Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.112901] ==================================================================
[   26.113025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   26.113709] 
[   26.114117] Hardware name: linux,dummy-virt (DT)
[   26.114461]  dump_stack_lvl+0x8c/0xd0
[   26.114945]  kasan_atomics_helper+0x3f94/0x4858
[   26.115333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.116207]  ret_from_fork+0x10/0x20
[   26.117090]  kasan_save_alloc_info+0x40/0x58
[   26.117988]  kasan_atomics+0xb8/0x2e0
[   26.118936] 
[   26.118981] The buggy address belongs to the physical page:
[   26.119056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.119210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.120225]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.120576]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.122749] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.125644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.129625] 
[   26.129772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.129915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.131076] 
[   26.131683]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.134598] 
[   26.135238] Call trace:
[   26.137068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.139110]  kasan_save_alloc_info+0x40/0x58
[   26.139664]  kasan_atomics+0xb8/0x2e0
[   26.141847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.143597] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.145099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   26.148993]  kasan_save_stack+0x3c/0x68
[   26.151487] 
[   26.151936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.152690] page_type: f5(slab)
[   26.153109] page dumped because: kasan: bad access detected
[   26.153605] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.154733] ==================================================================
[   26.732380] ==================================================================
[   26.732526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   26.732657] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.732771] 
[   26.732851] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.733051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.733119] Hardware name: linux,dummy-virt (DT)
[   26.733199] Call trace:
[   26.733256]  show_stack+0x20/0x38 (C)
[   26.733378]  dump_stack_lvl+0x8c/0xd0
[   26.733516]  print_report+0x118/0x608
[   26.733959]  kasan_report+0xdc/0x128
[   26.734153]  kasan_check_range+0x100/0x1a8
[   26.734335]  __kasan_check_write+0x20/0x30
[   26.734495]  kasan_atomics_helper+0x175c/0x4858
[   26.734626]  kasan_atomics+0x198/0x2e0
[   26.734745]  kunit_try_run_case+0x170/0x3f0
[   26.734925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.735123]  kthread+0x328/0x630
[   26.735238]  ret_from_fork+0x10/0x20
[   26.735393] 
[   26.735453] Allocated by task 269:
[   26.735526]  kasan_save_stack+0x3c/0x68
[   26.735627]  kasan_save_track+0x20/0x40
[   26.735726]  kasan_save_alloc_info+0x40/0x58
[   26.735825]  __kasan_kmalloc+0xd4/0xd8
[   26.735930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.736105]  kasan_atomics+0xb8/0x2e0
[   26.736187]  kunit_try_run_case+0x170/0x3f0
[   26.736291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.736451]  kthread+0x328/0x630
[   26.736602]  ret_from_fork+0x10/0x20
[   26.736746] 
[   26.736825] The buggy address belongs to the object at fff00000c7733980
[   26.736825]  which belongs to the cache kmalloc-64 of size 64
[   26.737057] The buggy address is located 0 bytes to the right of
[   26.737057]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.737301] 
[   26.737358] The buggy address belongs to the physical page:
[   26.737456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.737593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.737732] page_type: f5(slab)
[   26.737837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.737973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.738094] page dumped because: kasan: bad access detected
[   26.738186] 
[   26.738238] Memory state around the buggy address:
[   26.738345]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.738533]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.738704] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.738806]                                      ^
[   26.738903]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.739032]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.739129] ==================================================================
[   26.440320] ==================================================================
[   26.440455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   26.440561] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.440679] 
[   26.440756] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.440969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.441029] Hardware name: linux,dummy-virt (DT)
[   26.441116] Call trace:
[   26.441197]  show_stack+0x20/0x38 (C)
[   26.441350]  dump_stack_lvl+0x8c/0xd0
[   26.441497]  print_report+0x118/0x608
[   26.441665]  kasan_report+0xdc/0x128
[   26.441766]  kasan_check_range+0x100/0x1a8
[   26.441877]  __kasan_check_write+0x20/0x30
[   26.441998]  kasan_atomics_helper+0xe44/0x4858
[   26.442119]  kasan_atomics+0x198/0x2e0
[   26.442230]  kunit_try_run_case+0x170/0x3f0
[   26.442373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.442527]  kthread+0x328/0x630
[   26.442640]  ret_from_fork+0x10/0x20
[   26.442757] 
[   26.442820] Allocated by task 269:
[   26.442905]  kasan_save_stack+0x3c/0x68
[   26.443007]  kasan_save_track+0x20/0x40
[   26.443114]  kasan_save_alloc_info+0x40/0x58
[   26.443224]  __kasan_kmalloc+0xd4/0xd8
[   26.443305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.443423]  kasan_atomics+0xb8/0x2e0
[   26.443542]  kunit_try_run_case+0x170/0x3f0
[   26.443639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.443750]  kthread+0x328/0x630
[   26.443876]  ret_from_fork+0x10/0x20
[   26.443978] 
[   26.444059] The buggy address belongs to the object at fff00000c7733980
[   26.444059]  which belongs to the cache kmalloc-64 of size 64
[   26.444263] The buggy address is located 0 bytes to the right of
[   26.444263]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.444489] 
[   26.444582] The buggy address belongs to the physical page:
[   26.444665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.444808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.444925] page_type: f5(slab)
[   26.445006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.445128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.445243] page dumped because: kasan: bad access detected
[   26.445322] 
[   26.445369] Memory state around the buggy address:
[   26.445480]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.445586]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.445705] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.445821]                                      ^
[   26.445954]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446123]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.446273] ==================================================================
[   26.676764] ==================================================================
[   26.676896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   26.677024] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.677153] 
[   26.677243] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.677471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.677943] Hardware name: linux,dummy-virt (DT)
[   26.678035] Call trace:
[   26.678174]  show_stack+0x20/0x38 (C)
[   26.678442]  dump_stack_lvl+0x8c/0xd0
[   26.678610]  print_report+0x118/0x608
[   26.678673]  kasan_report+0xdc/0x128
[   26.678754]  __asan_report_load8_noabort+0x20/0x30
[   26.678815]  kasan_atomics_helper+0x3db0/0x4858
[   26.678882]  kasan_atomics+0x198/0x2e0
[   26.679028]  kunit_try_run_case+0x170/0x3f0
[   26.679206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.679398]  kthread+0x328/0x630
[   26.679506]  ret_from_fork+0x10/0x20
[   26.679623] 
[   26.679666] Allocated by task 269:
[   26.679738]  kasan_save_stack+0x3c/0x68
[   26.679840]  kasan_save_track+0x20/0x40
[   26.679929]  kasan_save_alloc_info+0x40/0x58
[   26.680020]  __kasan_kmalloc+0xd4/0xd8
[   26.680145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.680281]  kasan_atomics+0xb8/0x2e0
[   26.680389]  kunit_try_run_case+0x170/0x3f0
[   26.680536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.680683]  kthread+0x328/0x630
[   26.680801]  ret_from_fork+0x10/0x20
[   26.680938] 
[   26.680987] The buggy address belongs to the object at fff00000c7733980
[   26.680987]  which belongs to the cache kmalloc-64 of size 64
[   26.681124] The buggy address is located 0 bytes to the right of
[   26.681124]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.681281] 
[   26.681327] The buggy address belongs to the physical page:
[   26.681766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.682091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.682220] page_type: f5(slab)
[   26.682601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.682739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.683062] page dumped because: kasan: bad access detected
[   26.683187] 
[   26.683235] Memory state around the buggy address:
[   26.683355]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.683547]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.683663] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.683747]                                      ^
[   26.684111]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.684232]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.684695] ==================================================================
[   26.283150] ==================================================================
[   26.283294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   26.283427] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.283566] 
[   26.283660] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.283881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.283960] Hardware name: linux,dummy-virt (DT)
[   26.284498] Call trace:
[   26.284587]  show_stack+0x20/0x38 (C)
[   26.285163]  dump_stack_lvl+0x8c/0xd0
[   26.285666]  print_report+0x118/0x608
[   26.285881]  kasan_report+0xdc/0x128
[   26.286009]  kasan_check_range+0x100/0x1a8
[   26.286141]  __kasan_check_write+0x20/0x30
[   26.286268]  kasan_atomics_helper+0xa6c/0x4858
[   26.286457]  kasan_atomics+0x198/0x2e0
[   26.286834]  kunit_try_run_case+0x170/0x3f0
[   26.287328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.287666]  kthread+0x328/0x630
[   26.287816]  ret_from_fork+0x10/0x20
[   26.288026] 
[   26.288115] Allocated by task 269:
[   26.288514]  kasan_save_stack+0x3c/0x68
[   26.288757]  kasan_save_track+0x20/0x40
[   26.288972]  kasan_save_alloc_info+0x40/0x58
[   26.289106]  __kasan_kmalloc+0xd4/0xd8
[   26.289274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.289717]  kasan_atomics+0xb8/0x2e0
[   26.289895]  kunit_try_run_case+0x170/0x3f0
[   26.290227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.290511]  kthread+0x328/0x630
[   26.290629]  ret_from_fork+0x10/0x20
[   26.291338] 
[   26.291535] The buggy address belongs to the object at fff00000c7733980
[   26.291535]  which belongs to the cache kmalloc-64 of size 64
[   26.291899] The buggy address is located 0 bytes to the right of
[   26.291899]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.292249] 
[   26.292306] The buggy address belongs to the physical page:
[   26.292612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.293061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.293492] page_type: f5(slab)
[   26.293675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.293980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.294208] page dumped because: kasan: bad access detected
[   26.294488] 
[   26.294598] Memory state around the buggy address:
[   26.294694]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.294992]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.295424] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.295543]                                      ^
[   26.295657]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.296140]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.296242] ==================================================================
[   26.411534] ==================================================================
[   26.411674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   26.412249] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.412497] 
[   26.412647] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.412957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.413044] Hardware name: linux,dummy-virt (DT)
[   26.413135] Call trace:
[   26.413196]  show_stack+0x20/0x38 (C)
[   26.413324]  dump_stack_lvl+0x8c/0xd0
[   26.413472]  print_report+0x118/0x608
[   26.413598]  kasan_report+0xdc/0x128
[   26.413721]  __asan_report_load4_noabort+0x20/0x30
[   26.413856]  kasan_atomics_helper+0x3e04/0x4858
[   26.413991]  kasan_atomics+0x198/0x2e0
[   26.414110]  kunit_try_run_case+0x170/0x3f0
[   26.414252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.414424]  kthread+0x328/0x630
[   26.414540]  ret_from_fork+0x10/0x20
[   26.415338] 
[   26.415422] Allocated by task 269:
[   26.415521]  kasan_save_stack+0x3c/0x68
[   26.416178]  kasan_save_track+0x20/0x40
[   26.416398]  kasan_save_alloc_info+0x40/0x58
[   26.416569]  __kasan_kmalloc+0xd4/0xd8
[   26.416662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.416934]  kasan_atomics+0xb8/0x2e0
[   26.417237]  kunit_try_run_case+0x170/0x3f0
[   26.417340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.417805]  kthread+0x328/0x630
[   26.417972]  ret_from_fork+0x10/0x20
[   26.418122] 
[   26.418179] The buggy address belongs to the object at fff00000c7733980
[   26.418179]  which belongs to the cache kmalloc-64 of size 64
[   26.418371] The buggy address is located 0 bytes to the right of
[   26.418371]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.418651] 
[   26.418708] The buggy address belongs to the physical page:
[   26.418795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.418948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.419101] page_type: f5(slab)
[   26.419248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.419390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.419505] page dumped because: kasan: bad access detected
[   26.419817] 
[   26.420071] Memory state around the buggy address:
[   26.420254]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.420433]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.420556] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.420817]                                      ^
[   26.420944]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.421089]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.421185] ==================================================================
[   26.709123] ==================================================================
[   26.709299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   26.709488] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.709692] 
[   26.709993] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.710251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.710644] Hardware name: linux,dummy-virt (DT)
[   26.710774] Call trace:
[   26.710904]  show_stack+0x20/0x38 (C)
[   26.711312]  dump_stack_lvl+0x8c/0xd0
[   26.711662]  print_report+0x118/0x608
[   26.711940]  kasan_report+0xdc/0x128
[   26.712168]  kasan_check_range+0x100/0x1a8
[   26.712357]  __kasan_check_write+0x20/0x30
[   26.712746]  kasan_atomics_helper+0x16d0/0x4858
[   26.713164]  kasan_atomics+0x198/0x2e0
[   26.713421]  kunit_try_run_case+0x170/0x3f0
[   26.713580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.713728]  kthread+0x328/0x630
[   26.714261]  ret_from_fork+0x10/0x20
[   26.714464] 
[   26.714522] Allocated by task 269:
[   26.714700]  kasan_save_stack+0x3c/0x68
[   26.714816]  kasan_save_track+0x20/0x40
[   26.714893]  kasan_save_alloc_info+0x40/0x58
[   26.715217]  __kasan_kmalloc+0xd4/0xd8
[   26.715503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.715849]  kasan_atomics+0xb8/0x2e0
[   26.716188]  kunit_try_run_case+0x170/0x3f0
[   26.716331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.716879]  kthread+0x328/0x630
[   26.717536]  ret_from_fork+0x10/0x20
[   26.717647] 
[   26.717870] The buggy address belongs to the object at fff00000c7733980
[   26.717870]  which belongs to the cache kmalloc-64 of size 64
[   26.718279] The buggy address is located 0 bytes to the right of
[   26.718279]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.718860] 
[   26.719202] The buggy address belongs to the physical page:
[   26.719345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.720069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.720217] page_type: f5(slab)
[   26.720324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.720467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.720879] page dumped because: kasan: bad access detected
[   26.721020] 
[   26.721085] Memory state around the buggy address:
[   26.721641]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.721808]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.721934] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.722042]                                      ^
[   26.722315]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.722914]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.723320] ==================================================================
[   26.630241] ==================================================================
[   26.630378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   26.630851] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.631144] 
[   26.631304] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.631514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.631584] Hardware name: linux,dummy-virt (DT)
[   26.631674] Call trace:
[   26.631757]  show_stack+0x20/0x38 (C)
[   26.631864]  dump_stack_lvl+0x8c/0xd0
[   26.632197]  print_report+0x118/0x608
[   26.632413]  kasan_report+0xdc/0x128
[   26.632632]  kasan_check_range+0x100/0x1a8
[   26.632989]  __kasan_check_write+0x20/0x30
[   26.633315]  kasan_atomics_helper+0x147c/0x4858
[   26.633477]  kasan_atomics+0x198/0x2e0
[   26.633607]  kunit_try_run_case+0x170/0x3f0
[   26.633742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.633891]  kthread+0x328/0x630
[   26.634006]  ret_from_fork+0x10/0x20
[   26.634137] 
[   26.634190] Allocated by task 269:
[   26.634271]  kasan_save_stack+0x3c/0x68
[   26.634417]  kasan_save_track+0x20/0x40
[   26.634524]  kasan_save_alloc_info+0x40/0x58
[   26.634636]  __kasan_kmalloc+0xd4/0xd8
[   26.634732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.634854]  kasan_atomics+0xb8/0x2e0
[   26.634955]  kunit_try_run_case+0x170/0x3f0
[   26.635064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.635182]  kthread+0x328/0x630
[   26.635279]  ret_from_fork+0x10/0x20
[   26.636013] 
[   26.636257] The buggy address belongs to the object at fff00000c7733980
[   26.636257]  which belongs to the cache kmalloc-64 of size 64
[   26.636709] The buggy address is located 0 bytes to the right of
[   26.636709]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.636903] 
[   26.636970] The buggy address belongs to the physical page:
[   26.637056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.637212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.637600] page_type: f5(slab)
[   26.638090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.638338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.638492] page dumped because: kasan: bad access detected
[   26.638538] 
[   26.638563] Memory state around the buggy address:
[   26.638608]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.638716]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.638813] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.638928]                                      ^
[   26.639025]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.639132]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.639233] ==================================================================
[   26.433497] ==================================================================
[   26.433676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   26.433858] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.434045] 
[   26.434172] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.434488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.434585] Hardware name: linux,dummy-virt (DT)
[   26.434660] Call trace:
[   26.434720]  show_stack+0x20/0x38 (C)
[   26.434869]  dump_stack_lvl+0x8c/0xd0
[   26.435043]  print_report+0x118/0x608
[   26.435201]  kasan_report+0xdc/0x128
[   26.435360]  __asan_report_load8_noabort+0x20/0x30
[   26.435497]  kasan_atomics_helper+0x3f58/0x4858
[   26.435617]  kasan_atomics+0x198/0x2e0
[   26.435755]  kunit_try_run_case+0x170/0x3f0
[   26.435908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.436056]  kthread+0x328/0x630
[   26.436175]  ret_from_fork+0x10/0x20
[   26.436330] 
[   26.436418] Allocated by task 269:
[   26.436514]  kasan_save_stack+0x3c/0x68
[   26.436643]  kasan_save_track+0x20/0x40
[   26.436771]  kasan_save_alloc_info+0x40/0x58
[   26.436880]  __kasan_kmalloc+0xd4/0xd8
[   26.436998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.437128]  kasan_atomics+0xb8/0x2e0
[   26.437285]  kunit_try_run_case+0x170/0x3f0
[   26.437379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.437484]  kthread+0x328/0x630
[   26.437550]  ret_from_fork+0x10/0x20
[   26.437626] 
[   26.437673] The buggy address belongs to the object at fff00000c7733980
[   26.437673]  which belongs to the cache kmalloc-64 of size 64
[   26.437813] The buggy address is located 0 bytes to the right of
[   26.437813]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.437978] 
[   26.438034] The buggy address belongs to the physical page:
[   26.438111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.438254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.438396] page_type: f5(slab)
[   26.438512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.438665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.438781] page dumped because: kasan: bad access detected
[   26.438859] 
[   26.438915] Memory state around the buggy address:
[   26.438996]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.439098]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.439198] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.439312]                                      ^
[   26.439395]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.439517]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.439610] ==================================================================
[   26.545847] ==================================================================
[   26.545983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   26.546117] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.546252] 
[   26.546358] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.546600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.546679] Hardware name: linux,dummy-virt (DT)
[   26.546765] Call trace:
[   26.546827]  show_stack+0x20/0x38 (C)
[   26.546958]  dump_stack_lvl+0x8c/0xd0
[   26.547089]  print_report+0x118/0x608
[   26.547232]  kasan_report+0xdc/0x128
[   26.547354]  kasan_check_range+0x100/0x1a8
[   26.547488]  __kasan_check_write+0x20/0x30
[   26.547624]  kasan_atomics_helper+0x1190/0x4858
[   26.547829]  kasan_atomics+0x198/0x2e0
[   26.547946]  kunit_try_run_case+0x170/0x3f0
[   26.548087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.548236]  kthread+0x328/0x630
[   26.548364]  ret_from_fork+0x10/0x20
[   26.548492] 
[   26.548552] Allocated by task 269:
[   26.548635]  kasan_save_stack+0x3c/0x68
[   26.548734]  kasan_save_track+0x20/0x40
[   26.548826]  kasan_save_alloc_info+0x40/0x58
[   26.548945]  __kasan_kmalloc+0xd4/0xd8
[   26.549088]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.549257]  kasan_atomics+0xb8/0x2e0
[   26.549387]  kunit_try_run_case+0x170/0x3f0
[   26.549491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.549585]  kthread+0x328/0x630
[   26.549920]  ret_from_fork+0x10/0x20
[   26.550032] 
[   26.550084] The buggy address belongs to the object at fff00000c7733980
[   26.550084]  which belongs to the cache kmalloc-64 of size 64
[   26.550244] The buggy address is located 0 bytes to the right of
[   26.550244]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.550456] 
[   26.550511] The buggy address belongs to the physical page:
[   26.550593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.550788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.550929] page_type: f5(slab)
[   26.551025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.551169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.551287] page dumped because: kasan: bad access detected
[   26.551376] 
[   26.551439] Memory state around the buggy address:
[   26.551526]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.551627]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.551762] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.551868]                                      ^
[   26.551991]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.552153]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.552297] ==================================================================
[   26.698083] ==================================================================
[   26.698209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   26.698344] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.698975] 
[   26.699141] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.699397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.699626] Hardware name: linux,dummy-virt (DT)
[   26.699927] Call trace:
[   26.700463]  show_stack+0x20/0x38 (C)
[   26.700734]  dump_stack_lvl+0x8c/0xd0
[   26.700939]  print_report+0x118/0x608
[   26.701215]  kasan_report+0xdc/0x128
[   26.701704]  __asan_report_load8_noabort+0x20/0x30
[   26.701998]  kasan_atomics_helper+0x3df4/0x4858
[   26.702283]  kasan_atomics+0x198/0x2e0
[   26.702504]  kunit_try_run_case+0x170/0x3f0
[   26.702809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.703020]  kthread+0x328/0x630
[   26.703113]  ret_from_fork+0x10/0x20
[   26.703230] 
[   26.703277] Allocated by task 269:
[   26.703688]  kasan_save_stack+0x3c/0x68
[   26.703894]  kasan_save_track+0x20/0x40
[   26.704109]  kasan_save_alloc_info+0x40/0x58
[   26.704454]  __kasan_kmalloc+0xd4/0xd8
[   26.704578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.704721]  kasan_atomics+0xb8/0x2e0
[   26.704851]  kunit_try_run_case+0x170/0x3f0
[   26.704958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.705073]  kthread+0x328/0x630
[   26.705159]  ret_from_fork+0x10/0x20
[   26.705250] 
[   26.705302] The buggy address belongs to the object at fff00000c7733980
[   26.705302]  which belongs to the cache kmalloc-64 of size 64
[   26.705470] The buggy address is located 0 bytes to the right of
[   26.705470]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.705647] 
[   26.705700] The buggy address belongs to the physical page:
[   26.705784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.705927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.706065] page_type: f5(slab)
[   26.706173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.706351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.706569] page dumped because: kasan: bad access detected
[   26.706664] 
[   26.706712] Memory state around the buggy address:
[   26.707224]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.707422]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.707562] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.707679]                                      ^
[   26.707780]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.708020]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.708268] ==================================================================
[   26.609679] ==================================================================
[   26.609968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   26.610234] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.610429] 
[   26.610522] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.610728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.610791] Hardware name: linux,dummy-virt (DT)
[   26.610874] Call trace:
[   26.610931]  show_stack+0x20/0x38 (C)
[   26.611060]  dump_stack_lvl+0x8c/0xd0
[   26.611892]  print_report+0x118/0x608
[   26.612102]  kasan_report+0xdc/0x128
[   26.612211]  kasan_check_range+0x100/0x1a8
[   26.612327]  __kasan_check_write+0x20/0x30
[   26.612458]  kasan_atomics_helper+0x1414/0x4858
[   26.612578]  kasan_atomics+0x198/0x2e0
[   26.612686]  kunit_try_run_case+0x170/0x3f0
[   26.612803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.612941]  kthread+0x328/0x630
[   26.614924]  ret_from_fork+0x10/0x20
[   26.615272] 
[   26.615319] Allocated by task 269:
[   26.615397]  kasan_save_stack+0x3c/0x68
[   26.615507]  kasan_save_track+0x20/0x40
[   26.616606]  kasan_save_alloc_info+0x40/0x58
[   26.616711]  __kasan_kmalloc+0xd4/0xd8
[   26.617547]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.617802]  kasan_atomics+0xb8/0x2e0
[   26.617889]  kunit_try_run_case+0x170/0x3f0
[   26.618376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.618782]  kthread+0x328/0x630
[   26.618865]  ret_from_fork+0x10/0x20
[   26.618958] 
[   26.619786] The buggy address belongs to the object at fff00000c7733980
[   26.619786]  which belongs to the cache kmalloc-64 of size 64
[   26.620509] The buggy address is located 0 bytes to the right of
[   26.620509]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.621204] 
[   26.621642] The buggy address belongs to the physical page:
[   26.622087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.622409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.623427] page_type: f5(slab)
[   26.624133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.624666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.625120] page dumped because: kasan: bad access detected
[   26.625770] 
[   26.626005] Memory state around the buggy address:
[   26.626113]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.626946]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.627083] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.627174]                                      ^
[   26.627253]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.627355]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.628998] ==================================================================
[   26.297643] ==================================================================
[   26.298188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   26.298347] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.298759] 
[   26.298875] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.299063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.299120] Hardware name: linux,dummy-virt (DT)
[   26.299181] Call trace:
[   26.299239]  show_stack+0x20/0x38 (C)
[   26.299937]  dump_stack_lvl+0x8c/0xd0
[   26.300360]  print_report+0x118/0x608
[   26.300543]  kasan_report+0xdc/0x128
[   26.301015]  kasan_check_range+0x100/0x1a8
[   26.301511]  __kasan_check_write+0x20/0x30
[   26.301675]  kasan_atomics_helper+0xad4/0x4858
[   26.302242]  kasan_atomics+0x198/0x2e0
[   26.302673]  kunit_try_run_case+0x170/0x3f0
[   26.303752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.303927]  kthread+0x328/0x630
[   26.304052]  ret_from_fork+0x10/0x20
[   26.304351] 
[   26.304419] Allocated by task 269:
[   26.304611]  kasan_save_stack+0x3c/0x68
[   26.304778]  kasan_save_track+0x20/0x40
[   26.304907]  kasan_save_alloc_info+0x40/0x58
[   26.305062]  __kasan_kmalloc+0xd4/0xd8
[   26.305196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.305335]  kasan_atomics+0xb8/0x2e0
[   26.305436]  kunit_try_run_case+0x170/0x3f0
[   26.305546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.305671]  kthread+0x328/0x630
[   26.305772]  ret_from_fork+0x10/0x20
[   26.305876] 
[   26.305936] The buggy address belongs to the object at fff00000c7733980
[   26.305936]  which belongs to the cache kmalloc-64 of size 64
[   26.306111] The buggy address is located 0 bytes to the right of
[   26.306111]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.306369] 
[   26.306867] The buggy address belongs to the physical page:
[   26.307088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.307426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.307619] page_type: f5(slab)
[   26.307711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.307830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.308255] page dumped because: kasan: bad access detected
[   26.308482] 
[   26.308641] Memory state around the buggy address:
[   26.308848]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.309190]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.309386] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.309625]                                      ^
[   26.309815]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.310365]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.310508] ==================================================================
[   26.245477] ==================================================================
[   26.245604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   26.245728] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.245870] 
[   26.245982] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.246176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.246279] Hardware name: linux,dummy-virt (DT)
[   26.246451] Call trace:
[   26.246515]  show_stack+0x20/0x38 (C)
[   26.246645]  dump_stack_lvl+0x8c/0xd0
[   26.246799]  print_report+0x118/0x608
[   26.246929]  kasan_report+0xdc/0x128
[   26.247108]  __asan_report_load4_noabort+0x20/0x30
[   26.247272]  kasan_atomics_helper+0x42d8/0x4858
[   26.247479]  kasan_atomics+0x198/0x2e0
[   26.247607]  kunit_try_run_case+0x170/0x3f0
[   26.247740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.247868]  kthread+0x328/0x630
[   26.248001]  ret_from_fork+0x10/0x20
[   26.248169] 
[   26.248224] Allocated by task 269:
[   26.248308]  kasan_save_stack+0x3c/0x68
[   26.248427]  kasan_save_track+0x20/0x40
[   26.248522]  kasan_save_alloc_info+0x40/0x58
[   26.248628]  __kasan_kmalloc+0xd4/0xd8
[   26.248727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.248891]  kasan_atomics+0xb8/0x2e0
[   26.248982]  kunit_try_run_case+0x170/0x3f0
[   26.249087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.249218]  kthread+0x328/0x630
[   26.249314]  ret_from_fork+0x10/0x20
[   26.249468] 
[   26.249610] The buggy address belongs to the object at fff00000c7733980
[   26.249610]  which belongs to the cache kmalloc-64 of size 64
[   26.249840] The buggy address is located 0 bytes to the right of
[   26.249840]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.250023] 
[   26.250081] The buggy address belongs to the physical page:
[   26.250227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.250452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.250646] page_type: f5(slab)
[   26.250787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.250928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.251038] page dumped because: kasan: bad access detected
[   26.251149] 
[   26.251193] Memory state around the buggy address:
[   26.251295]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.251420]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.251540] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.251972]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.253321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   26.254250] Call trace:
[   26.254362]  show_stack+0x20/0x38 (C)
[   26.254543]  dump_stack_lvl+0x8c/0xd0
[   26.254676]  print_report+0x118/0x608
[   26.254850]  kasan_report+0xdc/0x128
[   26.254960]  kasan_check_range+0x100/0x1a8
[   26.255101]  __kasan_check_write+0x20/0x30
[   26.255239]  kasan_atomics_helper+0x934/0x4858
[   26.255372]  kasan_atomics+0x198/0x2e0
[   26.255502]  kunit_try_run_case+0x170/0x3f0
[   26.255618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.255760]  kthread+0x328/0x630
[   26.255883]  ret_from_fork+0x10/0x20
[   26.256050] 
[   26.256104] Allocated by task 269:
[   26.256181]  kasan_save_stack+0x3c/0x68
[   26.256319]  kasan_save_track+0x20/0x40
[   26.256429]  kasan_save_alloc_info+0x40/0x58
[   26.256562]  __kasan_kmalloc+0xd4/0xd8
[   26.256655]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.256825]  kasan_atomics+0xb8/0x2e0
[   26.256964]  kunit_try_run_case+0x170/0x3f0
[   26.257082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.257240]  kthread+0x328/0x630
[   26.257374]  ret_from_fork+0x10/0x20
[   26.257486] 
[   26.257547] The buggy address belongs to the object at fff00000c7733980
[   26.257547]  which belongs to the cache kmalloc-64 of size 64
[   26.257745] The buggy address is located 0 bytes to the right of
[   26.257745]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.257919] 
[   26.257984] The buggy address belongs to the physical page:
[   26.258080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.258262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.258453] page_type: f5(slab)
[   26.258558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.258724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.258829] page dumped because: kasan: bad access detected
[   26.258918] 
[   26.258963] Memory state around the buggy address:
[   26.259074]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.259139]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.259194] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.259241]                                      ^
[   26.259286]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.259339]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.259385] ==================================================================
[   26.685890] ==================================================================
[   26.686018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   26.686132] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.686257] 
[   26.686352] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.687255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.687332] Hardware name: linux,dummy-virt (DT)
[   26.687482] Call trace:
[   26.687667]  show_stack+0x20/0x38 (C)
[   26.687956]  dump_stack_lvl+0x8c/0xd0
[   26.688479]  print_report+0x118/0x608
[   26.688611]  kasan_report+0xdc/0x128
[   26.688760]  kasan_check_range+0x100/0x1a8
[   26.689073]  __kasan_check_write+0x20/0x30
[   26.689305]  kasan_atomics_helper+0x1644/0x4858
[   26.689687]  kasan_atomics+0x198/0x2e0
[   26.689894]  kunit_try_run_case+0x170/0x3f0
[   26.690098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.690388]  kthread+0x328/0x630
[   26.691022]  ret_from_fork+0x10/0x20
[   26.691343] 
[   26.691554] Allocated by task 269:
[   26.691769]  kasan_save_stack+0x3c/0x68
[   26.691993]  kasan_save_track+0x20/0x40
[   26.692112]  kasan_save_alloc_info+0x40/0x58
[   26.692207]  __kasan_kmalloc+0xd4/0xd8
[   26.692292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.692395]  kasan_atomics+0xb8/0x2e0
[   26.692832]  kunit_try_run_case+0x170/0x3f0
[   26.693152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.693270]  kthread+0x328/0x630
[   26.693525]  ret_from_fork+0x10/0x20
[   26.693708] 
[   26.693772] The buggy address belongs to the object at fff00000c7733980
[   26.693772]  which belongs to the cache kmalloc-64 of size 64
[   26.693926] The buggy address is located 0 bytes to the right of
[   26.693926]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.694215] 
[   26.694381] The buggy address belongs to the physical page:
[   26.694529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.694825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.695103] page_type: f5(slab)
[   26.695203] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.695558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.695668] page dumped because: kasan: bad access detected
[   26.695755] 
[   26.695806] Memory state around the buggy address:
[   26.695994]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.696537]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.696662] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.696774]                                      ^
[   26.696994]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.697330]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.697634] ==================================================================
[   26.260206] ==================================================================
[   26.260331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   26.261157] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.261962] 
[   26.262366] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.262664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.262735] Hardware name: linux,dummy-virt (DT)
[   26.262822] Call trace:
[   26.262887]  show_stack+0x20/0x38 (C)
[   26.263021]  dump_stack_lvl+0x8c/0xd0
[   26.263141]  print_report+0x118/0x608
[   26.263260]  kasan_report+0xdc/0x128
[   26.263372]  kasan_check_range+0x100/0x1a8
[   26.263513]  __kasan_check_write+0x20/0x30
[   26.263645]  kasan_atomics_helper+0x99c/0x4858
[   26.263771]  kasan_atomics+0x198/0x2e0
[   26.263882]  kunit_try_run_case+0x170/0x3f0
[   26.264019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.264164]  kthread+0x328/0x630
[   26.264282]  ret_from_fork+0x10/0x20
[   26.264421] 
[   26.264468] Allocated by task 269:
[   26.264546]  kasan_save_stack+0x3c/0x68
[   26.264693]  kasan_save_track+0x20/0x40
[   26.264811]  kasan_save_alloc_info+0x40/0x58
[   26.265628]  __kasan_kmalloc+0xd4/0xd8
[   26.265731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.265834]  kasan_atomics+0xb8/0x2e0
[   26.265965]  kunit_try_run_case+0x170/0x3f0
[   26.266071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.266199]  kthread+0x328/0x630
[   26.266427]  ret_from_fork+0x10/0x20
[   26.266494] 
[   26.266528] The buggy address belongs to the object at fff00000c7733980
[   26.266528]  which belongs to the cache kmalloc-64 of size 64
[   26.266861] The buggy address is located 0 bytes to the right of
[   26.266861]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.267041] 
[   26.267120] The buggy address belongs to the physical page:
[   26.267206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.267348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.267540] page_type: f5(slab)
[   26.267664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.267899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.268040] page dumped because: kasan: bad access detected
[   26.268132] 
[   26.268386] Memory state around the buggy address:
[   26.268502]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.268654]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.268872] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.269002]                                      ^
[   26.269102]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.269217]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.269325] ==================================================================
[   26.453637] ==================================================================
[   26.453777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   26.453896] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.454035] 
[   26.454117] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.454329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.454418] Hardware name: linux,dummy-virt (DT)
[   26.454490] Call trace:
[   26.454550]  show_stack+0x20/0x38 (C)
[   26.454674]  dump_stack_lvl+0x8c/0xd0
[   26.454810]  print_report+0x118/0x608
[   26.454937]  kasan_report+0xdc/0x128
[   26.455090]  kasan_check_range+0x100/0x1a8
[   26.455252]  __kasan_check_write+0x20/0x30
[   26.455495]  kasan_atomics_helper+0xeb8/0x4858
[   26.455623]  kasan_atomics+0x198/0x2e0
[   26.455734]  kunit_try_run_case+0x170/0x3f0
[   26.455888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.456054]  kthread+0x328/0x630
[   26.456190]  ret_from_fork+0x10/0x20
[   26.456319] 
[   26.456377] Allocated by task 269:
[   26.456474]  kasan_save_stack+0x3c/0x68
[   26.456582]  kasan_save_track+0x20/0x40
[   26.456675]  kasan_save_alloc_info+0x40/0x58
[   26.456769]  __kasan_kmalloc+0xd4/0xd8
[   26.456846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.456957]  kasan_atomics+0xb8/0x2e0
[   26.457045]  kunit_try_run_case+0x170/0x3f0
[   26.457149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.457278]  kthread+0x328/0x630
[   26.457365]  ret_from_fork+0x10/0x20
[   26.457463] 
[   26.457518] The buggy address belongs to the object at fff00000c7733980
[   26.457518]  which belongs to the cache kmalloc-64 of size 64
[   26.457688] The buggy address is located 0 bytes to the right of
[   26.457688]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.457859] 
[   26.457939] The buggy address belongs to the physical page:
[   26.458239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.458431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.458572] page_type: f5(slab)
[   26.458672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.458812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.458936] page dumped because: kasan: bad access detected
[   26.459058] 
[   26.459119] Memory state around the buggy address:
[   26.459248]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.459357]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.459465] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.459693]                                      ^
[   26.459803]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.459914]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.460009] ==================================================================
[   26.597387] ==================================================================
[   26.597583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   26.597822] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.597953] 
[   26.598054] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.598560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.598642] Hardware name: linux,dummy-virt (DT)
[   26.598870] Call trace:
[   26.598967]  show_stack+0x20/0x38 (C)
[   26.599113]  dump_stack_lvl+0x8c/0xd0
[   26.599238]  print_report+0x118/0x608
[   26.599351]  kasan_report+0xdc/0x128
[   26.599460]  __asan_report_load8_noabort+0x20/0x30
[   26.599570]  kasan_atomics_helper+0x3f04/0x4858
[   26.599689]  kasan_atomics+0x198/0x2e0
[   26.600584]  kunit_try_run_case+0x170/0x3f0
[   26.600857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.601004]  kthread+0x328/0x630
[   26.601104]  ret_from_fork+0x10/0x20
[   26.601567] 
[   26.601617] Allocated by task 269:
[   26.601708]  kasan_save_stack+0x3c/0x68
[   26.601809]  kasan_save_track+0x20/0x40
[   26.602241]  kasan_save_alloc_info+0x40/0x58
[   26.602462]  __kasan_kmalloc+0xd4/0xd8
[   26.602577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.602760]  kasan_atomics+0xb8/0x2e0
[   26.602865]  kunit_try_run_case+0x170/0x3f0
[   26.603094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.603228]  kthread+0x328/0x630
[   26.603302]  ret_from_fork+0x10/0x20
[   26.603394] 
[   26.603451] The buggy address belongs to the object at fff00000c7733980
[   26.603451]  which belongs to the cache kmalloc-64 of size 64
[   26.603589] The buggy address is located 0 bytes to the right of
[   26.603589]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.604195] 
[   26.604309] The buggy address belongs to the physical page:
[   26.604553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.604867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.605385] page_type: f5(slab)
[   26.606125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.606507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.606644] page dumped because: kasan: bad access detected
[   26.606745] 
[   26.606796] Memory state around the buggy address:
[   26.606891]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.607054]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.607231] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.607576]                                      ^
[   26.607697]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.607970]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.608122] ==================================================================
[   26.398453] ==================================================================
[   26.398708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   26.398991] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.399450] 
[   26.399675] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.400189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.400344] Hardware name: linux,dummy-virt (DT)
[   26.400620] Call trace:
[   26.400702]  show_stack+0x20/0x38 (C)
[   26.400845]  dump_stack_lvl+0x8c/0xd0
[   26.401081]  print_report+0x118/0x608
[   26.401277]  kasan_report+0xdc/0x128
[   26.401533]  kasan_check_range+0x100/0x1a8
[   26.401899]  __kasan_check_write+0x20/0x30
[   26.402027]  kasan_atomics_helper+0xd3c/0x4858
[   26.402160]  kasan_atomics+0x198/0x2e0
[   26.402466]  kunit_try_run_case+0x170/0x3f0
[   26.402599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.402731]  kthread+0x328/0x630
[   26.403442]  ret_from_fork+0x10/0x20
[   26.403692] 
[   26.403747] Allocated by task 269:
[   26.403831]  kasan_save_stack+0x3c/0x68
[   26.404283]  kasan_save_track+0x20/0x40
[   26.404546]  kasan_save_alloc_info+0x40/0x58
[   26.404746]  __kasan_kmalloc+0xd4/0xd8
[   26.404933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.405181]  kasan_atomics+0xb8/0x2e0
[   26.405479]  kunit_try_run_case+0x170/0x3f0
[   26.405709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.406014]  kthread+0x328/0x630
[   26.406113]  ret_from_fork+0x10/0x20
[   26.406337] 
[   26.406556] The buggy address belongs to the object at fff00000c7733980
[   26.406556]  which belongs to the cache kmalloc-64 of size 64
[   26.406734] The buggy address is located 0 bytes to the right of
[   26.406734]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.407249] 
[   26.407336] The buggy address belongs to the physical page:
[   26.407480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.407889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.408084] page_type: f5(slab)
[   26.408329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.408656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.408816] page dumped because: kasan: bad access detected
[   26.409015] 
[   26.409095] Memory state around the buggy address:
[   26.409326]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.409720]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.409975] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.410127]                                      ^
[   26.410220]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.410347]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.410507] ==================================================================
[   26.478368] ==================================================================
[   26.478700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   26.478826] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.478964] 
[   26.479097] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.479276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.479360] Hardware name: linux,dummy-virt (DT)
[   26.479447] Call trace:
[   26.479505]  show_stack+0x20/0x38 (C)
[   26.479640]  dump_stack_lvl+0x8c/0xd0
[   26.479757]  print_report+0x118/0x608
[   26.479854]  kasan_report+0xdc/0x128
[   26.479960]  kasan_check_range+0x100/0x1a8
[   26.480097]  __kasan_check_write+0x20/0x30
[   26.480304]  kasan_atomics_helper+0xff0/0x4858
[   26.480484]  kasan_atomics+0x198/0x2e0
[   26.480648]  kunit_try_run_case+0x170/0x3f0
[   26.480822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.482062]  kthread+0x328/0x630
[   26.482183]  ret_from_fork+0x10/0x20
[   26.482323] 
[   26.484220] Allocated by task 269:
[   26.484317]  kasan_save_stack+0x3c/0x68
[   26.484458]  kasan_save_track+0x20/0x40
[   26.484557]  kasan_save_alloc_info+0x40/0x58
[   26.484663]  __kasan_kmalloc+0xd4/0xd8
[   26.484746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.484849]  kasan_atomics+0xb8/0x2e0
[   26.486243]  kunit_try_run_case+0x170/0x3f0
[   26.486377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.486547]  kthread+0x328/0x630
[   26.486715]  ret_from_fork+0x10/0x20
[   26.487388] 
[   26.488028] The buggy address belongs to the object at fff00000c7733980
[   26.488028]  which belongs to the cache kmalloc-64 of size 64
[   26.488224] The buggy address is located 0 bytes to the right of
[   26.488224]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.488389] 
[   26.490645] The buggy address belongs to the physical page:
[   26.490750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.490906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.491059] page_type: f5(slab)
[   26.491161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.491275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.491379] page dumped because: kasan: bad access detected
[   26.491508] 
[   26.491564] Memory state around the buggy address:
[   26.492579]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.492702]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.493200] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.493322]                                      ^
[   26.493413]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.493508]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.494212] ==================================================================
[   26.423430] ==================================================================
[   26.423547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   26.424002] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.424158] 
[   26.424251] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.424678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.424763] Hardware name: linux,dummy-virt (DT)
[   26.424855] Call trace:
[   26.424921]  show_stack+0x20/0x38 (C)
[   26.425056]  dump_stack_lvl+0x8c/0xd0
[   26.425183]  print_report+0x118/0x608
[   26.425304]  kasan_report+0xdc/0x128
[   26.425437]  kasan_check_range+0x100/0x1a8
[   26.425966]  __kasan_check_read+0x20/0x30
[   26.426142]  kasan_atomics_helper+0xdd4/0x4858
[   26.426267]  kasan_atomics+0x198/0x2e0
[   26.426888]  kunit_try_run_case+0x170/0x3f0
[   26.427041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.427195]  kthread+0x328/0x630
[   26.427304]  ret_from_fork+0x10/0x20
[   26.427451] 
[   26.427500] Allocated by task 269:
[   26.427651]  kasan_save_stack+0x3c/0x68
[   26.427971]  kasan_save_track+0x20/0x40
[   26.428207]  kasan_save_alloc_info+0x40/0x58
[   26.428437]  __kasan_kmalloc+0xd4/0xd8
[   26.428643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.428879]  kasan_atomics+0xb8/0x2e0
[   26.428972]  kunit_try_run_case+0x170/0x3f0
[   26.429073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.429187]  kthread+0x328/0x630
[   26.429274]  ret_from_fork+0x10/0x20
[   26.429368] 
[   26.429433] The buggy address belongs to the object at fff00000c7733980
[   26.429433]  which belongs to the cache kmalloc-64 of size 64
[   26.429580] The buggy address is located 0 bytes to the right of
[   26.429580]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.430345] 
[   26.430473] The buggy address belongs to the physical page:
[   26.430624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.430805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.431015] page_type: f5(slab)
[   26.431154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.431267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.431363] page dumped because: kasan: bad access detected
[   26.431458] 
[   26.431507] Memory state around the buggy address:
[   26.432161]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.432480]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.432541] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.432622]                                      ^
[   26.432724]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432829]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.432926] ==================================================================
[   26.460606] ==================================================================
[   26.460737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   26.460851] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.460983] 
[   26.461063] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.461285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.461355] Hardware name: linux,dummy-virt (DT)
[   26.461451] Call trace:
[   26.461510]  show_stack+0x20/0x38 (C)
[   26.461630]  dump_stack_lvl+0x8c/0xd0
[   26.461751]  print_report+0x118/0x608
[   26.461882]  kasan_report+0xdc/0x128
[   26.461988]  kasan_check_range+0x100/0x1a8
[   26.462110]  __kasan_check_write+0x20/0x30
[   26.462300]  kasan_atomics_helper+0xf20/0x4858
[   26.462575]  kasan_atomics+0x198/0x2e0
[   26.462659]  kunit_try_run_case+0x170/0x3f0
[   26.462812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.463012]  kthread+0x328/0x630
[   26.463128]  ret_from_fork+0x10/0x20
[   26.463257] 
[   26.463318] Allocated by task 269:
[   26.463439]  kasan_save_stack+0x3c/0x68
[   26.463601]  kasan_save_track+0x20/0x40
[   26.463740]  kasan_save_alloc_info+0x40/0x58
[   26.463830]  __kasan_kmalloc+0xd4/0xd8
[   26.463909]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.464008]  kasan_atomics+0xb8/0x2e0
[   26.464101]  kunit_try_run_case+0x170/0x3f0
[   26.464234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.464374]  kthread+0x328/0x630
[   26.464481]  ret_from_fork+0x10/0x20
[   26.464603] 
[   26.464660] The buggy address belongs to the object at fff00000c7733980
[   26.464660]  which belongs to the cache kmalloc-64 of size 64
[   26.465344] The buggy address is located 0 bytes to the right of
[   26.465344]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.465733] 
[   26.465803] The buggy address belongs to the physical page:
[   26.465883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.466021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.466178] page_type: f5(slab)
[   26.466282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.466454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.466558] page dumped because: kasan: bad access detected
[   26.466644] 
[   26.466908] Memory state around the buggy address:
[   26.467211]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.467394]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.467533] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.467620]                                      ^
[   26.467699]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.468014]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.468118] ==================================================================
[   26.496514] ==================================================================
[   26.496652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   26.496788] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.496941] 
[   26.497083] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.497264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.497321] Hardware name: linux,dummy-virt (DT)
[   26.497381] Call trace:
[   26.497444]  show_stack+0x20/0x38 (C)
[   26.497570]  dump_stack_lvl+0x8c/0xd0
[   26.499273]  print_report+0x118/0x608
[   26.499612]  kasan_report+0xdc/0x128
[   26.499955]  kasan_check_range+0x100/0x1a8
[   26.500142]  __kasan_check_write+0x20/0x30
[   26.500585]  kasan_atomics_helper+0x1058/0x4858
[   26.501288]  kasan_atomics+0x198/0x2e0
[   26.501790]  kunit_try_run_case+0x170/0x3f0
[   26.502452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.502701]  kthread+0x328/0x630
[   26.503362]  ret_from_fork+0x10/0x20
[   26.503917] 
[   26.504214] Allocated by task 269:
[   26.504478]  kasan_save_stack+0x3c/0x68
[   26.504706]  kasan_save_track+0x20/0x40
[   26.504814]  kasan_save_alloc_info+0x40/0x58
[   26.505315]  __kasan_kmalloc+0xd4/0xd8
[   26.505718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.505844]  kasan_atomics+0xb8/0x2e0
[   26.505933]  kunit_try_run_case+0x170/0x3f0
[   26.506035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.506162]  kthread+0x328/0x630
[   26.506262]  ret_from_fork+0x10/0x20
[   26.506384] 
[   26.506452] The buggy address belongs to the object at fff00000c7733980
[   26.506452]  which belongs to the cache kmalloc-64 of size 64
[   26.507092] The buggy address is located 0 bytes to the right of
[   26.507092]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.507516] 
[   26.507608] The buggy address belongs to the physical page:
[   26.507730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.507872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.508387] page_type: f5(slab)
[   26.508518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.508728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.508838] page dumped because: kasan: bad access detected
[   26.508926] 
[   26.508975] Memory state around the buggy address:
[   26.509070]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.509250]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.509540] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.509707]                                      ^
[   26.509801]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.509914]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.510052] ==================================================================
[   26.552954] ==================================================================
[   26.553128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   26.553252] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.553363] 
[   26.553464] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.553677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.553734] Hardware name: linux,dummy-virt (DT)
[   26.553840] Call trace:
[   26.553925]  show_stack+0x20/0x38 (C)
[   26.554105]  dump_stack_lvl+0x8c/0xd0
[   26.554299]  print_report+0x118/0x608
[   26.554501]  kasan_report+0xdc/0x128
[   26.554665]  kasan_check_range+0x100/0x1a8
[   26.554799]  __kasan_check_write+0x20/0x30
[   26.554932]  kasan_atomics_helper+0x11f8/0x4858
[   26.555057]  kasan_atomics+0x198/0x2e0
[   26.555177]  kunit_try_run_case+0x170/0x3f0
[   26.555325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.555475]  kthread+0x328/0x630
[   26.555602]  ret_from_fork+0x10/0x20
[   26.555731] 
[   26.555804] Allocated by task 269:
[   26.555925]  kasan_save_stack+0x3c/0x68
[   26.556019]  kasan_save_track+0x20/0x40
[   26.556132]  kasan_save_alloc_info+0x40/0x58
[   26.556235]  __kasan_kmalloc+0xd4/0xd8
[   26.556379]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.556496]  kasan_atomics+0xb8/0x2e0
[   26.556581]  kunit_try_run_case+0x170/0x3f0
[   26.556687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.556860]  kthread+0x328/0x630
[   26.557002]  ret_from_fork+0x10/0x20
[   26.557147] 
[   26.557232] The buggy address belongs to the object at fff00000c7733980
[   26.557232]  which belongs to the cache kmalloc-64 of size 64
[   26.557482] The buggy address is located 0 bytes to the right of
[   26.557482]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.557752] 
[   26.557812] The buggy address belongs to the physical page:
[   26.557903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.558120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.558333] page_type: f5(slab)
[   26.558494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.558622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.558793] page dumped because: kasan: bad access detected
[   26.558888] 
[   26.558932] Memory state around the buggy address:
[   26.559011]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.559177]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.559283] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.559441]                                      ^
[   26.559721]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.559847]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.559900] ==================================================================
[   26.653028] ==================================================================
[   26.653473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   26.653826] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.654019] 
[   26.654153] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.654483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.654589] Hardware name: linux,dummy-virt (DT)
[   26.654715] Call trace:
[   26.654810]  show_stack+0x20/0x38 (C)
[   26.654924]  dump_stack_lvl+0x8c/0xd0
[   26.655059]  print_report+0x118/0x608
[   26.655163]  kasan_report+0xdc/0x128
[   26.655482]  kasan_check_range+0x100/0x1a8
[   26.655603]  __kasan_check_write+0x20/0x30
[   26.655783]  kasan_atomics_helper+0x154c/0x4858
[   26.655956]  kasan_atomics+0x198/0x2e0
[   26.656109]  kunit_try_run_case+0x170/0x3f0
[   26.656246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.656456]  kthread+0x328/0x630
[   26.656617]  ret_from_fork+0x10/0x20
[   26.656794] 
[   26.656867] Allocated by task 269:
[   26.656975]  kasan_save_stack+0x3c/0x68
[   26.657081]  kasan_save_track+0x20/0x40
[   26.657170]  kasan_save_alloc_info+0x40/0x58
[   26.657274]  __kasan_kmalloc+0xd4/0xd8
[   26.657366]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.657477]  kasan_atomics+0xb8/0x2e0
[   26.657564]  kunit_try_run_case+0x170/0x3f0
[   26.657862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.658215]  kthread+0x328/0x630
[   26.658369]  ret_from_fork+0x10/0x20
[   26.658524] 
[   26.658579] The buggy address belongs to the object at fff00000c7733980
[   26.658579]  which belongs to the cache kmalloc-64 of size 64
[   26.658966] The buggy address is located 0 bytes to the right of
[   26.658966]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.659182] 
[   26.659318] The buggy address belongs to the physical page:
[   26.659560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.659689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.659794] page_type: f5(slab)
[   26.659887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.660011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.660541] page dumped because: kasan: bad access detected
[   26.660634] 
[   26.660679] Memory state around the buggy address:
[   26.660770]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.661139]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.661374] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.661495]                                      ^
[   26.661570]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.661673]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.661765] ==================================================================
[   26.740429] ==================================================================
[   26.740551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   26.740681] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.740814] 
[   26.740906] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.741121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.741191] Hardware name: linux,dummy-virt (DT)
[   26.741276] Call trace:
[   26.741334]  show_stack+0x20/0x38 (C)
[   26.741472]  dump_stack_lvl+0x8c/0xd0
[   26.741603]  print_report+0x118/0x608
[   26.741722]  kasan_report+0xdc/0x128
[   26.741838]  __asan_report_load8_noabort+0x20/0x30
[   26.742602]  kasan_atomics_helper+0x3e20/0x4858
[   26.742973]  kasan_atomics+0x198/0x2e0
[   26.743481]  kunit_try_run_case+0x170/0x3f0
[   26.744388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.744807]  kthread+0x328/0x630
[   26.744944]  ret_from_fork+0x10/0x20
[   26.745839] 
[   26.745972] Allocated by task 269:
[   26.746060]  kasan_save_stack+0x3c/0x68
[   26.746186]  kasan_save_track+0x20/0x40
[   26.746992]  kasan_save_alloc_info+0x40/0x58
[   26.748492]  __kasan_kmalloc+0xd4/0xd8
[   26.748620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.748776]  kasan_atomics+0xb8/0x2e0
[   26.748881]  kunit_try_run_case+0x170/0x3f0
[   26.749231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.749340]  kthread+0x328/0x630
[   26.749435]  ret_from_fork+0x10/0x20
[   26.749520] 
[   26.749568] The buggy address belongs to the object at fff00000c7733980
[   26.749568]  which belongs to the cache kmalloc-64 of size 64
[   26.749708] The buggy address is located 0 bytes to the right of
[   26.749708]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.749882] 
[   26.749936] The buggy address belongs to the physical page:
[   26.750022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.750163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.751377] page_type: f5(slab)
[   26.751510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.751637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.751743] page dumped because: kasan: bad access detected
[   26.751824] 
[   26.751868] Memory state around the buggy address:
[   26.751954]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.752061]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.752170] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.752265]                                      ^
[   26.752345]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.753378]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.753508] ==================================================================
[   26.662300] ==================================================================
[   26.663435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   26.664003] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.664411] 
[   26.664512] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.665279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.665389] Hardware name: linux,dummy-virt (DT)
[   26.665497] Call trace:
[   26.665824]  show_stack+0x20/0x38 (C)
[   26.666158]  dump_stack_lvl+0x8c/0xd0
[   26.666383]  print_report+0x118/0x608
[   26.666510]  kasan_report+0xdc/0x128
[   26.666865]  kasan_check_range+0x100/0x1a8
[   26.667202]  __kasan_check_write+0x20/0x30
[   26.667580]  kasan_atomics_helper+0x15b4/0x4858
[   26.667868]  kasan_atomics+0x198/0x2e0
[   26.668023]  kunit_try_run_case+0x170/0x3f0
[   26.668287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.668446]  kthread+0x328/0x630
[   26.668574]  ret_from_fork+0x10/0x20
[   26.668712] 
[   26.668766] Allocated by task 269:
[   26.668848]  kasan_save_stack+0x3c/0x68
[   26.668963]  kasan_save_track+0x20/0x40
[   26.669083]  kasan_save_alloc_info+0x40/0x58
[   26.669236]  __kasan_kmalloc+0xd4/0xd8
[   26.669368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.669497]  kasan_atomics+0xb8/0x2e0
[   26.669593]  kunit_try_run_case+0x170/0x3f0
[   26.669703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.669843]  kthread+0x328/0x630
[   26.669979]  ret_from_fork+0x10/0x20
[   26.670119] 
[   26.670191] The buggy address belongs to the object at fff00000c7733980
[   26.670191]  which belongs to the cache kmalloc-64 of size 64
[   26.670366] The buggy address is located 0 bytes to the right of
[   26.670366]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.671551] 
[   26.671669] The buggy address belongs to the physical page:
[   26.671928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.672213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.672512] page_type: f5(slab)
[   26.672649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.672747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.672839] page dumped because: kasan: bad access detected
[   26.672921] 
[   26.672963] Memory state around the buggy address:
[   26.673843]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.674183]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.674310] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.674653]                                      ^
[   26.675505]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.675612]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.675723] ==================================================================
[   26.724505] ==================================================================
[   26.724641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   26.724782] Read of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.725246] 
[   26.725585] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.725939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.726059] Hardware name: linux,dummy-virt (DT)
[   26.726149] Call trace:
[   26.726214]  show_stack+0x20/0x38 (C)
[   26.726366]  dump_stack_lvl+0x8c/0xd0
[   26.726550]  print_report+0x118/0x608
[   26.726674]  kasan_report+0xdc/0x128
[   26.726988]  __asan_report_load8_noabort+0x20/0x30
[   26.727502]  kasan_atomics_helper+0x3e10/0x4858
[   26.727627]  kasan_atomics+0x198/0x2e0
[   26.727764]  kunit_try_run_case+0x170/0x3f0
[   26.727896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.728053]  kthread+0x328/0x630
[   26.728237]  ret_from_fork+0x10/0x20
[   26.728444] 
[   26.728528] Allocated by task 269:
[   26.728651]  kasan_save_stack+0x3c/0x68
[   26.728810]  kasan_save_track+0x20/0x40
[   26.728960]  kasan_save_alloc_info+0x40/0x58
[   26.729113]  __kasan_kmalloc+0xd4/0xd8
[   26.729213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.729333]  kasan_atomics+0xb8/0x2e0
[   26.729437]  kunit_try_run_case+0x170/0x3f0
[   26.729540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.729662]  kthread+0x328/0x630
[   26.729800]  ret_from_fork+0x10/0x20
[   26.729902] 
[   26.729955] The buggy address belongs to the object at fff00000c7733980
[   26.729955]  which belongs to the cache kmalloc-64 of size 64
[   26.730109] The buggy address is located 0 bytes to the right of
[   26.730109]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.730318] 
[   26.730486] The buggy address belongs to the physical page:
[   26.730566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.730641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.730744] page_type: f5(slab)
[   26.730804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.730866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.730918] page dumped because: kasan: bad access detected
[   26.730959] 
[   26.730982] Memory state around the buggy address:
[   26.731026]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.731081]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.731133] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.731180]                                      ^
[   26.731223]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731277]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.731321] ==================================================================
[   26.313348] ==================================================================
[   26.313547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   26.314009] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.314326] 
[   26.314718] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.315178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.315268] Hardware name: linux,dummy-virt (DT)
[   26.315342] Call trace:
[   26.315706]  show_stack+0x20/0x38 (C)
[   26.315995]  dump_stack_lvl+0x8c/0xd0
[   26.316150]  print_report+0x118/0x608
[   26.316274]  kasan_report+0xdc/0x128
[   26.316399]  __asan_report_load4_noabort+0x20/0x30
[   26.316535]  kasan_atomics_helper+0x3dcc/0x4858
[   26.316672]  kasan_atomics+0x198/0x2e0
[   26.316794]  kunit_try_run_case+0x170/0x3f0
[   26.316925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.317075]  kthread+0x328/0x630
[   26.317204]  ret_from_fork+0x10/0x20
[   26.317336] 
[   26.318096] Allocated by task 269:
[   26.318227]  kasan_save_stack+0x3c/0x68
[   26.318323]  kasan_save_track+0x20/0x40
[   26.318376]  kasan_save_alloc_info+0x40/0x58
[   26.318486]  __kasan_kmalloc+0xd4/0xd8
[   26.318631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.318795]  kasan_atomics+0xb8/0x2e0
[   26.318933]  kunit_try_run_case+0x170/0x3f0
[   26.319281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.319515]  kthread+0x328/0x630
[   26.319672]  ret_from_fork+0x10/0x20
[   26.319875] 
[   26.320012] The buggy address belongs to the object at fff00000c7733980
[   26.320012]  which belongs to the cache kmalloc-64 of size 64
[   26.320414] The buggy address is located 0 bytes to the right of
[   26.320414]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.320996] 
[   26.321063] The buggy address belongs to the physical page:
[   26.321186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.321587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.321975] page_type: f5(slab)
[   26.322184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.322453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.322864] page dumped because: kasan: bad access detected
[   26.323236] 
[   26.323301] Memory state around the buggy address:
[   26.323391]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.323766]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.323909] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.324015]                                      ^
[   26.324666]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.325236]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.325890] ==================================================================
[   26.468731] ==================================================================
[   26.468850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   26.468964] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.469092] 
[   26.469204] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.469524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.469589] Hardware name: linux,dummy-virt (DT)
[   26.469671] Call trace:
[   26.469729]  show_stack+0x20/0x38 (C)
[   26.469856]  dump_stack_lvl+0x8c/0xd0
[   26.470121]  print_report+0x118/0x608
[   26.470427]  kasan_report+0xdc/0x128
[   26.470547]  kasan_check_range+0x100/0x1a8
[   26.470666]  __kasan_check_write+0x20/0x30
[   26.470785]  kasan_atomics_helper+0xf88/0x4858
[   26.471162]  kasan_atomics+0x198/0x2e0
[   26.471355]  kunit_try_run_case+0x170/0x3f0
[   26.471502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.471641]  kthread+0x328/0x630
[   26.471737]  ret_from_fork+0x10/0x20
[   26.472046] 
[   26.472110] Allocated by task 269:
[   26.472186]  kasan_save_stack+0x3c/0x68
[   26.472476]  kasan_save_track+0x20/0x40
[   26.472605]  kasan_save_alloc_info+0x40/0x58
[   26.472707]  __kasan_kmalloc+0xd4/0xd8
[   26.472857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.473223]  kasan_atomics+0xb8/0x2e0
[   26.473330]  kunit_try_run_case+0x170/0x3f0
[   26.473488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.473636]  kthread+0x328/0x630
[   26.473726]  ret_from_fork+0x10/0x20
[   26.473844] 
[   26.473974] The buggy address belongs to the object at fff00000c7733980
[   26.473974]  which belongs to the cache kmalloc-64 of size 64
[   26.474122] The buggy address is located 0 bytes to the right of
[   26.474122]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.474277] 
[   26.474643] The buggy address belongs to the physical page:
[   26.474746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.474912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.475054] page_type: f5(slab)
[   26.475480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.475799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.476216] page dumped because: kasan: bad access detected
[   26.476451] 
[   26.476503] Memory state around the buggy address:
[   26.476590]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.476717]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.476844] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.477010]                                      ^
[   26.477093]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.477458]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.477798] ==================================================================
[   26.581670] ==================================================================
[   26.581735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   26.581804] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.581864] 
[   26.581913] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.582014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.582046] Hardware name: linux,dummy-virt (DT)
[   26.582085] Call trace:
[   26.582115]  show_stack+0x20/0x38 (C)
[   26.582175]  dump_stack_lvl+0x8c/0xd0
[   26.582232]  print_report+0x118/0x608
[   26.582286]  kasan_report+0xdc/0x128
[   26.582363]  kasan_check_range+0x100/0x1a8
[   26.582876]  __kasan_check_write+0x20/0x30
[   26.583216]  kasan_atomics_helper+0x1384/0x4858
[   26.583373]  kasan_atomics+0x198/0x2e0
[   26.583508]  kunit_try_run_case+0x170/0x3f0
[   26.583634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.584342]  kthread+0x328/0x630
[   26.585883]  ret_from_fork+0x10/0x20
[   26.586018] 
[   26.586067] Allocated by task 269:
[   26.586148]  kasan_save_stack+0x3c/0x68
[   26.586254]  kasan_save_track+0x20/0x40
[   26.586367]  kasan_save_alloc_info+0x40/0x58
[   26.586481]  __kasan_kmalloc+0xd4/0xd8
[   26.586579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.586692]  kasan_atomics+0xb8/0x2e0
[   26.586782]  kunit_try_run_case+0x170/0x3f0
[   26.588086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.588230]  kthread+0x328/0x630
[   26.588331]  ret_from_fork+0x10/0x20
[   26.588433] 
[   26.588487] The buggy address belongs to the object at fff00000c7733980
[   26.588487]  which belongs to the cache kmalloc-64 of size 64
[   26.588984] The buggy address is located 0 bytes to the right of
[   26.588984]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.589199] 
[   26.589262] The buggy address belongs to the physical page:
[   26.589481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.589640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.589776] page_type: f5(slab)
[   26.589878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.590784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.591181] page dumped because: kasan: bad access detected
[   26.591572] 
[   26.591618] Memory state around the buggy address:
[   26.592217]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.592540]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.593145] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.593493]                                      ^
[   26.594145]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.594278]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.594861] ==================================================================
[   26.271070] ==================================================================
[   26.271215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   26.271340] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.271484] 
[   26.271579] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.271804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.271877] Hardware name: linux,dummy-virt (DT)
[   26.271959] Call trace:
[   26.272025]  show_stack+0x20/0x38 (C)
[   26.272158]  dump_stack_lvl+0x8c/0xd0
[   26.272282]  print_report+0x118/0x608
[   26.272409]  kasan_report+0xdc/0x128
[   26.272533]  kasan_check_range+0x100/0x1a8
[   26.273240]  __kasan_check_write+0x20/0x30
[   26.273432]  kasan_atomics_helper+0xa04/0x4858
[   26.273570]  kasan_atomics+0x198/0x2e0
[   26.273688]  kunit_try_run_case+0x170/0x3f0
[   26.273818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.273964]  kthread+0x328/0x630
[   26.274080]  ret_from_fork+0x10/0x20
[   26.274207] 
[   26.274259] Allocated by task 269:
[   26.274356]  kasan_save_stack+0x3c/0x68
[   26.275081]  kasan_save_track+0x20/0x40
[   26.275203]  kasan_save_alloc_info+0x40/0x58
[   26.275303]  __kasan_kmalloc+0xd4/0xd8
[   26.275877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.276014]  kasan_atomics+0xb8/0x2e0
[   26.276116]  kunit_try_run_case+0x170/0x3f0
[   26.276634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.278755]  kthread+0x328/0x630
[   26.278873]  ret_from_fork+0x10/0x20
[   26.278982] 
[   26.279038] The buggy address belongs to the object at fff00000c7733980
[   26.279038]  which belongs to the cache kmalloc-64 of size 64
[   26.279198] The buggy address is located 0 bytes to the right of
[   26.279198]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.279364] 
[   26.279441] The buggy address belongs to the physical page:
[   26.279528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.279671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.279788] page_type: f5(slab)
[   26.279876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.280003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.280111] page dumped because: kasan: bad access detected
[   26.280194] 
[   26.280245] Memory state around the buggy address:
[   26.280325]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.280866]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.281017] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.281120]                                      ^
[   26.281200]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.281303]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.281414] ==================================================================
[   26.446812] ==================================================================
[   26.446975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   26.447091] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.447223] 
[   26.447319] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.447531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.447612] Hardware name: linux,dummy-virt (DT)
[   26.447694] Call trace:
[   26.447764]  show_stack+0x20/0x38 (C)
[   26.447959]  dump_stack_lvl+0x8c/0xd0
[   26.448128]  print_report+0x118/0x608
[   26.448300]  kasan_report+0xdc/0x128
[   26.448474]  __asan_report_store8_noabort+0x20/0x30
[   26.448666]  kasan_atomics_helper+0x3e5c/0x4858
[   26.448835]  kasan_atomics+0x198/0x2e0
[   26.449001]  kunit_try_run_case+0x170/0x3f0
[   26.449178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.449351]  kthread+0x328/0x630
[   26.449472]  ret_from_fork+0x10/0x20
[   26.449613] 
[   26.449666] Allocated by task 269:
[   26.449748]  kasan_save_stack+0x3c/0x68
[   26.449868]  kasan_save_track+0x20/0x40
[   26.449976]  kasan_save_alloc_info+0x40/0x58
[   26.450092]  __kasan_kmalloc+0xd4/0xd8
[   26.450200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.450318]  kasan_atomics+0xb8/0x2e0
[   26.450425]  kunit_try_run_case+0x170/0x3f0
[   26.450521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.450633]  kthread+0x328/0x630
[   26.450730]  ret_from_fork+0x10/0x20
[   26.450824] 
[   26.450873] The buggy address belongs to the object at fff00000c7733980
[   26.450873]  which belongs to the cache kmalloc-64 of size 64
[   26.451078] The buggy address is located 0 bytes to the right of
[   26.451078]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.451293] 
[   26.451358] The buggy address belongs to the physical page:
[   26.451470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.451614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.451747] page_type: f5(slab)
[   26.451849] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.451981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.452094] page dumped because: kasan: bad access detected
[   26.452180] 
[   26.452233] Memory state around the buggy address:
[   26.452329]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.452452]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.452561] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.452684]                                      ^
[   26.452774]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.452894]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.453012] ==================================================================
[   26.530234] ==================================================================
[   26.530400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   26.530547] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.531796] 
[   26.532055] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.532431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.532688] Hardware name: linux,dummy-virt (DT)
[   26.532783] Call trace:
[   26.533198]  show_stack+0x20/0x38 (C)
[   26.533840]  dump_stack_lvl+0x8c/0xd0
[   26.534002]  print_report+0x118/0x608
[   26.534126]  kasan_report+0xdc/0x128
[   26.534231]  kasan_check_range+0x100/0x1a8
[   26.535197]  __kasan_check_write+0x20/0x30
[   26.535360]  kasan_atomics_helper+0x1128/0x4858
[   26.535567]  kasan_atomics+0x198/0x2e0
[   26.535976]  kunit_try_run_case+0x170/0x3f0
[   26.536478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.537180]  kthread+0x328/0x630
[   26.537365]  ret_from_fork+0x10/0x20
[   26.537770] 
[   26.538005] Allocated by task 269:
[   26.538486]  kasan_save_stack+0x3c/0x68
[   26.538611]  kasan_save_track+0x20/0x40
[   26.538695]  kasan_save_alloc_info+0x40/0x58
[   26.538747]  __kasan_kmalloc+0xd4/0xd8
[   26.538795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.538887]  kasan_atomics+0xb8/0x2e0
[   26.538963]  kunit_try_run_case+0x170/0x3f0
[   26.539373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.539573]  kthread+0x328/0x630
[   26.539676]  ret_from_fork+0x10/0x20
[   26.539755] 
[   26.539831] The buggy address belongs to the object at fff00000c7733980
[   26.539831]  which belongs to the cache kmalloc-64 of size 64
[   26.539972] The buggy address is located 0 bytes to the right of
[   26.539972]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.540383] 
[   26.540653] The buggy address belongs to the physical page:
[   26.540863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.541199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.541869] page_type: f5(slab)
[   26.542308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.542665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.542809] page dumped because: kasan: bad access detected
[   26.543594] 
[   26.543684] Memory state around the buggy address:
[   26.543781]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.543912]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.544030] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.544798]                                      ^
[   26.544922]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.545031]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.545188] ==================================================================
[   26.326589] ==================================================================
[   26.326721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   26.326853] Write of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.326990] 
[   26.327084] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.327315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.327393] Hardware name: linux,dummy-virt (DT)
[   26.330510] Call trace:
[   26.330708]  show_stack+0x20/0x38 (C)
[   26.331527]  dump_stack_lvl+0x8c/0xd0
[   26.332190]  print_report+0x118/0x608
[   26.332446]  kasan_report+0xdc/0x128
[   26.332621]  kasan_check_range+0x100/0x1a8
[   26.332753]  __kasan_check_write+0x20/0x30
[   26.332879]  kasan_atomics_helper+0xb70/0x4858
[   26.333004]  kasan_atomics+0x198/0x2e0
[   26.333120]  kunit_try_run_case+0x170/0x3f0
[   26.333242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.333390]  kthread+0x328/0x630
[   26.335535]  ret_from_fork+0x10/0x20
[   26.335966] 
[   26.336023] Allocated by task 269:
[   26.336235]  kasan_save_stack+0x3c/0x68
[   26.336644]  kasan_save_track+0x20/0x40
[   26.337545]  kasan_save_alloc_info+0x40/0x58
[   26.337668]  __kasan_kmalloc+0xd4/0xd8
[   26.338070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.338758]  kasan_atomics+0xb8/0x2e0
[   26.339137]  kunit_try_run_case+0x170/0x3f0
[   26.339504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.340057]  kthread+0x328/0x630
[   26.340388]  ret_from_fork+0x10/0x20
[   26.340523] 
[   26.340584] The buggy address belongs to the object at fff00000c7733980
[   26.340584]  which belongs to the cache kmalloc-64 of size 64
[   26.340760] The buggy address is located 0 bytes to the right of
[   26.340760]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.340935] 
[   26.340991] The buggy address belongs to the physical page:
[   26.341080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.342529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.343234] page_type: f5(slab)
[   26.343346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.343713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.345655]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.347061] ==================================================================
[   26.571426] ==================================================================
[   26.571553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   26.571680] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.571815] 
[   26.571906] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.572153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.572221] Hardware name: linux,dummy-virt (DT)
[   26.572303] Call trace:
[   26.572424]  show_stack+0x20/0x38 (C)
[   26.572549]  dump_stack_lvl+0x8c/0xd0
[   26.572718]  print_report+0x118/0x608
[   26.572883]  kasan_report+0xdc/0x128
[   26.573041]  kasan_check_range+0x100/0x1a8
[   26.573161]  __kasan_check_write+0x20/0x30
[   26.573270]  kasan_atomics_helper+0x12d8/0x4858
[   26.573383]  kasan_atomics+0x198/0x2e0
[   26.573499]  kunit_try_run_case+0x170/0x3f0
[   26.573639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.573781]  kthread+0x328/0x630
[   26.573893]  ret_from_fork+0x10/0x20
[   26.574016] 
[   26.574062] Allocated by task 269:
[   26.574134]  kasan_save_stack+0x3c/0x68
[   26.574299]  kasan_save_track+0x20/0x40
[   26.574441]  kasan_save_alloc_info+0x40/0x58
[   26.574621]  __kasan_kmalloc+0xd4/0xd8
[   26.574728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.574845]  kasan_atomics+0xb8/0x2e0
[   26.575454]  kunit_try_run_case+0x170/0x3f0
[   26.575808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.576202]  kthread+0x328/0x630
[   26.576496]  ret_from_fork+0x10/0x20
[   26.576735] 
[   26.576806] The buggy address belongs to the object at fff00000c7733980
[   26.576806]  which belongs to the cache kmalloc-64 of size 64
[   26.576975] The buggy address is located 0 bytes to the right of
[   26.576975]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.577156] 
[   26.577211] The buggy address belongs to the physical page:
[   26.577299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.577447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.577583] page_type: f5(slab)
[   26.577686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.578780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.578957] page dumped because: kasan: bad access detected
[   26.579082] 
[   26.579147] Memory state around the buggy address:
[   26.579242]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.579336]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.579454] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.579555]                                      ^
[   26.580121]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.580249]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.581211] ==================================================================
[   26.387395] ==================================================================
[   26.387608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   26.387788] Read of size 4 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.387977] 
[   26.388099] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.388412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.388518] Hardware name: linux,dummy-virt (DT)
[   26.388641] Call trace:
[   26.388730]  show_stack+0x20/0x38 (C)
[   26.388908]  dump_stack_lvl+0x8c/0xd0
[   26.389046]  print_report+0x118/0x608
[   26.389140]  kasan_report+0xdc/0x128
[   26.389626]  __asan_report_load4_noabort+0x20/0x30
[   26.389800]  kasan_atomics_helper+0x3dd8/0x4858
[   26.389964]  kasan_atomics+0x198/0x2e0
[   26.390155]  kunit_try_run_case+0x170/0x3f0
[   26.390302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.390520]  kthread+0x328/0x630
[   26.390667]  ret_from_fork+0x10/0x20
[   26.390905] 
[   26.391087] Allocated by task 269:
[   26.391348]  kasan_save_stack+0x3c/0x68
[   26.391710]  kasan_save_track+0x20/0x40
[   26.391922]  kasan_save_alloc_info+0x40/0x58
[   26.392022]  __kasan_kmalloc+0xd4/0xd8
[   26.392272]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.392595]  kasan_atomics+0xb8/0x2e0
[   26.393130]  kunit_try_run_case+0x170/0x3f0
[   26.393418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.393635]  kthread+0x328/0x630
[   26.393811]  ret_from_fork+0x10/0x20
[   26.394143] 
[   26.394438] The buggy address belongs to the object at fff00000c7733980
[   26.394438]  which belongs to the cache kmalloc-64 of size 64
[   26.394765] The buggy address is located 0 bytes to the right of
[   26.394765]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.394962] 
[   26.395231] The buggy address belongs to the physical page:
[   26.395381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.395742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.396045] page_type: f5(slab)
[   26.396307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.396442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.397303] page dumped because: kasan: bad access detected
[   26.397529] 
[   26.397561] Memory state around the buggy address:
[   26.397612]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.397671]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.397722] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.397768]                                      ^
[   26.397813]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.397866]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.397911] ==================================================================
[   26.512783] ==================================================================
[   26.513037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   26.513165] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.513299] 
[   26.513396] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.513627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.513703] Hardware name: linux,dummy-virt (DT)
[   26.513787] Call trace:
[   26.513853]  show_stack+0x20/0x38 (C)
[   26.513976]  dump_stack_lvl+0x8c/0xd0
[   26.516299]  print_report+0x118/0x608
[   26.516810]  kasan_report+0xdc/0x128
[   26.517123]  kasan_check_range+0x100/0x1a8
[   26.517264]  __kasan_check_write+0x20/0x30
[   26.517925]  kasan_atomics_helper+0x10c0/0x4858
[   26.518335]  kasan_atomics+0x198/0x2e0
[   26.518537]  kunit_try_run_case+0x170/0x3f0
[   26.518678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.518850]  kthread+0x328/0x630
[   26.518958]  ret_from_fork+0x10/0x20
[   26.519586] 
[   26.519665] Allocated by task 269:
[   26.519770]  kasan_save_stack+0x3c/0x68
[   26.519886]  kasan_save_track+0x20/0x40
[   26.519984]  kasan_save_alloc_info+0x40/0x58
[   26.520083]  __kasan_kmalloc+0xd4/0xd8
[   26.520174]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.520273]  kasan_atomics+0xb8/0x2e0
[   26.520357]  kunit_try_run_case+0x170/0x3f0
[   26.520450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.520544]  kthread+0x328/0x630
[   26.520625]  ret_from_fork+0x10/0x20
[   26.520714] 
[   26.520767] The buggy address belongs to the object at fff00000c7733980
[   26.520767]  which belongs to the cache kmalloc-64 of size 64
[   26.520918] The buggy address is located 0 bytes to the right of
[   26.520918]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.521078] 
[   26.521129] The buggy address belongs to the physical page:
[   26.522049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.522505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.523340] page_type: f5(slab)
[   26.523472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.524303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.524769] page dumped because: kasan: bad access detected
[   26.525151] 
[   26.525217] Memory state around the buggy address:
[   26.525310]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.525451]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.526167] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.526308]                                      ^
[   26.527065]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.527456]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.527963] ==================================================================
[   26.641757] ==================================================================
[   26.641887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   26.642028] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.642160] 
[   26.642247] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.642497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.642576] Hardware name: linux,dummy-virt (DT)
[   26.642660] Call trace:
[   26.642727]  show_stack+0x20/0x38 (C)
[   26.642864]  dump_stack_lvl+0x8c/0xd0
[   26.643948]  print_report+0x118/0x608
[   26.644343]  kasan_report+0xdc/0x128
[   26.645647]  kasan_check_range+0x100/0x1a8
[   26.645800]  __kasan_check_write+0x20/0x30
[   26.645902]  kasan_atomics_helper+0x14e4/0x4858
[   26.645963]  kasan_atomics+0x198/0x2e0
[   26.646014]  kunit_try_run_case+0x170/0x3f0
[   26.646078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.646140]  kthread+0x328/0x630
[   26.646193]  ret_from_fork+0x10/0x20
[   26.646254] 
[   26.646279] Allocated by task 269:
[   26.646340]  kasan_save_stack+0x3c/0x68
[   26.646398]  kasan_save_track+0x20/0x40
[   26.646498]  kasan_save_alloc_info+0x40/0x58
[   26.646582]  __kasan_kmalloc+0xd4/0xd8
[   26.646680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.646808]  kasan_atomics+0xb8/0x2e0
[   26.646906]  kunit_try_run_case+0x170/0x3f0
[   26.647013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.647131]  kthread+0x328/0x630
[   26.647225]  ret_from_fork+0x10/0x20
[   26.647323] 
[   26.647382] The buggy address belongs to the object at fff00000c7733980
[   26.647382]  which belongs to the cache kmalloc-64 of size 64
[   26.647563] The buggy address is located 0 bytes to the right of
[   26.647563]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.647760] 
[   26.647822] The buggy address belongs to the physical page:
[   26.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.648079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.648224] page_type: f5(slab)
[   26.648348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.648899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.650013] page dumped because: kasan: bad access detected
[   26.650245] 
[   26.650914] Memory state around the buggy address:
[   26.651269]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.651658]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.651826] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.651973]                                      ^
[   26.652105]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652264]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652381] ==================================================================
[   26.756055] ==================================================================
[   26.756169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   26.756284] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.756396] 
[   26.758048] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.758236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.758317] Hardware name: linux,dummy-virt (DT)
[   26.759971] Call trace:
[   26.760057]  show_stack+0x20/0x38 (C)
[   26.760192]  dump_stack_lvl+0x8c/0xd0
[   26.760296]  print_report+0x118/0x608
[   26.760383]  kasan_report+0xdc/0x128
[   26.760490]  kasan_check_range+0x100/0x1a8
[   26.760578]  __kasan_check_write+0x20/0x30
[   26.760674]  kasan_atomics_helper+0x17ec/0x4858
[   26.762199]  kasan_atomics+0x198/0x2e0
[   26.762612]  kunit_try_run_case+0x170/0x3f0
[   26.762801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.763028]  kthread+0x328/0x630
[   26.763133]  ret_from_fork+0x10/0x20
[   26.763283] 
[   26.763325] Allocated by task 269:
[   26.763395]  kasan_save_stack+0x3c/0x68
[   26.763508]  kasan_save_track+0x20/0x40
[   26.763624]  kasan_save_alloc_info+0x40/0x58
[   26.763754]  __kasan_kmalloc+0xd4/0xd8
[   26.763874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.764015]  kasan_atomics+0xb8/0x2e0
[   26.764129]  kunit_try_run_case+0x170/0x3f0
[   26.764221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.764327]  kthread+0x328/0x630
[   26.764441]  ret_from_fork+0x10/0x20
[   26.764539] 
[   26.764588] The buggy address belongs to the object at fff00000c7733980
[   26.764588]  which belongs to the cache kmalloc-64 of size 64
[   26.764723] The buggy address is located 0 bytes to the right of
[   26.764723]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.764882] 
[   26.764950] The buggy address belongs to the physical page:
[   26.765065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.765241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.765420] page_type: f5(slab)
[   26.765501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.765638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.765757] page dumped because: kasan: bad access detected
[   26.765825] 
[   26.765866] Memory state around the buggy address:
[   26.765940]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.766046]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.766161] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.766274]                                      ^
[   26.766449]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.766585]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.766700] ==================================================================
[   26.560295] ==================================================================
[   26.560521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   26.560769] Write of size 8 at addr fff00000c77339b0 by task kunit_try_catch/269
[   26.561560] 
[   26.561866] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   26.562369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.562470] Hardware name: linux,dummy-virt (DT)
[   26.562552] Call trace:
[   26.562613]  show_stack+0x20/0x38 (C)
[   26.562751]  dump_stack_lvl+0x8c/0xd0
[   26.562878]  print_report+0x118/0x608
[   26.562998]  kasan_report+0xdc/0x128
[   26.563112]  kasan_check_range+0x100/0x1a8
[   26.563242]  __kasan_check_write+0x20/0x30
[   26.563370]  kasan_atomics_helper+0x126c/0x4858
[   26.563517]  kasan_atomics+0x198/0x2e0
[   26.563638]  kunit_try_run_case+0x170/0x3f0
[   26.563767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.563914]  kthread+0x328/0x630
[   26.564035]  ret_from_fork+0x10/0x20
[   26.564163] 
[   26.564216] Allocated by task 269:
[   26.564300]  kasan_save_stack+0x3c/0x68
[   26.565415]  kasan_save_track+0x20/0x40
[   26.566180]  kasan_save_alloc_info+0x40/0x58
[   26.566296]  __kasan_kmalloc+0xd4/0xd8
[   26.566394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.566507]  kasan_atomics+0xb8/0x2e0
[   26.566581]  kunit_try_run_case+0x170/0x3f0
[   26.566669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.566765]  kthread+0x328/0x630
[   26.566840]  ret_from_fork+0x10/0x20
[   26.566913] 
[   26.566954] The buggy address belongs to the object at fff00000c7733980
[   26.566954]  which belongs to the cache kmalloc-64 of size 64
[   26.567088] The buggy address is located 0 bytes to the right of
[   26.567088]  allocated 48-byte region [fff00000c7733980, fff00000c77339b0)
[   26.567502] 
[   26.567562] The buggy address belongs to the physical page:
[   26.567664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107733
[   26.567868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.568031] page_type: f5(slab)
[   26.568142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.568279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.568379] page dumped because: kasan: bad access detected
[   26.568473] 
[   26.568522] Memory state around the buggy address:
[   26.568607]  fff00000c7733880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.569654]  fff00000c7733900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.569806] >fff00000c7733980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.569912]                                      ^
[   26.570233]  fff00000c7733a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.570458]  fff00000c7733a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.570557] ==================================================================

[   18.142896] ==================================================================
[   18.143749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   18.144375] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.144979] 
[   18.145212] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.145314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.145344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.145393] Call Trace:
[   18.145437]  <TASK>
[   18.145479]  dump_stack_lvl+0x73/0xb0
[   18.145546]  print_report+0xd1/0x650
[   18.145609]  ? __virt_addr_valid+0x1db/0x2d0
[   18.145656]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.145709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.145763]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.145811]  kasan_report+0x141/0x180
[   18.145861]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.145931]  __asan_report_load8_noabort+0x18/0x20
[   18.145980]  kasan_atomics_helper+0x4fb2/0x5450
[   18.146030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.146081]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.146123]  ? ret_from_fork_asm+0x1a/0x30
[   18.146165]  ? kasan_atomics+0x152/0x310
[   18.146220]  kasan_atomics+0x1dc/0x310
[   18.146264]  ? __pfx_kasan_atomics+0x10/0x10
[   18.146323]  ? __pfx_read_tsc+0x10/0x10
[   18.146365]  ? ktime_get_ts64+0x86/0x230
[   18.146425]  kunit_try_run_case+0x1a5/0x480
[   18.146492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.146538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.146598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.146652]  ? __kthread_parkme+0x82/0x180
[   18.146718]  ? preempt_count_sub+0x50/0x80
[   18.146769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.146821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.146868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.146914]  kthread+0x337/0x6f0
[   18.146961]  ? trace_preempt_on+0x20/0xc0
[   18.147024]  ? __pfx_kthread+0x10/0x10
[   18.147066]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.147112]  ? calculate_sigpending+0x7b/0xa0
[   18.147176]  ? __pfx_kthread+0x10/0x10
[   18.147219]  ret_from_fork+0x41/0x80
[   18.147281]  ? __pfx_kthread+0x10/0x10
[   18.147324]  ret_from_fork_asm+0x1a/0x30
[   18.147397]  </TASK>
[   18.147427] 
[   18.156925] Allocated by task 285:
[   18.157280]  kasan_save_stack+0x45/0x70
[   18.157673]  kasan_save_track+0x18/0x40
[   18.158019]  kasan_save_alloc_info+0x3b/0x50
[   18.158470]  __kasan_kmalloc+0xb7/0xc0
[   18.158808]  __kmalloc_cache_noprof+0x189/0x420
[   18.159057]  kasan_atomics+0x95/0x310
[   18.159316]  kunit_try_run_case+0x1a5/0x480
[   18.159578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.161044]  kthread+0x337/0x6f0
[   18.161255]  ret_from_fork+0x41/0x80
[   18.161433]  ret_from_fork_asm+0x1a/0x30
[   18.162168] 
[   18.162326] The buggy address belongs to the object at ffff8881033b5600
[   18.162326]  which belongs to the cache kmalloc-64 of size 64
[   18.163473] The buggy address is located 0 bytes to the right of
[   18.163473]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.164243] 
[   18.164382] The buggy address belongs to the physical page:
[   18.164606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.165492] flags: 0x200000000000000(node=0|zone=2)
[   18.165820] page_type: f5(slab)
[   18.165995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.166433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.166847] page dumped because: kasan: bad access detected
[   18.167232] 
[   18.167407] Memory state around the buggy address:
[   18.167625]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168056]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168414] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.168756]                                      ^
[   18.169033]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169423]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169843] ==================================================================
[   16.980188] ==================================================================
[   16.980908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.981393] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.981784] 
[   16.982062] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.982156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.982183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.982226] Call Trace:
[   16.982292]  <TASK>
[   16.982334]  dump_stack_lvl+0x73/0xb0
[   16.982447]  print_report+0xd1/0x650
[   16.982501]  ? __virt_addr_valid+0x1db/0x2d0
[   16.982547]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.982598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.982642]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.982743]  kasan_report+0x141/0x180
[   16.982807]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.982857]  __asan_report_load4_noabort+0x18/0x20
[   16.982894]  kasan_atomics_helper+0x4a84/0x5450
[   16.982931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.982956]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.982978]  ? ret_from_fork_asm+0x1a/0x30
[   16.983001]  ? kasan_atomics+0x152/0x310
[   16.983024]  kasan_atomics+0x1dc/0x310
[   16.983044]  ? __pfx_kasan_atomics+0x10/0x10
[   16.983065]  ? __pfx_read_tsc+0x10/0x10
[   16.983087]  ? ktime_get_ts64+0x86/0x230
[   16.983115]  kunit_try_run_case+0x1a5/0x480
[   16.983164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.983220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.983247]  ? __kthread_parkme+0x82/0x180
[   16.983273]  ? preempt_count_sub+0x50/0x80
[   16.983302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.983357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.983382]  kthread+0x337/0x6f0
[   16.983401]  ? trace_preempt_on+0x20/0xc0
[   16.983427]  ? __pfx_kthread+0x10/0x10
[   16.983446]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.983467]  ? calculate_sigpending+0x7b/0xa0
[   16.983492]  ? __pfx_kthread+0x10/0x10
[   16.983511]  ret_from_fork+0x41/0x80
[   16.983533]  ? __pfx_kthread+0x10/0x10
[   16.983552]  ret_from_fork_asm+0x1a/0x30
[   16.983604]  </TASK>
[   16.983620] 
[   16.993915] Allocated by task 285:
[   16.994322]  kasan_save_stack+0x45/0x70
[   16.994691]  kasan_save_track+0x18/0x40
[   16.995085]  kasan_save_alloc_info+0x3b/0x50
[   16.995349]  __kasan_kmalloc+0xb7/0xc0
[   16.995544]  __kmalloc_cache_noprof+0x189/0x420
[   16.995763]  kasan_atomics+0x95/0x310
[   16.995954]  kunit_try_run_case+0x1a5/0x480
[   16.996158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.996474]  kthread+0x337/0x6f0
[   16.996811]  ret_from_fork+0x41/0x80
[   16.997129]  ret_from_fork_asm+0x1a/0x30
[   16.997458] 
[   16.997640] The buggy address belongs to the object at ffff8881033b5600
[   16.997640]  which belongs to the cache kmalloc-64 of size 64
[   16.998447] The buggy address is located 0 bytes to the right of
[   16.998447]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.999598] 
[   16.999826] The buggy address belongs to the physical page:
[   17.000168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.000713] flags: 0x200000000000000(node=0|zone=2)
[   17.000972] page_type: f5(slab)
[   17.001316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.001855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.002246] page dumped because: kasan: bad access detected
[   17.002597] 
[   17.002784] Memory state around the buggy address:
[   17.003231]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.003655]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.004076] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.004466]                                      ^
[   17.004872]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.005236]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.005707] ==================================================================
[   17.145568] ==================================================================
[   17.146136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   17.146453] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.146925] 
[   17.147139] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.147248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.147283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.147332] Call Trace:
[   17.147378]  <TASK>
[   17.147422]  dump_stack_lvl+0x73/0xb0
[   17.147493]  print_report+0xd1/0x650
[   17.147549]  ? __virt_addr_valid+0x1db/0x2d0
[   17.147616]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.147663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.147715]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.147769]  kasan_report+0x141/0x180
[   17.147826]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.147889]  __asan_report_load4_noabort+0x18/0x20
[   17.147941]  kasan_atomics_helper+0x4a36/0x5450
[   17.147997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.148046]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.148091]  ? ret_from_fork_asm+0x1a/0x30
[   17.148136]  ? kasan_atomics+0x152/0x310
[   17.148187]  kasan_atomics+0x1dc/0x310
[   17.148231]  ? __pfx_kasan_atomics+0x10/0x10
[   17.148278]  ? __pfx_read_tsc+0x10/0x10
[   17.148322]  ? ktime_get_ts64+0x86/0x230
[   17.148372]  kunit_try_run_case+0x1a5/0x480
[   17.148416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.148456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.148493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.148531]  ? __kthread_parkme+0x82/0x180
[   17.148584]  ? preempt_count_sub+0x50/0x80
[   17.148641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.148689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.148754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.148804]  kthread+0x337/0x6f0
[   17.148843]  ? trace_preempt_on+0x20/0xc0
[   17.148894]  ? __pfx_kthread+0x10/0x10
[   17.148936]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.148982]  ? calculate_sigpending+0x7b/0xa0
[   17.149030]  ? __pfx_kthread+0x10/0x10
[   17.149073]  ret_from_fork+0x41/0x80
[   17.149118]  ? __pfx_kthread+0x10/0x10
[   17.149160]  ret_from_fork_asm+0x1a/0x30
[   17.149218]  </TASK>
[   17.149252] 
[   17.158947] Allocated by task 285:
[   17.159196]  kasan_save_stack+0x45/0x70
[   17.159546]  kasan_save_track+0x18/0x40
[   17.160036]  kasan_save_alloc_info+0x3b/0x50
[   17.160261]  __kasan_kmalloc+0xb7/0xc0
[   17.160447]  __kmalloc_cache_noprof+0x189/0x420
[   17.160799]  kasan_atomics+0x95/0x310
[   17.161106]  kunit_try_run_case+0x1a5/0x480
[   17.161476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.161986]  kthread+0x337/0x6f0
[   17.162308]  ret_from_fork+0x41/0x80
[   17.162634]  ret_from_fork_asm+0x1a/0x30
[   17.162926] 
[   17.163047] The buggy address belongs to the object at ffff8881033b5600
[   17.163047]  which belongs to the cache kmalloc-64 of size 64
[   17.163606] The buggy address is located 0 bytes to the right of
[   17.163606]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.164791] 
[   17.164941] The buggy address belongs to the physical page:
[   17.165155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.165738] flags: 0x200000000000000(node=0|zone=2)
[   17.166146] page_type: f5(slab)
[   17.166351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.166717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.167141] page dumped because: kasan: bad access detected
[   17.168278] 
[   17.168396] Memory state around the buggy address:
[   17.168595]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.168839]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.169061] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.169275]                                      ^
[   17.169431]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.169762]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.170045] ==================================================================
[   17.064390] ==================================================================
[   17.064780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   17.065409] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.066205] 
[   17.066732] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.066799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.066815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.066848] Call Trace:
[   17.066886]  <TASK>
[   17.066924]  dump_stack_lvl+0x73/0xb0
[   17.067010]  print_report+0xd1/0x650
[   17.067040]  ? __virt_addr_valid+0x1db/0x2d0
[   17.067067]  ? kasan_atomics_helper+0xe78/0x5450
[   17.067103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.067138]  ? kasan_atomics_helper+0xe78/0x5450
[   17.067166]  kasan_report+0x141/0x180
[   17.067190]  ? kasan_atomics_helper+0xe78/0x5450
[   17.067218]  kasan_check_range+0x10c/0x1c0
[   17.067241]  __kasan_check_write+0x18/0x20
[   17.067263]  kasan_atomics_helper+0xe78/0x5450
[   17.067288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.067314]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.067336]  ? ret_from_fork_asm+0x1a/0x30
[   17.067359]  ? kasan_atomics+0x152/0x310
[   17.067383]  kasan_atomics+0x1dc/0x310
[   17.067403]  ? __pfx_kasan_atomics+0x10/0x10
[   17.067424]  ? __pfx_read_tsc+0x10/0x10
[   17.067445]  ? ktime_get_ts64+0x86/0x230
[   17.067472]  kunit_try_run_case+0x1a5/0x480
[   17.067499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.067522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.067547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.067590]  ? __kthread_parkme+0x82/0x180
[   17.067614]  ? preempt_count_sub+0x50/0x80
[   17.067641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.067677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.067705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.067729]  kthread+0x337/0x6f0
[   17.067746]  ? trace_preempt_on+0x20/0xc0
[   17.067770]  ? __pfx_kthread+0x10/0x10
[   17.067789]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.067811]  ? calculate_sigpending+0x7b/0xa0
[   17.067834]  ? __pfx_kthread+0x10/0x10
[   17.067853]  ret_from_fork+0x41/0x80
[   17.067874]  ? __pfx_kthread+0x10/0x10
[   17.067893]  ret_from_fork_asm+0x1a/0x30
[   17.067922]  </TASK>
[   17.067935] 
[   17.079186] Allocated by task 285:
[   17.079349]  kasan_save_stack+0x45/0x70
[   17.079512]  kasan_save_track+0x18/0x40
[   17.081303]  kasan_save_alloc_info+0x3b/0x50
[   17.081737]  __kasan_kmalloc+0xb7/0xc0
[   17.082075]  __kmalloc_cache_noprof+0x189/0x420
[   17.082443]  kasan_atomics+0x95/0x310
[   17.082754]  kunit_try_run_case+0x1a5/0x480
[   17.083160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.083531]  kthread+0x337/0x6f0
[   17.083786]  ret_from_fork+0x41/0x80
[   17.084432]  ret_from_fork_asm+0x1a/0x30
[   17.084665] 
[   17.085115] The buggy address belongs to the object at ffff8881033b5600
[   17.085115]  which belongs to the cache kmalloc-64 of size 64
[   17.085733] The buggy address is located 0 bytes to the right of
[   17.085733]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.086423] 
[   17.086616] The buggy address belongs to the physical page:
[   17.087486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.088162] flags: 0x200000000000000(node=0|zone=2)
[   17.088448] page_type: f5(slab)
[   17.088621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.089396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.089741] page dumped because: kasan: bad access detected
[   17.090100] 
[   17.090267] Memory state around the buggy address:
[   17.090594]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.091455]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.091822] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.092240]                                      ^
[   17.092755]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.092989]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.093487] ==================================================================
[   17.687688] ==================================================================
[   17.688388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.689000] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.689275] 
[   17.689913] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.689995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.690013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.690038] Call Trace:
[   17.690064]  <TASK>
[   17.690089]  dump_stack_lvl+0x73/0xb0
[   17.690132]  print_report+0xd1/0x650
[   17.690159]  ? __virt_addr_valid+0x1db/0x2d0
[   17.690186]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.690210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.690234]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.690259]  kasan_report+0x141/0x180
[   17.690283]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.690312]  kasan_check_range+0x10c/0x1c0
[   17.690334]  __kasan_check_write+0x18/0x20
[   17.690356]  kasan_atomics_helper+0x18b1/0x5450
[   17.690380]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.690404]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.690426]  ? ret_from_fork_asm+0x1a/0x30
[   17.690449]  ? kasan_atomics+0x152/0x310
[   17.690474]  kasan_atomics+0x1dc/0x310
[   17.690494]  ? __pfx_kasan_atomics+0x10/0x10
[   17.690517]  ? __pfx_read_tsc+0x10/0x10
[   17.690539]  ? ktime_get_ts64+0x86/0x230
[   17.690588]  kunit_try_run_case+0x1a5/0x480
[   17.690619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.690684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.690711]  ? __kthread_parkme+0x82/0x180
[   17.690736]  ? preempt_count_sub+0x50/0x80
[   17.690764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.690817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.690843]  kthread+0x337/0x6f0
[   17.690864]  ? trace_preempt_on+0x20/0xc0
[   17.690892]  ? __pfx_kthread+0x10/0x10
[   17.690913]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.690937]  ? calculate_sigpending+0x7b/0xa0
[   17.690962]  ? __pfx_kthread+0x10/0x10
[   17.690984]  ret_from_fork+0x41/0x80
[   17.691008]  ? __pfx_kthread+0x10/0x10
[   17.691029]  ret_from_fork_asm+0x1a/0x30
[   17.691062]  </TASK>
[   17.691077] 
[   17.703902] Allocated by task 285:
[   17.704152]  kasan_save_stack+0x45/0x70
[   17.704395]  kasan_save_track+0x18/0x40
[   17.705809]  kasan_save_alloc_info+0x3b/0x50
[   17.707688]  __kasan_kmalloc+0xb7/0xc0
[   17.708269]  __kmalloc_cache_noprof+0x189/0x420
[   17.708752]  kasan_atomics+0x95/0x310
[   17.709517]  kunit_try_run_case+0x1a5/0x480
[   17.710139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.711119]  kthread+0x337/0x6f0
[   17.711506]  ret_from_fork+0x41/0x80
[   17.712575]  ret_from_fork_asm+0x1a/0x30
[   17.713178] 
[   17.713295] The buggy address belongs to the object at ffff8881033b5600
[   17.713295]  which belongs to the cache kmalloc-64 of size 64
[   17.715064] The buggy address is located 0 bytes to the right of
[   17.715064]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.716807] 
[   17.717156] The buggy address belongs to the physical page:
[   17.717655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.718190] flags: 0x200000000000000(node=0|zone=2)
[   17.718477] page_type: f5(slab)
[   17.719163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.719511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.720193] page dumped because: kasan: bad access detected
[   17.720861] 
[   17.720986] Memory state around the buggy address:
[   17.721466]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.721912]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.722583] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.723198]                                      ^
[   17.723513]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.723984]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.724370] ==================================================================
[   17.094442] ==================================================================
[   17.094865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   17.095436] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.096068] 
[   17.096290] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.096395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.096431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.096467] Call Trace:
[   17.096505]  <TASK>
[   17.096542]  dump_stack_lvl+0x73/0xb0
[   17.096620]  print_report+0xd1/0x650
[   17.096678]  ? __virt_addr_valid+0x1db/0x2d0
[   17.096728]  ? kasan_atomics_helper+0xf10/0x5450
[   17.096776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.096826]  ? kasan_atomics_helper+0xf10/0x5450
[   17.096874]  kasan_report+0x141/0x180
[   17.096915]  ? kasan_atomics_helper+0xf10/0x5450
[   17.096967]  kasan_check_range+0x10c/0x1c0
[   17.097012]  __kasan_check_write+0x18/0x20
[   17.097056]  kasan_atomics_helper+0xf10/0x5450
[   17.097108]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.097182]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.097246]  ? ret_from_fork_asm+0x1a/0x30
[   17.097299]  ? kasan_atomics+0x152/0x310
[   17.097353]  kasan_atomics+0x1dc/0x310
[   17.097398]  ? __pfx_kasan_atomics+0x10/0x10
[   17.097446]  ? __pfx_read_tsc+0x10/0x10
[   17.097491]  ? ktime_get_ts64+0x86/0x230
[   17.097539]  kunit_try_run_case+0x1a5/0x480
[   17.097600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.097643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.097728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.097790]  ? __kthread_parkme+0x82/0x180
[   17.097835]  ? preempt_count_sub+0x50/0x80
[   17.097886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.097948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.098011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.098055]  kthread+0x337/0x6f0
[   17.098088]  ? trace_preempt_on+0x20/0xc0
[   17.098117]  ? __pfx_kthread+0x10/0x10
[   17.098136]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.098158]  ? calculate_sigpending+0x7b/0xa0
[   17.098182]  ? __pfx_kthread+0x10/0x10
[   17.098201]  ret_from_fork+0x41/0x80
[   17.098223]  ? __pfx_kthread+0x10/0x10
[   17.098242]  ret_from_fork_asm+0x1a/0x30
[   17.098271]  </TASK>
[   17.098286] 
[   17.107468] Allocated by task 285:
[   17.107795]  kasan_save_stack+0x45/0x70
[   17.108149]  kasan_save_track+0x18/0x40
[   17.108475]  kasan_save_alloc_info+0x3b/0x50
[   17.108848]  __kasan_kmalloc+0xb7/0xc0
[   17.109159]  __kmalloc_cache_noprof+0x189/0x420
[   17.109510]  kasan_atomics+0x95/0x310
[   17.109852]  kunit_try_run_case+0x1a5/0x480
[   17.110180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.110505]  kthread+0x337/0x6f0
[   17.110815]  ret_from_fork+0x41/0x80
[   17.111020]  ret_from_fork_asm+0x1a/0x30
[   17.111328] 
[   17.111539] The buggy address belongs to the object at ffff8881033b5600
[   17.111539]  which belongs to the cache kmalloc-64 of size 64
[   17.112247] The buggy address is located 0 bytes to the right of
[   17.112247]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.112903] 
[   17.113088] The buggy address belongs to the physical page:
[   17.113390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.113897] flags: 0x200000000000000(node=0|zone=2)
[   17.114219] page_type: f5(slab)
[   17.114493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.114789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.115052] page dumped because: kasan: bad access detected
[   17.115270] 
[   17.115385] Memory state around the buggy address:
[   17.115771]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.116289]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.116814] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.117311]                                      ^
[   17.117680]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.118172]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.118747] ==================================================================
[   16.511384] ==================================================================
[   16.511776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.512687] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.513046] 
[   16.513301] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.513479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.513707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.513737] Call Trace:
[   16.513764]  <TASK>
[   16.513788]  dump_stack_lvl+0x73/0xb0
[   16.513830]  print_report+0xd1/0x650
[   16.513858]  ? __virt_addr_valid+0x1db/0x2d0
[   16.513884]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.513909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.513934]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.513960]  kasan_report+0x141/0x180
[   16.513985]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.514014]  kasan_check_range+0x10c/0x1c0
[   16.514038]  __kasan_check_write+0x18/0x20
[   16.514062]  kasan_atomics_helper+0x4a0/0x5450
[   16.514088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.514114]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.514139]  ? ret_from_fork_asm+0x1a/0x30
[   16.514164]  ? kasan_atomics+0x152/0x310
[   16.514190]  kasan_atomics+0x1dc/0x310
[   16.514212]  ? __pfx_kasan_atomics+0x10/0x10
[   16.514235]  ? __pfx_read_tsc+0x10/0x10
[   16.514259]  ? ktime_get_ts64+0x86/0x230
[   16.514289]  kunit_try_run_case+0x1a5/0x480
[   16.514318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.514344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.514371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.514398]  ? __kthread_parkme+0x82/0x180
[   16.514423]  ? preempt_count_sub+0x50/0x80
[   16.514451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.514479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.514505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.514532]  kthread+0x337/0x6f0
[   16.514552]  ? trace_preempt_on+0x20/0xc0
[   16.514732]  ? __pfx_kthread+0x10/0x10
[   16.514765]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.514796]  ? calculate_sigpending+0x7b/0xa0
[   16.514828]  ? __pfx_kthread+0x10/0x10
[   16.514851]  ret_from_fork+0x41/0x80
[   16.514885]  ? __pfx_kthread+0x10/0x10
[   16.514906]  ret_from_fork_asm+0x1a/0x30
[   16.514942]  </TASK>
[   16.514958] 
[   16.526289] Allocated by task 285:
[   16.526446]  kasan_save_stack+0x45/0x70
[   16.527341]  kasan_save_track+0x18/0x40
[   16.527511]  kasan_save_alloc_info+0x3b/0x50
[   16.527675]  __kasan_kmalloc+0xb7/0xc0
[   16.528000]  __kmalloc_cache_noprof+0x189/0x420
[   16.528317]  kasan_atomics+0x95/0x310
[   16.529147]  kunit_try_run_case+0x1a5/0x480
[   16.529376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.529603]  kthread+0x337/0x6f0
[   16.530338]  ret_from_fork+0x41/0x80
[   16.531318]  ret_from_fork_asm+0x1a/0x30
[   16.531538] 
[   16.532008] The buggy address belongs to the object at ffff8881033b5600
[   16.532008]  which belongs to the cache kmalloc-64 of size 64
[   16.532574] The buggy address is located 0 bytes to the right of
[   16.532574]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.533328] 
[   16.533432] The buggy address belongs to the physical page:
[   16.534128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.535396] flags: 0x200000000000000(node=0|zone=2)
[   16.535846] page_type: f5(slab)
[   16.536072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.536395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.536601] page dumped because: kasan: bad access detected
[   16.537195] 
[   16.537299] Memory state around the buggy address:
[   16.537465]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.538197]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.538482] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.538755]                                      ^
[   16.539816]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.540800]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.541114] ==================================================================
[   17.783249] ==================================================================
[   17.784000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.784306] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.784704] 
[   17.784919] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.785017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.785050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.785098] Call Trace:
[   17.785145]  <TASK>
[   17.785187]  dump_stack_lvl+0x73/0xb0
[   17.785254]  print_report+0xd1/0x650
[   17.785306]  ? __virt_addr_valid+0x1db/0x2d0
[   17.785357]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.785406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.785458]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.785509]  kasan_report+0x141/0x180
[   17.785572]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.785633]  kasan_check_range+0x10c/0x1c0
[   17.785682]  __kasan_check_write+0x18/0x20
[   17.785731]  kasan_atomics_helper+0x1a7f/0x5450
[   17.785781]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.785829]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.785869]  ? ret_from_fork_asm+0x1a/0x30
[   17.785906]  ? kasan_atomics+0x152/0x310
[   17.785947]  kasan_atomics+0x1dc/0x310
[   17.785978]  ? __pfx_kasan_atomics+0x10/0x10
[   17.786013]  ? __pfx_read_tsc+0x10/0x10
[   17.786049]  ? ktime_get_ts64+0x86/0x230
[   17.786095]  kunit_try_run_case+0x1a5/0x480
[   17.786151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.786194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.786259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.786309]  ? __kthread_parkme+0x82/0x180
[   17.786355]  ? preempt_count_sub+0x50/0x80
[   17.786408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.786460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.786510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.786569]  kthread+0x337/0x6f0
[   17.786611]  ? trace_preempt_on+0x20/0xc0
[   17.786660]  ? __pfx_kthread+0x10/0x10
[   17.786699]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.786744]  ? calculate_sigpending+0x7b/0xa0
[   17.786793]  ? __pfx_kthread+0x10/0x10
[   17.786830]  ret_from_fork+0x41/0x80
[   17.786889]  ? __pfx_kthread+0x10/0x10
[   17.786930]  ret_from_fork_asm+0x1a/0x30
[   17.786996]  </TASK>
[   17.787026] 
[   17.797286] Allocated by task 285:
[   17.797625]  kasan_save_stack+0x45/0x70
[   17.798001]  kasan_save_track+0x18/0x40
[   17.798277]  kasan_save_alloc_info+0x3b/0x50
[   17.798467]  __kasan_kmalloc+0xb7/0xc0
[   17.798649]  __kmalloc_cache_noprof+0x189/0x420
[   17.798842]  kasan_atomics+0x95/0x310
[   17.799015]  kunit_try_run_case+0x1a5/0x480
[   17.799231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.799659]  kthread+0x337/0x6f0
[   17.799939]  ret_from_fork+0x41/0x80
[   17.800240]  ret_from_fork_asm+0x1a/0x30
[   17.800556] 
[   17.800731] The buggy address belongs to the object at ffff8881033b5600
[   17.800731]  which belongs to the cache kmalloc-64 of size 64
[   17.801512] The buggy address is located 0 bytes to the right of
[   17.801512]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.802471] 
[   17.802588] The buggy address belongs to the physical page:
[   17.803145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.803487] flags: 0x200000000000000(node=0|zone=2)
[   17.803763] page_type: f5(slab)
[   17.804059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.804624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.805001] page dumped because: kasan: bad access detected
[   17.805217] 
[   17.805327] Memory state around the buggy address:
[   17.805526]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.805996]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.806507] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.807206]                                      ^
[   17.807529]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.807956]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.808323] ==================================================================
[   17.866126] ==================================================================
[   17.866484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.867770] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.868013] 
[   17.868142] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.868226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.868250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.868286] Call Trace:
[   17.868324]  <TASK>
[   17.868359]  dump_stack_lvl+0x73/0xb0
[   17.868416]  print_report+0xd1/0x650
[   17.868454]  ? __virt_addr_valid+0x1db/0x2d0
[   17.868489]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.868523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.868553]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.868603]  kasan_report+0x141/0x180
[   17.868627]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.868653]  __asan_report_load8_noabort+0x18/0x20
[   17.868675]  kasan_atomics_helper+0x4f30/0x5450
[   17.868698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.868721]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.868742]  ? ret_from_fork_asm+0x1a/0x30
[   17.868764]  ? kasan_atomics+0x152/0x310
[   17.868787]  kasan_atomics+0x1dc/0x310
[   17.868806]  ? __pfx_kasan_atomics+0x10/0x10
[   17.868827]  ? __pfx_read_tsc+0x10/0x10
[   17.868847]  ? ktime_get_ts64+0x86/0x230
[   17.868874]  kunit_try_run_case+0x1a5/0x480
[   17.868900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.868922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.868947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.868970]  ? __kthread_parkme+0x82/0x180
[   17.868992]  ? preempt_count_sub+0x50/0x80
[   17.869017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.869042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.869066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.869088]  kthread+0x337/0x6f0
[   17.869106]  ? trace_preempt_on+0x20/0xc0
[   17.869130]  ? __pfx_kthread+0x10/0x10
[   17.869149]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.869170]  ? calculate_sigpending+0x7b/0xa0
[   17.869193]  ? __pfx_kthread+0x10/0x10
[   17.869214]  ret_from_fork+0x41/0x80
[   17.869234]  ? __pfx_kthread+0x10/0x10
[   17.869253]  ret_from_fork_asm+0x1a/0x30
[   17.869281]  </TASK>
[   17.869295] 
[   17.881584] Allocated by task 285:
[   17.882016]  kasan_save_stack+0x45/0x70
[   17.882260]  kasan_save_track+0x18/0x40
[   17.882542]  kasan_save_alloc_info+0x3b/0x50
[   17.882799]  __kasan_kmalloc+0xb7/0xc0
[   17.883362]  __kmalloc_cache_noprof+0x189/0x420
[   17.883590]  kasan_atomics+0x95/0x310
[   17.884049]  kunit_try_run_case+0x1a5/0x480
[   17.884514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.884859]  kthread+0x337/0x6f0
[   17.885016]  ret_from_fork+0x41/0x80
[   17.885300]  ret_from_fork_asm+0x1a/0x30
[   17.885519] 
[   17.885688] The buggy address belongs to the object at ffff8881033b5600
[   17.885688]  which belongs to the cache kmalloc-64 of size 64
[   17.886377] The buggy address is located 0 bytes to the right of
[   17.886377]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.887729] 
[   17.888023] The buggy address belongs to the physical page:
[   17.888209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.888444] flags: 0x200000000000000(node=0|zone=2)
[   17.888645] page_type: f5(slab)
[   17.889522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.889782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.890534] page dumped because: kasan: bad access detected
[   17.890939] 
[   17.891075] Memory state around the buggy address:
[   17.891346]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.891792]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.892439] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.893066]                                      ^
[   17.893243]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.893439]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.894310] ==================================================================
[   17.726208] ==================================================================
[   17.727002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.727513] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.728352] 
[   17.728521] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.728631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.728659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.728701] Call Trace:
[   17.728742]  <TASK>
[   17.728784]  dump_stack_lvl+0x73/0xb0
[   17.728851]  print_report+0xd1/0x650
[   17.728900]  ? __virt_addr_valid+0x1db/0x2d0
[   17.728945]  ? kasan_atomics_helper+0x194a/0x5450
[   17.728987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.729035]  ? kasan_atomics_helper+0x194a/0x5450
[   17.729074]  kasan_report+0x141/0x180
[   17.729100]  ? kasan_atomics_helper+0x194a/0x5450
[   17.729127]  kasan_check_range+0x10c/0x1c0
[   17.729148]  __kasan_check_write+0x18/0x20
[   17.729169]  kasan_atomics_helper+0x194a/0x5450
[   17.729201]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.729239]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.729264]  ? ret_from_fork_asm+0x1a/0x30
[   17.729288]  ? kasan_atomics+0x152/0x310
[   17.729312]  kasan_atomics+0x1dc/0x310
[   17.729332]  ? __pfx_kasan_atomics+0x10/0x10
[   17.729354]  ? __pfx_read_tsc+0x10/0x10
[   17.729377]  ? ktime_get_ts64+0x86/0x230
[   17.729405]  kunit_try_run_case+0x1a5/0x480
[   17.729432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.729483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.729507]  ? __kthread_parkme+0x82/0x180
[   17.729530]  ? preempt_count_sub+0x50/0x80
[   17.729556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.729627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.729654]  kthread+0x337/0x6f0
[   17.729684]  ? trace_preempt_on+0x20/0xc0
[   17.729712]  ? __pfx_kthread+0x10/0x10
[   17.729731]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.729754]  ? calculate_sigpending+0x7b/0xa0
[   17.729777]  ? __pfx_kthread+0x10/0x10
[   17.729796]  ret_from_fork+0x41/0x80
[   17.729818]  ? __pfx_kthread+0x10/0x10
[   17.729837]  ret_from_fork_asm+0x1a/0x30
[   17.729867]  </TASK>
[   17.729881] 
[   17.743892] Allocated by task 285:
[   17.744134]  kasan_save_stack+0x45/0x70
[   17.744343]  kasan_save_track+0x18/0x40
[   17.744523]  kasan_save_alloc_info+0x3b/0x50
[   17.745410]  __kasan_kmalloc+0xb7/0xc0
[   17.745600]  __kmalloc_cache_noprof+0x189/0x420
[   17.746107]  kasan_atomics+0x95/0x310
[   17.746388]  kunit_try_run_case+0x1a5/0x480
[   17.746896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.747203]  kthread+0x337/0x6f0
[   17.747491]  ret_from_fork+0x41/0x80
[   17.747756]  ret_from_fork_asm+0x1a/0x30
[   17.748300] 
[   17.748398] The buggy address belongs to the object at ffff8881033b5600
[   17.748398]  which belongs to the cache kmalloc-64 of size 64
[   17.749147] The buggy address is located 0 bytes to the right of
[   17.749147]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.750064] 
[   17.750233] The buggy address belongs to the physical page:
[   17.750527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.751541] flags: 0x200000000000000(node=0|zone=2)
[   17.751852] page_type: f5(slab)
[   17.752030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.752582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.753259] page dumped because: kasan: bad access detected
[   17.753798] 
[   17.753929] Memory state around the buggy address:
[   17.754450]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.754771]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.755375] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.755960]                                      ^
[   17.756327]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756626]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.757235] ==================================================================
[   17.949194] ==================================================================
[   17.950431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.951012] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.951548] 
[   17.952509] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.952636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.952663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.952894] Call Trace:
[   17.952940]  <TASK>
[   17.952989]  dump_stack_lvl+0x73/0xb0
[   17.953037]  print_report+0xd1/0x650
[   17.953064]  ? __virt_addr_valid+0x1db/0x2d0
[   17.953090]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.953113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.953137]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.953159]  kasan_report+0x141/0x180
[   17.953182]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.953208]  kasan_check_range+0x10c/0x1c0
[   17.953229]  __kasan_check_write+0x18/0x20
[   17.953250]  kasan_atomics_helper+0x1e12/0x5450
[   17.953273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.953297]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.953319]  ? ret_from_fork_asm+0x1a/0x30
[   17.953341]  ? kasan_atomics+0x152/0x310
[   17.953364]  kasan_atomics+0x1dc/0x310
[   17.953383]  ? __pfx_kasan_atomics+0x10/0x10
[   17.953404]  ? __pfx_read_tsc+0x10/0x10
[   17.953425]  ? ktime_get_ts64+0x86/0x230
[   17.953451]  kunit_try_run_case+0x1a5/0x480
[   17.953476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.953499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.953524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.953547]  ? __kthread_parkme+0x82/0x180
[   17.953591]  ? preempt_count_sub+0x50/0x80
[   17.953620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.953645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.953681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.953711]  kthread+0x337/0x6f0
[   17.953730]  ? trace_preempt_on+0x20/0xc0
[   17.953756]  ? __pfx_kthread+0x10/0x10
[   17.953775]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.953797]  ? calculate_sigpending+0x7b/0xa0
[   17.953820]  ? __pfx_kthread+0x10/0x10
[   17.953839]  ret_from_fork+0x41/0x80
[   17.953861]  ? __pfx_kthread+0x10/0x10
[   17.953879]  ret_from_fork_asm+0x1a/0x30
[   17.953908]  </TASK>
[   17.953922] 
[   17.964388] Allocated by task 285:
[   17.964576]  kasan_save_stack+0x45/0x70
[   17.964757]  kasan_save_track+0x18/0x40
[   17.964933]  kasan_save_alloc_info+0x3b/0x50
[   17.965267]  __kasan_kmalloc+0xb7/0xc0
[   17.965577]  __kmalloc_cache_noprof+0x189/0x420
[   17.965922]  kasan_atomics+0x95/0x310
[   17.966126]  kunit_try_run_case+0x1a5/0x480
[   17.966287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.966467]  kthread+0x337/0x6f0
[   17.966664]  ret_from_fork+0x41/0x80
[   17.967106]  ret_from_fork_asm+0x1a/0x30
[   17.967337] 
[   17.967460] The buggy address belongs to the object at ffff8881033b5600
[   17.967460]  which belongs to the cache kmalloc-64 of size 64
[   17.967926] The buggy address is located 0 bytes to the right of
[   17.967926]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.970468] 
[   17.970618] The buggy address belongs to the physical page:
[   17.970995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.971281] flags: 0x200000000000000(node=0|zone=2)
[   17.971495] page_type: f5(slab)
[   17.972166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.972749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.973040] page dumped because: kasan: bad access detected
[   17.974267] 
[   17.974486] Memory state around the buggy address:
[   17.975432]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.975753]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.976208] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.976992]                                      ^
[   17.977282]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.977512]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.978126] ==================================================================
[   18.011469] ==================================================================
[   18.012114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   18.012580] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.013277] 
[   18.013444] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.013519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.013541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.013584] Call Trace:
[   18.013622]  <TASK>
[   18.013656]  dump_stack_lvl+0x73/0xb0
[   18.013716]  print_report+0xd1/0x650
[   18.013759]  ? __virt_addr_valid+0x1db/0x2d0
[   18.013801]  ? kasan_atomics_helper+0x1f43/0x5450
[   18.013846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.013894]  ? kasan_atomics_helper+0x1f43/0x5450
[   18.013935]  kasan_report+0x141/0x180
[   18.013997]  ? kasan_atomics_helper+0x1f43/0x5450
[   18.014044]  kasan_check_range+0x10c/0x1c0
[   18.014085]  __kasan_check_write+0x18/0x20
[   18.014127]  kasan_atomics_helper+0x1f43/0x5450
[   18.014177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.014224]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.014270]  ? ret_from_fork_asm+0x1a/0x30
[   18.014318]  ? kasan_atomics+0x152/0x310
[   18.014367]  kasan_atomics+0x1dc/0x310
[   18.014412]  ? __pfx_kasan_atomics+0x10/0x10
[   18.014458]  ? __pfx_read_tsc+0x10/0x10
[   18.014500]  ? ktime_get_ts64+0x86/0x230
[   18.014544]  kunit_try_run_case+0x1a5/0x480
[   18.014599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.014642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.014686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.014750]  ? __kthread_parkme+0x82/0x180
[   18.014797]  ? preempt_count_sub+0x50/0x80
[   18.014853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.014902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.014951]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.015016]  kthread+0x337/0x6f0
[   18.015060]  ? trace_preempt_on+0x20/0xc0
[   18.015110]  ? __pfx_kthread+0x10/0x10
[   18.015155]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.015202]  ? calculate_sigpending+0x7b/0xa0
[   18.015251]  ? __pfx_kthread+0x10/0x10
[   18.015297]  ret_from_fork+0x41/0x80
[   18.015339]  ? __pfx_kthread+0x10/0x10
[   18.015376]  ret_from_fork_asm+0x1a/0x30
[   18.015440]  </TASK>
[   18.015471] 
[   18.025405] Allocated by task 285:
[   18.025632]  kasan_save_stack+0x45/0x70
[   18.025835]  kasan_save_track+0x18/0x40
[   18.025976]  kasan_save_alloc_info+0x3b/0x50
[   18.026124]  __kasan_kmalloc+0xb7/0xc0
[   18.026267]  __kmalloc_cache_noprof+0x189/0x420
[   18.026418]  kasan_atomics+0x95/0x310
[   18.026551]  kunit_try_run_case+0x1a5/0x480
[   18.028259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.028808]  kthread+0x337/0x6f0
[   18.029014]  ret_from_fork+0x41/0x80
[   18.029195]  ret_from_fork_asm+0x1a/0x30
[   18.029380] 
[   18.029494] The buggy address belongs to the object at ffff8881033b5600
[   18.029494]  which belongs to the cache kmalloc-64 of size 64
[   18.030610] The buggy address is located 0 bytes to the right of
[   18.030610]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.031157] 
[   18.031700] The buggy address belongs to the physical page:
[   18.031895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.032131] flags: 0x200000000000000(node=0|zone=2)
[   18.032303] page_type: f5(slab)
[   18.032435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.033202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.033637] page dumped because: kasan: bad access detected
[   18.034069] 
[   18.034289] Memory state around the buggy address:
[   18.034683]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.035216]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.035516] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.036006]                                      ^
[   18.036211]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.036721]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037015] ==================================================================
[   18.061652] ==================================================================
[   18.062349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   18.063027] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.063580] 
[   18.063833] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.063943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.063976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.064028] Call Trace:
[   18.064074]  <TASK>
[   18.064117]  dump_stack_lvl+0x73/0xb0
[   18.064188]  print_report+0xd1/0x650
[   18.064242]  ? __virt_addr_valid+0x1db/0x2d0
[   18.064294]  ? kasan_atomics_helper+0x2006/0x5450
[   18.064345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.064395]  ? kasan_atomics_helper+0x2006/0x5450
[   18.064443]  kasan_report+0x141/0x180
[   18.064494]  ? kasan_atomics_helper+0x2006/0x5450
[   18.064552]  kasan_check_range+0x10c/0x1c0
[   18.065336]  __kasan_check_write+0x18/0x20
[   18.066077]  kasan_atomics_helper+0x2006/0x5450
[   18.066174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.066230]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.066283]  ? ret_from_fork_asm+0x1a/0x30
[   18.066331]  ? kasan_atomics+0x152/0x310
[   18.066385]  kasan_atomics+0x1dc/0x310
[   18.066430]  ? __pfx_kasan_atomics+0x10/0x10
[   18.066480]  ? __pfx_read_tsc+0x10/0x10
[   18.066523]  ? ktime_get_ts64+0x86/0x230
[   18.066589]  kunit_try_run_case+0x1a5/0x480
[   18.066647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.066689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.066740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.066780]  ? __kthread_parkme+0x82/0x180
[   18.066807]  ? preempt_count_sub+0x50/0x80
[   18.066834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.066859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.066883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.066907]  kthread+0x337/0x6f0
[   18.066925]  ? trace_preempt_on+0x20/0xc0
[   18.066950]  ? __pfx_kthread+0x10/0x10
[   18.066969]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.066991]  ? calculate_sigpending+0x7b/0xa0
[   18.067014]  ? __pfx_kthread+0x10/0x10
[   18.067034]  ret_from_fork+0x41/0x80
[   18.067056]  ? __pfx_kthread+0x10/0x10
[   18.067076]  ret_from_fork_asm+0x1a/0x30
[   18.067106]  </TASK>
[   18.067121] 
[   18.076550] Allocated by task 285:
[   18.076840]  kasan_save_stack+0x45/0x70
[   18.077054]  kasan_save_track+0x18/0x40
[   18.077237]  kasan_save_alloc_info+0x3b/0x50
[   18.077429]  __kasan_kmalloc+0xb7/0xc0
[   18.077704]  __kmalloc_cache_noprof+0x189/0x420
[   18.078040]  kasan_atomics+0x95/0x310
[   18.078336]  kunit_try_run_case+0x1a5/0x480
[   18.078816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.079238]  kthread+0x337/0x6f0
[   18.079489]  ret_from_fork+0x41/0x80
[   18.079689]  ret_from_fork_asm+0x1a/0x30
[   18.079995] 
[   18.080169] The buggy address belongs to the object at ffff8881033b5600
[   18.080169]  which belongs to the cache kmalloc-64 of size 64
[   18.080897] The buggy address is located 0 bytes to the right of
[   18.080897]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.081446] 
[   18.081605] The buggy address belongs to the physical page:
[   18.082148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.082436] flags: 0x200000000000000(node=0|zone=2)
[   18.082792] page_type: f5(slab)
[   18.083067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.083589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.084177] page dumped because: kasan: bad access detected
[   18.084611] 
[   18.084738] Memory state around the buggy address:
[   18.084994]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.085453]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.085863] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.086199]                                      ^
[   18.086500]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.086975]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.087265] ==================================================================
[   16.638902] ==================================================================
[   16.639487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.640044] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.640362] 
[   16.641764] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.642717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.642756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.642803] Call Trace:
[   16.642845]  <TASK>
[   16.642881]  dump_stack_lvl+0x73/0xb0
[   16.642949]  print_report+0xd1/0x650
[   16.643000]  ? __virt_addr_valid+0x1db/0x2d0
[   16.643042]  ? kasan_atomics_helper+0x697/0x5450
[   16.643085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.643138]  ? kasan_atomics_helper+0x697/0x5450
[   16.643188]  kasan_report+0x141/0x180
[   16.643236]  ? kasan_atomics_helper+0x697/0x5450
[   16.643288]  kasan_check_range+0x10c/0x1c0
[   16.643328]  __kasan_check_write+0x18/0x20
[   16.643370]  kasan_atomics_helper+0x697/0x5450
[   16.643417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.643465]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.643507]  ? ret_from_fork_asm+0x1a/0x30
[   16.643552]  ? kasan_atomics+0x152/0x310
[   16.644133]  kasan_atomics+0x1dc/0x310
[   16.644226]  ? __pfx_kasan_atomics+0x10/0x10
[   16.644273]  ? __pfx_read_tsc+0x10/0x10
[   16.644308]  ? ktime_get_ts64+0x86/0x230
[   16.644349]  kunit_try_run_case+0x1a5/0x480
[   16.644392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.644431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.644480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.644520]  ? __kthread_parkme+0x82/0x180
[   16.644552]  ? preempt_count_sub+0x50/0x80
[   16.644607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.644652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.644692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.644735]  kthread+0x337/0x6f0
[   16.644769]  ? trace_preempt_on+0x20/0xc0
[   16.644811]  ? __pfx_kthread+0x10/0x10
[   16.644846]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.644885]  ? calculate_sigpending+0x7b/0xa0
[   16.644927]  ? __pfx_kthread+0x10/0x10
[   16.644961]  ret_from_fork+0x41/0x80
[   16.644999]  ? __pfx_kthread+0x10/0x10
[   16.645034]  ret_from_fork_asm+0x1a/0x30
[   16.645090]  </TASK>
[   16.645114] 
[   16.665102] Allocated by task 285:
[   16.665499]  kasan_save_stack+0x45/0x70
[   16.665905]  kasan_save_track+0x18/0x40
[   16.666300]  kasan_save_alloc_info+0x3b/0x50
[   16.666528]  __kasan_kmalloc+0xb7/0xc0
[   16.666851]  __kmalloc_cache_noprof+0x189/0x420
[   16.667139]  kasan_atomics+0x95/0x310
[   16.667524]  kunit_try_run_case+0x1a5/0x480
[   16.667849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.668433]  kthread+0x337/0x6f0
[   16.668682]  ret_from_fork+0x41/0x80
[   16.668870]  ret_from_fork_asm+0x1a/0x30
[   16.669210] 
[   16.669752] The buggy address belongs to the object at ffff8881033b5600
[   16.669752]  which belongs to the cache kmalloc-64 of size 64
[   16.670327] The buggy address is located 0 bytes to the right of
[   16.670327]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.672023] 
[   16.672172] The buggy address belongs to the physical page:
[   16.672404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.673236] flags: 0x200000000000000(node=0|zone=2)
[   16.673498] page_type: f5(slab)
[   16.673663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.674492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.674982] page dumped because: kasan: bad access detected
[   16.675183] 
[   16.675278] Memory state around the buggy address:
[   16.675450]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.676308]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.676752] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.677930]                                      ^
[   16.678256]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678695]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679385] ==================================================================
[   17.658810] ==================================================================
[   17.659172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.659789] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.660172] 
[   17.660759] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.660846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.660875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.660918] Call Trace:
[   17.660979]  <TASK>
[   17.661005]  dump_stack_lvl+0x73/0xb0
[   17.661057]  print_report+0xd1/0x650
[   17.661086]  ? __virt_addr_valid+0x1db/0x2d0
[   17.661125]  ? kasan_atomics_helper+0x1818/0x5450
[   17.661153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.661178]  ? kasan_atomics_helper+0x1818/0x5450
[   17.661201]  kasan_report+0x141/0x180
[   17.661225]  ? kasan_atomics_helper+0x1818/0x5450
[   17.661252]  kasan_check_range+0x10c/0x1c0
[   17.661274]  __kasan_check_write+0x18/0x20
[   17.661295]  kasan_atomics_helper+0x1818/0x5450
[   17.661319]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.661343]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.661366]  ? ret_from_fork_asm+0x1a/0x30
[   17.661390]  ? kasan_atomics+0x152/0x310
[   17.661413]  kasan_atomics+0x1dc/0x310
[   17.661434]  ? __pfx_kasan_atomics+0x10/0x10
[   17.661456]  ? __pfx_read_tsc+0x10/0x10
[   17.661477]  ? ktime_get_ts64+0x86/0x230
[   17.661504]  kunit_try_run_case+0x1a5/0x480
[   17.661532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.661571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.661615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.661657]  ? __kthread_parkme+0x82/0x180
[   17.661700]  ? preempt_count_sub+0x50/0x80
[   17.661753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.661788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.661814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.661840]  kthread+0x337/0x6f0
[   17.661860]  ? trace_preempt_on+0x20/0xc0
[   17.661886]  ? __pfx_kthread+0x10/0x10
[   17.661907]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.661930]  ? calculate_sigpending+0x7b/0xa0
[   17.661954]  ? __pfx_kthread+0x10/0x10
[   17.661974]  ret_from_fork+0x41/0x80
[   17.661997]  ? __pfx_kthread+0x10/0x10
[   17.662017]  ret_from_fork_asm+0x1a/0x30
[   17.662048]  </TASK>
[   17.662064] 
[   17.673733] Allocated by task 285:
[   17.674052]  kasan_save_stack+0x45/0x70
[   17.674289]  kasan_save_track+0x18/0x40
[   17.674434]  kasan_save_alloc_info+0x3b/0x50
[   17.674603]  __kasan_kmalloc+0xb7/0xc0
[   17.674757]  __kmalloc_cache_noprof+0x189/0x420
[   17.674953]  kasan_atomics+0x95/0x310
[   17.675142]  kunit_try_run_case+0x1a5/0x480
[   17.675501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.676017]  kthread+0x337/0x6f0
[   17.676309]  ret_from_fork+0x41/0x80
[   17.676633]  ret_from_fork_asm+0x1a/0x30
[   17.677163] 
[   17.677695] The buggy address belongs to the object at ffff8881033b5600
[   17.677695]  which belongs to the cache kmalloc-64 of size 64
[   17.679194] The buggy address is located 0 bytes to the right of
[   17.679194]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.679921] 
[   17.680036] The buggy address belongs to the physical page:
[   17.680215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.680460] flags: 0x200000000000000(node=0|zone=2)
[   17.681449] page_type: f5(slab)
[   17.681687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.681923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.682633] page dumped because: kasan: bad access detected
[   17.683074] 
[   17.683411] Memory state around the buggy address:
[   17.684010]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.684367]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.684605] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.685139]                                      ^
[   17.685331]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.685543]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.685769] ==================================================================
[   16.436875] ==================================================================
[   16.437201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.437370] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.437672] 
[   16.437895] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.437953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.437968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.438221] Call Trace:
[   16.438250]  <TASK>
[   16.438274]  dump_stack_lvl+0x73/0xb0
[   16.438310]  print_report+0xd1/0x650
[   16.438336]  ? __virt_addr_valid+0x1db/0x2d0
[   16.438361]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.438384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.438408]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.438431]  kasan_report+0x141/0x180
[   16.438455]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.438482]  __asan_report_store4_noabort+0x1b/0x30
[   16.438504]  kasan_atomics_helper+0x4b6e/0x5450
[   16.438528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.438553]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.438596]  ? ret_from_fork_asm+0x1a/0x30
[   16.438621]  ? kasan_atomics+0x152/0x310
[   16.438646]  kasan_atomics+0x1dc/0x310
[   16.438668]  ? __pfx_kasan_atomics+0x10/0x10
[   16.438691]  ? __pfx_read_tsc+0x10/0x10
[   16.438712]  ? ktime_get_ts64+0x86/0x230
[   16.438741]  kunit_try_run_case+0x1a5/0x480
[   16.438768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.438792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.438818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.438843]  ? __kthread_parkme+0x82/0x180
[   16.438868]  ? preempt_count_sub+0x50/0x80
[   16.438895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.438921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.438946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.438971]  kthread+0x337/0x6f0
[   16.438990]  ? trace_preempt_on+0x20/0xc0
[   16.439016]  ? __pfx_kthread+0x10/0x10
[   16.439036]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.439059]  ? calculate_sigpending+0x7b/0xa0
[   16.439084]  ? __pfx_kthread+0x10/0x10
[   16.439105]  ret_from_fork+0x41/0x80
[   16.439128]  ? __pfx_kthread+0x10/0x10
[   16.439159]  ret_from_fork_asm+0x1a/0x30
[   16.439194]  </TASK>
[   16.439218] 
[   16.447795] Allocated by task 285:
[   16.447964]  kasan_save_stack+0x45/0x70
[   16.448112]  kasan_save_track+0x18/0x40
[   16.448245]  kasan_save_alloc_info+0x3b/0x50
[   16.448377]  __kasan_kmalloc+0xb7/0xc0
[   16.448508]  __kmalloc_cache_noprof+0x189/0x420
[   16.449700]  kasan_atomics+0x95/0x310
[   16.449829]  kunit_try_run_case+0x1a5/0x480
[   16.450028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.450336]  kthread+0x337/0x6f0
[   16.450463]  ret_from_fork+0x41/0x80
[   16.450607]  ret_from_fork_asm+0x1a/0x30
[   16.451257] 
[   16.451358] The buggy address belongs to the object at ffff8881033b5600
[   16.451358]  which belongs to the cache kmalloc-64 of size 64
[   16.451757] The buggy address is located 0 bytes to the right of
[   16.451757]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.453172] 
[   16.453268] The buggy address belongs to the physical page:
[   16.453423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.453660] flags: 0x200000000000000(node=0|zone=2)
[   16.453952] page_type: f5(slab)
[   16.454053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.454772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.454986] page dumped because: kasan: bad access detected
[   16.455165] 
[   16.455249] Memory state around the buggy address:
[   16.455411]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.455630]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.456763] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.457190]                                      ^
[   16.457382]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.457632]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.457870] ==================================================================
[   16.484996] ==================================================================
[   16.485536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.485938] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.486580] 
[   16.486800] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.486867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.486884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.486911] Call Trace:
[   16.486937]  <TASK>
[   16.487107]  dump_stack_lvl+0x73/0xb0
[   16.487166]  print_report+0xd1/0x650
[   16.487198]  ? __virt_addr_valid+0x1db/0x2d0
[   16.487228]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.487255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.487281]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.487306]  kasan_report+0x141/0x180
[   16.487333]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.487364]  __asan_report_load4_noabort+0x18/0x20
[   16.487387]  kasan_atomics_helper+0x4b54/0x5450
[   16.487412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.487437]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.487461]  ? ret_from_fork_asm+0x1a/0x30
[   16.487484]  ? kasan_atomics+0x152/0x310
[   16.487509]  kasan_atomics+0x1dc/0x310
[   16.487530]  ? __pfx_kasan_atomics+0x10/0x10
[   16.487553]  ? __pfx_read_tsc+0x10/0x10
[   16.487590]  ? ktime_get_ts64+0x86/0x230
[   16.487620]  kunit_try_run_case+0x1a5/0x480
[   16.487649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.487673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.487699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.487723]  ? __kthread_parkme+0x82/0x180
[   16.487746]  ? preempt_count_sub+0x50/0x80
[   16.487773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.487798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.487822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.487847]  kthread+0x337/0x6f0
[   16.487866]  ? trace_preempt_on+0x20/0xc0
[   16.487892]  ? __pfx_kthread+0x10/0x10
[   16.487912]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.487935]  ? calculate_sigpending+0x7b/0xa0
[   16.487959]  ? __pfx_kthread+0x10/0x10
[   16.487979]  ret_from_fork+0x41/0x80
[   16.488002]  ? __pfx_kthread+0x10/0x10
[   16.488021]  ret_from_fork_asm+0x1a/0x30
[   16.488056]  </TASK>
[   16.488071] 
[   16.497986] Allocated by task 285:
[   16.498125]  kasan_save_stack+0x45/0x70
[   16.498611]  kasan_save_track+0x18/0x40
[   16.499045]  kasan_save_alloc_info+0x3b/0x50
[   16.499336]  __kasan_kmalloc+0xb7/0xc0
[   16.499599]  __kmalloc_cache_noprof+0x189/0x420
[   16.500541]  kasan_atomics+0x95/0x310
[   16.500957]  kunit_try_run_case+0x1a5/0x480
[   16.501260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.501389]  kthread+0x337/0x6f0
[   16.501996]  ret_from_fork+0x41/0x80
[   16.502144]  ret_from_fork_asm+0x1a/0x30
[   16.502264] 
[   16.502345] The buggy address belongs to the object at ffff8881033b5600
[   16.502345]  which belongs to the cache kmalloc-64 of size 64
[   16.504026] The buggy address is located 0 bytes to the right of
[   16.504026]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.504340] 
[   16.504443] The buggy address belongs to the physical page:
[   16.504709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.505374] flags: 0x200000000000000(node=0|zone=2)
[   16.505577] page_type: f5(slab)
[   16.505860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.506397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.507038] page dumped because: kasan: bad access detected
[   16.507183] 
[   16.507319] Memory state around the buggy address:
[   16.507649]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.508120]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.508874] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.509288]                                      ^
[   16.509701]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.509968]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.510554] ==================================================================
[   17.006616] ==================================================================
[   17.007606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   17.008179] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.008720] 
[   17.008964] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.009117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.009148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.009194] Call Trace:
[   17.009238]  <TASK>
[   17.009276]  dump_stack_lvl+0x73/0xb0
[   17.009346]  print_report+0xd1/0x650
[   17.009399]  ? __virt_addr_valid+0x1db/0x2d0
[   17.009447]  ? kasan_atomics_helper+0xd47/0x5450
[   17.009496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.009546]  ? kasan_atomics_helper+0xd47/0x5450
[   17.009599]  kasan_report+0x141/0x180
[   17.009643]  ? kasan_atomics_helper+0xd47/0x5450
[   17.009687]  kasan_check_range+0x10c/0x1c0
[   17.009727]  __kasan_check_write+0x18/0x20
[   17.009766]  kasan_atomics_helper+0xd47/0x5450
[   17.009841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.009925]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.009975]  ? ret_from_fork_asm+0x1a/0x30
[   17.010060]  ? kasan_atomics+0x152/0x310
[   17.010119]  kasan_atomics+0x1dc/0x310
[   17.010161]  ? __pfx_kasan_atomics+0x10/0x10
[   17.010209]  ? __pfx_read_tsc+0x10/0x10
[   17.010248]  ? ktime_get_ts64+0x86/0x230
[   17.010301]  kunit_try_run_case+0x1a5/0x480
[   17.010380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.010441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.010494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.010545]  ? __kthread_parkme+0x82/0x180
[   17.010603]  ? preempt_count_sub+0x50/0x80
[   17.010657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.010724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.010771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.010842]  kthread+0x337/0x6f0
[   17.010892]  ? trace_preempt_on+0x20/0xc0
[   17.010943]  ? __pfx_kthread+0x10/0x10
[   17.010985]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.011032]  ? calculate_sigpending+0x7b/0xa0
[   17.011076]  ? __pfx_kthread+0x10/0x10
[   17.011118]  ret_from_fork+0x41/0x80
[   17.011171]  ? __pfx_kthread+0x10/0x10
[   17.011199]  ret_from_fork_asm+0x1a/0x30
[   17.011230]  </TASK>
[   17.011247] 
[   17.021801] Allocated by task 285:
[   17.022018]  kasan_save_stack+0x45/0x70
[   17.022379]  kasan_save_track+0x18/0x40
[   17.022594]  kasan_save_alloc_info+0x3b/0x50
[   17.022941]  __kasan_kmalloc+0xb7/0xc0
[   17.023247]  __kmalloc_cache_noprof+0x189/0x420
[   17.023521]  kasan_atomics+0x95/0x310
[   17.023746]  kunit_try_run_case+0x1a5/0x480
[   17.024188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.024617]  kthread+0x337/0x6f0
[   17.024851]  ret_from_fork+0x41/0x80
[   17.025034]  ret_from_fork_asm+0x1a/0x30
[   17.025219] 
[   17.025330] The buggy address belongs to the object at ffff8881033b5600
[   17.025330]  which belongs to the cache kmalloc-64 of size 64
[   17.025878] The buggy address is located 0 bytes to the right of
[   17.025878]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.026692] 
[   17.026938] The buggy address belongs to the physical page:
[   17.027412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.028131] flags: 0x200000000000000(node=0|zone=2)
[   17.028422] page_type: f5(slab)
[   17.028727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.029197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.029668] page dumped because: kasan: bad access detected
[   17.029989] 
[   17.030108] Memory state around the buggy address:
[   17.030468]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030727]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030976] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.031233]                                      ^
[   17.031434]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.032005]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.032547] ==================================================================
[   18.259807] ==================================================================
[   18.260505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   18.261211] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.261439] 
[   18.261554] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.261618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.261635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.261664] Call Trace:
[   18.261878]  <TASK>
[   18.261922]  dump_stack_lvl+0x73/0xb0
[   18.261987]  print_report+0xd1/0x650
[   18.262016]  ? __virt_addr_valid+0x1db/0x2d0
[   18.262041]  ? kasan_atomics_helper+0x5115/0x5450
[   18.262064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.262089]  ? kasan_atomics_helper+0x5115/0x5450
[   18.262114]  kasan_report+0x141/0x180
[   18.262138]  ? kasan_atomics_helper+0x5115/0x5450
[   18.262166]  __asan_report_load8_noabort+0x18/0x20
[   18.262189]  kasan_atomics_helper+0x5115/0x5450
[   18.262215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.262238]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.262261]  ? ret_from_fork_asm+0x1a/0x30
[   18.262284]  ? kasan_atomics+0x152/0x310
[   18.262307]  kasan_atomics+0x1dc/0x310
[   18.262328]  ? __pfx_kasan_atomics+0x10/0x10
[   18.262350]  ? __pfx_read_tsc+0x10/0x10
[   18.262373]  ? ktime_get_ts64+0x86/0x230
[   18.262401]  kunit_try_run_case+0x1a5/0x480
[   18.262428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.262453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.262478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.262503]  ? __kthread_parkme+0x82/0x180
[   18.262527]  ? preempt_count_sub+0x50/0x80
[   18.262554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.262613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.262660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.262701]  kthread+0x337/0x6f0
[   18.262738]  ? trace_preempt_on+0x20/0xc0
[   18.262786]  ? __pfx_kthread+0x10/0x10
[   18.262862]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.262900]  ? calculate_sigpending+0x7b/0xa0
[   18.262944]  ? __pfx_kthread+0x10/0x10
[   18.262985]  ret_from_fork+0x41/0x80
[   18.263033]  ? __pfx_kthread+0x10/0x10
[   18.263077]  ret_from_fork_asm+0x1a/0x30
[   18.263143]  </TASK>
[   18.263174] 
[   18.275082] Allocated by task 285:
[   18.275285]  kasan_save_stack+0x45/0x70
[   18.275441]  kasan_save_track+0x18/0x40
[   18.275589]  kasan_save_alloc_info+0x3b/0x50
[   18.275751]  __kasan_kmalloc+0xb7/0xc0
[   18.275925]  __kmalloc_cache_noprof+0x189/0x420
[   18.276286]  kasan_atomics+0x95/0x310
[   18.276590]  kunit_try_run_case+0x1a5/0x480
[   18.276993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.277217]  kthread+0x337/0x6f0
[   18.277390]  ret_from_fork+0x41/0x80
[   18.277575]  ret_from_fork_asm+0x1a/0x30
[   18.277878] 
[   18.278060] The buggy address belongs to the object at ffff8881033b5600
[   18.278060]  which belongs to the cache kmalloc-64 of size 64
[   18.279779] The buggy address is located 0 bytes to the right of
[   18.279779]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.280230] 
[   18.280498] The buggy address belongs to the physical page:
[   18.280690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.281492] flags: 0x200000000000000(node=0|zone=2)
[   18.281922] page_type: f5(slab)
[   18.282308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.282648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.283226] page dumped because: kasan: bad access detected
[   18.283748] 
[   18.283911] Memory state around the buggy address:
[   18.284316]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.284743]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.285327] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.285769]                                      ^
[   18.286213]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286534]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.287239] ==================================================================
[   16.715929] ==================================================================
[   16.717206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   16.717724] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.718639] 
[   16.719178] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.719270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.719296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.719339] Call Trace:
[   16.719601]  <TASK>
[   16.719647]  dump_stack_lvl+0x73/0xb0
[   16.719706]  print_report+0xd1/0x650
[   16.719736]  ? __virt_addr_valid+0x1db/0x2d0
[   16.719760]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.719784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.719808]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.719831]  kasan_report+0x141/0x180
[   16.719855]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.719883]  kasan_check_range+0x10c/0x1c0
[   16.719903]  __kasan_check_write+0x18/0x20
[   16.719925]  kasan_atomics_helper+0x7c7/0x5450
[   16.719950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.719973]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.719996]  ? ret_from_fork_asm+0x1a/0x30
[   16.720019]  ? kasan_atomics+0x152/0x310
[   16.720043]  kasan_atomics+0x1dc/0x310
[   16.720063]  ? __pfx_kasan_atomics+0x10/0x10
[   16.720085]  ? __pfx_read_tsc+0x10/0x10
[   16.720107]  ? ktime_get_ts64+0x86/0x230
[   16.720133]  kunit_try_run_case+0x1a5/0x480
[   16.720160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.720183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.720208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.720232]  ? __kthread_parkme+0x82/0x180
[   16.720256]  ? preempt_count_sub+0x50/0x80
[   16.720282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.720307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.720331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.720355]  kthread+0x337/0x6f0
[   16.720373]  ? trace_preempt_on+0x20/0xc0
[   16.720399]  ? __pfx_kthread+0x10/0x10
[   16.720418]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.720440]  ? calculate_sigpending+0x7b/0xa0
[   16.720463]  ? __pfx_kthread+0x10/0x10
[   16.720483]  ret_from_fork+0x41/0x80
[   16.720506]  ? __pfx_kthread+0x10/0x10
[   16.720525]  ret_from_fork_asm+0x1a/0x30
[   16.720556]  </TASK>
[   16.720588] 
[   16.732006] Allocated by task 285:
[   16.732191]  kasan_save_stack+0x45/0x70
[   16.732368]  kasan_save_track+0x18/0x40
[   16.732518]  kasan_save_alloc_info+0x3b/0x50
[   16.734062]  __kasan_kmalloc+0xb7/0xc0
[   16.734266]  __kmalloc_cache_noprof+0x189/0x420
[   16.734434]  kasan_atomics+0x95/0x310
[   16.734586]  kunit_try_run_case+0x1a5/0x480
[   16.735392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.735635]  kthread+0x337/0x6f0
[   16.735999]  ret_from_fork+0x41/0x80
[   16.736733]  ret_from_fork_asm+0x1a/0x30
[   16.737234] 
[   16.737339] The buggy address belongs to the object at ffff8881033b5600
[   16.737339]  which belongs to the cache kmalloc-64 of size 64
[   16.738980] The buggy address is located 0 bytes to the right of
[   16.738980]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.739536] 
[   16.739870] The buggy address belongs to the physical page:
[   16.740143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.740641] flags: 0x200000000000000(node=0|zone=2)
[   16.741416] page_type: f5(slab)
[   16.741725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.742345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.743255] page dumped because: kasan: bad access detected
[   16.743491] 
[   16.743607] Memory state around the buggy address:
[   16.744105]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.744354]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.744603] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.745150]                                      ^
[   16.745346]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.745587]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.747496] ==================================================================
[   16.611402] ==================================================================
[   16.611811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.612259] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.612848] 
[   16.613097] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.613228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.613258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.613302] Call Trace:
[   16.613344]  <TASK>
[   16.613386]  dump_stack_lvl+0x73/0xb0
[   16.613447]  print_report+0xd1/0x650
[   16.613499]  ? __virt_addr_valid+0x1db/0x2d0
[   16.613543]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.613644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.613697]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.613734]  kasan_report+0x141/0x180
[   16.613779]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.613837]  kasan_check_range+0x10c/0x1c0
[   16.613883]  __kasan_check_write+0x18/0x20
[   16.613921]  kasan_atomics_helper+0x5fe/0x5450
[   16.613962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.613993]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.614017]  ? ret_from_fork_asm+0x1a/0x30
[   16.614040]  ? kasan_atomics+0x152/0x310
[   16.614064]  kasan_atomics+0x1dc/0x310
[   16.614084]  ? __pfx_kasan_atomics+0x10/0x10
[   16.614106]  ? __pfx_read_tsc+0x10/0x10
[   16.614127]  ? ktime_get_ts64+0x86/0x230
[   16.614156]  kunit_try_run_case+0x1a5/0x480
[   16.614183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.614206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.614232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.614257]  ? __kthread_parkme+0x82/0x180
[   16.614282]  ? preempt_count_sub+0x50/0x80
[   16.614308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.614333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.614356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.614380]  kthread+0x337/0x6f0
[   16.614399]  ? trace_preempt_on+0x20/0xc0
[   16.614424]  ? __pfx_kthread+0x10/0x10
[   16.614443]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.614465]  ? calculate_sigpending+0x7b/0xa0
[   16.614488]  ? __pfx_kthread+0x10/0x10
[   16.614508]  ret_from_fork+0x41/0x80
[   16.614530]  ? __pfx_kthread+0x10/0x10
[   16.614548]  ret_from_fork_asm+0x1a/0x30
[   16.614604]  </TASK>
[   16.614630] 
[   16.626170] Allocated by task 285:
[   16.626369]  kasan_save_stack+0x45/0x70
[   16.626773]  kasan_save_track+0x18/0x40
[   16.627093]  kasan_save_alloc_info+0x3b/0x50
[   16.627463]  __kasan_kmalloc+0xb7/0xc0
[   16.627859]  __kmalloc_cache_noprof+0x189/0x420
[   16.628266]  kasan_atomics+0x95/0x310
[   16.628552]  kunit_try_run_case+0x1a5/0x480
[   16.628967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.629378]  kthread+0x337/0x6f0
[   16.629702]  ret_from_fork+0x41/0x80
[   16.629951]  ret_from_fork_asm+0x1a/0x30
[   16.630115] 
[   16.630323] The buggy address belongs to the object at ffff8881033b5600
[   16.630323]  which belongs to the cache kmalloc-64 of size 64
[   16.631236] The buggy address is located 0 bytes to the right of
[   16.631236]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.632315] 
[   16.632476] The buggy address belongs to the physical page:
[   16.632944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.633254] flags: 0x200000000000000(node=0|zone=2)
[   16.633547] page_type: f5(slab)
[   16.633738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.634167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.634499] page dumped because: kasan: bad access detected
[   16.634859] 
[   16.634960] Memory state around the buggy address:
[   16.635216]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.635727]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.636158] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.636518]                                      ^
[   16.636781]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.637391]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.638199] ==================================================================
[   16.877521] ==================================================================
[   16.878299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.879242] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.880014] 
[   16.880623] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.880855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.880898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.880942] Call Trace:
[   16.880987]  <TASK>
[   16.881183]  dump_stack_lvl+0x73/0xb0
[   16.881235]  print_report+0xd1/0x650
[   16.881264]  ? __virt_addr_valid+0x1db/0x2d0
[   16.881296]  ? kasan_atomics_helper+0xac7/0x5450
[   16.881331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.881367]  ? kasan_atomics_helper+0xac7/0x5450
[   16.881390]  kasan_report+0x141/0x180
[   16.881415]  ? kasan_atomics_helper+0xac7/0x5450
[   16.881441]  kasan_check_range+0x10c/0x1c0
[   16.881463]  __kasan_check_write+0x18/0x20
[   16.881484]  kasan_atomics_helper+0xac7/0x5450
[   16.881508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.881532]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.881555]  ? ret_from_fork_asm+0x1a/0x30
[   16.881605]  ? kasan_atomics+0x152/0x310
[   16.881648]  kasan_atomics+0x1dc/0x310
[   16.881682]  ? __pfx_kasan_atomics+0x10/0x10
[   16.881707]  ? __pfx_read_tsc+0x10/0x10
[   16.881729]  ? ktime_get_ts64+0x86/0x230
[   16.881757]  kunit_try_run_case+0x1a5/0x480
[   16.881786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.881809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.881835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.881860]  ? __kthread_parkme+0x82/0x180
[   16.881884]  ? preempt_count_sub+0x50/0x80
[   16.881911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.881937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.881962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.881986]  kthread+0x337/0x6f0
[   16.882005]  ? trace_preempt_on+0x20/0xc0
[   16.882031]  ? __pfx_kthread+0x10/0x10
[   16.882051]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.882075]  ? calculate_sigpending+0x7b/0xa0
[   16.882098]  ? __pfx_kthread+0x10/0x10
[   16.882117]  ret_from_fork+0x41/0x80
[   16.882140]  ? __pfx_kthread+0x10/0x10
[   16.882159]  ret_from_fork_asm+0x1a/0x30
[   16.882189]  </TASK>
[   16.882205] 
[   16.897283] Allocated by task 285:
[   16.897522]  kasan_save_stack+0x45/0x70
[   16.898210]  kasan_save_track+0x18/0x40
[   16.898605]  kasan_save_alloc_info+0x3b/0x50
[   16.899554]  __kasan_kmalloc+0xb7/0xc0
[   16.900002]  __kmalloc_cache_noprof+0x189/0x420
[   16.900370]  kasan_atomics+0x95/0x310
[   16.900554]  kunit_try_run_case+0x1a5/0x480
[   16.901207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.901668]  kthread+0x337/0x6f0
[   16.901997]  ret_from_fork+0x41/0x80
[   16.902419]  ret_from_fork_asm+0x1a/0x30
[   16.903772] 
[   16.904029] The buggy address belongs to the object at ffff8881033b5600
[   16.904029]  which belongs to the cache kmalloc-64 of size 64
[   16.904984] The buggy address is located 0 bytes to the right of
[   16.904984]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.905804] 
[   16.906861] The buggy address belongs to the physical page:
[   16.907193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.907652] flags: 0x200000000000000(node=0|zone=2)
[   16.907835] page_type: f5(slab)
[   16.907978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.908216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.908442] page dumped because: kasan: bad access detected
[   16.909148] 
[   16.909833] Memory state around the buggy address:
[   16.910197]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.913534]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.914518] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.915608]                                      ^
[   16.916246]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.916481]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.916753] ==================================================================
[   17.758440] ==================================================================
[   17.759248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.759764] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.760657] 
[   17.761107] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.761197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.761219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.761245] Call Trace:
[   17.761270]  <TASK>
[   17.761296]  dump_stack_lvl+0x73/0xb0
[   17.761346]  print_report+0xd1/0x650
[   17.761373]  ? __virt_addr_valid+0x1db/0x2d0
[   17.761399]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.761422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.761446]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.761468]  kasan_report+0x141/0x180
[   17.761492]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.761518]  kasan_check_range+0x10c/0x1c0
[   17.761539]  __kasan_check_write+0x18/0x20
[   17.761578]  kasan_atomics_helper+0x19e3/0x5450
[   17.761619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.761660]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.761700]  ? ret_from_fork_asm+0x1a/0x30
[   17.761741]  ? kasan_atomics+0x152/0x310
[   17.761781]  kasan_atomics+0x1dc/0x310
[   17.761803]  ? __pfx_kasan_atomics+0x10/0x10
[   17.761824]  ? __pfx_read_tsc+0x10/0x10
[   17.761846]  ? ktime_get_ts64+0x86/0x230
[   17.761874]  kunit_try_run_case+0x1a5/0x480
[   17.761901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.761924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.761951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.761974]  ? __kthread_parkme+0x82/0x180
[   17.761997]  ? preempt_count_sub+0x50/0x80
[   17.762023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.762048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.762071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.762095]  kthread+0x337/0x6f0
[   17.762112]  ? trace_preempt_on+0x20/0xc0
[   17.762138]  ? __pfx_kthread+0x10/0x10
[   17.762157]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.762179]  ? calculate_sigpending+0x7b/0xa0
[   17.762201]  ? __pfx_kthread+0x10/0x10
[   17.762221]  ret_from_fork+0x41/0x80
[   17.762242]  ? __pfx_kthread+0x10/0x10
[   17.762261]  ret_from_fork_asm+0x1a/0x30
[   17.762290]  </TASK>
[   17.762303] 
[   17.771648] Allocated by task 285:
[   17.771857]  kasan_save_stack+0x45/0x70
[   17.772186]  kasan_save_track+0x18/0x40
[   17.772374]  kasan_save_alloc_info+0x3b/0x50
[   17.772577]  __kasan_kmalloc+0xb7/0xc0
[   17.772855]  __kmalloc_cache_noprof+0x189/0x420
[   17.773258]  kasan_atomics+0x95/0x310
[   17.773578]  kunit_try_run_case+0x1a5/0x480
[   17.773929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.774241]  kthread+0x337/0x6f0
[   17.774397]  ret_from_fork+0x41/0x80
[   17.774694]  ret_from_fork_asm+0x1a/0x30
[   17.775030] 
[   17.775211] The buggy address belongs to the object at ffff8881033b5600
[   17.775211]  which belongs to the cache kmalloc-64 of size 64
[   17.775987] The buggy address is located 0 bytes to the right of
[   17.775987]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.776600] 
[   17.776803] The buggy address belongs to the physical page:
[   17.777169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.777616] flags: 0x200000000000000(node=0|zone=2)
[   17.777909] page_type: f5(slab)
[   17.778128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.778576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.778927] page dumped because: kasan: bad access detected
[   17.779323] 
[   17.779493] Memory state around the buggy address:
[   17.779708]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.780213]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.780627] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.781117]                                      ^
[   17.781415]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.781908]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.782272] ==================================================================
[   18.170980] ==================================================================
[   18.171324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   18.171948] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.172355] 
[   18.172576] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.172701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.172732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.172779] Call Trace:
[   18.172822]  <TASK>
[   18.172864]  dump_stack_lvl+0x73/0xb0
[   18.172954]  print_report+0xd1/0x650
[   18.172999]  ? __virt_addr_valid+0x1db/0x2d0
[   18.173048]  ? kasan_atomics_helper+0x218a/0x5450
[   18.173097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.173147]  ? kasan_atomics_helper+0x218a/0x5450
[   18.173195]  kasan_report+0x141/0x180
[   18.173245]  ? kasan_atomics_helper+0x218a/0x5450
[   18.173305]  kasan_check_range+0x10c/0x1c0
[   18.173351]  __kasan_check_write+0x18/0x20
[   18.173395]  kasan_atomics_helper+0x218a/0x5450
[   18.173450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.173492]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.173529]  ? ret_from_fork_asm+0x1a/0x30
[   18.173582]  ? kasan_atomics+0x152/0x310
[   18.173629]  kasan_atomics+0x1dc/0x310
[   18.173703]  ? __pfx_kasan_atomics+0x10/0x10
[   18.173743]  ? __pfx_read_tsc+0x10/0x10
[   18.173798]  ? ktime_get_ts64+0x86/0x230
[   18.173849]  kunit_try_run_case+0x1a5/0x480
[   18.173898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.173942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.173993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.174025]  ? __kthread_parkme+0x82/0x180
[   18.174049]  ? preempt_count_sub+0x50/0x80
[   18.174075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.174099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.174122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.174146]  kthread+0x337/0x6f0
[   18.174164]  ? trace_preempt_on+0x20/0xc0
[   18.174188]  ? __pfx_kthread+0x10/0x10
[   18.174207]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.174228]  ? calculate_sigpending+0x7b/0xa0
[   18.174251]  ? __pfx_kthread+0x10/0x10
[   18.174270]  ret_from_fork+0x41/0x80
[   18.174291]  ? __pfx_kthread+0x10/0x10
[   18.174309]  ret_from_fork_asm+0x1a/0x30
[   18.174337]  </TASK>
[   18.174351] 
[   18.185017] Allocated by task 285:
[   18.185161]  kasan_save_stack+0x45/0x70
[   18.185339]  kasan_save_track+0x18/0x40
[   18.185722]  kasan_save_alloc_info+0x3b/0x50
[   18.186090]  __kasan_kmalloc+0xb7/0xc0
[   18.186454]  __kmalloc_cache_noprof+0x189/0x420
[   18.186920]  kasan_atomics+0x95/0x310
[   18.187275]  kunit_try_run_case+0x1a5/0x480
[   18.187713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.188191]  kthread+0x337/0x6f0
[   18.188502]  ret_from_fork+0x41/0x80
[   18.188865]  ret_from_fork_asm+0x1a/0x30
[   18.189225] 
[   18.189428] The buggy address belongs to the object at ffff8881033b5600
[   18.189428]  which belongs to the cache kmalloc-64 of size 64
[   18.190168] The buggy address is located 0 bytes to the right of
[   18.190168]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.190849] 
[   18.191061] The buggy address belongs to the physical page:
[   18.191324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.191834] flags: 0x200000000000000(node=0|zone=2)
[   18.192217] page_type: f5(slab)
[   18.192513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.192978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.193380] page dumped because: kasan: bad access detected
[   18.193628] 
[   18.193769] Memory state around the buggy address:
[   18.194133]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.194626]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.195037] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.195507]                                      ^
[   18.195806]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196252]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196754] ==================================================================
[   17.600392] ==================================================================
[   17.600923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.601967] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.602217] 
[   17.602327] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.602384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.602399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.602423] Call Trace:
[   17.602450]  <TASK>
[   17.602473]  dump_stack_lvl+0x73/0xb0
[   17.602510]  print_report+0xd1/0x650
[   17.602536]  ? __virt_addr_valid+0x1db/0x2d0
[   17.602575]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.602602]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.602626]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.602653]  kasan_report+0x141/0x180
[   17.602690]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.602717]  kasan_check_range+0x10c/0x1c0
[   17.602739]  __kasan_check_write+0x18/0x20
[   17.602760]  kasan_atomics_helper+0x16e7/0x5450
[   17.602783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.602807]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.602830]  ? ret_from_fork_asm+0x1a/0x30
[   17.602853]  ? kasan_atomics+0x152/0x310
[   17.602877]  kasan_atomics+0x1dc/0x310
[   17.602897]  ? __pfx_kasan_atomics+0x10/0x10
[   17.602919]  ? __pfx_read_tsc+0x10/0x10
[   17.602941]  ? ktime_get_ts64+0x86/0x230
[   17.602969]  kunit_try_run_case+0x1a5/0x480
[   17.602997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.603021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.603048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.603072]  ? __kthread_parkme+0x82/0x180
[   17.603096]  ? preempt_count_sub+0x50/0x80
[   17.603124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.603175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.603211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.603236]  kthread+0x337/0x6f0
[   17.603256]  ? trace_preempt_on+0x20/0xc0
[   17.603282]  ? __pfx_kthread+0x10/0x10
[   17.603301]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.603324]  ? calculate_sigpending+0x7b/0xa0
[   17.603347]  ? __pfx_kthread+0x10/0x10
[   17.603367]  ret_from_fork+0x41/0x80
[   17.603389]  ? __pfx_kthread+0x10/0x10
[   17.603409]  ret_from_fork_asm+0x1a/0x30
[   17.603439]  </TASK>
[   17.603453] 
[   17.615305] Allocated by task 285:
[   17.615471]  kasan_save_stack+0x45/0x70
[   17.615680]  kasan_save_track+0x18/0x40
[   17.615824]  kasan_save_alloc_info+0x3b/0x50
[   17.615981]  __kasan_kmalloc+0xb7/0xc0
[   17.616123]  __kmalloc_cache_noprof+0x189/0x420
[   17.616282]  kasan_atomics+0x95/0x310
[   17.616424]  kunit_try_run_case+0x1a5/0x480
[   17.617220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.617742]  kthread+0x337/0x6f0
[   17.617925]  ret_from_fork+0x41/0x80
[   17.618592]  ret_from_fork_asm+0x1a/0x30
[   17.619111] 
[   17.619251] The buggy address belongs to the object at ffff8881033b5600
[   17.619251]  which belongs to the cache kmalloc-64 of size 64
[   17.619618] The buggy address is located 0 bytes to the right of
[   17.619618]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.620338] 
[   17.620472] The buggy address belongs to the physical page:
[   17.621115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.621596] flags: 0x200000000000000(node=0|zone=2)
[   17.622000] page_type: f5(slab)
[   17.622269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.622664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.623169] page dumped because: kasan: bad access detected
[   17.623839] 
[   17.624083] Memory state around the buggy address:
[   17.624435]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.625181]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.625643] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.626130]                                      ^
[   17.626490]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.627178]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.627467] ==================================================================
[   17.119936] ==================================================================
[   17.120529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   17.121174] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.121663] 
[   17.121815] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.121911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.121950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.122006] Call Trace:
[   17.122049]  <TASK>
[   17.122088]  dump_stack_lvl+0x73/0xb0
[   17.122154]  print_report+0xd1/0x650
[   17.122210]  ? __virt_addr_valid+0x1db/0x2d0
[   17.122272]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.122319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.122366]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.122419]  kasan_report+0x141/0x180
[   17.122470]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.122542]  kasan_check_range+0x10c/0x1c0
[   17.122599]  __kasan_check_write+0x18/0x20
[   17.122652]  kasan_atomics_helper+0xfa9/0x5450
[   17.122717]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.122769]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.122812]  ? ret_from_fork_asm+0x1a/0x30
[   17.122858]  ? kasan_atomics+0x152/0x310
[   17.122915]  kasan_atomics+0x1dc/0x310
[   17.122976]  ? __pfx_kasan_atomics+0x10/0x10
[   17.123024]  ? __pfx_read_tsc+0x10/0x10
[   17.123083]  ? ktime_get_ts64+0x86/0x230
[   17.123159]  kunit_try_run_case+0x1a5/0x480
[   17.123235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123285]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.123338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.123400]  ? __kthread_parkme+0x82/0x180
[   17.123461]  ? preempt_count_sub+0x50/0x80
[   17.123518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.123655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.123709]  kthread+0x337/0x6f0
[   17.123751]  ? trace_preempt_on+0x20/0xc0
[   17.123806]  ? __pfx_kthread+0x10/0x10
[   17.123849]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.123913]  ? calculate_sigpending+0x7b/0xa0
[   17.123956]  ? __pfx_kthread+0x10/0x10
[   17.123990]  ret_from_fork+0x41/0x80
[   17.124029]  ? __pfx_kthread+0x10/0x10
[   17.124069]  ret_from_fork_asm+0x1a/0x30
[   17.124131]  </TASK>
[   17.124159] 
[   17.133808] Allocated by task 285:
[   17.133995]  kasan_save_stack+0x45/0x70
[   17.134345]  kasan_save_track+0x18/0x40
[   17.134675]  kasan_save_alloc_info+0x3b/0x50
[   17.135024]  __kasan_kmalloc+0xb7/0xc0
[   17.135351]  __kmalloc_cache_noprof+0x189/0x420
[   17.135720]  kasan_atomics+0x95/0x310
[   17.136032]  kunit_try_run_case+0x1a5/0x480
[   17.136373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.136791]  kthread+0x337/0x6f0
[   17.137071]  ret_from_fork+0x41/0x80
[   17.137358]  ret_from_fork_asm+0x1a/0x30
[   17.137592] 
[   17.137780] The buggy address belongs to the object at ffff8881033b5600
[   17.137780]  which belongs to the cache kmalloc-64 of size 64
[   17.138360] The buggy address is located 0 bytes to the right of
[   17.138360]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.139055] 
[   17.139234] The buggy address belongs to the physical page:
[   17.139569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.140326] flags: 0x200000000000000(node=0|zone=2)
[   17.140643] page_type: f5(slab)
[   17.140857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.141128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.141382] page dumped because: kasan: bad access detected
[   17.141593] 
[   17.141746] Memory state around the buggy address:
[   17.142150]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.142661]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.143164] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.143464]                                      ^
[   17.144001]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144268]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.144508] ==================================================================
[   16.781527] ==================================================================
[   16.782193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   16.782504] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.783166] 
[   16.783376] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.783485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.783512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.783551] Call Trace:
[   16.783640]  <TASK>
[   16.783702]  dump_stack_lvl+0x73/0xb0
[   16.783776]  print_report+0xd1/0x650
[   16.783832]  ? __virt_addr_valid+0x1db/0x2d0
[   16.783882]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.783923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.783968]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.784045]  kasan_report+0x141/0x180
[   16.784107]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.784188]  kasan_check_range+0x10c/0x1c0
[   16.784254]  __kasan_check_write+0x18/0x20
[   16.784293]  kasan_atomics_helper+0x8f9/0x5450
[   16.784340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.784388]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.784436]  ? ret_from_fork_asm+0x1a/0x30
[   16.784485]  ? kasan_atomics+0x152/0x310
[   16.784532]  kasan_atomics+0x1dc/0x310
[   16.784584]  ? __pfx_kasan_atomics+0x10/0x10
[   16.784675]  ? __pfx_read_tsc+0x10/0x10
[   16.784717]  ? ktime_get_ts64+0x86/0x230
[   16.784781]  kunit_try_run_case+0x1a5/0x480
[   16.784831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.784874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.784914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.784953]  ? __kthread_parkme+0x82/0x180
[   16.785000]  ? preempt_count_sub+0x50/0x80
[   16.785049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.785101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.785149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.785197]  kthread+0x337/0x6f0
[   16.785237]  ? trace_preempt_on+0x20/0xc0
[   16.785286]  ? __pfx_kthread+0x10/0x10
[   16.785324]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.785368]  ? calculate_sigpending+0x7b/0xa0
[   16.785418]  ? __pfx_kthread+0x10/0x10
[   16.785459]  ret_from_fork+0x41/0x80
[   16.785500]  ? __pfx_kthread+0x10/0x10
[   16.785527]  ret_from_fork_asm+0x1a/0x30
[   16.785577]  </TASK>
[   16.785597] 
[   16.796044] Allocated by task 285:
[   16.796256]  kasan_save_stack+0x45/0x70
[   16.796486]  kasan_save_track+0x18/0x40
[   16.797436]  kasan_save_alloc_info+0x3b/0x50
[   16.798032]  __kasan_kmalloc+0xb7/0xc0
[   16.798386]  __kmalloc_cache_noprof+0x189/0x420
[   16.798801]  kasan_atomics+0x95/0x310
[   16.799148]  kunit_try_run_case+0x1a5/0x480
[   16.799525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.800260]  kthread+0x337/0x6f0
[   16.801109]  ret_from_fork+0x41/0x80
[   16.801410]  ret_from_fork_asm+0x1a/0x30
[   16.801811] 
[   16.801943] The buggy address belongs to the object at ffff8881033b5600
[   16.801943]  which belongs to the cache kmalloc-64 of size 64
[   16.802366] The buggy address is located 0 bytes to the right of
[   16.802366]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.803366] 
[   16.803865] The buggy address belongs to the physical page:
[   16.804304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.805330] flags: 0x200000000000000(node=0|zone=2)
[   16.806000] page_type: f5(slab)
[   16.806321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.807166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.807936] page dumped because: kasan: bad access detected
[   16.808395] 
[   16.808578] Memory state around the buggy address:
[   16.809384]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.810020]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.810287] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.811254]                                      ^
[   16.811521]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.811966]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.812430] ==================================================================
[   17.207507] ==================================================================
[   17.208152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   17.208596] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.209052] 
[   17.209269] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.209369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.209398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.209443] Call Trace:
[   17.209486]  <TASK>
[   17.209527]  dump_stack_lvl+0x73/0xb0
[   17.209624]  print_report+0xd1/0x650
[   17.209695]  ? __virt_addr_valid+0x1db/0x2d0
[   17.209742]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.209788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.209836]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.209873]  kasan_report+0x141/0x180
[   17.209915]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.209983]  __asan_report_load4_noabort+0x18/0x20
[   17.210027]  kasan_atomics_helper+0x4a1c/0x5450
[   17.210071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.210113]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.210167]  ? ret_from_fork_asm+0x1a/0x30
[   17.210204]  ? kasan_atomics+0x152/0x310
[   17.210247]  kasan_atomics+0x1dc/0x310
[   17.210285]  ? __pfx_kasan_atomics+0x10/0x10
[   17.210326]  ? __pfx_read_tsc+0x10/0x10
[   17.210367]  ? ktime_get_ts64+0x86/0x230
[   17.210410]  kunit_try_run_case+0x1a5/0x480
[   17.210440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.210463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.210489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.210512]  ? __kthread_parkme+0x82/0x180
[   17.210535]  ? preempt_count_sub+0x50/0x80
[   17.210571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.210599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.210623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.210646]  kthread+0x337/0x6f0
[   17.210688]  ? trace_preempt_on+0x20/0xc0
[   17.210716]  ? __pfx_kthread+0x10/0x10
[   17.210734]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.210756]  ? calculate_sigpending+0x7b/0xa0
[   17.210780]  ? __pfx_kthread+0x10/0x10
[   17.210799]  ret_from_fork+0x41/0x80
[   17.210820]  ? __pfx_kthread+0x10/0x10
[   17.210840]  ret_from_fork_asm+0x1a/0x30
[   17.210869]  </TASK>
[   17.210884] 
[   17.222342] Allocated by task 285:
[   17.222672]  kasan_save_stack+0x45/0x70
[   17.223444]  kasan_save_track+0x18/0x40
[   17.223964]  kasan_save_alloc_info+0x3b/0x50
[   17.224190]  __kasan_kmalloc+0xb7/0xc0
[   17.224343]  __kmalloc_cache_noprof+0x189/0x420
[   17.224501]  kasan_atomics+0x95/0x310
[   17.224686]  kunit_try_run_case+0x1a5/0x480
[   17.224850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.225023]  kthread+0x337/0x6f0
[   17.225157]  ret_from_fork+0x41/0x80
[   17.225292]  ret_from_fork_asm+0x1a/0x30
[   17.225432] 
[   17.225514] The buggy address belongs to the object at ffff8881033b5600
[   17.225514]  which belongs to the cache kmalloc-64 of size 64
[   17.227028] The buggy address is located 0 bytes to the right of
[   17.227028]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.228387] 
[   17.228573] The buggy address belongs to the physical page:
[   17.228770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.229337] flags: 0x200000000000000(node=0|zone=2)
[   17.229687] page_type: f5(slab)
[   17.229905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.230201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.230501] page dumped because: kasan: bad access detected
[   17.230765] 
[   17.230905] Memory state around the buggy address:
[   17.231143]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.231648]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.231939] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.232404]                                      ^
[   17.232740]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.233185]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.233444] ==================================================================
[   17.344765] ==================================================================
[   17.345837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.346101] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.346316] 
[   17.346423] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.346482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.346498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.346522] Call Trace:
[   17.346549]  <TASK>
[   17.346592]  dump_stack_lvl+0x73/0xb0
[   17.346644]  print_report+0xd1/0x650
[   17.346721]  ? __virt_addr_valid+0x1db/0x2d0
[   17.346767]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.346810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.346858]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.346907]  kasan_report+0x141/0x180
[   17.346957]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.347016]  kasan_check_range+0x10c/0x1c0
[   17.347065]  __kasan_check_write+0x18/0x20
[   17.347107]  kasan_atomics_helper+0x12e6/0x5450
[   17.347185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.347232]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.347280]  ? ret_from_fork_asm+0x1a/0x30
[   17.347331]  ? kasan_atomics+0x152/0x310
[   17.347385]  kasan_atomics+0x1dc/0x310
[   17.347432]  ? __pfx_kasan_atomics+0x10/0x10
[   17.347479]  ? __pfx_read_tsc+0x10/0x10
[   17.347526]  ? ktime_get_ts64+0x86/0x230
[   17.347595]  kunit_try_run_case+0x1a5/0x480
[   17.347684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.347739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.347784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.347829]  ? __kthread_parkme+0x82/0x180
[   17.347877]  ? preempt_count_sub+0x50/0x80
[   17.347930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.347981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.348026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.348089]  kthread+0x337/0x6f0
[   17.348128]  ? trace_preempt_on+0x20/0xc0
[   17.348176]  ? __pfx_kthread+0x10/0x10
[   17.348217]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.348263]  ? calculate_sigpending+0x7b/0xa0
[   17.348297]  ? __pfx_kthread+0x10/0x10
[   17.348317]  ret_from_fork+0x41/0x80
[   17.348340]  ? __pfx_kthread+0x10/0x10
[   17.348359]  ret_from_fork_asm+0x1a/0x30
[   17.348390]  </TASK>
[   17.348405] 
[   17.358007] Allocated by task 285:
[   17.358225]  kasan_save_stack+0x45/0x70
[   17.358450]  kasan_save_track+0x18/0x40
[   17.358803]  kasan_save_alloc_info+0x3b/0x50
[   17.359169]  __kasan_kmalloc+0xb7/0xc0
[   17.359478]  __kmalloc_cache_noprof+0x189/0x420
[   17.359809]  kasan_atomics+0x95/0x310
[   17.359993]  kunit_try_run_case+0x1a5/0x480
[   17.360193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.360412]  kthread+0x337/0x6f0
[   17.360676]  ret_from_fork+0x41/0x80
[   17.360991]  ret_from_fork_asm+0x1a/0x30
[   17.361327] 
[   17.361502] The buggy address belongs to the object at ffff8881033b5600
[   17.361502]  which belongs to the cache kmalloc-64 of size 64
[   17.362286] The buggy address is located 0 bytes to the right of
[   17.362286]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.362788] 
[   17.362919] The buggy address belongs to the physical page:
[   17.363139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.363761] flags: 0x200000000000000(node=0|zone=2)
[   17.364156] page_type: f5(slab)
[   17.364440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.364992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.365452] page dumped because: kasan: bad access detected
[   17.365864] 
[   17.366052] Memory state around the buggy address:
[   17.366370]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.366950]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.367249] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.367698]                                      ^
[   17.368021]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.368300]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.369477] ==================================================================
[   17.370567] ==================================================================
[   17.371180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.371459] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.372625] 
[   17.373069] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.373171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.373199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.373226] Call Trace:
[   17.373253]  <TASK>
[   17.373277]  dump_stack_lvl+0x73/0xb0
[   17.373317]  print_report+0xd1/0x650
[   17.373344]  ? __virt_addr_valid+0x1db/0x2d0
[   17.373369]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.373394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.373418]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.373443]  kasan_report+0x141/0x180
[   17.373467]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.373495]  __asan_report_load4_noabort+0x18/0x20
[   17.373518]  kasan_atomics_helper+0x49ce/0x5450
[   17.373544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.373587]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.373613]  ? ret_from_fork_asm+0x1a/0x30
[   17.373638]  ? kasan_atomics+0x152/0x310
[   17.373673]  kasan_atomics+0x1dc/0x310
[   17.373701]  ? __pfx_kasan_atomics+0x10/0x10
[   17.373724]  ? __pfx_read_tsc+0x10/0x10
[   17.373746]  ? ktime_get_ts64+0x86/0x230
[   17.373774]  kunit_try_run_case+0x1a5/0x480
[   17.373803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.373829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.373856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.373880]  ? __kthread_parkme+0x82/0x180
[   17.373905]  ? preempt_count_sub+0x50/0x80
[   17.373932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.373958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.373983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.374008]  kthread+0x337/0x6f0
[   17.374027]  ? trace_preempt_on+0x20/0xc0
[   17.374053]  ? __pfx_kthread+0x10/0x10
[   17.374072]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.374094]  ? calculate_sigpending+0x7b/0xa0
[   17.374118]  ? __pfx_kthread+0x10/0x10
[   17.374138]  ret_from_fork+0x41/0x80
[   17.374161]  ? __pfx_kthread+0x10/0x10
[   17.374181]  ret_from_fork_asm+0x1a/0x30
[   17.374211]  </TASK>
[   17.374226] 
[   17.387318] Allocated by task 285:
[   17.387589]  kasan_save_stack+0x45/0x70
[   17.388653]  kasan_save_track+0x18/0x40
[   17.388899]  kasan_save_alloc_info+0x3b/0x50
[   17.389059]  __kasan_kmalloc+0xb7/0xc0
[   17.389435]  __kmalloc_cache_noprof+0x189/0x420
[   17.390053]  kasan_atomics+0x95/0x310
[   17.390232]  kunit_try_run_case+0x1a5/0x480
[   17.390799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391141]  kthread+0x337/0x6f0
[   17.391594]  ret_from_fork+0x41/0x80
[   17.391761]  ret_from_fork_asm+0x1a/0x30
[   17.392443] 
[   17.392628] The buggy address belongs to the object at ffff8881033b5600
[   17.392628]  which belongs to the cache kmalloc-64 of size 64
[   17.393239] The buggy address is located 0 bytes to the right of
[   17.393239]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.393974] 
[   17.394167] The buggy address belongs to the physical page:
[   17.394537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.395223] flags: 0x200000000000000(node=0|zone=2)
[   17.395477] page_type: f5(slab)
[   17.396264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.396598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.397131] page dumped because: kasan: bad access detected
[   17.397329] 
[   17.397472] Memory state around the buggy address:
[   17.398235]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.398482]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.399258] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.400184]                                      ^
[   17.400445]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.400906]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.401426] ==================================================================
[   16.415418] ==================================================================
[   16.415751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.416377] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.416555] 
[   16.416853] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.417045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.417063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.417209] Call Trace:
[   16.417231]  <TASK>
[   16.417254]  dump_stack_lvl+0x73/0xb0
[   16.417293]  print_report+0xd1/0x650
[   16.417320]  ? __virt_addr_valid+0x1db/0x2d0
[   16.417343]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.417366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.417390]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.417413]  kasan_report+0x141/0x180
[   16.417437]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.417464]  __asan_report_load4_noabort+0x18/0x20
[   16.417487]  kasan_atomics_helper+0x4b88/0x5450
[   16.417511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.417534]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.417555]  ? ret_from_fork_asm+0x1a/0x30
[   16.417622]  ? kasan_atomics+0x152/0x310
[   16.417668]  kasan_atomics+0x1dc/0x310
[   16.417707]  ? __pfx_kasan_atomics+0x10/0x10
[   16.417730]  ? __pfx_read_tsc+0x10/0x10
[   16.417753]  ? ktime_get_ts64+0x86/0x230
[   16.417929]  kunit_try_run_case+0x1a5/0x480
[   16.417962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.418036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.418063]  ? __kthread_parkme+0x82/0x180
[   16.418088]  ? preempt_count_sub+0x50/0x80
[   16.418117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.418145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.418170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.418197]  kthread+0x337/0x6f0
[   16.418217]  ? trace_preempt_on+0x20/0xc0
[   16.418244]  ? __pfx_kthread+0x10/0x10
[   16.418265]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.418288]  ? calculate_sigpending+0x7b/0xa0
[   16.418313]  ? __pfx_kthread+0x10/0x10
[   16.418334]  ret_from_fork+0x41/0x80
[   16.418358]  ? __pfx_kthread+0x10/0x10
[   16.418378]  ret_from_fork_asm+0x1a/0x30
[   16.418412]  </TASK>
[   16.418429] 
[   16.426724] Allocated by task 285:
[   16.426919]  kasan_save_stack+0x45/0x70
[   16.427188]  kasan_save_track+0x18/0x40
[   16.427295]  kasan_save_alloc_info+0x3b/0x50
[   16.427391]  __kasan_kmalloc+0xb7/0xc0
[   16.427481]  __kmalloc_cache_noprof+0x189/0x420
[   16.427883]  kasan_atomics+0x95/0x310
[   16.428146]  kunit_try_run_case+0x1a5/0x480
[   16.428424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.428758]  kthread+0x337/0x6f0
[   16.428887]  ret_from_fork+0x41/0x80
[   16.428979]  ret_from_fork_asm+0x1a/0x30
[   16.429240] 
[   16.429360] The buggy address belongs to the object at ffff8881033b5600
[   16.429360]  which belongs to the cache kmalloc-64 of size 64
[   16.430143] The buggy address is located 0 bytes to the right of
[   16.430143]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.430717] 
[   16.430836] The buggy address belongs to the physical page:
[   16.431203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.431595] flags: 0x200000000000000(node=0|zone=2)
[   16.431839] page_type: f5(slab)
[   16.432068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.432456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.432679] page dumped because: kasan: bad access detected
[   16.433024] 
[   16.433149] Memory state around the buggy address:
[   16.433449]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.433988]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.434342] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.434553]                                      ^
[   16.434891]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.435171]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.435440] ==================================================================
[   17.403024] ==================================================================
[   17.403307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.403541] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.404664] 
[   17.405161] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.405375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.405401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.405439] Call Trace:
[   17.405468]  <TASK>
[   17.405493]  dump_stack_lvl+0x73/0xb0
[   17.405535]  print_report+0xd1/0x650
[   17.405579]  ? __virt_addr_valid+0x1db/0x2d0
[   17.405607]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.405632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.405660]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.405710]  kasan_report+0x141/0x180
[   17.405736]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.405763]  kasan_check_range+0x10c/0x1c0
[   17.405785]  __kasan_check_read+0x15/0x20
[   17.405806]  kasan_atomics_helper+0x13b5/0x5450
[   17.405830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.405853]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.405876]  ? ret_from_fork_asm+0x1a/0x30
[   17.405900]  ? kasan_atomics+0x152/0x310
[   17.405924]  kasan_atomics+0x1dc/0x310
[   17.405944]  ? __pfx_kasan_atomics+0x10/0x10
[   17.405966]  ? __pfx_read_tsc+0x10/0x10
[   17.405988]  ? ktime_get_ts64+0x86/0x230
[   17.406016]  kunit_try_run_case+0x1a5/0x480
[   17.406043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.406067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.406093]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.406117]  ? __kthread_parkme+0x82/0x180
[   17.406140]  ? preempt_count_sub+0x50/0x80
[   17.406167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.406192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.406215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.406240]  kthread+0x337/0x6f0
[   17.406259]  ? trace_preempt_on+0x20/0xc0
[   17.406284]  ? __pfx_kthread+0x10/0x10
[   17.406302]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.406325]  ? calculate_sigpending+0x7b/0xa0
[   17.406347]  ? __pfx_kthread+0x10/0x10
[   17.406366]  ret_from_fork+0x41/0x80
[   17.406388]  ? __pfx_kthread+0x10/0x10
[   17.406407]  ret_from_fork_asm+0x1a/0x30
[   17.406436]  </TASK>
[   17.406449] 
[   17.418063] Allocated by task 285:
[   17.418403]  kasan_save_stack+0x45/0x70
[   17.418817]  kasan_save_track+0x18/0x40
[   17.419150]  kasan_save_alloc_info+0x3b/0x50
[   17.419436]  __kasan_kmalloc+0xb7/0xc0
[   17.419831]  __kmalloc_cache_noprof+0x189/0x420
[   17.420035]  kasan_atomics+0x95/0x310
[   17.420366]  kunit_try_run_case+0x1a5/0x480
[   17.420688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.420972]  kthread+0x337/0x6f0
[   17.421147]  ret_from_fork+0x41/0x80
[   17.421330]  ret_from_fork_asm+0x1a/0x30
[   17.421650] 
[   17.421832] The buggy address belongs to the object at ffff8881033b5600
[   17.421832]  which belongs to the cache kmalloc-64 of size 64
[   17.422695] The buggy address is located 0 bytes to the right of
[   17.422695]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.423518] 
[   17.423724] The buggy address belongs to the physical page:
[   17.424236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.424646] flags: 0x200000000000000(node=0|zone=2)
[   17.425068] page_type: f5(slab)
[   17.425377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.425742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.426192] page dumped because: kasan: bad access detected
[   17.426510] 
[   17.426706] Memory state around the buggy address:
[   17.426925]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.427210]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.427517] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.428025]                                      ^
[   17.428465]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.428998]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.429478] ==================================================================
[   16.680770] ==================================================================
[   16.681181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.681438] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.681682] 
[   16.681826] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.681928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.681954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.681993] Call Trace:
[   16.682032]  <TASK>
[   16.682068]  dump_stack_lvl+0x73/0xb0
[   16.682126]  print_report+0xd1/0x650
[   16.682168]  ? __virt_addr_valid+0x1db/0x2d0
[   16.682206]  ? kasan_atomics_helper+0x72f/0x5450
[   16.682243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.682280]  ? kasan_atomics_helper+0x72f/0x5450
[   16.682319]  kasan_report+0x141/0x180
[   16.682365]  ? kasan_atomics_helper+0x72f/0x5450
[   16.682417]  kasan_check_range+0x10c/0x1c0
[   16.682460]  __kasan_check_write+0x18/0x20
[   16.682490]  kasan_atomics_helper+0x72f/0x5450
[   16.682516]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.682542]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.682969]  ? ret_from_fork_asm+0x1a/0x30
[   16.683034]  ? kasan_atomics+0x152/0x310
[   16.683587]  kasan_atomics+0x1dc/0x310
[   16.683631]  ? __pfx_kasan_atomics+0x10/0x10
[   16.683692]  ? __pfx_read_tsc+0x10/0x10
[   16.683717]  ? ktime_get_ts64+0x86/0x230
[   16.683746]  kunit_try_run_case+0x1a5/0x480
[   16.683775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.683826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.683852]  ? __kthread_parkme+0x82/0x180
[   16.683875]  ? preempt_count_sub+0x50/0x80
[   16.683902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.683928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.683953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.683977]  kthread+0x337/0x6f0
[   16.683998]  ? trace_preempt_on+0x20/0xc0
[   16.684024]  ? __pfx_kthread+0x10/0x10
[   16.684044]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.684066]  ? calculate_sigpending+0x7b/0xa0
[   16.684090]  ? __pfx_kthread+0x10/0x10
[   16.684109]  ret_from_fork+0x41/0x80
[   16.684132]  ? __pfx_kthread+0x10/0x10
[   16.684152]  ret_from_fork_asm+0x1a/0x30
[   16.684183]  </TASK>
[   16.684199] 
[   16.698016] Allocated by task 285:
[   16.699032]  kasan_save_stack+0x45/0x70
[   16.699332]  kasan_save_track+0x18/0x40
[   16.699682]  kasan_save_alloc_info+0x3b/0x50
[   16.699990]  __kasan_kmalloc+0xb7/0xc0
[   16.700229]  __kmalloc_cache_noprof+0x189/0x420
[   16.701422]  kasan_atomics+0x95/0x310
[   16.701764]  kunit_try_run_case+0x1a5/0x480
[   16.702023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.702584]  kthread+0x337/0x6f0
[   16.703205]  ret_from_fork+0x41/0x80
[   16.703502]  ret_from_fork_asm+0x1a/0x30
[   16.703716] 
[   16.704197] The buggy address belongs to the object at ffff8881033b5600
[   16.704197]  which belongs to the cache kmalloc-64 of size 64
[   16.705159] The buggy address is located 0 bytes to the right of
[   16.705159]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.705682] 
[   16.706401] The buggy address belongs to the physical page:
[   16.706640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.707878] flags: 0x200000000000000(node=0|zone=2)
[   16.708164] page_type: f5(slab)
[   16.708338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.709234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.710054] page dumped because: kasan: bad access detected
[   16.710788] 
[   16.710980] Memory state around the buggy address:
[   16.711592]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.712083]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.712419] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.713246]                                      ^
[   16.713473]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714280]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714608] ==================================================================
[   18.088551] ==================================================================
[   18.089041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   18.089476] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.090001] 
[   18.090157] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.090262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.090298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.090349] Call Trace:
[   18.090395]  <TASK>
[   18.090440]  dump_stack_lvl+0x73/0xb0
[   18.090511]  print_report+0xd1/0x650
[   18.090584]  ? __virt_addr_valid+0x1db/0x2d0
[   18.090642]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.090697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.090754]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.090808]  kasan_report+0x141/0x180
[   18.090865]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.090930]  __asan_report_load8_noabort+0x18/0x20
[   18.090984]  kasan_atomics_helper+0x4f98/0x5450
[   18.091041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.091097]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.091163]  ? ret_from_fork_asm+0x1a/0x30
[   18.091218]  ? kasan_atomics+0x152/0x310
[   18.091278]  kasan_atomics+0x1dc/0x310
[   18.091327]  ? __pfx_kasan_atomics+0x10/0x10
[   18.091382]  ? __pfx_read_tsc+0x10/0x10
[   18.091428]  ? ktime_get_ts64+0x86/0x230
[   18.091488]  kunit_try_run_case+0x1a5/0x480
[   18.091548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.091603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.091642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.091678]  ? __kthread_parkme+0x82/0x180
[   18.091714]  ? preempt_count_sub+0x50/0x80
[   18.091756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.091793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.091831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.091866]  kthread+0x337/0x6f0
[   18.091894]  ? trace_preempt_on+0x20/0xc0
[   18.091931]  ? __pfx_kthread+0x10/0x10
[   18.091961]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.091995]  ? calculate_sigpending+0x7b/0xa0
[   18.092030]  ? __pfx_kthread+0x10/0x10
[   18.092061]  ret_from_fork+0x41/0x80
[   18.092096]  ? __pfx_kthread+0x10/0x10
[   18.092273]  ret_from_fork_asm+0x1a/0x30
[   18.092333]  </TASK>
[   18.092360] 
[   18.102815] Allocated by task 285:
[   18.103026]  kasan_save_stack+0x45/0x70
[   18.103346]  kasan_save_track+0x18/0x40
[   18.103638]  kasan_save_alloc_info+0x3b/0x50
[   18.103910]  __kasan_kmalloc+0xb7/0xc0
[   18.104184]  __kmalloc_cache_noprof+0x189/0x420
[   18.104508]  kasan_atomics+0x95/0x310
[   18.104927]  kunit_try_run_case+0x1a5/0x480
[   18.105166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.105421]  kthread+0x337/0x6f0
[   18.105586]  ret_from_fork+0x41/0x80
[   18.105800]  ret_from_fork_asm+0x1a/0x30
[   18.106060] 
[   18.106167] The buggy address belongs to the object at ffff8881033b5600
[   18.106167]  which belongs to the cache kmalloc-64 of size 64
[   18.106538] The buggy address is located 0 bytes to the right of
[   18.106538]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.107583] 
[   18.107795] The buggy address belongs to the physical page:
[   18.108215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.108827] flags: 0x200000000000000(node=0|zone=2)
[   18.109070] page_type: f5(slab)
[   18.109309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.109942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.110326] page dumped because: kasan: bad access detected
[   18.110637] 
[   18.110875] Memory state around the buggy address:
[   18.111197]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.111631]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.112082] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.112542]                                      ^
[   18.112842]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113508]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113834] ==================================================================
[   17.895280] ==================================================================
[   17.895726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.896898] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.897323] 
[   17.897685] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.897770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.897788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.897813] Call Trace:
[   17.897838]  <TASK>
[   17.897861]  dump_stack_lvl+0x73/0xb0
[   17.897897]  print_report+0xd1/0x650
[   17.897923]  ? __virt_addr_valid+0x1db/0x2d0
[   17.897947]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.897969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.897994]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.898017]  kasan_report+0x141/0x180
[   17.898040]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.898066]  kasan_check_range+0x10c/0x1c0
[   17.898086]  __kasan_check_write+0x18/0x20
[   17.898105]  kasan_atomics_helper+0x1ce1/0x5450
[   17.898128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.898151]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.898172]  ? ret_from_fork_asm+0x1a/0x30
[   17.898194]  ? kasan_atomics+0x152/0x310
[   17.898217]  kasan_atomics+0x1dc/0x310
[   17.898236]  ? __pfx_kasan_atomics+0x10/0x10
[   17.898257]  ? __pfx_read_tsc+0x10/0x10
[   17.898278]  ? ktime_get_ts64+0x86/0x230
[   17.898304]  kunit_try_run_case+0x1a5/0x480
[   17.898330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.898352]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.898377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.898399]  ? __kthread_parkme+0x82/0x180
[   17.898422]  ? preempt_count_sub+0x50/0x80
[   17.898448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.898473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.898495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.898518]  kthread+0x337/0x6f0
[   17.898536]  ? trace_preempt_on+0x20/0xc0
[   17.898581]  ? __pfx_kthread+0x10/0x10
[   17.898604]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.898627]  ? calculate_sigpending+0x7b/0xa0
[   17.898651]  ? __pfx_kthread+0x10/0x10
[   17.898683]  ret_from_fork+0x41/0x80
[   17.898707]  ? __pfx_kthread+0x10/0x10
[   17.898726]  ret_from_fork_asm+0x1a/0x30
[   17.898755]  </TASK>
[   17.898769] 
[   17.911649] Allocated by task 285:
[   17.912063]  kasan_save_stack+0x45/0x70
[   17.912529]  kasan_save_track+0x18/0x40
[   17.912722]  kasan_save_alloc_info+0x3b/0x50
[   17.913231]  __kasan_kmalloc+0xb7/0xc0
[   17.913763]  __kmalloc_cache_noprof+0x189/0x420
[   17.914065]  kasan_atomics+0x95/0x310
[   17.914453]  kunit_try_run_case+0x1a5/0x480
[   17.914915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.915248]  kthread+0x337/0x6f0
[   17.915644]  ret_from_fork+0x41/0x80
[   17.915879]  ret_from_fork_asm+0x1a/0x30
[   17.916055] 
[   17.916171] The buggy address belongs to the object at ffff8881033b5600
[   17.916171]  which belongs to the cache kmalloc-64 of size 64
[   17.916583] The buggy address is located 0 bytes to the right of
[   17.916583]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.917485] 
[   17.917723] The buggy address belongs to the physical page:
[   17.918166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.918590] flags: 0x200000000000000(node=0|zone=2)
[   17.918900] page_type: f5(slab)
[   17.919111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.919545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.919993] page dumped because: kasan: bad access detected
[   17.920332] 
[   17.920506] Memory state around the buggy address:
[   17.920802]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.921206]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.921548] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.922067]                                      ^
[   17.922269]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.922765]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.923194] ==================================================================
[   18.037813] ==================================================================
[   18.038226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   18.038507] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.038987] 
[   18.039188] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.039299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.039332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.039381] Call Trace:
[   18.039426]  <TASK>
[   18.039465]  dump_stack_lvl+0x73/0xb0
[   18.039525]  print_report+0xd1/0x650
[   18.039585]  ? __virt_addr_valid+0x1db/0x2d0
[   18.039628]  ? kasan_atomics_helper+0x4f71/0x5450
[   18.039666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.039734]  ? kasan_atomics_helper+0x4f71/0x5450
[   18.039780]  kasan_report+0x141/0x180
[   18.039819]  ? kasan_atomics_helper+0x4f71/0x5450
[   18.039869]  __asan_report_load8_noabort+0x18/0x20
[   18.039912]  kasan_atomics_helper+0x4f71/0x5450
[   18.039958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.040006]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.040047]  ? ret_from_fork_asm+0x1a/0x30
[   18.040088]  ? kasan_atomics+0x152/0x310
[   18.040132]  kasan_atomics+0x1dc/0x310
[   18.040173]  ? __pfx_kasan_atomics+0x10/0x10
[   18.040220]  ? __pfx_read_tsc+0x10/0x10
[   18.040264]  ? ktime_get_ts64+0x86/0x230
[   18.040318]  kunit_try_run_case+0x1a5/0x480
[   18.040375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.040424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.040468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.040514]  ? __kthread_parkme+0x82/0x180
[   18.040555]  ? preempt_count_sub+0x50/0x80
[   18.040624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.040668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.040709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.040756]  kthread+0x337/0x6f0
[   18.040791]  ? trace_preempt_on+0x20/0xc0
[   18.040833]  ? __pfx_kthread+0x10/0x10
[   18.040868]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.040909]  ? calculate_sigpending+0x7b/0xa0
[   18.040954]  ? __pfx_kthread+0x10/0x10
[   18.040995]  ret_from_fork+0x41/0x80
[   18.041038]  ? __pfx_kthread+0x10/0x10
[   18.041064]  ret_from_fork_asm+0x1a/0x30
[   18.041096]  </TASK>
[   18.041111] 
[   18.050583] Allocated by task 285:
[   18.050879]  kasan_save_stack+0x45/0x70
[   18.051191]  kasan_save_track+0x18/0x40
[   18.051491]  kasan_save_alloc_info+0x3b/0x50
[   18.051888]  __kasan_kmalloc+0xb7/0xc0
[   18.052120]  __kmalloc_cache_noprof+0x189/0x420
[   18.052326]  kasan_atomics+0x95/0x310
[   18.052606]  kunit_try_run_case+0x1a5/0x480
[   18.052945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.053178]  kthread+0x337/0x6f0
[   18.053444]  ret_from_fork+0x41/0x80
[   18.053696]  ret_from_fork_asm+0x1a/0x30
[   18.053885] 
[   18.054015] The buggy address belongs to the object at ffff8881033b5600
[   18.054015]  which belongs to the cache kmalloc-64 of size 64
[   18.054588] The buggy address is located 0 bytes to the right of
[   18.054588]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.054993] 
[   18.055116] The buggy address belongs to the physical page:
[   18.055352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.055704] flags: 0x200000000000000(node=0|zone=2)
[   18.056083] page_type: f5(slab)
[   18.056440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.057093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.057583] page dumped because: kasan: bad access detected
[   18.058062] 
[   18.058173] Memory state around the buggy address:
[   18.058374]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.058677]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.059128] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.059657]                                      ^
[   18.059976]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060239]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060492] ==================================================================
[   17.462824] ==================================================================
[   17.463191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.463691] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.463925] 
[   17.464077] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.464678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.464723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.464751] Call Trace:
[   17.464777]  <TASK>
[   17.464801]  dump_stack_lvl+0x73/0xb0
[   17.464842]  print_report+0xd1/0x650
[   17.464867]  ? __virt_addr_valid+0x1db/0x2d0
[   17.464891]  ? kasan_atomics_helper+0x1467/0x5450
[   17.464915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.464939]  ? kasan_atomics_helper+0x1467/0x5450
[   17.464961]  kasan_report+0x141/0x180
[   17.464985]  ? kasan_atomics_helper+0x1467/0x5450
[   17.465011]  kasan_check_range+0x10c/0x1c0
[   17.465033]  __kasan_check_write+0x18/0x20
[   17.465054]  kasan_atomics_helper+0x1467/0x5450
[   17.465078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.465101]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.465123]  ? ret_from_fork_asm+0x1a/0x30
[   17.465145]  ? kasan_atomics+0x152/0x310
[   17.465168]  kasan_atomics+0x1dc/0x310
[   17.465188]  ? __pfx_kasan_atomics+0x10/0x10
[   17.465209]  ? __pfx_read_tsc+0x10/0x10
[   17.465230]  ? ktime_get_ts64+0x86/0x230
[   17.465257]  kunit_try_run_case+0x1a5/0x480
[   17.465283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.465330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.465354]  ? __kthread_parkme+0x82/0x180
[   17.465377]  ? preempt_count_sub+0x50/0x80
[   17.465403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.465451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.465474]  kthread+0x337/0x6f0
[   17.465492]  ? trace_preempt_on+0x20/0xc0
[   17.465517]  ? __pfx_kthread+0x10/0x10
[   17.465536]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.465569]  ? calculate_sigpending+0x7b/0xa0
[   17.465598]  ? __pfx_kthread+0x10/0x10
[   17.465618]  ret_from_fork+0x41/0x80
[   17.465640]  ? __pfx_kthread+0x10/0x10
[   17.465667]  ret_from_fork_asm+0x1a/0x30
[   17.465705]  </TASK>
[   17.465719] 
[   17.476310] Allocated by task 285:
[   17.476547]  kasan_save_stack+0x45/0x70
[   17.477018]  kasan_save_track+0x18/0x40
[   17.477397]  kasan_save_alloc_info+0x3b/0x50
[   17.477823]  __kasan_kmalloc+0xb7/0xc0
[   17.478174]  __kmalloc_cache_noprof+0x189/0x420
[   17.478590]  kasan_atomics+0x95/0x310
[   17.478972]  kunit_try_run_case+0x1a5/0x480
[   17.479396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.479812]  kthread+0x337/0x6f0
[   17.479974]  ret_from_fork+0x41/0x80
[   17.480299]  ret_from_fork_asm+0x1a/0x30
[   17.480589] 
[   17.480796] The buggy address belongs to the object at ffff8881033b5600
[   17.480796]  which belongs to the cache kmalloc-64 of size 64
[   17.481476] The buggy address is located 0 bytes to the right of
[   17.481476]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.482089] 
[   17.482303] The buggy address belongs to the physical page:
[   17.482765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.483259] flags: 0x200000000000000(node=0|zone=2)
[   17.483505] page_type: f5(slab)
[   17.483854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.484261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.484740] page dumped because: kasan: bad access detected
[   17.485103] 
[   17.485276] Memory state around the buggy address:
[   17.485586]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.486143]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.486465] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.486897]                                      ^
[   17.487317]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.487820]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.488246] ==================================================================
[   17.924225] ==================================================================
[   17.925035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.925610] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.926138] 
[   17.926358] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.926457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.926483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.926525] Call Trace:
[   17.926578]  <TASK>
[   17.926617]  dump_stack_lvl+0x73/0xb0
[   17.926713]  print_report+0xd1/0x650
[   17.926763]  ? __virt_addr_valid+0x1db/0x2d0
[   17.926808]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.926848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.926894]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.926937]  kasan_report+0x141/0x180
[   17.926987]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.927032]  kasan_check_range+0x10c/0x1c0
[   17.927056]  __kasan_check_write+0x18/0x20
[   17.927078]  kasan_atomics_helper+0x1d7a/0x5450
[   17.927102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.927127]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.927177]  ? ret_from_fork_asm+0x1a/0x30
[   17.927218]  ? kasan_atomics+0x152/0x310
[   17.927268]  kasan_atomics+0x1dc/0x310
[   17.927313]  ? __pfx_kasan_atomics+0x10/0x10
[   17.927351]  ? __pfx_read_tsc+0x10/0x10
[   17.927390]  ? ktime_get_ts64+0x86/0x230
[   17.927442]  kunit_try_run_case+0x1a5/0x480
[   17.927491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.927535]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.927593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.927638]  ? __kthread_parkme+0x82/0x180
[   17.927720]  ? preempt_count_sub+0x50/0x80
[   17.927770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.927815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.927845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.927870]  kthread+0x337/0x6f0
[   17.927890]  ? trace_preempt_on+0x20/0xc0
[   17.927917]  ? __pfx_kthread+0x10/0x10
[   17.927937]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.927961]  ? calculate_sigpending+0x7b/0xa0
[   17.927984]  ? __pfx_kthread+0x10/0x10
[   17.928004]  ret_from_fork+0x41/0x80
[   17.928027]  ? __pfx_kthread+0x10/0x10
[   17.928046]  ret_from_fork_asm+0x1a/0x30
[   17.928078]  </TASK>
[   17.928093] 
[   17.937292] Allocated by task 285:
[   17.937606]  kasan_save_stack+0x45/0x70
[   17.937974]  kasan_save_track+0x18/0x40
[   17.938228]  kasan_save_alloc_info+0x3b/0x50
[   17.938443]  __kasan_kmalloc+0xb7/0xc0
[   17.938633]  __kmalloc_cache_noprof+0x189/0x420
[   17.938858]  kasan_atomics+0x95/0x310
[   17.939126]  kunit_try_run_case+0x1a5/0x480
[   17.939487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.939929]  kthread+0x337/0x6f0
[   17.940216]  ret_from_fork+0x41/0x80
[   17.940486]  ret_from_fork_asm+0x1a/0x30
[   17.940807] 
[   17.940974] The buggy address belongs to the object at ffff8881033b5600
[   17.940974]  which belongs to the cache kmalloc-64 of size 64
[   17.941393] The buggy address is located 0 bytes to the right of
[   17.941393]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.942180] 
[   17.942358] The buggy address belongs to the physical page:
[   17.942796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.943258] flags: 0x200000000000000(node=0|zone=2)
[   17.943567] page_type: f5(slab)
[   17.943841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.944201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.944570] page dumped because: kasan: bad access detected
[   17.944813] 
[   17.944930] Memory state around the buggy address:
[   17.945195]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.945710]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.946245] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.946865]                                      ^
[   17.947085]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.947355]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.947989] ==================================================================
[   16.843435] ==================================================================
[   16.844190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   16.845299] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.846071] 
[   16.846273] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.846387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.846419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.846469] Call Trace:
[   16.846522]  <TASK>
[   16.846576]  dump_stack_lvl+0x73/0xb0
[   16.846887]  print_report+0xd1/0x650
[   16.846954]  ? __virt_addr_valid+0x1db/0x2d0
[   16.846991]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.847018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.847046]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.847072]  kasan_report+0x141/0x180
[   16.847098]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.847128]  kasan_check_range+0x10c/0x1c0
[   16.847170]  __kasan_check_write+0x18/0x20
[   16.847194]  kasan_atomics_helper+0xa2b/0x5450
[   16.847221]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.847247]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.847272]  ? ret_from_fork_asm+0x1a/0x30
[   16.847297]  ? kasan_atomics+0x152/0x310
[   16.847324]  kasan_atomics+0x1dc/0x310
[   16.847346]  ? __pfx_kasan_atomics+0x10/0x10
[   16.847371]  ? __pfx_read_tsc+0x10/0x10
[   16.847395]  ? ktime_get_ts64+0x86/0x230
[   16.847427]  kunit_try_run_case+0x1a5/0x480
[   16.847456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.847482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.847510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.847537]  ? __kthread_parkme+0x82/0x180
[   16.847582]  ? preempt_count_sub+0x50/0x80
[   16.847636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.847680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.847711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.847739]  kthread+0x337/0x6f0
[   16.847761]  ? trace_preempt_on+0x20/0xc0
[   16.847789]  ? __pfx_kthread+0x10/0x10
[   16.847811]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.847835]  ? calculate_sigpending+0x7b/0xa0
[   16.847861]  ? __pfx_kthread+0x10/0x10
[   16.847882]  ret_from_fork+0x41/0x80
[   16.847906]  ? __pfx_kthread+0x10/0x10
[   16.847927]  ret_from_fork_asm+0x1a/0x30
[   16.847960]  </TASK>
[   16.847976] 
[   16.861526] Allocated by task 285:
[   16.862381]  kasan_save_stack+0x45/0x70
[   16.863029]  kasan_save_track+0x18/0x40
[   16.863338]  kasan_save_alloc_info+0x3b/0x50
[   16.863770]  __kasan_kmalloc+0xb7/0xc0
[   16.863960]  __kmalloc_cache_noprof+0x189/0x420
[   16.864159]  kasan_atomics+0x95/0x310
[   16.864328]  kunit_try_run_case+0x1a5/0x480
[   16.864516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.864929]  kthread+0x337/0x6f0
[   16.865227]  ret_from_fork+0x41/0x80
[   16.865639]  ret_from_fork_asm+0x1a/0x30
[   16.866497] 
[   16.866811] The buggy address belongs to the object at ffff8881033b5600
[   16.866811]  which belongs to the cache kmalloc-64 of size 64
[   16.867768] The buggy address is located 0 bytes to the right of
[   16.867768]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.868494] 
[   16.868639] The buggy address belongs to the physical page:
[   16.869041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.869454] flags: 0x200000000000000(node=0|zone=2)
[   16.870040] page_type: f5(slab)
[   16.870894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.871758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.872086] page dumped because: kasan: bad access detected
[   16.872380] 
[   16.872548] Memory state around the buggy address:
[   16.873058]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.873518]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.874052] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.874486]                                      ^
[   16.874996]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876078]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876601] ==================================================================
[   16.578022] ==================================================================
[   16.578583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.579006] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.580493] 
[   16.580790] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.580891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.580918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.580956] Call Trace:
[   16.580997]  <TASK>
[   16.581032]  dump_stack_lvl+0x73/0xb0
[   16.581094]  print_report+0xd1/0x650
[   16.581142]  ? __virt_addr_valid+0x1db/0x2d0
[   16.581186]  ? kasan_atomics_helper+0x565/0x5450
[   16.581386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.581417]  ? kasan_atomics_helper+0x565/0x5450
[   16.581442]  kasan_report+0x141/0x180
[   16.581468]  ? kasan_atomics_helper+0x565/0x5450
[   16.581495]  kasan_check_range+0x10c/0x1c0
[   16.581518]  __kasan_check_write+0x18/0x20
[   16.581539]  kasan_atomics_helper+0x565/0x5450
[   16.581586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.581634]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.581673]  ? ret_from_fork_asm+0x1a/0x30
[   16.581710]  ? kasan_atomics+0x152/0x310
[   16.581747]  kasan_atomics+0x1dc/0x310
[   16.581784]  ? __pfx_kasan_atomics+0x10/0x10
[   16.581815]  ? __pfx_read_tsc+0x10/0x10
[   16.581839]  ? ktime_get_ts64+0x86/0x230
[   16.581869]  kunit_try_run_case+0x1a5/0x480
[   16.581897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.581921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.581947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.581972]  ? __kthread_parkme+0x82/0x180
[   16.581998]  ? preempt_count_sub+0x50/0x80
[   16.582025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.582050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.582076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.582100]  kthread+0x337/0x6f0
[   16.582119]  ? trace_preempt_on+0x20/0xc0
[   16.582145]  ? __pfx_kthread+0x10/0x10
[   16.582165]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.582188]  ? calculate_sigpending+0x7b/0xa0
[   16.582212]  ? __pfx_kthread+0x10/0x10
[   16.582232]  ret_from_fork+0x41/0x80
[   16.582254]  ? __pfx_kthread+0x10/0x10
[   16.582274]  ret_from_fork_asm+0x1a/0x30
[   16.582306]  </TASK>
[   16.582321] 
[   16.597310] Allocated by task 285:
[   16.597635]  kasan_save_stack+0x45/0x70
[   16.597961]  kasan_save_track+0x18/0x40
[   16.598144]  kasan_save_alloc_info+0x3b/0x50
[   16.598894]  __kasan_kmalloc+0xb7/0xc0
[   16.599099]  __kmalloc_cache_noprof+0x189/0x420
[   16.599293]  kasan_atomics+0x95/0x310
[   16.599434]  kunit_try_run_case+0x1a5/0x480
[   16.599596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.600667]  kthread+0x337/0x6f0
[   16.601218]  ret_from_fork+0x41/0x80
[   16.601379]  ret_from_fork_asm+0x1a/0x30
[   16.601876] 
[   16.602057] The buggy address belongs to the object at ffff8881033b5600
[   16.602057]  which belongs to the cache kmalloc-64 of size 64
[   16.603352] The buggy address is located 0 bytes to the right of
[   16.603352]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.604067] 
[   16.604164] The buggy address belongs to the physical page:
[   16.604332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.604576] flags: 0x200000000000000(node=0|zone=2)
[   16.605061] page_type: f5(slab)
[   16.605211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.605421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.605672] page dumped because: kasan: bad access detected
[   16.605845] 
[   16.605925] Memory state around the buggy address:
[   16.606080]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.606279]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.606480] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.608462]                                      ^
[   16.608663]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.608944]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.609823] ==================================================================
[   16.952801] ==================================================================
[   16.953348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.954674] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.955199] 
[   16.955427] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.955512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.955533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.955586] Call Trace:
[   16.955620]  <TASK>
[   16.955654]  dump_stack_lvl+0x73/0xb0
[   16.955718]  print_report+0xd1/0x650
[   16.955766]  ? __virt_addr_valid+0x1db/0x2d0
[   16.955815]  ? kasan_atomics_helper+0xc70/0x5450
[   16.955862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.955911]  ? kasan_atomics_helper+0xc70/0x5450
[   16.955952]  kasan_report+0x141/0x180
[   16.955978]  ? kasan_atomics_helper+0xc70/0x5450
[   16.956004]  kasan_check_range+0x10c/0x1c0
[   16.956026]  __kasan_check_write+0x18/0x20
[   16.956046]  kasan_atomics_helper+0xc70/0x5450
[   16.956070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.956093]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.956116]  ? ret_from_fork_asm+0x1a/0x30
[   16.956138]  ? kasan_atomics+0x152/0x310
[   16.956161]  kasan_atomics+0x1dc/0x310
[   16.956181]  ? __pfx_kasan_atomics+0x10/0x10
[   16.956203]  ? __pfx_read_tsc+0x10/0x10
[   16.956224]  ? ktime_get_ts64+0x86/0x230
[   16.956251]  kunit_try_run_case+0x1a5/0x480
[   16.956278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.956301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.956326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.956349]  ? __kthread_parkme+0x82/0x180
[   16.956372]  ? preempt_count_sub+0x50/0x80
[   16.956398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.956422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.956445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.956469]  kthread+0x337/0x6f0
[   16.956486]  ? trace_preempt_on+0x20/0xc0
[   16.956511]  ? __pfx_kthread+0x10/0x10
[   16.956530]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.956551]  ? calculate_sigpending+0x7b/0xa0
[   16.956608]  ? __pfx_kthread+0x10/0x10
[   16.956629]  ret_from_fork+0x41/0x80
[   16.956665]  ? __pfx_kthread+0x10/0x10
[   16.956710]  ret_from_fork_asm+0x1a/0x30
[   16.956742]  </TASK>
[   16.956756] 
[   16.966291] Allocated by task 285:
[   16.966629]  kasan_save_stack+0x45/0x70
[   16.967074]  kasan_save_track+0x18/0x40
[   16.967417]  kasan_save_alloc_info+0x3b/0x50
[   16.967744]  __kasan_kmalloc+0xb7/0xc0
[   16.968013]  __kmalloc_cache_noprof+0x189/0x420
[   16.968205]  kasan_atomics+0x95/0x310
[   16.968378]  kunit_try_run_case+0x1a5/0x480
[   16.968605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.969054]  kthread+0x337/0x6f0
[   16.969318]  ret_from_fork+0x41/0x80
[   16.969608]  ret_from_fork_asm+0x1a/0x30
[   16.969943] 
[   16.970109] The buggy address belongs to the object at ffff8881033b5600
[   16.970109]  which belongs to the cache kmalloc-64 of size 64
[   16.970643] The buggy address is located 0 bytes to the right of
[   16.970643]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.971417] 
[   16.971626] The buggy address belongs to the physical page:
[   16.971926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.972266] flags: 0x200000000000000(node=0|zone=2)
[   16.972654] page_type: f5(slab)
[   16.972972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.973322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.974536] page dumped because: kasan: bad access detected
[   16.975027] 
[   16.975206] Memory state around the buggy address:
[   16.975577]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.976620]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.976965] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.977441]                                      ^
[   16.977678]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.977990]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.978277] ==================================================================
[   17.287841] ==================================================================
[   17.288423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   17.288872] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.289499] 
[   17.289751] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.289833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.289854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.289889] Call Trace:
[   17.289927]  <TASK>
[   17.289970]  dump_stack_lvl+0x73/0xb0
[   17.290028]  print_report+0xd1/0x650
[   17.290065]  ? __virt_addr_valid+0x1db/0x2d0
[   17.290098]  ? kasan_atomics_helper+0x1217/0x5450
[   17.290132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.290168]  ? kasan_atomics_helper+0x1217/0x5450
[   17.290205]  kasan_report+0x141/0x180
[   17.290244]  ? kasan_atomics_helper+0x1217/0x5450
[   17.290293]  kasan_check_range+0x10c/0x1c0
[   17.290336]  __kasan_check_write+0x18/0x20
[   17.290423]  kasan_atomics_helper+0x1217/0x5450
[   17.290469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.290512]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.290556]  ? ret_from_fork_asm+0x1a/0x30
[   17.290632]  ? kasan_atomics+0x152/0x310
[   17.290737]  kasan_atomics+0x1dc/0x310
[   17.290784]  ? __pfx_kasan_atomics+0x10/0x10
[   17.290829]  ? __pfx_read_tsc+0x10/0x10
[   17.290897]  ? ktime_get_ts64+0x86/0x230
[   17.290952]  kunit_try_run_case+0x1a5/0x480
[   17.291006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.291053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.291139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.291192]  ? __kthread_parkme+0x82/0x180
[   17.291241]  ? preempt_count_sub+0x50/0x80
[   17.291275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.291303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.291330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.291356]  kthread+0x337/0x6f0
[   17.291380]  ? trace_preempt_on+0x20/0xc0
[   17.291423]  ? __pfx_kthread+0x10/0x10
[   17.291458]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.291501]  ? calculate_sigpending+0x7b/0xa0
[   17.291595]  ? __pfx_kthread+0x10/0x10
[   17.291635]  ret_from_fork+0x41/0x80
[   17.291710]  ? __pfx_kthread+0x10/0x10
[   17.291752]  ret_from_fork_asm+0x1a/0x30
[   17.291843]  </TASK>
[   17.291874] 
[   17.302842] Allocated by task 285:
[   17.303071]  kasan_save_stack+0x45/0x70
[   17.303514]  kasan_save_track+0x18/0x40
[   17.303841]  kasan_save_alloc_info+0x3b/0x50
[   17.304137]  __kasan_kmalloc+0xb7/0xc0
[   17.304465]  __kmalloc_cache_noprof+0x189/0x420
[   17.305309]  kasan_atomics+0x95/0x310
[   17.305568]  kunit_try_run_case+0x1a5/0x480
[   17.305840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.307158]  kthread+0x337/0x6f0
[   17.307379]  ret_from_fork+0x41/0x80
[   17.307648]  ret_from_fork_asm+0x1a/0x30
[   17.308255] 
[   17.308379] The buggy address belongs to the object at ffff8881033b5600
[   17.308379]  which belongs to the cache kmalloc-64 of size 64
[   17.309595] The buggy address is located 0 bytes to the right of
[   17.309595]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.310204] 
[   17.310384] The buggy address belongs to the physical page:
[   17.310773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.311082] flags: 0x200000000000000(node=0|zone=2)
[   17.311455] page_type: f5(slab)
[   17.311823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.312312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.312680] page dumped because: kasan: bad access detected
[   17.313107] 
[   17.313310] Memory state around the buggy address:
[   17.313556]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.313989]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.314377] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.314754]                                      ^
[   17.315049]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.315555]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.316231] ==================================================================
[   18.197969] ==================================================================
[   18.198301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   18.198593] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.199307] 
[   18.199549] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.199647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.199693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.199726] Call Trace:
[   18.199764]  <TASK>
[   18.199798]  dump_stack_lvl+0x73/0xb0
[   18.199849]  print_report+0xd1/0x650
[   18.199887]  ? __virt_addr_valid+0x1db/0x2d0
[   18.199921]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.199953]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.199987]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.200020]  kasan_report+0x141/0x180
[   18.200055]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.200095]  __asan_report_load8_noabort+0x18/0x20
[   18.200131]  kasan_atomics_helper+0x4fa5/0x5450
[   18.200175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.200219]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.200262]  ? ret_from_fork_asm+0x1a/0x30
[   18.200306]  ? kasan_atomics+0x152/0x310
[   18.200376]  kasan_atomics+0x1dc/0x310
[   18.200414]  ? __pfx_kasan_atomics+0x10/0x10
[   18.200453]  ? __pfx_read_tsc+0x10/0x10
[   18.200495]  ? ktime_get_ts64+0x86/0x230
[   18.200552]  kunit_try_run_case+0x1a5/0x480
[   18.200641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.200715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.200770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.200819]  ? __kthread_parkme+0x82/0x180
[   18.200867]  ? preempt_count_sub+0x50/0x80
[   18.200926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.200979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.201031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.201078]  kthread+0x337/0x6f0
[   18.201109]  ? trace_preempt_on+0x20/0xc0
[   18.201151]  ? __pfx_kthread+0x10/0x10
[   18.201189]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.201229]  ? calculate_sigpending+0x7b/0xa0
[   18.201274]  ? __pfx_kthread+0x10/0x10
[   18.201311]  ret_from_fork+0x41/0x80
[   18.201348]  ? __pfx_kthread+0x10/0x10
[   18.201408]  ret_from_fork_asm+0x1a/0x30
[   18.201466]  </TASK>
[   18.201493] 
[   18.211082] Allocated by task 285:
[   18.212213]  kasan_save_stack+0x45/0x70
[   18.212413]  kasan_save_track+0x18/0x40
[   18.212987]  kasan_save_alloc_info+0x3b/0x50
[   18.213639]  __kasan_kmalloc+0xb7/0xc0
[   18.213908]  __kmalloc_cache_noprof+0x189/0x420
[   18.214075]  kasan_atomics+0x95/0x310
[   18.214212]  kunit_try_run_case+0x1a5/0x480
[   18.214371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.214547]  kthread+0x337/0x6f0
[   18.214703]  ret_from_fork+0x41/0x80
[   18.214876]  ret_from_fork_asm+0x1a/0x30
[   18.215182] 
[   18.215359] The buggy address belongs to the object at ffff8881033b5600
[   18.215359]  which belongs to the cache kmalloc-64 of size 64
[   18.216474] The buggy address is located 0 bytes to the right of
[   18.216474]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.217151] 
[   18.217279] The buggy address belongs to the physical page:
[   18.217494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.218267] flags: 0x200000000000000(node=0|zone=2)
[   18.218663] page_type: f5(slab)
[   18.218959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.219331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.219612] page dumped because: kasan: bad access detected
[   18.219822] 
[   18.219928] Memory state around the buggy address:
[   18.220280]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.220905]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.221424] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.222780]                                      ^
[   18.223043]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223323]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.224157] ==================================================================
[   17.234796] ==================================================================
[   17.235398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   17.236288] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.236519] 
[   17.236678] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.236740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.236756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.236780] Call Trace:
[   17.236805]  <TASK>
[   17.236828]  dump_stack_lvl+0x73/0xb0
[   17.236864]  print_report+0xd1/0x650
[   17.236890]  ? __virt_addr_valid+0x1db/0x2d0
[   17.236914]  ? kasan_atomics_helper+0x1148/0x5450
[   17.236937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.236960]  ? kasan_atomics_helper+0x1148/0x5450
[   17.236983]  kasan_report+0x141/0x180
[   17.237006]  ? kasan_atomics_helper+0x1148/0x5450
[   17.237032]  kasan_check_range+0x10c/0x1c0
[   17.237052]  __kasan_check_write+0x18/0x20
[   17.237073]  kasan_atomics_helper+0x1148/0x5450
[   17.237097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.237120]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.237142]  ? ret_from_fork_asm+0x1a/0x30
[   17.237165]  ? kasan_atomics+0x152/0x310
[   17.237188]  kasan_atomics+0x1dc/0x310
[   17.237208]  ? __pfx_kasan_atomics+0x10/0x10
[   17.237229]  ? __pfx_read_tsc+0x10/0x10
[   17.237249]  ? ktime_get_ts64+0x86/0x230
[   17.237276]  kunit_try_run_case+0x1a5/0x480
[   17.237302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.237325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.237349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.237373]  ? __kthread_parkme+0x82/0x180
[   17.237396]  ? preempt_count_sub+0x50/0x80
[   17.237423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.237447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.237471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.237494]  kthread+0x337/0x6f0
[   17.237512]  ? trace_preempt_on+0x20/0xc0
[   17.237537]  ? __pfx_kthread+0x10/0x10
[   17.237555]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.237601]  ? calculate_sigpending+0x7b/0xa0
[   17.237640]  ? __pfx_kthread+0x10/0x10
[   17.237677]  ret_from_fork+0x41/0x80
[   17.237720]  ? __pfx_kthread+0x10/0x10
[   17.237785]  ret_from_fork_asm+0x1a/0x30
[   17.237841]  </TASK>
[   17.237867] 
[   17.247769] Allocated by task 285:
[   17.247972]  kasan_save_stack+0x45/0x70
[   17.248152]  kasan_save_track+0x18/0x40
[   17.248296]  kasan_save_alloc_info+0x3b/0x50
[   17.248450]  __kasan_kmalloc+0xb7/0xc0
[   17.249584]  __kmalloc_cache_noprof+0x189/0x420
[   17.250097]  kasan_atomics+0x95/0x310
[   17.250294]  kunit_try_run_case+0x1a5/0x480
[   17.250488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.250751]  kthread+0x337/0x6f0
[   17.251618]  ret_from_fork+0x41/0x80
[   17.252272]  ret_from_fork_asm+0x1a/0x30
[   17.252592] 
[   17.252901] The buggy address belongs to the object at ffff8881033b5600
[   17.252901]  which belongs to the cache kmalloc-64 of size 64
[   17.253276] The buggy address is located 0 bytes to the right of
[   17.253276]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.253651] 
[   17.253750] The buggy address belongs to the physical page:
[   17.253921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.254157] flags: 0x200000000000000(node=0|zone=2)
[   17.254324] page_type: f5(slab)
[   17.254457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.255692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.255984] page dumped because: kasan: bad access detected
[   17.256196] 
[   17.256639] Memory state around the buggy address:
[   17.257234]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.257716]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.257939] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.258144]                                      ^
[   17.258300]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.258502]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.258809] ==================================================================
[   17.982957] ==================================================================
[   17.983393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.983802] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.984174] 
[   17.984305] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.984361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.984376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.984400] Call Trace:
[   17.984424]  <TASK>
[   17.984446]  dump_stack_lvl+0x73/0xb0
[   17.984477]  print_report+0xd1/0x650
[   17.984502]  ? __virt_addr_valid+0x1db/0x2d0
[   17.984525]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.984547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.985010]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.985060]  kasan_report+0x141/0x180
[   17.985335]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.985393]  kasan_check_range+0x10c/0x1c0
[   17.985428]  __kasan_check_write+0x18/0x20
[   17.985459]  kasan_atomics_helper+0x1eaa/0x5450
[   17.985495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.985573]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.985623]  ? ret_from_fork_asm+0x1a/0x30
[   17.985656]  ? kasan_atomics+0x152/0x310
[   17.986066]  kasan_atomics+0x1dc/0x310
[   17.986091]  ? __pfx_kasan_atomics+0x10/0x10
[   17.986114]  ? __pfx_read_tsc+0x10/0x10
[   17.986138]  ? ktime_get_ts64+0x86/0x230
[   17.986166]  kunit_try_run_case+0x1a5/0x480
[   17.986194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.986218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.986245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.986269]  ? __kthread_parkme+0x82/0x180
[   17.986294]  ? preempt_count_sub+0x50/0x80
[   17.986321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.986345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.986369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.986392]  kthread+0x337/0x6f0
[   17.986411]  ? trace_preempt_on+0x20/0xc0
[   17.986435]  ? __pfx_kthread+0x10/0x10
[   17.986454]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.986476]  ? calculate_sigpending+0x7b/0xa0
[   17.986499]  ? __pfx_kthread+0x10/0x10
[   17.986519]  ret_from_fork+0x41/0x80
[   17.986540]  ? __pfx_kthread+0x10/0x10
[   17.986577]  ret_from_fork_asm+0x1a/0x30
[   17.986612]  </TASK>
[   17.986628] 
[   17.998261] Allocated by task 285:
[   17.998641]  kasan_save_stack+0x45/0x70
[   17.999428]  kasan_save_track+0x18/0x40
[   17.999948]  kasan_save_alloc_info+0x3b/0x50
[   18.000134]  __kasan_kmalloc+0xb7/0xc0
[   18.000435]  __kmalloc_cache_noprof+0x189/0x420
[   18.000794]  kasan_atomics+0x95/0x310
[   18.001109]  kunit_try_run_case+0x1a5/0x480
[   18.001351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.001698]  kthread+0x337/0x6f0
[   18.002061]  ret_from_fork+0x41/0x80
[   18.002343]  ret_from_fork_asm+0x1a/0x30
[   18.002663] 
[   18.002779] The buggy address belongs to the object at ffff8881033b5600
[   18.002779]  which belongs to the cache kmalloc-64 of size 64
[   18.003518] The buggy address is located 0 bytes to the right of
[   18.003518]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.004579] 
[   18.004723] The buggy address belongs to the physical page:
[   18.004937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.005490] flags: 0x200000000000000(node=0|zone=2)
[   18.005968] page_type: f5(slab)
[   18.006200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.006719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.007038] page dumped because: kasan: bad access detected
[   18.007384] 
[   18.007499] Memory state around the buggy address:
[   18.007845]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.008430]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.008816] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.009494]                                      ^
[   18.009750]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.010097]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.010590] ==================================================================
[   16.458336] ==================================================================
[   16.458515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.459590] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.460002] 
[   16.460095] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.460156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.460172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.460198] Call Trace:
[   16.460224]  <TASK>
[   16.460313]  dump_stack_lvl+0x73/0xb0
[   16.460413]  print_report+0xd1/0x650
[   16.460447]  ? __virt_addr_valid+0x1db/0x2d0
[   16.460473]  ? kasan_atomics_helper+0x3df/0x5450
[   16.460498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.460675]  ? kasan_atomics_helper+0x3df/0x5450
[   16.460709]  kasan_report+0x141/0x180
[   16.460735]  ? kasan_atomics_helper+0x3df/0x5450
[   16.460763]  kasan_check_range+0x10c/0x1c0
[   16.460786]  __kasan_check_read+0x15/0x20
[   16.460808]  kasan_atomics_helper+0x3df/0x5450
[   16.460833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.460858]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.460881]  ? ret_from_fork_asm+0x1a/0x30
[   16.460905]  ? kasan_atomics+0x152/0x310
[   16.460931]  kasan_atomics+0x1dc/0x310
[   16.460952]  ? __pfx_kasan_atomics+0x10/0x10
[   16.460975]  ? __pfx_read_tsc+0x10/0x10
[   16.460998]  ? ktime_get_ts64+0x86/0x230
[   16.461027]  kunit_try_run_case+0x1a5/0x480
[   16.461053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.461079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.461106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.461131]  ? __kthread_parkme+0x82/0x180
[   16.461155]  ? preempt_count_sub+0x50/0x80
[   16.461183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.461208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.461234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.461260]  kthread+0x337/0x6f0
[   16.461280]  ? trace_preempt_on+0x20/0xc0
[   16.461307]  ? __pfx_kthread+0x10/0x10
[   16.461328]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.461352]  ? calculate_sigpending+0x7b/0xa0
[   16.461376]  ? __pfx_kthread+0x10/0x10
[   16.461397]  ret_from_fork+0x41/0x80
[   16.461420]  ? __pfx_kthread+0x10/0x10
[   16.461440]  ret_from_fork_asm+0x1a/0x30
[   16.461472]  </TASK>
[   16.461487] 
[   16.473159] Allocated by task 285:
[   16.473386]  kasan_save_stack+0x45/0x70
[   16.473521]  kasan_save_track+0x18/0x40
[   16.474019]  kasan_save_alloc_info+0x3b/0x50
[   16.474210]  __kasan_kmalloc+0xb7/0xc0
[   16.474618]  __kmalloc_cache_noprof+0x189/0x420
[   16.474966]  kasan_atomics+0x95/0x310
[   16.475170]  kunit_try_run_case+0x1a5/0x480
[   16.475468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.475774]  kthread+0x337/0x6f0
[   16.475930]  ret_from_fork+0x41/0x80
[   16.476105]  ret_from_fork_asm+0x1a/0x30
[   16.476258] 
[   16.476333] The buggy address belongs to the object at ffff8881033b5600
[   16.476333]  which belongs to the cache kmalloc-64 of size 64
[   16.476783] The buggy address is located 0 bytes to the right of
[   16.476783]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.477219] 
[   16.477354] The buggy address belongs to the physical page:
[   16.478440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.478975] flags: 0x200000000000000(node=0|zone=2)
[   16.479384] page_type: f5(slab)
[   16.479648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.480259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.480543] page dumped because: kasan: bad access detected
[   16.480680] 
[   16.480744] Memory state around the buggy address:
[   16.480858]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.481003]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.481301] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.482741]                                      ^
[   16.482985]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.483160]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.484135] ==================================================================
[   18.225059] ==================================================================
[   18.225510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   18.226528] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.227527] 
[   18.227773] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.228094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.228123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.228151] Call Trace:
[   18.228179]  <TASK>
[   18.228206]  dump_stack_lvl+0x73/0xb0
[   18.228248]  print_report+0xd1/0x650
[   18.228277]  ? __virt_addr_valid+0x1db/0x2d0
[   18.228302]  ? kasan_atomics_helper+0x224c/0x5450
[   18.228327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.228354]  ? kasan_atomics_helper+0x224c/0x5450
[   18.228379]  kasan_report+0x141/0x180
[   18.228404]  ? kasan_atomics_helper+0x224c/0x5450
[   18.228433]  kasan_check_range+0x10c/0x1c0
[   18.228456]  __kasan_check_write+0x18/0x20
[   18.228480]  kasan_atomics_helper+0x224c/0x5450
[   18.228506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.228531]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.228553]  ? ret_from_fork_asm+0x1a/0x30
[   18.228599]  ? kasan_atomics+0x152/0x310
[   18.228624]  kasan_atomics+0x1dc/0x310
[   18.228645]  ? __pfx_kasan_atomics+0x10/0x10
[   18.228675]  ? __pfx_read_tsc+0x10/0x10
[   18.228704]  ? ktime_get_ts64+0x86/0x230
[   18.228732]  kunit_try_run_case+0x1a5/0x480
[   18.228759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.228783]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.228808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.228831]  ? __kthread_parkme+0x82/0x180
[   18.228855]  ? preempt_count_sub+0x50/0x80
[   18.228881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.228906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.228931]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.228955]  kthread+0x337/0x6f0
[   18.228973]  ? trace_preempt_on+0x20/0xc0
[   18.228998]  ? __pfx_kthread+0x10/0x10
[   18.229017]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.229038]  ? calculate_sigpending+0x7b/0xa0
[   18.229062]  ? __pfx_kthread+0x10/0x10
[   18.229082]  ret_from_fork+0x41/0x80
[   18.229104]  ? __pfx_kthread+0x10/0x10
[   18.229123]  ret_from_fork_asm+0x1a/0x30
[   18.229152]  </TASK>
[   18.229167] 
[   18.243787] Allocated by task 285:
[   18.246094]  kasan_save_stack+0x45/0x70
[   18.246288]  kasan_save_track+0x18/0x40
[   18.246591]  kasan_save_alloc_info+0x3b/0x50
[   18.247751]  __kasan_kmalloc+0xb7/0xc0
[   18.248016]  __kmalloc_cache_noprof+0x189/0x420
[   18.248198]  kasan_atomics+0x95/0x310
[   18.248713]  kunit_try_run_case+0x1a5/0x480
[   18.249188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.249430]  kthread+0x337/0x6f0
[   18.249581]  ret_from_fork+0x41/0x80
[   18.250093]  ret_from_fork_asm+0x1a/0x30
[   18.250573] 
[   18.250682] The buggy address belongs to the object at ffff8881033b5600
[   18.250682]  which belongs to the cache kmalloc-64 of size 64
[   18.251442] The buggy address is located 0 bytes to the right of
[   18.251442]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.252154] 
[   18.252389] The buggy address belongs to the physical page:
[   18.252864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.253413] flags: 0x200000000000000(node=0|zone=2)
[   18.253951] page_type: f5(slab)
[   18.254444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.254704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.255226] page dumped because: kasan: bad access detected
[   18.255578] 
[   18.255901] Memory state around the buggy address:
[   18.256136]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.256343]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.256545] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.257204]                                      ^
[   18.257419]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.258107]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.258516] ==================================================================
[   16.389460] ==================================================================
[   16.390055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.391253] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.391516] 
[   16.391673] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.391733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.391748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.391772] Call Trace:
[   16.391796]  <TASK>
[   16.391818]  dump_stack_lvl+0x73/0xb0
[   16.391852]  print_report+0xd1/0x650
[   16.391880]  ? __virt_addr_valid+0x1db/0x2d0
[   16.391906]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.391931]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.391954]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.391977]  kasan_report+0x141/0x180
[   16.392000]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.392027]  __asan_report_store4_noabort+0x1b/0x30
[   16.392049]  kasan_atomics_helper+0x4ba2/0x5450
[   16.392073]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.392096]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.392117]  ? ret_from_fork_asm+0x1a/0x30
[   16.392139]  ? kasan_atomics+0x152/0x310
[   16.392163]  kasan_atomics+0x1dc/0x310
[   16.392183]  ? __pfx_kasan_atomics+0x10/0x10
[   16.392204]  ? __pfx_read_tsc+0x10/0x10
[   16.392223]  ? ktime_get_ts64+0x86/0x230
[   16.392250]  kunit_try_run_case+0x1a5/0x480
[   16.392276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.392299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.392325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.392348]  ? __kthread_parkme+0x82/0x180
[   16.392372]  ? preempt_count_sub+0x50/0x80
[   16.392399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.392425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.392451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.392477]  kthread+0x337/0x6f0
[   16.392496]  ? trace_preempt_on+0x20/0xc0
[   16.392522]  ? __pfx_kthread+0x10/0x10
[   16.392542]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.393302]  ? calculate_sigpending+0x7b/0xa0
[   16.393338]  ? __pfx_kthread+0x10/0x10
[   16.393361]  ret_from_fork+0x41/0x80
[   16.393385]  ? __pfx_kthread+0x10/0x10
[   16.393406]  ret_from_fork_asm+0x1a/0x30
[   16.393437]  </TASK>
[   16.393452] 
[   16.404485] Allocated by task 285:
[   16.404903]  kasan_save_stack+0x45/0x70
[   16.405323]  kasan_save_track+0x18/0x40
[   16.405476]  kasan_save_alloc_info+0x3b/0x50
[   16.405706]  __kasan_kmalloc+0xb7/0xc0
[   16.406057]  __kmalloc_cache_noprof+0x189/0x420
[   16.406329]  kasan_atomics+0x95/0x310
[   16.406570]  kunit_try_run_case+0x1a5/0x480
[   16.406729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.406887]  kthread+0x337/0x6f0
[   16.406995]  ret_from_fork+0x41/0x80
[   16.407278]  ret_from_fork_asm+0x1a/0x30
[   16.407716] 
[   16.408187] The buggy address belongs to the object at ffff8881033b5600
[   16.408187]  which belongs to the cache kmalloc-64 of size 64
[   16.408832] The buggy address is located 0 bytes to the right of
[   16.408832]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.409469] 
[   16.409609] The buggy address belongs to the physical page:
[   16.409872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.410254] flags: 0x200000000000000(node=0|zone=2)
[   16.410740] page_type: f5(slab)
[   16.410904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.411292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.411887] page dumped because: kasan: bad access detected
[   16.412163] 
[   16.412245] Memory state around the buggy address:
[   16.412553]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.412859]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.413216] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.413554]                                      ^
[   16.413750]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414160]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.414466] ==================================================================
[   16.919006] ==================================================================
[   16.919670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.920481] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.921174] 
[   16.921664] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.921941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.921971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.922157] Call Trace:
[   16.922192]  <TASK>
[   16.922226]  dump_stack_lvl+0x73/0xb0
[   16.922272]  print_report+0xd1/0x650
[   16.922300]  ? __virt_addr_valid+0x1db/0x2d0
[   16.922326]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.922350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.922374]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.922397]  kasan_report+0x141/0x180
[   16.922421]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.922448]  kasan_check_range+0x10c/0x1c0
[   16.922470]  __kasan_check_write+0x18/0x20
[   16.922491]  kasan_atomics_helper+0xb6a/0x5450
[   16.922515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.922540]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.922580]  ? ret_from_fork_asm+0x1a/0x30
[   16.922615]  ? kasan_atomics+0x152/0x310
[   16.922654]  kasan_atomics+0x1dc/0x310
[   16.922690]  ? __pfx_kasan_atomics+0x10/0x10
[   16.922725]  ? __pfx_read_tsc+0x10/0x10
[   16.922788]  ? ktime_get_ts64+0x86/0x230
[   16.922833]  kunit_try_run_case+0x1a5/0x480
[   16.922879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.922917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.922958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.922996]  ? __kthread_parkme+0x82/0x180
[   16.923032]  ? preempt_count_sub+0x50/0x80
[   16.923075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.923104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.923141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.923173]  kthread+0x337/0x6f0
[   16.923193]  ? trace_preempt_on+0x20/0xc0
[   16.923222]  ? __pfx_kthread+0x10/0x10
[   16.923244]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.923267]  ? calculate_sigpending+0x7b/0xa0
[   16.923293]  ? __pfx_kthread+0x10/0x10
[   16.923315]  ret_from_fork+0x41/0x80
[   16.923339]  ? __pfx_kthread+0x10/0x10
[   16.923358]  ret_from_fork_asm+0x1a/0x30
[   16.923390]  </TASK>
[   16.923404] 
[   16.937736] Allocated by task 285:
[   16.938125]  kasan_save_stack+0x45/0x70
[   16.938523]  kasan_save_track+0x18/0x40
[   16.938776]  kasan_save_alloc_info+0x3b/0x50
[   16.938978]  __kasan_kmalloc+0xb7/0xc0
[   16.939259]  __kmalloc_cache_noprof+0x189/0x420
[   16.939636]  kasan_atomics+0x95/0x310
[   16.940040]  kunit_try_run_case+0x1a5/0x480
[   16.940366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.940898]  kthread+0x337/0x6f0
[   16.941066]  ret_from_fork+0x41/0x80
[   16.941240]  ret_from_fork_asm+0x1a/0x30
[   16.941607] 
[   16.941802] The buggy address belongs to the object at ffff8881033b5600
[   16.941802]  which belongs to the cache kmalloc-64 of size 64
[   16.942580] The buggy address is located 0 bytes to the right of
[   16.942580]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.943522] 
[   16.943803] The buggy address belongs to the physical page:
[   16.944275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.944716] flags: 0x200000000000000(node=0|zone=2)
[   16.944884] page_type: f5(slab)
[   16.945022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.945632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.946161] page dumped because: kasan: bad access detected
[   16.946515] 
[   16.946644] Memory state around the buggy address:
[   16.946848]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.948049]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.948953] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.949425]                                      ^
[   16.949630]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.950101]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.951054] ==================================================================
[   17.489242] ==================================================================
[   17.490196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.490660] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.491186] 
[   17.491440] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.491548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.491594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.491641] Call Trace:
[   17.491698]  <TASK>
[   17.491752]  dump_stack_lvl+0x73/0xb0
[   17.491825]  print_report+0xd1/0x650
[   17.491881]  ? __virt_addr_valid+0x1db/0x2d0
[   17.491927]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.491988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.492059]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.492105]  kasan_report+0x141/0x180
[   17.492135]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.492165]  __asan_report_store8_noabort+0x1b/0x30
[   17.492189]  kasan_atomics_helper+0x50d4/0x5450
[   17.492216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.492253]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.492289]  ? ret_from_fork_asm+0x1a/0x30
[   17.492331]  ? kasan_atomics+0x152/0x310
[   17.492375]  kasan_atomics+0x1dc/0x310
[   17.492425]  ? __pfx_kasan_atomics+0x10/0x10
[   17.492480]  ? __pfx_read_tsc+0x10/0x10
[   17.492525]  ? ktime_get_ts64+0x86/0x230
[   17.492583]  kunit_try_run_case+0x1a5/0x480
[   17.492636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.492676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.492730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.492790]  ? __kthread_parkme+0x82/0x180
[   17.492836]  ? preempt_count_sub+0x50/0x80
[   17.492884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.492921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.492947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.492972]  kthread+0x337/0x6f0
[   17.492991]  ? trace_preempt_on+0x20/0xc0
[   17.493018]  ? __pfx_kthread+0x10/0x10
[   17.493037]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.493059]  ? calculate_sigpending+0x7b/0xa0
[   17.493083]  ? __pfx_kthread+0x10/0x10
[   17.493104]  ret_from_fork+0x41/0x80
[   17.493125]  ? __pfx_kthread+0x10/0x10
[   17.493145]  ret_from_fork_asm+0x1a/0x30
[   17.493176]  </TASK>
[   17.493191] 
[   17.502765] Allocated by task 285:
[   17.503090]  kasan_save_stack+0x45/0x70
[   17.503482]  kasan_save_track+0x18/0x40
[   17.503828]  kasan_save_alloc_info+0x3b/0x50
[   17.504029]  __kasan_kmalloc+0xb7/0xc0
[   17.504377]  __kmalloc_cache_noprof+0x189/0x420
[   17.504782]  kasan_atomics+0x95/0x310
[   17.505007]  kunit_try_run_case+0x1a5/0x480
[   17.505322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.505540]  kthread+0x337/0x6f0
[   17.505821]  ret_from_fork+0x41/0x80
[   17.506193]  ret_from_fork_asm+0x1a/0x30
[   17.506440] 
[   17.506553] The buggy address belongs to the object at ffff8881033b5600
[   17.506553]  which belongs to the cache kmalloc-64 of size 64
[   17.507361] The buggy address is located 0 bytes to the right of
[   17.507361]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.508301] 
[   17.508504] The buggy address belongs to the physical page:
[   17.508811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.509264] flags: 0x200000000000000(node=0|zone=2)
[   17.509616] page_type: f5(slab)
[   17.509921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.510279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.510676] page dumped because: kasan: bad access detected
[   17.511016] 
[   17.511226] Memory state around the buggy address:
[   17.511507]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.512179]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.512528] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.513049]                                      ^
[   17.513295]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.513729]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.514048] ==================================================================
[   17.317141] ==================================================================
[   17.318047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.318491] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.319129] 
[   17.319373] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.319473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.319501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.319547] Call Trace:
[   17.319605]  <TASK>
[   17.319656]  dump_stack_lvl+0x73/0xb0
[   17.319736]  print_report+0xd1/0x650
[   17.319793]  ? __virt_addr_valid+0x1db/0x2d0
[   17.319842]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.319893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.319938]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.319979]  kasan_report+0x141/0x180
[   17.320025]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.320085]  __asan_report_load4_noabort+0x18/0x20
[   17.320131]  kasan_atomics_helper+0x49e8/0x5450
[   17.320196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.320238]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.320262]  ? ret_from_fork_asm+0x1a/0x30
[   17.320286]  ? kasan_atomics+0x152/0x310
[   17.320311]  kasan_atomics+0x1dc/0x310
[   17.320332]  ? __pfx_kasan_atomics+0x10/0x10
[   17.320355]  ? __pfx_read_tsc+0x10/0x10
[   17.320392]  ? ktime_get_ts64+0x86/0x230
[   17.320431]  kunit_try_run_case+0x1a5/0x480
[   17.320460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.320483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.320510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.320533]  ? __kthread_parkme+0x82/0x180
[   17.320570]  ? preempt_count_sub+0x50/0x80
[   17.320604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.320629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.320660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.320706]  kthread+0x337/0x6f0
[   17.320727]  ? trace_preempt_on+0x20/0xc0
[   17.320753]  ? __pfx_kthread+0x10/0x10
[   17.320773]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.320795]  ? calculate_sigpending+0x7b/0xa0
[   17.320819]  ? __pfx_kthread+0x10/0x10
[   17.320838]  ret_from_fork+0x41/0x80
[   17.320860]  ? __pfx_kthread+0x10/0x10
[   17.320880]  ret_from_fork_asm+0x1a/0x30
[   17.320909]  </TASK>
[   17.320923] 
[   17.330188] Allocated by task 285:
[   17.330517]  kasan_save_stack+0x45/0x70
[   17.330867]  kasan_save_track+0x18/0x40
[   17.331278]  kasan_save_alloc_info+0x3b/0x50
[   17.331617]  __kasan_kmalloc+0xb7/0xc0
[   17.331961]  __kmalloc_cache_noprof+0x189/0x420
[   17.332330]  kasan_atomics+0x95/0x310
[   17.332649]  kunit_try_run_case+0x1a5/0x480
[   17.332863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.333081]  kthread+0x337/0x6f0
[   17.333247]  ret_from_fork+0x41/0x80
[   17.333425]  ret_from_fork_asm+0x1a/0x30
[   17.333754] 
[   17.333947] The buggy address belongs to the object at ffff8881033b5600
[   17.333947]  which belongs to the cache kmalloc-64 of size 64
[   17.334789] The buggy address is located 0 bytes to the right of
[   17.334789]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.335640] 
[   17.335866] The buggy address belongs to the physical page:
[   17.336236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.336644] flags: 0x200000000000000(node=0|zone=2)
[   17.336926] page_type: f5(slab)
[   17.337239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.337533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.338119] page dumped because: kasan: bad access detected
[   17.338548] 
[   17.338750] Memory state around the buggy address:
[   17.338995]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.339285]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.339860] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.340398]                                      ^
[   17.342452]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.343109]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.343736] ==================================================================
[   17.034123] ==================================================================
[   17.034833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   17.035393] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.036072] 
[   17.036340] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.036445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.036477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.036526] Call Trace:
[   17.036579]  <TASK>
[   17.036624]  dump_stack_lvl+0x73/0xb0
[   17.036691]  print_report+0xd1/0x650
[   17.036745]  ? __virt_addr_valid+0x1db/0x2d0
[   17.036795]  ? kasan_atomics_helper+0xde0/0x5450
[   17.036843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.036895]  ? kasan_atomics_helper+0xde0/0x5450
[   17.036944]  kasan_report+0x141/0x180
[   17.036996]  ? kasan_atomics_helper+0xde0/0x5450
[   17.037056]  kasan_check_range+0x10c/0x1c0
[   17.037103]  __kasan_check_write+0x18/0x20
[   17.037162]  kasan_atomics_helper+0xde0/0x5450
[   17.037205]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.037249]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.037291]  ? ret_from_fork_asm+0x1a/0x30
[   17.037375]  ? kasan_atomics+0x152/0x310
[   17.037458]  kasan_atomics+0x1dc/0x310
[   17.037515]  ? __pfx_kasan_atomics+0x10/0x10
[   17.037572]  ? __pfx_read_tsc+0x10/0x10
[   17.037612]  ? ktime_get_ts64+0x86/0x230
[   17.037665]  kunit_try_run_case+0x1a5/0x480
[   17.037715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.037762]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.037808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.037883]  ? __kthread_parkme+0x82/0x180
[   17.037941]  ? preempt_count_sub+0x50/0x80
[   17.038000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.038051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.038103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.038147]  kthread+0x337/0x6f0
[   17.038167]  ? trace_preempt_on+0x20/0xc0
[   17.038193]  ? __pfx_kthread+0x10/0x10
[   17.038213]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.038234]  ? calculate_sigpending+0x7b/0xa0
[   17.038257]  ? __pfx_kthread+0x10/0x10
[   17.038276]  ret_from_fork+0x41/0x80
[   17.038300]  ? __pfx_kthread+0x10/0x10
[   17.038318]  ret_from_fork_asm+0x1a/0x30
[   17.038347]  </TASK>
[   17.038361] 
[   17.049551] Allocated by task 285:
[   17.049742]  kasan_save_stack+0x45/0x70
[   17.050050]  kasan_save_track+0x18/0x40
[   17.050326]  kasan_save_alloc_info+0x3b/0x50
[   17.050642]  __kasan_kmalloc+0xb7/0xc0
[   17.050931]  __kmalloc_cache_noprof+0x189/0x420
[   17.051198]  kasan_atomics+0x95/0x310
[   17.051452]  kunit_try_run_case+0x1a5/0x480
[   17.052874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.053192]  kthread+0x337/0x6f0
[   17.053339]  ret_from_fork+0x41/0x80
[   17.053838]  ret_from_fork_asm+0x1a/0x30
[   17.054172] 
[   17.054270] The buggy address belongs to the object at ffff8881033b5600
[   17.054270]  which belongs to the cache kmalloc-64 of size 64
[   17.055457] The buggy address is located 0 bytes to the right of
[   17.055457]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.056268] 
[   17.056614] The buggy address belongs to the physical page:
[   17.057061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.057681] flags: 0x200000000000000(node=0|zone=2)
[   17.058124] page_type: f5(slab)
[   17.058356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.058714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.059010] page dumped because: kasan: bad access detected
[   17.059281] 
[   17.059447] Memory state around the buggy address:
[   17.060287]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.060568]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.060808] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.061250]                                      ^
[   17.061804]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.062225]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.062459] ==================================================================
[   17.517909] ==================================================================
[   17.518358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.519534] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.520596] 
[   17.520973] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.521080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.521107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.521164] Call Trace:
[   17.521190]  <TASK>
[   17.521218]  dump_stack_lvl+0x73/0xb0
[   17.521263]  print_report+0xd1/0x650
[   17.521295]  ? __virt_addr_valid+0x1db/0x2d0
[   17.521335]  ? kasan_atomics_helper+0x151d/0x5450
[   17.521364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.521388]  ? kasan_atomics_helper+0x151d/0x5450
[   17.521413]  kasan_report+0x141/0x180
[   17.521438]  ? kasan_atomics_helper+0x151d/0x5450
[   17.521465]  kasan_check_range+0x10c/0x1c0
[   17.521487]  __kasan_check_write+0x18/0x20
[   17.521508]  kasan_atomics_helper+0x151d/0x5450
[   17.521532]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.521556]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.521610]  ? ret_from_fork_asm+0x1a/0x30
[   17.521678]  ? kasan_atomics+0x152/0x310
[   17.521731]  kasan_atomics+0x1dc/0x310
[   17.521759]  ? __pfx_kasan_atomics+0x10/0x10
[   17.521783]  ? __pfx_read_tsc+0x10/0x10
[   17.521807]  ? ktime_get_ts64+0x86/0x230
[   17.521836]  kunit_try_run_case+0x1a5/0x480
[   17.521865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.521889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.521914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.521938]  ? __kthread_parkme+0x82/0x180
[   17.521962]  ? preempt_count_sub+0x50/0x80
[   17.521988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.522012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.522036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.522060]  kthread+0x337/0x6f0
[   17.522078]  ? trace_preempt_on+0x20/0xc0
[   17.522103]  ? __pfx_kthread+0x10/0x10
[   17.522122]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.522144]  ? calculate_sigpending+0x7b/0xa0
[   17.522167]  ? __pfx_kthread+0x10/0x10
[   17.522185]  ret_from_fork+0x41/0x80
[   17.522208]  ? __pfx_kthread+0x10/0x10
[   17.522226]  ret_from_fork_asm+0x1a/0x30
[   17.522256]  </TASK>
[   17.522270] 
[   17.531871] Allocated by task 285:
[   17.532180]  kasan_save_stack+0x45/0x70
[   17.532508]  kasan_save_track+0x18/0x40
[   17.532763]  kasan_save_alloc_info+0x3b/0x50
[   17.532963]  __kasan_kmalloc+0xb7/0xc0
[   17.533141]  __kmalloc_cache_noprof+0x189/0x420
[   17.533342]  kasan_atomics+0x95/0x310
[   17.533520]  kunit_try_run_case+0x1a5/0x480
[   17.533892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.534306]  kthread+0x337/0x6f0
[   17.534628]  ret_from_fork+0x41/0x80
[   17.534955]  ret_from_fork_asm+0x1a/0x30
[   17.535286] 
[   17.535466] The buggy address belongs to the object at ffff8881033b5600
[   17.535466]  which belongs to the cache kmalloc-64 of size 64
[   17.536284] The buggy address is located 0 bytes to the right of
[   17.536284]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.536949] 
[   17.537072] The buggy address belongs to the physical page:
[   17.537470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.538054] flags: 0x200000000000000(node=0|zone=2)
[   17.538267] page_type: f5(slab)
[   17.538595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.538958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.539254] page dumped because: kasan: bad access detected
[   17.539472] 
[   17.539589] Memory state around the buggy address:
[   17.539977]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.540481]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.541015] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.541519]                                      ^
[   17.541880]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.542222]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.542686] ==================================================================
[   17.172620] ==================================================================
[   17.172947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   17.173323] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.175154] 
[   17.177646] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.178287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.178324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.178373] Call Trace:
[   17.178420]  <TASK>
[   17.178460]  dump_stack_lvl+0x73/0xb0
[   17.178534]  print_report+0xd1/0x650
[   17.178599]  ? __virt_addr_valid+0x1db/0x2d0
[   17.178648]  ? kasan_atomics_helper+0x1079/0x5450
[   17.178701]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.178753]  ? kasan_atomics_helper+0x1079/0x5450
[   17.178805]  kasan_report+0x141/0x180
[   17.178857]  ? kasan_atomics_helper+0x1079/0x5450
[   17.178909]  kasan_check_range+0x10c/0x1c0
[   17.178950]  __kasan_check_write+0x18/0x20
[   17.178986]  kasan_atomics_helper+0x1079/0x5450
[   17.179025]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.179067]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.179111]  ? ret_from_fork_asm+0x1a/0x30
[   17.179166]  ? kasan_atomics+0x152/0x310
[   17.179219]  kasan_atomics+0x1dc/0x310
[   17.179264]  ? __pfx_kasan_atomics+0x10/0x10
[   17.179311]  ? __pfx_read_tsc+0x10/0x10
[   17.179357]  ? ktime_get_ts64+0x86/0x230
[   17.179410]  kunit_try_run_case+0x1a5/0x480
[   17.179465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.179511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.180639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.180725]  ? __kthread_parkme+0x82/0x180
[   17.180765]  ? preempt_count_sub+0x50/0x80
[   17.180809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.180882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.180921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.180957]  kthread+0x337/0x6f0
[   17.180985]  ? trace_preempt_on+0x20/0xc0
[   17.181022]  ? __pfx_kthread+0x10/0x10
[   17.181053]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.181114]  ? calculate_sigpending+0x7b/0xa0
[   17.181155]  ? __pfx_kthread+0x10/0x10
[   17.181188]  ret_from_fork+0x41/0x80
[   17.181223]  ? __pfx_kthread+0x10/0x10
[   17.181254]  ret_from_fork_asm+0x1a/0x30
[   17.181310]  </TASK>
[   17.181336] 
[   17.194125] Allocated by task 285:
[   17.194463]  kasan_save_stack+0x45/0x70
[   17.194921]  kasan_save_track+0x18/0x40
[   17.195209]  kasan_save_alloc_info+0x3b/0x50
[   17.195586]  __kasan_kmalloc+0xb7/0xc0
[   17.195888]  __kmalloc_cache_noprof+0x189/0x420
[   17.196189]  kasan_atomics+0x95/0x310
[   17.196423]  kunit_try_run_case+0x1a5/0x480
[   17.196806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.197119]  kthread+0x337/0x6f0
[   17.197396]  ret_from_fork+0x41/0x80
[   17.197587]  ret_from_fork_asm+0x1a/0x30
[   17.197805] 
[   17.197921] The buggy address belongs to the object at ffff8881033b5600
[   17.197921]  which belongs to the cache kmalloc-64 of size 64
[   17.198612] The buggy address is located 0 bytes to the right of
[   17.198612]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.199543] 
[   17.199805] The buggy address belongs to the physical page:
[   17.200218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.200829] flags: 0x200000000000000(node=0|zone=2)
[   17.201225] page_type: f5(slab)
[   17.201488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.201842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.202383] page dumped because: kasan: bad access detected
[   17.202847] 
[   17.203024] Memory state around the buggy address:
[   17.203410]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.203817]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.204297] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.204743]                                      ^
[   17.205085]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.205527]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.205965] ==================================================================
[   17.430292] ==================================================================
[   17.431708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.432812] Read of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.433074] 
[   17.433209] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.433300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.433325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.433360] Call Trace:
[   17.433397]  <TASK>
[   17.433433]  dump_stack_lvl+0x73/0xb0
[   17.433495]  print_report+0xd1/0x650
[   17.433543]  ? __virt_addr_valid+0x1db/0x2d0
[   17.433609]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.433646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.433683]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.433712]  kasan_report+0x141/0x180
[   17.433736]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.433763]  __asan_report_load8_noabort+0x18/0x20
[   17.433797]  kasan_atomics_helper+0x4eae/0x5450
[   17.433830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.433853]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.433877]  ? ret_from_fork_asm+0x1a/0x30
[   17.433900]  ? kasan_atomics+0x152/0x310
[   17.433924]  kasan_atomics+0x1dc/0x310
[   17.433944]  ? __pfx_kasan_atomics+0x10/0x10
[   17.433965]  ? __pfx_read_tsc+0x10/0x10
[   17.433987]  ? ktime_get_ts64+0x86/0x230
[   17.434014]  kunit_try_run_case+0x1a5/0x480
[   17.434041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.434064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.434089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.434112]  ? __kthread_parkme+0x82/0x180
[   17.434135]  ? preempt_count_sub+0x50/0x80
[   17.434162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.434187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.434211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.434234]  kthread+0x337/0x6f0
[   17.434252]  ? trace_preempt_on+0x20/0xc0
[   17.434277]  ? __pfx_kthread+0x10/0x10
[   17.434295]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.434316]  ? calculate_sigpending+0x7b/0xa0
[   17.434339]  ? __pfx_kthread+0x10/0x10
[   17.434358]  ret_from_fork+0x41/0x80
[   17.434380]  ? __pfx_kthread+0x10/0x10
[   17.434398]  ret_from_fork_asm+0x1a/0x30
[   17.434428]  </TASK>
[   17.434442] 
[   17.448547] Allocated by task 285:
[   17.449423]  kasan_save_stack+0x45/0x70
[   17.449977]  kasan_save_track+0x18/0x40
[   17.450285]  kasan_save_alloc_info+0x3b/0x50
[   17.450451]  __kasan_kmalloc+0xb7/0xc0
[   17.450748]  __kmalloc_cache_noprof+0x189/0x420
[   17.451073]  kasan_atomics+0x95/0x310
[   17.451263]  kunit_try_run_case+0x1a5/0x480
[   17.451646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.452022]  kthread+0x337/0x6f0
[   17.452317]  ret_from_fork+0x41/0x80
[   17.452516]  ret_from_fork_asm+0x1a/0x30
[   17.452929] 
[   17.453049] The buggy address belongs to the object at ffff8881033b5600
[   17.453049]  which belongs to the cache kmalloc-64 of size 64
[   17.453610] The buggy address is located 0 bytes to the right of
[   17.453610]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.454319] 
[   17.454442] The buggy address belongs to the physical page:
[   17.454881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.455281] flags: 0x200000000000000(node=0|zone=2)
[   17.455596] page_type: f5(slab)
[   17.455949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.456435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.457038] page dumped because: kasan: bad access detected
[   17.457258] 
[   17.457373] Memory state around the buggy address:
[   17.457761]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.458498]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.458786] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.459143]                                      ^
[   17.459585]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460066]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460539] ==================================================================
[   17.544072] ==================================================================
[   17.544456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.545013] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.545330] 
[   17.545567] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.545704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.545734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.545779] Call Trace:
[   17.545823]  <TASK>
[   17.545857]  dump_stack_lvl+0x73/0xb0
[   17.545916]  print_report+0xd1/0x650
[   17.545962]  ? __virt_addr_valid+0x1db/0x2d0
[   17.546025]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.546071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.546117]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.546161]  kasan_report+0x141/0x180
[   17.546210]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.546266]  kasan_check_range+0x10c/0x1c0
[   17.546313]  __kasan_check_write+0x18/0x20
[   17.546357]  kasan_atomics_helper+0x15b6/0x5450
[   17.546408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.546458]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.546506]  ? ret_from_fork_asm+0x1a/0x30
[   17.546552]  ? kasan_atomics+0x152/0x310
[   17.546606]  kasan_atomics+0x1dc/0x310
[   17.546645]  ? __pfx_kasan_atomics+0x10/0x10
[   17.546714]  ? __pfx_read_tsc+0x10/0x10
[   17.546759]  ? ktime_get_ts64+0x86/0x230
[   17.546812]  kunit_try_run_case+0x1a5/0x480
[   17.546860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.546904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.546954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.547002]  ? __kthread_parkme+0x82/0x180
[   17.547048]  ? preempt_count_sub+0x50/0x80
[   17.547092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.547147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.547198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.547247]  kthread+0x337/0x6f0
[   17.547288]  ? trace_preempt_on+0x20/0xc0
[   17.547343]  ? __pfx_kthread+0x10/0x10
[   17.547387]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.547433]  ? calculate_sigpending+0x7b/0xa0
[   17.547482]  ? __pfx_kthread+0x10/0x10
[   17.547524]  ret_from_fork+0x41/0x80
[   17.547581]  ? __pfx_kthread+0x10/0x10
[   17.547624]  ret_from_fork_asm+0x1a/0x30
[   17.547689]  </TASK>
[   17.547715] 
[   17.558590] Allocated by task 285:
[   17.559204]  kasan_save_stack+0x45/0x70
[   17.559429]  kasan_save_track+0x18/0x40
[   17.559588]  kasan_save_alloc_info+0x3b/0x50
[   17.560162]  __kasan_kmalloc+0xb7/0xc0
[   17.560572]  __kmalloc_cache_noprof+0x189/0x420
[   17.561126]  kasan_atomics+0x95/0x310
[   17.561320]  kunit_try_run_case+0x1a5/0x480
[   17.561624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.561995]  kthread+0x337/0x6f0
[   17.562298]  ret_from_fork+0x41/0x80
[   17.562514]  ret_from_fork_asm+0x1a/0x30
[   17.562924] 
[   17.563061] The buggy address belongs to the object at ffff8881033b5600
[   17.563061]  which belongs to the cache kmalloc-64 of size 64
[   17.563789] The buggy address is located 0 bytes to the right of
[   17.563789]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.564565] 
[   17.564756] The buggy address belongs to the physical page:
[   17.565059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.565569] flags: 0x200000000000000(node=0|zone=2)
[   17.565975] page_type: f5(slab)
[   17.566271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.566895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.567153] page dumped because: kasan: bad access detected
[   17.567327] 
[   17.567408] Memory state around the buggy address:
[   17.567576]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.567813]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.568044] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.568247]                                      ^
[   17.568402]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.569536]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.570644] ==================================================================
[   17.840007] ==================================================================
[   17.840462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.841113] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.841411] 
[   17.841649] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.841764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.841804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.841861] Call Trace:
[   17.841908]  <TASK>
[   17.841947]  dump_stack_lvl+0x73/0xb0
[   17.842011]  print_report+0xd1/0x650
[   17.842069]  ? __virt_addr_valid+0x1db/0x2d0
[   17.842132]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.842176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.842221]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.842273]  kasan_report+0x141/0x180
[   17.842335]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.842385]  kasan_check_range+0x10c/0x1c0
[   17.842410]  __kasan_check_write+0x18/0x20
[   17.842432]  kasan_atomics_helper+0x1c18/0x5450
[   17.842457]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.842481]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.842504]  ? ret_from_fork_asm+0x1a/0x30
[   17.842539]  ? kasan_atomics+0x152/0x310
[   17.842591]  kasan_atomics+0x1dc/0x310
[   17.842633]  ? __pfx_kasan_atomics+0x10/0x10
[   17.842672]  ? __pfx_read_tsc+0x10/0x10
[   17.842716]  ? ktime_get_ts64+0x86/0x230
[   17.842771]  kunit_try_run_case+0x1a5/0x480
[   17.842839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.842886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.842937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.842981]  ? __kthread_parkme+0x82/0x180
[   17.843034]  ? preempt_count_sub+0x50/0x80
[   17.843102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.843162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.843196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.843223]  kthread+0x337/0x6f0
[   17.843244]  ? trace_preempt_on+0x20/0xc0
[   17.843272]  ? __pfx_kthread+0x10/0x10
[   17.843294]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.843316]  ? calculate_sigpending+0x7b/0xa0
[   17.843339]  ? __pfx_kthread+0x10/0x10
[   17.843359]  ret_from_fork+0x41/0x80
[   17.843380]  ? __pfx_kthread+0x10/0x10
[   17.843400]  ret_from_fork_asm+0x1a/0x30
[   17.843430]  </TASK>
[   17.843444] 
[   17.852992] Allocated by task 285:
[   17.853223]  kasan_save_stack+0x45/0x70
[   17.853430]  kasan_save_track+0x18/0x40
[   17.853657]  kasan_save_alloc_info+0x3b/0x50
[   17.853994]  __kasan_kmalloc+0xb7/0xc0
[   17.854406]  __kmalloc_cache_noprof+0x189/0x420
[   17.854793]  kasan_atomics+0x95/0x310
[   17.855089]  kunit_try_run_case+0x1a5/0x480
[   17.855321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.855538]  kthread+0x337/0x6f0
[   17.855701]  ret_from_fork+0x41/0x80
[   17.855874]  ret_from_fork_asm+0x1a/0x30
[   17.856054] 
[   17.856163] The buggy address belongs to the object at ffff8881033b5600
[   17.856163]  which belongs to the cache kmalloc-64 of size 64
[   17.857124] The buggy address is located 0 bytes to the right of
[   17.857124]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.858081] 
[   17.858259] The buggy address belongs to the physical page:
[   17.858664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.859054] flags: 0x200000000000000(node=0|zone=2)
[   17.859388] page_type: f5(slab)
[   17.859710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.859987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.860251] page dumped because: kasan: bad access detected
[   17.860452] 
[   17.860570] Memory state around the buggy address:
[   17.860904]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.861501]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.862184] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.862708]                                      ^
[   17.862955]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863217]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863457] ==================================================================
[   17.629300] ==================================================================
[   17.629862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.630052] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.630190] 
[   17.630271] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.630326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.630341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.630366] Call Trace:
[   17.630393]  <TASK>
[   17.630417]  dump_stack_lvl+0x73/0xb0
[   17.630450]  print_report+0xd1/0x650
[   17.630476]  ? __virt_addr_valid+0x1db/0x2d0
[   17.630499]  ? kasan_atomics_helper+0x177f/0x5450
[   17.630522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.630545]  ? kasan_atomics_helper+0x177f/0x5450
[   17.630583]  kasan_report+0x141/0x180
[   17.630609]  ? kasan_atomics_helper+0x177f/0x5450
[   17.630638]  kasan_check_range+0x10c/0x1c0
[   17.630667]  __kasan_check_write+0x18/0x20
[   17.630696]  kasan_atomics_helper+0x177f/0x5450
[   17.630722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.630747]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.630770]  ? ret_from_fork_asm+0x1a/0x30
[   17.630794]  ? kasan_atomics+0x152/0x310
[   17.630819]  kasan_atomics+0x1dc/0x310
[   17.630840]  ? __pfx_kasan_atomics+0x10/0x10
[   17.630863]  ? __pfx_read_tsc+0x10/0x10
[   17.630885]  ? ktime_get_ts64+0x86/0x230
[   17.630914]  kunit_try_run_case+0x1a5/0x480
[   17.630942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.630966]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.630993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.631017]  ? __kthread_parkme+0x82/0x180
[   17.631042]  ? preempt_count_sub+0x50/0x80
[   17.631069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.631096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.631120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.631160]  kthread+0x337/0x6f0
[   17.631183]  ? trace_preempt_on+0x20/0xc0
[   17.631212]  ? __pfx_kthread+0x10/0x10
[   17.631233]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.631257]  ? calculate_sigpending+0x7b/0xa0
[   17.631283]  ? __pfx_kthread+0x10/0x10
[   17.631304]  ret_from_fork+0x41/0x80
[   17.631327]  ? __pfx_kthread+0x10/0x10
[   17.631347]  ret_from_fork_asm+0x1a/0x30
[   17.631379]  </TASK>
[   17.631394] 
[   17.644598] Allocated by task 285:
[   17.644934]  kasan_save_stack+0x45/0x70
[   17.645128]  kasan_save_track+0x18/0x40
[   17.645276]  kasan_save_alloc_info+0x3b/0x50
[   17.645433]  __kasan_kmalloc+0xb7/0xc0
[   17.645583]  __kmalloc_cache_noprof+0x189/0x420
[   17.646189]  kasan_atomics+0x95/0x310
[   17.646406]  kunit_try_run_case+0x1a5/0x480
[   17.646628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.647265]  kthread+0x337/0x6f0
[   17.647488]  ret_from_fork+0x41/0x80
[   17.648023]  ret_from_fork_asm+0x1a/0x30
[   17.648371] 
[   17.648485] The buggy address belongs to the object at ffff8881033b5600
[   17.648485]  which belongs to the cache kmalloc-64 of size 64
[   17.649302] The buggy address is located 0 bytes to the right of
[   17.649302]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.649733] 
[   17.649863] The buggy address belongs to the physical page:
[   17.650297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.650983] flags: 0x200000000000000(node=0|zone=2)
[   17.651264] page_type: f5(slab)
[   17.651543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.652314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.652998] page dumped because: kasan: bad access detected
[   17.653368] 
[   17.653476] Memory state around the buggy address:
[   17.653694]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.654225]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.654858] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.655516]                                      ^
[   17.655923]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.656219]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.657115] ==================================================================
[   18.115266] ==================================================================
[   18.115977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   18.116588] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   18.117157] 
[   18.117401] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   18.117504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.117594] Call Trace:
[   18.117640]  <TASK>
[   18.117683]  dump_stack_lvl+0x73/0xb0
[   18.117753]  print_report+0xd1/0x650
[   18.117806]  ? __virt_addr_valid+0x1db/0x2d0
[   18.117856]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.117904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.117954]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.118009]  kasan_report+0x141/0x180
[   18.118053]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.118104]  kasan_check_range+0x10c/0x1c0
[   18.118153]  __kasan_check_write+0x18/0x20
[   18.118199]  kasan_atomics_helper+0x20c8/0x5450
[   18.118266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.118315]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.118367]  ? ret_from_fork_asm+0x1a/0x30
[   18.118425]  ? kasan_atomics+0x152/0x310
[   18.118478]  kasan_atomics+0x1dc/0x310
[   18.118523]  ? __pfx_kasan_atomics+0x10/0x10
[   18.118583]  ? __pfx_read_tsc+0x10/0x10
[   18.118632]  ? ktime_get_ts64+0x86/0x230
[   18.118685]  kunit_try_run_case+0x1a5/0x480
[   18.118740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.118779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.118829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.118879]  ? __kthread_parkme+0x82/0x180
[   18.118939]  ? preempt_count_sub+0x50/0x80
[   18.119011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.119067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.119124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.119183]  kthread+0x337/0x6f0
[   18.119228]  ? trace_preempt_on+0x20/0xc0
[   18.119286]  ? __pfx_kthread+0x10/0x10
[   18.119331]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.119379]  ? calculate_sigpending+0x7b/0xa0
[   18.119429]  ? __pfx_kthread+0x10/0x10
[   18.119472]  ret_from_fork+0x41/0x80
[   18.119520]  ? __pfx_kthread+0x10/0x10
[   18.119574]  ret_from_fork_asm+0x1a/0x30
[   18.119642]  </TASK>
[   18.119671] 
[   18.130403] Allocated by task 285:
[   18.130688]  kasan_save_stack+0x45/0x70
[   18.131083]  kasan_save_track+0x18/0x40
[   18.131441]  kasan_save_alloc_info+0x3b/0x50
[   18.131801]  __kasan_kmalloc+0xb7/0xc0
[   18.132091]  __kmalloc_cache_noprof+0x189/0x420
[   18.132315]  kasan_atomics+0x95/0x310
[   18.132645]  kunit_try_run_case+0x1a5/0x480
[   18.132985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.133270]  kthread+0x337/0x6f0
[   18.133580]  ret_from_fork+0x41/0x80
[   18.133865]  ret_from_fork_asm+0x1a/0x30
[   18.134098] 
[   18.134289] The buggy address belongs to the object at ffff8881033b5600
[   18.134289]  which belongs to the cache kmalloc-64 of size 64
[   18.134910] The buggy address is located 0 bytes to the right of
[   18.134910]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   18.135331] 
[   18.135457] The buggy address belongs to the physical page:
[   18.135870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   18.136424] flags: 0x200000000000000(node=0|zone=2)
[   18.136880] page_type: f5(slab)
[   18.137179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.137697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.138223] page dumped because: kasan: bad access detected
[   18.138629] 
[   18.138800] Memory state around the buggy address:
[   18.139052]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.139497]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.139910] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.140177]                                      ^
[   18.140380]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140749]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.141280] ==================================================================
[   16.748270] ==================================================================
[   16.748855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   16.750293] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.750598] 
[   16.751255] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.751338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.751365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.751407] Call Trace:
[   16.751450]  <TASK>
[   16.751491]  dump_stack_lvl+0x73/0xb0
[   16.751712]  print_report+0xd1/0x650
[   16.751762]  ? __virt_addr_valid+0x1db/0x2d0
[   16.751792]  ? kasan_atomics_helper+0x860/0x5450
[   16.751819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.751846]  ? kasan_atomics_helper+0x860/0x5450
[   16.751872]  kasan_report+0x141/0x180
[   16.751898]  ? kasan_atomics_helper+0x860/0x5450
[   16.751928]  kasan_check_range+0x10c/0x1c0
[   16.751954]  __kasan_check_write+0x18/0x20
[   16.751977]  kasan_atomics_helper+0x860/0x5450
[   16.752004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.752029]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.752054]  ? ret_from_fork_asm+0x1a/0x30
[   16.752080]  ? kasan_atomics+0x152/0x310
[   16.752105]  kasan_atomics+0x1dc/0x310
[   16.752128]  ? __pfx_kasan_atomics+0x10/0x10
[   16.752151]  ? __pfx_read_tsc+0x10/0x10
[   16.752175]  ? ktime_get_ts64+0x86/0x230
[   16.752203]  kunit_try_run_case+0x1a5/0x480
[   16.752231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.752256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.752282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.752307]  ? __kthread_parkme+0x82/0x180
[   16.752330]  ? preempt_count_sub+0x50/0x80
[   16.752358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.752383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.752407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.752432]  kthread+0x337/0x6f0
[   16.752451]  ? trace_preempt_on+0x20/0xc0
[   16.752476]  ? __pfx_kthread+0x10/0x10
[   16.752497]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.752519]  ? calculate_sigpending+0x7b/0xa0
[   16.752542]  ? __pfx_kthread+0x10/0x10
[   16.752691]  ret_from_fork+0x41/0x80
[   16.752723]  ? __pfx_kthread+0x10/0x10
[   16.752744]  ret_from_fork_asm+0x1a/0x30
[   16.752774]  </TASK>
[   16.752790] 
[   16.767505] Allocated by task 285:
[   16.767936]  kasan_save_stack+0x45/0x70
[   16.768359]  kasan_save_track+0x18/0x40
[   16.768709]  kasan_save_alloc_info+0x3b/0x50
[   16.769107]  __kasan_kmalloc+0xb7/0xc0
[   16.769387]  __kmalloc_cache_noprof+0x189/0x420
[   16.769659]  kasan_atomics+0x95/0x310
[   16.770001]  kunit_try_run_case+0x1a5/0x480
[   16.770409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.771079]  kthread+0x337/0x6f0
[   16.771474]  ret_from_fork+0x41/0x80
[   16.771864]  ret_from_fork_asm+0x1a/0x30
[   16.772091] 
[   16.772245] The buggy address belongs to the object at ffff8881033b5600
[   16.772245]  which belongs to the cache kmalloc-64 of size 64
[   16.773156] The buggy address is located 0 bytes to the right of
[   16.773156]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.773862] 
[   16.774048] The buggy address belongs to the physical page:
[   16.774419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.774928] flags: 0x200000000000000(node=0|zone=2)
[   16.775313] page_type: f5(slab)
[   16.775578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.776229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.776977] page dumped because: kasan: bad access detected
[   16.777365] 
[   16.777621] Memory state around the buggy address:
[   16.777971]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.778531]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.779034] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.779414]                                      ^
[   16.779754]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780181]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780434] ==================================================================
[   17.259414] ==================================================================
[   17.261108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   17.261641] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.262882] 
[   17.263034] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.263096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.263111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.263156] Call Trace:
[   17.263199]  <TASK>
[   17.263242]  dump_stack_lvl+0x73/0xb0
[   17.263458]  print_report+0xd1/0x650
[   17.263499]  ? __virt_addr_valid+0x1db/0x2d0
[   17.263527]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.263552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.263600]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.263627]  kasan_report+0x141/0x180
[   17.263659]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.263716]  __asan_report_load4_noabort+0x18/0x20
[   17.263743]  kasan_atomics_helper+0x4a02/0x5450
[   17.263771]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.263797]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.263823]  ? ret_from_fork_asm+0x1a/0x30
[   17.263848]  ? kasan_atomics+0x152/0x310
[   17.263874]  kasan_atomics+0x1dc/0x310
[   17.263897]  ? __pfx_kasan_atomics+0x10/0x10
[   17.263921]  ? __pfx_read_tsc+0x10/0x10
[   17.263945]  ? ktime_get_ts64+0x86/0x230
[   17.263975]  kunit_try_run_case+0x1a5/0x480
[   17.264001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.264025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.264049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.264072]  ? __kthread_parkme+0x82/0x180
[   17.264095]  ? preempt_count_sub+0x50/0x80
[   17.264121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.264146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.264169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.264193]  kthread+0x337/0x6f0
[   17.264211]  ? trace_preempt_on+0x20/0xc0
[   17.264236]  ? __pfx_kthread+0x10/0x10
[   17.264254]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.264276]  ? calculate_sigpending+0x7b/0xa0
[   17.264298]  ? __pfx_kthread+0x10/0x10
[   17.264317]  ret_from_fork+0x41/0x80
[   17.264340]  ? __pfx_kthread+0x10/0x10
[   17.264359]  ret_from_fork_asm+0x1a/0x30
[   17.264388]  </TASK>
[   17.264401] 
[   17.275067] Allocated by task 285:
[   17.275411]  kasan_save_stack+0x45/0x70
[   17.276063]  kasan_save_track+0x18/0x40
[   17.276303]  kasan_save_alloc_info+0x3b/0x50
[   17.276565]  __kasan_kmalloc+0xb7/0xc0
[   17.276801]  __kmalloc_cache_noprof+0x189/0x420
[   17.277144]  kasan_atomics+0x95/0x310
[   17.277425]  kunit_try_run_case+0x1a5/0x480
[   17.277845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.278136]  kthread+0x337/0x6f0
[   17.278305]  ret_from_fork+0x41/0x80
[   17.278591]  ret_from_fork_asm+0x1a/0x30
[   17.279006] 
[   17.279235] The buggy address belongs to the object at ffff8881033b5600
[   17.279235]  which belongs to the cache kmalloc-64 of size 64
[   17.280048] The buggy address is located 0 bytes to the right of
[   17.280048]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.280779] 
[   17.280989] The buggy address belongs to the physical page:
[   17.281321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.281834] flags: 0x200000000000000(node=0|zone=2)
[   17.282106] page_type: f5(slab)
[   17.282401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.282905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.283356] page dumped because: kasan: bad access detected
[   17.283623] 
[   17.283784] Memory state around the buggy address:
[   17.284091]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.284367]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.284708] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.285048]                                      ^
[   17.285253]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.285500]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.286039] ==================================================================
[   17.571604] ==================================================================
[   17.572122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.572713] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.573197] 
[   17.573431] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.573588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.573616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.573657] Call Trace:
[   17.573720]  <TASK>
[   17.573784]  dump_stack_lvl+0x73/0xb0
[   17.573871]  print_report+0xd1/0x650
[   17.573935]  ? __virt_addr_valid+0x1db/0x2d0
[   17.573985]  ? kasan_atomics_helper+0x164f/0x5450
[   17.574033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.574083]  ? kasan_atomics_helper+0x164f/0x5450
[   17.574128]  kasan_report+0x141/0x180
[   17.574185]  ? kasan_atomics_helper+0x164f/0x5450
[   17.574258]  kasan_check_range+0x10c/0x1c0
[   17.574319]  __kasan_check_write+0x18/0x20
[   17.574356]  kasan_atomics_helper+0x164f/0x5450
[   17.574427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.574494]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.574550]  ? ret_from_fork_asm+0x1a/0x30
[   17.574612]  ? kasan_atomics+0x152/0x310
[   17.574671]  kasan_atomics+0x1dc/0x310
[   17.574728]  ? __pfx_kasan_atomics+0x10/0x10
[   17.574775]  ? __pfx_read_tsc+0x10/0x10
[   17.574827]  ? ktime_get_ts64+0x86/0x230
[   17.574894]  kunit_try_run_case+0x1a5/0x480
[   17.574966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.575015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.575067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.575093]  ? __kthread_parkme+0x82/0x180
[   17.575118]  ? preempt_count_sub+0x50/0x80
[   17.575161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.575188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.575213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.575239]  kthread+0x337/0x6f0
[   17.575257]  ? trace_preempt_on+0x20/0xc0
[   17.575283]  ? __pfx_kthread+0x10/0x10
[   17.575302]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.575325]  ? calculate_sigpending+0x7b/0xa0
[   17.575349]  ? __pfx_kthread+0x10/0x10
[   17.575368]  ret_from_fork+0x41/0x80
[   17.575390]  ? __pfx_kthread+0x10/0x10
[   17.575409]  ret_from_fork_asm+0x1a/0x30
[   17.575440]  </TASK>
[   17.575455] 
[   17.586642] Allocated by task 285:
[   17.587313]  kasan_save_stack+0x45/0x70
[   17.587519]  kasan_save_track+0x18/0x40
[   17.588128]  kasan_save_alloc_info+0x3b/0x50
[   17.588592]  __kasan_kmalloc+0xb7/0xc0
[   17.589076]  __kmalloc_cache_noprof+0x189/0x420
[   17.589505]  kasan_atomics+0x95/0x310
[   17.589773]  kunit_try_run_case+0x1a5/0x480
[   17.590079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.590376]  kthread+0x337/0x6f0
[   17.590645]  ret_from_fork+0x41/0x80
[   17.590963]  ret_from_fork_asm+0x1a/0x30
[   17.591323] 
[   17.591455] The buggy address belongs to the object at ffff8881033b5600
[   17.591455]  which belongs to the cache kmalloc-64 of size 64
[   17.592080] The buggy address is located 0 bytes to the right of
[   17.592080]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.592686] 
[   17.592869] The buggy address belongs to the physical page:
[   17.593412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.593853] flags: 0x200000000000000(node=0|zone=2)
[   17.594080] page_type: f5(slab)
[   17.594368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.594748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.595294] page dumped because: kasan: bad access detected
[   17.595953] 
[   17.596049] Memory state around the buggy address:
[   17.596218]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.596438]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.597469] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.597834]                                      ^
[   17.598190]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.598779]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.599221] ==================================================================
[   16.813208] ==================================================================
[   16.813811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   16.815282] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.816355] 
[   16.816519] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.816611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.816847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.816897] Call Trace:
[   16.816954]  <TASK>
[   16.817002]  dump_stack_lvl+0x73/0xb0
[   16.817069]  print_report+0xd1/0x650
[   16.817101]  ? __virt_addr_valid+0x1db/0x2d0
[   16.817129]  ? kasan_atomics_helper+0x992/0x5450
[   16.817155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.817182]  ? kasan_atomics_helper+0x992/0x5450
[   16.817208]  kasan_report+0x141/0x180
[   16.817234]  ? kasan_atomics_helper+0x992/0x5450
[   16.817263]  kasan_check_range+0x10c/0x1c0
[   16.817287]  __kasan_check_write+0x18/0x20
[   16.817310]  kasan_atomics_helper+0x992/0x5450
[   16.817336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.817362]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.817387]  ? ret_from_fork_asm+0x1a/0x30
[   16.817412]  ? kasan_atomics+0x152/0x310
[   16.817438]  kasan_atomics+0x1dc/0x310
[   16.817462]  ? __pfx_kasan_atomics+0x10/0x10
[   16.817484]  ? __pfx_read_tsc+0x10/0x10
[   16.817506]  ? ktime_get_ts64+0x86/0x230
[   16.817534]  kunit_try_run_case+0x1a5/0x480
[   16.817574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.817604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.817645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.817684]  ? __kthread_parkme+0x82/0x180
[   16.817721]  ? preempt_count_sub+0x50/0x80
[   16.817765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.817804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.817844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.817881]  kthread+0x337/0x6f0
[   16.817911]  ? trace_preempt_on+0x20/0xc0
[   16.817950]  ? __pfx_kthread+0x10/0x10
[   16.817982]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.818020]  ? calculate_sigpending+0x7b/0xa0
[   16.818057]  ? __pfx_kthread+0x10/0x10
[   16.818087]  ret_from_fork+0x41/0x80
[   16.818114]  ? __pfx_kthread+0x10/0x10
[   16.818134]  ret_from_fork_asm+0x1a/0x30
[   16.818167]  </TASK>
[   16.818182] 
[   16.828645] Allocated by task 285:
[   16.828991]  kasan_save_stack+0x45/0x70
[   16.829211]  kasan_save_track+0x18/0x40
[   16.829491]  kasan_save_alloc_info+0x3b/0x50
[   16.829812]  __kasan_kmalloc+0xb7/0xc0
[   16.830044]  __kmalloc_cache_noprof+0x189/0x420
[   16.830247]  kasan_atomics+0x95/0x310
[   16.830425]  kunit_try_run_case+0x1a5/0x480
[   16.830756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.831271]  kthread+0x337/0x6f0
[   16.831616]  ret_from_fork+0x41/0x80
[   16.832033]  ret_from_fork_asm+0x1a/0x30
[   16.832237] 
[   16.832352] The buggy address belongs to the object at ffff8881033b5600
[   16.832352]  which belongs to the cache kmalloc-64 of size 64
[   16.832807] The buggy address is located 0 bytes to the right of
[   16.832807]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.833217] 
[   16.833331] The buggy address belongs to the physical page:
[   16.833731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.834626] flags: 0x200000000000000(node=0|zone=2)
[   16.835029] page_type: f5(slab)
[   16.835318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.835861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.836390] page dumped because: kasan: bad access detected
[   16.837492] 
[   16.837834] Memory state around the buggy address:
[   16.838201]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.838947]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.839252] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.839496]                                      ^
[   16.840474]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.841597]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.842334] ==================================================================
[   16.368973] ==================================================================
[   16.369470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.370270] Read of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.370817] 
[   16.370922] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.370981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.370995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.371018] Call Trace:
[   16.371034]  <TASK>
[   16.371054]  dump_stack_lvl+0x73/0xb0
[   16.371090]  print_report+0xd1/0x650
[   16.371118]  ? __virt_addr_valid+0x1db/0x2d0
[   16.371154]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.371180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.371308]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.371338]  kasan_report+0x141/0x180
[   16.371366]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.371392]  __asan_report_load4_noabort+0x18/0x20
[   16.371413]  kasan_atomics_helper+0x4bbc/0x5450
[   16.371436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.371459]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.371480]  ? ret_from_fork_asm+0x1a/0x30
[   16.371503]  ? kasan_atomics+0x152/0x310
[   16.371525]  kasan_atomics+0x1dc/0x310
[   16.371544]  ? __pfx_kasan_atomics+0x10/0x10
[   16.371580]  ? __pfx_read_tsc+0x10/0x10
[   16.371615]  ? ktime_get_ts64+0x86/0x230
[   16.371646]  kunit_try_run_case+0x1a5/0x480
[   16.371703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.371751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.371775]  ? __kthread_parkme+0x82/0x180
[   16.371799]  ? preempt_count_sub+0x50/0x80
[   16.371825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.371871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.371894]  kthread+0x337/0x6f0
[   16.371910]  ? trace_preempt_on+0x20/0xc0
[   16.371936]  ? __pfx_kthread+0x10/0x10
[   16.371954]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.371975]  ? calculate_sigpending+0x7b/0xa0
[   16.371996]  ? __pfx_kthread+0x10/0x10
[   16.372015]  ret_from_fork+0x41/0x80
[   16.372034]  ? __pfx_kthread+0x10/0x10
[   16.372052]  ret_from_fork_asm+0x1a/0x30
[   16.372080]  </TASK>
[   16.372093] 
[   16.381181] Allocated by task 285:
[   16.381292]  kasan_save_stack+0x45/0x70
[   16.381405]  kasan_save_track+0x18/0x40
[   16.381492]  kasan_save_alloc_info+0x3b/0x50
[   16.381606]  __kasan_kmalloc+0xb7/0xc0
[   16.381695]  __kmalloc_cache_noprof+0x189/0x420
[   16.381790]  kasan_atomics+0x95/0x310
[   16.381872]  kunit_try_run_case+0x1a5/0x480
[   16.381965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.382072]  kthread+0x337/0x6f0
[   16.382147]  ret_from_fork+0x41/0x80
[   16.382236]  ret_from_fork_asm+0x1a/0x30
[   16.382324] 
[   16.382376] The buggy address belongs to the object at ffff8881033b5600
[   16.382376]  which belongs to the cache kmalloc-64 of size 64
[   16.382852] The buggy address is located 0 bytes to the right of
[   16.382852]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.383178] 
[   16.383242] The buggy address belongs to the physical page:
[   16.384504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.385081] flags: 0x200000000000000(node=0|zone=2)
[   16.385837] page_type: f5(slab)
[   16.386024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.386254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.386390] page dumped because: kasan: bad access detected
[   16.386496] 
[   16.386545] Memory state around the buggy address:
[   16.387106]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.387442]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.387759] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.388224]                                      ^
[   16.388334]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388466]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388749] ==================================================================
[   16.542173] ==================================================================
[   16.542970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.543602] Write of size 4 at addr ffff8881033b5630 by task kunit_try_catch/285
[   16.544175] 
[   16.544446] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.544599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.544634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.544692] Call Trace:
[   16.544734]  <TASK>
[   16.544775]  dump_stack_lvl+0x73/0xb0
[   16.544848]  print_report+0xd1/0x650
[   16.544928]  ? __virt_addr_valid+0x1db/0x2d0
[   16.545144]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.545224]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.545273]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.545302]  kasan_report+0x141/0x180
[   16.545330]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.545359]  __asan_report_store4_noabort+0x1b/0x30
[   16.545381]  kasan_atomics_helper+0x4b3a/0x5450
[   16.545412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.545451]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.545481]  ? ret_from_fork_asm+0x1a/0x30
[   16.545506]  ? kasan_atomics+0x152/0x310
[   16.545531]  kasan_atomics+0x1dc/0x310
[   16.545552]  ? __pfx_kasan_atomics+0x10/0x10
[   16.545596]  ? __pfx_read_tsc+0x10/0x10
[   16.545634]  ? ktime_get_ts64+0x86/0x230
[   16.545680]  kunit_try_run_case+0x1a5/0x480
[   16.545724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.545764]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.545795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.545821]  ? __kthread_parkme+0x82/0x180
[   16.545847]  ? preempt_count_sub+0x50/0x80
[   16.545875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.545901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.545927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.545952]  kthread+0x337/0x6f0
[   16.545970]  ? trace_preempt_on+0x20/0xc0
[   16.545998]  ? __pfx_kthread+0x10/0x10
[   16.546019]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.546042]  ? calculate_sigpending+0x7b/0xa0
[   16.546066]  ? __pfx_kthread+0x10/0x10
[   16.546085]  ret_from_fork+0x41/0x80
[   16.546108]  ? __pfx_kthread+0x10/0x10
[   16.546129]  ret_from_fork_asm+0x1a/0x30
[   16.546160]  </TASK>
[   16.546177] 
[   16.560178] Allocated by task 285:
[   16.560789]  kasan_save_stack+0x45/0x70
[   16.561635]  kasan_save_track+0x18/0x40
[   16.562298]  kasan_save_alloc_info+0x3b/0x50
[   16.562555]  __kasan_kmalloc+0xb7/0xc0
[   16.562826]  __kmalloc_cache_noprof+0x189/0x420
[   16.563218]  kasan_atomics+0x95/0x310
[   16.563810]  kunit_try_run_case+0x1a5/0x480
[   16.564188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.564510]  kthread+0x337/0x6f0
[   16.564981]  ret_from_fork+0x41/0x80
[   16.565331]  ret_from_fork_asm+0x1a/0x30
[   16.566095] 
[   16.566294] The buggy address belongs to the object at ffff8881033b5600
[   16.566294]  which belongs to the cache kmalloc-64 of size 64
[   16.567232] The buggy address is located 0 bytes to the right of
[   16.567232]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   16.568227] 
[   16.568457] The buggy address belongs to the physical page:
[   16.569301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   16.569897] flags: 0x200000000000000(node=0|zone=2)
[   16.570299] page_type: f5(slab)
[   16.570521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.571012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.571787] page dumped because: kasan: bad access detected
[   16.572429] 
[   16.573051] Memory state around the buggy address:
[   16.573462]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.573953]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.574263] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.574885]                                      ^
[   16.575515]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.576046]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.577185] ==================================================================
[   17.812092] ==================================================================
[   17.812690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.813302] Write of size 8 at addr ffff8881033b5630 by task kunit_try_catch/285
[   17.813856] 
[   17.814083] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   17.814210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.814246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.814291] Call Trace:
[   17.814347]  <TASK>
[   17.814385]  dump_stack_lvl+0x73/0xb0
[   17.814448]  print_report+0xd1/0x650
[   17.814502]  ? __virt_addr_valid+0x1db/0x2d0
[   17.814573]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.814617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.814661]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.814712]  kasan_report+0x141/0x180
[   17.814765]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.814834]  kasan_check_range+0x10c/0x1c0
[   17.814875]  __kasan_check_write+0x18/0x20
[   17.814903]  kasan_atomics_helper+0x1b22/0x5450
[   17.814928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.814952]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.814974]  ? ret_from_fork_asm+0x1a/0x30
[   17.814997]  ? kasan_atomics+0x152/0x310
[   17.815027]  kasan_atomics+0x1dc/0x310
[   17.815063]  ? __pfx_kasan_atomics+0x10/0x10
[   17.815099]  ? __pfx_read_tsc+0x10/0x10
[   17.815141]  ? ktime_get_ts64+0x86/0x230
[   17.815193]  kunit_try_run_case+0x1a5/0x480
[   17.815246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.815299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.815363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.815410]  ? __kthread_parkme+0x82/0x180
[   17.815456]  ? preempt_count_sub+0x50/0x80
[   17.815510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.815575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.815626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.815666]  kthread+0x337/0x6f0
[   17.815723]  ? trace_preempt_on+0x20/0xc0
[   17.815776]  ? __pfx_kthread+0x10/0x10
[   17.815818]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.815876]  ? calculate_sigpending+0x7b/0xa0
[   17.815923]  ? __pfx_kthread+0x10/0x10
[   17.815966]  ret_from_fork+0x41/0x80
[   17.816010]  ? __pfx_kthread+0x10/0x10
[   17.816050]  ret_from_fork_asm+0x1a/0x30
[   17.816111]  </TASK>
[   17.816143] 
[   17.826687] Allocated by task 285:
[   17.826937]  kasan_save_stack+0x45/0x70
[   17.827331]  kasan_save_track+0x18/0x40
[   17.827662]  kasan_save_alloc_info+0x3b/0x50
[   17.827996]  __kasan_kmalloc+0xb7/0xc0
[   17.828324]  __kmalloc_cache_noprof+0x189/0x420
[   17.828601]  kasan_atomics+0x95/0x310
[   17.828881]  kunit_try_run_case+0x1a5/0x480
[   17.829142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.829453]  kthread+0x337/0x6f0
[   17.829780]  ret_from_fork+0x41/0x80
[   17.830015]  ret_from_fork_asm+0x1a/0x30
[   17.830365] 
[   17.830495] The buggy address belongs to the object at ffff8881033b5600
[   17.830495]  which belongs to the cache kmalloc-64 of size 64
[   17.831328] The buggy address is located 0 bytes to the right of
[   17.831328]  allocated 48-byte region [ffff8881033b5600, ffff8881033b5630)
[   17.832229] 
[   17.832362] The buggy address belongs to the physical page:
[   17.832600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033b5
[   17.833191] flags: 0x200000000000000(node=0|zone=2)
[   17.833661] page_type: f5(slab)
[   17.833977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.834547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.835171] page dumped because: kasan: bad access detected
[   17.835617] 
[   17.835829] Memory state around the buggy address:
[   17.836227]  ffff8881033b5500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.836631]  ffff8881033b5580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.837194] >ffff8881033b5600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.837517]                                      ^
[   17.837717]  ffff8881033b5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.838045]  ffff8881033b5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.838442] ==================================================================