
[   20.668636]  ? __virt_addr_valid+0x1db/0x2d0
[   20.668695]  ? kasan_atomics_helper+0x1148/0x5450
[   20.668743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.668807]  ? kasan_atomics_helper+0x1148/0x5450
[   20.668867]  kasan_report+0x141/0x180
[   20.668936]  ? kasan_atomics_helper+0x1148/0x5450
[   20.668994]  kasan_check_range+0x10c/0x1c0
[   20.669030]  __kasan_check_write+0x18/0x20
[   20.669054]  kasan_atomics_helper+0x1148/0x5450
[   20.669080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.669126]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.669171]  ? trace_hardirqs_on+0x37/0xe0
[   20.669216]  ? kasan_atomics+0x152/0x310
[   20.669261]  kasan_atomics+0x1dc/0x310
[   20.669298]  ? __pfx_kasan_atomics+0x10/0x10
[   20.669342]  ? __pfx_kasan_atomics+0x10/0x10
[   20.669395]  kunit_try_run_case+0x1a5/0x480
[   20.669460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.669523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.669582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.669634]  ? __kthread_parkme+0x82/0x180
[   20.669685]  ? preempt_count_sub+0x50/0x80
[   20.669755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.669811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.669868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.669917]  kthread+0x337/0x6f0
[   20.669957]  ? trace_preempt_on+0x20/0xc0
[   20.670012]  ? __pfx_kthread+0x10/0x10
[   20.670058]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.670108]  ? calculate_sigpending+0x7b/0xa0
[   20.670152]  ? __pfx_kthread+0x10/0x10
[   20.670201]  ret_from_fork+0x41/0x80
[   20.670252]  ? __pfx_kthread+0x10/0x10
[   20.670316]  ret_from_fork_asm+0x1a/0x30
[   20.670397]  </TASK>
[   20.670431] 
[   20.682935] Allocated by task 286:
[   20.683476]  kasan_save_stack+0x45/0x70
[   20.683837]  kasan_save_track+0x18/0x40
[   20.684189]  kasan_save_alloc_info+0x3b/0x50
[   20.684466]  __kasan_kmalloc+0xb7/0xc0
[   20.684679]  __kmalloc_cache_noprof+0x189/0x420
[   20.685162]  kasan_atomics+0x95/0x310
[   20.685659]  kunit_try_run_case+0x1a5/0x480
[   20.686033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.686536]  kthread+0x337/0x6f0
[   20.686741]  ret_from_fork+0x41/0x80
[   20.686965]  ret_from_fork_asm+0x1a/0x30
[   20.687178] 
[   20.687312] The buggy address belongs to the object at ffff888101e04b00
[   20.687312]  which belongs to the cache kmalloc-64 of size 64
[   20.687920] The buggy address is located 0 bytes to the right of
[   20.687920]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.688886] 
[   20.689170] The buggy address belongs to the physical page:
[   20.689636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.689993] flags: 0x200000000000000(node=0|zone=2)
[   20.690488] page_type: f5(slab)
[   20.690802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.691347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.691812] page dumped because: kasan: bad access detected
[   20.692110] 
[   20.692297] Memory state around the buggy address:
[   20.692659]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693155]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693493] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.693796]                                      ^
[   20.694151]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.694794]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.695495] ==================================================================
[   20.245975] ==================================================================
[   20.246724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   20.247267] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.247720] 
[   20.248000] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.248166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.248203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.248256] Call Trace:
[   20.248304]  <TASK>
[   20.248359]  dump_stack_lvl+0x73/0xb0
[   20.248453]  print_report+0xd1/0x650
[   20.248509]  ? __virt_addr_valid+0x1db/0x2d0
[   20.248570]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.248621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.248680]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.248737]  kasan_report+0x141/0x180
[   20.248799]  ? kasan_atomics_helper+0xa2b/0x5450
[   20.248853]  kasan_check_range+0x10c/0x1c0
[   20.248880]  __kasan_check_write+0x18/0x20
[   20.248904]  kasan_atomics_helper+0xa2b/0x5450
[   20.248931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.248958]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.248984]  ? trace_hardirqs_on+0x37/0xe0
[   20.249011]  ? kasan_atomics+0x152/0x310
[   20.249038]  kasan_atomics+0x1dc/0x310
[   20.249061]  ? __pfx_kasan_atomics+0x10/0x10
[   20.249085]  ? __pfx_kasan_atomics+0x10/0x10
[   20.249165]  kunit_try_run_case+0x1a5/0x480
[   20.249202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.249228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.249257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.249283]  ? __kthread_parkme+0x82/0x180
[   20.249310]  ? preempt_count_sub+0x50/0x80
[   20.249340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.249367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.249393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.249419]  kthread+0x337/0x6f0
[   20.249440]  ? trace_preempt_on+0x20/0xc0
[   20.249466]  ? __pfx_kthread+0x10/0x10
[   20.249489]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.249513]  ? calculate_sigpending+0x7b/0xa0
[   20.249539]  ? __pfx_kthread+0x10/0x10
[   20.249561]  ret_from_fork+0x41/0x80
[   20.249586]  ? __pfx_kthread+0x10/0x10
[   20.249609]  ret_from_fork_asm+0x1a/0x30
[   20.249646]  </TASK>
[   20.249663] 
[   20.260998] Allocated by task 286:
[   20.261482]  kasan_save_stack+0x45/0x70
[   20.261926]  kasan_save_track+0x18/0x40
[   20.262309]  kasan_save_alloc_info+0x3b/0x50
[   20.262702]  __kasan_kmalloc+0xb7/0xc0
[   20.263049]  __kmalloc_cache_noprof+0x189/0x420
[   20.263492]  kasan_atomics+0x95/0x310
[   20.263878]  kunit_try_run_case+0x1a5/0x480
[   20.264179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.264627]  kthread+0x337/0x6f0
[   20.264965]  ret_from_fork+0x41/0x80
[   20.265278]  ret_from_fork_asm+0x1a/0x30
[   20.265632] 
[   20.265830] The buggy address belongs to the object at ffff888101e04b00
[   20.265830]  which belongs to the cache kmalloc-64 of size 64
[   20.266585] The buggy address is located 0 bytes to the right of
[   20.266585]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.267489] 
[   20.267679] The buggy address belongs to the physical page:
[   20.267920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.268576] flags: 0x200000000000000(node=0|zone=2)
[   20.269043] page_type: f5(slab)
[   20.269305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.269662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.270285] page dumped because: kasan: bad access detected
[   20.270584] 
[   20.270808] Memory state around the buggy address:
[   20.271192]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.271533]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.271938] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.272535]                                      ^
[   20.272836]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.273165]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.273716] ==================================================================
[   21.160401] ==================================================================
[   21.160783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   21.161175] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.161881] 
[   21.162104] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.162227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.162256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.162317] Call Trace:
[   21.162363]  <TASK>
[   21.162407]  dump_stack_lvl+0x73/0xb0
[   21.162463]  print_report+0xd1/0x650
[   21.162501]  ? __virt_addr_valid+0x1db/0x2d0
[   21.162539]  ? kasan_atomics_helper+0x1818/0x5450
[   21.162575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.162611]  ? kasan_atomics_helper+0x1818/0x5450
[   21.162646]  kasan_report+0x141/0x180
[   21.162683]  ? kasan_atomics_helper+0x1818/0x5450
[   21.162731]  kasan_check_range+0x10c/0x1c0
[   21.162793]  __kasan_check_write+0x18/0x20
[   21.162839]  kasan_atomics_helper+0x1818/0x5450
[   21.162887]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.162948]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.163013]  ? trace_hardirqs_on+0x37/0xe0
[   21.163061]  ? kasan_atomics+0x152/0x310
[   21.163112]  kasan_atomics+0x1dc/0x310
[   21.163181]  ? __pfx_kasan_atomics+0x10/0x10
[   21.163236]  ? __pfx_kasan_atomics+0x10/0x10
[   21.163308]  kunit_try_run_case+0x1a5/0x480
[   21.163372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.163422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.163487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.163539]  ? __kthread_parkme+0x82/0x180
[   21.163610]  ? preempt_count_sub+0x50/0x80
[   21.163675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.163722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.163789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.163842]  kthread+0x337/0x6f0
[   21.163895]  ? trace_preempt_on+0x20/0xc0
[   21.163964]  ? __pfx_kthread+0x10/0x10
[   21.164010]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.164058]  ? calculate_sigpending+0x7b/0xa0
[   21.164110]  ? __pfx_kthread+0x10/0x10
[   21.164177]  ret_from_fork+0x41/0x80
[   21.164247]  ? __pfx_kthread+0x10/0x10
[   21.164296]  ret_from_fork_asm+0x1a/0x30
[   21.164372]  </TASK>
[   21.164414] 
[   21.175616] Allocated by task 286:
[   21.176083]  kasan_save_stack+0x45/0x70
[   21.176437]  kasan_save_track+0x18/0x40
[   21.176779]  kasan_save_alloc_info+0x3b/0x50
[   21.177167]  __kasan_kmalloc+0xb7/0xc0
[   21.177416]  __kmalloc_cache_noprof+0x189/0x420
[   21.177819]  kasan_atomics+0x95/0x310
[   21.178194]  kunit_try_run_case+0x1a5/0x480
[   21.178416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.178891]  kthread+0x337/0x6f0
[   21.179073]  ret_from_fork+0x41/0x80
[   21.179444]  ret_from_fork_asm+0x1a/0x30
[   21.179853] 
[   21.180050] The buggy address belongs to the object at ffff888101e04b00
[   21.180050]  which belongs to the cache kmalloc-64 of size 64
[   21.180742] The buggy address is located 0 bytes to the right of
[   21.180742]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.181571] 
[   21.181722] The buggy address belongs to the physical page:
[   21.182230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.182594] flags: 0x200000000000000(node=0|zone=2)
[   21.182954] page_type: f5(slab)
[   21.183331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.183940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.184470] page dumped because: kasan: bad access detected
[   21.184980] 
[   21.185211] Memory state around the buggy address:
[   21.185486]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.185796]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.186077] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.186356]                                      ^
[   21.186587]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187005]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187562] ==================================================================
[   21.635616] ==================================================================
[   21.636757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   21.637331] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.637686] 
[   21.637928] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.638054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.638086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.638167] Call Trace:
[   21.638214]  <TASK>
[   21.638257]  dump_stack_lvl+0x73/0xb0
[   21.638336]  print_report+0xd1/0x650
[   21.638388]  ? __virt_addr_valid+0x1db/0x2d0
[   21.638437]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.638483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.638529]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.638581]  kasan_report+0x141/0x180
[   21.638636]  ? kasan_atomics_helper+0x4f98/0x5450
[   21.638698]  __asan_report_load8_noabort+0x18/0x20
[   21.638758]  kasan_atomics_helper+0x4f98/0x5450
[   21.638816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.638869]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.638914]  ? trace_hardirqs_on+0x37/0xe0
[   21.638955]  ? kasan_atomics+0x152/0x310
[   21.638985]  kasan_atomics+0x1dc/0x310
[   21.639009]  ? __pfx_kasan_atomics+0x10/0x10
[   21.639034]  ? __pfx_kasan_atomics+0x10/0x10
[   21.639062]  kunit_try_run_case+0x1a5/0x480
[   21.639093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.639149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.639183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.639210]  ? __kthread_parkme+0x82/0x180
[   21.639237]  ? preempt_count_sub+0x50/0x80
[   21.639267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.639295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.639322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.639347]  kthread+0x337/0x6f0
[   21.639368]  ? trace_preempt_on+0x20/0xc0
[   21.639393]  ? __pfx_kthread+0x10/0x10
[   21.639414]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.639439]  ? calculate_sigpending+0x7b/0xa0
[   21.639464]  ? __pfx_kthread+0x10/0x10
[   21.639488]  ret_from_fork+0x41/0x80
[   21.639513]  ? __pfx_kthread+0x10/0x10
[   21.639535]  ret_from_fork_asm+0x1a/0x30
[   21.639572]  </TASK>
[   21.639588] 
[   21.652892] Allocated by task 286:
[   21.653296]  kasan_save_stack+0x45/0x70
[   21.653640]  kasan_save_track+0x18/0x40
[   21.654380]  kasan_save_alloc_info+0x3b/0x50
[   21.654633]  __kasan_kmalloc+0xb7/0xc0
[   21.655071]  __kmalloc_cache_noprof+0x189/0x420
[   21.655511]  kasan_atomics+0x95/0x310
[   21.655832]  kunit_try_run_case+0x1a5/0x480
[   21.656055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.656310]  kthread+0x337/0x6f0
[   21.656624]  ret_from_fork+0x41/0x80
[   21.657043]  ret_from_fork_asm+0x1a/0x30
[   21.657563] 
[   21.657768] The buggy address belongs to the object at ffff888101e04b00
[   21.657768]  which belongs to the cache kmalloc-64 of size 64
[   21.658357] The buggy address is located 0 bytes to the right of
[   21.658357]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.659672] 
[   21.659846] The buggy address belongs to the physical page:
[   21.660094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.660890] flags: 0x200000000000000(node=0|zone=2)
[   21.661189] page_type: f5(slab)
[   21.661560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.662043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.662699] page dumped because: kasan: bad access detected
[   21.663081] 
[   21.663219] Memory state around the buggy address:
[   21.663742]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.664250]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.664920] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.665728]                                      ^
[   21.666017]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666334]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666830] ==================================================================
[   20.409572] ==================================================================
[   20.410055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   20.411051] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.411825] 
[   20.412084] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.412204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.412237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.412284] Call Trace:
[   20.412330]  <TASK>
[   20.412378]  dump_stack_lvl+0x73/0xb0
[   20.412459]  print_report+0xd1/0x650
[   20.412504]  ? __virt_addr_valid+0x1db/0x2d0
[   20.412534]  ? kasan_atomics_helper+0xd47/0x5450
[   20.412575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.412602]  ? kasan_atomics_helper+0xd47/0x5450
[   20.412627]  kasan_report+0x141/0x180
[   20.412653]  ? kasan_atomics_helper+0xd47/0x5450
[   20.412683]  kasan_check_range+0x10c/0x1c0
[   20.412708]  __kasan_check_write+0x18/0x20
[   20.412731]  kasan_atomics_helper+0xd47/0x5450
[   20.412782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.412809]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.412834]  ? trace_hardirqs_on+0x37/0xe0
[   20.412861]  ? kasan_atomics+0x152/0x310
[   20.412887]  kasan_atomics+0x1dc/0x310
[   20.412910]  ? __pfx_kasan_atomics+0x10/0x10
[   20.412933]  ? __pfx_kasan_atomics+0x10/0x10
[   20.412961]  kunit_try_run_case+0x1a5/0x480
[   20.412990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.413015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.413043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.413069]  ? __kthread_parkme+0x82/0x180
[   20.413095]  ? preempt_count_sub+0x50/0x80
[   20.413158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.413189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.413217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.413242]  kthread+0x337/0x6f0
[   20.413264]  ? trace_preempt_on+0x20/0xc0
[   20.413290]  ? __pfx_kthread+0x10/0x10
[   20.413311]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.413335]  ? calculate_sigpending+0x7b/0xa0
[   20.413361]  ? __pfx_kthread+0x10/0x10
[   20.413383]  ret_from_fork+0x41/0x80
[   20.413410]  ? __pfx_kthread+0x10/0x10
[   20.413432]  ret_from_fork_asm+0x1a/0x30
[   20.413467]  </TASK>
[   20.413483] 
[   20.425936] Allocated by task 286:
[   20.426387]  kasan_save_stack+0x45/0x70
[   20.426638]  kasan_save_track+0x18/0x40
[   20.426879]  kasan_save_alloc_info+0x3b/0x50
[   20.428231]  __kasan_kmalloc+0xb7/0xc0
[   20.428649]  __kmalloc_cache_noprof+0x189/0x420
[   20.428913]  kasan_atomics+0x95/0x310
[   20.429155]  kunit_try_run_case+0x1a5/0x480
[   20.429328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.429502]  kthread+0x337/0x6f0
[   20.429601]  ret_from_fork+0x41/0x80
[   20.429705]  ret_from_fork_asm+0x1a/0x30
[   20.430547] 
[   20.430797] The buggy address belongs to the object at ffff888101e04b00
[   20.430797]  which belongs to the cache kmalloc-64 of size 64
[   20.432031] The buggy address is located 0 bytes to the right of
[   20.432031]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.432523] 
[   20.432668] The buggy address belongs to the physical page:
[   20.432965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.433553] flags: 0x200000000000000(node=0|zone=2)
[   20.433949] page_type: f5(slab)
[   20.434335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.434793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.435436] page dumped because: kasan: bad access detected
[   20.435872] 
[   20.436077] Memory state around the buggy address:
[   20.436519]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.437020]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.437656] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.438131]                                      ^
[   20.438489]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.438838]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.439452] ==================================================================
[   21.569468] ==================================================================
[   21.569966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   21.570316] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.570953] 
[   21.572123] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.572258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.572291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.572336] Call Trace:
[   21.572380]  <TASK>
[   21.572425]  dump_stack_lvl+0x73/0xb0
[   21.572511]  print_report+0xd1/0x650
[   21.572569]  ? __virt_addr_valid+0x1db/0x2d0
[   21.572623]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.572667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.572714]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.572778]  kasan_report+0x141/0x180
[   21.572837]  ? kasan_atomics_helper+0x4f71/0x5450
[   21.572892]  __asan_report_load8_noabort+0x18/0x20
[   21.572919]  kasan_atomics_helper+0x4f71/0x5450
[   21.572945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.572971]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.572997]  ? trace_hardirqs_on+0x37/0xe0
[   21.573023]  ? kasan_atomics+0x152/0x310
[   21.573050]  kasan_atomics+0x1dc/0x310
[   21.573073]  ? __pfx_kasan_atomics+0x10/0x10
[   21.573097]  ? __pfx_kasan_atomics+0x10/0x10
[   21.573167]  kunit_try_run_case+0x1a5/0x480
[   21.573202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.573226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.573255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.573281]  ? __kthread_parkme+0x82/0x180
[   21.573307]  ? preempt_count_sub+0x50/0x80
[   21.573336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.573363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.573389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.573415]  kthread+0x337/0x6f0
[   21.573436]  ? trace_preempt_on+0x20/0xc0
[   21.573461]  ? __pfx_kthread+0x10/0x10
[   21.573482]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.573506]  ? calculate_sigpending+0x7b/0xa0
[   21.573532]  ? __pfx_kthread+0x10/0x10
[   21.573554]  ret_from_fork+0x41/0x80
[   21.573581]  ? __pfx_kthread+0x10/0x10
[   21.573602]  ret_from_fork_asm+0x1a/0x30
[   21.573639]  </TASK>
[   21.573656] 
[   21.587325] Allocated by task 286:
[   21.587759]  kasan_save_stack+0x45/0x70
[   21.588169]  kasan_save_track+0x18/0x40
[   21.588521]  kasan_save_alloc_info+0x3b/0x50
[   21.588908]  __kasan_kmalloc+0xb7/0xc0
[   21.589376]  __kmalloc_cache_noprof+0x189/0x420
[   21.589611]  kasan_atomics+0x95/0x310
[   21.590317]  kunit_try_run_case+0x1a5/0x480
[   21.591801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.592253]  kthread+0x337/0x6f0
[   21.592517]  ret_from_fork+0x41/0x80
[   21.592788]  ret_from_fork_asm+0x1a/0x30
[   21.593048] 
[   21.593672] The buggy address belongs to the object at ffff888101e04b00
[   21.593672]  which belongs to the cache kmalloc-64 of size 64
[   21.594486] The buggy address is located 0 bytes to the right of
[   21.594486]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.595178] 
[   21.595391] The buggy address belongs to the physical page:
[   21.595785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.596171] flags: 0x200000000000000(node=0|zone=2)
[   21.596674] page_type: f5(slab)
[   21.596927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.597289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.597890] page dumped because: kasan: bad access detected
[   21.598338] 
[   21.598482] Memory state around the buggy address:
[   21.598718]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.599290]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.599915] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.600253]                                      ^
[   21.600944]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.601818]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.602113] ==================================================================
[   21.284425] ==================================================================
[   21.285368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   21.285708] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.286400] 
[   21.286667] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.286797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.286825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.286865] Call Trace:
[   21.286904]  <TASK>
[   21.286942]  dump_stack_lvl+0x73/0xb0
[   21.287005]  print_report+0xd1/0x650
[   21.287046]  ? __virt_addr_valid+0x1db/0x2d0
[   21.287088]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.287160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.287204]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.287249]  kasan_report+0x141/0x180
[   21.287297]  ? kasan_atomics_helper+0x1a7f/0x5450
[   21.287352]  kasan_check_range+0x10c/0x1c0
[   21.287395]  __kasan_check_write+0x18/0x20
[   21.287435]  kasan_atomics_helper+0x1a7f/0x5450
[   21.287483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.287529]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.287571]  ? trace_hardirqs_on+0x37/0xe0
[   21.287612]  ? kasan_atomics+0x152/0x310
[   21.287671]  kasan_atomics+0x1dc/0x310
[   21.287707]  ? __pfx_kasan_atomics+0x10/0x10
[   21.287762]  ? __pfx_kasan_atomics+0x10/0x10
[   21.287811]  kunit_try_run_case+0x1a5/0x480
[   21.287861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.287908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.287960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.288017]  ? __kthread_parkme+0x82/0x180
[   21.288070]  ? preempt_count_sub+0x50/0x80
[   21.288164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.288224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.288282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.288338]  kthread+0x337/0x6f0
[   21.288383]  ? trace_preempt_on+0x20/0xc0
[   21.288440]  ? __pfx_kthread+0x10/0x10
[   21.288481]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.288521]  ? calculate_sigpending+0x7b/0xa0
[   21.288563]  ? __pfx_kthread+0x10/0x10
[   21.288595]  ret_from_fork+0x41/0x80
[   21.288638]  ? __pfx_kthread+0x10/0x10
[   21.288671]  ret_from_fork_asm+0x1a/0x30
[   21.288732]  </TASK>
[   21.288782] 
[   21.304145] Allocated by task 286:
[   21.304524]  kasan_save_stack+0x45/0x70
[   21.304984]  kasan_save_track+0x18/0x40
[   21.305295]  kasan_save_alloc_info+0x3b/0x50
[   21.305561]  __kasan_kmalloc+0xb7/0xc0
[   21.305895]  __kmalloc_cache_noprof+0x189/0x420
[   21.306345]  kasan_atomics+0x95/0x310
[   21.306689]  kunit_try_run_case+0x1a5/0x480
[   21.307088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.307508]  kthread+0x337/0x6f0
[   21.307795]  ret_from_fork+0x41/0x80
[   21.308000]  ret_from_fork_asm+0x1a/0x30
[   21.308377] 
[   21.308570] The buggy address belongs to the object at ffff888101e04b00
[   21.308570]  which belongs to the cache kmalloc-64 of size 64
[   21.309138] The buggy address is located 0 bytes to the right of
[   21.309138]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.309612] 
[   21.309758] The buggy address belongs to the physical page:
[   21.310171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.310730] flags: 0x200000000000000(node=0|zone=2)
[   21.311151] page_type: f5(slab)
[   21.311459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.312065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.312644] page dumped because: kasan: bad access detected
[   21.313067] 
[   21.313286] Memory state around the buggy address:
[   21.313662]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.313971]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.314299] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.314586]                                      ^
[   21.314879]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.315421]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.315935] ==================================================================
[   21.253562] ==================================================================
[   21.254307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   21.254872] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.255225] 
[   21.255402] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.255525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.255557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.255612] Call Trace:
[   21.255669]  <TASK>
[   21.255755]  dump_stack_lvl+0x73/0xb0
[   21.255827]  print_report+0xd1/0x650
[   21.255881]  ? __virt_addr_valid+0x1db/0x2d0
[   21.255937]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.255990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.256046]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.256146]  kasan_report+0x141/0x180
[   21.256197]  ? kasan_atomics_helper+0x19e3/0x5450
[   21.256258]  kasan_check_range+0x10c/0x1c0
[   21.256309]  __kasan_check_write+0x18/0x20
[   21.256354]  kasan_atomics_helper+0x19e3/0x5450
[   21.256410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.256456]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.256529]  ? trace_hardirqs_on+0x37/0xe0
[   21.256578]  ? kasan_atomics+0x152/0x310
[   21.256634]  kasan_atomics+0x1dc/0x310
[   21.256685]  ? __pfx_kasan_atomics+0x10/0x10
[   21.256734]  ? __pfx_kasan_atomics+0x10/0x10
[   21.256805]  kunit_try_run_case+0x1a5/0x480
[   21.256867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.256921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.256980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.257038]  ? __kthread_parkme+0x82/0x180
[   21.257090]  ? preempt_count_sub+0x50/0x80
[   21.257151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.257185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.257212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.257238]  kthread+0x337/0x6f0
[   21.257259]  ? trace_preempt_on+0x20/0xc0
[   21.257284]  ? __pfx_kthread+0x10/0x10
[   21.257305]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.257330]  ? calculate_sigpending+0x7b/0xa0
[   21.257355]  ? __pfx_kthread+0x10/0x10
[   21.257377]  ret_from_fork+0x41/0x80
[   21.257404]  ? __pfx_kthread+0x10/0x10
[   21.257426]  ret_from_fork_asm+0x1a/0x30
[   21.257464]  </TASK>
[   21.257482] 
[   21.269594] Allocated by task 286:
[   21.270025]  kasan_save_stack+0x45/0x70
[   21.270482]  kasan_save_track+0x18/0x40
[   21.270835]  kasan_save_alloc_info+0x3b/0x50
[   21.271210]  __kasan_kmalloc+0xb7/0xc0
[   21.272099]  __kmalloc_cache_noprof+0x189/0x420
[   21.272464]  kasan_atomics+0x95/0x310
[   21.272677]  kunit_try_run_case+0x1a5/0x480
[   21.272997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.273569]  kthread+0x337/0x6f0
[   21.273881]  ret_from_fork+0x41/0x80
[   21.274262]  ret_from_fork_asm+0x1a/0x30
[   21.274528] 
[   21.274771] The buggy address belongs to the object at ffff888101e04b00
[   21.274771]  which belongs to the cache kmalloc-64 of size 64
[   21.275561] The buggy address is located 0 bytes to the right of
[   21.275561]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.276279] 
[   21.276493] The buggy address belongs to the physical page:
[   21.276803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.277142] flags: 0x200000000000000(node=0|zone=2)
[   21.277642] page_type: f5(slab)
[   21.278092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.278801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.279392] page dumped because: kasan: bad access detected
[   21.279759] 
[   21.279875] Memory state around the buggy address:
[   21.280065]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.280654]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.281254] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.281886]                                      ^
[   21.282333]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.282785]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283068] ==================================================================
[   21.603976] ==================================================================
[   21.604435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   21.604817] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.605397] 
[   21.605625] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.605759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.605790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.605834] Call Trace:
[   21.605880]  <TASK>
[   21.605925]  dump_stack_lvl+0x73/0xb0
[   21.606004]  print_report+0xd1/0x650
[   21.606062]  ? __virt_addr_valid+0x1db/0x2d0
[   21.606114]  ? kasan_atomics_helper+0x2006/0x5450
[   21.606165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.606210]  ? kasan_atomics_helper+0x2006/0x5450
[   21.606254]  kasan_report+0x141/0x180
[   21.606305]  ? kasan_atomics_helper+0x2006/0x5450
[   21.606362]  kasan_check_range+0x10c/0x1c0
[   21.606413]  __kasan_check_write+0x18/0x20
[   21.606457]  kasan_atomics_helper+0x2006/0x5450
[   21.606504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.606547]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.606592]  ? trace_hardirqs_on+0x37/0xe0
[   21.606640]  ? kasan_atomics+0x152/0x310
[   21.606697]  kasan_atomics+0x1dc/0x310
[   21.606791]  ? __pfx_kasan_atomics+0x10/0x10
[   21.606837]  ? __pfx_kasan_atomics+0x10/0x10
[   21.606866]  kunit_try_run_case+0x1a5/0x480
[   21.606897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.606923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.606952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.606979]  ? __kthread_parkme+0x82/0x180
[   21.607005]  ? preempt_count_sub+0x50/0x80
[   21.607034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.607060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.607085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.607139]  kthread+0x337/0x6f0
[   21.607169]  ? trace_preempt_on+0x20/0xc0
[   21.607194]  ? __pfx_kthread+0x10/0x10
[   21.607217]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.607242]  ? calculate_sigpending+0x7b/0xa0
[   21.607268]  ? __pfx_kthread+0x10/0x10
[   21.607289]  ret_from_fork+0x41/0x80
[   21.607317]  ? __pfx_kthread+0x10/0x10
[   21.607338]  ret_from_fork_asm+0x1a/0x30
[   21.607376]  </TASK>
[   21.607393] 
[   21.619760] Allocated by task 286:
[   21.620302]  kasan_save_stack+0x45/0x70
[   21.620858]  kasan_save_track+0x18/0x40
[   21.621322]  kasan_save_alloc_info+0x3b/0x50
[   21.621710]  __kasan_kmalloc+0xb7/0xc0
[   21.621940]  __kmalloc_cache_noprof+0x189/0x420
[   21.622324]  kasan_atomics+0x95/0x310
[   21.622855]  kunit_try_run_case+0x1a5/0x480
[   21.623297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.623826]  kthread+0x337/0x6f0
[   21.624254]  ret_from_fork+0x41/0x80
[   21.624570]  ret_from_fork_asm+0x1a/0x30
[   21.625035] 
[   21.625238] The buggy address belongs to the object at ffff888101e04b00
[   21.625238]  which belongs to the cache kmalloc-64 of size 64
[   21.626243] The buggy address is located 0 bytes to the right of
[   21.626243]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.627182] 
[   21.627409] The buggy address belongs to the physical page:
[   21.627817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.628565] flags: 0x200000000000000(node=0|zone=2)
[   21.628922] page_type: f5(slab)
[   21.629337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.630016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.630684] page dumped because: kasan: bad access detected
[   21.631004] 
[   21.631152] Memory state around the buggy address:
[   21.631765]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.632569]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.633091] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.633431]                                      ^
[   21.633651]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634112]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634490] ==================================================================
[   21.759496] ==================================================================
[   21.760073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   21.760728] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.761037] 
[   21.761295] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.761423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.761453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.761504] Call Trace:
[   21.761559]  <TASK>
[   21.761605]  dump_stack_lvl+0x73/0xb0
[   21.761693]  print_report+0xd1/0x650
[   21.761758]  ? __virt_addr_valid+0x1db/0x2d0
[   21.761823]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.761890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.761944]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.761995]  kasan_report+0x141/0x180
[   21.762046]  ? kasan_atomics_helper+0x4fa5/0x5450
[   21.762153]  __asan_report_load8_noabort+0x18/0x20
[   21.762207]  kasan_atomics_helper+0x4fa5/0x5450
[   21.762262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.762323]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.762392]  ? trace_hardirqs_on+0x37/0xe0
[   21.762447]  ? kasan_atomics+0x152/0x310
[   21.762509]  kasan_atomics+0x1dc/0x310
[   21.762555]  ? __pfx_kasan_atomics+0x10/0x10
[   21.762602]  ? __pfx_kasan_atomics+0x10/0x10
[   21.762661]  kunit_try_run_case+0x1a5/0x480
[   21.762721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.762778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.762834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.762886]  ? __kthread_parkme+0x82/0x180
[   21.762947]  ? preempt_count_sub+0x50/0x80
[   21.763026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.763086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.763178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.763237]  kthread+0x337/0x6f0
[   21.763285]  ? trace_preempt_on+0x20/0xc0
[   21.763342]  ? __pfx_kthread+0x10/0x10
[   21.763390]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.763436]  ? calculate_sigpending+0x7b/0xa0
[   21.763479]  ? __pfx_kthread+0x10/0x10
[   21.763520]  ret_from_fork+0x41/0x80
[   21.763564]  ? __pfx_kthread+0x10/0x10
[   21.763607]  ret_from_fork_asm+0x1a/0x30
[   21.763694]  </TASK>
[   21.763724] 
[   21.775968] Allocated by task 286:
[   21.776330]  kasan_save_stack+0x45/0x70
[   21.776614]  kasan_save_track+0x18/0x40
[   21.777044]  kasan_save_alloc_info+0x3b/0x50
[   21.777489]  __kasan_kmalloc+0xb7/0xc0
[   21.777936]  __kmalloc_cache_noprof+0x189/0x420
[   21.778461]  kasan_atomics+0x95/0x310
[   21.778829]  kunit_try_run_case+0x1a5/0x480
[   21.779126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.779422]  kthread+0x337/0x6f0
[   21.779711]  ret_from_fork+0x41/0x80
[   21.779956]  ret_from_fork_asm+0x1a/0x30
[   21.780224] 
[   21.780411] The buggy address belongs to the object at ffff888101e04b00
[   21.780411]  which belongs to the cache kmalloc-64 of size 64
[   21.781068] The buggy address is located 0 bytes to the right of
[   21.781068]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.781792] 
[   21.781982] The buggy address belongs to the physical page:
[   21.782364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.782806] flags: 0x200000000000000(node=0|zone=2)
[   21.783161] page_type: f5(slab)
[   21.783461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.783884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.784338] page dumped because: kasan: bad access detected
[   21.784653] 
[   21.784853] Memory state around the buggy address:
[   21.785165]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.785564]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.785945] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.786402]                                      ^
[   21.786645]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.787135]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.787575] ==================================================================
[   20.007997] ==================================================================
[   20.008535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   20.008954] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.010178] 
[   20.010452] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.010626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.010675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.010726] Call Trace:
[   20.010782]  <TASK>
[   20.010836]  dump_stack_lvl+0x73/0xb0
[   20.010919]  print_report+0xd1/0x650
[   20.010966]  ? __virt_addr_valid+0x1db/0x2d0
[   20.011000]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.011026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.011051]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.011077]  kasan_report+0x141/0x180
[   20.011119]  ? kasan_atomics_helper+0x5fe/0x5450
[   20.011187]  kasan_check_range+0x10c/0x1c0
[   20.011213]  __kasan_check_write+0x18/0x20
[   20.011236]  kasan_atomics_helper+0x5fe/0x5450
[   20.011264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.011289]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.011314]  ? trace_hardirqs_on+0x37/0xe0
[   20.011339]  ? kasan_atomics+0x152/0x310
[   20.011367]  kasan_atomics+0x1dc/0x310
[   20.011390]  ? __pfx_kasan_atomics+0x10/0x10
[   20.011414]  ? __pfx_kasan_atomics+0x10/0x10
[   20.011441]  kunit_try_run_case+0x1a5/0x480
[   20.011471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.011496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.011524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.011550]  ? __kthread_parkme+0x82/0x180
[   20.011575]  ? preempt_count_sub+0x50/0x80
[   20.011604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.011649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.011731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.011829]  kthread+0x337/0x6f0
[   20.011862]  ? trace_preempt_on+0x20/0xc0
[   20.011891]  ? __pfx_kthread+0x10/0x10
[   20.011915]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.011939]  ? calculate_sigpending+0x7b/0xa0
[   20.011965]  ? __pfx_kthread+0x10/0x10
[   20.011986]  ret_from_fork+0x41/0x80
[   20.012015]  ? __pfx_kthread+0x10/0x10
[   20.012037]  ret_from_fork_asm+0x1a/0x30
[   20.012073]  </TASK>
[   20.012089] 
[   20.027976] Allocated by task 286:
[   20.028605]  kasan_save_stack+0x45/0x70
[   20.028958]  kasan_save_track+0x18/0x40
[   20.029182]  kasan_save_alloc_info+0x3b/0x50
[   20.029577]  __kasan_kmalloc+0xb7/0xc0
[   20.029913]  __kmalloc_cache_noprof+0x189/0x420
[   20.030356]  kasan_atomics+0x95/0x310
[   20.030897]  kunit_try_run_case+0x1a5/0x480
[   20.031506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.031862]  kthread+0x337/0x6f0
[   20.032116]  ret_from_fork+0x41/0x80
[   20.032722]  ret_from_fork_asm+0x1a/0x30
[   20.032954] 
[   20.033147] The buggy address belongs to the object at ffff888101e04b00
[   20.033147]  which belongs to the cache kmalloc-64 of size 64
[   20.033886] The buggy address is located 0 bytes to the right of
[   20.033886]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.034690] 
[   20.035215] The buggy address belongs to the physical page:
[   20.035692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.036307] flags: 0x200000000000000(node=0|zone=2)
[   20.036586] page_type: f5(slab)
[   20.036803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.037472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.037908] page dumped because: kasan: bad access detected
[   20.038221] 
[   20.038447] Memory state around the buggy address:
[   20.038921]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.039312]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.039714] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.040111]                                      ^
[   20.040409]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.041594]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.042183] ==================================================================
[   21.667837] ==================================================================
[   21.668416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   21.668999] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.669305] 
[   21.669569] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.669663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.669687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.669726] Call Trace:
[   21.669780]  <TASK>
[   21.669821]  dump_stack_lvl+0x73/0xb0
[   21.669889]  print_report+0xd1/0x650
[   21.669941]  ? __virt_addr_valid+0x1db/0x2d0
[   21.669990]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.670032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.670083]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.670162]  kasan_report+0x141/0x180
[   21.670216]  ? kasan_atomics_helper+0x20c8/0x5450
[   21.670271]  kasan_check_range+0x10c/0x1c0
[   21.670317]  __kasan_check_write+0x18/0x20
[   21.670363]  kasan_atomics_helper+0x20c8/0x5450
[   21.670422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.670476]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.670523]  ? trace_hardirqs_on+0x37/0xe0
[   21.670571]  ? kasan_atomics+0x152/0x310
[   21.670629]  kasan_atomics+0x1dc/0x310
[   21.670678]  ? __pfx_kasan_atomics+0x10/0x10
[   21.670728]  ? __pfx_kasan_atomics+0x10/0x10
[   21.670795]  kunit_try_run_case+0x1a5/0x480
[   21.670847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.670893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.670946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.670994]  ? __kthread_parkme+0x82/0x180
[   21.671044]  ? preempt_count_sub+0x50/0x80
[   21.671097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.671143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.671195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.671252]  kthread+0x337/0x6f0
[   21.671298]  ? trace_preempt_on+0x20/0xc0
[   21.671355]  ? __pfx_kthread+0x10/0x10
[   21.671400]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.671448]  ? calculate_sigpending+0x7b/0xa0
[   21.671495]  ? __pfx_kthread+0x10/0x10
[   21.671534]  ret_from_fork+0x41/0x80
[   21.671578]  ? __pfx_kthread+0x10/0x10
[   21.671616]  ret_from_fork_asm+0x1a/0x30
[   21.671707]  </TASK>
[   21.671737] 
[   21.682004] Allocated by task 286:
[   21.682291]  kasan_save_stack+0x45/0x70
[   21.682562]  kasan_save_track+0x18/0x40
[   21.682916]  kasan_save_alloc_info+0x3b/0x50
[   21.683308]  __kasan_kmalloc+0xb7/0xc0
[   21.683657]  __kmalloc_cache_noprof+0x189/0x420
[   21.684088]  kasan_atomics+0x95/0x310
[   21.684439]  kunit_try_run_case+0x1a5/0x480
[   21.684837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.685411]  kthread+0x337/0x6f0
[   21.685729]  ret_from_fork+0x41/0x80
[   21.686097]  ret_from_fork_asm+0x1a/0x30
[   21.686340] 
[   21.686524] The buggy address belongs to the object at ffff888101e04b00
[   21.686524]  which belongs to the cache kmalloc-64 of size 64
[   21.687085] The buggy address is located 0 bytes to the right of
[   21.687085]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.687737] 
[   21.687951] The buggy address belongs to the physical page:
[   21.688488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.688883] flags: 0x200000000000000(node=0|zone=2)
[   21.689370] page_type: f5(slab)
[   21.689679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.690025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.690626] page dumped because: kasan: bad access detected
[   21.691022] 
[   21.691189] Memory state around the buggy address:
[   21.691575]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.691988]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.692499] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.692806]                                      ^
[   21.693242]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.693651]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.693997] ==================================================================
[   20.110141] ==================================================================
[   20.110672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   20.111183] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.111698] 
[   20.111893] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.112012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.112045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.112090] Call Trace:
[   20.112173]  <TASK>
[   20.112221]  dump_stack_lvl+0x73/0xb0
[   20.112301]  print_report+0xd1/0x650
[   20.112361]  ? __virt_addr_valid+0x1db/0x2d0
[   20.112408]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.112455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.112504]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.112548]  kasan_report+0x141/0x180
[   20.112600]  ? kasan_atomics_helper+0x7c7/0x5450
[   20.112663]  kasan_check_range+0x10c/0x1c0
[   20.112708]  __kasan_check_write+0x18/0x20
[   20.112763]  kasan_atomics_helper+0x7c7/0x5450
[   20.112819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.112871]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.112917]  ? trace_hardirqs_on+0x37/0xe0
[   20.112970]  ? kasan_atomics+0x152/0x310
[   20.113026]  kasan_atomics+0x1dc/0x310
[   20.113077]  ? __pfx_kasan_atomics+0x10/0x10
[   20.113153]  ? __pfx_kasan_atomics+0x10/0x10
[   20.113207]  kunit_try_run_case+0x1a5/0x480
[   20.113267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.113316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.113374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.113430]  ? __kthread_parkme+0x82/0x180
[   20.113481]  ? preempt_count_sub+0x50/0x80
[   20.113539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.113577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.113604]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.113631]  kthread+0x337/0x6f0
[   20.113651]  ? trace_preempt_on+0x20/0xc0
[   20.113677]  ? __pfx_kthread+0x10/0x10
[   20.113698]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.113722]  ? calculate_sigpending+0x7b/0xa0
[   20.113770]  ? __pfx_kthread+0x10/0x10
[   20.113800]  ret_from_fork+0x41/0x80
[   20.113828]  ? __pfx_kthread+0x10/0x10
[   20.113850]  ret_from_fork_asm+0x1a/0x30
[   20.113887]  </TASK>
[   20.113904] 
[   20.126395] Allocated by task 286:
[   20.127774]  kasan_save_stack+0x45/0x70
[   20.128253]  kasan_save_track+0x18/0x40
[   20.128570]  kasan_save_alloc_info+0x3b/0x50
[   20.129206]  __kasan_kmalloc+0xb7/0xc0
[   20.129523]  __kmalloc_cache_noprof+0x189/0x420
[   20.130232]  kasan_atomics+0x95/0x310
[   20.130466]  kunit_try_run_case+0x1a5/0x480
[   20.130649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.131159]  kthread+0x337/0x6f0
[   20.131495]  ret_from_fork+0x41/0x80
[   20.131770]  ret_from_fork_asm+0x1a/0x30
[   20.132055] 
[   20.132665] The buggy address belongs to the object at ffff888101e04b00
[   20.132665]  which belongs to the cache kmalloc-64 of size 64
[   20.133453] The buggy address is located 0 bytes to the right of
[   20.133453]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.134414] 
[   20.134554] The buggy address belongs to the physical page:
[   20.135234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.135787] flags: 0x200000000000000(node=0|zone=2)
[   20.136314] page_type: f5(slab)
[   20.136648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.136999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.137518] page dumped because: kasan: bad access detected
[   20.137741] 
[   20.137967] Memory state around the buggy address:
[   20.138922]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.139284]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.140023] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.140630]                                      ^
[   20.141024]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.141486]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.141948] ==================================================================
[   21.346620] ==================================================================
[   21.347029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   21.347447] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.348024] 
[   21.348258] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.348366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.348392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.348434] Call Trace:
[   21.348479]  <TASK>
[   21.348524]  dump_stack_lvl+0x73/0xb0
[   21.348589]  print_report+0xd1/0x650
[   21.348634]  ? __virt_addr_valid+0x1db/0x2d0
[   21.348686]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.348737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.348803]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.348859]  kasan_report+0x141/0x180
[   21.348914]  ? kasan_atomics_helper+0x1c18/0x5450
[   21.348980]  kasan_check_range+0x10c/0x1c0
[   21.349035]  __kasan_check_write+0x18/0x20
[   21.349085]  kasan_atomics_helper+0x1c18/0x5450
[   21.349176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.349234]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.349280]  ? trace_hardirqs_on+0x37/0xe0
[   21.349323]  ? kasan_atomics+0x152/0x310
[   21.349370]  kasan_atomics+0x1dc/0x310
[   21.349412]  ? __pfx_kasan_atomics+0x10/0x10
[   21.349456]  ? __pfx_kasan_atomics+0x10/0x10
[   21.349511]  kunit_try_run_case+0x1a5/0x480
[   21.349572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.349626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.349683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.349740]  ? __kthread_parkme+0x82/0x180
[   21.349808]  ? preempt_count_sub+0x50/0x80
[   21.349871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.349928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.349985]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.350041]  kthread+0x337/0x6f0
[   21.350085]  ? trace_preempt_on+0x20/0xc0
[   21.350175]  ? __pfx_kthread+0x10/0x10
[   21.350224]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.350268]  ? calculate_sigpending+0x7b/0xa0
[   21.350314]  ? __pfx_kthread+0x10/0x10
[   21.350351]  ret_from_fork+0x41/0x80
[   21.350393]  ? __pfx_kthread+0x10/0x10
[   21.350437]  ret_from_fork_asm+0x1a/0x30
[   21.350502]  </TASK>
[   21.350530] 
[   21.362937] Allocated by task 286:
[   21.363349]  kasan_save_stack+0x45/0x70
[   21.363763]  kasan_save_track+0x18/0x40
[   21.364134]  kasan_save_alloc_info+0x3b/0x50
[   21.364375]  __kasan_kmalloc+0xb7/0xc0
[   21.364695]  __kmalloc_cache_noprof+0x189/0x420
[   21.365067]  kasan_atomics+0x95/0x310
[   21.365402]  kunit_try_run_case+0x1a5/0x480
[   21.365773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.366016]  kthread+0x337/0x6f0
[   21.366364]  ret_from_fork+0x41/0x80
[   21.366700]  ret_from_fork_asm+0x1a/0x30
[   21.366949] 
[   21.367083] The buggy address belongs to the object at ffff888101e04b00
[   21.367083]  which belongs to the cache kmalloc-64 of size 64
[   21.367567] The buggy address is located 0 bytes to the right of
[   21.367567]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.368369] 
[   21.368581] The buggy address belongs to the physical page:
[   21.369043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.369663] flags: 0x200000000000000(node=0|zone=2)
[   21.370097] page_type: f5(slab)
[   21.370409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.370927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.371321] page dumped because: kasan: bad access detected
[   21.371565] 
[   21.371704] Memory state around the buggy address:
[   21.372147]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.372663]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.373237] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.373512]                                      ^
[   21.373757]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374271]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374822] ==================================================================
[   21.375979] ==================================================================
[   21.376743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   21.377297] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.377786] 
[   21.377987] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.378086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.378142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.378180] Call Trace:
[   21.378219]  <TASK>
[   21.378255]  dump_stack_lvl+0x73/0xb0
[   21.378317]  print_report+0xd1/0x650
[   21.378370]  ? __virt_addr_valid+0x1db/0x2d0
[   21.378419]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.378461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.378505]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.378553]  kasan_report+0x141/0x180
[   21.378606]  ? kasan_atomics_helper+0x4f30/0x5450
[   21.378665]  __asan_report_load8_noabort+0x18/0x20
[   21.378712]  kasan_atomics_helper+0x4f30/0x5450
[   21.378782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.378839]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.378892]  ? trace_hardirqs_on+0x37/0xe0
[   21.378943]  ? kasan_atomics+0x152/0x310
[   21.378992]  kasan_atomics+0x1dc/0x310
[   21.379029]  ? __pfx_kasan_atomics+0x10/0x10
[   21.379070]  ? __pfx_kasan_atomics+0x10/0x10
[   21.379134]  kunit_try_run_case+0x1a5/0x480
[   21.379195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.379248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.379305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.379361]  ? __kthread_parkme+0x82/0x180
[   21.379416]  ? preempt_count_sub+0x50/0x80
[   21.379477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.379535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.379591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.379655]  kthread+0x337/0x6f0
[   21.379703]  ? trace_preempt_on+0x20/0xc0
[   21.379767]  ? __pfx_kthread+0x10/0x10
[   21.379817]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.379861]  ? calculate_sigpending+0x7b/0xa0
[   21.379903]  ? __pfx_kthread+0x10/0x10
[   21.379944]  ret_from_fork+0x41/0x80
[   21.379992]  ? __pfx_kthread+0x10/0x10
[   21.380035]  ret_from_fork_asm+0x1a/0x30
[   21.380113]  </TASK>
[   21.380148] 
[   21.391952] Allocated by task 286:
[   21.392374]  kasan_save_stack+0x45/0x70
[   21.392807]  kasan_save_track+0x18/0x40
[   21.393875]  kasan_save_alloc_info+0x3b/0x50
[   21.394303]  __kasan_kmalloc+0xb7/0xc0
[   21.394656]  __kmalloc_cache_noprof+0x189/0x420
[   21.394894]  kasan_atomics+0x95/0x310
[   21.395220]  kunit_try_run_case+0x1a5/0x480
[   21.395561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.395852]  kthread+0x337/0x6f0
[   21.396053]  ret_from_fork+0x41/0x80
[   21.396397]  ret_from_fork_asm+0x1a/0x30
[   21.396727] 
[   21.396918] The buggy address belongs to the object at ffff888101e04b00
[   21.396918]  which belongs to the cache kmalloc-64 of size 64
[   21.397822] The buggy address is located 0 bytes to the right of
[   21.397822]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.398392] 
[   21.398586] The buggy address belongs to the physical page:
[   21.399042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.399584] flags: 0x200000000000000(node=0|zone=2)
[   21.399991] page_type: f5(slab)
[   21.400234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.400555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.401089] page dumped because: kasan: bad access detected
[   21.401547] 
[   21.401716] Memory state around the buggy address:
[   21.402157]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.402560]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.402863] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.403432]                                      ^
[   21.403857]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.404284]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.404574] ==================================================================
[   20.570856] ==================================================================
[   20.571360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   20.572381] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.572987] 
[   20.573209] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.573307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.573331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.573369] Call Trace:
[   20.573408]  <TASK>
[   20.573447]  dump_stack_lvl+0x73/0xb0
[   20.573518]  print_report+0xd1/0x650
[   20.573562]  ? __virt_addr_valid+0x1db/0x2d0
[   20.573606]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.573843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.574007]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.574066]  kasan_report+0x141/0x180
[   20.574143]  ? kasan_atomics_helper+0x4a36/0x5450
[   20.574209]  __asan_report_load4_noabort+0x18/0x20
[   20.574258]  kasan_atomics_helper+0x4a36/0x5450
[   20.574497]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.574531]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.574559]  ? trace_hardirqs_on+0x37/0xe0
[   20.574586]  ? kasan_atomics+0x152/0x310
[   20.574615]  kasan_atomics+0x1dc/0x310
[   20.574640]  ? __pfx_kasan_atomics+0x10/0x10
[   20.574663]  ? __pfx_kasan_atomics+0x10/0x10
[   20.574691]  kunit_try_run_case+0x1a5/0x480
[   20.574721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.574769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.574805]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.574832]  ? __kthread_parkme+0x82/0x180
[   20.574859]  ? preempt_count_sub+0x50/0x80
[   20.574890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.574917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.574944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.574970]  kthread+0x337/0x6f0
[   20.574991]  ? trace_preempt_on+0x20/0xc0
[   20.575017]  ? __pfx_kthread+0x10/0x10
[   20.575039]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.575064]  ? calculate_sigpending+0x7b/0xa0
[   20.575090]  ? __pfx_kthread+0x10/0x10
[   20.575153]  ret_from_fork+0x41/0x80
[   20.575185]  ? __pfx_kthread+0x10/0x10
[   20.575208]  ret_from_fork_asm+0x1a/0x30
[   20.575244]  </TASK>
[   20.575262] 
[   20.589727] Allocated by task 286:
[   20.590154]  kasan_save_stack+0x45/0x70
[   20.590424]  kasan_save_track+0x18/0x40
[   20.590783]  kasan_save_alloc_info+0x3b/0x50
[   20.591547]  __kasan_kmalloc+0xb7/0xc0
[   20.591899]  __kmalloc_cache_noprof+0x189/0x420
[   20.592401]  kasan_atomics+0x95/0x310
[   20.592605]  kunit_try_run_case+0x1a5/0x480
[   20.592809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.593022]  kthread+0x337/0x6f0
[   20.593191]  ret_from_fork+0x41/0x80
[   20.593358]  ret_from_fork_asm+0x1a/0x30
[   20.593535] 
[   20.593643] The buggy address belongs to the object at ffff888101e04b00
[   20.593643]  which belongs to the cache kmalloc-64 of size 64
[   20.594438] The buggy address is located 0 bytes to the right of
[   20.594438]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.595021] 
[   20.595280] The buggy address belongs to the physical page:
[   20.595824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.596577] flags: 0x200000000000000(node=0|zone=2)
[   20.597142] page_type: f5(slab)
[   20.597546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.598508] page dumped because: kasan: bad access detected
[   20.599129] 
[   20.599326] Memory state around the buggy address:
[   20.599871]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.600571]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.601020] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.601476]                                      ^
[   20.601902]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.602357]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.602897] ==================================================================
[   21.433685] ==================================================================
[   21.434163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   21.434539] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.434957] 
[   21.435229] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.435352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.435386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.435432] Call Trace:
[   21.435473]  <TASK>
[   21.435518]  dump_stack_lvl+0x73/0xb0
[   21.435595]  print_report+0xd1/0x650
[   21.435663]  ? __virt_addr_valid+0x1db/0x2d0
[   21.435724]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.435791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.435845]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.435902]  kasan_report+0x141/0x180
[   21.435959]  ? kasan_atomics_helper+0x1d7a/0x5450
[   21.436026]  kasan_check_range+0x10c/0x1c0
[   21.436079]  __kasan_check_write+0x18/0x20
[   21.436164]  kasan_atomics_helper+0x1d7a/0x5450
[   21.436224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.436281]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.436336]  ? trace_hardirqs_on+0x37/0xe0
[   21.436374]  ? kasan_atomics+0x152/0x310
[   21.436415]  kasan_atomics+0x1dc/0x310
[   21.436447]  ? __pfx_kasan_atomics+0x10/0x10
[   21.436480]  ? __pfx_kasan_atomics+0x10/0x10
[   21.436519]  kunit_try_run_case+0x1a5/0x480
[   21.436562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.436597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.436634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.436669]  ? __kthread_parkme+0x82/0x180
[   21.436704]  ? preempt_count_sub+0x50/0x80
[   21.436755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.436797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.436834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.436870]  kthread+0x337/0x6f0
[   21.436899]  ? trace_preempt_on+0x20/0xc0
[   21.436936]  ? __pfx_kthread+0x10/0x10
[   21.436965]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.436999]  ? calculate_sigpending+0x7b/0xa0
[   21.437033]  ? __pfx_kthread+0x10/0x10
[   21.437063]  ret_from_fork+0x41/0x80
[   21.437126]  ? __pfx_kthread+0x10/0x10
[   21.437167]  ret_from_fork_asm+0x1a/0x30
[   21.437250]  </TASK>
[   21.437278] 
[   21.449060] Allocated by task 286:
[   21.449522]  kasan_save_stack+0x45/0x70
[   21.449940]  kasan_save_track+0x18/0x40
[   21.450374]  kasan_save_alloc_info+0x3b/0x50
[   21.450780]  __kasan_kmalloc+0xb7/0xc0
[   21.451189]  __kmalloc_cache_noprof+0x189/0x420
[   21.451633]  kasan_atomics+0x95/0x310
[   21.451981]  kunit_try_run_case+0x1a5/0x480
[   21.452424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.452774]  kthread+0x337/0x6f0
[   21.452952]  ret_from_fork+0x41/0x80
[   21.453204]  ret_from_fork_asm+0x1a/0x30
[   21.453579] 
[   21.453798] The buggy address belongs to the object at ffff888101e04b00
[   21.453798]  which belongs to the cache kmalloc-64 of size 64
[   21.454816] The buggy address is located 0 bytes to the right of
[   21.454816]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.455955] 
[   21.456214] The buggy address belongs to the physical page:
[   21.456677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.457372] flags: 0x200000000000000(node=0|zone=2)
[   21.457837] page_type: f5(slab)
[   21.458072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.458508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.458924] page dumped because: kasan: bad access detected
[   21.459279] 
[   21.459467] Memory state around the buggy address:
[   21.459761]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.460276]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.460723] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.461214]                                      ^
[   21.461590]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.461980]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.462525] ==================================================================
[   21.499586] ==================================================================
[   21.500038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   21.500386] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.501037] 
[   21.501508] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.501638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.501673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.501725] Call Trace:
[   21.501783]  <TASK>
[   21.501835]  dump_stack_lvl+0x73/0xb0
[   21.501909]  print_report+0xd1/0x650
[   21.501959]  ? __virt_addr_valid+0x1db/0x2d0
[   21.502015]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.502067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.502146]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.502191]  kasan_report+0x141/0x180
[   21.502237]  ? kasan_atomics_helper+0x1eaa/0x5450
[   21.502301]  kasan_check_range+0x10c/0x1c0
[   21.502354]  __kasan_check_write+0x18/0x20
[   21.502406]  kasan_atomics_helper+0x1eaa/0x5450
[   21.502463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.502517]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.502568]  ? trace_hardirqs_on+0x37/0xe0
[   21.502614]  ? kasan_atomics+0x152/0x310
[   21.502692]  kasan_atomics+0x1dc/0x310
[   21.502738]  ? __pfx_kasan_atomics+0x10/0x10
[   21.502799]  ? __pfx_kasan_atomics+0x10/0x10
[   21.502856]  kunit_try_run_case+0x1a5/0x480
[   21.502915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.502990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.503049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.503098]  ? __kthread_parkme+0x82/0x180
[   21.503188]  ? preempt_count_sub+0x50/0x80
[   21.503230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.503259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.503287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.503313]  kthread+0x337/0x6f0
[   21.503334]  ? trace_preempt_on+0x20/0xc0
[   21.503360]  ? __pfx_kthread+0x10/0x10
[   21.503382]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.503406]  ? calculate_sigpending+0x7b/0xa0
[   21.503431]  ? __pfx_kthread+0x10/0x10
[   21.503453]  ret_from_fork+0x41/0x80
[   21.503479]  ? __pfx_kthread+0x10/0x10
[   21.503501]  ret_from_fork_asm+0x1a/0x30
[   21.503536]  </TASK>
[   21.503552] 
[   21.516013] Allocated by task 286:
[   21.516391]  kasan_save_stack+0x45/0x70
[   21.516704]  kasan_save_track+0x18/0x40
[   21.517079]  kasan_save_alloc_info+0x3b/0x50
[   21.517500]  __kasan_kmalloc+0xb7/0xc0
[   21.517867]  __kmalloc_cache_noprof+0x189/0x420
[   21.518305]  kasan_atomics+0x95/0x310
[   21.518662]  kunit_try_run_case+0x1a5/0x480
[   21.518999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.519357]  kthread+0x337/0x6f0
[   21.519636]  ret_from_fork+0x41/0x80
[   21.520006]  ret_from_fork_asm+0x1a/0x30
[   21.520413] 
[   21.520561] The buggy address belongs to the object at ffff888101e04b00
[   21.520561]  which belongs to the cache kmalloc-64 of size 64
[   21.521481] The buggy address is located 0 bytes to the right of
[   21.521481]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.522082] 
[   21.522311] The buggy address belongs to the physical page:
[   21.522795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.523443] flags: 0x200000000000000(node=0|zone=2)
[   21.523770] page_type: f5(slab)
[   21.524140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.524739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.525326] page dumped because: kasan: bad access detected
[   21.525722] 
[   21.525923] Memory state around the buggy address:
[   21.526350]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.526885]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.527335] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.527857]                                      ^
[   21.528247]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.528812]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.529287] ==================================================================
[   20.305723] ==================================================================
[   20.306415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   20.308789] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.309654] 
[   20.310044] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.310318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.310338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.310367] Call Trace:
[   20.310394]  <TASK>
[   20.310421]  dump_stack_lvl+0x73/0xb0
[   20.310475]  print_report+0xd1/0x650
[   20.310504]  ? __virt_addr_valid+0x1db/0x2d0
[   20.310531]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.310557]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.310582]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.310607]  kasan_report+0x141/0x180
[   20.310632]  ? kasan_atomics_helper+0xb6a/0x5450
[   20.310662]  kasan_check_range+0x10c/0x1c0
[   20.310685]  __kasan_check_write+0x18/0x20
[   20.310708]  kasan_atomics_helper+0xb6a/0x5450
[   20.310733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.310782]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.310810]  ? trace_hardirqs_on+0x37/0xe0
[   20.310836]  ? kasan_atomics+0x152/0x310
[   20.310863]  kasan_atomics+0x1dc/0x310
[   20.310887]  ? __pfx_kasan_atomics+0x10/0x10
[   20.310911]  ? __pfx_kasan_atomics+0x10/0x10
[   20.310939]  kunit_try_run_case+0x1a5/0x480
[   20.310969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.310993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.311021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.311048]  ? __kthread_parkme+0x82/0x180
[   20.311074]  ? preempt_count_sub+0x50/0x80
[   20.311107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.311157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.311184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.311210]  kthread+0x337/0x6f0
[   20.311231]  ? trace_preempt_on+0x20/0xc0
[   20.311256]  ? __pfx_kthread+0x10/0x10
[   20.311277]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.311302]  ? calculate_sigpending+0x7b/0xa0
[   20.311328]  ? __pfx_kthread+0x10/0x10
[   20.311351]  ret_from_fork+0x41/0x80
[   20.311378]  ? __pfx_kthread+0x10/0x10
[   20.311400]  ret_from_fork_asm+0x1a/0x30
[   20.311437]  </TASK>
[   20.311453] 
[   20.325921] Allocated by task 286:
[   20.326920]  kasan_save_stack+0x45/0x70
[   20.327287]  kasan_save_track+0x18/0x40
[   20.327565]  kasan_save_alloc_info+0x3b/0x50
[   20.327895]  __kasan_kmalloc+0xb7/0xc0
[   20.328583]  __kmalloc_cache_noprof+0x189/0x420
[   20.328878]  kasan_atomics+0x95/0x310
[   20.329061]  kunit_try_run_case+0x1a5/0x480
[   20.329684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.329951]  kthread+0x337/0x6f0
[   20.330521]  ret_from_fork+0x41/0x80
[   20.331263]  ret_from_fork_asm+0x1a/0x30
[   20.331597] 
[   20.331726] The buggy address belongs to the object at ffff888101e04b00
[   20.331726]  which belongs to the cache kmalloc-64 of size 64
[   20.332839] The buggy address is located 0 bytes to the right of
[   20.332839]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.333621] 
[   20.333983] The buggy address belongs to the physical page:
[   20.334421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.335673] flags: 0x200000000000000(node=0|zone=2)
[   20.336019] page_type: f5(slab)
[   20.336207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.336928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.337440] page dumped because: kasan: bad access detected
[   20.337646] 
[   20.337739] Memory state around the buggy address:
[   20.337966]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.339049]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.339642] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.340021]                                      ^
[   20.340704]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.340987]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.341572] ==================================================================
[   20.697071] ==================================================================
[   20.698974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   20.699848] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.701329] 
[   20.701516] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.701593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.701619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.701661] Call Trace:
[   20.701705]  <TASK>
[   20.701761]  dump_stack_lvl+0x73/0xb0
[   20.701841]  print_report+0xd1/0x650
[   20.701886]  ? __virt_addr_valid+0x1db/0x2d0
[   20.701934]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.701983]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.702034]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.702082]  kasan_report+0x141/0x180
[   20.702126]  ? kasan_atomics_helper+0x4a02/0x5450
[   20.702170]  __asan_report_load4_noabort+0x18/0x20
[   20.702195]  kasan_atomics_helper+0x4a02/0x5450
[   20.702222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.702249]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.702275]  ? trace_hardirqs_on+0x37/0xe0
[   20.702301]  ? kasan_atomics+0x152/0x310
[   20.702329]  kasan_atomics+0x1dc/0x310
[   20.702351]  ? __pfx_kasan_atomics+0x10/0x10
[   20.702375]  ? __pfx_kasan_atomics+0x10/0x10
[   20.702403]  kunit_try_run_case+0x1a5/0x480
[   20.702432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.702456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.702485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.702510]  ? __kthread_parkme+0x82/0x180
[   20.702536]  ? preempt_count_sub+0x50/0x80
[   20.702566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.702593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.702618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.702645]  kthread+0x337/0x6f0
[   20.702665]  ? trace_preempt_on+0x20/0xc0
[   20.702692]  ? __pfx_kthread+0x10/0x10
[   20.702714]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.702739]  ? calculate_sigpending+0x7b/0xa0
[   20.702792]  ? __pfx_kthread+0x10/0x10
[   20.702815]  ret_from_fork+0x41/0x80
[   20.702842]  ? __pfx_kthread+0x10/0x10
[   20.702864]  ret_from_fork_asm+0x1a/0x30
[   20.702901]  </TASK>
[   20.702918] 
[   20.713315] Allocated by task 286:
[   20.713599]  kasan_save_stack+0x45/0x70
[   20.713999]  kasan_save_track+0x18/0x40
[   20.714302]  kasan_save_alloc_info+0x3b/0x50
[   20.714583]  __kasan_kmalloc+0xb7/0xc0
[   20.714867]  __kmalloc_cache_noprof+0x189/0x420
[   20.715096]  kasan_atomics+0x95/0x310
[   20.715293]  kunit_try_run_case+0x1a5/0x480
[   20.715513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.715934]  kthread+0x337/0x6f0
[   20.716240]  ret_from_fork+0x41/0x80
[   20.716709]  ret_from_fork_asm+0x1a/0x30
[   20.717086] 
[   20.717289] The buggy address belongs to the object at ffff888101e04b00
[   20.717289]  which belongs to the cache kmalloc-64 of size 64
[   20.717934] The buggy address is located 0 bytes to the right of
[   20.717934]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.718386] 
[   20.718559] The buggy address belongs to the physical page:
[   20.718991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.719762] flags: 0x200000000000000(node=0|zone=2)
[   20.720014] page_type: f5(slab)
[   20.720229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.720816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.721309] page dumped because: kasan: bad access detected
[   20.721543] 
[   20.721671] Memory state around the buggy address:
[   20.721922]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722439]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.723209] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.723602]                                      ^
[   20.723888]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724165]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724449] ==================================================================
[   20.539285] ==================================================================
[   20.539825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   20.540273] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.540860] 
[   20.541115] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.541233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.541275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.541322] Call Trace:
[   20.541380]  <TASK>
[   20.541427]  dump_stack_lvl+0x73/0xb0
[   20.541508]  print_report+0xd1/0x650
[   20.541565]  ? __virt_addr_valid+0x1db/0x2d0
[   20.541624]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.541694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.541756]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.541809]  kasan_report+0x141/0x180
[   20.541862]  ? kasan_atomics_helper+0xfa9/0x5450
[   20.541932]  kasan_check_range+0x10c/0x1c0
[   20.542000]  __kasan_check_write+0x18/0x20
[   20.542051]  kasan_atomics_helper+0xfa9/0x5450
[   20.542105]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.542161]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.542215]  ? trace_hardirqs_on+0x37/0xe0
[   20.542269]  ? kasan_atomics+0x152/0x310
[   20.542326]  kasan_atomics+0x1dc/0x310
[   20.542367]  ? __pfx_kasan_atomics+0x10/0x10
[   20.542406]  ? __pfx_kasan_atomics+0x10/0x10
[   20.542462]  kunit_try_run_case+0x1a5/0x480
[   20.542515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.542575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.542652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.542701]  ? __kthread_parkme+0x82/0x180
[   20.542765]  ? preempt_count_sub+0x50/0x80
[   20.542832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.542905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.542958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.543006]  kthread+0x337/0x6f0
[   20.543035]  ? trace_preempt_on+0x20/0xc0
[   20.543062]  ? __pfx_kthread+0x10/0x10
[   20.543084]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.543116]  ? calculate_sigpending+0x7b/0xa0
[   20.543181]  ? __pfx_kthread+0x10/0x10
[   20.543205]  ret_from_fork+0x41/0x80
[   20.543234]  ? __pfx_kthread+0x10/0x10
[   20.543256]  ret_from_fork_asm+0x1a/0x30
[   20.543292]  </TASK>
[   20.543310] 
[   20.554043] Allocated by task 286:
[   20.554456]  kasan_save_stack+0x45/0x70
[   20.554912]  kasan_save_track+0x18/0x40
[   20.555299]  kasan_save_alloc_info+0x3b/0x50
[   20.555546]  __kasan_kmalloc+0xb7/0xc0
[   20.555948]  __kmalloc_cache_noprof+0x189/0x420
[   20.556374]  kasan_atomics+0x95/0x310
[   20.556648]  kunit_try_run_case+0x1a5/0x480
[   20.556888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.557141]  kthread+0x337/0x6f0
[   20.557362]  ret_from_fork+0x41/0x80
[   20.557543]  ret_from_fork_asm+0x1a/0x30
[   20.557949] 
[   20.558173] The buggy address belongs to the object at ffff888101e04b00
[   20.558173]  which belongs to the cache kmalloc-64 of size 64
[   20.558699] The buggy address is located 0 bytes to the right of
[   20.558699]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.560040] 
[   20.560245] The buggy address belongs to the physical page:
[   20.560778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.561243] flags: 0x200000000000000(node=0|zone=2)
[   20.561589] page_type: f5(slab)
[   20.561812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.562115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.562738] page dumped because: kasan: bad access detected
[   20.563397] 
[   20.563592] Memory state around the buggy address:
[   20.564029]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.564385]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.564682] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.565304]                                      ^
[   20.565713]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.567098]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.568886] ==================================================================
[   20.862879] ==================================================================
[   20.863372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   20.864073] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.865068] 
[   20.865336] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.865456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.865489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.865535] Call Trace:
[   20.865577]  <TASK>
[   20.865621]  dump_stack_lvl+0x73/0xb0
[   20.865701]  print_report+0xd1/0x650
[   20.865769]  ? __virt_addr_valid+0x1db/0x2d0
[   20.865824]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.865871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.865917]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.865967]  kasan_report+0x141/0x180
[   20.866020]  ? kasan_atomics_helper+0x13b5/0x5450
[   20.866084]  kasan_check_range+0x10c/0x1c0
[   20.866167]  __kasan_check_read+0x15/0x20
[   20.866209]  kasan_atomics_helper+0x13b5/0x5450
[   20.866264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.866320]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.866367]  ? trace_hardirqs_on+0x37/0xe0
[   20.866412]  ? kasan_atomics+0x152/0x310
[   20.866466]  kasan_atomics+0x1dc/0x310
[   20.866510]  ? __pfx_kasan_atomics+0x10/0x10
[   20.866549]  ? __pfx_kasan_atomics+0x10/0x10
[   20.866599]  kunit_try_run_case+0x1a5/0x480
[   20.866654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.866703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.866765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.866813]  ? __kthread_parkme+0x82/0x180
[   20.866864]  ? preempt_count_sub+0x50/0x80
[   20.866922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.866980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.867033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.867069]  kthread+0x337/0x6f0
[   20.867090]  ? trace_preempt_on+0x20/0xc0
[   20.867174]  ? __pfx_kthread+0x10/0x10
[   20.867202]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.867228]  ? calculate_sigpending+0x7b/0xa0
[   20.867254]  ? __pfx_kthread+0x10/0x10
[   20.867277]  ret_from_fork+0x41/0x80
[   20.867304]  ? __pfx_kthread+0x10/0x10
[   20.867326]  ret_from_fork_asm+0x1a/0x30
[   20.867364]  </TASK>
[   20.867381] 
[   20.881304] Allocated by task 286:
[   20.881713]  kasan_save_stack+0x45/0x70
[   20.882085]  kasan_save_track+0x18/0x40
[   20.882330]  kasan_save_alloc_info+0x3b/0x50
[   20.882730]  __kasan_kmalloc+0xb7/0xc0
[   20.883094]  __kmalloc_cache_noprof+0x189/0x420
[   20.883403]  kasan_atomics+0x95/0x310
[   20.883630]  kunit_try_run_case+0x1a5/0x480
[   20.884034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.884549]  kthread+0x337/0x6f0
[   20.884834]  ret_from_fork+0x41/0x80
[   20.885125]  ret_from_fork_asm+0x1a/0x30
[   20.885568] 
[   20.885714] The buggy address belongs to the object at ffff888101e04b00
[   20.885714]  which belongs to the cache kmalloc-64 of size 64
[   20.886520] The buggy address is located 0 bytes to the right of
[   20.886520]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.887511] 
[   20.887725] The buggy address belongs to the physical page:
[   20.888007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.888668] flags: 0x200000000000000(node=0|zone=2)
[   20.888951] page_type: f5(slab)
[   20.889322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.889696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.890065] page dumped because: kasan: bad access detected
[   20.890575] 
[   20.890798] Memory state around the buggy address:
[   20.891259]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.891728]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.892308] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.892789]                                      ^
[   20.893036]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893696]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.894328] ==================================================================
[   21.100646] ==================================================================
[   21.101470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   21.102222] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.102847] 
[   21.103033] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.103185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.103221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.103271] Call Trace:
[   21.103322]  <TASK>
[   21.103366]  dump_stack_lvl+0x73/0xb0
[   21.103442]  print_report+0xd1/0x650
[   21.103500]  ? __virt_addr_valid+0x1db/0x2d0
[   21.103552]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.103609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.103684]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.103740]  kasan_report+0x141/0x180
[   21.103808]  ? kasan_atomics_helper+0x16e7/0x5450
[   21.103877]  kasan_check_range+0x10c/0x1c0
[   21.103932]  __kasan_check_write+0x18/0x20
[   21.103982]  kasan_atomics_helper+0x16e7/0x5450
[   21.104035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.104080]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.104162]  ? trace_hardirqs_on+0x37/0xe0
[   21.104218]  ? kasan_atomics+0x152/0x310
[   21.104284]  kasan_atomics+0x1dc/0x310
[   21.104349]  ? __pfx_kasan_atomics+0x10/0x10
[   21.104404]  ? __pfx_kasan_atomics+0x10/0x10
[   21.104476]  kunit_try_run_case+0x1a5/0x480
[   21.104539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.104592]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.104641]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.104693]  ? __kthread_parkme+0x82/0x180
[   21.104760]  ? preempt_count_sub+0x50/0x80
[   21.104835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.104890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.104943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.105003]  kthread+0x337/0x6f0
[   21.105049]  ? trace_preempt_on+0x20/0xc0
[   21.105144]  ? __pfx_kthread+0x10/0x10
[   21.105188]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.105238]  ? calculate_sigpending+0x7b/0xa0
[   21.105289]  ? __pfx_kthread+0x10/0x10
[   21.105337]  ret_from_fork+0x41/0x80
[   21.105389]  ? __pfx_kthread+0x10/0x10
[   21.105429]  ret_from_fork_asm+0x1a/0x30
[   21.105529]  </TASK>
[   21.105567] 
[   21.116128] Allocated by task 286:
[   21.116555]  kasan_save_stack+0x45/0x70
[   21.117020]  kasan_save_track+0x18/0x40
[   21.117410]  kasan_save_alloc_info+0x3b/0x50
[   21.117850]  __kasan_kmalloc+0xb7/0xc0
[   21.118259]  __kmalloc_cache_noprof+0x189/0x420
[   21.118587]  kasan_atomics+0x95/0x310
[   21.118916]  kunit_try_run_case+0x1a5/0x480
[   21.119173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.119632]  kthread+0x337/0x6f0
[   21.119957]  ret_from_fork+0x41/0x80
[   21.120336]  ret_from_fork_asm+0x1a/0x30
[   21.120611] 
[   21.120817] The buggy address belongs to the object at ffff888101e04b00
[   21.120817]  which belongs to the cache kmalloc-64 of size 64
[   21.121605] The buggy address is located 0 bytes to the right of
[   21.121605]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.122333] 
[   21.122561] The buggy address belongs to the physical page:
[   21.122910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.123370] flags: 0x200000000000000(node=0|zone=2)
[   21.123619] page_type: f5(slab)
[   21.123860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.124529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.125149] page dumped because: kasan: bad access detected
[   21.125558] 
[   21.125716] Memory state around the buggy address:
[   21.126184]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.126637]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.127026] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.127346]                                      ^
[   21.127577]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128015]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128607] ==================================================================
[   21.464142] ==================================================================
[   21.464799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   21.465415] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.466587] 
[   21.466778] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.466866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.466894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.466942] Call Trace:
[   21.467013]  <TASK>
[   21.467070]  dump_stack_lvl+0x73/0xb0
[   21.467173]  print_report+0xd1/0x650
[   21.467220]  ? __virt_addr_valid+0x1db/0x2d0
[   21.467269]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.467310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.467338]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.467364]  kasan_report+0x141/0x180
[   21.467392]  ? kasan_atomics_helper+0x1e12/0x5450
[   21.467422]  kasan_check_range+0x10c/0x1c0
[   21.467446]  __kasan_check_write+0x18/0x20
[   21.467469]  kasan_atomics_helper+0x1e12/0x5450
[   21.467495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.467522]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.467547]  ? trace_hardirqs_on+0x37/0xe0
[   21.467573]  ? kasan_atomics+0x152/0x310
[   21.467600]  kasan_atomics+0x1dc/0x310
[   21.467634]  ? __pfx_kasan_atomics+0x10/0x10
[   21.467667]  ? __pfx_kasan_atomics+0x10/0x10
[   21.467694]  kunit_try_run_case+0x1a5/0x480
[   21.467725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.467773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.467806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.467833]  ? __kthread_parkme+0x82/0x180
[   21.467859]  ? preempt_count_sub+0x50/0x80
[   21.467889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.467916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.467942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.467968]  kthread+0x337/0x6f0
[   21.467988]  ? trace_preempt_on+0x20/0xc0
[   21.468014]  ? __pfx_kthread+0x10/0x10
[   21.468035]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.468059]  ? calculate_sigpending+0x7b/0xa0
[   21.468084]  ? __pfx_kthread+0x10/0x10
[   21.468114]  ret_from_fork+0x41/0x80
[   21.468150]  ? __pfx_kthread+0x10/0x10
[   21.468173]  ret_from_fork_asm+0x1a/0x30
[   21.468210]  </TASK>
[   21.468227] 
[   21.482824] Allocated by task 286:
[   21.483500]  kasan_save_stack+0x45/0x70
[   21.484000]  kasan_save_track+0x18/0x40
[   21.484344]  kasan_save_alloc_info+0x3b/0x50
[   21.484676]  __kasan_kmalloc+0xb7/0xc0
[   21.485032]  __kmalloc_cache_noprof+0x189/0x420
[   21.485464]  kasan_atomics+0x95/0x310
[   21.485790]  kunit_try_run_case+0x1a5/0x480
[   21.486198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.486477]  kthread+0x337/0x6f0
[   21.486896]  ret_from_fork+0x41/0x80
[   21.487504]  ret_from_fork_asm+0x1a/0x30
[   21.487825] 
[   21.488559] The buggy address belongs to the object at ffff888101e04b00
[   21.488559]  which belongs to the cache kmalloc-64 of size 64
[   21.489078] The buggy address is located 0 bytes to the right of
[   21.489078]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.490300] 
[   21.490438] The buggy address belongs to the physical page:
[   21.490636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.491002] flags: 0x200000000000000(node=0|zone=2)
[   21.491996] page_type: f5(slab)
[   21.492203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.492786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.493630] page dumped because: kasan: bad access detected
[   21.493909] 
[   21.494025] Memory state around the buggy address:
[   21.494846]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.495394]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.495885] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.496462]                                      ^
[   21.497014]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.497525]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.498061] ==================================================================
[   21.730672] ==================================================================
[   21.731239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   21.731805] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.732131] 
[   21.732391] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.732534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.732569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.732620] Call Trace:
[   21.732665]  <TASK>
[   21.732707]  dump_stack_lvl+0x73/0xb0
[   21.732792]  print_report+0xd1/0x650
[   21.732853]  ? __virt_addr_valid+0x1db/0x2d0
[   21.732923]  ? kasan_atomics_helper+0x218a/0x5450
[   21.732978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.733030]  ? kasan_atomics_helper+0x218a/0x5450
[   21.733082]  kasan_report+0x141/0x180
[   21.733180]  ? kasan_atomics_helper+0x218a/0x5450
[   21.733258]  kasan_check_range+0x10c/0x1c0
[   21.733310]  __kasan_check_write+0x18/0x20
[   21.733366]  kasan_atomics_helper+0x218a/0x5450
[   21.733436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.733492]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.733535]  ? trace_hardirqs_on+0x37/0xe0
[   21.733566]  ? kasan_atomics+0x152/0x310
[   21.733594]  kasan_atomics+0x1dc/0x310
[   21.733617]  ? __pfx_kasan_atomics+0x10/0x10
[   21.733641]  ? __pfx_kasan_atomics+0x10/0x10
[   21.733682]  kunit_try_run_case+0x1a5/0x480
[   21.733728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.733786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.733840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.733902]  ? __kthread_parkme+0x82/0x180
[   21.733973]  ? preempt_count_sub+0x50/0x80
[   21.734029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.734084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.734168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.734228]  kthread+0x337/0x6f0
[   21.734284]  ? trace_preempt_on+0x20/0xc0
[   21.734339]  ? __pfx_kthread+0x10/0x10
[   21.734369]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.734395]  ? calculate_sigpending+0x7b/0xa0
[   21.734420]  ? __pfx_kthread+0x10/0x10
[   21.734443]  ret_from_fork+0x41/0x80
[   21.734471]  ? __pfx_kthread+0x10/0x10
[   21.734492]  ret_from_fork_asm+0x1a/0x30
[   21.734530]  </TASK>
[   21.734547] 
[   21.745569] Allocated by task 286:
[   21.745972]  kasan_save_stack+0x45/0x70
[   21.746421]  kasan_save_track+0x18/0x40
[   21.746765]  kasan_save_alloc_info+0x3b/0x50
[   21.747148]  __kasan_kmalloc+0xb7/0xc0
[   21.747526]  __kmalloc_cache_noprof+0x189/0x420
[   21.747900]  kasan_atomics+0x95/0x310
[   21.748294]  kunit_try_run_case+0x1a5/0x480
[   21.748583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.748977]  kthread+0x337/0x6f0
[   21.749305]  ret_from_fork+0x41/0x80
[   21.749665]  ret_from_fork_asm+0x1a/0x30
[   21.749910] 
[   21.750160] The buggy address belongs to the object at ffff888101e04b00
[   21.750160]  which belongs to the cache kmalloc-64 of size 64
[   21.750735] The buggy address is located 0 bytes to the right of
[   21.750735]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.751234] 
[   21.751371] The buggy address belongs to the physical page:
[   21.751606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.752224] flags: 0x200000000000000(node=0|zone=2)
[   21.752678] page_type: f5(slab)
[   21.753021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.753659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.754272] page dumped because: kasan: bad access detected
[   21.754712] 
[   21.754918] Memory state around the buggy address:
[   21.755181]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.755468]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.756056] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.756665]                                      ^
[   21.757141]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.757592]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.758034] ==================================================================
[   21.318068] ==================================================================
[   21.318754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   21.319354] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.319838] 
[   21.320067] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.320201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.320231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.320272] Call Trace:
[   21.320312]  <TASK>
[   21.320352]  dump_stack_lvl+0x73/0xb0
[   21.320428]  print_report+0xd1/0x650
[   21.320477]  ? __virt_addr_valid+0x1db/0x2d0
[   21.320527]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.320608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.320649]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.320687]  kasan_report+0x141/0x180
[   21.320728]  ? kasan_atomics_helper+0x1b22/0x5450
[   21.320788]  kasan_check_range+0x10c/0x1c0
[   21.320821]  __kasan_check_write+0x18/0x20
[   21.320855]  kasan_atomics_helper+0x1b22/0x5450
[   21.320893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.320927]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.320961]  ? trace_hardirqs_on+0x37/0xe0
[   21.320996]  ? kasan_atomics+0x152/0x310
[   21.321035]  kasan_atomics+0x1dc/0x310
[   21.321067]  ? __pfx_kasan_atomics+0x10/0x10
[   21.321100]  ? __pfx_kasan_atomics+0x10/0x10
[   21.321172]  kunit_try_run_case+0x1a5/0x480
[   21.321243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.321291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.321347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.321400]  ? __kthread_parkme+0x82/0x180
[   21.321444]  ? preempt_count_sub+0x50/0x80
[   21.321493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.321542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.321590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.321635]  kthread+0x337/0x6f0
[   21.321669]  ? trace_preempt_on+0x20/0xc0
[   21.321710]  ? __pfx_kthread+0x10/0x10
[   21.321763]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.321809]  ? calculate_sigpending+0x7b/0xa0
[   21.321860]  ? __pfx_kthread+0x10/0x10
[   21.321904]  ret_from_fork+0x41/0x80
[   21.321956]  ? __pfx_kthread+0x10/0x10
[   21.322000]  ret_from_fork_asm+0x1a/0x30
[   21.322066]  </TASK>
[   21.322096] 
[   21.333280] Allocated by task 286:
[   21.333563]  kasan_save_stack+0x45/0x70
[   21.333908]  kasan_save_track+0x18/0x40
[   21.334292]  kasan_save_alloc_info+0x3b/0x50
[   21.334680]  __kasan_kmalloc+0xb7/0xc0
[   21.335047]  __kmalloc_cache_noprof+0x189/0x420
[   21.335460]  kasan_atomics+0x95/0x310
[   21.335792]  kunit_try_run_case+0x1a5/0x480
[   21.336126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.336535]  kthread+0x337/0x6f0
[   21.336795]  ret_from_fork+0x41/0x80
[   21.337171]  ret_from_fork_asm+0x1a/0x30
[   21.337437] 
[   21.337619] The buggy address belongs to the object at ffff888101e04b00
[   21.337619]  which belongs to the cache kmalloc-64 of size 64
[   21.338342] The buggy address is located 0 bytes to the right of
[   21.338342]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.338846] 
[   21.339040] The buggy address belongs to the physical page:
[   21.339513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.340164] flags: 0x200000000000000(node=0|zone=2)
[   21.340492] page_type: f5(slab)
[   21.340812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.341290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.341690] page dumped because: kasan: bad access detected
[   21.342072] 
[   21.342252] Memory state around the buggy address:
[   21.342555]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.342973]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.343436] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.343737]                                      ^
[   21.344173]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.344754]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.345162] ==================================================================
[   19.717724] ==================================================================
[   19.718729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   19.719112] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.719553] 
[   19.719821] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.719934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.719965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.720013] Call Trace:
[   19.720045]  <TASK>
[   19.720090]  dump_stack_lvl+0x73/0xb0
[   19.720160]  print_report+0xd1/0x650
[   19.720207]  ? __virt_addr_valid+0x1db/0x2d0
[   19.720261]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.720304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.720345]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.720387]  kasan_report+0x141/0x180
[   19.720427]  ? kasan_atomics_helper+0x4bbc/0x5450
[   19.720480]  __asan_report_load4_noabort+0x18/0x20
[   19.720526]  kasan_atomics_helper+0x4bbc/0x5450
[   19.720573]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.720619]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.720663]  ? trace_hardirqs_on+0x37/0xe0
[   19.720715]  ? kasan_atomics+0x152/0x310
[   19.720784]  kasan_atomics+0x1dc/0x310
[   19.720832]  ? __pfx_kasan_atomics+0x10/0x10
[   19.720880]  ? __pfx_kasan_atomics+0x10/0x10
[   19.720928]  kunit_try_run_case+0x1a5/0x480
[   19.720983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.721028]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.721075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.721118]  ? __kthread_parkme+0x82/0x180
[   19.721174]  ? preempt_count_sub+0x50/0x80
[   19.721222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.721271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.721323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.721361]  kthread+0x337/0x6f0
[   19.721383]  ? trace_preempt_on+0x20/0xc0
[   19.721408]  ? __pfx_kthread+0x10/0x10
[   19.721429]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.721452]  ? calculate_sigpending+0x7b/0xa0
[   19.721478]  ? __pfx_kthread+0x10/0x10
[   19.721499]  ret_from_fork+0x41/0x80
[   19.721525]  ? __pfx_kthread+0x10/0x10
[   19.721545]  ret_from_fork_asm+0x1a/0x30
[   19.721581]  </TASK>
[   19.721598] 
[   19.736519] Allocated by task 286:
[   19.736940]  kasan_save_stack+0x45/0x70
[   19.737351]  kasan_save_track+0x18/0x40
[   19.737819]  kasan_save_alloc_info+0x3b/0x50
[   19.738265]  __kasan_kmalloc+0xb7/0xc0
[   19.738857]  __kmalloc_cache_noprof+0x189/0x420
[   19.739440]  kasan_atomics+0x95/0x310
[   19.740030]  kunit_try_run_case+0x1a5/0x480
[   19.740600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.741097]  kthread+0x337/0x6f0
[   19.741622]  ret_from_fork+0x41/0x80
[   19.741922]  ret_from_fork_asm+0x1a/0x30
[   19.742430] 
[   19.742802] The buggy address belongs to the object at ffff888101e04b00
[   19.742802]  which belongs to the cache kmalloc-64 of size 64
[   19.743691] The buggy address is located 0 bytes to the right of
[   19.743691]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.744349] 
[   19.744501] The buggy address belongs to the physical page:
[   19.744718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.745432] flags: 0x200000000000000(node=0|zone=2)
[   19.745705] page_type: f5(slab)
[   19.746079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.746739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.747254] page dumped because: kasan: bad access detected
[   19.747611] 
[   19.747828] Memory state around the buggy address:
[   19.748231]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.748728]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.749285] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.749801]                                      ^
[   19.750183]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750689]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.751066] ==================================================================
[   19.975509] ==================================================================
[   19.975972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   19.976613] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.977099] 
[   19.977280] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.977440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.977492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.977571] Call Trace:
[   19.977634]  <TASK>
[   19.977684]  dump_stack_lvl+0x73/0xb0
[   19.977777]  print_report+0xd1/0x650
[   19.977834]  ? __virt_addr_valid+0x1db/0x2d0
[   19.977890]  ? kasan_atomics_helper+0x565/0x5450
[   19.977939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.978039]  ? kasan_atomics_helper+0x565/0x5450
[   19.978098]  kasan_report+0x141/0x180
[   19.978146]  ? kasan_atomics_helper+0x565/0x5450
[   19.978199]  kasan_check_range+0x10c/0x1c0
[   19.978229]  __kasan_check_write+0x18/0x20
[   19.978253]  kasan_atomics_helper+0x565/0x5450
[   19.978279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.978305]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.978331]  ? trace_hardirqs_on+0x37/0xe0
[   19.978358]  ? kasan_atomics+0x152/0x310
[   19.978384]  kasan_atomics+0x1dc/0x310
[   19.978407]  ? __pfx_kasan_atomics+0x10/0x10
[   19.978430]  ? __pfx_kasan_atomics+0x10/0x10
[   19.978458]  kunit_try_run_case+0x1a5/0x480
[   19.978488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.978513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.978541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.978567]  ? __kthread_parkme+0x82/0x180
[   19.978591]  ? preempt_count_sub+0x50/0x80
[   19.978620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.978647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.978673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.978701]  kthread+0x337/0x6f0
[   19.978721]  ? trace_preempt_on+0x20/0xc0
[   19.978765]  ? __pfx_kthread+0x10/0x10
[   19.978795]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.978820]  ? calculate_sigpending+0x7b/0xa0
[   19.978846]  ? __pfx_kthread+0x10/0x10
[   19.978868]  ret_from_fork+0x41/0x80
[   19.978896]  ? __pfx_kthread+0x10/0x10
[   19.978917]  ret_from_fork_asm+0x1a/0x30
[   19.978954]  </TASK>
[   19.978971] 
[   19.991868] Allocated by task 286:
[   19.992415]  kasan_save_stack+0x45/0x70
[   19.992693]  kasan_save_track+0x18/0x40
[   19.994395]  kasan_save_alloc_info+0x3b/0x50
[   19.995059]  __kasan_kmalloc+0xb7/0xc0
[   19.995268]  __kmalloc_cache_noprof+0x189/0x420
[   19.995682]  kasan_atomics+0x95/0x310
[   19.995945]  kunit_try_run_case+0x1a5/0x480
[   19.996309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.996593]  kthread+0x337/0x6f0
[   19.996996]  ret_from_fork+0x41/0x80
[   19.997243]  ret_from_fork_asm+0x1a/0x30
[   19.997666] 
[   19.997873] The buggy address belongs to the object at ffff888101e04b00
[   19.997873]  which belongs to the cache kmalloc-64 of size 64
[   19.998451] The buggy address is located 0 bytes to the right of
[   19.998451]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.999558] 
[   19.999719] The buggy address belongs to the physical page:
[   19.999971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.000706] flags: 0x200000000000000(node=0|zone=2)
[   20.001219] page_type: f5(slab)
[   20.001610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.002173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.002781] page dumped because: kasan: bad access detected
[   20.003034] 
[   20.003187] Memory state around the buggy address:
[   20.003589]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.004259]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.004585] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.005164]                                      ^
[   20.005598]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.006161]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.006648] ==================================================================
[   20.929656] ==================================================================
[   20.930320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   20.930917] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.931552] 
[   20.931882] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.932001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.932036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.932091] Call Trace:
[   20.932152]  <TASK>
[   20.932199]  dump_stack_lvl+0x73/0xb0
[   20.932337]  print_report+0xd1/0x650
[   20.932441]  ? __virt_addr_valid+0x1db/0x2d0
[   20.932537]  ? kasan_atomics_helper+0x1467/0x5450
[   20.932589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.932658]  ? kasan_atomics_helper+0x1467/0x5450
[   20.932714]  kasan_report+0x141/0x180
[   20.932782]  ? kasan_atomics_helper+0x1467/0x5450
[   20.932852]  kasan_check_range+0x10c/0x1c0
[   20.932901]  __kasan_check_write+0x18/0x20
[   20.932931]  kasan_atomics_helper+0x1467/0x5450
[   20.932960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.932987]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.933013]  ? trace_hardirqs_on+0x37/0xe0
[   20.933045]  ? kasan_atomics+0x152/0x310
[   20.933089]  kasan_atomics+0x1dc/0x310
[   20.933168]  ? __pfx_kasan_atomics+0x10/0x10
[   20.933214]  ? __pfx_kasan_atomics+0x10/0x10
[   20.933272]  kunit_try_run_case+0x1a5/0x480
[   20.933331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.933373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.933435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.933501]  ? __kthread_parkme+0x82/0x180
[   20.933555]  ? preempt_count_sub+0x50/0x80
[   20.933619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.933665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.933695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.933720]  kthread+0x337/0x6f0
[   20.933742]  ? trace_preempt_on+0x20/0xc0
[   20.933796]  ? __pfx_kthread+0x10/0x10
[   20.933819]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.933844]  ? calculate_sigpending+0x7b/0xa0
[   20.933871]  ? __pfx_kthread+0x10/0x10
[   20.933894]  ret_from_fork+0x41/0x80
[   20.933921]  ? __pfx_kthread+0x10/0x10
[   20.933943]  ret_from_fork_asm+0x1a/0x30
[   20.933980]  </TASK>
[   20.933996] 
[   20.948307] Allocated by task 286:
[   20.948642]  kasan_save_stack+0x45/0x70
[   20.948970]  kasan_save_track+0x18/0x40
[   20.949784]  kasan_save_alloc_info+0x3b/0x50
[   20.950110]  __kasan_kmalloc+0xb7/0xc0
[   20.950386]  __kmalloc_cache_noprof+0x189/0x420
[   20.950918]  kasan_atomics+0x95/0x310
[   20.951465]  kunit_try_run_case+0x1a5/0x480
[   20.951821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.952437]  kthread+0x337/0x6f0
[   20.952792]  ret_from_fork+0x41/0x80
[   20.953096]  ret_from_fork_asm+0x1a/0x30
[   20.953372] 
[   20.953537] The buggy address belongs to the object at ffff888101e04b00
[   20.953537]  which belongs to the cache kmalloc-64 of size 64
[   20.954781] The buggy address is located 0 bytes to the right of
[   20.954781]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.956027] 
[   20.956299] The buggy address belongs to the physical page:
[   20.956523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.957488] flags: 0x200000000000000(node=0|zone=2)
[   20.957795] page_type: f5(slab)
[   20.958011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.958857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.959578] page dumped because: kasan: bad access detected
[   20.959923] 
[   20.960122] Memory state around the buggy address:
[   20.960509]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961470]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961935] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962767]                                      ^
[   20.963139]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963665]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.964399] ==================================================================
[   20.965817] ==================================================================
[   20.966140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   20.966426] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.966628] 
[   20.966722] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.966807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.966825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.966853] Call Trace:
[   20.966879]  <TASK>
[   20.966906]  dump_stack_lvl+0x73/0xb0
[   20.966942]  print_report+0xd1/0x650
[   20.966968]  ? __virt_addr_valid+0x1db/0x2d0
[   20.966996]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.967021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.967047]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.967072]  kasan_report+0x141/0x180
[   20.967097]  ? kasan_atomics_helper+0x50d4/0x5450
[   20.967126]  __asan_report_store8_noabort+0x1b/0x30
[   20.967150]  kasan_atomics_helper+0x50d4/0x5450
[   20.967177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.967203]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.967229]  ? trace_hardirqs_on+0x37/0xe0
[   20.967255]  ? kasan_atomics+0x152/0x310
[   20.967282]  kasan_atomics+0x1dc/0x310
[   20.967304]  ? __pfx_kasan_atomics+0x10/0x10
[   20.967328]  ? __pfx_kasan_atomics+0x10/0x10
[   20.967354]  kunit_try_run_case+0x1a5/0x480
[   20.967384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.967409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.967438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.967463]  ? __kthread_parkme+0x82/0x180
[   20.967488]  ? preempt_count_sub+0x50/0x80
[   20.967517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.967545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.967570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.967598]  kthread+0x337/0x6f0
[   20.967618]  ? trace_preempt_on+0x20/0xc0
[   20.967665]  ? __pfx_kthread+0x10/0x10
[   20.967688]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.967711]  ? calculate_sigpending+0x7b/0xa0
[   20.967737]  ? __pfx_kthread+0x10/0x10
[   20.967851]  ret_from_fork+0x41/0x80
[   20.967897]  ? __pfx_kthread+0x10/0x10
[   20.967938]  ret_from_fork_asm+0x1a/0x30
[   20.968008]  </TASK>
[   20.968036] 
[   20.983289] Allocated by task 286:
[   20.983607]  kasan_save_stack+0x45/0x70
[   20.984066]  kasan_save_track+0x18/0x40
[   20.984573]  kasan_save_alloc_info+0x3b/0x50
[   20.984887]  __kasan_kmalloc+0xb7/0xc0
[   20.985355]  __kmalloc_cache_noprof+0x189/0x420
[   20.986058]  kasan_atomics+0x95/0x310
[   20.986309]  kunit_try_run_case+0x1a5/0x480
[   20.986638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.987088]  kthread+0x337/0x6f0
[   20.987382]  ret_from_fork+0x41/0x80
[   20.987740]  ret_from_fork_asm+0x1a/0x30
[   20.987985] 
[   20.988290] The buggy address belongs to the object at ffff888101e04b00
[   20.988290]  which belongs to the cache kmalloc-64 of size 64
[   20.989401] The buggy address is located 0 bytes to the right of
[   20.989401]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.990135] 
[   20.990610] The buggy address belongs to the physical page:
[   20.991165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.991926] flags: 0x200000000000000(node=0|zone=2)
[   20.992393] page_type: f5(slab)
[   20.992679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.993166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.993358] page dumped because: kasan: bad access detected
[   20.993493] 
[   20.993559] Memory state around the buggy address:
[   20.993686]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.994285]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.994975] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.995683]                                      ^
[   20.996189]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.996502]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.997103] ==================================================================
[   20.343494] ==================================================================
[   20.344420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   20.345112] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.345690] 
[   20.345917] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.346028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.346062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.346106] Call Trace:
[   20.346149]  <TASK>
[   20.346193]  dump_stack_lvl+0x73/0xb0
[   20.346264]  print_report+0xd1/0x650
[   20.346318]  ? __virt_addr_valid+0x1db/0x2d0
[   20.346373]  ? kasan_atomics_helper+0xc70/0x5450
[   20.346420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.346500]  ? kasan_atomics_helper+0xc70/0x5450
[   20.346550]  kasan_report+0x141/0x180
[   20.346602]  ? kasan_atomics_helper+0xc70/0x5450
[   20.346659]  kasan_check_range+0x10c/0x1c0
[   20.346703]  __kasan_check_write+0x18/0x20
[   20.346762]  kasan_atomics_helper+0xc70/0x5450
[   20.346813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.346866]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.346917]  ? trace_hardirqs_on+0x37/0xe0
[   20.346963]  ? kasan_atomics+0x152/0x310
[   20.347008]  kasan_atomics+0x1dc/0x310
[   20.347054]  ? __pfx_kasan_atomics+0x10/0x10
[   20.347097]  ? __pfx_kasan_atomics+0x10/0x10
[   20.347146]  kunit_try_run_case+0x1a5/0x480
[   20.347206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.347259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.347304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.347332]  ? __kthread_parkme+0x82/0x180
[   20.347359]  ? preempt_count_sub+0x50/0x80
[   20.347390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.347416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.347442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.347468]  kthread+0x337/0x6f0
[   20.347488]  ? trace_preempt_on+0x20/0xc0
[   20.347515]  ? __pfx_kthread+0x10/0x10
[   20.347537]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.347562]  ? calculate_sigpending+0x7b/0xa0
[   20.347588]  ? __pfx_kthread+0x10/0x10
[   20.347610]  ret_from_fork+0x41/0x80
[   20.347651]  ? __pfx_kthread+0x10/0x10
[   20.347675]  ret_from_fork_asm+0x1a/0x30
[   20.347713]  </TASK>
[   20.347731] 
[   20.361115] Allocated by task 286:
[   20.361358]  kasan_save_stack+0x45/0x70
[   20.361557]  kasan_save_track+0x18/0x40
[   20.361721]  kasan_save_alloc_info+0x3b/0x50
[   20.361905]  __kasan_kmalloc+0xb7/0xc0
[   20.362213]  __kmalloc_cache_noprof+0x189/0x420
[   20.362762]  kasan_atomics+0x95/0x310
[   20.363697]  kunit_try_run_case+0x1a5/0x480
[   20.363936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.364434]  kthread+0x337/0x6f0
[   20.365327]  ret_from_fork+0x41/0x80
[   20.365622]  ret_from_fork_asm+0x1a/0x30
[   20.365847] 
[   20.366059] The buggy address belongs to the object at ffff888101e04b00
[   20.366059]  which belongs to the cache kmalloc-64 of size 64
[   20.366810] The buggy address is located 0 bytes to the right of
[   20.366810]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.367542] 
[   20.367716] The buggy address belongs to the physical page:
[   20.368053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.368425] flags: 0x200000000000000(node=0|zone=2)
[   20.368730] page_type: f5(slab)
[   20.369208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.369902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.370606] page dumped because: kasan: bad access detected
[   20.370879] 
[   20.371079] Memory state around the buggy address:
[   20.371636]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.372327]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.372836] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.373442]                                      ^
[   20.373689]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.374368]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.375001] ==================================================================
[   19.785529] ==================================================================
[   19.786267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   19.786895] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   19.787234] 
[   19.787503] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.787599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.787631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.787669] Call Trace:
[   19.787702]  <TASK>
[   19.787739]  dump_stack_lvl+0x73/0xb0
[   19.787809]  print_report+0xd1/0x650
[   19.787847]  ? __virt_addr_valid+0x1db/0x2d0
[   19.787886]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.787921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.787956]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.787992]  kasan_report+0x141/0x180
[   19.788025]  ? kasan_atomics_helper+0x4b88/0x5450
[   19.788067]  __asan_report_load4_noabort+0x18/0x20
[   19.788132]  kasan_atomics_helper+0x4b88/0x5450
[   19.788194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.788239]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.788281]  ? trace_hardirqs_on+0x37/0xe0
[   19.788322]  ? kasan_atomics+0x152/0x310
[   19.788376]  kasan_atomics+0x1dc/0x310
[   19.788419]  ? __pfx_kasan_atomics+0x10/0x10
[   19.788463]  ? __pfx_kasan_atomics+0x10/0x10
[   19.788517]  kunit_try_run_case+0x1a5/0x480
[   19.788596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.788638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.788683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.788729]  ? __kthread_parkme+0x82/0x180
[   19.788788]  ? preempt_count_sub+0x50/0x80
[   19.789162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.789233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.789332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.789391]  kthread+0x337/0x6f0
[   19.789438]  ? trace_preempt_on+0x20/0xc0
[   19.789494]  ? __pfx_kthread+0x10/0x10
[   19.789530]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.789556]  ? calculate_sigpending+0x7b/0xa0
[   19.789583]  ? __pfx_kthread+0x10/0x10
[   19.789605]  ret_from_fork+0x41/0x80
[   19.789633]  ? __pfx_kthread+0x10/0x10
[   19.789655]  ret_from_fork_asm+0x1a/0x30
[   19.789693]  </TASK>
[   19.789710] 
[   19.799396] Allocated by task 286:
[   19.799612]  kasan_save_stack+0x45/0x70
[   19.800932]  kasan_save_track+0x18/0x40
[   19.801343]  kasan_save_alloc_info+0x3b/0x50
[   19.801726]  __kasan_kmalloc+0xb7/0xc0
[   19.802097]  __kmalloc_cache_noprof+0x189/0x420
[   19.802411]  kasan_atomics+0x95/0x310
[   19.802619]  kunit_try_run_case+0x1a5/0x480
[   19.802959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.803490]  kthread+0x337/0x6f0
[   19.803842]  ret_from_fork+0x41/0x80
[   19.804224]  ret_from_fork_asm+0x1a/0x30
[   19.804474] 
[   19.804614] The buggy address belongs to the object at ffff888101e04b00
[   19.804614]  which belongs to the cache kmalloc-64 of size 64
[   19.805076] The buggy address is located 0 bytes to the right of
[   19.805076]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   19.805653] 
[   19.805855] The buggy address belongs to the physical page:
[   19.806357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   19.807013] flags: 0x200000000000000(node=0|zone=2)
[   19.807473] page_type: f5(slab)
[   19.807820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.808482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.808887] page dumped because: kasan: bad access detected
[   19.809159] 
[   19.809336] Memory state around the buggy address:
[   19.809769]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.810340]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.810867] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.811193]                                      ^
[   19.811429]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811732]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.812321] ==================================================================
[   20.759559] ==================================================================
[   20.761778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   20.763072] Read of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.763531] 
[   20.763725] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.763858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.763890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.763937] Call Trace:
[   20.763983]  <TASK>
[   20.764031]  dump_stack_lvl+0x73/0xb0
[   20.764115]  print_report+0xd1/0x650
[   20.764184]  ? __virt_addr_valid+0x1db/0x2d0
[   20.764237]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.764284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.764333]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.764386]  kasan_report+0x141/0x180
[   20.764444]  ? kasan_atomics_helper+0x49e8/0x5450
[   20.764509]  __asan_report_load4_noabort+0x18/0x20
[   20.764562]  kasan_atomics_helper+0x49e8/0x5450
[   20.764610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.764652]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.764698]  ? trace_hardirqs_on+0x37/0xe0
[   20.764773]  ? kasan_atomics+0x152/0x310
[   20.764827]  kasan_atomics+0x1dc/0x310
[   20.764876]  ? __pfx_kasan_atomics+0x10/0x10
[   20.764919]  ? __pfx_kasan_atomics+0x10/0x10
[   20.764977]  kunit_try_run_case+0x1a5/0x480
[   20.765040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.765090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.765139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.765187]  ? __kthread_parkme+0x82/0x180
[   20.765230]  ? preempt_count_sub+0x50/0x80
[   20.765279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.765329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.765378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.765421]  kthread+0x337/0x6f0
[   20.765455]  ? trace_preempt_on+0x20/0xc0
[   20.765505]  ? __pfx_kthread+0x10/0x10
[   20.765546]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.765597]  ? calculate_sigpending+0x7b/0xa0
[   20.765646]  ? __pfx_kthread+0x10/0x10
[   20.765692]  ret_from_fork+0x41/0x80
[   20.765783]  ? __pfx_kthread+0x10/0x10
[   20.765833]  ret_from_fork_asm+0x1a/0x30
[   20.765908]  </TASK>
[   20.765942] 
[   20.779994] Allocated by task 286:
[   20.780497]  kasan_save_stack+0x45/0x70
[   20.781368]  kasan_save_track+0x18/0x40
[   20.781574]  kasan_save_alloc_info+0x3b/0x50
[   20.781765]  __kasan_kmalloc+0xb7/0xc0
[   20.781984]  __kmalloc_cache_noprof+0x189/0x420
[   20.782915]  kasan_atomics+0x95/0x310
[   20.783173]  kunit_try_run_case+0x1a5/0x480
[   20.783440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.783707]  kthread+0x337/0x6f0
[   20.784015]  ret_from_fork+0x41/0x80
[   20.784235]  ret_from_fork_asm+0x1a/0x30
[   20.784561] 
[   20.784742] The buggy address belongs to the object at ffff888101e04b00
[   20.784742]  which belongs to the cache kmalloc-64 of size 64
[   20.785392] The buggy address is located 0 bytes to the right of
[   20.785392]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.786317] 
[   20.786509] The buggy address belongs to the physical page:
[   20.786859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.787376] flags: 0x200000000000000(node=0|zone=2)
[   20.787816] page_type: f5(slab)
[   20.788019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.788649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.789085] page dumped because: kasan: bad access detected
[   20.789538] 
[   20.789723] Memory state around the buggy address:
[   20.790168]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.790501]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.790944] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.791327]                                      ^
[   20.791709]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792226]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792631] ==================================================================
[   20.474412] ==================================================================
[   20.475010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   20.475422] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.476081] 
[   20.476394] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.476521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.476575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.476627] Call Trace:
[   20.476673]  <TASK>
[   20.476719]  dump_stack_lvl+0x73/0xb0
[   20.476809]  print_report+0xd1/0x650
[   20.476886]  ? __virt_addr_valid+0x1db/0x2d0
[   20.476942]  ? kasan_atomics_helper+0xe78/0x5450
[   20.476994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.477040]  ? kasan_atomics_helper+0xe78/0x5450
[   20.477069]  kasan_report+0x141/0x180
[   20.477096]  ? kasan_atomics_helper+0xe78/0x5450
[   20.477160]  kasan_check_range+0x10c/0x1c0
[   20.477204]  __kasan_check_write+0x18/0x20
[   20.477240]  kasan_atomics_helper+0xe78/0x5450
[   20.477267]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.477293]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.477318]  ? trace_hardirqs_on+0x37/0xe0
[   20.477344]  ? kasan_atomics+0x152/0x310
[   20.477372]  kasan_atomics+0x1dc/0x310
[   20.477394]  ? __pfx_kasan_atomics+0x10/0x10
[   20.477418]  ? __pfx_kasan_atomics+0x10/0x10
[   20.477445]  kunit_try_run_case+0x1a5/0x480
[   20.477474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.477499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.477527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.477553]  ? __kthread_parkme+0x82/0x180
[   20.477579]  ? preempt_count_sub+0x50/0x80
[   20.477607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.477635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.477661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.477687]  kthread+0x337/0x6f0
[   20.477708]  ? trace_preempt_on+0x20/0xc0
[   20.477734]  ? __pfx_kthread+0x10/0x10
[   20.477778]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.477805]  ? calculate_sigpending+0x7b/0xa0
[   20.477830]  ? __pfx_kthread+0x10/0x10
[   20.477852]  ret_from_fork+0x41/0x80
[   20.477880]  ? __pfx_kthread+0x10/0x10
[   20.477902]  ret_from_fork_asm+0x1a/0x30
[   20.477939]  </TASK>
[   20.477957] 
[   20.491914] Allocated by task 286:
[   20.492400]  kasan_save_stack+0x45/0x70
[   20.493413]  kasan_save_track+0x18/0x40
[   20.493863]  kasan_save_alloc_info+0x3b/0x50
[   20.494343]  __kasan_kmalloc+0xb7/0xc0
[   20.494728]  __kmalloc_cache_noprof+0x189/0x420
[   20.495278]  kasan_atomics+0x95/0x310
[   20.495728]  kunit_try_run_case+0x1a5/0x480
[   20.496223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.496738]  kthread+0x337/0x6f0
[   20.497179]  ret_from_fork+0x41/0x80
[   20.497643]  ret_from_fork_asm+0x1a/0x30
[   20.498070] 
[   20.498319] The buggy address belongs to the object at ffff888101e04b00
[   20.498319]  which belongs to the cache kmalloc-64 of size 64
[   20.499433] The buggy address is located 0 bytes to the right of
[   20.499433]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.500210] 
[   20.500449] The buggy address belongs to the physical page:
[   20.500991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.501557] flags: 0x200000000000000(node=0|zone=2)
[   20.501910] page_type: f5(slab)
[   20.502330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.502833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.503276] page dumped because: kasan: bad access detected
[   20.503550] 
[   20.503731] Memory state around the buggy address:
[   20.504228]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.504787]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.505322] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.505765]                                      ^
[   20.506257]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.506682]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.507135] ==================================================================
[   21.036549] ==================================================================
[   21.037219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   21.037756] Write of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.038080] 
[   21.038259] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.038372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.038401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.038449] Call Trace:
[   21.038495]  <TASK>
[   21.038541]  dump_stack_lvl+0x73/0xb0
[   21.038614]  print_report+0xd1/0x650
[   21.038665]  ? __virt_addr_valid+0x1db/0x2d0
[   21.038717]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.038784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.038837]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.038885]  kasan_report+0x141/0x180
[   21.038937]  ? kasan_atomics_helper+0x15b6/0x5450
[   21.038993]  kasan_check_range+0x10c/0x1c0
[   21.039040]  __kasan_check_write+0x18/0x20
[   21.039088]  kasan_atomics_helper+0x15b6/0x5450
[   21.039145]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.039194]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.039240]  ? trace_hardirqs_on+0x37/0xe0
[   21.039290]  ? kasan_atomics+0x152/0x310
[   21.039341]  kasan_atomics+0x1dc/0x310
[   21.039384]  ? __pfx_kasan_atomics+0x10/0x10
[   21.039429]  ? __pfx_kasan_atomics+0x10/0x10
[   21.039487]  kunit_try_run_case+0x1a5/0x480
[   21.039544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.039594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.039662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.039711]  ? __kthread_parkme+0x82/0x180
[   21.039804]  ? preempt_count_sub+0x50/0x80
[   21.039865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.039906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.039935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.039961]  kthread+0x337/0x6f0
[   21.039984]  ? trace_preempt_on+0x20/0xc0
[   21.040011]  ? __pfx_kthread+0x10/0x10
[   21.040033]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.040057]  ? calculate_sigpending+0x7b/0xa0
[   21.040083]  ? __pfx_kthread+0x10/0x10
[   21.040126]  ret_from_fork+0x41/0x80
[   21.040168]  ? __pfx_kthread+0x10/0x10
[   21.040191]  ret_from_fork_asm+0x1a/0x30
[   21.040230]  </TASK>
[   21.040247] 
[   21.053977] Allocated by task 286:
[   21.054357]  kasan_save_stack+0x45/0x70
[   21.054843]  kasan_save_track+0x18/0x40
[   21.055181]  kasan_save_alloc_info+0x3b/0x50
[   21.055587]  __kasan_kmalloc+0xb7/0xc0
[   21.055944]  __kmalloc_cache_noprof+0x189/0x420
[   21.056223]  kasan_atomics+0x95/0x310
[   21.056650]  kunit_try_run_case+0x1a5/0x480
[   21.057079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.057616]  kthread+0x337/0x6f0
[   21.058003]  ret_from_fork+0x41/0x80
[   21.058260]  ret_from_fork_asm+0x1a/0x30
[   21.058687] 
[   21.058913] The buggy address belongs to the object at ffff888101e04b00
[   21.058913]  which belongs to the cache kmalloc-64 of size 64
[   21.059666] The buggy address is located 0 bytes to the right of
[   21.059666]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.060732] 
[   21.060893] The buggy address belongs to the physical page:
[   21.061211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.061854] flags: 0x200000000000000(node=0|zone=2)
[   21.062108] page_type: f5(slab)
[   21.062318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.062610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.063325] page dumped because: kasan: bad access detected
[   21.063888] 
[   21.064085] Memory state around the buggy address:
[   21.064563]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.065169]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.065456] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.066067]                                      ^
[   21.066508]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067091]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067504] ==================================================================
[   21.695437] ==================================================================
[   21.695837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   21.696606] Read of size 8 at addr ffff888101e04b30 by task kunit_try_catch/286
[   21.698615] 
[   21.699075] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   21.699232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.699262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.699309] Call Trace:
[   21.699355]  <TASK>
[   21.699400]  dump_stack_lvl+0x73/0xb0
[   21.699487]  print_report+0xd1/0x650
[   21.699547]  ? __virt_addr_valid+0x1db/0x2d0
[   21.699607]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.699674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.699732]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.699798]  kasan_report+0x141/0x180
[   21.699853]  ? kasan_atomics_helper+0x4fb2/0x5450
[   21.699922]  __asan_report_load8_noabort+0x18/0x20
[   21.699975]  kasan_atomics_helper+0x4fb2/0x5450
[   21.700031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.700080]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.700219]  ? trace_hardirqs_on+0x37/0xe0
[   21.700293]  ? kasan_atomics+0x152/0x310
[   21.700358]  kasan_atomics+0x1dc/0x310
[   21.700410]  ? __pfx_kasan_atomics+0x10/0x10
[   21.700462]  ? __pfx_kasan_atomics+0x10/0x10
[   21.700524]  kunit_try_run_case+0x1a5/0x480
[   21.700581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.700634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.700691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.700758]  ? __kthread_parkme+0x82/0x180
[   21.700816]  ? preempt_count_sub+0x50/0x80
[   21.700879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.700938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.700996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.701050]  kthread+0x337/0x6f0
[   21.701096]  ? trace_preempt_on+0x20/0xc0
[   21.701182]  ? __pfx_kthread+0x10/0x10
[   21.701231]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.701278]  ? calculate_sigpending+0x7b/0xa0
[   21.701324]  ? __pfx_kthread+0x10/0x10
[   21.701372]  ret_from_fork+0x41/0x80
[   21.701425]  ? __pfx_kthread+0x10/0x10
[   21.701473]  ret_from_fork_asm+0x1a/0x30
[   21.701551]  </TASK>
[   21.701587] 
[   21.715974] Allocated by task 286:
[   21.716408]  kasan_save_stack+0x45/0x70
[   21.716650]  kasan_save_track+0x18/0x40
[   21.717369]  kasan_save_alloc_info+0x3b/0x50
[   21.717789]  __kasan_kmalloc+0xb7/0xc0
[   21.717974]  __kmalloc_cache_noprof+0x189/0x420
[   21.718345]  kasan_atomics+0x95/0x310
[   21.718691]  kunit_try_run_case+0x1a5/0x480
[   21.718930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.719419]  kthread+0x337/0x6f0
[   21.719774]  ret_from_fork+0x41/0x80
[   21.719979]  ret_from_fork_asm+0x1a/0x30
[   21.720393] 
[   21.720570] The buggy address belongs to the object at ffff888101e04b00
[   21.720570]  which belongs to the cache kmalloc-64 of size 64
[   21.721394] The buggy address is located 0 bytes to the right of
[   21.721394]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   21.722285] 
[   21.722426] The buggy address belongs to the physical page:
[   21.722902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   21.723427] flags: 0x200000000000000(node=0|zone=2)
[   21.723859] page_type: f5(slab)
[   21.724249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.724659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.725521] page dumped because: kasan: bad access detected
[   21.725815] 
[   21.726032] Memory state around the buggy address:
[   21.726415]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.726892]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727287] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.727741]                                      ^
[   21.728139]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.728640]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.729131] ==================================================================
[   20.441531] ==================================================================
[   20.442082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   20.442657] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.442935] 
[   20.443125] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.443240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.443273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.443325] Call Trace:
[   20.443373]  <TASK>
[   20.443421]  dump_stack_lvl+0x73/0xb0
[   20.443491]  print_report+0xd1/0x650
[   20.443541]  ? __virt_addr_valid+0x1db/0x2d0
[   20.443586]  ? kasan_atomics_helper+0xde0/0x5450
[   20.443639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.443693]  ? kasan_atomics_helper+0xde0/0x5450
[   20.443736]  kasan_report+0x141/0x180
[   20.443802]  ? kasan_atomics_helper+0xde0/0x5450
[   20.443865]  kasan_check_range+0x10c/0x1c0
[   20.443919]  __kasan_check_write+0x18/0x20
[   20.443971]  kasan_atomics_helper+0xde0/0x5450
[   20.444031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.444084]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.444169]  ? trace_hardirqs_on+0x37/0xe0
[   20.444221]  ? kasan_atomics+0x152/0x310
[   20.444272]  kasan_atomics+0x1dc/0x310
[   20.444314]  ? __pfx_kasan_atomics+0x10/0x10
[   20.444359]  ? __pfx_kasan_atomics+0x10/0x10
[   20.444415]  kunit_try_run_case+0x1a5/0x480
[   20.444464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.444498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.444536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.444572]  ? __kthread_parkme+0x82/0x180
[   20.444607]  ? preempt_count_sub+0x50/0x80
[   20.444647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.444684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.444721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.444775]  kthread+0x337/0x6f0
[   20.444807]  ? trace_preempt_on+0x20/0xc0
[   20.444847]  ? __pfx_kthread+0x10/0x10
[   20.444878]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.444912]  ? calculate_sigpending+0x7b/0xa0
[   20.444948]  ? __pfx_kthread+0x10/0x10
[   20.444983]  ret_from_fork+0x41/0x80
[   20.445022]  ? __pfx_kthread+0x10/0x10
[   20.445061]  ret_from_fork_asm+0x1a/0x30
[   20.445158]  </TASK>
[   20.445191] 
[   20.456980] Allocated by task 286:
[   20.457441]  kasan_save_stack+0x45/0x70
[   20.457903]  kasan_save_track+0x18/0x40
[   20.458265]  kasan_save_alloc_info+0x3b/0x50
[   20.458575]  __kasan_kmalloc+0xb7/0xc0
[   20.458853]  __kmalloc_cache_noprof+0x189/0x420
[   20.459273]  kasan_atomics+0x95/0x310
[   20.459555]  kunit_try_run_case+0x1a5/0x480
[   20.459871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.460319]  kthread+0x337/0x6f0
[   20.460527]  ret_from_fork+0x41/0x80
[   20.460772]  ret_from_fork_asm+0x1a/0x30
[   20.461173] 
[   20.461391] The buggy address belongs to the object at ffff888101e04b00
[   20.461391]  which belongs to the cache kmalloc-64 of size 64
[   20.463479] The buggy address is located 0 bytes to the right of
[   20.463479]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.464278] 
[   20.465087] The buggy address belongs to the physical page:
[   20.465705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.466191] flags: 0x200000000000000(node=0|zone=2)
[   20.466477] page_type: f5(slab)
[   20.466815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.467260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.468024] page dumped because: kasan: bad access detected
[   20.468609] 
[   20.468826] Memory state around the buggy address:
[   20.469491]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.469948]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.470582] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.471150]                                      ^
[   20.471780]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472207]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472772] ==================================================================
[   20.726118] ==================================================================
[   20.727331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   20.728004] Write of size 4 at addr ffff888101e04b30 by task kunit_try_catch/286
[   20.728808] 
[   20.729047] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   20.729164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.729197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.729246] Call Trace:
[   20.729294]  <TASK>
[   20.729343]  dump_stack_lvl+0x73/0xb0
[   20.729419]  print_report+0xd1/0x650
[   20.729472]  ? __virt_addr_valid+0x1db/0x2d0
[   20.729526]  ? kasan_atomics_helper+0x1217/0x5450
[   20.729580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.729635]  ? kasan_atomics_helper+0x1217/0x5450
[   20.729691]  kasan_report+0x141/0x180
[   20.729738]  ? kasan_atomics_helper+0x1217/0x5450
[   20.729807]  kasan_check_range+0x10c/0x1c0
[   20.729845]  __kasan_check_write+0x18/0x20
[   20.729886]  kasan_atomics_helper+0x1217/0x5450
[   20.729936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.729987]  ? __kmalloc_cache_noprof+0x189/0x420
[   20.730039]  ? trace_hardirqs_on+0x37/0xe0
[   20.730092]  ? kasan_atomics+0x152/0x310
[   20.730149]  kasan_atomics+0x1dc/0x310
[   20.730199]  ? __pfx_kasan_atomics+0x10/0x10
[   20.730236]  ? __pfx_kasan_atomics+0x10/0x10
[   20.730284]  kunit_try_run_case+0x1a5/0x480
[   20.730346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.730396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.730457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.730507]  ? __kthread_parkme+0x82/0x180
[   20.730561]  ? preempt_count_sub+0x50/0x80
[   20.730621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.730676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.730733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.730803]  kthread+0x337/0x6f0
[   20.730848]  ? trace_preempt_on+0x20/0xc0
[   20.730904]  ? __pfx_kthread+0x10/0x10
[   20.730952]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.731005]  ? calculate_sigpending+0x7b/0xa0
[   20.731059]  ? __pfx_kthread+0x10/0x10
[   20.731109]  ret_from_fork+0x41/0x80
[   20.731162]  ? __pfx_kthread+0x10/0x10
[   20.731212]  ret_from_fork_asm+0x1a/0x30
[   20.731288]  </TASK>
[   20.731321] 
[   20.741937] Allocated by task 286:
[   20.742325]  kasan_save_stack+0x45/0x70
[   20.742602]  kasan_save_track+0x18/0x40
[   20.742830]  kasan_save_alloc_info+0x3b/0x50
[   20.743053]  __kasan_kmalloc+0xb7/0xc0
[   20.743257]  __kmalloc_cache_noprof+0x189/0x420
[   20.743482]  kasan_atomics+0x95/0x310
[   20.743800]  kunit_try_run_case+0x1a5/0x480
[   20.744138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.744545]  kthread+0x337/0x6f0
[   20.744857]  ret_from_fork+0x41/0x80
[   20.745181]  ret_from_fork_asm+0x1a/0x30
[   20.748564] 
[   20.748818] The buggy address belongs to the object at ffff888101e04b00
[   20.748818]  which belongs to the cache kmalloc-64 of size 64
[   20.749269] The buggy address is located 0 bytes to the right of
[   20.749269]  allocated 48-byte region [ffff888101e04b00, ffff888101e04b30)
[   20.749698] 
[   20.749925] The buggy address belongs to the physical page:
[   20.750163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e04
[   20.750487] flags: 0x200000000000000(node=0|zone=2)
[   20.750732] page_type: f5(slab)
[   20.750941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   20.754876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.755650] page dumped because: kasan: bad access detected
[   20.756188] 
[   20.756388] Memory state around the buggy address:
[   20.756828]  ffff888101e04a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.757083]  ffff888101e04a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.757354] >ffff888101e04b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.757614]                                      ^
[   20.757897]  ffff888101e04b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.758194]  ffff888101e04c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.758471] ==================================================================