Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.251859] ==================================================================
[   28.251986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   28.252253] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.252587] 
[   28.253789] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.254103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.254176] Hardware name: linux,dummy-virt (DT)
[   28.254361] Call trace:
[   28.254452]  show_stack+0x20/0x38 (C)
[   28.254592]  dump_stack_lvl+0x8c/0xd0
[   28.255303]  print_report+0x118/0x608
[   28.255887]  kasan_report+0xdc/0x128
[   28.256148]  kasan_check_range+0x100/0x1a8
[   28.256690]  __kasan_check_read+0x20/0x30
[   28.257050]  kasan_atomics_helper+0xdd4/0x4858
[   28.257560]  kasan_atomics+0x198/0x2e0
[   28.257678]  kunit_try_run_case+0x170/0x3f0
[   28.258015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.258816]  kthread+0x328/0x630
[   28.259540]  ret_from_fork+0x10/0x20
[   28.260143] 
[   28.260610] Allocated by task 267:
[   28.260965]  kasan_save_stack+0x3c/0x68
[   28.261296]  kasan_save_track+0x20/0x40
[   28.261595]  kasan_save_alloc_info+0x40/0x58
[   28.261830]  __kasan_kmalloc+0xd4/0xd8
[   28.261939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.262270]  kasan_atomics+0xb8/0x2e0
[   28.262627]  kunit_try_run_case+0x170/0x3f0
[   28.263030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.263162]  kthread+0x328/0x630
[   28.263258]  ret_from_fork+0x10/0x20
[   28.264335] 
[   28.264417] The buggy address belongs to the object at fff00000c5a80800
[   28.264417]  which belongs to the cache kmalloc-64 of size 64
[   28.265213] The buggy address is located 0 bytes to the right of
[   28.265213]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.265507] 
[   28.265566] The buggy address belongs to the physical page:
[   28.265640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.265798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.265916] page_type: f5(slab)
[   28.266916] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.267113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.267415] page dumped because: kasan: bad access detected
[   28.267939] 
[   28.267993] Memory state around the buggy address:
[   28.268280]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.268472]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.268607] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.269323]                                      ^
[   28.269736]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.269986]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.270208] ==================================================================
[   28.224714] ==================================================================
[   28.224817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   28.224925] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.225049] 
[   28.225114] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.225312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.225401] Hardware name: linux,dummy-virt (DT)
[   28.225485] Call trace:
[   28.225550]  show_stack+0x20/0x38 (C)
[   28.225669]  dump_stack_lvl+0x8c/0xd0
[   28.225795]  print_report+0x118/0x608
[   28.225911]  kasan_report+0xdc/0x128
[   28.226024]  kasan_check_range+0x100/0x1a8
[   28.226144]  __kasan_check_write+0x20/0x30
[   28.226266]  kasan_atomics_helper+0xd3c/0x4858
[   28.228523]  kasan_atomics+0x198/0x2e0
[   28.228799]  kunit_try_run_case+0x170/0x3f0
[   28.229019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.229181]  kthread+0x328/0x630
[   28.229706]  ret_from_fork+0x10/0x20
[   28.229979] 
[   28.230423] Allocated by task 267:
[   28.230561]  kasan_save_stack+0x3c/0x68
[   28.230794]  kasan_save_track+0x20/0x40
[   28.231278]  kasan_save_alloc_info+0x40/0x58
[   28.231548]  __kasan_kmalloc+0xd4/0xd8
[   28.231780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.232310]  kasan_atomics+0xb8/0x2e0
[   28.232499]  kunit_try_run_case+0x170/0x3f0
[   28.232694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.233240]  kthread+0x328/0x630
[   28.233395]  ret_from_fork+0x10/0x20
[   28.233572] 
[   28.233678] The buggy address belongs to the object at fff00000c5a80800
[   28.233678]  which belongs to the cache kmalloc-64 of size 64
[   28.234222] The buggy address is located 0 bytes to the right of
[   28.234222]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.234576] 
[   28.234887] The buggy address belongs to the physical page:
[   28.234981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.235192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.235799] page_type: f5(slab)
[   28.235914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.236043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.236661] page dumped because: kasan: bad access detected
[   28.237011] 
[   28.237074] Memory state around the buggy address:
[   28.237366]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.237588]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.237800] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.237987]                                      ^
[   28.238537]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.238732]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.238927] ==================================================================
[   28.435801] ==================================================================
[   28.436063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   28.436443] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.437058] 
[   28.437161] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.437369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.437555] Hardware name: linux,dummy-virt (DT)
[   28.437737] Call trace:
[   28.437797]  show_stack+0x20/0x38 (C)
[   28.437928]  dump_stack_lvl+0x8c/0xd0
[   28.438135]  print_report+0x118/0x608
[   28.438260]  kasan_report+0xdc/0x128
[   28.438394]  kasan_check_range+0x100/0x1a8
[   28.438520]  __kasan_check_write+0x20/0x30
[   28.439574]  kasan_atomics_helper+0x126c/0x4858
[   28.440464]  kasan_atomics+0x198/0x2e0
[   28.440615]  kunit_try_run_case+0x170/0x3f0
[   28.440767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.440941]  kthread+0x328/0x630
[   28.441273]  ret_from_fork+0x10/0x20
[   28.441552] 
[   28.441674] Allocated by task 267:
[   28.442012]  kasan_save_stack+0x3c/0x68
[   28.442442]  kasan_save_track+0x20/0x40
[   28.442562]  kasan_save_alloc_info+0x40/0x58
[   28.442876]  __kasan_kmalloc+0xd4/0xd8
[   28.442988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.443149]  kasan_atomics+0xb8/0x2e0
[   28.443367]  kunit_try_run_case+0x170/0x3f0
[   28.443503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.443621]  kthread+0x328/0x630
[   28.443717]  ret_from_fork+0x10/0x20
[   28.443835] 
[   28.443889] The buggy address belongs to the object at fff00000c5a80800
[   28.443889]  which belongs to the cache kmalloc-64 of size 64
[   28.444040] The buggy address is located 0 bytes to the right of
[   28.444040]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.444208] 
[   28.444672] The buggy address belongs to the physical page:
[   28.444760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.444914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.445038] page_type: f5(slab)
[   28.447102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.447247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.447358] page dumped because: kasan: bad access detected
[   28.447461] 
[   28.447806] Memory state around the buggy address:
[   28.448016]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.448360]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.449138] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.449405]                                      ^
[   28.449738]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.450117]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.450533] ==================================================================
[   28.451597] ==================================================================
[   28.452552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   28.453042] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.453171] 
[   28.453248] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.455162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.455250] Hardware name: linux,dummy-virt (DT)
[   28.455334] Call trace:
[   28.455412]  show_stack+0x20/0x38 (C)
[   28.455565]  dump_stack_lvl+0x8c/0xd0
[   28.455711]  print_report+0x118/0x608
[   28.455848]  kasan_report+0xdc/0x128
[   28.455968]  kasan_check_range+0x100/0x1a8
[   28.456103]  __kasan_check_write+0x20/0x30
[   28.456644]  kasan_atomics_helper+0x12d8/0x4858
[   28.456890]  kasan_atomics+0x198/0x2e0
[   28.457059]  kunit_try_run_case+0x170/0x3f0
[   28.457248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.457653]  kthread+0x328/0x630
[   28.457883]  ret_from_fork+0x10/0x20
[   28.458604] 
[   28.458684] Allocated by task 267:
[   28.458767]  kasan_save_stack+0x3c/0x68
[   28.458906]  kasan_save_track+0x20/0x40
[   28.458999]  kasan_save_alloc_info+0x40/0x58
[   28.459099]  __kasan_kmalloc+0xd4/0xd8
[   28.459197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.459912]  kasan_atomics+0xb8/0x2e0
[   28.460194]  kunit_try_run_case+0x170/0x3f0
[   28.460318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.460466]  kthread+0x328/0x630
[   28.460629]  ret_from_fork+0x10/0x20
[   28.460920] 
[   28.461058] The buggy address belongs to the object at fff00000c5a80800
[   28.461058]  which belongs to the cache kmalloc-64 of size 64
[   28.461215] The buggy address is located 0 bytes to the right of
[   28.461215]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.461458] 
[   28.461523] The buggy address belongs to the physical page:
[   28.461614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.461761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.461927] page_type: f5(slab)
[   28.462186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.462558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.462985] page dumped because: kasan: bad access detected
[   28.463403] 
[   28.463479] Memory state around the buggy address:
[   28.463566]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.463702]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.464053] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.464231]                                      ^
[   28.464346]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.465171]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.466075] ==================================================================
[   28.477280] ==================================================================
[   28.477464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   28.477632] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.477870] 
[   28.478114] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.478438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.478942] Hardware name: linux,dummy-virt (DT)
[   28.479040] Call trace:
[   28.479103]  show_stack+0x20/0x38 (C)
[   28.479286]  dump_stack_lvl+0x8c/0xd0
[   28.480349]  print_report+0x118/0x608
[   28.480885]  kasan_report+0xdc/0x128
[   28.481333]  __asan_report_load8_noabort+0x20/0x30
[   28.481489]  kasan_atomics_helper+0x3f04/0x4858
[   28.481616]  kasan_atomics+0x198/0x2e0
[   28.481754]  kunit_try_run_case+0x170/0x3f0
[   28.481890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.482030]  kthread+0x328/0x630
[   28.485777]  ret_from_fork+0x10/0x20
[   28.486163] 
[   28.486556] Allocated by task 267:
[   28.486843]  kasan_save_stack+0x3c/0x68
[   28.486953]  kasan_save_track+0x20/0x40
[   28.487768]  kasan_save_alloc_info+0x40/0x58
[   28.487903]  __kasan_kmalloc+0xd4/0xd8
[   28.488535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.489078]  kasan_atomics+0xb8/0x2e0
[   28.489723]  kunit_try_run_case+0x170/0x3f0
[   28.490483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.491236]  kthread+0x328/0x630
[   28.491342]  ret_from_fork+0x10/0x20
[   28.491463] 
[   28.493097] The buggy address belongs to the object at fff00000c5a80800
[   28.493097]  which belongs to the cache kmalloc-64 of size 64
[   28.493668] The buggy address is located 0 bytes to the right of
[   28.493668]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.494305] 
[   28.495105] The buggy address belongs to the physical page:
[   28.495444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.495716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.496180] page_type: f5(slab)
[   28.496297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.497188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.497661] page dumped because: kasan: bad access detected
[   28.497752] 
[   28.497861] Memory state around the buggy address:
[   28.497952]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.498079]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.498196] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.499032]                                      ^
[   28.499271]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.499526]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.499633] ==================================================================
[   28.424839] ==================================================================
[   28.424954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   28.425084] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.425336] 
[   28.425498] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.425771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.425851] Hardware name: linux,dummy-virt (DT)
[   28.425946] Call trace:
[   28.426005]  show_stack+0x20/0x38 (C)
[   28.426130]  dump_stack_lvl+0x8c/0xd0
[   28.426251]  print_report+0x118/0x608
[   28.426368]  kasan_report+0xdc/0x128
[   28.426522]  kasan_check_range+0x100/0x1a8
[   28.426643]  __kasan_check_write+0x20/0x30
[   28.426770]  kasan_atomics_helper+0x11f8/0x4858
[   28.426888]  kasan_atomics+0x198/0x2e0
[   28.427005]  kunit_try_run_case+0x170/0x3f0
[   28.427129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.427265]  kthread+0x328/0x630
[   28.427845]  ret_from_fork+0x10/0x20
[   28.428076] 
[   28.428219] Allocated by task 267:
[   28.428341]  kasan_save_stack+0x3c/0x68
[   28.428480]  kasan_save_track+0x20/0x40
[   28.428589]  kasan_save_alloc_info+0x40/0x58
[   28.428697]  __kasan_kmalloc+0xd4/0xd8
[   28.428794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.429819]  kasan_atomics+0xb8/0x2e0
[   28.429924]  kunit_try_run_case+0x170/0x3f0
[   28.430030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.430188]  kthread+0x328/0x630
[   28.430286]  ret_from_fork+0x10/0x20
[   28.430628] 
[   28.430744] The buggy address belongs to the object at fff00000c5a80800
[   28.430744]  which belongs to the cache kmalloc-64 of size 64
[   28.430912] The buggy address is located 0 bytes to the right of
[   28.430912]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.431195] 
[   28.431277] The buggy address belongs to the physical page:
[   28.431430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.431593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.431912] page_type: f5(slab)
[   28.432011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.432253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.432369] page dumped because: kasan: bad access detected
[   28.432491] 
[   28.432554] Memory state around the buggy address:
[   28.432854]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.432994]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.433198] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.434121]                                      ^
[   28.434234]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.434888]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.435076] ==================================================================
[   28.282212] ==================================================================
[   28.282335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   28.282485] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.283035] 
[   28.283110] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.283314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.283401] Hardware name: linux,dummy-virt (DT)
[   28.283483] Call trace:
[   28.283537]  show_stack+0x20/0x38 (C)
[   28.283656]  dump_stack_lvl+0x8c/0xd0
[   28.283780]  print_report+0x118/0x608
[   28.283894]  kasan_report+0xdc/0x128
[   28.284011]  kasan_check_range+0x100/0x1a8
[   28.284154]  __kasan_check_write+0x20/0x30
[   28.284534]  kasan_atomics_helper+0xe44/0x4858
[   28.285154]  kasan_atomics+0x198/0x2e0
[   28.285476]  kunit_try_run_case+0x170/0x3f0
[   28.285624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.285765]  kthread+0x328/0x630
[   28.285913]  ret_from_fork+0x10/0x20
[   28.286246] 
[   28.286337] Allocated by task 267:
[   28.286433]  kasan_save_stack+0x3c/0x68
[   28.286640]  kasan_save_track+0x20/0x40
[   28.286900]  kasan_save_alloc_info+0x40/0x58
[   28.287071]  __kasan_kmalloc+0xd4/0xd8
[   28.287213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.287333]  kasan_atomics+0xb8/0x2e0
[   28.287493]  kunit_try_run_case+0x170/0x3f0
[   28.287883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.288026]  kthread+0x328/0x630
[   28.288356]  ret_from_fork+0x10/0x20
[   28.288489] 
[   28.288538] The buggy address belongs to the object at fff00000c5a80800
[   28.288538]  which belongs to the cache kmalloc-64 of size 64
[   28.288735] The buggy address is located 0 bytes to the right of
[   28.288735]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.289159] 
[   28.289216] The buggy address belongs to the physical page:
[   28.289291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.289762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.289895] page_type: f5(slab)
[   28.290299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.290855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.291012] page dumped because: kasan: bad access detected
[   28.291124] 
[   28.291331] Memory state around the buggy address:
[   28.291436]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.291599]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.291721] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.291950]                                      ^
[   28.292041]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.292161]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.292671] ==================================================================
[   28.412045] ==================================================================
[   28.412468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   28.412583] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.412752] 
[   28.412821] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.413148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.413519] Hardware name: linux,dummy-virt (DT)
[   28.413744] Call trace:
[   28.413871]  show_stack+0x20/0x38 (C)
[   28.414064]  dump_stack_lvl+0x8c/0xd0
[   28.414441]  print_report+0x118/0x608
[   28.414641]  kasan_report+0xdc/0x128
[   28.414898]  kasan_check_range+0x100/0x1a8
[   28.415092]  __kasan_check_write+0x20/0x30
[   28.415248]  kasan_atomics_helper+0x1190/0x4858
[   28.415459]  kasan_atomics+0x198/0x2e0
[   28.415606]  kunit_try_run_case+0x170/0x3f0
[   28.415762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.416735]  kthread+0x328/0x630
[   28.416960]  ret_from_fork+0x10/0x20
[   28.417083] 
[   28.417145] Allocated by task 267:
[   28.417367]  kasan_save_stack+0x3c/0x68
[   28.417505]  kasan_save_track+0x20/0x40
[   28.417646]  kasan_save_alloc_info+0x40/0x58
[   28.417789]  __kasan_kmalloc+0xd4/0xd8
[   28.417963]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.418069]  kasan_atomics+0xb8/0x2e0
[   28.418236]  kunit_try_run_case+0x170/0x3f0
[   28.418343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.418513]  kthread+0x328/0x630
[   28.418749]  ret_from_fork+0x10/0x20
[   28.418855] 
[   28.418992] The buggy address belongs to the object at fff00000c5a80800
[   28.418992]  which belongs to the cache kmalloc-64 of size 64
[   28.419137] The buggy address is located 0 bytes to the right of
[   28.419137]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.419308] 
[   28.419429] The buggy address belongs to the physical page:
[   28.419522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.419671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.419882] page_type: f5(slab)
[   28.419976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.420653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.421235] page dumped because: kasan: bad access detected
[   28.421435] 
[   28.421709] Memory state around the buggy address:
[   28.421829]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.421968]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.422097] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.422212]                                      ^
[   28.422309]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.422434]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.422947] ==================================================================
[   28.654639] ==================================================================
[   28.654811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   28.654925] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.655049] 
[   28.655113] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.655311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.655394] Hardware name: linux,dummy-virt (DT)
[   28.655478] Call trace:
[   28.655531]  show_stack+0x20/0x38 (C)
[   28.655653]  dump_stack_lvl+0x8c/0xd0
[   28.655773]  print_report+0x118/0x608
[   28.655893]  kasan_report+0xdc/0x128
[   28.656012]  __asan_report_load8_noabort+0x20/0x30
[   28.656231]  kasan_atomics_helper+0x3e20/0x4858
[   28.656494]  kasan_atomics+0x198/0x2e0
[   28.656669]  kunit_try_run_case+0x170/0x3f0
[   28.656823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.656979]  kthread+0x328/0x630
[   28.657169]  ret_from_fork+0x10/0x20
[   28.657306] 
[   28.657358] Allocated by task 267:
[   28.657453]  kasan_save_stack+0x3c/0x68
[   28.657554]  kasan_save_track+0x20/0x40
[   28.657673]  kasan_save_alloc_info+0x40/0x58
[   28.657897]  __kasan_kmalloc+0xd4/0xd8
[   28.658023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.658191]  kasan_atomics+0xb8/0x2e0
[   28.658403]  kunit_try_run_case+0x170/0x3f0
[   28.658608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.658857]  kthread+0x328/0x630
[   28.659034]  ret_from_fork+0x10/0x20
[   28.659191] 
[   28.659496] The buggy address belongs to the object at fff00000c5a80800
[   28.659496]  which belongs to the cache kmalloc-64 of size 64
[   28.659708] The buggy address is located 0 bytes to the right of
[   28.659708]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.659882] 
[   28.659999] The buggy address belongs to the physical page:
[   28.660200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.660900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.661100] page_type: f5(slab)
[   28.661201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.662176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.662412] page dumped because: kasan: bad access detected
[   28.663315] 
[   28.663418] Memory state around the buggy address:
[   28.663500]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.663691]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.663904] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.664061]                                      ^
[   28.664714]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.665300]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.665457] ==================================================================
[   28.400398] ==================================================================
[   28.400539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   28.400676] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.400807] 
[   28.400877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.401084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.401926] Hardware name: linux,dummy-virt (DT)
[   28.402027] Call trace:
[   28.402087]  show_stack+0x20/0x38 (C)
[   28.402217]  dump_stack_lvl+0x8c/0xd0
[   28.402401]  print_report+0x118/0x608
[   28.402698]  kasan_report+0xdc/0x128
[   28.402826]  kasan_check_range+0x100/0x1a8
[   28.403448]  __kasan_check_write+0x20/0x30
[   28.403723]  kasan_atomics_helper+0x1128/0x4858
[   28.403891]  kasan_atomics+0x198/0x2e0
[   28.404022]  kunit_try_run_case+0x170/0x3f0
[   28.404626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.404826]  kthread+0x328/0x630
[   28.404986]  ret_from_fork+0x10/0x20
[   28.405109] 
[   28.405173] Allocated by task 267:
[   28.405406]  kasan_save_stack+0x3c/0x68
[   28.405520]  kasan_save_track+0x20/0x40
[   28.405625]  kasan_save_alloc_info+0x40/0x58
[   28.405795]  __kasan_kmalloc+0xd4/0xd8
[   28.405928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.406488]  kasan_atomics+0xb8/0x2e0
[   28.406715]  kunit_try_run_case+0x170/0x3f0
[   28.406859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.407210]  kthread+0x328/0x630
[   28.407368]  ret_from_fork+0x10/0x20
[   28.407486] 
[   28.407537] The buggy address belongs to the object at fff00000c5a80800
[   28.407537]  which belongs to the cache kmalloc-64 of size 64
[   28.407677] The buggy address is located 0 bytes to the right of
[   28.407677]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.407839] 
[   28.407952] The buggy address belongs to the physical page:
[   28.408189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.408317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.408483] page_type: f5(slab)
[   28.409218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.409752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.409925] page dumped because: kasan: bad access detected
[   28.410105] 
[   28.410163] Memory state around the buggy address:
[   28.410268]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.410405]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.410571] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.410681]                                      ^
[   28.411089]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.411221]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.411358] ==================================================================
[   27.993091] ==================================================================
[   27.994248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   27.995661] Call trace:
[   28.000332]  kthread+0x328/0x630
[   28.002599]  kunit_try_run_case+0x170/0x3f0
[   28.002915]  kthread+0x328/0x630
[   28.003648] 
[   28.003720] The buggy address belongs to the physical page:
[   28.003807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.003955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.004098] page_type: f5(slab)
[   28.004242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.004414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.004545] page dumped because: kasan: bad access detected
[   28.004646] 
[   28.004760] Memory state around the buggy address:
[   28.004898]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.005161]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.005349] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.005625]                                      ^
[   28.005727]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005856]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.005984] ==================================================================
[   28.466557] ==================================================================
[   28.466642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   28.466740] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.466884] 
[   28.467106] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.467501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.467892] Hardware name: linux,dummy-virt (DT)
[   28.468204] Call trace:
[   28.468317]  show_stack+0x20/0x38 (C)
[   28.468512]  dump_stack_lvl+0x8c/0xd0
[   28.468884]  print_report+0x118/0x608
[   28.469044]  kasan_report+0xdc/0x128
[   28.469174]  kasan_check_range+0x100/0x1a8
[   28.469337]  __kasan_check_write+0x20/0x30
[   28.469638]  kasan_atomics_helper+0x1384/0x4858
[   28.469814]  kasan_atomics+0x198/0x2e0
[   28.469938]  kunit_try_run_case+0x170/0x3f0
[   28.470063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.470212]  kthread+0x328/0x630
[   28.470462]  ret_from_fork+0x10/0x20
[   28.470612] 
[   28.470678] Allocated by task 267:
[   28.470809]  kasan_save_stack+0x3c/0x68
[   28.470933]  kasan_save_track+0x20/0x40
[   28.471041]  kasan_save_alloc_info+0x40/0x58
[   28.471355]  __kasan_kmalloc+0xd4/0xd8
[   28.471481]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.471649]  kasan_atomics+0xb8/0x2e0
[   28.471750]  kunit_try_run_case+0x170/0x3f0
[   28.471865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.472017]  kthread+0x328/0x630
[   28.472193]  ret_from_fork+0x10/0x20
[   28.472300] 
[   28.472357] The buggy address belongs to the object at fff00000c5a80800
[   28.472357]  which belongs to the cache kmalloc-64 of size 64
[   28.472552] The buggy address is located 0 bytes to the right of
[   28.472552]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.472816] 
[   28.472879] The buggy address belongs to the physical page:
[   28.472989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.473331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.473507] page_type: f5(slab)
[   28.473612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.473798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.473943] page dumped because: kasan: bad access detected
[   28.474068] 
[   28.474126] Memory state around the buggy address:
[   28.474205]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.474328]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.474512] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.474747]                                      ^
[   28.474953]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.475443]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.475551] ==================================================================
[   28.543622] ==================================================================
[   28.543776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   28.543889] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.544161] 
[   28.544290] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.544647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.545010] Hardware name: linux,dummy-virt (DT)
[   28.545133] Call trace:
[   28.545201]  show_stack+0x20/0x38 (C)
[   28.545436]  dump_stack_lvl+0x8c/0xd0
[   28.545760]  print_report+0x118/0x608
[   28.545893]  kasan_report+0xdc/0x128
[   28.546059]  kasan_check_range+0x100/0x1a8
[   28.546331]  __kasan_check_write+0x20/0x30
[   28.546732]  kasan_atomics_helper+0x154c/0x4858
[   28.546866]  kasan_atomics+0x198/0x2e0
[   28.547056]  kunit_try_run_case+0x170/0x3f0
[   28.547194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.547485]  kthread+0x328/0x630
[   28.547630]  ret_from_fork+0x10/0x20
[   28.548173] 
[   28.548274] Allocated by task 267:
[   28.548358]  kasan_save_stack+0x3c/0x68
[   28.548524]  kasan_save_track+0x20/0x40
[   28.548723]  kasan_save_alloc_info+0x40/0x58
[   28.548928]  __kasan_kmalloc+0xd4/0xd8
[   28.549031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.549178]  kasan_atomics+0xb8/0x2e0
[   28.549457]  kunit_try_run_case+0x170/0x3f0
[   28.549571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.549915]  kthread+0x328/0x630
[   28.550049]  ret_from_fork+0x10/0x20
[   28.550148] 
[   28.550208] The buggy address belongs to the object at fff00000c5a80800
[   28.550208]  which belongs to the cache kmalloc-64 of size 64
[   28.550540] The buggy address is located 0 bytes to the right of
[   28.550540]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.551539] 
[   28.551907] The buggy address belongs to the physical page:
[   28.552208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.552720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.553152] page_type: f5(slab)
[   28.553620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.553761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.553913] page dumped because: kasan: bad access detected
[   28.554000] 
[   28.554050] Memory state around the buggy address:
[   28.554129]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.554511]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.555179] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.556120]                                      ^
[   28.556635]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.556774]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.557016] ==================================================================
[   28.528519] ==================================================================
[   28.529904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   28.530443] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.530972] 
[   28.531512] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.532628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.532678] Hardware name: linux,dummy-virt (DT)
[   28.532756] Call trace:
[   28.532830]  show_stack+0x20/0x38 (C)
[   28.532978]  dump_stack_lvl+0x8c/0xd0
[   28.533253]  print_report+0x118/0x608
[   28.533830]  kasan_report+0xdc/0x128
[   28.534316]  kasan_check_range+0x100/0x1a8
[   28.534622]  __kasan_check_write+0x20/0x30
[   28.534770]  kasan_atomics_helper+0x14e4/0x4858
[   28.535142]  kasan_atomics+0x198/0x2e0
[   28.535276]  kunit_try_run_case+0x170/0x3f0
[   28.535626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.535773]  kthread+0x328/0x630
[   28.535950]  ret_from_fork+0x10/0x20
[   28.536237] 
[   28.536298] Allocated by task 267:
[   28.536406]  kasan_save_stack+0x3c/0x68
[   28.537063]  kasan_save_track+0x20/0x40
[   28.537602]  kasan_save_alloc_info+0x40/0x58
[   28.537982]  __kasan_kmalloc+0xd4/0xd8
[   28.538245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.538374]  kasan_atomics+0xb8/0x2e0
[   28.538507]  kunit_try_run_case+0x170/0x3f0
[   28.538813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.539212]  kthread+0x328/0x630
[   28.539709]  ret_from_fork+0x10/0x20
[   28.540200] 
[   28.540261] The buggy address belongs to the object at fff00000c5a80800
[   28.540261]  which belongs to the cache kmalloc-64 of size 64
[   28.540492] The buggy address is located 0 bytes to the right of
[   28.540492]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.540842] 
[   28.540895] The buggy address belongs to the physical page:
[   28.540999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.541149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.541313] page_type: f5(slab)
[   28.541528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.541921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.542059] page dumped because: kasan: bad access detected
[   28.542141] 
[   28.542219] Memory state around the buggy address:
[   28.542304]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.542447]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.542581] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.542700]                                      ^
[   28.542799]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.542931]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.543073] ==================================================================
[   28.667452] ==================================================================
[   28.667632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   28.667744] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.668597] 
[   28.668922] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.669135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.669208] Hardware name: linux,dummy-virt (DT)
[   28.669294] Call trace:
[   28.669601]  show_stack+0x20/0x38 (C)
[   28.669864]  dump_stack_lvl+0x8c/0xd0
[   28.670108]  print_report+0x118/0x608
[   28.670534]  kasan_report+0xdc/0x128
[   28.671002]  kasan_check_range+0x100/0x1a8
[   28.671343]  __kasan_check_write+0x20/0x30
[   28.671491]  kasan_atomics_helper+0x17ec/0x4858
[   28.672071]  kasan_atomics+0x198/0x2e0
[   28.672592]  kunit_try_run_case+0x170/0x3f0
[   28.672756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.672896]  kthread+0x328/0x630
[   28.673011]  ret_from_fork+0x10/0x20
[   28.673133] 
[   28.673185] Allocated by task 267:
[   28.673645]  kasan_save_stack+0x3c/0x68
[   28.674167]  kasan_save_track+0x20/0x40
[   28.674868]  kasan_save_alloc_info+0x40/0x58
[   28.675631]  __kasan_kmalloc+0xd4/0xd8
[   28.675798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.676466]  kasan_atomics+0xb8/0x2e0
[   28.676683]  kunit_try_run_case+0x170/0x3f0
[   28.676783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.676896]  kthread+0x328/0x630
[   28.676993]  ret_from_fork+0x10/0x20
[   28.677089] 
[   28.677139] The buggy address belongs to the object at fff00000c5a80800
[   28.677139]  which belongs to the cache kmalloc-64 of size 64
[   28.677281] The buggy address is located 0 bytes to the right of
[   28.677281]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.679451] 
[   28.679536] The buggy address belongs to the physical page:
[   28.679625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.679773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.679914] page_type: f5(slab)
[   28.680023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.680167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.681176] page dumped because: kasan: bad access detected
[   28.681351] 
[   28.681565] Memory state around the buggy address:
[   28.682010]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.682129]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.682252] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.683683]                                      ^
[   28.684116]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.684253]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.684369] ==================================================================
[   28.311889] ==================================================================
[   28.311991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   28.312105] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.314590] 
[   28.314669] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.314902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.314955] Hardware name: linux,dummy-virt (DT)
[   28.314995] Call trace:
[   28.315023]  show_stack+0x20/0x38 (C)
[   28.315087]  dump_stack_lvl+0x8c/0xd0
[   28.315148]  print_report+0x118/0x608
[   28.315207]  kasan_report+0xdc/0x128
[   28.315263]  kasan_check_range+0x100/0x1a8
[   28.315326]  __kasan_check_write+0x20/0x30
[   28.315415]  kasan_atomics_helper+0xeb8/0x4858
[   28.315479]  kasan_atomics+0x198/0x2e0
[   28.315540]  kunit_try_run_case+0x170/0x3f0
[   28.315602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.315673]  kthread+0x328/0x630
[   28.315730]  ret_from_fork+0x10/0x20
[   28.315793] 
[   28.315817] Allocated by task 267:
[   28.315851]  kasan_save_stack+0x3c/0x68
[   28.315904]  kasan_save_track+0x20/0x40
[   28.315949]  kasan_save_alloc_info+0x40/0x58
[   28.315996]  __kasan_kmalloc+0xd4/0xd8
[   28.316042]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.316122]  kasan_atomics+0xb8/0x2e0
[   28.316332]  kunit_try_run_case+0x170/0x3f0
[   28.316474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.316592]  kthread+0x328/0x630
[   28.316689]  ret_from_fork+0x10/0x20
[   28.316802] 
[   28.316854] The buggy address belongs to the object at fff00000c5a80800
[   28.316854]  which belongs to the cache kmalloc-64 of size 64
[   28.316993] The buggy address is located 0 bytes to the right of
[   28.316993]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.317167] 
[   28.317244] The buggy address belongs to the physical page:
[   28.317339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.317488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.317619] page_type: f5(slab)
[   28.317733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.317870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.317988] page dumped because: kasan: bad access detected
[   28.318073] 
[   28.318121] Memory state around the buggy address:
[   28.318200]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.318311]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.319314] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.319444]                                      ^
[   28.319550]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.319685]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.319807] ==================================================================
[   28.337147] ==================================================================
[   28.337501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   28.337627] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.337750] 
[   28.337842] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.338058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.338129] Hardware name: linux,dummy-virt (DT)
[   28.338211] Call trace:
[   28.338265]  show_stack+0x20/0x38 (C)
[   28.338406]  dump_stack_lvl+0x8c/0xd0
[   28.338563]  print_report+0x118/0x608
[   28.338713]  kasan_report+0xdc/0x128
[   28.338887]  kasan_check_range+0x100/0x1a8
[   28.339022]  __kasan_check_write+0x20/0x30
[   28.339159]  kasan_atomics_helper+0xf88/0x4858
[   28.339290]  kasan_atomics+0x198/0x2e0
[   28.339448]  kunit_try_run_case+0x170/0x3f0
[   28.339692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.340201]  kthread+0x328/0x630
[   28.340479]  ret_from_fork+0x10/0x20
[   28.340630] 
[   28.340845] Allocated by task 267:
[   28.341032]  kasan_save_stack+0x3c/0x68
[   28.341299]  kasan_save_track+0x20/0x40
[   28.341426]  kasan_save_alloc_info+0x40/0x58
[   28.341548]  __kasan_kmalloc+0xd4/0xd8
[   28.341643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.341745]  kasan_atomics+0xb8/0x2e0
[   28.344192]  kunit_try_run_case+0x170/0x3f0
[   28.344327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.344548]  kthread+0x328/0x630
[   28.344719]  ret_from_fork+0x10/0x20
[   28.344832] 
[   28.344883] The buggy address belongs to the object at fff00000c5a80800
[   28.344883]  which belongs to the cache kmalloc-64 of size 64
[   28.346397] The buggy address is located 0 bytes to the right of
[   28.346397]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.346690] 
[   28.347582] The buggy address belongs to the physical page:
[   28.348315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.349131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.349294] page_type: f5(slab)
[   28.350890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.351501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.351617] page dumped because: kasan: bad access detected
[   28.351727] 
[   28.351810] Memory state around the buggy address:
[   28.351894]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.352013]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.352127] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.352454]                                      ^
[   28.352634]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.352752]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.353025] ==================================================================
[   28.293466] ==================================================================
[   28.293566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   28.293685] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.293809] 
[   28.293877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.294072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.294151] Hardware name: linux,dummy-virt (DT)
[   28.294236] Call trace:
[   28.294295]  show_stack+0x20/0x38 (C)
[   28.294439]  dump_stack_lvl+0x8c/0xd0
[   28.294566]  print_report+0x118/0x608
[   28.294680]  kasan_report+0xdc/0x128
[   28.294814]  __asan_report_store8_noabort+0x20/0x30
[   28.295301]  kasan_atomics_helper+0x3e5c/0x4858
[   28.296153]  kasan_atomics+0x198/0x2e0
[   28.296350]  kunit_try_run_case+0x170/0x3f0
[   28.296770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.296957]  kthread+0x328/0x630
[   28.297288]  ret_from_fork+0x10/0x20
[   28.297787] 
[   28.297847] Allocated by task 267:
[   28.298060]  kasan_save_stack+0x3c/0x68
[   28.299039]  kasan_save_track+0x20/0x40
[   28.299418]  kasan_save_alloc_info+0x40/0x58
[   28.299667]  __kasan_kmalloc+0xd4/0xd8
[   28.299772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.300314]  kasan_atomics+0xb8/0x2e0
[   28.300479]  kunit_try_run_case+0x170/0x3f0
[   28.300645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.300770]  kthread+0x328/0x630
[   28.300872]  ret_from_fork+0x10/0x20
[   28.301599] 
[   28.301678] The buggy address belongs to the object at fff00000c5a80800
[   28.301678]  which belongs to the cache kmalloc-64 of size 64
[   28.301828] The buggy address is located 0 bytes to the right of
[   28.301828]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.302261] 
[   28.302480] The buggy address belongs to the physical page:
[   28.303084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.303227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.303445] page_type: f5(slab)
[   28.303641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.304219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.304338] page dumped because: kasan: bad access detected
[   28.304455] 
[   28.305458] Memory state around the buggy address:
[   28.306052]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.306169]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.306282] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.306400]                                      ^
[   28.306489]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.306601]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.309237] ==================================================================
[   28.514710] ==================================================================
[   28.514812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   28.514929] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.515296] 
[   28.515435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.515670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.515758] Hardware name: linux,dummy-virt (DT)
[   28.515853] Call trace:
[   28.515922]  show_stack+0x20/0x38 (C)
[   28.516069]  dump_stack_lvl+0x8c/0xd0
[   28.516263]  print_report+0x118/0x608
[   28.516520]  kasan_report+0xdc/0x128
[   28.516737]  kasan_check_range+0x100/0x1a8
[   28.517082]  __kasan_check_write+0x20/0x30
[   28.517304]  kasan_atomics_helper+0x147c/0x4858
[   28.517494]  kasan_atomics+0x198/0x2e0
[   28.517804]  kunit_try_run_case+0x170/0x3f0
[   28.517956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.518116]  kthread+0x328/0x630
[   28.518279]  ret_from_fork+0x10/0x20
[   28.518443] 
[   28.518528] Allocated by task 267:
[   28.518761]  kasan_save_stack+0x3c/0x68
[   28.519687]  kasan_save_track+0x20/0x40
[   28.520026]  kasan_save_alloc_info+0x40/0x58
[   28.520232]  __kasan_kmalloc+0xd4/0xd8
[   28.520352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.520567]  kasan_atomics+0xb8/0x2e0
[   28.520683]  kunit_try_run_case+0x170/0x3f0
[   28.520804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.521010]  kthread+0x328/0x630
[   28.521415]  ret_from_fork+0x10/0x20
[   28.521541] 
[   28.521602] The buggy address belongs to the object at fff00000c5a80800
[   28.521602]  which belongs to the cache kmalloc-64 of size 64
[   28.521790] The buggy address is located 0 bytes to the right of
[   28.521790]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.521964] 
[   28.522017] The buggy address belongs to the physical page:
[   28.522094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.522218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.522352] page_type: f5(slab)
[   28.522468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.522605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.522714] page dumped because: kasan: bad access detected
[   28.522793] 
[   28.523051] Memory state around the buggy address:
[   28.523151]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.523478]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.524078] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.526408]                                      ^
[   28.526584]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.526717]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.526833] ==================================================================
[   28.064456] ==================================================================
[   28.064595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   28.065292] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.065571] 
[   28.065651] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.065874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.065948] Hardware name: linux,dummy-virt (DT)
[   28.066030] Call trace:
[   28.066087]  show_stack+0x20/0x38 (C)
[   28.066211]  dump_stack_lvl+0x8c/0xd0
[   28.067031]  print_report+0x118/0x608
[   28.067789]  kasan_report+0xdc/0x128
[   28.068056]  kasan_check_range+0x100/0x1a8
[   28.069515]  __kasan_check_write+0x20/0x30
[   28.069825]  kasan_atomics_helper+0xa6c/0x4858
[   28.070169]  kasan_atomics+0x198/0x2e0
[   28.070294]  kunit_try_run_case+0x170/0x3f0
[   28.070438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.070580]  kthread+0x328/0x630
[   28.071610]  ret_from_fork+0x10/0x20
[   28.071874] 
[   28.072051] Allocated by task 267:
[   28.072733]  kasan_save_stack+0x3c/0x68
[   28.072873]  kasan_save_track+0x20/0x40
[   28.072972]  kasan_save_alloc_info+0x40/0x58
[   28.073078]  __kasan_kmalloc+0xd4/0xd8
[   28.073887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.073976]  kasan_atomics+0xb8/0x2e0
[   28.074073]  kunit_try_run_case+0x170/0x3f0
[   28.074321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.074994]  kthread+0x328/0x630
[   28.075123]  ret_from_fork+0x10/0x20
[   28.075349] 
[   28.075422] The buggy address belongs to the object at fff00000c5a80800
[   28.075422]  which belongs to the cache kmalloc-64 of size 64
[   28.075574] The buggy address is located 0 bytes to the right of
[   28.075574]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.076005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.076203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.076906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.077040] page dumped because: kasan: bad access detected
[   28.077966]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.078080] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.078338]                                      ^
[   28.078711] ==================================================================
[   28.270765] ==================================================================
[   28.270861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   28.270973] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.271095] 
[   28.271160] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.271357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.271450] Hardware name: linux,dummy-virt (DT)
[   28.272188] Call trace:
[   28.272278]  show_stack+0x20/0x38 (C)
[   28.272443]  dump_stack_lvl+0x8c/0xd0
[   28.272684]  print_report+0x118/0x608
[   28.273022]  kasan_report+0xdc/0x128
[   28.273415]  __asan_report_load8_noabort+0x20/0x30
[   28.273715]  kasan_atomics_helper+0x3f58/0x4858
[   28.274067]  kasan_atomics+0x198/0x2e0
[   28.274193]  kunit_try_run_case+0x170/0x3f0
[   28.274317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.274478]  kthread+0x328/0x630
[   28.274596]  ret_from_fork+0x10/0x20
[   28.274758] 
[   28.274867] Allocated by task 267:
[   28.274942]  kasan_save_stack+0x3c/0x68
[   28.275047]  kasan_save_track+0x20/0x40
[   28.275159]  kasan_save_alloc_info+0x40/0x58
[   28.275832]  __kasan_kmalloc+0xd4/0xd8
[   28.275960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.276083]  kasan_atomics+0xb8/0x2e0
[   28.276763]  kunit_try_run_case+0x170/0x3f0
[   28.276973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.277301]  kthread+0x328/0x630
[   28.277436]  ret_from_fork+0x10/0x20
[   28.277831] 
[   28.277945] The buggy address belongs to the object at fff00000c5a80800
[   28.277945]  which belongs to the cache kmalloc-64 of size 64
[   28.278313] The buggy address is located 0 bytes to the right of
[   28.278313]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.278507] 
[   28.278560] The buggy address belongs to the physical page:
[   28.278636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.278823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.278950] page_type: f5(slab)
[   28.279046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.279268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.279400] page dumped because: kasan: bad access detected
[   28.279512] 
[   28.279660] Memory state around the buggy address:
[   28.279815]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.280072]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.280209] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.280330]                                      ^
[   28.280461]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.281398]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.281503] ==================================================================
[   28.604784] ==================================================================
[   28.604882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   28.604990] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.605113] 
[   28.605182] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.605401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.605475] Hardware name: linux,dummy-virt (DT)
[   28.605556] Call trace:
[   28.605608]  show_stack+0x20/0x38 (C)
[   28.605734]  dump_stack_lvl+0x8c/0xd0
[   28.605856]  print_report+0x118/0x608
[   28.605971]  kasan_report+0xdc/0x128
[   28.606096]  __asan_report_load8_noabort+0x20/0x30
[   28.606239]  kasan_atomics_helper+0x3df4/0x4858
[   28.606366]  kasan_atomics+0x198/0x2e0
[   28.606771]  kunit_try_run_case+0x170/0x3f0
[   28.607315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.607534]  kthread+0x328/0x630
[   28.607682]  ret_from_fork+0x10/0x20
[   28.607809] 
[   28.608182] Allocated by task 267:
[   28.608318]  kasan_save_stack+0x3c/0x68
[   28.608463]  kasan_save_track+0x20/0x40
[   28.608581]  kasan_save_alloc_info+0x40/0x58
[   28.608695]  __kasan_kmalloc+0xd4/0xd8
[   28.608799]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.609038]  kasan_atomics+0xb8/0x2e0
[   28.609208]  kunit_try_run_case+0x170/0x3f0
[   28.609936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.610457]  kthread+0x328/0x630
[   28.610562]  ret_from_fork+0x10/0x20
[   28.610659] 
[   28.611464] The buggy address belongs to the object at fff00000c5a80800
[   28.611464]  which belongs to the cache kmalloc-64 of size 64
[   28.611635] The buggy address is located 0 bytes to the right of
[   28.611635]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.611824] 
[   28.611887] The buggy address belongs to the physical page:
[   28.611973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.612823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.613603] page_type: f5(slab)
[   28.614037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.614233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.614576] page dumped because: kasan: bad access detected
[   28.614766] 
[   28.614873] Memory state around the buggy address:
[   28.614969]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.615147]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.615367] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.615500]                                      ^
[   28.615645]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.615777]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.616030] ==================================================================
[   28.353551] ==================================================================
[   28.353682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   28.354401] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.354725] 
[   28.354942] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.355271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.355430] Hardware name: linux,dummy-virt (DT)
[   28.355527] Call trace:
[   28.355589]  show_stack+0x20/0x38 (C)
[   28.355717]  dump_stack_lvl+0x8c/0xd0
[   28.355860]  print_report+0x118/0x608
[   28.355983]  kasan_report+0xdc/0x128
[   28.356121]  kasan_check_range+0x100/0x1a8
[   28.356278]  __kasan_check_write+0x20/0x30
[   28.356773]  kasan_atomics_helper+0xff0/0x4858
[   28.356908]  kasan_atomics+0x198/0x2e0
[   28.357250]  kunit_try_run_case+0x170/0x3f0
[   28.357534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.357955]  kthread+0x328/0x630
[   28.358160]  ret_from_fork+0x10/0x20
[   28.358351] 
[   28.358443] Allocated by task 267:
[   28.358942]  kasan_save_stack+0x3c/0x68
[   28.359053]  kasan_save_track+0x20/0x40
[   28.359151]  kasan_save_alloc_info+0x40/0x58
[   28.359255]  __kasan_kmalloc+0xd4/0xd8
[   28.359350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.359744]  kasan_atomics+0xb8/0x2e0
[   28.360063]  kunit_try_run_case+0x170/0x3f0
[   28.360235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.360633]  kthread+0x328/0x630
[   28.360751]  ret_from_fork+0x10/0x20
[   28.361071] 
[   28.361136] The buggy address belongs to the object at fff00000c5a80800
[   28.361136]  which belongs to the cache kmalloc-64 of size 64
[   28.361291] The buggy address is located 0 bytes to the right of
[   28.361291]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.361547] 
[   28.361819] The buggy address belongs to the physical page:
[   28.362236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.362578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.363191] page_type: f5(slab)
[   28.363717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.363860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.364986] page dumped because: kasan: bad access detected
[   28.365085] 
[   28.365138] Memory state around the buggy address:
[   28.365225]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.365353]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.365492] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.365592]                                      ^
[   28.365678]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.365787]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.368985] ==================================================================
[   27.796762] ==================================================================
[   27.796883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   27.797005] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   27.797133] 
[   27.797420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.797494] Hardware name: linux,dummy-virt (DT)
[   27.797572] Call trace:
[   27.797718]  show_stack+0x20/0x38 (C)
[   27.798358]  __kasan_check_write+0x20/0x30
[   27.798513]  kasan_atomics_helper+0x32c/0x4858
[   27.799482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.803354]  kthread+0x328/0x630
[   27.804240] 
[   27.804598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   27.805855] page dumped because: kasan: bad access detected
[   27.807400]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.808556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   27.809339] Hardware name: linux,dummy-virt (DT)
[   27.810937]  kunit_try_run_case+0x170/0x3f0
[   27.813591]  ret_from_fork+0x10/0x20
[   27.815613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   27.818365] ==================================================================
[   28.501947] ==================================================================
[   28.502073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   28.502261] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.502676] 
[   28.502762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.503101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.503176] Hardware name: linux,dummy-virt (DT)
[   28.503256] Call trace:
[   28.503312]  show_stack+0x20/0x38 (C)
[   28.503457]  dump_stack_lvl+0x8c/0xd0
[   28.503580]  print_report+0x118/0x608
[   28.503694]  kasan_report+0xdc/0x128
[   28.503810]  kasan_check_range+0x100/0x1a8
[   28.503927]  __kasan_check_write+0x20/0x30
[   28.504050]  kasan_atomics_helper+0x1414/0x4858
[   28.504186]  kasan_atomics+0x198/0x2e0
[   28.504305]  kunit_try_run_case+0x170/0x3f0
[   28.505235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.505437]  kthread+0x328/0x630
[   28.505916]  ret_from_fork+0x10/0x20
[   28.506369] 
[   28.506486] Allocated by task 267:
[   28.506568]  kasan_save_stack+0x3c/0x68
[   28.506679]  kasan_save_track+0x20/0x40
[   28.506883]  kasan_save_alloc_info+0x40/0x58
[   28.507083]  __kasan_kmalloc+0xd4/0xd8
[   28.507193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.507860]  kasan_atomics+0xb8/0x2e0
[   28.508423]  kunit_try_run_case+0x170/0x3f0
[   28.508603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.509224]  kthread+0x328/0x630
[   28.509434]  ret_from_fork+0x10/0x20
[   28.509551] 
[   28.509605] The buggy address belongs to the object at fff00000c5a80800
[   28.509605]  which belongs to the cache kmalloc-64 of size 64
[   28.510283] The buggy address is located 0 bytes to the right of
[   28.510283]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.510907] 
[   28.511061] The buggy address belongs to the physical page:
[   28.511156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.511289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.511741] page_type: f5(slab)
[   28.511899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.512191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.512424] page dumped because: kasan: bad access detected
[   28.513082] 
[   28.513149] Memory state around the buggy address:
[   28.513239]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.513367]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.513506] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.513700]                                      ^
[   28.513788]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.513914]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.514205] ==================================================================
[   28.210741] ==================================================================
[   28.210851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   28.211145] Read of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.211342] 
[   28.211464] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.211738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.211855] Hardware name: linux,dummy-virt (DT)
[   28.211935] Call trace:
[   28.211987]  show_stack+0x20/0x38 (C)
[   28.212164]  dump_stack_lvl+0x8c/0xd0
[   28.212315]  print_report+0x118/0x608
[   28.212991]  kasan_report+0xdc/0x128
[   28.213225]  __asan_report_load4_noabort+0x20/0x30
[   28.213468]  kasan_atomics_helper+0x3dd8/0x4858
[   28.213623]  kasan_atomics+0x198/0x2e0
[   28.213945]  kunit_try_run_case+0x170/0x3f0
[   28.214197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.214352]  kthread+0x328/0x630
[   28.214711]  ret_from_fork+0x10/0x20
[   28.214878] 
[   28.214999] Allocated by task 267:
[   28.215084]  kasan_save_stack+0x3c/0x68
[   28.215191]  kasan_save_track+0x20/0x40
[   28.215354]  kasan_save_alloc_info+0x40/0x58
[   28.215682]  __kasan_kmalloc+0xd4/0xd8
[   28.215908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.216014]  kasan_atomics+0xb8/0x2e0
[   28.216162]  kunit_try_run_case+0x170/0x3f0
[   28.216292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.216756]  kthread+0x328/0x630
[   28.217066]  ret_from_fork+0x10/0x20
[   28.217264] 
[   28.217363] The buggy address belongs to the object at fff00000c5a80800
[   28.217363]  which belongs to the cache kmalloc-64 of size 64
[   28.217909] The buggy address is located 0 bytes to the right of
[   28.217909]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.218206] 
[   28.218326] The buggy address belongs to the physical page:
[   28.218560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.218836] page_type: f5(slab)
[   28.218967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.219167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.219469] page dumped because: kasan: bad access detected
[   28.219568] 
[   28.219643] Memory state around the buggy address:
[   28.219727]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.219844]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.220013] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.220205]                                      ^
[   28.220959]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.221275]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.222619] ==================================================================
[   28.383341] ==================================================================
[   28.383629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   28.383804] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.384068] 
[   28.384253] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.384828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.385051] Hardware name: linux,dummy-virt (DT)
[   28.385136] Call trace:
[   28.385195]  show_stack+0x20/0x38 (C)
[   28.385313]  dump_stack_lvl+0x8c/0xd0
[   28.385466]  print_report+0x118/0x608
[   28.385610]  kasan_report+0xdc/0x128
[   28.386316]  kasan_check_range+0x100/0x1a8
[   28.386478]  __kasan_check_write+0x20/0x30
[   28.386725]  kasan_atomics_helper+0x10c0/0x4858
[   28.386871]  kasan_atomics+0x198/0x2e0
[   28.387027]  kunit_try_run_case+0x170/0x3f0
[   28.387173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.387424]  kthread+0x328/0x630
[   28.387563]  ret_from_fork+0x10/0x20
[   28.388231] 
[   28.388290] Allocated by task 267:
[   28.388481]  kasan_save_stack+0x3c/0x68
[   28.388592]  kasan_save_track+0x20/0x40
[   28.388732]  kasan_save_alloc_info+0x40/0x58
[   28.388839]  __kasan_kmalloc+0xd4/0xd8
[   28.389003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.389681]  kasan_atomics+0xb8/0x2e0
[   28.389847]  kunit_try_run_case+0x170/0x3f0
[   28.390065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.390283]  kthread+0x328/0x630
[   28.390421]  ret_from_fork+0x10/0x20
[   28.390775] 
[   28.390890] The buggy address belongs to the object at fff00000c5a80800
[   28.390890]  which belongs to the cache kmalloc-64 of size 64
[   28.391040] The buggy address is located 0 bytes to the right of
[   28.391040]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.391783] 
[   28.392247] The buggy address belongs to the physical page:
[   28.392573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.393085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.393262] page_type: f5(slab)
[   28.393356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.394409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.394558] page dumped because: kasan: bad access detected
[   28.394658] 
[   28.395261] Memory state around the buggy address:
[   28.395393]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.396006]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.397292] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.397461]                                      ^
[   28.398105]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.398283]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.398565] ==================================================================
[   28.641929] ==================================================================
[   28.643875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   28.644007] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.644312] 
[   28.644444] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.644849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.645185] Hardware name: linux,dummy-virt (DT)
[   28.645309] Call trace:
[   28.645633]  show_stack+0x20/0x38 (C)
[   28.645976]  dump_stack_lvl+0x8c/0xd0
[   28.646105]  print_report+0x118/0x608
[   28.646259]  kasan_report+0xdc/0x128
[   28.646626]  kasan_check_range+0x100/0x1a8
[   28.646956]  __kasan_check_write+0x20/0x30
[   28.647088]  kasan_atomics_helper+0x175c/0x4858
[   28.647244]  kasan_atomics+0x198/0x2e0
[   28.647483]  kunit_try_run_case+0x170/0x3f0
[   28.647698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.647868]  kthread+0x328/0x630
[   28.648012]  ret_from_fork+0x10/0x20
[   28.648290] 
[   28.648438] Allocated by task 267:
[   28.648535]  kasan_save_stack+0x3c/0x68
[   28.648694]  kasan_save_track+0x20/0x40
[   28.648813]  kasan_save_alloc_info+0x40/0x58
[   28.648981]  __kasan_kmalloc+0xd4/0xd8
[   28.649179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.649392]  kasan_atomics+0xb8/0x2e0
[   28.649583]  kunit_try_run_case+0x170/0x3f0
[   28.649781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.649975]  kthread+0x328/0x630
[   28.650162]  ret_from_fork+0x10/0x20
[   28.650287] 
[   28.650441] The buggy address belongs to the object at fff00000c5a80800
[   28.650441]  which belongs to the cache kmalloc-64 of size 64
[   28.650643] The buggy address is located 0 bytes to the right of
[   28.650643]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.650863] 
[   28.650935] The buggy address belongs to the physical page:
[   28.651026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.651159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.651334] page_type: f5(slab)
[   28.651558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.651773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.651895] page dumped because: kasan: bad access detected
[   28.652139] 
[   28.652195] Memory state around the buggy address:
[   28.652275]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.652410]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.652538] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.652642]                                      ^
[   28.652731]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.653528]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.653647] ==================================================================
[   28.239506] ==================================================================
[   28.239607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   28.239756] Read of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.239933] 
[   28.240070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.240585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.240667] Hardware name: linux,dummy-virt (DT)
[   28.240757] Call trace:
[   28.240931]  show_stack+0x20/0x38 (C)
[   28.241521]  dump_stack_lvl+0x8c/0xd0
[   28.241838]  print_report+0x118/0x608
[   28.241976]  kasan_report+0xdc/0x128
[   28.242143]  __asan_report_load4_noabort+0x20/0x30
[   28.242445]  kasan_atomics_helper+0x3e04/0x4858
[   28.242809]  kasan_atomics+0x198/0x2e0
[   28.242938]  kunit_try_run_case+0x170/0x3f0
[   28.243091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.243289]  kthread+0x328/0x630
[   28.243435]  ret_from_fork+0x10/0x20
[   28.243653] 
[   28.244047] Allocated by task 267:
[   28.244355]  kasan_save_stack+0x3c/0x68
[   28.244589]  kasan_save_track+0x20/0x40
[   28.244702]  kasan_save_alloc_info+0x40/0x58
[   28.245120]  __kasan_kmalloc+0xd4/0xd8
[   28.245326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.246008]  kasan_atomics+0xb8/0x2e0
[   28.246196]  kunit_try_run_case+0x170/0x3f0
[   28.246352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.246496]  kthread+0x328/0x630
[   28.246592]  ret_from_fork+0x10/0x20
[   28.246925] 
[   28.246999] The buggy address belongs to the object at fff00000c5a80800
[   28.246999]  which belongs to the cache kmalloc-64 of size 64
[   28.247210] The buggy address is located 0 bytes to the right of
[   28.247210]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.247371] 
[   28.247444] The buggy address belongs to the physical page:
[   28.247517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.247672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.247794] page_type: f5(slab)
[   28.247891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.248028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.248419] page dumped because: kasan: bad access detected
[   28.248545] 
[   28.248604] Memory state around the buggy address:
[   28.248804]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.249309]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.249511] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.249755]                                      ^
[   28.249872]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.249998]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.250525] ==================================================================
[   28.616699] ==================================================================
[   28.616853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   28.616986] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.617460] 
[   28.617549] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.617907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.618117] Hardware name: linux,dummy-virt (DT)
[   28.618262] Call trace:
[   28.618324]  show_stack+0x20/0x38 (C)
[   28.618464]  dump_stack_lvl+0x8c/0xd0
[   28.618590]  print_report+0x118/0x608
[   28.618707]  kasan_report+0xdc/0x128
[   28.618818]  kasan_check_range+0x100/0x1a8
[   28.618939]  __kasan_check_write+0x20/0x30
[   28.619057]  kasan_atomics_helper+0x16d0/0x4858
[   28.619193]  kasan_atomics+0x198/0x2e0
[   28.619313]  kunit_try_run_case+0x170/0x3f0
[   28.619464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.619615]  kthread+0x328/0x630
[   28.619730]  ret_from_fork+0x10/0x20
[   28.619851] 
[   28.619901] Allocated by task 267:
[   28.619972]  kasan_save_stack+0x3c/0x68
[   28.620093]  kasan_save_track+0x20/0x40
[   28.620217]  kasan_save_alloc_info+0x40/0x58
[   28.620419]  __kasan_kmalloc+0xd4/0xd8
[   28.620600]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.620721]  kasan_atomics+0xb8/0x2e0
[   28.620838]  kunit_try_run_case+0x170/0x3f0
[   28.620958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.621140]  kthread+0x328/0x630
[   28.621290]  ret_from_fork+0x10/0x20
[   28.621402] 
[   28.621462] The buggy address belongs to the object at fff00000c5a80800
[   28.621462]  which belongs to the cache kmalloc-64 of size 64
[   28.623106] The buggy address is located 0 bytes to the right of
[   28.623106]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.624615] 
[   28.624682] The buggy address belongs to the physical page:
[   28.624768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.625447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.625619] page_type: f5(slab)
[   28.625744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.625886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.626006] page dumped because: kasan: bad access detected
[   28.626609] 
[   28.626680] Memory state around the buggy address:
[   28.626872]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.627011]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.627187] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.627483]                                      ^
[   28.627577]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.627689]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.627790] ==================================================================
[   28.036813] ==================================================================
[   28.036955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.037106] Write of size 4 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.037253] 
[   28.037322] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.037599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.037688] Hardware name: linux,dummy-virt (DT)
[   28.037921] Call trace:
[   28.037985]  show_stack+0x20/0x38 (C)
[   28.038115]  dump_stack_lvl+0x8c/0xd0
[   28.038340]  print_report+0x118/0x608
[   28.038539]  kasan_report+0xdc/0x128
[   28.038794]  kasan_check_range+0x100/0x1a8
[   28.039143]  __kasan_check_write+0x20/0x30
[   28.039451]  kasan_atomics_helper+0x99c/0x4858
[   28.039604]  kasan_atomics+0x198/0x2e0
[   28.039720]  kunit_try_run_case+0x170/0x3f0
[   28.039861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.040212]  kthread+0x328/0x630
[   28.040823]  ret_from_fork+0x10/0x20
[   28.041004] 
[   28.041067] Allocated by task 267:
[   28.041472]  kasan_save_stack+0x3c/0x68
[   28.041611]  kasan_save_track+0x20/0x40
[   28.041782]  kasan_save_alloc_info+0x40/0x58
[   28.041889]  __kasan_kmalloc+0xd4/0xd8
[   28.041989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.042124]  kasan_atomics+0xb8/0x2e0
[   28.042424]  kunit_try_run_case+0x170/0x3f0
[   28.043139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.043453]  kthread+0x328/0x630
[   28.043612]  ret_from_fork+0x10/0x20
[   28.043835] 
[   28.043892] The buggy address belongs to the object at fff00000c5a80800
[   28.043892]  which belongs to the cache kmalloc-64 of size 64
[   28.044182] The buggy address is located 0 bytes to the right of
[   28.044182]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.044474] 
[   28.044555] The buggy address belongs to the physical page:
[   28.044673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.045404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.046926] ==================================================================
[   28.558038] ==================================================================
[   28.558142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   28.558441] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.558805] 
[   28.558991] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.559461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.559550] Hardware name: linux,dummy-virt (DT)
[   28.559646] Call trace:
[   28.560017]  show_stack+0x20/0x38 (C)
[   28.560169]  dump_stack_lvl+0x8c/0xd0
[   28.560669]  print_report+0x118/0x608
[   28.560793]  kasan_report+0xdc/0x128
[   28.561306]  kasan_check_range+0x100/0x1a8
[   28.561814]  __kasan_check_write+0x20/0x30
[   28.562722]  kasan_atomics_helper+0x15b4/0x4858
[   28.562873]  kasan_atomics+0x198/0x2e0
[   28.563070]  kunit_try_run_case+0x170/0x3f0
[   28.563202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.563481]  kthread+0x328/0x630
[   28.563626]  ret_from_fork+0x10/0x20
[   28.564039] 
[   28.564238] Allocated by task 267:
[   28.564699]  kasan_save_stack+0x3c/0x68
[   28.564951]  kasan_save_track+0x20/0x40
[   28.565091]  kasan_save_alloc_info+0x40/0x58
[   28.565196]  __kasan_kmalloc+0xd4/0xd8
[   28.565568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.565693]  kasan_atomics+0xb8/0x2e0
[   28.565844]  kunit_try_run_case+0x170/0x3f0
[   28.565986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.566106]  kthread+0x328/0x630
[   28.566629]  ret_from_fork+0x10/0x20
[   28.566833] 
[   28.566884] The buggy address belongs to the object at fff00000c5a80800
[   28.566884]  which belongs to the cache kmalloc-64 of size 64
[   28.567704] The buggy address is located 0 bytes to the right of
[   28.567704]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.567891] 
[   28.567948] The buggy address belongs to the physical page:
[   28.568782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.568983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.569188] page_type: f5(slab)
[   28.569688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.569830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.569938] page dumped because: kasan: bad access detected
[   28.570021] 
[   28.570074] Memory state around the buggy address:
[   28.570152]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.571267]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.571555] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.571683]                                      ^
[   28.571771]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.571885]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.572148] ==================================================================
[   28.588891] ==================================================================
[   28.588995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   28.589104] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.589227] 
[   28.589306] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.589882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.590088] Hardware name: linux,dummy-virt (DT)
[   28.590174] Call trace:
[   28.590230]  show_stack+0x20/0x38 (C)
[   28.590650]  dump_stack_lvl+0x8c/0xd0
[   28.590801]  print_report+0x118/0x608
[   28.590924]  kasan_report+0xdc/0x128
[   28.591457]  kasan_check_range+0x100/0x1a8
[   28.592103]  __kasan_check_write+0x20/0x30
[   28.592309]  kasan_atomics_helper+0x1644/0x4858
[   28.592476]  kasan_atomics+0x198/0x2e0
[   28.592674]  kunit_try_run_case+0x170/0x3f0
[   28.592809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.593153]  kthread+0x328/0x630
[   28.593308]  ret_from_fork+0x10/0x20
[   28.594139] 
[   28.594205] Allocated by task 267:
[   28.594308]  kasan_save_stack+0x3c/0x68
[   28.594966]  kasan_save_track+0x20/0x40
[   28.595234]  kasan_save_alloc_info+0x40/0x58
[   28.595483]  __kasan_kmalloc+0xd4/0xd8
[   28.595587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.595930]  kasan_atomics+0xb8/0x2e0
[   28.596925]  kunit_try_run_case+0x170/0x3f0
[   28.597245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.597401]  kthread+0x328/0x630
[   28.597906]  ret_from_fork+0x10/0x20
[   28.598068] 
[   28.598162] The buggy address belongs to the object at fff00000c5a80800
[   28.598162]  which belongs to the cache kmalloc-64 of size 64
[   28.598308] The buggy address is located 0 bytes to the right of
[   28.598308]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.598487] 
[   28.598729] The buggy address belongs to the physical page:
[   28.599217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.599441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.599649] page_type: f5(slab)
[   28.599786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.600244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.600471] page dumped because: kasan: bad access detected
[   28.601291] 
[   28.601465] Memory state around the buggy address:
[   28.601583]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.602359]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.602757] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.603348]                                      ^
[   28.603501]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.604171]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.604270] ==================================================================
[   28.572512] ==================================================================
[   28.572620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   28.572747] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.572898] 
[   28.573008] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.573233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.573861] Hardware name: linux,dummy-virt (DT)
[   28.574748] Call trace:
[   28.574818]  show_stack+0x20/0x38 (C)
[   28.575573]  dump_stack_lvl+0x8c/0xd0
[   28.575705]  print_report+0x118/0x608
[   28.575826]  kasan_report+0xdc/0x128
[   28.575941]  __asan_report_load8_noabort+0x20/0x30
[   28.576070]  kasan_atomics_helper+0x3db0/0x4858
[   28.576210]  kasan_atomics+0x198/0x2e0
[   28.576330]  kunit_try_run_case+0x170/0x3f0
[   28.576488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.576632]  kthread+0x328/0x630
[   28.576747]  ret_from_fork+0x10/0x20
[   28.576866] 
[   28.576916] Allocated by task 267:
[   28.576984]  kasan_save_stack+0x3c/0x68
[   28.580121]  kasan_save_track+0x20/0x40
[   28.580250]  kasan_save_alloc_info+0x40/0x58
[   28.580427]  __kasan_kmalloc+0xd4/0xd8
[   28.580552]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.580674]  kasan_atomics+0xb8/0x2e0
[   28.580784]  kunit_try_run_case+0x170/0x3f0
[   28.580945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.581330]  kthread+0x328/0x630
[   28.581446]  ret_from_fork+0x10/0x20
[   28.582128] 
[   28.583014] The buggy address belongs to the object at fff00000c5a80800
[   28.583014]  which belongs to the cache kmalloc-64 of size 64
[   28.583433] The buggy address is located 0 bytes to the right of
[   28.583433]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.584808] 
[   28.584900] The buggy address belongs to the physical page:
[   28.584982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.585289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.585430] page_type: f5(slab)
[   28.585529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.585673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.585907] page dumped because: kasan: bad access detected
[   28.585990] 
[   28.586066] Memory state around the buggy address:
[   28.586252]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.586481]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.586618] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.586741]                                      ^
[   28.587361]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.587944]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.588058] ==================================================================
[   28.370357] ==================================================================
[   28.371643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   28.372138] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.372504] 
[   28.376200] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.376459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.376542] Hardware name: linux,dummy-virt (DT)
[   28.376617] Call trace:
[   28.376647]  show_stack+0x20/0x38 (C)
[   28.376711]  dump_stack_lvl+0x8c/0xd0
[   28.376773]  print_report+0x118/0x608
[   28.376832]  kasan_report+0xdc/0x128
[   28.376892]  kasan_check_range+0x100/0x1a8
[   28.376953]  __kasan_check_write+0x20/0x30
[   28.377012]  kasan_atomics_helper+0x1058/0x4858
[   28.377072]  kasan_atomics+0x198/0x2e0
[   28.377127]  kunit_try_run_case+0x170/0x3f0
[   28.377192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.377263]  kthread+0x328/0x630
[   28.377319]  ret_from_fork+0x10/0x20
[   28.377404] 
[   28.377432] Allocated by task 267:
[   28.377467]  kasan_save_stack+0x3c/0x68
[   28.377522]  kasan_save_track+0x20/0x40
[   28.377569]  kasan_save_alloc_info+0x40/0x58
[   28.377620]  __kasan_kmalloc+0xd4/0xd8
[   28.377663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.377713]  kasan_atomics+0xb8/0x2e0
[   28.377756]  kunit_try_run_case+0x170/0x3f0
[   28.377810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.377871]  kthread+0x328/0x630
[   28.377920]  ret_from_fork+0x10/0x20
[   28.377969] 
[   28.377995] The buggy address belongs to the object at fff00000c5a80800
[   28.377995]  which belongs to the cache kmalloc-64 of size 64
[   28.378067] The buggy address is located 0 bytes to the right of
[   28.378067]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.378146] 
[   28.378171] The buggy address belongs to the physical page:
[   28.378209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.378271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.378331] page_type: f5(slab)
[   28.378422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.378657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.379183] page dumped because: kasan: bad access detected
[   28.379294] 
[   28.379346] Memory state around the buggy address:
[   28.379436]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.379931]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.380051] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.380158]                                      ^
[   28.380242]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.380355]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.382004] ==================================================================
[   28.007217] ==================================================================
[   28.007407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.013522]  kthread+0x328/0x630
[   28.014651] 
[   28.015453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.022334]  show_stack+0x20/0x38 (C)
[   28.024375]  dump_stack_lvl+0x8c/0xd0
[   28.024582]  print_report+0x118/0x608
[   28.025598]  kasan_report+0xdc/0x128
[   28.025770]  kasan_check_range+0x100/0x1a8
[   28.025909]  __kasan_check_write+0x20/0x30
[   28.026088]  kasan_atomics_helper+0x934/0x4858
[   28.026179]  kasan_atomics+0x198/0x2e0
[   28.026310]  kunit_try_run_case+0x170/0x3f0
[   28.026469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.026609]  kthread+0x328/0x630
[   28.026740]  ret_from_fork+0x10/0x20
[   28.026884] 
[   28.026937] Allocated by task 267:
[   28.027010]  kasan_save_stack+0x3c/0x68
[   28.027158]  kasan_save_track+0x20/0x40
[   28.027400]  kasan_save_alloc_info+0x40/0x58
[   28.028525]  __kasan_kmalloc+0xd4/0xd8
[   28.028632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.029584]  kasan_atomics+0xb8/0x2e0
[   28.029890]  kunit_try_run_case+0x170/0x3f0
[   28.031013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.032190]  kthread+0x328/0x630
[   28.032481]  ret_from_fork+0x10/0x20
[   28.032598] 
[   28.032666] The buggy address belongs to the object at fff00000c5a80800
[   28.032666]  which belongs to the cache kmalloc-64 of size 64
[   28.033459] The buggy address is located 0 bytes to the right of
[   28.033459]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.033651] 
[   28.033720] The buggy address belongs to the physical page:
[   28.033794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.033933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.034061] page_type: f5(slab)
[   28.034169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.034321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.034483] page dumped because: kasan: bad access detected
[   28.034578] 
[   28.034634] Memory state around the buggy address:
[   28.034714]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.034833]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.034951] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.035065]                                      ^
[   28.035155]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.035270]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.035373] ==================================================================
[   28.320590] ==================================================================
[   28.320691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   28.320795] Write of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.320925] 
[   28.321002] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.321221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.321454] Hardware name: linux,dummy-virt (DT)
[   28.323935] Call trace:
[   28.324500]  show_stack+0x20/0x38 (C)
[   28.325021]  dump_stack_lvl+0x8c/0xd0
[   28.325347]  print_report+0x118/0x608
[   28.325771]  kasan_report+0xdc/0x128
[   28.325997]  kasan_check_range+0x100/0x1a8
[   28.326135]  __kasan_check_write+0x20/0x30
[   28.326344]  kasan_atomics_helper+0xf20/0x4858
[   28.326977]  kasan_atomics+0x198/0x2e0
[   28.327374]  kunit_try_run_case+0x170/0x3f0
[   28.328058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.328288]  kthread+0x328/0x630
[   28.328428]  ret_from_fork+0x10/0x20
[   28.328559] 
[   28.328610] Allocated by task 267:
[   28.328712]  kasan_save_stack+0x3c/0x68
[   28.328989]  kasan_save_track+0x20/0x40
[   28.329101]  kasan_save_alloc_info+0x40/0x58
[   28.329445]  __kasan_kmalloc+0xd4/0xd8
[   28.329595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.329704]  kasan_atomics+0xb8/0x2e0
[   28.331475]  kunit_try_run_case+0x170/0x3f0
[   28.331611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.331751]  kthread+0x328/0x630
[   28.331868]  ret_from_fork+0x10/0x20
[   28.331982] 
[   28.332045] The buggy address belongs to the object at fff00000c5a80800
[   28.332045]  which belongs to the cache kmalloc-64 of size 64
[   28.332222] The buggy address is located 0 bytes to the right of
[   28.332222]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.332405] 
[   28.332473] The buggy address belongs to the physical page:
[   28.332578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.332766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.333071] page_type: f5(slab)
[   28.333234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.333457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.333848] page dumped because: kasan: bad access detected
[   28.334159] 
[   28.334216] Memory state around the buggy address:
[   28.334312]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.334628]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.334770] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.335012]                                      ^
[   28.335347]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.335495]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.335608] ==================================================================
[   28.628460] ==================================================================
[   28.628965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   28.629082] Read of size 8 at addr fff00000c5a80830 by task kunit_try_catch/267
[   28.629209] 
[   28.629309] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   28.629586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.629849] Hardware name: linux,dummy-virt (DT)
[   28.629959] Call trace:
[   28.630019]  show_stack+0x20/0x38 (C)
[   28.630141]  dump_stack_lvl+0x8c/0xd0
[   28.630266]  print_report+0x118/0x608
[   28.630402]  kasan_report+0xdc/0x128
[   28.631486]  __asan_report_load8_noabort+0x20/0x30
[   28.631675]  kasan_atomics_helper+0x3e10/0x4858
[   28.631777]  kasan_atomics+0x198/0x2e0
[   28.631840]  kunit_try_run_case+0x170/0x3f0
[   28.631903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.631975]  kthread+0x328/0x630
[   28.632034]  ret_from_fork+0x10/0x20
[   28.632106] 
[   28.633237] Allocated by task 267:
[   28.633321]  kasan_save_stack+0x3c/0x68
[   28.633457]  kasan_save_track+0x20/0x40
[   28.633567]  kasan_save_alloc_info+0x40/0x58
[   28.633676]  __kasan_kmalloc+0xd4/0xd8
[   28.633804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.633867]  kasan_atomics+0xb8/0x2e0
[   28.633944]  kunit_try_run_case+0x170/0x3f0
[   28.634117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.634272]  kthread+0x328/0x630
[   28.634590]  ret_from_fork+0x10/0x20
[   28.634760] 
[   28.634819] The buggy address belongs to the object at fff00000c5a80800
[   28.634819]  which belongs to the cache kmalloc-64 of size 64
[   28.635225] The buggy address is located 0 bytes to the right of
[   28.635225]  allocated 48-byte region [fff00000c5a80800, fff00000c5a80830)
[   28.635899] 
[   28.635978] The buggy address belongs to the physical page:
[   28.636256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   28.636427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.637325] page_type: f5(slab)
[   28.637468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.637911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.638084] page dumped because: kasan: bad access detected
[   28.638693] 
[   28.638772] Memory state around the buggy address:
[   28.639135]  fff00000c5a80700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.639490]  fff00000c5a80780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.639615] >fff00000c5a80800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.639948]                                      ^
[   28.640371]  fff00000c5a80880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.640639]  fff00000c5a80900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.640757] ==================================================================

[   14.714213] ==================================================================
[   14.715001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.715908] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.716909] 
[   14.717100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.717175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.717189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.717214] Call Trace:
[   14.717241]  <TASK>
[   14.717267]  dump_stack_lvl+0x73/0xb0
[   14.717486]  print_report+0xd1/0x650
[   14.717551]  ? __virt_addr_valid+0x1db/0x2d0
[   14.717593]  ? kasan_atomics_helper+0x3df/0x5450
[   14.717658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.717684]  ? kasan_atomics_helper+0x3df/0x5450
[   14.717706]  kasan_report+0x141/0x180
[   14.717729]  ? kasan_atomics_helper+0x3df/0x5450
[   14.717754]  kasan_check_range+0x10c/0x1c0
[   14.717775]  __kasan_check_read+0x15/0x20
[   14.717794]  kasan_atomics_helper+0x3df/0x5450
[   14.717816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.717838]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.717859]  ? kasan_atomics+0x152/0x310
[   14.717882]  kasan_atomics+0x1dc/0x310
[   14.717900]  ? __pfx_kasan_atomics+0x10/0x10
[   14.717921]  ? __pfx_read_tsc+0x10/0x10
[   14.717942]  ? ktime_get_ts64+0x86/0x230
[   14.717984]  kunit_try_run_case+0x1a5/0x480
[   14.718011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.718058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.718082]  ? __kthread_parkme+0x82/0x180
[   14.718106]  ? preempt_count_sub+0x50/0x80
[   14.718130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.718177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.718200]  kthread+0x337/0x6f0
[   14.718217]  ? trace_preempt_on+0x20/0xc0
[   14.718242]  ? __pfx_kthread+0x10/0x10
[   14.718261]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.718287]  ? calculate_sigpending+0x7b/0xa0
[   14.718374]  ? __pfx_kthread+0x10/0x10
[   14.718405]  ret_from_fork+0x41/0x80
[   14.718428]  ? __pfx_kthread+0x10/0x10
[   14.718447]  ret_from_fork_asm+0x1a/0x30
[   14.718479]  </TASK>
[   14.718493] 
[   14.729736] Allocated by task 285:
[   14.729976]  kasan_save_stack+0x45/0x70
[   14.730341]  kasan_save_track+0x18/0x40
[   14.730614]  kasan_save_alloc_info+0x3b/0x50
[   14.731066]  __kasan_kmalloc+0xb7/0xc0
[   14.732091]  __kmalloc_cache_noprof+0x189/0x420
[   14.732582]  kasan_atomics+0x95/0x310
[   14.732921]  kunit_try_run_case+0x1a5/0x480
[   14.733204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733784]  kthread+0x337/0x6f0
[   14.733990]  ret_from_fork+0x41/0x80
[   14.734258]  ret_from_fork_asm+0x1a/0x30
[   14.734772] 
[   14.734944] The buggy address belongs to the object at ffff8881029ef680
[   14.734944]  which belongs to the cache kmalloc-64 of size 64
[   14.735678] The buggy address is located 0 bytes to the right of
[   14.735678]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.736663] 
[   14.736989] The buggy address belongs to the physical page:
[   14.737352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.737866] flags: 0x200000000000000(node=0|zone=2)
[   14.738405] page_type: f5(slab)
[   14.738682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.738903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.739460] page dumped because: kasan: bad access detected
[   14.739849] 
[   14.740026] Memory state around the buggy address:
[   14.740309]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.740923]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.741489] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.741909]                                      ^
[   14.742186]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742569]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.743002] ==================================================================
[   15.661509] ==================================================================
[   15.662445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.663087] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.663390] 
[   15.663528] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.663635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.663665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.663705] Call Trace:
[   15.663743]  <TASK>
[   15.663775]  dump_stack_lvl+0x73/0xb0
[   15.663819]  print_report+0xd1/0x650
[   15.663852]  ? __virt_addr_valid+0x1db/0x2d0
[   15.663884]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.663906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.663934]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.663964]  kasan_report+0x141/0x180
[   15.663987]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.664012]  __asan_report_store8_noabort+0x1b/0x30
[   15.664033]  kasan_atomics_helper+0x50d4/0x5450
[   15.664055]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.664076]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.664098]  ? kasan_atomics+0x152/0x310
[   15.664121]  kasan_atomics+0x1dc/0x310
[   15.664140]  ? __pfx_kasan_atomics+0x10/0x10
[   15.664160]  ? __pfx_read_tsc+0x10/0x10
[   15.664180]  ? ktime_get_ts64+0x86/0x230
[   15.664205]  kunit_try_run_case+0x1a5/0x480
[   15.664230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.664250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.664274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.664296]  ? __kthread_parkme+0x82/0x180
[   15.664317]  ? preempt_count_sub+0x50/0x80
[   15.664341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.664363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.664385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.664407]  kthread+0x337/0x6f0
[   15.664424]  ? trace_preempt_on+0x20/0xc0
[   15.664447]  ? __pfx_kthread+0x10/0x10
[   15.664465]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.664485]  ? calculate_sigpending+0x7b/0xa0
[   15.664506]  ? __pfx_kthread+0x10/0x10
[   15.664527]  ret_from_fork+0x41/0x80
[   15.664798]  ? __pfx_kthread+0x10/0x10
[   15.664860]  ret_from_fork_asm+0x1a/0x30
[   15.664925]  </TASK>
[   15.664952] 
[   15.676703] Allocated by task 285:
[   15.677273]  kasan_save_stack+0x45/0x70
[   15.677542]  kasan_save_track+0x18/0x40
[   15.677739]  kasan_save_alloc_info+0x3b/0x50
[   15.678044]  __kasan_kmalloc+0xb7/0xc0
[   15.678275]  __kmalloc_cache_noprof+0x189/0x420
[   15.678526]  kasan_atomics+0x95/0x310
[   15.679157]  kunit_try_run_case+0x1a5/0x480
[   15.679340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.680002]  kthread+0x337/0x6f0
[   15.680370]  ret_from_fork+0x41/0x80
[   15.680597]  ret_from_fork_asm+0x1a/0x30
[   15.681010] 
[   15.681191] The buggy address belongs to the object at ffff8881029ef680
[   15.681191]  which belongs to the cache kmalloc-64 of size 64
[   15.682071] The buggy address is located 0 bytes to the right of
[   15.682071]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.682853] 
[   15.682968] The buggy address belongs to the physical page:
[   15.683164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.683839] flags: 0x200000000000000(node=0|zone=2)
[   15.684061] page_type: f5(slab)
[   15.684245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.684562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.684867] page dumped because: kasan: bad access detected
[   15.685095] 
[   15.685195] Memory state around the buggy address:
[   15.685401]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.685753]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686006] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.686238]                                      ^
[   15.686466]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.686901]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687136] ==================================================================
[   16.052747] ==================================================================
[   16.053319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.053732] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.054243] 
[   16.054495] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.054601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.054644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.054688] Call Trace:
[   16.054738]  <TASK>
[   16.054782]  dump_stack_lvl+0x73/0xb0
[   16.054869]  print_report+0xd1/0x650
[   16.054922]  ? __virt_addr_valid+0x1db/0x2d0
[   16.054967]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.055013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.055059]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.055101]  kasan_report+0x141/0x180
[   16.055138]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.055182]  kasan_check_range+0x10c/0x1c0
[   16.055224]  __kasan_check_write+0x18/0x20
[   16.055261]  kasan_atomics_helper+0x1d7a/0x5450
[   16.055316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.055376]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.055418]  ? kasan_atomics+0x152/0x310
[   16.055466]  kasan_atomics+0x1dc/0x310
[   16.055514]  ? __pfx_kasan_atomics+0x10/0x10
[   16.055582]  ? __pfx_read_tsc+0x10/0x10
[   16.055640]  ? ktime_get_ts64+0x86/0x230
[   16.055690]  kunit_try_run_case+0x1a5/0x480
[   16.055739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.055779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.055829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.055870]  ? __kthread_parkme+0x82/0x180
[   16.055911]  ? preempt_count_sub+0x50/0x80
[   16.055960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.056005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.056050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.056089]  kthread+0x337/0x6f0
[   16.056118]  ? trace_preempt_on+0x20/0xc0
[   16.056161]  ? __pfx_kthread+0x10/0x10
[   16.056199]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.056243]  ? calculate_sigpending+0x7b/0xa0
[   16.056287]  ? __pfx_kthread+0x10/0x10
[   16.056326]  ret_from_fork+0x41/0x80
[   16.056368]  ? __pfx_kthread+0x10/0x10
[   16.056407]  ret_from_fork_asm+0x1a/0x30
[   16.056465]  </TASK>
[   16.056483] 
[   16.065023] Allocated by task 285:
[   16.065361]  kasan_save_stack+0x45/0x70
[   16.065774]  kasan_save_track+0x18/0x40
[   16.065990]  kasan_save_alloc_info+0x3b/0x50
[   16.066266]  __kasan_kmalloc+0xb7/0xc0
[   16.066501]  __kmalloc_cache_noprof+0x189/0x420
[   16.066803]  kasan_atomics+0x95/0x310
[   16.066963]  kunit_try_run_case+0x1a5/0x480
[   16.067142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.067397]  kthread+0x337/0x6f0
[   16.067656]  ret_from_fork+0x41/0x80
[   16.068004]  ret_from_fork_asm+0x1a/0x30
[   16.068400] 
[   16.068593] The buggy address belongs to the object at ffff8881029ef680
[   16.068593]  which belongs to the cache kmalloc-64 of size 64
[   16.069010] The buggy address is located 0 bytes to the right of
[   16.069010]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.069537] 
[   16.069717] The buggy address belongs to the physical page:
[   16.070150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.070412] flags: 0x200000000000000(node=0|zone=2)
[   16.070679] page_type: f5(slab)
[   16.070968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.071561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.071748] page dumped because: kasan: bad access detected
[   16.071882] 
[   16.071982] Memory state around the buggy address:
[   16.072318]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.072796]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.073136] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.073447]                                      ^
[   16.073892]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.074190]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.074437] ==================================================================
[   16.181781] ==================================================================
[   16.182096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.183180] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.184485] 
[   16.184894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.185005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.185029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.185077] Call Trace:
[   16.185123]  <TASK>
[   16.185162]  dump_stack_lvl+0x73/0xb0
[   16.185229]  print_report+0xd1/0x650
[   16.185276]  ? __virt_addr_valid+0x1db/0x2d0
[   16.185308]  ? kasan_atomics_helper+0x2006/0x5450
[   16.185330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.185352]  ? kasan_atomics_helper+0x2006/0x5450
[   16.185373]  kasan_report+0x141/0x180
[   16.185395]  ? kasan_atomics_helper+0x2006/0x5450
[   16.185421]  kasan_check_range+0x10c/0x1c0
[   16.185448]  __kasan_check_write+0x18/0x20
[   16.185479]  kasan_atomics_helper+0x2006/0x5450
[   16.185501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.185523]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.185568]  ? kasan_atomics+0x152/0x310
[   16.185592]  kasan_atomics+0x1dc/0x310
[   16.185610]  ? __pfx_kasan_atomics+0x10/0x10
[   16.185649]  ? __pfx_read_tsc+0x10/0x10
[   16.185671]  ? ktime_get_ts64+0x86/0x230
[   16.185696]  kunit_try_run_case+0x1a5/0x480
[   16.185722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.185765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.185788]  ? __kthread_parkme+0x82/0x180
[   16.185810]  ? preempt_count_sub+0x50/0x80
[   16.185834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.185878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.185900]  kthread+0x337/0x6f0
[   16.185918]  ? trace_preempt_on+0x20/0xc0
[   16.185951]  ? __pfx_kthread+0x10/0x10
[   16.185975]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.185997]  ? calculate_sigpending+0x7b/0xa0
[   16.186020]  ? __pfx_kthread+0x10/0x10
[   16.186039]  ret_from_fork+0x41/0x80
[   16.186061]  ? __pfx_kthread+0x10/0x10
[   16.186080]  ret_from_fork_asm+0x1a/0x30
[   16.186112]  </TASK>
[   16.186126] 
[   16.194144] Allocated by task 285:
[   16.194481]  kasan_save_stack+0x45/0x70
[   16.194839]  kasan_save_track+0x18/0x40
[   16.195055]  kasan_save_alloc_info+0x3b/0x50
[   16.195236]  __kasan_kmalloc+0xb7/0xc0
[   16.195512]  __kmalloc_cache_noprof+0x189/0x420
[   16.195826]  kasan_atomics+0x95/0x310
[   16.196095]  kunit_try_run_case+0x1a5/0x480
[   16.196331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.196566]  kthread+0x337/0x6f0
[   16.196830]  ret_from_fork+0x41/0x80
[   16.197024]  ret_from_fork_asm+0x1a/0x30
[   16.197231] 
[   16.197376] The buggy address belongs to the object at ffff8881029ef680
[   16.197376]  which belongs to the cache kmalloc-64 of size 64
[   16.198019] The buggy address is located 0 bytes to the right of
[   16.198019]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.198432] 
[   16.198603] The buggy address belongs to the physical page:
[   16.198959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.199294] flags: 0x200000000000000(node=0|zone=2)
[   16.199550] page_type: f5(slab)
[   16.199819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.200076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.200327] page dumped because: kasan: bad access detected
[   16.200519] 
[   16.200693] Memory state around the buggy address:
[   16.201014]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201454]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201948] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.202615]                                      ^
[   16.202967]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203420]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203996] ==================================================================
[   15.900607] ==================================================================
[   15.900936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.901506] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.901862] 
[   15.902076] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.902176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.902202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.902242] Call Trace:
[   15.902289]  <TASK>
[   15.902331]  dump_stack_lvl+0x73/0xb0
[   15.902375]  print_report+0xd1/0x650
[   15.902400]  ? __virt_addr_valid+0x1db/0x2d0
[   15.902431]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.902452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.902479]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.902516]  kasan_report+0x141/0x180
[   15.902596]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.902658]  kasan_check_range+0x10c/0x1c0
[   15.902699]  __kasan_check_write+0x18/0x20
[   15.902735]  kasan_atomics_helper+0x19e3/0x5450
[   15.902778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.902824]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.902863]  ? kasan_atomics+0x152/0x310
[   15.902911]  kasan_atomics+0x1dc/0x310
[   15.902952]  ? __pfx_kasan_atomics+0x10/0x10
[   15.902999]  ? __pfx_read_tsc+0x10/0x10
[   15.903036]  ? ktime_get_ts64+0x86/0x230
[   15.903082]  kunit_try_run_case+0x1a5/0x480
[   15.903130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.903221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.903270]  ? __kthread_parkme+0x82/0x180
[   15.903312]  ? preempt_count_sub+0x50/0x80
[   15.903365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.903451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.903474]  kthread+0x337/0x6f0
[   15.903493]  ? trace_preempt_on+0x20/0xc0
[   15.903516]  ? __pfx_kthread+0x10/0x10
[   15.903533]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.903577]  ? calculate_sigpending+0x7b/0xa0
[   15.903599]  ? __pfx_kthread+0x10/0x10
[   15.903617]  ret_from_fork+0x41/0x80
[   15.903655]  ? __pfx_kthread+0x10/0x10
[   15.903674]  ret_from_fork_asm+0x1a/0x30
[   15.903705]  </TASK>
[   15.903719] 
[   15.911938] Allocated by task 285:
[   15.912150]  kasan_save_stack+0x45/0x70
[   15.912370]  kasan_save_track+0x18/0x40
[   15.912702]  kasan_save_alloc_info+0x3b/0x50
[   15.913002]  __kasan_kmalloc+0xb7/0xc0
[   15.913289]  __kmalloc_cache_noprof+0x189/0x420
[   15.913650]  kasan_atomics+0x95/0x310
[   15.913972]  kunit_try_run_case+0x1a5/0x480
[   15.914279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.914595]  kthread+0x337/0x6f0
[   15.914853]  ret_from_fork+0x41/0x80
[   15.915106]  ret_from_fork_asm+0x1a/0x30
[   15.915378] 
[   15.915488] The buggy address belongs to the object at ffff8881029ef680
[   15.915488]  which belongs to the cache kmalloc-64 of size 64
[   15.915879] The buggy address is located 0 bytes to the right of
[   15.915879]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.916266] 
[   15.916379] The buggy address belongs to the physical page:
[   15.916631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.916899] flags: 0x200000000000000(node=0|zone=2)
[   15.917256] page_type: f5(slab)
[   15.917573] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.918115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.918668] page dumped because: kasan: bad access detected
[   15.919040] 
[   15.919195] Memory state around the buggy address:
[   15.919518]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.920014]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.920479] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.920979]                                      ^
[   15.921325]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.921671]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.921917] ==================================================================
[   16.228099] ==================================================================
[   16.228438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.228745] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.228993] 
[   16.229133] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.229230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.229256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.229301] Call Trace:
[   16.229345]  <TASK>
[   16.229387]  dump_stack_lvl+0x73/0xb0
[   16.229440]  print_report+0xd1/0x650
[   16.229490]  ? __virt_addr_valid+0x1db/0x2d0
[   16.229535]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.229581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.229649]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.229689]  kasan_report+0x141/0x180
[   16.229726]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.229770]  kasan_check_range+0x10c/0x1c0
[   16.229809]  __kasan_check_write+0x18/0x20
[   16.229845]  kasan_atomics_helper+0x20c8/0x5450
[   16.229892]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.229936]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.229992]  ? kasan_atomics+0x152/0x310
[   16.230045]  kasan_atomics+0x1dc/0x310
[   16.230092]  ? __pfx_kasan_atomics+0x10/0x10
[   16.230138]  ? __pfx_read_tsc+0x10/0x10
[   16.230180]  ? ktime_get_ts64+0x86/0x230
[   16.230234]  kunit_try_run_case+0x1a5/0x480
[   16.230289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.230387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.230438]  ? __kthread_parkme+0x82/0x180
[   16.230487]  ? preempt_count_sub+0x50/0x80
[   16.230539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.230654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.230707]  kthread+0x337/0x6f0
[   16.230752]  ? trace_preempt_on+0x20/0xc0
[   16.230803]  ? __pfx_kthread+0x10/0x10
[   16.230846]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.230894]  ? calculate_sigpending+0x7b/0xa0
[   16.230944]  ? __pfx_kthread+0x10/0x10
[   16.230987]  ret_from_fork+0x41/0x80
[   16.231031]  ? __pfx_kthread+0x10/0x10
[   16.231074]  ret_from_fork_asm+0x1a/0x30
[   16.231142]  </TASK>
[   16.231171] 
[   16.239971] Allocated by task 285:
[   16.240192]  kasan_save_stack+0x45/0x70
[   16.240487]  kasan_save_track+0x18/0x40
[   16.240810]  kasan_save_alloc_info+0x3b/0x50
[   16.241119]  __kasan_kmalloc+0xb7/0xc0
[   16.241380]  __kmalloc_cache_noprof+0x189/0x420
[   16.241749]  kasan_atomics+0x95/0x310
[   16.242028]  kunit_try_run_case+0x1a5/0x480
[   16.242266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.242528]  kthread+0x337/0x6f0
[   16.242809]  ret_from_fork+0x41/0x80
[   16.243047]  ret_from_fork_asm+0x1a/0x30
[   16.243241] 
[   16.243346] The buggy address belongs to the object at ffff8881029ef680
[   16.243346]  which belongs to the cache kmalloc-64 of size 64
[   16.244063] The buggy address is located 0 bytes to the right of
[   16.244063]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.244491] 
[   16.244655] The buggy address belongs to the physical page:
[   16.245033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.245430] flags: 0x200000000000000(node=0|zone=2)
[   16.245873] page_type: f5(slab)
[   16.246041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.246304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.246558] page dumped because: kasan: bad access detected
[   16.246938] 
[   16.247096] Memory state around the buggy address:
[   16.247502]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.248000]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.248471] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.249004]                                      ^
[   16.249215]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.249518]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.249851] ==================================================================
[   15.156507] ==================================================================
[   15.156889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.157448] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.157897] 
[   15.158105] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.158230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158340] Call Trace:
[   15.158383]  <TASK>
[   15.158419]  dump_stack_lvl+0x73/0xb0
[   15.158468]  print_report+0xd1/0x650
[   15.158503]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158532]  ? kasan_atomics_helper+0xc70/0x5450
[   15.158582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.158613]  ? kasan_atomics_helper+0xc70/0x5450
[   15.158661]  kasan_report+0x141/0x180
[   15.158693]  ? kasan_atomics_helper+0xc70/0x5450
[   15.158729]  kasan_check_range+0x10c/0x1c0
[   15.158759]  __kasan_check_write+0x18/0x20
[   15.158788]  kasan_atomics_helper+0xc70/0x5450
[   15.158832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.158871]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.158924]  ? kasan_atomics+0x152/0x310
[   15.158974]  kasan_atomics+0x1dc/0x310
[   15.159018]  ? __pfx_kasan_atomics+0x10/0x10
[   15.159060]  ? __pfx_read_tsc+0x10/0x10
[   15.159100]  ? ktime_get_ts64+0x86/0x230
[   15.159150]  kunit_try_run_case+0x1a5/0x480
[   15.159201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.159305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.159354]  ? __kthread_parkme+0x82/0x180
[   15.159391]  ? preempt_count_sub+0x50/0x80
[   15.159430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159657]  kthread+0x337/0x6f0
[   15.159695]  ? trace_preempt_on+0x20/0xc0
[   15.159748]  ? __pfx_kthread+0x10/0x10
[   15.159784]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159831]  ? calculate_sigpending+0x7b/0xa0
[   15.159877]  ? __pfx_kthread+0x10/0x10
[   15.159911]  ret_from_fork+0x41/0x80
[   15.159934]  ? __pfx_kthread+0x10/0x10
[   15.159953]  ret_from_fork_asm+0x1a/0x30
[   15.159984]  </TASK>
[   15.159997] 
[   15.169251] Allocated by task 285:
[   15.169485]  kasan_save_stack+0x45/0x70
[   15.169872]  kasan_save_track+0x18/0x40
[   15.170247]  kasan_save_alloc_info+0x3b/0x50
[   15.170696]  __kasan_kmalloc+0xb7/0xc0
[   15.170987]  __kmalloc_cache_noprof+0x189/0x420
[   15.171334]  kasan_atomics+0x95/0x310
[   15.171666]  kunit_try_run_case+0x1a5/0x480
[   15.171951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.172356]  kthread+0x337/0x6f0
[   15.172617]  ret_from_fork+0x41/0x80
[   15.172908]  ret_from_fork_asm+0x1a/0x30
[   15.173258] 
[   15.173401] The buggy address belongs to the object at ffff8881029ef680
[   15.173401]  which belongs to the cache kmalloc-64 of size 64
[   15.174073] The buggy address is located 0 bytes to the right of
[   15.174073]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.174503] 
[   15.174664] The buggy address belongs to the physical page:
[   15.175121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.175869] flags: 0x200000000000000(node=0|zone=2)
[   15.176249] page_type: f5(slab)
[   15.176531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.177145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.177748] page dumped because: kasan: bad access detected
[   15.178001] 
[   15.178180] Memory state around the buggy address:
[   15.178490]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178753]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178991] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.179372]                                      ^
[   15.179727]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180198]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180762] ==================================================================
[   15.182576] ==================================================================
[   15.183027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.183649] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.184191] 
[   15.184442] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.184610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184701] Call Trace:
[   15.184772]  <TASK>
[   15.184826]  dump_stack_lvl+0x73/0xb0
[   15.184889]  print_report+0xd1/0x650
[   15.184918]  ? __virt_addr_valid+0x1db/0x2d0
[   15.184941]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.184962]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.184992]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.185028]  kasan_report+0x141/0x180
[   15.185069]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.185137]  __asan_report_load4_noabort+0x18/0x20
[   15.185180]  kasan_atomics_helper+0x4a84/0x5450
[   15.185227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.185270]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.185313]  ? kasan_atomics+0x152/0x310
[   15.185379]  kasan_atomics+0x1dc/0x310
[   15.185422]  ? __pfx_kasan_atomics+0x10/0x10
[   15.185461]  ? __pfx_read_tsc+0x10/0x10
[   15.185497]  ? ktime_get_ts64+0x86/0x230
[   15.185533]  kunit_try_run_case+0x1a5/0x480
[   15.185581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.185645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.185670]  ? __kthread_parkme+0x82/0x180
[   15.185693]  ? preempt_count_sub+0x50/0x80
[   15.185718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.185785]  kthread+0x337/0x6f0
[   15.185803]  ? trace_preempt_on+0x20/0xc0
[   15.185827]  ? __pfx_kthread+0x10/0x10
[   15.185845]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.185866]  ? calculate_sigpending+0x7b/0xa0
[   15.185888]  ? __pfx_kthread+0x10/0x10
[   15.185906]  ret_from_fork+0x41/0x80
[   15.185927]  ? __pfx_kthread+0x10/0x10
[   15.185955]  ret_from_fork_asm+0x1a/0x30
[   15.185989]  </TASK>
[   15.186005] 
[   15.195887] Allocated by task 285:
[   15.196371]  kasan_save_stack+0x45/0x70
[   15.197223]  kasan_save_track+0x18/0x40
[   15.197652]  kasan_save_alloc_info+0x3b/0x50
[   15.198010]  __kasan_kmalloc+0xb7/0xc0
[   15.198248]  __kmalloc_cache_noprof+0x189/0x420
[   15.198571]  kasan_atomics+0x95/0x310
[   15.198840]  kunit_try_run_case+0x1a5/0x480
[   15.199133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199338]  kthread+0x337/0x6f0
[   15.199791]  ret_from_fork+0x41/0x80
[   15.200056]  ret_from_fork_asm+0x1a/0x30
[   15.200340] 
[   15.200488] The buggy address belongs to the object at ffff8881029ef680
[   15.200488]  which belongs to the cache kmalloc-64 of size 64
[   15.201212] The buggy address is located 0 bytes to the right of
[   15.201212]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.202189] 
[   15.202320] The buggy address belongs to the physical page:
[   15.202668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.203022] flags: 0x200000000000000(node=0|zone=2)
[   15.203256] page_type: f5(slab)
[   15.203521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.203857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.204100] page dumped because: kasan: bad access detected
[   15.204288] 
[   15.204431] Memory state around the buggy address:
[   15.204868]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.205429]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.205996] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.206323]                                      ^
[   15.206737]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207043]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207280] ==================================================================
[   15.506105] ==================================================================
[   15.506923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.507402] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.507660] 
[   15.507880] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.507986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.508012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.508059] Call Trace:
[   15.508104]  <TASK>
[   15.508142]  dump_stack_lvl+0x73/0xb0
[   15.508199]  print_report+0xd1/0x650
[   15.508240]  ? __virt_addr_valid+0x1db/0x2d0
[   15.508297]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.508360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.508405]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.508462]  kasan_report+0x141/0x180
[   15.508511]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.508564]  __asan_report_load4_noabort+0x18/0x20
[   15.508601]  kasan_atomics_helper+0x49e8/0x5450
[   15.508659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.508709]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.508752]  ? kasan_atomics+0x152/0x310
[   15.508812]  kasan_atomics+0x1dc/0x310
[   15.508852]  ? __pfx_kasan_atomics+0x10/0x10
[   15.508885]  ? __pfx_read_tsc+0x10/0x10
[   15.508918]  ? ktime_get_ts64+0x86/0x230
[   15.508968]  kunit_try_run_case+0x1a5/0x480
[   15.509022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.509068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.509126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.509173]  ? __kthread_parkme+0x82/0x180
[   15.509223]  ? preempt_count_sub+0x50/0x80
[   15.509274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.509333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.509374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.509402]  kthread+0x337/0x6f0
[   15.509420]  ? trace_preempt_on+0x20/0xc0
[   15.509444]  ? __pfx_kthread+0x10/0x10
[   15.509462]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.509482]  ? calculate_sigpending+0x7b/0xa0
[   15.509503]  ? __pfx_kthread+0x10/0x10
[   15.509521]  ret_from_fork+0x41/0x80
[   15.509544]  ? __pfx_kthread+0x10/0x10
[   15.509572]  ret_from_fork_asm+0x1a/0x30
[   15.509602]  </TASK>
[   15.509615] 
[   15.518620] Allocated by task 285:
[   15.518988]  kasan_save_stack+0x45/0x70
[   15.519225]  kasan_save_track+0x18/0x40
[   15.519401]  kasan_save_alloc_info+0x3b/0x50
[   15.519573]  __kasan_kmalloc+0xb7/0xc0
[   15.519867]  __kmalloc_cache_noprof+0x189/0x420
[   15.520221]  kasan_atomics+0x95/0x310
[   15.520602]  kunit_try_run_case+0x1a5/0x480
[   15.520951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.521308]  kthread+0x337/0x6f0
[   15.521477]  ret_from_fork+0x41/0x80
[   15.522027]  ret_from_fork_asm+0x1a/0x30
[   15.523234] 
[   15.523341] The buggy address belongs to the object at ffff8881029ef680
[   15.523341]  which belongs to the cache kmalloc-64 of size 64
[   15.524007] The buggy address is located 0 bytes to the right of
[   15.524007]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.524635] 
[   15.524767] The buggy address belongs to the physical page:
[   15.525074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.525464] flags: 0x200000000000000(node=0|zone=2)
[   15.525680] page_type: f5(slab)
[   15.525854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.526185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.526791] page dumped because: kasan: bad access detected
[   15.527319] 
[   15.527421] Memory state around the buggy address:
[   15.527653]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.528117]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.528429] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.528901]                                      ^
[   15.529172]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.529408]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.529782] ==================================================================
[   15.374941] ==================================================================
[   15.375818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.376357] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.376779] 
[   15.376949] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.377049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.377074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.377116] Call Trace:
[   15.377181]  <TASK>
[   15.377220]  dump_stack_lvl+0x73/0xb0
[   15.377281]  print_report+0xd1/0x650
[   15.377331]  ? __virt_addr_valid+0x1db/0x2d0
[   15.377374]  ? kasan_atomics_helper+0x1079/0x5450
[   15.377435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.377483]  ? kasan_atomics_helper+0x1079/0x5450
[   15.377535]  kasan_report+0x141/0x180
[   15.377615]  ? kasan_atomics_helper+0x1079/0x5450
[   15.377686]  kasan_check_range+0x10c/0x1c0
[   15.377733]  __kasan_check_write+0x18/0x20
[   15.377769]  kasan_atomics_helper+0x1079/0x5450
[   15.377803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.377833]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.377862]  ? kasan_atomics+0x152/0x310
[   15.377893]  kasan_atomics+0x1dc/0x310
[   15.377918]  ? __pfx_kasan_atomics+0x10/0x10
[   15.377940]  ? __pfx_read_tsc+0x10/0x10
[   15.377971]  ? ktime_get_ts64+0x86/0x230
[   15.377998]  kunit_try_run_case+0x1a5/0x480
[   15.378025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.378049]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.378075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.378098]  ? __kthread_parkme+0x82/0x180
[   15.378121]  ? preempt_count_sub+0x50/0x80
[   15.378147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.378171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.378195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.378217]  kthread+0x337/0x6f0
[   15.378235]  ? trace_preempt_on+0x20/0xc0
[   15.378258]  ? __pfx_kthread+0x10/0x10
[   15.378277]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.378298]  ? calculate_sigpending+0x7b/0xa0
[   15.378319]  ? __pfx_kthread+0x10/0x10
[   15.378337]  ret_from_fork+0x41/0x80
[   15.378357]  ? __pfx_kthread+0x10/0x10
[   15.378374]  ret_from_fork_asm+0x1a/0x30
[   15.378404]  </TASK>
[   15.378419] 
[   15.387764] Allocated by task 285:
[   15.388171]  kasan_save_stack+0x45/0x70
[   15.388435]  kasan_save_track+0x18/0x40
[   15.388829]  kasan_save_alloc_info+0x3b/0x50
[   15.389015]  __kasan_kmalloc+0xb7/0xc0
[   15.389305]  __kmalloc_cache_noprof+0x189/0x420
[   15.389716]  kasan_atomics+0x95/0x310
[   15.390088]  kunit_try_run_case+0x1a5/0x480
[   15.390288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.390637]  kthread+0x337/0x6f0
[   15.390911]  ret_from_fork+0x41/0x80
[   15.391230]  ret_from_fork_asm+0x1a/0x30
[   15.391634] 
[   15.391798] The buggy address belongs to the object at ffff8881029ef680
[   15.391798]  which belongs to the cache kmalloc-64 of size 64
[   15.392255] The buggy address is located 0 bytes to the right of
[   15.392255]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.392460] 
[   15.392515] The buggy address belongs to the physical page:
[   15.392761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.393295] flags: 0x200000000000000(node=0|zone=2)
[   15.393601] page_type: f5(slab)
[   15.393796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.394141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.394537] page dumped because: kasan: bad access detected
[   15.395078] 
[   15.395511] Memory state around the buggy address:
[   15.395956]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.396455]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.396999] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.397433]                                      ^
[   15.398080]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398393]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.399216] ==================================================================
[   15.765573] ==================================================================
[   15.766163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.766745] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.769008] 
[   15.769235] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.769324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.769344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.769381] Call Trace:
[   15.769420]  <TASK>
[   15.769455]  dump_stack_lvl+0x73/0xb0
[   15.769506]  print_report+0xd1/0x650
[   15.769539]  ? __virt_addr_valid+0x1db/0x2d0
[   15.769572]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.769601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.769648]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.769685]  kasan_report+0x141/0x180
[   15.769724]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.769775]  kasan_check_range+0x10c/0x1c0
[   15.769811]  __kasan_check_write+0x18/0x20
[   15.769838]  kasan_atomics_helper+0x16e7/0x5450
[   15.769868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.769894]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.769915]  ? kasan_atomics+0x152/0x310
[   15.769939]  kasan_atomics+0x1dc/0x310
[   15.769986]  ? __pfx_kasan_atomics+0x10/0x10
[   15.770033]  ? __pfx_read_tsc+0x10/0x10
[   15.770085]  ? ktime_get_ts64+0x86/0x230
[   15.770134]  kunit_try_run_case+0x1a5/0x480
[   15.770183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.770259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.770282]  ? __kthread_parkme+0x82/0x180
[   15.770305]  ? preempt_count_sub+0x50/0x80
[   15.770330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.770353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.770376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.770399]  kthread+0x337/0x6f0
[   15.770416]  ? trace_preempt_on+0x20/0xc0
[   15.770440]  ? __pfx_kthread+0x10/0x10
[   15.770458]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.770479]  ? calculate_sigpending+0x7b/0xa0
[   15.770501]  ? __pfx_kthread+0x10/0x10
[   15.770519]  ret_from_fork+0x41/0x80
[   15.770568]  ? __pfx_kthread+0x10/0x10
[   15.770591]  ret_from_fork_asm+0x1a/0x30
[   15.770637]  </TASK>
[   15.770654] 
[   15.780295] Allocated by task 285:
[   15.780687]  kasan_save_stack+0x45/0x70
[   15.781103]  kasan_save_track+0x18/0x40
[   15.781338]  kasan_save_alloc_info+0x3b/0x50
[   15.781729]  __kasan_kmalloc+0xb7/0xc0
[   15.781983]  __kmalloc_cache_noprof+0x189/0x420
[   15.782266]  kasan_atomics+0x95/0x310
[   15.782655]  kunit_try_run_case+0x1a5/0x480
[   15.782960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783286]  kthread+0x337/0x6f0
[   15.783605]  ret_from_fork+0x41/0x80
[   15.783913]  ret_from_fork_asm+0x1a/0x30
[   15.784204] 
[   15.784336] The buggy address belongs to the object at ffff8881029ef680
[   15.784336]  which belongs to the cache kmalloc-64 of size 64
[   15.785057] The buggy address is located 0 bytes to the right of
[   15.785057]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.785513] 
[   15.785759] The buggy address belongs to the physical page:
[   15.786084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.786664] flags: 0x200000000000000(node=0|zone=2)
[   15.787040] page_type: f5(slab)
[   15.787217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.787469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.788046] page dumped because: kasan: bad access detected
[   15.788435] 
[   15.788680] Memory state around the buggy address:
[   15.789049]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.789583]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.789914] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.790432]                                      ^
[   15.790742]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.790998]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.791229] ==================================================================
[   14.590229] ==================================================================
[   14.591025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.591959] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.592295] 
[   14.592448] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.592599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.592641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.592800] Call Trace:
[   14.593007]  <TASK>
[   14.593057]  dump_stack_lvl+0x73/0xb0
[   14.593131]  print_report+0xd1/0x650
[   14.593158]  ? __virt_addr_valid+0x1db/0x2d0
[   14.593182]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.593203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.593226]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.593247]  kasan_report+0x141/0x180
[   14.593267]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.593535]  __asan_report_load4_noabort+0x18/0x20
[   14.593588]  kasan_atomics_helper+0x4bbc/0x5450
[   14.593612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.593653]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.593677]  ? kasan_atomics+0x152/0x310
[   14.593699]  kasan_atomics+0x1dc/0x310
[   14.593717]  ? __pfx_kasan_atomics+0x10/0x10
[   14.593737]  ? __pfx_read_tsc+0x10/0x10
[   14.593757]  ? ktime_get_ts64+0x86/0x230
[   14.593783]  kunit_try_run_case+0x1a5/0x480
[   14.593808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.593854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.593876]  ? __kthread_parkme+0x82/0x180
[   14.593899]  ? preempt_count_sub+0x50/0x80
[   14.593938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.593996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.594019]  kthread+0x337/0x6f0
[   14.594036]  ? trace_preempt_on+0x20/0xc0
[   14.594061]  ? __pfx_kthread+0x10/0x10
[   14.594079]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.594099]  ? calculate_sigpending+0x7b/0xa0
[   14.594121]  ? __pfx_kthread+0x10/0x10
[   14.594138]  ret_from_fork+0x41/0x80
[   14.594157]  ? __pfx_kthread+0x10/0x10
[   14.594175]  ret_from_fork_asm+0x1a/0x30
[   14.594206]  </TASK>
[   14.594219] 
[   14.608950] Allocated by task 285:
[   14.609235]  kasan_save_stack+0x45/0x70
[   14.609437]  kasan_save_track+0x18/0x40
[   14.609893]  kasan_save_alloc_info+0x3b/0x50
[   14.610161]  __kasan_kmalloc+0xb7/0xc0
[   14.610537]  __kmalloc_cache_noprof+0x189/0x420
[   14.610848]  kasan_atomics+0x95/0x310
[   14.611177]  kunit_try_run_case+0x1a5/0x480
[   14.611439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.611876]  kthread+0x337/0x6f0
[   14.612159]  ret_from_fork+0x41/0x80
[   14.612341]  ret_from_fork_asm+0x1a/0x30
[   14.612962] 
[   14.613098] The buggy address belongs to the object at ffff8881029ef680
[   14.613098]  which belongs to the cache kmalloc-64 of size 64
[   14.614275] The buggy address is located 0 bytes to the right of
[   14.614275]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.615725] 
[   14.615850] The buggy address belongs to the physical page:
[   14.616081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.616499] flags: 0x200000000000000(node=0|zone=2)
[   14.616940] page_type: f5(slab)
[   14.617182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.617489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.618021] page dumped because: kasan: bad access detected
[   14.618218] 
[   14.619004] Memory state around the buggy address:
[   14.619511]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.619893]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.620182] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.620610]                                      ^
[   14.621209]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622024]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622406] ==================================================================
[   16.309049] ==================================================================
[   16.309756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.310790] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.311228] 
[   16.311469] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.311598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.311644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.311692] Call Trace:
[   16.311737]  <TASK>
[   16.311780]  dump_stack_lvl+0x73/0xb0
[   16.311837]  print_report+0xd1/0x650
[   16.311879]  ? __virt_addr_valid+0x1db/0x2d0
[   16.311920]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.311990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.312054]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.312098]  kasan_report+0x141/0x180
[   16.312178]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.312252]  __asan_report_load8_noabort+0x18/0x20
[   16.312296]  kasan_atomics_helper+0x4fa5/0x5450
[   16.312346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.312370]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.312405]  ? kasan_atomics+0x152/0x310
[   16.312431]  kasan_atomics+0x1dc/0x310
[   16.312450]  ? __pfx_kasan_atomics+0x10/0x10
[   16.312472]  ? __pfx_read_tsc+0x10/0x10
[   16.312492]  ? ktime_get_ts64+0x86/0x230
[   16.312518]  kunit_try_run_case+0x1a5/0x480
[   16.312547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.312602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.312642]  ? __kthread_parkme+0x82/0x180
[   16.312667]  ? preempt_count_sub+0x50/0x80
[   16.312692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.312739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.312761]  kthread+0x337/0x6f0
[   16.312778]  ? trace_preempt_on+0x20/0xc0
[   16.312801]  ? __pfx_kthread+0x10/0x10
[   16.312819]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.312840]  ? calculate_sigpending+0x7b/0xa0
[   16.312861]  ? __pfx_kthread+0x10/0x10
[   16.312879]  ret_from_fork+0x41/0x80
[   16.312898]  ? __pfx_kthread+0x10/0x10
[   16.312916]  ret_from_fork_asm+0x1a/0x30
[   16.312946]  </TASK>
[   16.312961] 
[   16.322039] Allocated by task 285:
[   16.322271]  kasan_save_stack+0x45/0x70
[   16.322489]  kasan_save_track+0x18/0x40
[   16.322885]  kasan_save_alloc_info+0x3b/0x50
[   16.323229]  __kasan_kmalloc+0xb7/0xc0
[   16.323533]  __kmalloc_cache_noprof+0x189/0x420
[   16.323891]  kasan_atomics+0x95/0x310
[   16.324140]  kunit_try_run_case+0x1a5/0x480
[   16.324328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.324698]  kthread+0x337/0x6f0
[   16.324983]  ret_from_fork+0x41/0x80
[   16.325294]  ret_from_fork_asm+0x1a/0x30
[   16.325570] 
[   16.325737] The buggy address belongs to the object at ffff8881029ef680
[   16.325737]  which belongs to the cache kmalloc-64 of size 64
[   16.326483] The buggy address is located 0 bytes to the right of
[   16.326483]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.326952] 
[   16.327093] The buggy address belongs to the physical page:
[   16.327333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.327649] flags: 0x200000000000000(node=0|zone=2)
[   16.327888] page_type: f5(slab)
[   16.328076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.328580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.329081] page dumped because: kasan: bad access detected
[   16.329475] 
[   16.329656] Memory state around the buggy address:
[   16.330033]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.330699]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331109] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.331342]                                      ^
[   16.331526]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.331997]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.332474] ==================================================================
[   14.650404] ==================================================================
[   14.651006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.651550] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.653524] 
[   14.654072] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.654156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.654170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.654195] Call Trace:
[   14.654219]  <TASK>
[   14.654244]  dump_stack_lvl+0x73/0xb0
[   14.654289]  print_report+0xd1/0x650
[   14.654363]  ? __virt_addr_valid+0x1db/0x2d0
[   14.654400]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.654425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.654447]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.654469]  kasan_report+0x141/0x180
[   14.654491]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.654704]  __asan_report_load4_noabort+0x18/0x20
[   14.654731]  kasan_atomics_helper+0x4b88/0x5450
[   14.654777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.654801]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.654825]  ? kasan_atomics+0x152/0x310
[   14.654850]  kasan_atomics+0x1dc/0x310
[   14.654871]  ? __pfx_kasan_atomics+0x10/0x10
[   14.654892]  ? __pfx_read_tsc+0x10/0x10
[   14.654914]  ? ktime_get_ts64+0x86/0x230
[   14.654940]  kunit_try_run_case+0x1a5/0x480
[   14.654967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.654989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.655015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.655037]  ? __kthread_parkme+0x82/0x180
[   14.655059]  ? preempt_count_sub+0x50/0x80
[   14.655084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.655130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.655152]  kthread+0x337/0x6f0
[   14.655170]  ? trace_preempt_on+0x20/0xc0
[   14.655193]  ? __pfx_kthread+0x10/0x10
[   14.655211]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.655232]  ? calculate_sigpending+0x7b/0xa0
[   14.655254]  ? __pfx_kthread+0x10/0x10
[   14.655272]  ret_from_fork+0x41/0x80
[   14.655304]  ? __pfx_kthread+0x10/0x10
[   14.655335]  ret_from_fork_asm+0x1a/0x30
[   14.655377]  </TASK>
[   14.655393] 
[   14.667840] Allocated by task 285:
[   14.669015]  kasan_save_stack+0x45/0x70
[   14.669226]  kasan_save_track+0x18/0x40
[   14.669584]  kasan_save_alloc_info+0x3b/0x50
[   14.669845]  __kasan_kmalloc+0xb7/0xc0
[   14.670088]  __kmalloc_cache_noprof+0x189/0x420
[   14.670422]  kasan_atomics+0x95/0x310
[   14.670638]  kunit_try_run_case+0x1a5/0x480
[   14.671025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.671377]  kthread+0x337/0x6f0
[   14.671905]  ret_from_fork+0x41/0x80
[   14.672652]  ret_from_fork_asm+0x1a/0x30
[   14.673058] 
[   14.673225] The buggy address belongs to the object at ffff8881029ef680
[   14.673225]  which belongs to the cache kmalloc-64 of size 64
[   14.673812] The buggy address is located 0 bytes to the right of
[   14.673812]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.674844] 
[   14.674999] The buggy address belongs to the physical page:
[   14.675272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.675836] flags: 0x200000000000000(node=0|zone=2)
[   14.676182] page_type: f5(slab)
[   14.676468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.677124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.677738] page dumped because: kasan: bad access detected
[   14.678576] 
[   14.678696] Memory state around the buggy address:
[   14.679263]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.679539]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.679999] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.680291]                                      ^
[   14.680513]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.680898]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.681400] ==================================================================
[   15.558187] ==================================================================
[   15.559096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.559993] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.560724] 
[   15.560913] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.561006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.561030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.561066] Call Trace:
[   15.561108]  <TASK>
[   15.561147]  dump_stack_lvl+0x73/0xb0
[   15.561217]  print_report+0xd1/0x650
[   15.561243]  ? __virt_addr_valid+0x1db/0x2d0
[   15.561272]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.561294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.561321]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.561357]  kasan_report+0x141/0x180
[   15.561381]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.561407]  __asan_report_load4_noabort+0x18/0x20
[   15.561427]  kasan_atomics_helper+0x49ce/0x5450
[   15.561450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.561472]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.561494]  ? kasan_atomics+0x152/0x310
[   15.561517]  kasan_atomics+0x1dc/0x310
[   15.561546]  ? __pfx_kasan_atomics+0x10/0x10
[   15.561582]  ? __pfx_read_tsc+0x10/0x10
[   15.561613]  ? ktime_get_ts64+0x86/0x230
[   15.561675]  kunit_try_run_case+0x1a5/0x480
[   15.561723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.561769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.561817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.561846]  ? __kthread_parkme+0x82/0x180
[   15.561869]  ? preempt_count_sub+0x50/0x80
[   15.561895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.561918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.561942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.561978]  kthread+0x337/0x6f0
[   15.561997]  ? trace_preempt_on+0x20/0xc0
[   15.562023]  ? __pfx_kthread+0x10/0x10
[   15.562041]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.562064]  ? calculate_sigpending+0x7b/0xa0
[   15.562085]  ? __pfx_kthread+0x10/0x10
[   15.562105]  ret_from_fork+0x41/0x80
[   15.562125]  ? __pfx_kthread+0x10/0x10
[   15.562143]  ret_from_fork_asm+0x1a/0x30
[   15.562174]  </TASK>
[   15.562187] 
[   15.573462] Allocated by task 285:
[   15.573897]  kasan_save_stack+0x45/0x70
[   15.574357]  kasan_save_track+0x18/0x40
[   15.574615]  kasan_save_alloc_info+0x3b/0x50
[   15.575037]  __kasan_kmalloc+0xb7/0xc0
[   15.575353]  __kmalloc_cache_noprof+0x189/0x420
[   15.575664]  kasan_atomics+0x95/0x310
[   15.576008]  kunit_try_run_case+0x1a5/0x480
[   15.576228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.576523]  kthread+0x337/0x6f0
[   15.576828]  ret_from_fork+0x41/0x80
[   15.577021]  ret_from_fork_asm+0x1a/0x30
[   15.577367] 
[   15.577557] The buggy address belongs to the object at ffff8881029ef680
[   15.577557]  which belongs to the cache kmalloc-64 of size 64
[   15.578004] The buggy address is located 0 bytes to the right of
[   15.578004]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.578845] 
[   15.579029] The buggy address belongs to the physical page:
[   15.579273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.579546] flags: 0x200000000000000(node=0|zone=2)
[   15.579977] page_type: f5(slab)
[   15.580381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.581033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.581461] page dumped because: kasan: bad access detected
[   15.581890] 
[   15.582008] Memory state around the buggy address:
[   15.582204]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.582771]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.583286] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.583764]                                      ^
[   15.584053]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.584544]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.584883] ==================================================================
[   14.874804] ==================================================================
[   14.875866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.876256] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.877127] 
[   14.877290] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.877732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.877764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.877791] Call Trace:
[   14.877818]  <TASK>
[   14.877844]  dump_stack_lvl+0x73/0xb0
[   14.877885]  print_report+0xd1/0x650
[   14.877909]  ? __virt_addr_valid+0x1db/0x2d0
[   14.877933]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.877969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.877993]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.878016]  kasan_report+0x141/0x180
[   14.878039]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.878066]  kasan_check_range+0x10c/0x1c0
[   14.878086]  __kasan_check_write+0x18/0x20
[   14.878105]  kasan_atomics_helper+0x5fe/0x5450
[   14.878128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.878150]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.878171]  ? kasan_atomics+0x152/0x310
[   14.878193]  kasan_atomics+0x1dc/0x310
[   14.878212]  ? __pfx_kasan_atomics+0x10/0x10
[   14.878232]  ? __pfx_read_tsc+0x10/0x10
[   14.878251]  ? ktime_get_ts64+0x86/0x230
[   14.878275]  kunit_try_run_case+0x1a5/0x480
[   14.878311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.878381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.878408]  ? __kthread_parkme+0x82/0x180
[   14.878430]  ? preempt_count_sub+0x50/0x80
[   14.878454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.878498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.878520]  kthread+0x337/0x6f0
[   14.878537]  ? trace_preempt_on+0x20/0xc0
[   14.878567]  ? __pfx_kthread+0x10/0x10
[   14.878585]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.878605]  ? calculate_sigpending+0x7b/0xa0
[   14.878644]  ? __pfx_kthread+0x10/0x10
[   14.878665]  ret_from_fork+0x41/0x80
[   14.878684]  ? __pfx_kthread+0x10/0x10
[   14.878703]  ret_from_fork_asm+0x1a/0x30
[   14.878733]  </TASK>
[   14.878746] 
[   14.888395] Allocated by task 285:
[   14.888816]  kasan_save_stack+0x45/0x70
[   14.889235]  kasan_save_track+0x18/0x40
[   14.889589]  kasan_save_alloc_info+0x3b/0x50
[   14.889871]  __kasan_kmalloc+0xb7/0xc0
[   14.890118]  __kmalloc_cache_noprof+0x189/0x420
[   14.890414]  kasan_atomics+0x95/0x310
[   14.890846]  kunit_try_run_case+0x1a5/0x480
[   14.891200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.891650]  kthread+0x337/0x6f0
[   14.891886]  ret_from_fork+0x41/0x80
[   14.892054]  ret_from_fork_asm+0x1a/0x30
[   14.892205] 
[   14.892411] The buggy address belongs to the object at ffff8881029ef680
[   14.892411]  which belongs to the cache kmalloc-64 of size 64
[   14.893414] The buggy address is located 0 bytes to the right of
[   14.893414]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.894707] 
[   14.894948] The buggy address belongs to the physical page:
[   14.895388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.896201] flags: 0x200000000000000(node=0|zone=2)
[   14.896680] page_type: f5(slab)
[   14.896863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.897266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.897766] page dumped because: kasan: bad access detected
[   14.898140] 
[   14.898330] Memory state around the buggy address:
[   14.898670]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.899042]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.899222] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.899665]                                      ^
[   14.900055]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.900345]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.900877] ==================================================================
[   16.204980] ==================================================================
[   16.205438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.206020] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.206280] 
[   16.206475] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.206569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.206596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.206656] Call Trace:
[   16.206705]  <TASK>
[   16.206749]  dump_stack_lvl+0x73/0xb0
[   16.206810]  print_report+0xd1/0x650
[   16.206863]  ? __virt_addr_valid+0x1db/0x2d0
[   16.206912]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.206960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.207008]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.207055]  kasan_report+0x141/0x180
[   16.207102]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.207158]  __asan_report_load8_noabort+0x18/0x20
[   16.207204]  kasan_atomics_helper+0x4f98/0x5450
[   16.207252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.207287]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.207317]  ? kasan_atomics+0x152/0x310
[   16.207350]  kasan_atomics+0x1dc/0x310
[   16.207378]  ? __pfx_kasan_atomics+0x10/0x10
[   16.207409]  ? __pfx_read_tsc+0x10/0x10
[   16.207451]  ? ktime_get_ts64+0x86/0x230
[   16.207490]  kunit_try_run_case+0x1a5/0x480
[   16.207532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.207613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.207676]  ? __kthread_parkme+0x82/0x180
[   16.207723]  ? preempt_count_sub+0x50/0x80
[   16.207776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.207921]  kthread+0x337/0x6f0
[   16.207959]  ? trace_preempt_on+0x20/0xc0
[   16.208008]  ? __pfx_kthread+0x10/0x10
[   16.208042]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.208088]  ? calculate_sigpending+0x7b/0xa0
[   16.208133]  ? __pfx_kthread+0x10/0x10
[   16.208174]  ret_from_fork+0x41/0x80
[   16.208216]  ? __pfx_kthread+0x10/0x10
[   16.208258]  ret_from_fork_asm+0x1a/0x30
[   16.208325]  </TASK>
[   16.208352] 
[   16.216660] Allocated by task 285:
[   16.216991]  kasan_save_stack+0x45/0x70
[   16.217441]  kasan_save_track+0x18/0x40
[   16.217809]  kasan_save_alloc_info+0x3b/0x50
[   16.218145]  __kasan_kmalloc+0xb7/0xc0
[   16.218444]  __kmalloc_cache_noprof+0x189/0x420
[   16.218902]  kasan_atomics+0x95/0x310
[   16.219178]  kunit_try_run_case+0x1a5/0x480
[   16.219367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.219572]  kthread+0x337/0x6f0
[   16.219921]  ret_from_fork+0x41/0x80
[   16.220200]  ret_from_fork_asm+0x1a/0x30
[   16.220472] 
[   16.220651] The buggy address belongs to the object at ffff8881029ef680
[   16.220651]  which belongs to the cache kmalloc-64 of size 64
[   16.221110] The buggy address is located 0 bytes to the right of
[   16.221110]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.221718] 
[   16.221868] The buggy address belongs to the physical page:
[   16.222247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.222767] flags: 0x200000000000000(node=0|zone=2)
[   16.223116] page_type: f5(slab)
[   16.223289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.223539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.224056] page dumped because: kasan: bad access detected
[   16.224440] 
[   16.224600] Memory state around the buggy address:
[   16.224897]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225179]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225524] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.225810]                                      ^
[   16.226017]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.226490]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.227160] ==================================================================
[   15.973687] ==================================================================
[   15.974301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.974718] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.975022] 
[   15.975153] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.975227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.975243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.975276] Call Trace:
[   15.975311]  <TASK>
[   15.975343]  dump_stack_lvl+0x73/0xb0
[   15.975378]  print_report+0xd1/0x650
[   15.975407]  ? __virt_addr_valid+0x1db/0x2d0
[   15.975435]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.975463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.975491]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.975513]  kasan_report+0x141/0x180
[   15.975534]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.975576]  kasan_check_range+0x10c/0x1c0
[   15.975613]  __kasan_check_write+0x18/0x20
[   15.975660]  kasan_atomics_helper+0x1c18/0x5450
[   15.975695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.975731]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.975772]  ? kasan_atomics+0x152/0x310
[   15.975813]  kasan_atomics+0x1dc/0x310
[   15.975851]  ? __pfx_kasan_atomics+0x10/0x10
[   15.975894]  ? __pfx_read_tsc+0x10/0x10
[   15.975933]  ? ktime_get_ts64+0x86/0x230
[   15.975982]  kunit_try_run_case+0x1a5/0x480
[   15.976031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.976071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.976112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.976157]  ? __kthread_parkme+0x82/0x180
[   15.976201]  ? preempt_count_sub+0x50/0x80
[   15.976254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.976301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.976349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.976416]  kthread+0x337/0x6f0
[   15.976462]  ? trace_preempt_on+0x20/0xc0
[   15.976521]  ? __pfx_kthread+0x10/0x10
[   15.976572]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.976615]  ? calculate_sigpending+0x7b/0xa0
[   15.976675]  ? __pfx_kthread+0x10/0x10
[   15.976718]  ret_from_fork+0x41/0x80
[   15.976761]  ? __pfx_kthread+0x10/0x10
[   15.976802]  ret_from_fork_asm+0x1a/0x30
[   15.976864]  </TASK>
[   15.976892] 
[   15.987362] Allocated by task 285:
[   15.987870]  kasan_save_stack+0x45/0x70
[   15.988431]  kasan_save_track+0x18/0x40
[   15.988775]  kasan_save_alloc_info+0x3b/0x50
[   15.989101]  __kasan_kmalloc+0xb7/0xc0
[   15.989389]  __kmalloc_cache_noprof+0x189/0x420
[   15.989836]  kasan_atomics+0x95/0x310
[   15.990208]  kunit_try_run_case+0x1a5/0x480
[   15.990578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.990921]  kthread+0x337/0x6f0
[   15.991280]  ret_from_fork+0x41/0x80
[   15.991648]  ret_from_fork_asm+0x1a/0x30
[   15.992023] 
[   15.992171] The buggy address belongs to the object at ffff8881029ef680
[   15.992171]  which belongs to the cache kmalloc-64 of size 64
[   15.992980] The buggy address is located 0 bytes to the right of
[   15.992980]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.993582] 
[   15.993710] The buggy address belongs to the physical page:
[   15.993906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.994500] flags: 0x200000000000000(node=0|zone=2)
[   15.995055] page_type: f5(slab)
[   15.995580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.995978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.996328] page dumped because: kasan: bad access detected
[   15.996766] 
[   15.996969] Memory state around the buggy address:
[   15.997348]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.998018]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.998504] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.998830]                                      ^
[   15.999082]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.999364]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.999718] ==================================================================
[   16.360148] ==================================================================
[   16.361514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.362267] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.362549] 
[   16.362784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.362909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362992] Call Trace:
[   16.363045]  <TASK>
[   16.363095]  dump_stack_lvl+0x73/0xb0
[   16.363169]  print_report+0xd1/0x650
[   16.363228]  ? __virt_addr_valid+0x1db/0x2d0
[   16.363280]  ? kasan_atomics_helper+0x5115/0x5450
[   16.363318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.363355]  ? kasan_atomics_helper+0x5115/0x5450
[   16.363394]  kasan_report+0x141/0x180
[   16.363434]  ? kasan_atomics_helper+0x5115/0x5450
[   16.363489]  __asan_report_load8_noabort+0x18/0x20
[   16.363531]  kasan_atomics_helper+0x5115/0x5450
[   16.363575]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.363634]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.363683]  ? kasan_atomics+0x152/0x310
[   16.363731]  kasan_atomics+0x1dc/0x310
[   16.363775]  ? __pfx_kasan_atomics+0x10/0x10
[   16.363820]  ? __pfx_read_tsc+0x10/0x10
[   16.363862]  ? ktime_get_ts64+0x86/0x230
[   16.363915]  kunit_try_run_case+0x1a5/0x480
[   16.364011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.364107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.364155]  ? __kthread_parkme+0x82/0x180
[   16.364201]  ? preempt_count_sub+0x50/0x80
[   16.364254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.364300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.364342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.364379]  kthread+0x337/0x6f0
[   16.364407]  ? trace_preempt_on+0x20/0xc0
[   16.364447]  ? __pfx_kthread+0x10/0x10
[   16.364482]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.364547]  ? calculate_sigpending+0x7b/0xa0
[   16.364586]  ? __pfx_kthread+0x10/0x10
[   16.364646]  ret_from_fork+0x41/0x80
[   16.364705]  ? __pfx_kthread+0x10/0x10
[   16.364742]  ret_from_fork_asm+0x1a/0x30
[   16.364818]  </TASK>
[   16.364845] 
[   16.376539] Allocated by task 285:
[   16.376936]  kasan_save_stack+0x45/0x70
[   16.377336]  kasan_save_track+0x18/0x40
[   16.377531]  kasan_save_alloc_info+0x3b/0x50
[   16.377950]  __kasan_kmalloc+0xb7/0xc0
[   16.378174]  __kmalloc_cache_noprof+0x189/0x420
[   16.378494]  kasan_atomics+0x95/0x310
[   16.378784]  kunit_try_run_case+0x1a5/0x480
[   16.379003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.379344]  kthread+0x337/0x6f0
[   16.379599]  ret_from_fork+0x41/0x80
[   16.379854]  ret_from_fork_asm+0x1a/0x30
[   16.380140] 
[   16.380308] The buggy address belongs to the object at ffff8881029ef680
[   16.380308]  which belongs to the cache kmalloc-64 of size 64
[   16.380842] The buggy address is located 0 bytes to the right of
[   16.380842]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.381709] 
[   16.381835] The buggy address belongs to the physical page:
[   16.382200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.382814] flags: 0x200000000000000(node=0|zone=2)
[   16.383029] page_type: f5(slab)
[   16.383203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.383698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.384381] page dumped because: kasan: bad access detected
[   16.384661] 
[   16.384842] Memory state around the buggy address:
[   16.385159]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.385548]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.385919] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.386247]                                      ^
[   16.386557]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.386903]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.387289] ==================================================================
[   15.610533] ==================================================================
[   15.611493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.612246] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.612789] 
[   15.612994] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.613090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.613117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.613161] Call Trace:
[   15.613209]  <TASK>
[   15.613251]  dump_stack_lvl+0x73/0xb0
[   15.613327]  print_report+0xd1/0x650
[   15.613372]  ? __virt_addr_valid+0x1db/0x2d0
[   15.613412]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.613456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.613515]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.613576]  kasan_report+0x141/0x180
[   15.613633]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.613686]  __asan_report_load8_noabort+0x18/0x20
[   15.613727]  kasan_atomics_helper+0x4eae/0x5450
[   15.613776]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.613826]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.613872]  ? kasan_atomics+0x152/0x310
[   15.613971]  kasan_atomics+0x1dc/0x310
[   15.614019]  ? __pfx_kasan_atomics+0x10/0x10
[   15.614069]  ? __pfx_read_tsc+0x10/0x10
[   15.614113]  ? ktime_get_ts64+0x86/0x230
[   15.614167]  kunit_try_run_case+0x1a5/0x480
[   15.614221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.614268]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.614319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.614371]  ? __kthread_parkme+0x82/0x180
[   15.614419]  ? preempt_count_sub+0x50/0x80
[   15.614474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.614525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.614572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.614634]  kthread+0x337/0x6f0
[   15.614676]  ? trace_preempt_on+0x20/0xc0
[   15.614730]  ? __pfx_kthread+0x10/0x10
[   15.614773]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.614819]  ? calculate_sigpending+0x7b/0xa0
[   15.614866]  ? __pfx_kthread+0x10/0x10
[   15.614908]  ret_from_fork+0x41/0x80
[   15.614953]  ? __pfx_kthread+0x10/0x10
[   15.614995]  ret_from_fork_asm+0x1a/0x30
[   15.615060]  </TASK>
[   15.615087] 
[   15.624263] Allocated by task 285:
[   15.624619]  kasan_save_stack+0x45/0x70
[   15.624911]  kasan_save_track+0x18/0x40
[   15.625088]  kasan_save_alloc_info+0x3b/0x50
[   15.625267]  __kasan_kmalloc+0xb7/0xc0
[   15.625433]  __kmalloc_cache_noprof+0x189/0x420
[   15.625643]  kasan_atomics+0x95/0x310
[   15.625808]  kunit_try_run_case+0x1a5/0x480
[   15.625936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.626066]  kthread+0x337/0x6f0
[   15.626143]  ret_from_fork+0x41/0x80
[   15.626225]  ret_from_fork_asm+0x1a/0x30
[   15.626310] 
[   15.626359] The buggy address belongs to the object at ffff8881029ef680
[   15.626359]  which belongs to the cache kmalloc-64 of size 64
[   15.626549] The buggy address is located 0 bytes to the right of
[   15.626549]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.627267] 
[   15.627469] The buggy address belongs to the physical page:
[   15.628011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.628654] flags: 0x200000000000000(node=0|zone=2)
[   15.629071] page_type: f5(slab)
[   15.629366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.629975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.630567] page dumped because: kasan: bad access detected
[   15.631011] 
[   15.631196] Memory state around the buggy address:
[   15.631587]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.631913]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.632119] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.632608]                                      ^
[   15.632888]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633231]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633602] ==================================================================
[   14.840534] ==================================================================
[   14.841249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.841901] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.842359] 
[   14.842918] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.843005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843071] Call Trace:
[   14.843132]  <TASK>
[   14.843161]  dump_stack_lvl+0x73/0xb0
[   14.843204]  print_report+0xd1/0x650
[   14.843229]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843256]  ? kasan_atomics_helper+0x565/0x5450
[   14.843402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.843447]  ? kasan_atomics_helper+0x565/0x5450
[   14.843482]  kasan_report+0x141/0x180
[   14.843514]  ? kasan_atomics_helper+0x565/0x5450
[   14.843542]  kasan_check_range+0x10c/0x1c0
[   14.843571]  __kasan_check_write+0x18/0x20
[   14.843591]  kasan_atomics_helper+0x565/0x5450
[   14.843615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.843657]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.843680]  ? kasan_atomics+0x152/0x310
[   14.843703]  kasan_atomics+0x1dc/0x310
[   14.843723]  ? __pfx_kasan_atomics+0x10/0x10
[   14.843743]  ? __pfx_read_tsc+0x10/0x10
[   14.843764]  ? ktime_get_ts64+0x86/0x230
[   14.843789]  kunit_try_run_case+0x1a5/0x480
[   14.843815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.843861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.843883]  ? __kthread_parkme+0x82/0x180
[   14.843907]  ? preempt_count_sub+0x50/0x80
[   14.843946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844013]  kthread+0x337/0x6f0
[   14.844031]  ? trace_preempt_on+0x20/0xc0
[   14.844055]  ? __pfx_kthread+0x10/0x10
[   14.844073]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844095]  ? calculate_sigpending+0x7b/0xa0
[   14.844116]  ? __pfx_kthread+0x10/0x10
[   14.844134]  ret_from_fork+0x41/0x80
[   14.844154]  ? __pfx_kthread+0x10/0x10
[   14.844173]  ret_from_fork_asm+0x1a/0x30
[   14.844204]  </TASK>
[   14.844219] 
[   14.857031] Allocated by task 285:
[   14.857812]  kasan_save_stack+0x45/0x70
[   14.858209]  kasan_save_track+0x18/0x40
[   14.859270]  kasan_save_alloc_info+0x3b/0x50
[   14.860178]  __kasan_kmalloc+0xb7/0xc0
[   14.860398]  __kmalloc_cache_noprof+0x189/0x420
[   14.860718]  kasan_atomics+0x95/0x310
[   14.860960]  kunit_try_run_case+0x1a5/0x480
[   14.861250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.861929]  kthread+0x337/0x6f0
[   14.862240]  ret_from_fork+0x41/0x80
[   14.862619]  ret_from_fork_asm+0x1a/0x30
[   14.862848] 
[   14.862932] The buggy address belongs to the object at ffff8881029ef680
[   14.862932]  which belongs to the cache kmalloc-64 of size 64
[   14.863213] The buggy address is located 0 bytes to the right of
[   14.863213]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.864990] 
[   14.865150] The buggy address belongs to the physical page:
[   14.865373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.866144] flags: 0x200000000000000(node=0|zone=2)
[   14.866425] page_type: f5(slab)
[   14.866774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.867973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.868512] page dumped because: kasan: bad access detected
[   14.868883] 
[   14.869379] Memory state around the buggy address:
[   14.870197]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.870725]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.871441] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.871889]                                      ^
[   14.872107]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873245]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873927] ==================================================================
[   15.586222] ==================================================================
[   15.587025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.587330] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.587927] 
[   15.588136] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.588234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.588260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.588302] Call Trace:
[   15.588347]  <TASK>
[   15.588413]  dump_stack_lvl+0x73/0xb0
[   15.588471]  print_report+0xd1/0x650
[   15.588515]  ? __virt_addr_valid+0x1db/0x2d0
[   15.588567]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.588607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.588684]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.588730]  kasan_report+0x141/0x180
[   15.588773]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.588822]  kasan_check_range+0x10c/0x1c0
[   15.588860]  __kasan_check_read+0x15/0x20
[   15.588900]  kasan_atomics_helper+0x13b5/0x5450
[   15.588965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.589009]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.589053]  ? kasan_atomics+0x152/0x310
[   15.589100]  kasan_atomics+0x1dc/0x310
[   15.589155]  ? __pfx_kasan_atomics+0x10/0x10
[   15.589201]  ? __pfx_read_tsc+0x10/0x10
[   15.589239]  ? ktime_get_ts64+0x86/0x230
[   15.589282]  kunit_try_run_case+0x1a5/0x480
[   15.589316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.589346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.589377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.589407]  ? __kthread_parkme+0x82/0x180
[   15.589443]  ? preempt_count_sub+0x50/0x80
[   15.589485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.589530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.589570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.589647]  kthread+0x337/0x6f0
[   15.589684]  ? trace_preempt_on+0x20/0xc0
[   15.589730]  ? __pfx_kthread+0x10/0x10
[   15.589765]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.589809]  ? calculate_sigpending+0x7b/0xa0
[   15.589871]  ? __pfx_kthread+0x10/0x10
[   15.589909]  ret_from_fork+0x41/0x80
[   15.589960]  ? __pfx_kthread+0x10/0x10
[   15.589999]  ret_from_fork_asm+0x1a/0x30
[   15.590042]  </TASK>
[   15.590057] 
[   15.599298] Allocated by task 285:
[   15.599539]  kasan_save_stack+0x45/0x70
[   15.599854]  kasan_save_track+0x18/0x40
[   15.600163]  kasan_save_alloc_info+0x3b/0x50
[   15.600485]  __kasan_kmalloc+0xb7/0xc0
[   15.600902]  __kmalloc_cache_noprof+0x189/0x420
[   15.601240]  kasan_atomics+0x95/0x310
[   15.601453]  kunit_try_run_case+0x1a5/0x480
[   15.601647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.601856]  kthread+0x337/0x6f0
[   15.602022]  ret_from_fork+0x41/0x80
[   15.602196]  ret_from_fork_asm+0x1a/0x30
[   15.602419] 
[   15.602569] The buggy address belongs to the object at ffff8881029ef680
[   15.602569]  which belongs to the cache kmalloc-64 of size 64
[   15.603569] The buggy address is located 0 bytes to the right of
[   15.603569]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.604408] 
[   15.604573] The buggy address belongs to the physical page:
[   15.604964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.605355] flags: 0x200000000000000(node=0|zone=2)
[   15.605778] page_type: f5(slab)
[   15.605988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.606375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.606892] page dumped because: kasan: bad access detected
[   15.607117] 
[   15.607222] Memory state around the buggy address:
[   15.607417]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.607817]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.608300] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.608849]                                      ^
[   15.609124]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609443]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.609699] ==================================================================
[   14.927809] ==================================================================
[   14.928403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.929069] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.929642] 
[   14.929912] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.930045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.930073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930121] Call Trace:
[   14.930168]  <TASK>
[   14.930210]  dump_stack_lvl+0x73/0xb0
[   14.930274]  print_report+0xd1/0x650
[   14.930353]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930404]  ? kasan_atomics_helper+0x72f/0x5450
[   14.930450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930498]  ? kasan_atomics_helper+0x72f/0x5450
[   14.930568]  kasan_report+0x141/0x180
[   14.930620]  ? kasan_atomics_helper+0x72f/0x5450
[   14.930690]  kasan_check_range+0x10c/0x1c0
[   14.930727]  __kasan_check_write+0x18/0x20
[   14.930763]  kasan_atomics_helper+0x72f/0x5450
[   14.930807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.930847]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.930933]  ? kasan_atomics+0x152/0x310
[   14.930998]  kasan_atomics+0x1dc/0x310
[   14.931059]  ? __pfx_kasan_atomics+0x10/0x10
[   14.931098]  ? __pfx_read_tsc+0x10/0x10
[   14.931145]  ? ktime_get_ts64+0x86/0x230
[   14.931188]  kunit_try_run_case+0x1a5/0x480
[   14.931235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.931313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.931361]  ? __kthread_parkme+0x82/0x180
[   14.931401]  ? preempt_count_sub+0x50/0x80
[   14.931446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.931604]  kthread+0x337/0x6f0
[   14.931657]  ? trace_preempt_on+0x20/0xc0
[   14.931704]  ? __pfx_kthread+0x10/0x10
[   14.931744]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.931787]  ? calculate_sigpending+0x7b/0xa0
[   14.931831]  ? __pfx_kthread+0x10/0x10
[   14.931872]  ret_from_fork+0x41/0x80
[   14.931913]  ? __pfx_kthread+0x10/0x10
[   14.931954]  ret_from_fork_asm+0x1a/0x30
[   14.932017]  </TASK>
[   14.932044] 
[   14.941256] Allocated by task 285:
[   14.941656]  kasan_save_stack+0x45/0x70
[   14.942048]  kasan_save_track+0x18/0x40
[   14.942422]  kasan_save_alloc_info+0x3b/0x50
[   14.942885]  __kasan_kmalloc+0xb7/0xc0
[   14.943054]  __kmalloc_cache_noprof+0x189/0x420
[   14.943221]  kasan_atomics+0x95/0x310
[   14.943386]  kunit_try_run_case+0x1a5/0x480
[   14.943603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.944992]  kthread+0x337/0x6f0
[   14.945290]  ret_from_fork+0x41/0x80
[   14.947247]  ret_from_fork_asm+0x1a/0x30
[   14.947898] 
[   14.948115] The buggy address belongs to the object at ffff8881029ef680
[   14.948115]  which belongs to the cache kmalloc-64 of size 64
[   14.950141] The buggy address is located 0 bytes to the right of
[   14.950141]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.950926] 
[   14.951036] The buggy address belongs to the physical page:
[   14.951218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.951718] flags: 0x200000000000000(node=0|zone=2)
[   14.951937] page_type: f5(slab)
[   14.952193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.952770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.953195] page dumped because: kasan: bad access detected
[   14.953758] 
[   14.953997] Memory state around the buggy address:
[   14.954423]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.954980]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.955718] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.956169]                                      ^
[   14.956541]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957138]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957687] ==================================================================
[   15.871268] ==================================================================
[   15.871825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.872329] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.874795] 
[   15.874982] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.875837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.875890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.875927] Call Trace:
[   15.875980]  <TASK>
[   15.876016]  dump_stack_lvl+0x73/0xb0
[   15.876080]  print_report+0xd1/0x650
[   15.876105]  ? __virt_addr_valid+0x1db/0x2d0
[   15.876128]  ? kasan_atomics_helper+0x194a/0x5450
[   15.876148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.876171]  ? kasan_atomics_helper+0x194a/0x5450
[   15.876192]  kasan_report+0x141/0x180
[   15.876213]  ? kasan_atomics_helper+0x194a/0x5450
[   15.876238]  kasan_check_range+0x10c/0x1c0
[   15.876261]  __kasan_check_write+0x18/0x20
[   15.876280]  kasan_atomics_helper+0x194a/0x5450
[   15.876302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.876323]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.876344]  ? kasan_atomics+0x152/0x310
[   15.876368]  kasan_atomics+0x1dc/0x310
[   15.876387]  ? __pfx_kasan_atomics+0x10/0x10
[   15.876408]  ? __pfx_read_tsc+0x10/0x10
[   15.876427]  ? ktime_get_ts64+0x86/0x230
[   15.876452]  kunit_try_run_case+0x1a5/0x480
[   15.876475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.876496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.876520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.876547]  ? __kthread_parkme+0x82/0x180
[   15.876579]  ? preempt_count_sub+0x50/0x80
[   15.876617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.876669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.876703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.876736]  kthread+0x337/0x6f0
[   15.876766]  ? trace_preempt_on+0x20/0xc0
[   15.876807]  ? __pfx_kthread+0x10/0x10
[   15.876843]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.876894]  ? calculate_sigpending+0x7b/0xa0
[   15.876941]  ? __pfx_kthread+0x10/0x10
[   15.876979]  ret_from_fork+0x41/0x80
[   15.877020]  ? __pfx_kthread+0x10/0x10
[   15.877059]  ret_from_fork_asm+0x1a/0x30
[   15.877124]  </TASK>
[   15.877152] 
[   15.886349] Allocated by task 285:
[   15.886683]  kasan_save_stack+0x45/0x70
[   15.887068]  kasan_save_track+0x18/0x40
[   15.887433]  kasan_save_alloc_info+0x3b/0x50
[   15.887852]  __kasan_kmalloc+0xb7/0xc0
[   15.888204]  __kmalloc_cache_noprof+0x189/0x420
[   15.888580]  kasan_atomics+0x95/0x310
[   15.888936]  kunit_try_run_case+0x1a5/0x480
[   15.889296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.889804]  kthread+0x337/0x6f0
[   15.889955]  ret_from_fork+0x41/0x80
[   15.890240]  ret_from_fork_asm+0x1a/0x30
[   15.890685] 
[   15.891074] The buggy address belongs to the object at ffff8881029ef680
[   15.891074]  which belongs to the cache kmalloc-64 of size 64
[   15.891900] The buggy address is located 0 bytes to the right of
[   15.891900]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.892656] 
[   15.893104] The buggy address belongs to the physical page:
[   15.893406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.894010] flags: 0x200000000000000(node=0|zone=2)
[   15.894188] page_type: f5(slab)
[   15.894788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.895211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.895520] page dumped because: kasan: bad access detected
[   15.896035] 
[   15.896149] Memory state around the buggy address:
[   15.896503]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.896786]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.897361] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.898027]                                      ^
[   15.898353]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.898579]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.899022] ==================================================================
[   14.776698] ==================================================================
[   14.777259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.777822] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.778489] 
[   14.778770] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.778873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.778913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.778960] Call Trace:
[   14.779017]  <TASK>
[   14.779057]  dump_stack_lvl+0x73/0xb0
[   14.779117]  print_report+0xd1/0x650
[   14.779165]  ? __virt_addr_valid+0x1db/0x2d0
[   14.779209]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.779254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.779419]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.779460]  kasan_report+0x141/0x180
[   14.779487]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.779514]  kasan_check_range+0x10c/0x1c0
[   14.779536]  __kasan_check_write+0x18/0x20
[   14.779556]  kasan_atomics_helper+0x4a0/0x5450
[   14.779579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.779601]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.779656]  ? kasan_atomics+0x152/0x310
[   14.779682]  kasan_atomics+0x1dc/0x310
[   14.779702]  ? __pfx_kasan_atomics+0x10/0x10
[   14.779724]  ? __pfx_read_tsc+0x10/0x10
[   14.779745]  ? ktime_get_ts64+0x86/0x230
[   14.779770]  kunit_try_run_case+0x1a5/0x480
[   14.779797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.779843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.779866]  ? __kthread_parkme+0x82/0x180
[   14.779890]  ? preempt_count_sub+0x50/0x80
[   14.779915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.779938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.779960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.779985]  kthread+0x337/0x6f0
[   14.780002]  ? trace_preempt_on+0x20/0xc0
[   14.780026]  ? __pfx_kthread+0x10/0x10
[   14.780045]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.780066]  ? calculate_sigpending+0x7b/0xa0
[   14.780088]  ? __pfx_kthread+0x10/0x10
[   14.780107]  ret_from_fork+0x41/0x80
[   14.780127]  ? __pfx_kthread+0x10/0x10
[   14.780145]  ret_from_fork_asm+0x1a/0x30
[   14.780177]  </TASK>
[   14.780191] 
[   14.792881] Allocated by task 285:
[   14.793266]  kasan_save_stack+0x45/0x70
[   14.793799]  kasan_save_track+0x18/0x40
[   14.794164]  kasan_save_alloc_info+0x3b/0x50
[   14.794679]  __kasan_kmalloc+0xb7/0xc0
[   14.795024]  __kmalloc_cache_noprof+0x189/0x420
[   14.795905]  kasan_atomics+0x95/0x310
[   14.796279]  kunit_try_run_case+0x1a5/0x480
[   14.796571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.797024]  kthread+0x337/0x6f0
[   14.797334]  ret_from_fork+0x41/0x80
[   14.797648]  ret_from_fork_asm+0x1a/0x30
[   14.797807] 
[   14.797961] The buggy address belongs to the object at ffff8881029ef680
[   14.797961]  which belongs to the cache kmalloc-64 of size 64
[   14.798603] The buggy address is located 0 bytes to the right of
[   14.798603]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.799695] 
[   14.799990] The buggy address belongs to the physical page:
[   14.800293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.800956] flags: 0x200000000000000(node=0|zone=2)
[   14.801230] page_type: f5(slab)
[   14.801497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.802803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.803056] page dumped because: kasan: bad access detected
[   14.803442] 
[   14.804048] Memory state around the buggy address:
[   14.804327]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.804572]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.805020] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.805448]                                      ^
[   14.805935]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.806474]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.806749] ==================================================================
[   14.901987] ==================================================================
[   14.902476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.902881] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.903393] 
[   14.903656] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.903767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.903795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.903838] Call Trace:
[   14.903885]  <TASK>
[   14.903969]  dump_stack_lvl+0x73/0xb0
[   14.904038]  print_report+0xd1/0x650
[   14.904079]  ? __virt_addr_valid+0x1db/0x2d0
[   14.904124]  ? kasan_atomics_helper+0x697/0x5450
[   14.904156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.904187]  ? kasan_atomics_helper+0x697/0x5450
[   14.904219]  kasan_report+0x141/0x180
[   14.904298]  ? kasan_atomics_helper+0x697/0x5450
[   14.904344]  kasan_check_range+0x10c/0x1c0
[   14.904381]  __kasan_check_write+0x18/0x20
[   14.904419]  kasan_atomics_helper+0x697/0x5450
[   14.904496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.904534]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.904592]  ? kasan_atomics+0x152/0x310
[   14.904645]  kasan_atomics+0x1dc/0x310
[   14.904677]  ? __pfx_kasan_atomics+0x10/0x10
[   14.904708]  ? __pfx_read_tsc+0x10/0x10
[   14.904736]  ? ktime_get_ts64+0x86/0x230
[   14.904773]  kunit_try_run_case+0x1a5/0x480
[   14.904810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.904872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.904902]  ? __kthread_parkme+0x82/0x180
[   14.904932]  ? preempt_count_sub+0x50/0x80
[   14.904965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.904998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.905063]  kthread+0x337/0x6f0
[   14.905090]  ? trace_preempt_on+0x20/0xc0
[   14.905134]  ? __pfx_kthread+0x10/0x10
[   14.905169]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.905207]  ? calculate_sigpending+0x7b/0xa0
[   14.905248]  ? __pfx_kthread+0x10/0x10
[   14.905307]  ret_from_fork+0x41/0x80
[   14.905344]  ? __pfx_kthread+0x10/0x10
[   14.905377]  ret_from_fork_asm+0x1a/0x30
[   14.905434]  </TASK>
[   14.905460] 
[   14.916541] Allocated by task 285:
[   14.916916]  kasan_save_stack+0x45/0x70
[   14.917270]  kasan_save_track+0x18/0x40
[   14.917552]  kasan_save_alloc_info+0x3b/0x50
[   14.917980]  __kasan_kmalloc+0xb7/0xc0
[   14.918293]  __kmalloc_cache_noprof+0x189/0x420
[   14.918751]  kasan_atomics+0x95/0x310
[   14.918987]  kunit_try_run_case+0x1a5/0x480
[   14.919344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.919525]  kthread+0x337/0x6f0
[   14.919669]  ret_from_fork+0x41/0x80
[   14.919783]  ret_from_fork_asm+0x1a/0x30
[   14.919902] 
[   14.919974] The buggy address belongs to the object at ffff8881029ef680
[   14.919974]  which belongs to the cache kmalloc-64 of size 64
[   14.920443] The buggy address is located 0 bytes to the right of
[   14.920443]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.921330] 
[   14.921517] The buggy address belongs to the physical page:
[   14.921962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.922439] flags: 0x200000000000000(node=0|zone=2)
[   14.922941] page_type: f5(slab)
[   14.923187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.923725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.924153] page dumped because: kasan: bad access detected
[   14.924659] 
[   14.924822] Memory state around the buggy address:
[   14.925182]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.925585]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.926111] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.926589]                                      ^
[   14.926754]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.926920]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.927081] ==================================================================
[   15.348687] ==================================================================
[   15.349256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.349692] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.350308] 
[   15.350453] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.350565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.350587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.350636] Call Trace:
[   15.350677]  <TASK>
[   15.350712]  dump_stack_lvl+0x73/0xb0
[   15.350761]  print_report+0xd1/0x650
[   15.350797]  ? __virt_addr_valid+0x1db/0x2d0
[   15.350831]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.350882]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.350918]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.350950]  kasan_report+0x141/0x180
[   15.350982]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.351022]  __asan_report_load4_noabort+0x18/0x20
[   15.351056]  kasan_atomics_helper+0x4a36/0x5450
[   15.351088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.351121]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.351154]  ? kasan_atomics+0x152/0x310
[   15.351189]  kasan_atomics+0x1dc/0x310
[   15.351222]  ? __pfx_kasan_atomics+0x10/0x10
[   15.351257]  ? __pfx_read_tsc+0x10/0x10
[   15.351316]  ? ktime_get_ts64+0x86/0x230
[   15.351358]  kunit_try_run_case+0x1a5/0x480
[   15.351401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351442]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.351513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.351593]  ? __kthread_parkme+0x82/0x180
[   15.351650]  ? preempt_count_sub+0x50/0x80
[   15.351701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.351819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.351856]  kthread+0x337/0x6f0
[   15.351905]  ? trace_preempt_on+0x20/0xc0
[   15.351947]  ? __pfx_kthread+0x10/0x10
[   15.351990]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.352022]  ? calculate_sigpending+0x7b/0xa0
[   15.352270]  ? __pfx_kthread+0x10/0x10
[   15.352301]  ret_from_fork+0x41/0x80
[   15.352324]  ? __pfx_kthread+0x10/0x10
[   15.352343]  ret_from_fork_asm+0x1a/0x30
[   15.352375]  </TASK>
[   15.352389] 
[   15.362246] Allocated by task 285:
[   15.362657]  kasan_save_stack+0x45/0x70
[   15.363004]  kasan_save_track+0x18/0x40
[   15.363303]  kasan_save_alloc_info+0x3b/0x50
[   15.363729]  __kasan_kmalloc+0xb7/0xc0
[   15.364106]  __kmalloc_cache_noprof+0x189/0x420
[   15.364392]  kasan_atomics+0x95/0x310
[   15.364598]  kunit_try_run_case+0x1a5/0x480
[   15.364800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.365011]  kthread+0x337/0x6f0
[   15.365152]  ret_from_fork+0x41/0x80
[   15.365464]  ret_from_fork_asm+0x1a/0x30
[   15.365824] 
[   15.365995] The buggy address belongs to the object at ffff8881029ef680
[   15.365995]  which belongs to the cache kmalloc-64 of size 64
[   15.366897] The buggy address is located 0 bytes to the right of
[   15.366897]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.367733] 
[   15.367948] The buggy address belongs to the physical page:
[   15.368295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.368778] flags: 0x200000000000000(node=0|zone=2)
[   15.369108] page_type: f5(slab)
[   15.369443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.369954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.370338] page dumped because: kasan: bad access detected
[   15.370649] 
[   15.370861] Memory state around the buggy address:
[   15.371225]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371658]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371962] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.372410]                                      ^
[   15.372771]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373160]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373563] ==================================================================
[   15.531562] ==================================================================
[   15.532087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.532607] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.532997] 
[   15.533213] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.533312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.533337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.533378] Call Trace:
[   15.533433]  <TASK>
[   15.533474]  dump_stack_lvl+0x73/0xb0
[   15.533547]  print_report+0xd1/0x650
[   15.533587]  ? __virt_addr_valid+0x1db/0x2d0
[   15.533642]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.533692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.533738]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.533794]  kasan_report+0x141/0x180
[   15.533835]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.533884]  kasan_check_range+0x10c/0x1c0
[   15.533984]  __kasan_check_write+0x18/0x20
[   15.534028]  kasan_atomics_helper+0x12e6/0x5450
[   15.534095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.534139]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.534185]  ? kasan_atomics+0x152/0x310
[   15.534239]  kasan_atomics+0x1dc/0x310
[   15.534284]  ? __pfx_kasan_atomics+0x10/0x10
[   15.534330]  ? __pfx_read_tsc+0x10/0x10
[   15.534378]  ? ktime_get_ts64+0x86/0x230
[   15.534430]  kunit_try_run_case+0x1a5/0x480
[   15.534501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.534546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.534591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.534655]  ? __kthread_parkme+0x82/0x180
[   15.534705]  ? preempt_count_sub+0x50/0x80
[   15.534750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.534795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.534843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.534899]  kthread+0x337/0x6f0
[   15.534951]  ? trace_preempt_on+0x20/0xc0
[   15.534999]  ? __pfx_kthread+0x10/0x10
[   15.535038]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.535092]  ? calculate_sigpending+0x7b/0xa0
[   15.535140]  ? __pfx_kthread+0x10/0x10
[   15.535193]  ret_from_fork+0x41/0x80
[   15.535231]  ? __pfx_kthread+0x10/0x10
[   15.535261]  ret_from_fork_asm+0x1a/0x30
[   15.535293]  </TASK>
[   15.535308] 
[   15.544453] Allocated by task 285:
[   15.544803]  kasan_save_stack+0x45/0x70
[   15.545194]  kasan_save_track+0x18/0x40
[   15.545455]  kasan_save_alloc_info+0x3b/0x50
[   15.545917]  __kasan_kmalloc+0xb7/0xc0
[   15.546139]  __kmalloc_cache_noprof+0x189/0x420
[   15.546328]  kasan_atomics+0x95/0x310
[   15.546491]  kunit_try_run_case+0x1a5/0x480
[   15.546681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547068]  kthread+0x337/0x6f0
[   15.547330]  ret_from_fork+0x41/0x80
[   15.547616]  ret_from_fork_asm+0x1a/0x30
[   15.547948] 
[   15.548107] The buggy address belongs to the object at ffff8881029ef680
[   15.548107]  which belongs to the cache kmalloc-64 of size 64
[   15.548938] The buggy address is located 0 bytes to the right of
[   15.548938]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.549545] 
[   15.549745] The buggy address belongs to the physical page:
[   15.550036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.550428] flags: 0x200000000000000(node=0|zone=2)
[   15.550807] page_type: f5(slab)
[   15.551056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.551453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.553263] page dumped because: kasan: bad access detected
[   15.553719] 
[   15.553831] Memory state around the buggy address:
[   15.554081]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.554419]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.554768] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.555773]                                      ^
[   15.555957]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.556504]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.556825] ==================================================================
[   15.739247] ==================================================================
[   15.739912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.740505] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.741035] 
[   15.741283] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.741423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.741453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.741495] Call Trace:
[   15.741540]  <TASK>
[   15.741598]  dump_stack_lvl+0x73/0xb0
[   15.741673]  print_report+0xd1/0x650
[   15.741745]  ? __virt_addr_valid+0x1db/0x2d0
[   15.741788]  ? kasan_atomics_helper+0x164f/0x5450
[   15.741845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.741909]  ? kasan_atomics_helper+0x164f/0x5450
[   15.741976]  kasan_report+0x141/0x180
[   15.742027]  ? kasan_atomics_helper+0x164f/0x5450
[   15.742088]  kasan_check_range+0x10c/0x1c0
[   15.742136]  __kasan_check_write+0x18/0x20
[   15.742179]  kasan_atomics_helper+0x164f/0x5450
[   15.742228]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.742276]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.742323]  ? kasan_atomics+0x152/0x310
[   15.742372]  kasan_atomics+0x1dc/0x310
[   15.742414]  ? __pfx_kasan_atomics+0x10/0x10
[   15.742458]  ? __pfx_read_tsc+0x10/0x10
[   15.742500]  ? ktime_get_ts64+0x86/0x230
[   15.742550]  kunit_try_run_case+0x1a5/0x480
[   15.742601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.742656]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.742704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.742749]  ? __kthread_parkme+0x82/0x180
[   15.742797]  ? preempt_count_sub+0x50/0x80
[   15.742850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.742893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.742932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.742975]  kthread+0x337/0x6f0
[   15.743012]  ? trace_preempt_on+0x20/0xc0
[   15.743057]  ? __pfx_kthread+0x10/0x10
[   15.743097]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.743141]  ? calculate_sigpending+0x7b/0xa0
[   15.743186]  ? __pfx_kthread+0x10/0x10
[   15.743227]  ret_from_fork+0x41/0x80
[   15.743268]  ? __pfx_kthread+0x10/0x10
[   15.743307]  ret_from_fork_asm+0x1a/0x30
[   15.743372]  </TASK>
[   15.743401] 
[   15.753356] Allocated by task 285:
[   15.753808]  kasan_save_stack+0x45/0x70
[   15.754248]  kasan_save_track+0x18/0x40
[   15.754474]  kasan_save_alloc_info+0x3b/0x50
[   15.754877]  __kasan_kmalloc+0xb7/0xc0
[   15.755135]  __kmalloc_cache_noprof+0x189/0x420
[   15.755467]  kasan_atomics+0x95/0x310
[   15.755829]  kunit_try_run_case+0x1a5/0x480
[   15.756118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756310]  kthread+0x337/0x6f0
[   15.756466]  ret_from_fork+0x41/0x80
[   15.756637]  ret_from_fork_asm+0x1a/0x30
[   15.756815] 
[   15.756920] The buggy address belongs to the object at ffff8881029ef680
[   15.756920]  which belongs to the cache kmalloc-64 of size 64
[   15.757428] The buggy address is located 0 bytes to the right of
[   15.757428]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.758265] 
[   15.758439] The buggy address belongs to the physical page:
[   15.758999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.759534] flags: 0x200000000000000(node=0|zone=2)
[   15.759967] page_type: f5(slab)
[   15.760211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.761019] page dumped because: kasan: bad access detected
[   15.761263] 
[   15.761466] Memory state around the buggy address:
[   15.761923]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.762336]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.762803] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.763064]                                      ^
[   15.763253]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763485]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763972] ==================================================================
[   14.623820] ==================================================================
[   14.624207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.625513] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.625827] 
[   14.625975] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.626065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.626090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.626128] Call Trace:
[   14.626169]  <TASK>
[   14.626208]  dump_stack_lvl+0x73/0xb0
[   14.626272]  print_report+0xd1/0x650
[   14.626313]  ? __virt_addr_valid+0x1db/0x2d0
[   14.626346]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.626387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.626423]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.626460]  kasan_report+0x141/0x180
[   14.626496]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.626540]  __asan_report_store4_noabort+0x1b/0x30
[   14.626576]  kasan_atomics_helper+0x4ba2/0x5450
[   14.626618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.626674]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.626712]  ? kasan_atomics+0x152/0x310
[   14.626755]  kasan_atomics+0x1dc/0x310
[   14.626790]  ? __pfx_kasan_atomics+0x10/0x10
[   14.626833]  ? __pfx_read_tsc+0x10/0x10
[   14.626872]  ? ktime_get_ts64+0x86/0x230
[   14.626920]  kunit_try_run_case+0x1a5/0x480
[   14.626960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.626983]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.627006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.627029]  ? __kthread_parkme+0x82/0x180
[   14.627050]  ? preempt_count_sub+0x50/0x80
[   14.627075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.627140]  kthread+0x337/0x6f0
[   14.627157]  ? trace_preempt_on+0x20/0xc0
[   14.627180]  ? __pfx_kthread+0x10/0x10
[   14.627198]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.627218]  ? calculate_sigpending+0x7b/0xa0
[   14.627238]  ? __pfx_kthread+0x10/0x10
[   14.627255]  ret_from_fork+0x41/0x80
[   14.627274]  ? __pfx_kthread+0x10/0x10
[   14.627291]  ret_from_fork_asm+0x1a/0x30
[   14.627320]  </TASK>
[   14.627332] 
[   14.637586] Allocated by task 285:
[   14.637912]  kasan_save_stack+0x45/0x70
[   14.638150]  kasan_save_track+0x18/0x40
[   14.638423]  kasan_save_alloc_info+0x3b/0x50
[   14.638755]  __kasan_kmalloc+0xb7/0xc0
[   14.639041]  __kmalloc_cache_noprof+0x189/0x420
[   14.639361]  kasan_atomics+0x95/0x310
[   14.639618]  kunit_try_run_case+0x1a5/0x480
[   14.639922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.640130]  kthread+0x337/0x6f0
[   14.640283]  ret_from_fork+0x41/0x80
[   14.640547]  ret_from_fork_asm+0x1a/0x30
[   14.641678] 
[   14.641898] The buggy address belongs to the object at ffff8881029ef680
[   14.641898]  which belongs to the cache kmalloc-64 of size 64
[   14.642920] The buggy address is located 0 bytes to the right of
[   14.642920]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.643306] 
[   14.643417] The buggy address belongs to the physical page:
[   14.643613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.644149] flags: 0x200000000000000(node=0|zone=2)
[   14.644473] page_type: f5(slab)
[   14.644803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.645297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.645800] page dumped because: kasan: bad access detected
[   14.646062] 
[   14.646161] Memory state around the buggy address:
[   14.646345]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.646577]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.646847] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.647406]                                      ^
[   14.647880]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.648346]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.648799] ==================================================================
[   15.238450] ==================================================================
[   15.238872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.239131] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.239863] 
[   15.240012] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.240095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.240119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.240161] Call Trace:
[   15.240203]  <TASK>
[   15.240242]  dump_stack_lvl+0x73/0xb0
[   15.240300]  print_report+0xd1/0x650
[   15.240341]  ? __virt_addr_valid+0x1db/0x2d0
[   15.240382]  ? kasan_atomics_helper+0xde0/0x5450
[   15.240423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.240464]  ? kasan_atomics_helper+0xde0/0x5450
[   15.240507]  kasan_report+0x141/0x180
[   15.240943]  ? kasan_atomics_helper+0xde0/0x5450
[   15.240998]  kasan_check_range+0x10c/0x1c0
[   15.241022]  __kasan_check_write+0x18/0x20
[   15.241043]  kasan_atomics_helper+0xde0/0x5450
[   15.241065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.241087]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.241109]  ? kasan_atomics+0x152/0x310
[   15.241131]  kasan_atomics+0x1dc/0x310
[   15.241150]  ? __pfx_kasan_atomics+0x10/0x10
[   15.241171]  ? __pfx_read_tsc+0x10/0x10
[   15.241191]  ? ktime_get_ts64+0x86/0x230
[   15.241216]  kunit_try_run_case+0x1a5/0x480
[   15.241242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.241287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.241309]  ? __kthread_parkme+0x82/0x180
[   15.241331]  ? preempt_count_sub+0x50/0x80
[   15.241356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.241379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.241401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.241423]  kthread+0x337/0x6f0
[   15.241440]  ? trace_preempt_on+0x20/0xc0
[   15.241463]  ? __pfx_kthread+0x10/0x10
[   15.241481]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.241502]  ? calculate_sigpending+0x7b/0xa0
[   15.241523]  ? __pfx_kthread+0x10/0x10
[   15.241545]  ret_from_fork+0x41/0x80
[   15.241574]  ? __pfx_kthread+0x10/0x10
[   15.241592]  ret_from_fork_asm+0x1a/0x30
[   15.241637]  </TASK>
[   15.241656] 
[   15.253504] Allocated by task 285:
[   15.253857]  kasan_save_stack+0x45/0x70
[   15.254173]  kasan_save_track+0x18/0x40
[   15.254433]  kasan_save_alloc_info+0x3b/0x50
[   15.255079]  __kasan_kmalloc+0xb7/0xc0
[   15.255246]  __kmalloc_cache_noprof+0x189/0x420
[   15.255465]  kasan_atomics+0x95/0x310
[   15.256077]  kunit_try_run_case+0x1a5/0x480
[   15.256506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.256881]  kthread+0x337/0x6f0
[   15.257027]  ret_from_fork+0x41/0x80
[   15.257398]  ret_from_fork_asm+0x1a/0x30
[   15.257824] 
[   15.257971] The buggy address belongs to the object at ffff8881029ef680
[   15.257971]  which belongs to the cache kmalloc-64 of size 64
[   15.258558] The buggy address is located 0 bytes to the right of
[   15.258558]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.259335] 
[   15.259697] The buggy address belongs to the physical page:
[   15.260113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.260649] flags: 0x200000000000000(node=0|zone=2)
[   15.261059] page_type: f5(slab)
[   15.261299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.261634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.262214] page dumped because: kasan: bad access detected
[   15.262708] 
[   15.262927] Memory state around the buggy address:
[   15.263107]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263524]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.264059] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.264620]                                      ^
[   15.264982]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265410]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265885] ==================================================================
[   15.823720] ==================================================================
[   15.824161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.824671] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.825044] 
[   15.825239] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.825338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.825363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.825407] Call Trace:
[   15.825453]  <TASK>
[   15.825495]  dump_stack_lvl+0x73/0xb0
[   15.825570]  print_report+0xd1/0x650
[   15.825619]  ? __virt_addr_valid+0x1db/0x2d0
[   15.825674]  ? kasan_atomics_helper+0x1818/0x5450
[   15.825718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.825761]  ? kasan_atomics_helper+0x1818/0x5450
[   15.825798]  kasan_report+0x141/0x180
[   15.825842]  ? kasan_atomics_helper+0x1818/0x5450
[   15.825895]  kasan_check_range+0x10c/0x1c0
[   15.825940]  __kasan_check_write+0x18/0x20
[   15.825993]  kasan_atomics_helper+0x1818/0x5450
[   15.826035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.826088]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.826112]  ? kasan_atomics+0x152/0x310
[   15.826142]  kasan_atomics+0x1dc/0x310
[   15.826167]  ? __pfx_kasan_atomics+0x10/0x10
[   15.826188]  ? __pfx_read_tsc+0x10/0x10
[   15.826209]  ? ktime_get_ts64+0x86/0x230
[   15.826235]  kunit_try_run_case+0x1a5/0x480
[   15.826260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.826281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.826307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.826330]  ? __kthread_parkme+0x82/0x180
[   15.826352]  ? preempt_count_sub+0x50/0x80
[   15.826377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.826400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.826423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.826445]  kthread+0x337/0x6f0
[   15.826463]  ? trace_preempt_on+0x20/0xc0
[   15.826487]  ? __pfx_kthread+0x10/0x10
[   15.826506]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.826527]  ? calculate_sigpending+0x7b/0xa0
[   15.826567]  ? __pfx_kthread+0x10/0x10
[   15.826588]  ret_from_fork+0x41/0x80
[   15.826609]  ? __pfx_kthread+0x10/0x10
[   15.826646]  ret_from_fork_asm+0x1a/0x30
[   15.826681]  </TASK>
[   15.826695] 
[   15.836535] Allocated by task 285:
[   15.836938]  kasan_save_stack+0x45/0x70
[   15.837302]  kasan_save_track+0x18/0x40
[   15.837665]  kasan_save_alloc_info+0x3b/0x50
[   15.838057]  __kasan_kmalloc+0xb7/0xc0
[   15.838376]  __kmalloc_cache_noprof+0x189/0x420
[   15.838665]  kasan_atomics+0x95/0x310
[   15.838851]  kunit_try_run_case+0x1a5/0x480
[   15.839211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.839663]  kthread+0x337/0x6f0
[   15.839851]  ret_from_fork+0x41/0x80
[   15.840030]  ret_from_fork_asm+0x1a/0x30
[   15.840213] 
[   15.840337] The buggy address belongs to the object at ffff8881029ef680
[   15.840337]  which belongs to the cache kmalloc-64 of size 64
[   15.841024] The buggy address is located 0 bytes to the right of
[   15.841024]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.841504] 
[   15.841615] The buggy address belongs to the physical page:
[   15.842850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.843272] flags: 0x200000000000000(node=0|zone=2)
[   15.843586] page_type: f5(slab)
[   15.844026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.844482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.844747] page dumped because: kasan: bad access detected
[   15.845091] 
[   15.845282] Memory state around the buggy address:
[   15.845733]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846095]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846436] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.846879]                                      ^
[   15.847082]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.847357]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.847784] ==================================================================
[   15.848817] ==================================================================
[   15.849259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.849806] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.850079] 
[   15.850257] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.850353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850417] Call Trace:
[   15.850460]  <TASK>
[   15.850500]  dump_stack_lvl+0x73/0xb0
[   15.850593]  print_report+0xd1/0x650
[   15.850655]  ? __virt_addr_valid+0x1db/0x2d0
[   15.850695]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.850735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.850775]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.850819]  kasan_report+0x141/0x180
[   15.850865]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.850920]  kasan_check_range+0x10c/0x1c0
[   15.850960]  __kasan_check_write+0x18/0x20
[   15.850996]  kasan_atomics_helper+0x18b1/0x5450
[   15.851036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.851083]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.851130]  ? kasan_atomics+0x152/0x310
[   15.851178]  kasan_atomics+0x1dc/0x310
[   15.851222]  ? __pfx_kasan_atomics+0x10/0x10
[   15.851268]  ? __pfx_read_tsc+0x10/0x10
[   15.851311]  ? ktime_get_ts64+0x86/0x230
[   15.851363]  kunit_try_run_case+0x1a5/0x480
[   15.851413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851459]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.851507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.851552]  ? __kthread_parkme+0x82/0x180
[   15.851585]  ? preempt_count_sub+0x50/0x80
[   15.851611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851698]  kthread+0x337/0x6f0
[   15.851716]  ? trace_preempt_on+0x20/0xc0
[   15.851740]  ? __pfx_kthread+0x10/0x10
[   15.851759]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851779]  ? calculate_sigpending+0x7b/0xa0
[   15.851801]  ? __pfx_kthread+0x10/0x10
[   15.851820]  ret_from_fork+0x41/0x80
[   15.851840]  ? __pfx_kthread+0x10/0x10
[   15.851858]  ret_from_fork_asm+0x1a/0x30
[   15.851889]  </TASK>
[   15.851903] 
[   15.860716] Allocated by task 285:
[   15.861022]  kasan_save_stack+0x45/0x70
[   15.861245]  kasan_save_track+0x18/0x40
[   15.861418]  kasan_save_alloc_info+0x3b/0x50
[   15.861589]  __kasan_kmalloc+0xb7/0xc0
[   15.861790]  __kmalloc_cache_noprof+0x189/0x420
[   15.862117]  kasan_atomics+0x95/0x310
[   15.862411]  kunit_try_run_case+0x1a5/0x480
[   15.862860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.863257]  kthread+0x337/0x6f0
[   15.863509]  ret_from_fork+0x41/0x80
[   15.863815]  ret_from_fork_asm+0x1a/0x30
[   15.864079] 
[   15.864187] The buggy address belongs to the object at ffff8881029ef680
[   15.864187]  which belongs to the cache kmalloc-64 of size 64
[   15.864563] The buggy address is located 0 bytes to the right of
[   15.864563]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.865489] 
[   15.865677] The buggy address belongs to the physical page:
[   15.865935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.866262] flags: 0x200000000000000(node=0|zone=2)
[   15.866485] page_type: f5(slab)
[   15.866673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.866925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.867390] page dumped because: kasan: bad access detected
[   15.867721] 
[   15.867875] Memory state around the buggy address:
[   15.868220]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.868871]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.869326] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.869548]                                      ^
[   15.869882]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.870165]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.870407] ==================================================================
[   16.283902] ==================================================================
[   16.284246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.284851] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.285514] 
[   16.285794] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.285863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.285884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.285923] Call Trace:
[   16.285974]  <TASK>
[   16.286041]  dump_stack_lvl+0x73/0xb0
[   16.286107]  print_report+0xd1/0x650
[   16.286151]  ? __virt_addr_valid+0x1db/0x2d0
[   16.286194]  ? kasan_atomics_helper+0x218a/0x5450
[   16.286236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.286274]  ? kasan_atomics_helper+0x218a/0x5450
[   16.286298]  kasan_report+0x141/0x180
[   16.286321]  ? kasan_atomics_helper+0x218a/0x5450
[   16.286348]  kasan_check_range+0x10c/0x1c0
[   16.286369]  __kasan_check_write+0x18/0x20
[   16.286390]  kasan_atomics_helper+0x218a/0x5450
[   16.286415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.286438]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.286461]  ? kasan_atomics+0x152/0x310
[   16.286485]  kasan_atomics+0x1dc/0x310
[   16.286505]  ? __pfx_kasan_atomics+0x10/0x10
[   16.286527]  ? __pfx_read_tsc+0x10/0x10
[   16.286571]  ? ktime_get_ts64+0x86/0x230
[   16.286599]  kunit_try_run_case+0x1a5/0x480
[   16.286643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.286693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.286716]  ? __kthread_parkme+0x82/0x180
[   16.286739]  ? preempt_count_sub+0x50/0x80
[   16.286764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.286811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.286833]  kthread+0x337/0x6f0
[   16.286852]  ? trace_preempt_on+0x20/0xc0
[   16.286876]  ? __pfx_kthread+0x10/0x10
[   16.286895]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.286917]  ? calculate_sigpending+0x7b/0xa0
[   16.286939]  ? __pfx_kthread+0x10/0x10
[   16.286958]  ret_from_fork+0x41/0x80
[   16.286980]  ? __pfx_kthread+0x10/0x10
[   16.286998]  ret_from_fork_asm+0x1a/0x30
[   16.287029]  </TASK>
[   16.287043] 
[   16.295579] Allocated by task 285:
[   16.296022]  kasan_save_stack+0x45/0x70
[   16.296365]  kasan_save_track+0x18/0x40
[   16.296938]  kasan_save_alloc_info+0x3b/0x50
[   16.297291]  __kasan_kmalloc+0xb7/0xc0
[   16.298324]  __kmalloc_cache_noprof+0x189/0x420
[   16.298780]  kasan_atomics+0x95/0x310
[   16.299093]  kunit_try_run_case+0x1a5/0x480
[   16.299426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.299836]  kthread+0x337/0x6f0
[   16.300057]  ret_from_fork+0x41/0x80
[   16.300237]  ret_from_fork_asm+0x1a/0x30
[   16.300432] 
[   16.300559] The buggy address belongs to the object at ffff8881029ef680
[   16.300559]  which belongs to the cache kmalloc-64 of size 64
[   16.301587] The buggy address is located 0 bytes to the right of
[   16.301587]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.302471] 
[   16.302854] The buggy address belongs to the physical page:
[   16.303280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.303684] flags: 0x200000000000000(node=0|zone=2)
[   16.303993] page_type: f5(slab)
[   16.304274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.304547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.304971] page dumped because: kasan: bad access detected
[   16.305210] 
[   16.305357] Memory state around the buggy address:
[   16.305669]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.305934]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.306194] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.306437]                                      ^
[   16.306819]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.307384]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.307945] ==================================================================
[   15.453040] ==================================================================
[   15.454503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.454954] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.455317] 
[   15.455521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.455651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.455680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.455721] Call Trace:
[   15.455766]  <TASK>
[   15.455806]  dump_stack_lvl+0x73/0xb0
[   15.455870]  print_report+0xd1/0x650
[   15.455919]  ? __virt_addr_valid+0x1db/0x2d0
[   15.455976]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.456012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.456051]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.456093]  kasan_report+0x141/0x180
[   15.456134]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.456187]  __asan_report_load4_noabort+0x18/0x20
[   15.456228]  kasan_atomics_helper+0x4a02/0x5450
[   15.456278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.456322]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.456383]  ? kasan_atomics+0x152/0x310
[   15.456436]  kasan_atomics+0x1dc/0x310
[   15.456462]  ? __pfx_kasan_atomics+0x10/0x10
[   15.456485]  ? __pfx_read_tsc+0x10/0x10
[   15.456506]  ? ktime_get_ts64+0x86/0x230
[   15.456534]  kunit_try_run_case+0x1a5/0x480
[   15.456571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.456592]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.456617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.456657]  ? __kthread_parkme+0x82/0x180
[   15.456680]  ? preempt_count_sub+0x50/0x80
[   15.456704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.456727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.456749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.456771]  kthread+0x337/0x6f0
[   15.456788]  ? trace_preempt_on+0x20/0xc0
[   15.456811]  ? __pfx_kthread+0x10/0x10
[   15.456828]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.456849]  ? calculate_sigpending+0x7b/0xa0
[   15.456870]  ? __pfx_kthread+0x10/0x10
[   15.456888]  ret_from_fork+0x41/0x80
[   15.456907]  ? __pfx_kthread+0x10/0x10
[   15.456925]  ret_from_fork_asm+0x1a/0x30
[   15.456954]  </TASK>
[   15.456968] 
[   15.466876] Allocated by task 285:
[   15.467069]  kasan_save_stack+0x45/0x70
[   15.467407]  kasan_save_track+0x18/0x40
[   15.467770]  kasan_save_alloc_info+0x3b/0x50
[   15.467998]  __kasan_kmalloc+0xb7/0xc0
[   15.468284]  __kmalloc_cache_noprof+0x189/0x420
[   15.469720]  kasan_atomics+0x95/0x310
[   15.470213]  kunit_try_run_case+0x1a5/0x480
[   15.470345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.470454]  kthread+0x337/0x6f0
[   15.470530]  ret_from_fork+0x41/0x80
[   15.470693]  ret_from_fork_asm+0x1a/0x30
[   15.470861] 
[   15.471048] The buggy address belongs to the object at ffff8881029ef680
[   15.471048]  which belongs to the cache kmalloc-64 of size 64
[   15.472182] The buggy address is located 0 bytes to the right of
[   15.472182]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.472848] 
[   15.472967] The buggy address belongs to the physical page:
[   15.473481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.473852] flags: 0x200000000000000(node=0|zone=2)
[   15.474099] page_type: f5(slab)
[   15.474372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.474715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.474964] page dumped because: kasan: bad access detected
[   15.475408] 
[   15.475570] Memory state around the buggy address:
[   15.476229]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.476451]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.477495] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.477843]                                      ^
[   15.478190]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.478709]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.479073] ==================================================================
[   15.946730] ==================================================================
[   15.947246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.947748] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.948006] 
[   15.948148] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.948248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.948272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.948311] Call Trace:
[   15.948353]  <TASK>
[   15.948392]  dump_stack_lvl+0x73/0xb0
[   15.948449]  print_report+0xd1/0x650
[   15.948496]  ? __virt_addr_valid+0x1db/0x2d0
[   15.948568]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.948616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.948680]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.948730]  kasan_report+0x141/0x180
[   15.948774]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.948839]  kasan_check_range+0x10c/0x1c0
[   15.948871]  __kasan_check_write+0x18/0x20
[   15.948909]  kasan_atomics_helper+0x1b22/0x5450
[   15.948952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.948995]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.949028]  ? kasan_atomics+0x152/0x310
[   15.949061]  kasan_atomics+0x1dc/0x310
[   15.949092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.949133]  ? __pfx_read_tsc+0x10/0x10
[   15.949173]  ? ktime_get_ts64+0x86/0x230
[   15.949227]  kunit_try_run_case+0x1a5/0x480
[   15.949277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.949318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.949364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.949406]  ? __kthread_parkme+0x82/0x180
[   15.949451]  ? preempt_count_sub+0x50/0x80
[   15.949502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.949569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.949606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.949657]  kthread+0x337/0x6f0
[   15.949685]  ? trace_preempt_on+0x20/0xc0
[   15.949740]  ? __pfx_kthread+0x10/0x10
[   15.949769]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.949799]  ? calculate_sigpending+0x7b/0xa0
[   15.949830]  ? __pfx_kthread+0x10/0x10
[   15.949856]  ret_from_fork+0x41/0x80
[   15.949887]  ? __pfx_kthread+0x10/0x10
[   15.949913]  ret_from_fork_asm+0x1a/0x30
[   15.949969]  </TASK>
[   15.949989] 
[   15.958492] Allocated by task 285:
[   15.958846]  kasan_save_stack+0x45/0x70
[   15.959204]  kasan_save_track+0x18/0x40
[   15.959529]  kasan_save_alloc_info+0x3b/0x50
[   15.959854]  __kasan_kmalloc+0xb7/0xc0
[   15.960146]  __kmalloc_cache_noprof+0x189/0x420
[   15.960453]  kasan_atomics+0x95/0x310
[   15.960770]  kunit_try_run_case+0x1a5/0x480
[   15.961073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.961437]  kthread+0x337/0x6f0
[   15.961605]  ret_from_fork+0x41/0x80
[   15.961786]  ret_from_fork_asm+0x1a/0x30
[   15.961966] 
[   15.962116] The buggy address belongs to the object at ffff8881029ef680
[   15.962116]  which belongs to the cache kmalloc-64 of size 64
[   15.962857] The buggy address is located 0 bytes to the right of
[   15.962857]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.963238] 
[   15.963350] The buggy address belongs to the physical page:
[   15.963570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.964135] flags: 0x200000000000000(node=0|zone=2)
[   15.964507] page_type: f5(slab)
[   15.964809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.965285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.965760] page dumped because: kasan: bad access detected
[   15.966128] 
[   15.966249] Memory state around the buggy address:
[   15.966479]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.966924]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.967417] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.970007]                                      ^
[   15.970453]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.971028]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.971460] ==================================================================
[   16.130367] ==================================================================
[   16.131005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.131474] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.132160] 
[   16.132744] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.132878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.132907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.132949] Call Trace:
[   16.132994]  <TASK>
[   16.133039]  dump_stack_lvl+0x73/0xb0
[   16.133109]  print_report+0xd1/0x650
[   16.133162]  ? __virt_addr_valid+0x1db/0x2d0
[   16.133210]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.133255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.133295]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.133322]  kasan_report+0x141/0x180
[   16.133345]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.133371]  kasan_check_range+0x10c/0x1c0
[   16.133392]  __kasan_check_write+0x18/0x20
[   16.133412]  kasan_atomics_helper+0x1f43/0x5450
[   16.133435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.133456]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.133479]  ? kasan_atomics+0x152/0x310
[   16.133502]  kasan_atomics+0x1dc/0x310
[   16.133522]  ? __pfx_kasan_atomics+0x10/0x10
[   16.133548]  ? __pfx_read_tsc+0x10/0x10
[   16.133576]  ? ktime_get_ts64+0x86/0x230
[   16.133602]  kunit_try_run_case+0x1a5/0x480
[   16.133645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133670]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.133695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.133718]  ? __kthread_parkme+0x82/0x180
[   16.133741]  ? preempt_count_sub+0x50/0x80
[   16.133766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.133789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.133812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.133834]  kthread+0x337/0x6f0
[   16.133852]  ? trace_preempt_on+0x20/0xc0
[   16.133876]  ? __pfx_kthread+0x10/0x10
[   16.133894]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.133915]  ? calculate_sigpending+0x7b/0xa0
[   16.133984]  ? __pfx_kthread+0x10/0x10
[   16.134003]  ret_from_fork+0x41/0x80
[   16.134025]  ? __pfx_kthread+0x10/0x10
[   16.134044]  ret_from_fork_asm+0x1a/0x30
[   16.134074]  </TASK>
[   16.134087] 
[   16.145437] Allocated by task 285:
[   16.145696]  kasan_save_stack+0x45/0x70
[   16.146443]  kasan_save_track+0x18/0x40
[   16.146817]  kasan_save_alloc_info+0x3b/0x50
[   16.147240]  __kasan_kmalloc+0xb7/0xc0
[   16.147547]  __kmalloc_cache_noprof+0x189/0x420
[   16.147821]  kasan_atomics+0x95/0x310
[   16.148024]  kunit_try_run_case+0x1a5/0x480
[   16.148188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148558]  kthread+0x337/0x6f0
[   16.148758]  ret_from_fork+0x41/0x80
[   16.149067]  ret_from_fork_asm+0x1a/0x30
[   16.149254] 
[   16.149699] The buggy address belongs to the object at ffff8881029ef680
[   16.149699]  which belongs to the cache kmalloc-64 of size 64
[   16.150434] The buggy address is located 0 bytes to the right of
[   16.150434]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.151285] 
[   16.151440] The buggy address belongs to the physical page:
[   16.151730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.152308] flags: 0x200000000000000(node=0|zone=2)
[   16.152720] page_type: f5(slab)
[   16.152907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.153270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.153755] page dumped because: kasan: bad access detected
[   16.153998] 
[   16.154162] Memory state around the buggy address:
[   16.154499]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.154825]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155083] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.155603]                                      ^
[   16.155862]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156103]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156545] ==================================================================
[   14.743595] ==================================================================
[   14.744047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.744432] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.744850] 
[   14.745082] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.745199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.745229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.745272] Call Trace:
[   14.745319]  <TASK>
[   14.745361]  dump_stack_lvl+0x73/0xb0
[   14.745416]  print_report+0xd1/0x650
[   14.745500]  ? __virt_addr_valid+0x1db/0x2d0
[   14.745552]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.745593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.745682]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.745742]  kasan_report+0x141/0x180
[   14.745800]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.745875]  __asan_report_load4_noabort+0x18/0x20
[   14.745916]  kasan_atomics_helper+0x4b54/0x5450
[   14.745969]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.746014]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.746073]  ? kasan_atomics+0x152/0x310
[   14.746136]  kasan_atomics+0x1dc/0x310
[   14.746173]  ? __pfx_kasan_atomics+0x10/0x10
[   14.746213]  ? __pfx_read_tsc+0x10/0x10
[   14.746251]  ? ktime_get_ts64+0x86/0x230
[   14.746319]  kunit_try_run_case+0x1a5/0x480
[   14.746367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.746404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.746451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.746497]  ? __kthread_parkme+0x82/0x180
[   14.746564]  ? preempt_count_sub+0x50/0x80
[   14.746613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.746673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.746722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.746768]  kthread+0x337/0x6f0
[   14.746842]  ? trace_preempt_on+0x20/0xc0
[   14.746887]  ? __pfx_kthread+0x10/0x10
[   14.746943]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.746991]  ? calculate_sigpending+0x7b/0xa0
[   14.747038]  ? __pfx_kthread+0x10/0x10
[   14.747081]  ret_from_fork+0x41/0x80
[   14.747126]  ? __pfx_kthread+0x10/0x10
[   14.747166]  ret_from_fork_asm+0x1a/0x30
[   14.747233]  </TASK>
[   14.747259] 
[   14.760078] Allocated by task 285:
[   14.760681]  kasan_save_stack+0x45/0x70
[   14.761106]  kasan_save_track+0x18/0x40
[   14.761418]  kasan_save_alloc_info+0x3b/0x50
[   14.761603]  __kasan_kmalloc+0xb7/0xc0
[   14.761918]  __kmalloc_cache_noprof+0x189/0x420
[   14.762131]  kasan_atomics+0x95/0x310
[   14.762353]  kunit_try_run_case+0x1a5/0x480
[   14.763383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.764118]  kthread+0x337/0x6f0
[   14.764544]  ret_from_fork+0x41/0x80
[   14.764762]  ret_from_fork_asm+0x1a/0x30
[   14.764947] 
[   14.765049] The buggy address belongs to the object at ffff8881029ef680
[   14.765049]  which belongs to the cache kmalloc-64 of size 64
[   14.765893] The buggy address is located 0 bytes to the right of
[   14.765893]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.766367] 
[   14.766545] The buggy address belongs to the physical page:
[   14.766818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.767250] flags: 0x200000000000000(node=0|zone=2)
[   14.768429] page_type: f5(slab)
[   14.768885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.769507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.770183] page dumped because: kasan: bad access detected
[   14.770600] 
[   14.770780] Memory state around the buggy address:
[   14.771080]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.771360]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.771787] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.772846]                                      ^
[   14.773034]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774453]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774987] ==================================================================
[   15.321926] ==================================================================
[   15.322427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.323185] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.323467] 
[   15.323744] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.324110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324200] Call Trace:
[   15.324249]  <TASK>
[   15.324282]  dump_stack_lvl+0x73/0xb0
[   15.324320]  print_report+0xd1/0x650
[   15.324345]  ? __virt_addr_valid+0x1db/0x2d0
[   15.324367]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.324389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.324412]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.324433]  kasan_report+0x141/0x180
[   15.324455]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.324480]  kasan_check_range+0x10c/0x1c0
[   15.324500]  __kasan_check_write+0x18/0x20
[   15.324519]  kasan_atomics_helper+0xfa9/0x5450
[   15.324544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.324575]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.324596]  ? kasan_atomics+0x152/0x310
[   15.324618]  kasan_atomics+0x1dc/0x310
[   15.324656]  ? __pfx_kasan_atomics+0x10/0x10
[   15.324677]  ? __pfx_read_tsc+0x10/0x10
[   15.324696]  ? ktime_get_ts64+0x86/0x230
[   15.324721]  kunit_try_run_case+0x1a5/0x480
[   15.324746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.324790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.324813]  ? __kthread_parkme+0x82/0x180
[   15.324835]  ? preempt_count_sub+0x50/0x80
[   15.324859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.324925]  kthread+0x337/0x6f0
[   15.324942]  ? trace_preempt_on+0x20/0xc0
[   15.324965]  ? __pfx_kthread+0x10/0x10
[   15.324983]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.325004]  ? calculate_sigpending+0x7b/0xa0
[   15.325025]  ? __pfx_kthread+0x10/0x10
[   15.325043]  ret_from_fork+0x41/0x80
[   15.325063]  ? __pfx_kthread+0x10/0x10
[   15.325081]  ret_from_fork_asm+0x1a/0x30
[   15.325112]  </TASK>
[   15.325126] 
[   15.334976] Allocated by task 285:
[   15.335319]  kasan_save_stack+0x45/0x70
[   15.335749]  kasan_save_track+0x18/0x40
[   15.336046]  kasan_save_alloc_info+0x3b/0x50
[   15.336356]  __kasan_kmalloc+0xb7/0xc0
[   15.336710]  __kmalloc_cache_noprof+0x189/0x420
[   15.337081]  kasan_atomics+0x95/0x310
[   15.337306]  kunit_try_run_case+0x1a5/0x480
[   15.337713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338146]  kthread+0x337/0x6f0
[   15.338443]  ret_from_fork+0x41/0x80
[   15.338745]  ret_from_fork_asm+0x1a/0x30
[   15.338935] 
[   15.339080] The buggy address belongs to the object at ffff8881029ef680
[   15.339080]  which belongs to the cache kmalloc-64 of size 64
[   15.340033] The buggy address is located 0 bytes to the right of
[   15.340033]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.340950] 
[   15.341179] The buggy address belongs to the physical page:
[   15.341408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.342035] flags: 0x200000000000000(node=0|zone=2)
[   15.342444] page_type: f5(slab)
[   15.342792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.343180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.343482] page dumped because: kasan: bad access detected
[   15.344130] 
[   15.344231] Memory state around the buggy address:
[   15.344441]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.344965]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.345413] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.345809]                                      ^
[   15.346134]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.346688]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.347071] ==================================================================
[   15.792984] ==================================================================
[   15.793588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.794065] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.794465] 
[   15.794728] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.794863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.794895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.794937] Call Trace:
[   15.794982]  <TASK>
[   15.795023]  dump_stack_lvl+0x73/0xb0
[   15.795082]  print_report+0xd1/0x650
[   15.795161]  ? __virt_addr_valid+0x1db/0x2d0
[   15.795209]  ? kasan_atomics_helper+0x177f/0x5450
[   15.795248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.795292]  ? kasan_atomics_helper+0x177f/0x5450
[   15.795336]  kasan_report+0x141/0x180
[   15.795410]  ? kasan_atomics_helper+0x177f/0x5450
[   15.795459]  kasan_check_range+0x10c/0x1c0
[   15.795501]  __kasan_check_write+0x18/0x20
[   15.795540]  kasan_atomics_helper+0x177f/0x5450
[   15.795579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.795666]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.795712]  ? kasan_atomics+0x152/0x310
[   15.795757]  kasan_atomics+0x1dc/0x310
[   15.795822]  ? __pfx_kasan_atomics+0x10/0x10
[   15.795867]  ? __pfx_read_tsc+0x10/0x10
[   15.795907]  ? ktime_get_ts64+0x86/0x230
[   15.795945]  kunit_try_run_case+0x1a5/0x480
[   15.795975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.795997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.796021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.796047]  ? __kthread_parkme+0x82/0x180
[   15.796082]  ? preempt_count_sub+0x50/0x80
[   15.796127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.796200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.796290]  kthread+0x337/0x6f0
[   15.796326]  ? trace_preempt_on+0x20/0xc0
[   15.796395]  ? __pfx_kthread+0x10/0x10
[   15.796436]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.796476]  ? calculate_sigpending+0x7b/0xa0
[   15.796512]  ? __pfx_kthread+0x10/0x10
[   15.796548]  ret_from_fork+0x41/0x80
[   15.796581]  ? __pfx_kthread+0x10/0x10
[   15.796600]  ret_from_fork_asm+0x1a/0x30
[   15.796646]  </TASK>
[   15.796664] 
[   15.808612] Allocated by task 285:
[   15.808898]  kasan_save_stack+0x45/0x70
[   15.809432]  kasan_save_track+0x18/0x40
[   15.809614]  kasan_save_alloc_info+0x3b/0x50
[   15.809906]  __kasan_kmalloc+0xb7/0xc0
[   15.810298]  __kmalloc_cache_noprof+0x189/0x420
[   15.810975]  kasan_atomics+0x95/0x310
[   15.811195]  kunit_try_run_case+0x1a5/0x480
[   15.811355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.811820]  kthread+0x337/0x6f0
[   15.812290]  ret_from_fork+0x41/0x80
[   15.812594]  ret_from_fork_asm+0x1a/0x30
[   15.812942] 
[   15.813254] The buggy address belongs to the object at ffff8881029ef680
[   15.813254]  which belongs to the cache kmalloc-64 of size 64
[   15.814086] The buggy address is located 0 bytes to the right of
[   15.814086]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.814989] 
[   15.815450] The buggy address belongs to the physical page:
[   15.815868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.816338] flags: 0x200000000000000(node=0|zone=2)
[   15.816960] page_type: f5(slab)
[   15.817229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.817801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818168] page dumped because: kasan: bad access detected
[   15.818461] 
[   15.818578] Memory state around the buggy address:
[   15.819172]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819773]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.820203] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820571]                                      ^
[   15.821043]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.821602]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.822053] ==================================================================
[   15.126960] ==================================================================
[   15.127826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.129210] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.129999] 
[   15.130152] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.130218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.130240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.130281] Call Trace:
[   15.130322]  <TASK>
[   15.130361]  dump_stack_lvl+0x73/0xb0
[   15.130579]  print_report+0xd1/0x650
[   15.130608]  ? __virt_addr_valid+0x1db/0x2d0
[   15.130650]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.130674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.130697]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.130719]  kasan_report+0x141/0x180
[   15.130742]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.130768]  kasan_check_range+0x10c/0x1c0
[   15.130788]  __kasan_check_write+0x18/0x20
[   15.130808]  kasan_atomics_helper+0xb6a/0x5450
[   15.130830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.130853]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.130875]  ? kasan_atomics+0x152/0x310
[   15.130897]  kasan_atomics+0x1dc/0x310
[   15.130916]  ? __pfx_kasan_atomics+0x10/0x10
[   15.130937]  ? __pfx_read_tsc+0x10/0x10
[   15.130957]  ? ktime_get_ts64+0x86/0x230
[   15.130982]  kunit_try_run_case+0x1a5/0x480
[   15.131007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.131029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.131053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.131075]  ? __kthread_parkme+0x82/0x180
[   15.131099]  ? preempt_count_sub+0x50/0x80
[   15.131123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.131146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.131191]  kthread+0x337/0x6f0
[   15.131209]  ? trace_preempt_on+0x20/0xc0
[   15.131232]  ? __pfx_kthread+0x10/0x10
[   15.131251]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.131272]  ? calculate_sigpending+0x7b/0xa0
[   15.131294]  ? __pfx_kthread+0x10/0x10
[   15.131312]  ret_from_fork+0x41/0x80
[   15.131333]  ? __pfx_kthread+0x10/0x10
[   15.131351]  ret_from_fork_asm+0x1a/0x30
[   15.131381]  </TASK>
[   15.131395] 
[   15.142762] Allocated by task 285:
[   15.143163]  kasan_save_stack+0x45/0x70
[   15.143586]  kasan_save_track+0x18/0x40
[   15.143957]  kasan_save_alloc_info+0x3b/0x50
[   15.144283]  __kasan_kmalloc+0xb7/0xc0
[   15.144497]  __kmalloc_cache_noprof+0x189/0x420
[   15.144927]  kasan_atomics+0x95/0x310
[   15.145199]  kunit_try_run_case+0x1a5/0x480
[   15.145566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.145790]  kthread+0x337/0x6f0
[   15.145953]  ret_from_fork+0x41/0x80
[   15.146256]  ret_from_fork_asm+0x1a/0x30
[   15.146696] 
[   15.146906] The buggy address belongs to the object at ffff8881029ef680
[   15.146906]  which belongs to the cache kmalloc-64 of size 64
[   15.147762] The buggy address is located 0 bytes to the right of
[   15.147762]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.148515] 
[   15.148673] The buggy address belongs to the physical page:
[   15.148874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.149464] flags: 0x200000000000000(node=0|zone=2)
[   15.149873] page_type: f5(slab)
[   15.150176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.150614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.151166] page dumped because: kasan: bad access detected
[   15.151359] 
[   15.151561] Memory state around the buggy address:
[   15.151956]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.152453]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.152894] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.153274]                                      ^
[   15.153752]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154285]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.154738] ==================================================================
[   16.075527] ==================================================================
[   16.076105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.078055] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.078573] 
[   16.078789] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.078894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.078922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.078971] Call Trace:
[   16.079016]  <TASK>
[   16.079060]  dump_stack_lvl+0x73/0xb0
[   16.079127]  print_report+0xd1/0x650
[   16.079176]  ? __virt_addr_valid+0x1db/0x2d0
[   16.079223]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.079270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.079316]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.079343]  kasan_report+0x141/0x180
[   16.079366]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.079392]  kasan_check_range+0x10c/0x1c0
[   16.079412]  __kasan_check_write+0x18/0x20
[   16.079432]  kasan_atomics_helper+0x1e12/0x5450
[   16.079454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.079476]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.079498]  ? kasan_atomics+0x152/0x310
[   16.079520]  kasan_atomics+0x1dc/0x310
[   16.079539]  ? __pfx_kasan_atomics+0x10/0x10
[   16.079594]  ? __pfx_read_tsc+0x10/0x10
[   16.079655]  ? ktime_get_ts64+0x86/0x230
[   16.079697]  kunit_try_run_case+0x1a5/0x480
[   16.079741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.079782]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.080178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.081055]  ? __kthread_parkme+0x82/0x180
[   16.081130]  ? preempt_count_sub+0x50/0x80
[   16.081179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.081236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.081259]  kthread+0x337/0x6f0
[   16.081277]  ? trace_preempt_on+0x20/0xc0
[   16.081301]  ? __pfx_kthread+0x10/0x10
[   16.081320]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.081342]  ? calculate_sigpending+0x7b/0xa0
[   16.081364]  ? __pfx_kthread+0x10/0x10
[   16.081383]  ret_from_fork+0x41/0x80
[   16.081404]  ? __pfx_kthread+0x10/0x10
[   16.081425]  ret_from_fork_asm+0x1a/0x30
[   16.081456]  </TASK>
[   16.081470] 
[   16.091580] Allocated by task 285:
[   16.091911]  kasan_save_stack+0x45/0x70
[   16.092281]  kasan_save_track+0x18/0x40
[   16.092643]  kasan_save_alloc_info+0x3b/0x50
[   16.092997]  __kasan_kmalloc+0xb7/0xc0
[   16.093293]  __kmalloc_cache_noprof+0x189/0x420
[   16.093692]  kasan_atomics+0x95/0x310
[   16.094019]  kunit_try_run_case+0x1a5/0x480
[   16.094348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094766]  kthread+0x337/0x6f0
[   16.095031]  ret_from_fork+0x41/0x80
[   16.095334]  ret_from_fork_asm+0x1a/0x30
[   16.095682] 
[   16.095849] The buggy address belongs to the object at ffff8881029ef680
[   16.095849]  which belongs to the cache kmalloc-64 of size 64
[   16.096666] The buggy address is located 0 bytes to the right of
[   16.096666]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.097202] 
[   16.097357] The buggy address belongs to the physical page:
[   16.097631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.098184] flags: 0x200000000000000(node=0|zone=2)
[   16.098527] page_type: f5(slab)
[   16.098818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.099334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.099687] page dumped because: kasan: bad access detected
[   16.099882] 
[   16.099984] Memory state around the buggy address:
[   16.100177]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.100721]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101228] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.101744]                                      ^
[   16.102066]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102365]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102645] ==================================================================
[   15.074686] ==================================================================
[   15.075075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.075483] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.076088] 
[   15.076317] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.076480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.076502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.076740] Call Trace:
[   15.076776]  <TASK>
[   15.076815]  dump_stack_lvl+0x73/0xb0
[   15.076883]  print_report+0xd1/0x650
[   15.076927]  ? __virt_addr_valid+0x1db/0x2d0
[   15.076961]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.076994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.077026]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.077059]  kasan_report+0x141/0x180
[   15.077096]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.077144]  kasan_check_range+0x10c/0x1c0
[   15.077205]  __kasan_check_write+0x18/0x20
[   15.077247]  kasan_atomics_helper+0xa2b/0x5450
[   15.077316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.077358]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.077382]  ? kasan_atomics+0x152/0x310
[   15.077406]  kasan_atomics+0x1dc/0x310
[   15.077426]  ? __pfx_kasan_atomics+0x10/0x10
[   15.077455]  ? __pfx_read_tsc+0x10/0x10
[   15.077488]  ? ktime_get_ts64+0x86/0x230
[   15.077534]  kunit_try_run_case+0x1a5/0x480
[   15.077641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.077683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.077731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.077776]  ? __kthread_parkme+0x82/0x180
[   15.077835]  ? preempt_count_sub+0x50/0x80
[   15.077884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.077930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.077983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.078024]  kthread+0x337/0x6f0
[   15.078044]  ? trace_preempt_on+0x20/0xc0
[   15.078070]  ? __pfx_kthread+0x10/0x10
[   15.078089]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.078112]  ? calculate_sigpending+0x7b/0xa0
[   15.078134]  ? __pfx_kthread+0x10/0x10
[   15.078153]  ret_from_fork+0x41/0x80
[   15.078176]  ? __pfx_kthread+0x10/0x10
[   15.078194]  ret_from_fork_asm+0x1a/0x30
[   15.078225]  </TASK>
[   15.078239] 
[   15.086987] Allocated by task 285:
[   15.087215]  kasan_save_stack+0x45/0x70
[   15.087417]  kasan_save_track+0x18/0x40
[   15.087768]  kasan_save_alloc_info+0x3b/0x50
[   15.088099]  __kasan_kmalloc+0xb7/0xc0
[   15.088404]  __kmalloc_cache_noprof+0x189/0x420
[   15.088795]  kasan_atomics+0x95/0x310
[   15.089101]  kunit_try_run_case+0x1a5/0x480
[   15.089425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.089863]  kthread+0x337/0x6f0
[   15.090068]  ret_from_fork+0x41/0x80
[   15.090322]  ret_from_fork_asm+0x1a/0x30
[   15.090507] 
[   15.090714] The buggy address belongs to the object at ffff8881029ef680
[   15.090714]  which belongs to the cache kmalloc-64 of size 64
[   15.091464] The buggy address is located 0 bytes to the right of
[   15.091464]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.091875] 
[   15.091987] The buggy address belongs to the physical page:
[   15.092184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.092660] flags: 0x200000000000000(node=0|zone=2)
[   15.093040] page_type: f5(slab)
[   15.093318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.093860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.094305] page dumped because: kasan: bad access detected
[   15.094716] 
[   15.094821] Memory state around the buggy address:
[   15.095004]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.095242]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.095781] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.097426]                                      ^
[   15.097931]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.098316]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.098946] ==================================================================
[   16.000938] ==================================================================
[   16.001266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.001789] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.002157] 
[   16.002356] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.002462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.002489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.002530] Call Trace:
[   16.002573]  <TASK>
[   16.002611]  dump_stack_lvl+0x73/0xb0
[   16.003483]  print_report+0xd1/0x650
[   16.003524]  ? __virt_addr_valid+0x1db/0x2d0
[   16.003560]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.003634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.003673]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.003708]  kasan_report+0x141/0x180
[   16.003741]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.003768]  __asan_report_load8_noabort+0x18/0x20
[   16.003788]  kasan_atomics_helper+0x4f30/0x5450
[   16.003811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.003834]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.003857]  ? kasan_atomics+0x152/0x310
[   16.003881]  kasan_atomics+0x1dc/0x310
[   16.003900]  ? __pfx_kasan_atomics+0x10/0x10
[   16.003958]  ? __pfx_read_tsc+0x10/0x10
[   16.003983]  ? ktime_get_ts64+0x86/0x230
[   16.004008]  kunit_try_run_case+0x1a5/0x480
[   16.004035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.004080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.004103]  ? __kthread_parkme+0x82/0x180
[   16.004126]  ? preempt_count_sub+0x50/0x80
[   16.004151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.004173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.004196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.004218]  kthread+0x337/0x6f0
[   16.004235]  ? trace_preempt_on+0x20/0xc0
[   16.004260]  ? __pfx_kthread+0x10/0x10
[   16.004278]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.004299]  ? calculate_sigpending+0x7b/0xa0
[   16.004320]  ? __pfx_kthread+0x10/0x10
[   16.004339]  ret_from_fork+0x41/0x80
[   16.004359]  ? __pfx_kthread+0x10/0x10
[   16.004377]  ret_from_fork_asm+0x1a/0x30
[   16.004409]  </TASK>
[   16.004422] 
[   16.015043] Allocated by task 285:
[   16.015291]  kasan_save_stack+0x45/0x70
[   16.015654]  kasan_save_track+0x18/0x40
[   16.015888]  kasan_save_alloc_info+0x3b/0x50
[   16.016056]  __kasan_kmalloc+0xb7/0xc0
[   16.016223]  __kmalloc_cache_noprof+0x189/0x420
[   16.016409]  kasan_atomics+0x95/0x310
[   16.016573]  kunit_try_run_case+0x1a5/0x480
[   16.016798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017180]  kthread+0x337/0x6f0
[   16.017449]  ret_from_fork+0x41/0x80
[   16.017787]  ret_from_fork_asm+0x1a/0x30
[   16.018143] 
[   16.018309] The buggy address belongs to the object at ffff8881029ef680
[   16.018309]  which belongs to the cache kmalloc-64 of size 64
[   16.019147] The buggy address is located 0 bytes to the right of
[   16.019147]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.020006] 
[   16.020158] The buggy address belongs to the physical page:
[   16.020456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.020780] flags: 0x200000000000000(node=0|zone=2)
[   16.020993] page_type: f5(slab)
[   16.021280] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.021888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.022412] page dumped because: kasan: bad access detected
[   16.022870] 
[   16.023043] Memory state around the buggy address:
[   16.023238]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.023800]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.024394] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.024991]                                      ^
[   16.025417]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025833]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025984] ==================================================================
[   15.922887] ==================================================================
[   15.923554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.924114] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.924602] 
[   15.924796] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.924898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.924926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.924971] Call Trace:
[   15.925016]  <TASK>
[   15.925060]  dump_stack_lvl+0x73/0xb0
[   15.925121]  print_report+0xd1/0x650
[   15.925171]  ? __virt_addr_valid+0x1db/0x2d0
[   15.925220]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.925300]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925340]  kasan_report+0x141/0x180
[   15.925376]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925421]  kasan_check_range+0x10c/0x1c0
[   15.925458]  __kasan_check_write+0x18/0x20
[   15.925494]  kasan_atomics_helper+0x1a7f/0x5450
[   15.925531]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.925610]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.925668]  ? kasan_atomics+0x152/0x310
[   15.925720]  kasan_atomics+0x1dc/0x310
[   15.925763]  ? __pfx_kasan_atomics+0x10/0x10
[   15.925807]  ? __pfx_read_tsc+0x10/0x10
[   15.925850]  ? ktime_get_ts64+0x86/0x230
[   15.925901]  kunit_try_run_case+0x1a5/0x480
[   15.925959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.926060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.926111]  ? __kthread_parkme+0x82/0x180
[   15.926160]  ? preempt_count_sub+0x50/0x80
[   15.926204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.926285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.926327]  kthread+0x337/0x6f0
[   15.926364]  ? trace_preempt_on+0x20/0xc0
[   15.926412]  ? __pfx_kthread+0x10/0x10
[   15.926451]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.926496]  ? calculate_sigpending+0x7b/0xa0
[   15.926571]  ? __pfx_kthread+0x10/0x10
[   15.926616]  ret_from_fork+0x41/0x80
[   15.926675]  ? __pfx_kthread+0x10/0x10
[   15.926715]  ret_from_fork_asm+0x1a/0x30
[   15.926781]  </TASK>
[   15.926809] 
[   15.935713] Allocated by task 285:
[   15.935941]  kasan_save_stack+0x45/0x70
[   15.936233]  kasan_save_track+0x18/0x40
[   15.936477]  kasan_save_alloc_info+0x3b/0x50
[   15.936823]  __kasan_kmalloc+0xb7/0xc0
[   15.937088]  __kmalloc_cache_noprof+0x189/0x420
[   15.937377]  kasan_atomics+0x95/0x310
[   15.937677]  kunit_try_run_case+0x1a5/0x480
[   15.937900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.938133]  kthread+0x337/0x6f0
[   15.938437]  ret_from_fork+0x41/0x80
[   15.938762]  ret_from_fork_asm+0x1a/0x30
[   15.939004] 
[   15.939105] The buggy address belongs to the object at ffff8881029ef680
[   15.939105]  which belongs to the cache kmalloc-64 of size 64
[   15.939468] The buggy address is located 0 bytes to the right of
[   15.939468]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.940287] 
[   15.940458] The buggy address belongs to the physical page:
[   15.940766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.941067] flags: 0x200000000000000(node=0|zone=2)
[   15.941273] page_type: f5(slab)
[   15.941448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.941743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.941999] page dumped because: kasan: bad access detected
[   15.942197] 
[   15.942304] Memory state around the buggy address:
[   15.942661]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943170]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943697] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.944154]                                      ^
[   15.944507]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944993]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945464] ==================================================================
[   15.294323] ==================================================================
[   15.294840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.295186] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.295662] 
[   15.295909] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.296010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.296032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.296074] Call Trace:
[   15.296154]  <TASK>
[   15.296198]  dump_stack_lvl+0x73/0xb0
[   15.296260]  print_report+0xd1/0x650
[   15.296306]  ? __virt_addr_valid+0x1db/0x2d0
[   15.296379]  ? kasan_atomics_helper+0xf10/0x5450
[   15.296422]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.296468]  ? kasan_atomics_helper+0xf10/0x5450
[   15.296511]  kasan_report+0x141/0x180
[   15.296580]  ? kasan_atomics_helper+0xf10/0x5450
[   15.296644]  kasan_check_range+0x10c/0x1c0
[   15.296691]  __kasan_check_write+0x18/0x20
[   15.296726]  kasan_atomics_helper+0xf10/0x5450
[   15.296773]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.296848]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.296894]  ? kasan_atomics+0x152/0x310
[   15.296941]  kasan_atomics+0x1dc/0x310
[   15.296971]  ? __pfx_kasan_atomics+0x10/0x10
[   15.297006]  ? __pfx_read_tsc+0x10/0x10
[   15.297043]  ? ktime_get_ts64+0x86/0x230
[   15.297116]  kunit_try_run_case+0x1a5/0x480
[   15.297184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.297265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.297307]  ? __kthread_parkme+0x82/0x180
[   15.297351]  ? preempt_count_sub+0x50/0x80
[   15.297402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.297441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.297466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.297488]  kthread+0x337/0x6f0
[   15.297506]  ? trace_preempt_on+0x20/0xc0
[   15.297530]  ? __pfx_kthread+0x10/0x10
[   15.297573]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.297594]  ? calculate_sigpending+0x7b/0xa0
[   15.297615]  ? __pfx_kthread+0x10/0x10
[   15.297654]  ret_from_fork+0x41/0x80
[   15.297675]  ? __pfx_kthread+0x10/0x10
[   15.297694]  ret_from_fork_asm+0x1a/0x30
[   15.297724]  </TASK>
[   15.297738] 
[   15.307221] Allocated by task 285:
[   15.307610]  kasan_save_stack+0x45/0x70
[   15.307922]  kasan_save_track+0x18/0x40
[   15.308253]  kasan_save_alloc_info+0x3b/0x50
[   15.308511]  __kasan_kmalloc+0xb7/0xc0
[   15.309043]  __kmalloc_cache_noprof+0x189/0x420
[   15.309491]  kasan_atomics+0x95/0x310
[   15.309869]  kunit_try_run_case+0x1a5/0x480
[   15.310079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.310355]  kthread+0x337/0x6f0
[   15.311246]  ret_from_fork+0x41/0x80
[   15.311467]  ret_from_fork_asm+0x1a/0x30
[   15.311652] 
[   15.312434] The buggy address belongs to the object at ffff8881029ef680
[   15.312434]  which belongs to the cache kmalloc-64 of size 64
[   15.313130] The buggy address is located 0 bytes to the right of
[   15.313130]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.314268] 
[   15.314397] The buggy address belongs to the physical page:
[   15.314741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.315056] flags: 0x200000000000000(node=0|zone=2)
[   15.315303] page_type: f5(slab)
[   15.315560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.316424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.316792] page dumped because: kasan: bad access detected
[   15.317170] 
[   15.317276] Memory state around the buggy address:
[   15.317637]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.317904]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.318452] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.318884]                                      ^
[   15.319281]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319578]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319869] ==================================================================
[   16.334983] ==================================================================
[   16.335747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.336063] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.336321] 
[   16.336461] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.336569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.336595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.336654] Call Trace:
[   16.336702]  <TASK>
[   16.336743]  dump_stack_lvl+0x73/0xb0
[   16.336794]  print_report+0xd1/0x650
[   16.336833]  ? __virt_addr_valid+0x1db/0x2d0
[   16.336866]  ? kasan_atomics_helper+0x224c/0x5450
[   16.336904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.336946]  ? kasan_atomics_helper+0x224c/0x5450
[   16.337013]  kasan_report+0x141/0x180
[   16.337057]  ? kasan_atomics_helper+0x224c/0x5450
[   16.337121]  kasan_check_range+0x10c/0x1c0
[   16.337173]  __kasan_check_write+0x18/0x20
[   16.337223]  kasan_atomics_helper+0x224c/0x5450
[   16.337265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.337306]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.337350]  ? kasan_atomics+0x152/0x310
[   16.337409]  kasan_atomics+0x1dc/0x310
[   16.337460]  ? __pfx_kasan_atomics+0x10/0x10
[   16.337512]  ? __pfx_read_tsc+0x10/0x10
[   16.337548]  ? ktime_get_ts64+0x86/0x230
[   16.337589]  kunit_try_run_case+0x1a5/0x480
[   16.337648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.337687]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.337735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.337783]  ? __kthread_parkme+0x82/0x180
[   16.337829]  ? preempt_count_sub+0x50/0x80
[   16.337882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.337933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.337994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.338043]  kthread+0x337/0x6f0
[   16.338083]  ? trace_preempt_on+0x20/0xc0
[   16.338134]  ? __pfx_kthread+0x10/0x10
[   16.338177]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.338225]  ? calculate_sigpending+0x7b/0xa0
[   16.338264]  ? __pfx_kthread+0x10/0x10
[   16.338300]  ret_from_fork+0x41/0x80
[   16.338342]  ? __pfx_kthread+0x10/0x10
[   16.338403]  ret_from_fork_asm+0x1a/0x30
[   16.338471]  </TASK>
[   16.338496] 
[   16.348468] Allocated by task 285:
[   16.348732]  kasan_save_stack+0x45/0x70
[   16.349092]  kasan_save_track+0x18/0x40
[   16.349293]  kasan_save_alloc_info+0x3b/0x50
[   16.349490]  __kasan_kmalloc+0xb7/0xc0
[   16.349692]  __kmalloc_cache_noprof+0x189/0x420
[   16.349977]  kasan_atomics+0x95/0x310
[   16.350247]  kunit_try_run_case+0x1a5/0x480
[   16.350573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.351124]  kthread+0x337/0x6f0
[   16.351388]  ret_from_fork+0x41/0x80
[   16.351703]  ret_from_fork_asm+0x1a/0x30
[   16.351948] 
[   16.352055] The buggy address belongs to the object at ffff8881029ef680
[   16.352055]  which belongs to the cache kmalloc-64 of size 64
[   16.352812] The buggy address is located 0 bytes to the right of
[   16.352812]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.353454] 
[   16.353650] The buggy address belongs to the physical page:
[   16.354031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.354468] flags: 0x200000000000000(node=0|zone=2)
[   16.354795] page_type: f5(slab)
[   16.355101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.355388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.355764] page dumped because: kasan: bad access detected
[   16.356080] 
[   16.356231] Memory state around the buggy address:
[   16.356596]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.356972]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.357234] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.357468]                                      ^
[   16.357790]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.358313]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.358865] ==================================================================
[   16.104253] ==================================================================
[   16.104887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.105433] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.105952] 
[   16.106165] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.106273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.106300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.106397] Call Trace:
[   16.106446]  <TASK>
[   16.106487]  dump_stack_lvl+0x73/0xb0
[   16.106591]  print_report+0xd1/0x650
[   16.106655]  ? __virt_addr_valid+0x1db/0x2d0
[   16.106718]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.106764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.106808]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.106856]  kasan_report+0x141/0x180
[   16.106905]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.106963]  kasan_check_range+0x10c/0x1c0
[   16.107004]  __kasan_check_write+0x18/0x20
[   16.107043]  kasan_atomics_helper+0x1eaa/0x5450
[   16.107107]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.107151]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.107193]  ? kasan_atomics+0x152/0x310
[   16.107242]  kasan_atomics+0x1dc/0x310
[   16.107269]  ? __pfx_kasan_atomics+0x10/0x10
[   16.107301]  ? __pfx_read_tsc+0x10/0x10
[   16.107337]  ? ktime_get_ts64+0x86/0x230
[   16.107385]  kunit_try_run_case+0x1a5/0x480
[   16.107452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.107496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.107573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.107658]  ? __kthread_parkme+0x82/0x180
[   16.107705]  ? preempt_count_sub+0x50/0x80
[   16.107755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.107800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.107841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.107864]  kthread+0x337/0x6f0
[   16.107882]  ? trace_preempt_on+0x20/0xc0
[   16.107906]  ? __pfx_kthread+0x10/0x10
[   16.107924]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.107946]  ? calculate_sigpending+0x7b/0xa0
[   16.107966]  ? __pfx_kthread+0x10/0x10
[   16.107984]  ret_from_fork+0x41/0x80
[   16.108005]  ? __pfx_kthread+0x10/0x10
[   16.108022]  ret_from_fork_asm+0x1a/0x30
[   16.108051]  </TASK>
[   16.108065] 
[   16.117387] Allocated by task 285:
[   16.117699]  kasan_save_stack+0x45/0x70
[   16.118100]  kasan_save_track+0x18/0x40
[   16.118356]  kasan_save_alloc_info+0x3b/0x50
[   16.118671]  __kasan_kmalloc+0xb7/0xc0
[   16.118954]  __kmalloc_cache_noprof+0x189/0x420
[   16.119281]  kasan_atomics+0x95/0x310
[   16.119612]  kunit_try_run_case+0x1a5/0x480
[   16.119894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.120178]  kthread+0x337/0x6f0
[   16.120458]  ret_from_fork+0x41/0x80
[   16.120706]  ret_from_fork_asm+0x1a/0x30
[   16.121011] 
[   16.121191] The buggy address belongs to the object at ffff8881029ef680
[   16.121191]  which belongs to the cache kmalloc-64 of size 64
[   16.121769] The buggy address is located 0 bytes to the right of
[   16.121769]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.122402] 
[   16.122571] The buggy address belongs to the physical page:
[   16.122827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.123138] flags: 0x200000000000000(node=0|zone=2)
[   16.123381] page_type: f5(slab)
[   16.123699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.124253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.124743] page dumped because: kasan: bad access detected
[   16.125105] 
[   16.125265] Memory state around the buggy address:
[   16.125633]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126112]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126607] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.127020]                                      ^
[   16.127298]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127535]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.128009] ==================================================================
[   15.634840] ==================================================================
[   15.635499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.636147] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.636500] 
[   15.636725] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.636830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.636855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.636894] Call Trace:
[   15.636937]  <TASK>
[   15.636976]  dump_stack_lvl+0x73/0xb0
[   15.637036]  print_report+0xd1/0x650
[   15.637086]  ? __virt_addr_valid+0x1db/0x2d0
[   15.637131]  ? kasan_atomics_helper+0x1467/0x5450
[   15.637177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.637222]  ? kasan_atomics_helper+0x1467/0x5450
[   15.637268]  kasan_report+0x141/0x180
[   15.637304]  ? kasan_atomics_helper+0x1467/0x5450
[   15.637339]  kasan_check_range+0x10c/0x1c0
[   15.637360]  __kasan_check_write+0x18/0x20
[   15.637379]  kasan_atomics_helper+0x1467/0x5450
[   15.637401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.637423]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.637445]  ? kasan_atomics+0x152/0x310
[   15.637467]  kasan_atomics+0x1dc/0x310
[   15.637486]  ? __pfx_kasan_atomics+0x10/0x10
[   15.637507]  ? __pfx_read_tsc+0x10/0x10
[   15.637527]  ? ktime_get_ts64+0x86/0x230
[   15.637581]  kunit_try_run_case+0x1a5/0x480
[   15.637608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.637645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.637671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.637694]  ? __kthread_parkme+0x82/0x180
[   15.637715]  ? preempt_count_sub+0x50/0x80
[   15.637740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.637762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.637808]  kthread+0x337/0x6f0
[   15.637825]  ? trace_preempt_on+0x20/0xc0
[   15.637849]  ? __pfx_kthread+0x10/0x10
[   15.637866]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.637887]  ? calculate_sigpending+0x7b/0xa0
[   15.637909]  ? __pfx_kthread+0x10/0x10
[   15.637929]  ret_from_fork+0x41/0x80
[   15.637961]  ? __pfx_kthread+0x10/0x10
[   15.637984]  ret_from_fork_asm+0x1a/0x30
[   15.638016]  </TASK>
[   15.638030] 
[   15.648381] Allocated by task 285:
[   15.648828]  kasan_save_stack+0x45/0x70
[   15.649061]  kasan_save_track+0x18/0x40
[   15.649325]  kasan_save_alloc_info+0x3b/0x50
[   15.649771]  __kasan_kmalloc+0xb7/0xc0
[   15.650015]  __kmalloc_cache_noprof+0x189/0x420
[   15.650330]  kasan_atomics+0x95/0x310
[   15.650572]  kunit_try_run_case+0x1a5/0x480
[   15.650893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.651344]  kthread+0x337/0x6f0
[   15.651603]  ret_from_fork+0x41/0x80
[   15.651882]  ret_from_fork_asm+0x1a/0x30
[   15.652112] 
[   15.652321] The buggy address belongs to the object at ffff8881029ef680
[   15.652321]  which belongs to the cache kmalloc-64 of size 64
[   15.652964] The buggy address is located 0 bytes to the right of
[   15.652964]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.653817] 
[   15.653987] The buggy address belongs to the physical page:
[   15.654391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.654938] flags: 0x200000000000000(node=0|zone=2)
[   15.655246] page_type: f5(slab)
[   15.655529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.655917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.656367] page dumped because: kasan: bad access detected
[   15.656679] 
[   15.656784] Memory state around the buggy address:
[   15.657184]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657634]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.657886] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.658370]                                      ^
[   15.658764]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659575]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659817] ==================================================================
[   15.713052] ==================================================================
[   15.713757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.714356] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.714954] 
[   15.715145] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.715233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.715258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.715306] Call Trace:
[   15.715352]  <TASK>
[   15.715393]  dump_stack_lvl+0x73/0xb0
[   15.715456]  print_report+0xd1/0x650
[   15.715506]  ? __virt_addr_valid+0x1db/0x2d0
[   15.715550]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.715595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.715656]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.715705]  kasan_report+0x141/0x180
[   15.715754]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.715799]  kasan_check_range+0x10c/0x1c0
[   15.715841]  __kasan_check_write+0x18/0x20
[   15.715884]  kasan_atomics_helper+0x15b6/0x5450
[   15.715933]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.715982]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.716030]  ? kasan_atomics+0x152/0x310
[   15.716082]  kasan_atomics+0x1dc/0x310
[   15.716126]  ? __pfx_kasan_atomics+0x10/0x10
[   15.716171]  ? __pfx_read_tsc+0x10/0x10
[   15.716206]  ? ktime_get_ts64+0x86/0x230
[   15.716247]  kunit_try_run_case+0x1a5/0x480
[   15.716332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.716439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.716488]  ? __kthread_parkme+0x82/0x180
[   15.716534]  ? preempt_count_sub+0x50/0x80
[   15.716584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.716724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.716769]  kthread+0x337/0x6f0
[   15.716801]  ? trace_preempt_on+0x20/0xc0
[   15.716840]  ? __pfx_kthread+0x10/0x10
[   15.716872]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.716914]  ? calculate_sigpending+0x7b/0xa0
[   15.716957]  ? __pfx_kthread+0x10/0x10
[   15.716998]  ret_from_fork+0x41/0x80
[   15.717039]  ? __pfx_kthread+0x10/0x10
[   15.717079]  ret_from_fork_asm+0x1a/0x30
[   15.717146]  </TASK>
[   15.717173] 
[   15.727391] Allocated by task 285:
[   15.727827]  kasan_save_stack+0x45/0x70
[   15.728167]  kasan_save_track+0x18/0x40
[   15.728475]  kasan_save_alloc_info+0x3b/0x50
[   15.728920]  __kasan_kmalloc+0xb7/0xc0
[   15.729164]  __kmalloc_cache_noprof+0x189/0x420
[   15.729357]  kasan_atomics+0x95/0x310
[   15.729522]  kunit_try_run_case+0x1a5/0x480
[   15.729709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.729917]  kthread+0x337/0x6f0
[   15.730087]  ret_from_fork+0x41/0x80
[   15.730262]  ret_from_fork_asm+0x1a/0x30
[   15.730438] 
[   15.730561] The buggy address belongs to the object at ffff8881029ef680
[   15.730561]  which belongs to the cache kmalloc-64 of size 64
[   15.731369] The buggy address is located 0 bytes to the right of
[   15.731369]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.732151] 
[   15.732317] The buggy address belongs to the physical page:
[   15.732708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.733235] flags: 0x200000000000000(node=0|zone=2)
[   15.733672] page_type: f5(slab)
[   15.734092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.734657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.734983] page dumped because: kasan: bad access detected
[   15.735179] 
[   15.735282] Memory state around the buggy address:
[   15.735471]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.735966]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.736508] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.737070]                                      ^
[   15.737433]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.737987]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738219] ==================================================================
[   16.157681] ==================================================================
[   16.158037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.159082] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.159427] 
[   16.159619] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.159731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159796] Call Trace:
[   16.159839]  <TASK>
[   16.159879]  dump_stack_lvl+0x73/0xb0
[   16.159943]  print_report+0xd1/0x650
[   16.159992]  ? __virt_addr_valid+0x1db/0x2d0
[   16.160036]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.160073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.160112]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.160154]  kasan_report+0x141/0x180
[   16.160200]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.160254]  __asan_report_load8_noabort+0x18/0x20
[   16.160301]  kasan_atomics_helper+0x4f71/0x5450
[   16.160352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.160399]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.160446]  ? kasan_atomics+0x152/0x310
[   16.160497]  kasan_atomics+0x1dc/0x310
[   16.160534]  ? __pfx_kasan_atomics+0x10/0x10
[   16.160581]  ? __pfx_read_tsc+0x10/0x10
[   16.160619]  ? ktime_get_ts64+0x86/0x230
[   16.160684]  kunit_try_run_case+0x1a5/0x480
[   16.160733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.160823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.160863]  ? __kthread_parkme+0x82/0x180
[   16.160900]  ? preempt_count_sub+0x50/0x80
[   16.160945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.160992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.161042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.161091]  kthread+0x337/0x6f0
[   16.161115]  ? trace_preempt_on+0x20/0xc0
[   16.161140]  ? __pfx_kthread+0x10/0x10
[   16.161158]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.161180]  ? calculate_sigpending+0x7b/0xa0
[   16.161204]  ? __pfx_kthread+0x10/0x10
[   16.161223]  ret_from_fork+0x41/0x80
[   16.161243]  ? __pfx_kthread+0x10/0x10
[   16.161262]  ret_from_fork_asm+0x1a/0x30
[   16.161293]  </TASK>
[   16.161307] 
[   16.169446] Allocated by task 285:
[   16.169778]  kasan_save_stack+0x45/0x70
[   16.170124]  kasan_save_track+0x18/0x40
[   16.170398]  kasan_save_alloc_info+0x3b/0x50
[   16.170818]  __kasan_kmalloc+0xb7/0xc0
[   16.171116]  __kmalloc_cache_noprof+0x189/0x420
[   16.171411]  kasan_atomics+0x95/0x310
[   16.171704]  kunit_try_run_case+0x1a5/0x480
[   16.171923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.172199]  kthread+0x337/0x6f0
[   16.172423]  ret_from_fork+0x41/0x80
[   16.172657]  ret_from_fork_asm+0x1a/0x30
[   16.172955] 
[   16.173095] The buggy address belongs to the object at ffff8881029ef680
[   16.173095]  which belongs to the cache kmalloc-64 of size 64
[   16.173541] The buggy address is located 0 bytes to the right of
[   16.173541]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.174250] 
[   16.174353] The buggy address belongs to the physical page:
[   16.174688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.175016] flags: 0x200000000000000(node=0|zone=2)
[   16.175220] page_type: f5(slab)
[   16.175393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.175657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.175901] page dumped because: kasan: bad access detected
[   16.176094] 
[   16.176193] Memory state around the buggy address:
[   16.176525]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.177175]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.177673] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.178307]                                      ^
[   16.178676]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.179151]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.179599] ==================================================================
[   15.100349] ==================================================================
[   15.100828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.101546] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.102052] 
[   15.102742] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.102863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.102923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.102967] Call Trace:
[   15.103014]  <TASK>
[   15.103056]  dump_stack_lvl+0x73/0xb0
[   15.103126]  print_report+0xd1/0x650
[   15.103186]  ? __virt_addr_valid+0x1db/0x2d0
[   15.103246]  ? kasan_atomics_helper+0xac7/0x5450
[   15.103296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.103340]  ? kasan_atomics_helper+0xac7/0x5450
[   15.103378]  kasan_report+0x141/0x180
[   15.103403]  ? kasan_atomics_helper+0xac7/0x5450
[   15.103429]  kasan_check_range+0x10c/0x1c0
[   15.103450]  __kasan_check_write+0x18/0x20
[   15.103470]  kasan_atomics_helper+0xac7/0x5450
[   15.103492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.103514]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.103544]  ? kasan_atomics+0x152/0x310
[   15.103578]  kasan_atomics+0x1dc/0x310
[   15.103599]  ? __pfx_kasan_atomics+0x10/0x10
[   15.103619]  ? __pfx_read_tsc+0x10/0x10
[   15.103658]  ? ktime_get_ts64+0x86/0x230
[   15.103684]  kunit_try_run_case+0x1a5/0x480
[   15.103709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.103730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.103754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.103776]  ? __kthread_parkme+0x82/0x180
[   15.103799]  ? preempt_count_sub+0x50/0x80
[   15.103824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.103846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.103868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.103890]  kthread+0x337/0x6f0
[   15.103944]  ? trace_preempt_on+0x20/0xc0
[   15.103971]  ? __pfx_kthread+0x10/0x10
[   15.103989]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.104011]  ? calculate_sigpending+0x7b/0xa0
[   15.104034]  ? __pfx_kthread+0x10/0x10
[   15.104052]  ret_from_fork+0x41/0x80
[   15.104072]  ? __pfx_kthread+0x10/0x10
[   15.104089]  ret_from_fork_asm+0x1a/0x30
[   15.104119]  </TASK>
[   15.104133] 
[   15.113644] Allocated by task 285:
[   15.114019]  kasan_save_stack+0x45/0x70
[   15.114256]  kasan_save_track+0x18/0x40
[   15.114548]  kasan_save_alloc_info+0x3b/0x50
[   15.115045]  __kasan_kmalloc+0xb7/0xc0
[   15.115335]  __kmalloc_cache_noprof+0x189/0x420
[   15.115911]  kasan_atomics+0x95/0x310
[   15.117084]  kunit_try_run_case+0x1a5/0x480
[   15.117516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.118131]  kthread+0x337/0x6f0
[   15.118445]  ret_from_fork+0x41/0x80
[   15.118757]  ret_from_fork_asm+0x1a/0x30
[   15.118953] 
[   15.119126] The buggy address belongs to the object at ffff8881029ef680
[   15.119126]  which belongs to the cache kmalloc-64 of size 64
[   15.119585] The buggy address is located 0 bytes to the right of
[   15.119585]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.120228] 
[   15.120401] The buggy address belongs to the physical page:
[   15.120857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.121181] flags: 0x200000000000000(node=0|zone=2)
[   15.121523] page_type: f5(slab)
[   15.121840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.122115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.122668] page dumped because: kasan: bad access detected
[   15.122969] 
[   15.123100] Memory state around the buggy address:
[   15.123412]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.123777]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.124045] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.124433]                                      ^
[   15.124841]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125221]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125519] ==================================================================
[   14.682146] ==================================================================
[   14.683379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.683926] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.684250] 
[   14.684495] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.684591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.684617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.684672] Call Trace:
[   14.684716]  <TASK>
[   14.684756]  dump_stack_lvl+0x73/0xb0
[   14.684843]  print_report+0xd1/0x650
[   14.684887]  ? __virt_addr_valid+0x1db/0x2d0
[   14.684930]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.684973]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.685030]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.685074]  kasan_report+0x141/0x180
[   14.685118]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.685170]  __asan_report_store4_noabort+0x1b/0x30
[   14.685215]  kasan_atomics_helper+0x4b6e/0x5450
[   14.685256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.685525]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.685598]  ? kasan_atomics+0x152/0x310
[   14.685717]  kasan_atomics+0x1dc/0x310
[   14.685745]  ? __pfx_kasan_atomics+0x10/0x10
[   14.685767]  ? __pfx_read_tsc+0x10/0x10
[   14.685788]  ? ktime_get_ts64+0x86/0x230
[   14.685813]  kunit_try_run_case+0x1a5/0x480
[   14.685840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.685862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.685887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.685911]  ? __kthread_parkme+0x82/0x180
[   14.685933]  ? preempt_count_sub+0x50/0x80
[   14.685972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.685996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.686020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.686043]  kthread+0x337/0x6f0
[   14.686062]  ? trace_preempt_on+0x20/0xc0
[   14.686086]  ? __pfx_kthread+0x10/0x10
[   14.686105]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.686126]  ? calculate_sigpending+0x7b/0xa0
[   14.686148]  ? __pfx_kthread+0x10/0x10
[   14.686168]  ret_from_fork+0x41/0x80
[   14.686189]  ? __pfx_kthread+0x10/0x10
[   14.686210]  ret_from_fork_asm+0x1a/0x30
[   14.686241]  </TASK>
[   14.686254] 
[   14.699037] Allocated by task 285:
[   14.699283]  kasan_save_stack+0x45/0x70
[   14.699510]  kasan_save_track+0x18/0x40
[   14.700289]  kasan_save_alloc_info+0x3b/0x50
[   14.700518]  __kasan_kmalloc+0xb7/0xc0
[   14.700704]  __kmalloc_cache_noprof+0x189/0x420
[   14.701423]  kasan_atomics+0x95/0x310
[   14.701832]  kunit_try_run_case+0x1a5/0x480
[   14.702184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.702584]  kthread+0x337/0x6f0
[   14.702754]  ret_from_fork+0x41/0x80
[   14.703413]  ret_from_fork_asm+0x1a/0x30
[   14.703788] 
[   14.703928] The buggy address belongs to the object at ffff8881029ef680
[   14.703928]  which belongs to the cache kmalloc-64 of size 64
[   14.705197] The buggy address is located 0 bytes to the right of
[   14.705197]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.705580] 
[   14.705681] The buggy address belongs to the physical page:
[   14.705822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.706929] flags: 0x200000000000000(node=0|zone=2)
[   14.707213] page_type: f5(slab)
[   14.707986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.708217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.709082] page dumped because: kasan: bad access detected
[   14.709485] 
[   14.709642] Memory state around the buggy address:
[   14.709888]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.710679]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711711] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.711980]                                      ^
[   14.712169]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713025]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713361] ==================================================================
[   14.958411] ==================================================================
[   14.958753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.959349] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.959992] 
[   14.960190] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.960295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.960322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.960370] Call Trace:
[   14.960418]  <TASK>
[   14.960460]  dump_stack_lvl+0x73/0xb0
[   14.960518]  print_report+0xd1/0x650
[   14.960573]  ? __virt_addr_valid+0x1db/0x2d0
[   14.960609]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.960661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.960698]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.960728]  kasan_report+0x141/0x180
[   14.960761]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.960799]  kasan_check_range+0x10c/0x1c0
[   14.960834]  __kasan_check_write+0x18/0x20
[   14.960909]  kasan_atomics_helper+0x7c7/0x5450
[   14.960966]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.961032]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.961107]  ? kasan_atomics+0x152/0x310
[   14.961163]  kasan_atomics+0x1dc/0x310
[   14.961207]  ? __pfx_kasan_atomics+0x10/0x10
[   14.961252]  ? __pfx_read_tsc+0x10/0x10
[   14.961294]  ? ktime_get_ts64+0x86/0x230
[   14.961345]  kunit_try_run_case+0x1a5/0x480
[   14.961397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.961484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.961550]  ? __kthread_parkme+0x82/0x180
[   14.961591]  ? preempt_count_sub+0x50/0x80
[   14.961664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.961817]  kthread+0x337/0x6f0
[   14.961849]  ? trace_preempt_on+0x20/0xc0
[   14.961894]  ? __pfx_kthread+0x10/0x10
[   14.961964]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.962021]  ? calculate_sigpending+0x7b/0xa0
[   14.962069]  ? __pfx_kthread+0x10/0x10
[   14.962113]  ret_from_fork+0x41/0x80
[   14.962159]  ? __pfx_kthread+0x10/0x10
[   14.962199]  ret_from_fork_asm+0x1a/0x30
[   14.962256]  </TASK>
[   14.962280] 
[   14.975294] Allocated by task 285:
[   14.975662]  kasan_save_stack+0x45/0x70
[   14.976053]  kasan_save_track+0x18/0x40
[   14.976393]  kasan_save_alloc_info+0x3b/0x50
[   14.976904]  __kasan_kmalloc+0xb7/0xc0
[   14.977249]  __kmalloc_cache_noprof+0x189/0x420
[   14.977721]  kasan_atomics+0x95/0x310
[   14.977893]  kunit_try_run_case+0x1a5/0x480
[   14.978232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978689]  kthread+0x337/0x6f0
[   14.979008]  ret_from_fork+0x41/0x80
[   14.979280]  ret_from_fork_asm+0x1a/0x30
[   14.979755] 
[   14.979856] The buggy address belongs to the object at ffff8881029ef680
[   14.979856]  which belongs to the cache kmalloc-64 of size 64
[   14.980611] The buggy address is located 0 bytes to the right of
[   14.980611]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.981741] 
[   14.981896] The buggy address belongs to the physical page:
[   14.982191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.983109] flags: 0x200000000000000(node=0|zone=2)
[   14.983448] page_type: f5(slab)
[   14.983834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.984219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.984586] page dumped because: kasan: bad access detected
[   14.985064] 
[   14.985239] Memory state around the buggy address:
[   14.985738]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986103]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986775] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.987257]                                      ^
[   14.988240]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988488]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.989187] ==================================================================
[   15.480595] ==================================================================
[   15.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.481461] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.482223] 
[   15.482473] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.482590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.482616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.482674] Call Trace:
[   15.482749]  <TASK>
[   15.482804]  dump_stack_lvl+0x73/0xb0
[   15.482862]  print_report+0xd1/0x650
[   15.482888]  ? __virt_addr_valid+0x1db/0x2d0
[   15.482911]  ? kasan_atomics_helper+0x1217/0x5450
[   15.482932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.482955]  ? kasan_atomics_helper+0x1217/0x5450
[   15.482976]  kasan_report+0x141/0x180
[   15.483008]  ? kasan_atomics_helper+0x1217/0x5450
[   15.483042]  kasan_check_range+0x10c/0x1c0
[   15.483062]  __kasan_check_write+0x18/0x20
[   15.483081]  kasan_atomics_helper+0x1217/0x5450
[   15.483103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.483124]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.483146]  ? kasan_atomics+0x152/0x310
[   15.483168]  kasan_atomics+0x1dc/0x310
[   15.483186]  ? __pfx_kasan_atomics+0x10/0x10
[   15.483206]  ? __pfx_read_tsc+0x10/0x10
[   15.483226]  ? ktime_get_ts64+0x86/0x230
[   15.483251]  kunit_try_run_case+0x1a5/0x480
[   15.483275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.483296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.483319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.483340]  ? __kthread_parkme+0x82/0x180
[   15.483362]  ? preempt_count_sub+0x50/0x80
[   15.483385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.483407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.483429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.483450]  kthread+0x337/0x6f0
[   15.483466]  ? trace_preempt_on+0x20/0xc0
[   15.483489]  ? __pfx_kthread+0x10/0x10
[   15.483506]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.483527]  ? calculate_sigpending+0x7b/0xa0
[   15.483567]  ? __pfx_kthread+0x10/0x10
[   15.483586]  ret_from_fork+0x41/0x80
[   15.483606]  ? __pfx_kthread+0x10/0x10
[   15.483640]  ret_from_fork_asm+0x1a/0x30
[   15.483672]  </TASK>
[   15.483686] 
[   15.493100] Allocated by task 285:
[   15.493486]  kasan_save_stack+0x45/0x70
[   15.493878]  kasan_save_track+0x18/0x40
[   15.494277]  kasan_save_alloc_info+0x3b/0x50
[   15.494712]  __kasan_kmalloc+0xb7/0xc0
[   15.495015]  __kmalloc_cache_noprof+0x189/0x420
[   15.495395]  kasan_atomics+0x95/0x310
[   15.495746]  kunit_try_run_case+0x1a5/0x480
[   15.496108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.496573]  kthread+0x337/0x6f0
[   15.496883]  ret_from_fork+0x41/0x80
[   15.497188]  ret_from_fork_asm+0x1a/0x30
[   15.497363] 
[   15.497470] The buggy address belongs to the object at ffff8881029ef680
[   15.497470]  which belongs to the cache kmalloc-64 of size 64
[   15.498224] The buggy address is located 0 bytes to the right of
[   15.498224]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.499140] 
[   15.499302] The buggy address belongs to the physical page:
[   15.499737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.500088] flags: 0x200000000000000(node=0|zone=2)
[   15.500445] page_type: f5(slab)
[   15.500807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.501184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.501747] page dumped because: kasan: bad access detected
[   15.502043] 
[   15.502205] Memory state around the buggy address:
[   15.502473]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.502936]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503189] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.503754]                                      ^
[   15.504233]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504546]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504871] ==================================================================
[   16.026697] ==================================================================
[   16.027215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.027616] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.028102] 
[   16.028327] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.028449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.028477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.028523] Call Trace:
[   16.028599]  <TASK>
[   16.028658]  dump_stack_lvl+0x73/0xb0
[   16.028735]  print_report+0xd1/0x650
[   16.028795]  ? __virt_addr_valid+0x1db/0x2d0
[   16.028838]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.028889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.028928]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.028971]  kasan_report+0x141/0x180
[   16.029016]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.029070]  kasan_check_range+0x10c/0x1c0
[   16.029114]  __kasan_check_write+0x18/0x20
[   16.029156]  kasan_atomics_helper+0x1ce1/0x5450
[   16.029203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.029245]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.029288]  ? kasan_atomics+0x152/0x310
[   16.029339]  kasan_atomics+0x1dc/0x310
[   16.029381]  ? __pfx_kasan_atomics+0x10/0x10
[   16.029423]  ? __pfx_read_tsc+0x10/0x10
[   16.029456]  ? ktime_get_ts64+0x86/0x230
[   16.029503]  kunit_try_run_case+0x1a5/0x480
[   16.029588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.029640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.029686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.029737]  ? __kthread_parkme+0x82/0x180
[   16.029781]  ? preempt_count_sub+0x50/0x80
[   16.029848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.029898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.029952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.030004]  kthread+0x337/0x6f0
[   16.030046]  ? trace_preempt_on+0x20/0xc0
[   16.030097]  ? __pfx_kthread+0x10/0x10
[   16.030139]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.030184]  ? calculate_sigpending+0x7b/0xa0
[   16.030231]  ? __pfx_kthread+0x10/0x10
[   16.030252]  ret_from_fork+0x41/0x80
[   16.030274]  ? __pfx_kthread+0x10/0x10
[   16.030292]  ret_from_fork_asm+0x1a/0x30
[   16.030322]  </TASK>
[   16.030335] 
[   16.039719] Allocated by task 285:
[   16.039951]  kasan_save_stack+0x45/0x70
[   16.040172]  kasan_save_track+0x18/0x40
[   16.040343]  kasan_save_alloc_info+0x3b/0x50
[   16.040537]  __kasan_kmalloc+0xb7/0xc0
[   16.040856]  __kmalloc_cache_noprof+0x189/0x420
[   16.041277]  kasan_atomics+0x95/0x310
[   16.041584]  kunit_try_run_case+0x1a5/0x480
[   16.041914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.042173]  kthread+0x337/0x6f0
[   16.042332]  ret_from_fork+0x41/0x80
[   16.042502]  ret_from_fork_asm+0x1a/0x30
[   16.042815] 
[   16.042982] The buggy address belongs to the object at ffff8881029ef680
[   16.042982]  which belongs to the cache kmalloc-64 of size 64
[   16.043837] The buggy address is located 0 bytes to the right of
[   16.043837]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.044642] 
[   16.044825] The buggy address belongs to the physical page:
[   16.045104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.045423] flags: 0x200000000000000(node=0|zone=2)
[   16.045779] page_type: f5(slab)
[   16.045969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.046278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.048293] page dumped because: kasan: bad access detected
[   16.048521] 
[   16.048707] Memory state around the buggy address:
[   16.049064]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049444]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.050118] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.050397]                                      ^
[   16.050598]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.051144]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.051584] ==================================================================
[   15.266941] ==================================================================
[   15.267204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.268091] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.268485] 
[   15.268748] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.268924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.268955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.269002] Call Trace:
[   15.269045]  <TASK>
[   15.269089]  dump_stack_lvl+0x73/0xb0
[   15.269153]  print_report+0xd1/0x650
[   15.269194]  ? __virt_addr_valid+0x1db/0x2d0
[   15.269219]  ? kasan_atomics_helper+0xe78/0x5450
[   15.269240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.269261]  ? kasan_atomics_helper+0xe78/0x5450
[   15.269282]  kasan_report+0x141/0x180
[   15.269304]  ? kasan_atomics_helper+0xe78/0x5450
[   15.269329]  kasan_check_range+0x10c/0x1c0
[   15.269349]  __kasan_check_write+0x18/0x20
[   15.269369]  kasan_atomics_helper+0xe78/0x5450
[   15.269390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.269412]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.269433]  ? kasan_atomics+0x152/0x310
[   15.269455]  kasan_atomics+0x1dc/0x310
[   15.269474]  ? __pfx_kasan_atomics+0x10/0x10
[   15.269495]  ? __pfx_read_tsc+0x10/0x10
[   15.269515]  ? ktime_get_ts64+0x86/0x230
[   15.269571]  kunit_try_run_case+0x1a5/0x480
[   15.269602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.269641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.269668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.269691]  ? __kthread_parkme+0x82/0x180
[   15.269714]  ? preempt_count_sub+0x50/0x80
[   15.269739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.269762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.269786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.269808]  kthread+0x337/0x6f0
[   15.269826]  ? trace_preempt_on+0x20/0xc0
[   15.269850]  ? __pfx_kthread+0x10/0x10
[   15.269868]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.269890]  ? calculate_sigpending+0x7b/0xa0
[   15.269913]  ? __pfx_kthread+0x10/0x10
[   15.269932]  ret_from_fork+0x41/0x80
[   15.269964]  ? __pfx_kthread+0x10/0x10
[   15.269984]  ret_from_fork_asm+0x1a/0x30
[   15.270016]  </TASK>
[   15.270030] 
[   15.281047] Allocated by task 285:
[   15.281415]  kasan_save_stack+0x45/0x70
[   15.281834]  kasan_save_track+0x18/0x40
[   15.282174]  kasan_save_alloc_info+0x3b/0x50
[   15.282502]  __kasan_kmalloc+0xb7/0xc0
[   15.282861]  __kmalloc_cache_noprof+0x189/0x420
[   15.283062]  kasan_atomics+0x95/0x310
[   15.283230]  kunit_try_run_case+0x1a5/0x480
[   15.283600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.284053]  kthread+0x337/0x6f0
[   15.284338]  ret_from_fork+0x41/0x80
[   15.284663]  ret_from_fork_asm+0x1a/0x30
[   15.284999] 
[   15.285171] The buggy address belongs to the object at ffff8881029ef680
[   15.285171]  which belongs to the cache kmalloc-64 of size 64
[   15.285564] The buggy address is located 0 bytes to the right of
[   15.285564]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.286425] 
[   15.286648] The buggy address belongs to the physical page:
[   15.286929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.287519] flags: 0x200000000000000(node=0|zone=2)
[   15.287970] page_type: f5(slab)
[   15.288164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.288854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.289277] page dumped because: kasan: bad access detected
[   15.289784] 
[   15.289957] Memory state around the buggy address:
[   15.290333]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.291085]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.291639] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.291937]                                      ^
[   15.292272]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.292741]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.293159] ==================================================================
[   15.400453] ==================================================================
[   15.401034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.401606] Read of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.402069] 
[   15.402293] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.402403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.402432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.402473] Call Trace:
[   15.402521]  <TASK>
[   15.402690]  dump_stack_lvl+0x73/0xb0
[   15.402778]  print_report+0xd1/0x650
[   15.402828]  ? __virt_addr_valid+0x1db/0x2d0
[   15.402873]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.402914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.402938]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.402961]  kasan_report+0x141/0x180
[   15.402984]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.403009]  __asan_report_load4_noabort+0x18/0x20
[   15.403029]  kasan_atomics_helper+0x4a1c/0x5450
[   15.403051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.403073]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.403093]  ? kasan_atomics+0x152/0x310
[   15.403118]  kasan_atomics+0x1dc/0x310
[   15.403137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.403158]  ? __pfx_read_tsc+0x10/0x10
[   15.403178]  ? ktime_get_ts64+0x86/0x230
[   15.403203]  kunit_try_run_case+0x1a5/0x480
[   15.403227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.403271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.403292]  ? __kthread_parkme+0x82/0x180
[   15.403314]  ? preempt_count_sub+0x50/0x80
[   15.403338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.403360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.403382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.403404]  kthread+0x337/0x6f0
[   15.403420]  ? trace_preempt_on+0x20/0xc0
[   15.403443]  ? __pfx_kthread+0x10/0x10
[   15.403461]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.403482]  ? calculate_sigpending+0x7b/0xa0
[   15.403503]  ? __pfx_kthread+0x10/0x10
[   15.403521]  ret_from_fork+0x41/0x80
[   15.403565]  ? __pfx_kthread+0x10/0x10
[   15.403587]  ret_from_fork_asm+0x1a/0x30
[   15.403618]  </TASK>
[   15.403647] 
[   15.413040] Allocated by task 285:
[   15.413429]  kasan_save_stack+0x45/0x70
[   15.413792]  kasan_save_track+0x18/0x40
[   15.414042]  kasan_save_alloc_info+0x3b/0x50
[   15.414322]  __kasan_kmalloc+0xb7/0xc0
[   15.414684]  __kmalloc_cache_noprof+0x189/0x420
[   15.414885]  kasan_atomics+0x95/0x310
[   15.415183]  kunit_try_run_case+0x1a5/0x480
[   15.415524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415763]  kthread+0x337/0x6f0
[   15.416032]  ret_from_fork+0x41/0x80
[   15.416299]  ret_from_fork_asm+0x1a/0x30
[   15.416567] 
[   15.416727] The buggy address belongs to the object at ffff8881029ef680
[   15.416727]  which belongs to the cache kmalloc-64 of size 64
[   15.417199] The buggy address is located 0 bytes to the right of
[   15.417199]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.417564] 
[   15.417745] The buggy address belongs to the physical page:
[   15.418240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.418833] flags: 0x200000000000000(node=0|zone=2)
[   15.419236] page_type: f5(slab)
[   15.419486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.419856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.420102] page dumped because: kasan: bad access detected
[   15.420332] 
[   15.420477] Memory state around the buggy address:
[   15.420881]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.421501]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.422026] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.422299]                                      ^
[   15.422497]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423155]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423642] ==================================================================
[   15.424936] ==================================================================
[   15.425380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.425690] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.425950] 
[   15.426100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.426214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.426237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.426281] Call Trace:
[   15.426321]  <TASK>
[   15.426362]  dump_stack_lvl+0x73/0xb0
[   15.426412]  print_report+0xd1/0x650
[   15.426446]  ? __virt_addr_valid+0x1db/0x2d0
[   15.426480]  ? kasan_atomics_helper+0x1148/0x5450
[   15.426510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.426542]  ? kasan_atomics_helper+0x1148/0x5450
[   15.426575]  kasan_report+0x141/0x180
[   15.426609]  ? kasan_atomics_helper+0x1148/0x5450
[   15.426676]  kasan_check_range+0x10c/0x1c0
[   15.426715]  __kasan_check_write+0x18/0x20
[   15.426758]  kasan_atomics_helper+0x1148/0x5450
[   15.426803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.426851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.426899]  ? kasan_atomics+0x152/0x310
[   15.426952]  kasan_atomics+0x1dc/0x310
[   15.426993]  ? __pfx_kasan_atomics+0x10/0x10
[   15.427038]  ? __pfx_read_tsc+0x10/0x10
[   15.427078]  ? ktime_get_ts64+0x86/0x230
[   15.427130]  kunit_try_run_case+0x1a5/0x480
[   15.427182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.427274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.427314]  ? __kthread_parkme+0x82/0x180
[   15.427344]  ? preempt_count_sub+0x50/0x80
[   15.427377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.427471]  kthread+0x337/0x6f0
[   15.427496]  ? trace_preempt_on+0x20/0xc0
[   15.427529]  ? __pfx_kthread+0x10/0x10
[   15.427558]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.427589]  ? calculate_sigpending+0x7b/0xa0
[   15.427637]  ? __pfx_kthread+0x10/0x10
[   15.427674]  ret_from_fork+0x41/0x80
[   15.427712]  ? __pfx_kthread+0x10/0x10
[   15.427743]  ret_from_fork_asm+0x1a/0x30
[   15.427808]  </TASK>
[   15.427832] 
[   15.440105] Allocated by task 285:
[   15.440373]  kasan_save_stack+0x45/0x70
[   15.441312]  kasan_save_track+0x18/0x40
[   15.442075]  kasan_save_alloc_info+0x3b/0x50
[   15.442464]  __kasan_kmalloc+0xb7/0xc0
[   15.442832]  __kmalloc_cache_noprof+0x189/0x420
[   15.443220]  kasan_atomics+0x95/0x310
[   15.443504]  kunit_try_run_case+0x1a5/0x480
[   15.443700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.444004]  kthread+0x337/0x6f0
[   15.444167]  ret_from_fork+0x41/0x80
[   15.444480]  ret_from_fork_asm+0x1a/0x30
[   15.444714] 
[   15.444817] The buggy address belongs to the object at ffff8881029ef680
[   15.444817]  which belongs to the cache kmalloc-64 of size 64
[   15.445455] The buggy address is located 0 bytes to the right of
[   15.445455]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.446179] 
[   15.446400] The buggy address belongs to the physical page:
[   15.446804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.447104] flags: 0x200000000000000(node=0|zone=2)
[   15.447467] page_type: f5(slab)
[   15.447762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.448131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.448575] page dumped because: kasan: bad access detected
[   15.448804] 
[   15.448973] Memory state around the buggy address:
[   15.449210]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.449683]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.450067] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.450434]                                      ^
[   15.450638]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.451156]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.451718] ==================================================================
[   14.807241] ==================================================================
[   14.808404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.809169] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.810075] 
[   14.810314] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.810528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.810555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.810595] Call Trace:
[   14.810657]  <TASK>
[   14.810702]  dump_stack_lvl+0x73/0xb0
[   14.810770]  print_report+0xd1/0x650
[   14.810818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.810863]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.810909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.810949]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.810981]  kasan_report+0x141/0x180
[   14.811005]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.811031]  __asan_report_store4_noabort+0x1b/0x30
[   14.811053]  kasan_atomics_helper+0x4b3a/0x5450
[   14.811076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.811098]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.811121]  ? kasan_atomics+0x152/0x310
[   14.811143]  kasan_atomics+0x1dc/0x310
[   14.811163]  ? __pfx_kasan_atomics+0x10/0x10
[   14.811183]  ? __pfx_read_tsc+0x10/0x10
[   14.811202]  ? ktime_get_ts64+0x86/0x230
[   14.811227]  kunit_try_run_case+0x1a5/0x480
[   14.811251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.811271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.811318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.811340]  ? __kthread_parkme+0x82/0x180
[   14.811361]  ? preempt_count_sub+0x50/0x80
[   14.811386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.811408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.811432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.811453]  kthread+0x337/0x6f0
[   14.811470]  ? trace_preempt_on+0x20/0xc0
[   14.811493]  ? __pfx_kthread+0x10/0x10
[   14.811511]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.811531]  ? calculate_sigpending+0x7b/0xa0
[   14.811593]  ? __pfx_kthread+0x10/0x10
[   14.811638]  ret_from_fork+0x41/0x80
[   14.811678]  ? __pfx_kthread+0x10/0x10
[   14.811718]  ret_from_fork_asm+0x1a/0x30
[   14.811752]  </TASK>
[   14.811766] 
[   14.823503] Allocated by task 285:
[   14.823969]  kasan_save_stack+0x45/0x70
[   14.824764]  kasan_save_track+0x18/0x40
[   14.825512]  kasan_save_alloc_info+0x3b/0x50
[   14.825706]  __kasan_kmalloc+0xb7/0xc0
[   14.826146]  __kmalloc_cache_noprof+0x189/0x420
[   14.826774]  kasan_atomics+0x95/0x310
[   14.827089]  kunit_try_run_case+0x1a5/0x480
[   14.827579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.827968]  kthread+0x337/0x6f0
[   14.828274]  ret_from_fork+0x41/0x80
[   14.828645]  ret_from_fork_asm+0x1a/0x30
[   14.828953] 
[   14.829125] The buggy address belongs to the object at ffff8881029ef680
[   14.829125]  which belongs to the cache kmalloc-64 of size 64
[   14.830270] The buggy address is located 0 bytes to the right of
[   14.830270]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   14.830896] 
[   14.831071] The buggy address belongs to the physical page:
[   14.831349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   14.831843] flags: 0x200000000000000(node=0|zone=2)
[   14.832063] page_type: f5(slab)
[   14.832231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.833068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.833734] page dumped because: kasan: bad access detected
[   14.834716] 
[   14.834828] Memory state around the buggy address:
[   14.834999]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.835960]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.836370] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.837569]                                      ^
[   14.838031]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.838500]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.839494] ==================================================================
[   15.016374] ==================================================================
[   15.016924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.018250] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.018988] 
[   15.019270] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.019634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.019659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.019688] Call Trace:
[   15.019715]  <TASK>
[   15.019743]  dump_stack_lvl+0x73/0xb0
[   15.019783]  print_report+0xd1/0x650
[   15.019807]  ? __virt_addr_valid+0x1db/0x2d0
[   15.019830]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.019851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.019874]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.019895]  kasan_report+0x141/0x180
[   15.019917]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.019944]  kasan_check_range+0x10c/0x1c0
[   15.019965]  __kasan_check_write+0x18/0x20
[   15.019984]  kasan_atomics_helper+0x8f9/0x5450
[   15.020006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.020028]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.020050]  ? kasan_atomics+0x152/0x310
[   15.020072]  kasan_atomics+0x1dc/0x310
[   15.020091]  ? __pfx_kasan_atomics+0x10/0x10
[   15.020112]  ? __pfx_read_tsc+0x10/0x10
[   15.020131]  ? ktime_get_ts64+0x86/0x230
[   15.020156]  kunit_try_run_case+0x1a5/0x480
[   15.020181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.020227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.020250]  ? __kthread_parkme+0x82/0x180
[   15.020272]  ? preempt_count_sub+0x50/0x80
[   15.020336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.020444]  kthread+0x337/0x6f0
[   15.020470]  ? trace_preempt_on+0x20/0xc0
[   15.020500]  ? __pfx_kthread+0x10/0x10
[   15.020526]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.020567]  ? calculate_sigpending+0x7b/0xa0
[   15.020597]  ? __pfx_kthread+0x10/0x10
[   15.020637]  ret_from_fork+0x41/0x80
[   15.020669]  ? __pfx_kthread+0x10/0x10
[   15.020697]  ret_from_fork_asm+0x1a/0x30
[   15.020738]  </TASK>
[   15.020756] 
[   15.030266] Allocated by task 285:
[   15.030740]  kasan_save_stack+0x45/0x70
[   15.031693]  kasan_save_track+0x18/0x40
[   15.032054]  kasan_save_alloc_info+0x3b/0x50
[   15.032515]  __kasan_kmalloc+0xb7/0xc0
[   15.032904]  __kmalloc_cache_noprof+0x189/0x420
[   15.033437]  kasan_atomics+0x95/0x310
[   15.033800]  kunit_try_run_case+0x1a5/0x480
[   15.034129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.034452]  kthread+0x337/0x6f0
[   15.034672]  ret_from_fork+0x41/0x80
[   15.035323]  ret_from_fork_asm+0x1a/0x30
[   15.035650] 
[   15.035772] The buggy address belongs to the object at ffff8881029ef680
[   15.035772]  which belongs to the cache kmalloc-64 of size 64
[   15.036344] The buggy address is located 0 bytes to the right of
[   15.036344]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.037401] 
[   15.037572] The buggy address belongs to the physical page:
[   15.037956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.038541] flags: 0x200000000000000(node=0|zone=2)
[   15.038903] page_type: f5(slab)
[   15.039508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.039983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.040609] page dumped because: kasan: bad access detected
[   15.040918] 
[   15.041038] Memory state around the buggy address:
[   15.041215]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.042047]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.043076] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.043319]                                      ^
[   15.043742]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.044162]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.044479] ==================================================================
[   15.046098] ==================================================================
[   15.046403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.046779] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.047090] 
[   15.047396] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.047505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.047531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.047600] Call Trace:
[   15.047659]  <TASK>
[   15.047701]  dump_stack_lvl+0x73/0xb0
[   15.047762]  print_report+0xd1/0x650
[   15.047812]  ? __virt_addr_valid+0x1db/0x2d0
[   15.047859]  ? kasan_atomics_helper+0x992/0x5450
[   15.047901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.047938]  ? kasan_atomics_helper+0x992/0x5450
[   15.047979]  kasan_report+0x141/0x180
[   15.048021]  ? kasan_atomics_helper+0x992/0x5450
[   15.048076]  kasan_check_range+0x10c/0x1c0
[   15.048120]  __kasan_check_write+0x18/0x20
[   15.048163]  kasan_atomics_helper+0x992/0x5450
[   15.048212]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.048259]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.048411]  ? kasan_atomics+0x152/0x310
[   15.048442]  kasan_atomics+0x1dc/0x310
[   15.048463]  ? __pfx_kasan_atomics+0x10/0x10
[   15.048486]  ? __pfx_read_tsc+0x10/0x10
[   15.048506]  ? ktime_get_ts64+0x86/0x230
[   15.048531]  kunit_try_run_case+0x1a5/0x480
[   15.048568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.048590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.048615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.048657]  ? __kthread_parkme+0x82/0x180
[   15.048680]  ? preempt_count_sub+0x50/0x80
[   15.048705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.048728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.048751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.048773]  kthread+0x337/0x6f0
[   15.048792]  ? trace_preempt_on+0x20/0xc0
[   15.048816]  ? __pfx_kthread+0x10/0x10
[   15.048835]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.048856]  ? calculate_sigpending+0x7b/0xa0
[   15.048878]  ? __pfx_kthread+0x10/0x10
[   15.048897]  ret_from_fork+0x41/0x80
[   15.048917]  ? __pfx_kthread+0x10/0x10
[   15.048936]  ret_from_fork_asm+0x1a/0x30
[   15.048966]  </TASK>
[   15.048980] 
[   15.059779] Allocated by task 285:
[   15.060055]  kasan_save_stack+0x45/0x70
[   15.060335]  kasan_save_track+0x18/0x40
[   15.060542]  kasan_save_alloc_info+0x3b/0x50
[   15.060852]  __kasan_kmalloc+0xb7/0xc0
[   15.061174]  __kmalloc_cache_noprof+0x189/0x420
[   15.061534]  kasan_atomics+0x95/0x310
[   15.061752]  kunit_try_run_case+0x1a5/0x480
[   15.061937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062162]  kthread+0x337/0x6f0
[   15.062319]  ret_from_fork+0x41/0x80
[   15.062485]  ret_from_fork_asm+0x1a/0x30
[   15.062781] 
[   15.062932] The buggy address belongs to the object at ffff8881029ef680
[   15.062932]  which belongs to the cache kmalloc-64 of size 64
[   15.063799] The buggy address is located 0 bytes to the right of
[   15.063799]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.064964] 
[   15.065156] The buggy address belongs to the physical page:
[   15.065649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.066060] flags: 0x200000000000000(node=0|zone=2)
[   15.066215] page_type: f5(slab)
[   15.066447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.067112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.067525] page dumped because: kasan: bad access detected
[   15.067877] 
[   15.068170] Memory state around the buggy address:
[   15.068783]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.069123]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.070327] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.071040]                                      ^
[   15.072311]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.072690]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073049] ==================================================================
[   15.688056] ==================================================================
[   15.688695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.689409] Write of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.690110] 
[   15.690361] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.690476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.690525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.690601] Call Trace:
[   15.690681]  <TASK>
[   15.690736]  dump_stack_lvl+0x73/0xb0
[   15.690805]  print_report+0xd1/0x650
[   15.690850]  ? __virt_addr_valid+0x1db/0x2d0
[   15.690894]  ? kasan_atomics_helper+0x151d/0x5450
[   15.690971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.691031]  ? kasan_atomics_helper+0x151d/0x5450
[   15.691056]  kasan_report+0x141/0x180
[   15.691091]  ? kasan_atomics_helper+0x151d/0x5450
[   15.691126]  kasan_check_range+0x10c/0x1c0
[   15.691148]  __kasan_check_write+0x18/0x20
[   15.691169]  kasan_atomics_helper+0x151d/0x5450
[   15.691191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.691213]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.691234]  ? kasan_atomics+0x152/0x310
[   15.691257]  kasan_atomics+0x1dc/0x310
[   15.691276]  ? __pfx_kasan_atomics+0x10/0x10
[   15.691297]  ? __pfx_read_tsc+0x10/0x10
[   15.691317]  ? ktime_get_ts64+0x86/0x230
[   15.691342]  kunit_try_run_case+0x1a5/0x480
[   15.691366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.691411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.691434]  ? __kthread_parkme+0x82/0x180
[   15.691457]  ? preempt_count_sub+0x50/0x80
[   15.691482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.691527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.691573]  kthread+0x337/0x6f0
[   15.691592]  ? trace_preempt_on+0x20/0xc0
[   15.691616]  ? __pfx_kthread+0x10/0x10
[   15.691655]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.691677]  ? calculate_sigpending+0x7b/0xa0
[   15.691699]  ? __pfx_kthread+0x10/0x10
[   15.691718]  ret_from_fork+0x41/0x80
[   15.691738]  ? __pfx_kthread+0x10/0x10
[   15.691756]  ret_from_fork_asm+0x1a/0x30
[   15.691788]  </TASK>
[   15.691802] 
[   15.701078] Allocated by task 285:
[   15.701437]  kasan_save_stack+0x45/0x70
[   15.701866]  kasan_save_track+0x18/0x40
[   15.702062]  kasan_save_alloc_info+0x3b/0x50
[   15.702315]  __kasan_kmalloc+0xb7/0xc0
[   15.702589]  __kmalloc_cache_noprof+0x189/0x420
[   15.702936]  kasan_atomics+0x95/0x310
[   15.703206]  kunit_try_run_case+0x1a5/0x480
[   15.703523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.703902]  kthread+0x337/0x6f0
[   15.704118]  ret_from_fork+0x41/0x80
[   15.704283]  ret_from_fork_asm+0x1a/0x30
[   15.704456] 
[   15.704558] The buggy address belongs to the object at ffff8881029ef680
[   15.704558]  which belongs to the cache kmalloc-64 of size 64
[   15.705357] The buggy address is located 0 bytes to the right of
[   15.705357]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.706415] 
[   15.706612] The buggy address belongs to the physical page:
[   15.706994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.707438] flags: 0x200000000000000(node=0|zone=2)
[   15.707801] page_type: f5(slab)
[   15.708061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.708513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.708964] page dumped because: kasan: bad access detected
[   15.709152] 
[   15.709251] Memory state around the buggy address:
[   15.709439]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.709820]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.710329] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.710978]                                      ^
[   15.711371]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.711877]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712119] ==================================================================
[   15.208524] ==================================================================
[   15.209096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.209743] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   15.210296] 
[   15.210505] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   15.210653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.210728] Call Trace:
[   15.210777]  <TASK>
[   15.210819]  dump_stack_lvl+0x73/0xb0
[   15.210882]  print_report+0xd1/0x650
[   15.210932]  ? __virt_addr_valid+0x1db/0x2d0
[   15.210972]  ? kasan_atomics_helper+0xd47/0x5450
[   15.211013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.211058]  ? kasan_atomics_helper+0xd47/0x5450
[   15.211104]  kasan_report+0x141/0x180
[   15.211149]  ? kasan_atomics_helper+0xd47/0x5450
[   15.211193]  kasan_check_range+0x10c/0x1c0
[   15.211217]  __kasan_check_write+0x18/0x20
[   15.211237]  kasan_atomics_helper+0xd47/0x5450
[   15.211260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.211283]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.211305]  ? kasan_atomics+0x152/0x310
[   15.211328]  kasan_atomics+0x1dc/0x310
[   15.211348]  ? __pfx_kasan_atomics+0x10/0x10
[   15.211369]  ? __pfx_read_tsc+0x10/0x10
[   15.211389]  ? ktime_get_ts64+0x86/0x230
[   15.211416]  kunit_try_run_case+0x1a5/0x480
[   15.211442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.211486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.211508]  ? __kthread_parkme+0x82/0x180
[   15.211529]  ? preempt_count_sub+0x50/0x80
[   15.211580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.211674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.211730]  kthread+0x337/0x6f0
[   15.211768]  ? trace_preempt_on+0x20/0xc0
[   15.211818]  ? __pfx_kthread+0x10/0x10
[   15.211856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.211900]  ? calculate_sigpending+0x7b/0xa0
[   15.211944]  ? __pfx_kthread+0x10/0x10
[   15.211985]  ret_from_fork+0x41/0x80
[   15.212029]  ? __pfx_kthread+0x10/0x10
[   15.212070]  ret_from_fork_asm+0x1a/0x30
[   15.212115]  </TASK>
[   15.212130] 
[   15.224459] Allocated by task 285:
[   15.224899]  kasan_save_stack+0x45/0x70
[   15.225079]  kasan_save_track+0x18/0x40
[   15.225348]  kasan_save_alloc_info+0x3b/0x50
[   15.225619]  __kasan_kmalloc+0xb7/0xc0
[   15.225909]  __kmalloc_cache_noprof+0x189/0x420
[   15.226169]  kasan_atomics+0x95/0x310
[   15.226382]  kunit_try_run_case+0x1a5/0x480
[   15.227123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.227335]  kthread+0x337/0x6f0
[   15.227571]  ret_from_fork+0x41/0x80
[   15.228088]  ret_from_fork_asm+0x1a/0x30
[   15.228457] 
[   15.228552] The buggy address belongs to the object at ffff8881029ef680
[   15.228552]  which belongs to the cache kmalloc-64 of size 64
[   15.229349] The buggy address is located 0 bytes to the right of
[   15.229349]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.230043] 
[   15.230384] The buggy address belongs to the physical page:
[   15.230578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.231231] flags: 0x200000000000000(node=0|zone=2)
[   15.231774] page_type: f5(slab)
[   15.231947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.232455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.232962] page dumped because: kasan: bad access detected
[   15.233228] 
[   15.233347] Memory state around the buggy address:
[   15.233597]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.234370]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.235133] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.235454]                                      ^
[   15.235763]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.236133]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.236502] ==================================================================
[   14.989954] ==================================================================
[   14.990521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.991208] Write of size 4 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   14.991542] 
[   14.991778] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.991880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.991908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.991975] Call Trace:
[   14.992021]  <TASK>
[   14.992060]  dump_stack_lvl+0x73/0xb0
[   14.992122]  print_report+0xd1/0x650
[   14.992170]  ? __virt_addr_valid+0x1db/0x2d0
[   14.992219]  ? kasan_atomics_helper+0x860/0x5450
[   14.992263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.992311]  ? kasan_atomics_helper+0x860/0x5450
[   14.992355]  kasan_report+0x141/0x180
[   14.992396]  ? kasan_atomics_helper+0x860/0x5450
[   14.992448]  kasan_check_range+0x10c/0x1c0
[   14.992643]  __kasan_check_write+0x18/0x20
[   14.992697]  kasan_atomics_helper+0x860/0x5450
[   14.992740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.992782]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.992826]  ? kasan_atomics+0x152/0x310
[   14.992878]  kasan_atomics+0x1dc/0x310
[   14.992914]  ? __pfx_kasan_atomics+0x10/0x10
[   14.992937]  ? __pfx_read_tsc+0x10/0x10
[   14.992957]  ? ktime_get_ts64+0x86/0x230
[   14.992982]  kunit_try_run_case+0x1a5/0x480
[   14.993007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993028]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.993051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.993073]  ? __kthread_parkme+0x82/0x180
[   14.993095]  ? preempt_count_sub+0x50/0x80
[   14.993120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.993164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.993185]  kthread+0x337/0x6f0
[   14.993202]  ? trace_preempt_on+0x20/0xc0
[   14.993225]  ? __pfx_kthread+0x10/0x10
[   14.993243]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.993263]  ? calculate_sigpending+0x7b/0xa0
[   14.993286]  ? __pfx_kthread+0x10/0x10
[   14.993314]  ret_from_fork+0x41/0x80
[   14.993343]  ? __pfx_kthread+0x10/0x10
[   14.993369]  ret_from_fork_asm+0x1a/0x30
[   14.993415]  </TASK>
[   14.993431] 
[   15.002160] Allocated by task 285:
[   15.002332]  kasan_save_stack+0x45/0x70
[   15.002506]  kasan_save_track+0x18/0x40
[   15.002811]  kasan_save_alloc_info+0x3b/0x50
[   15.003134]  __kasan_kmalloc+0xb7/0xc0
[   15.003427]  __kmalloc_cache_noprof+0x189/0x420
[   15.004513]  kasan_atomics+0x95/0x310
[   15.004879]  kunit_try_run_case+0x1a5/0x480
[   15.005064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005288]  kthread+0x337/0x6f0
[   15.005744]  ret_from_fork+0x41/0x80
[   15.005931]  ret_from_fork_asm+0x1a/0x30
[   15.006122] 
[   15.006227] The buggy address belongs to the object at ffff8881029ef680
[   15.006227]  which belongs to the cache kmalloc-64 of size 64
[   15.007745] The buggy address is located 0 bytes to the right of
[   15.007745]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   15.009229] 
[   15.009494] The buggy address belongs to the physical page:
[   15.010083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   15.010522] flags: 0x200000000000000(node=0|zone=2)
[   15.010842] page_type: f5(slab)
[   15.010970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.011144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.011313] page dumped because: kasan: bad access detected
[   15.011445] 
[   15.011513] Memory state around the buggy address:
[   15.012327]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.013137]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.013823] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.014406]                                      ^
[   15.014614]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.015316]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.015865] ==================================================================
[   16.250835] ==================================================================
[   16.252940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.253503] Read of size 8 at addr ffff8881029ef6b0 by task kunit_try_catch/285
[   16.253897] 
[   16.254099] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   16.254203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.254232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.254277] Call Trace:
[   16.254319]  <TASK>
[   16.254364]  dump_stack_lvl+0x73/0xb0
[   16.254423]  print_report+0xd1/0x650
[   16.254475]  ? __virt_addr_valid+0x1db/0x2d0
[   16.254526]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.254575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.256662]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.256758]  kasan_report+0x141/0x180
[   16.256813]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.256871]  __asan_report_load8_noabort+0x18/0x20
[   16.256915]  kasan_atomics_helper+0x4fb2/0x5450
[   16.256965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.257011]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.257058]  ? kasan_atomics+0x152/0x310
[   16.257109]  kasan_atomics+0x1dc/0x310
[   16.257148]  ? __pfx_kasan_atomics+0x10/0x10
[   16.257187]  ? __pfx_read_tsc+0x10/0x10
[   16.257228]  ? ktime_get_ts64+0x86/0x230
[   16.257279]  kunit_try_run_case+0x1a5/0x480
[   16.257333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.257377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.257426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.257473]  ? __kthread_parkme+0x82/0x180
[   16.257520]  ? preempt_count_sub+0x50/0x80
[   16.257581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.257614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.257660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.257692]  kthread+0x337/0x6f0
[   16.257717]  ? trace_preempt_on+0x20/0xc0
[   16.257749]  ? __pfx_kthread+0x10/0x10
[   16.257775]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.257804]  ? calculate_sigpending+0x7b/0xa0
[   16.257835]  ? __pfx_kthread+0x10/0x10
[   16.257869]  ret_from_fork+0x41/0x80
[   16.257911]  ? __pfx_kthread+0x10/0x10
[   16.257961]  ret_from_fork_asm+0x1a/0x30
[   16.258031]  </TASK>
[   16.258059] 
[   16.269931] Allocated by task 285:
[   16.270341]  kasan_save_stack+0x45/0x70
[   16.270867]  kasan_save_track+0x18/0x40
[   16.271227]  kasan_save_alloc_info+0x3b/0x50
[   16.271598]  __kasan_kmalloc+0xb7/0xc0
[   16.271959]  __kmalloc_cache_noprof+0x189/0x420
[   16.272293]  kasan_atomics+0x95/0x310
[   16.272643]  kunit_try_run_case+0x1a5/0x480
[   16.272979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.273255]  kthread+0x337/0x6f0
[   16.273416]  ret_from_fork+0x41/0x80
[   16.273702]  ret_from_fork_asm+0x1a/0x30
[   16.273995] 
[   16.274226] The buggy address belongs to the object at ffff8881029ef680
[   16.274226]  which belongs to the cache kmalloc-64 of size 64
[   16.275055] The buggy address is located 0 bytes to the right of
[   16.275055]  allocated 48-byte region [ffff8881029ef680, ffff8881029ef6b0)
[   16.275798] 
[   16.275984] The buggy address belongs to the physical page:
[   16.276352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ef
[   16.276742] flags: 0x200000000000000(node=0|zone=2)
[   16.276949] page_type: f5(slab)
[   16.277118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.277405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.278020] page dumped because: kasan: bad access detected
[   16.278424] 
[   16.278671] Memory state around the buggy address:
[   16.279047]  ffff8881029ef580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.279603]  ffff8881029ef600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.280069] >ffff8881029ef680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.280326]                                      ^
[   16.280571]  ffff8881029ef700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.281189]  ffff8881029ef780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.281766] ==================================================================