Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   48.558908] ==================================================================
[   48.565965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.573253] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.580631] 
[   48.582114] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.582161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.582178] Hardware name: WinLink E850-96 board (DT)
[   48.582197] Call trace:
[   48.582211]  show_stack+0x20/0x38 (C)
[   48.582244]  dump_stack_lvl+0x8c/0xd0
[   48.582280]  print_report+0x118/0x608
[   48.582310]  kasan_report+0xdc/0x128
[   48.582340]  kasan_check_range+0x100/0x1a8
[   48.582375]  __kasan_check_write+0x20/0x30
[   48.582408]  kasan_atomics_helper+0x3ac/0x4858
[   48.582438]  kasan_atomics+0x198/0x2e0
[   48.582465]  kunit_try_run_case+0x170/0x3f0
[   48.582501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.582542]  kthread+0x328/0x630
[   48.582577]  ret_from_fork+0x10/0x20
[   48.582609] 
[   48.652331] Allocated by task 314:
[   48.655718]  kasan_save_stack+0x3c/0x68
[   48.659536]  kasan_save_track+0x20/0x40
[   48.663355]  kasan_save_alloc_info+0x40/0x58
[   48.667609]  __kasan_kmalloc+0xd4/0xd8
[   48.671341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.675855]  kasan_atomics+0xb8/0x2e0
[   48.679501]  kunit_try_run_case+0x170/0x3f0
[   48.683668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.689136]  kthread+0x328/0x630
[   48.692348]  ret_from_fork+0x10/0x20
[   48.695907] 
[   48.697382] The buggy address belongs to the object at ffff000800d61a00
[   48.697382]  which belongs to the cache kmalloc-64 of size 64
[   48.709710] The buggy address is located 0 bytes to the right of
[   48.709710]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.722556] 
[   48.724033] The buggy address belongs to the physical page:
[   48.729589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.737576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.744083] page_type: f5(slab)
[   48.747219] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.754941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.762659] page dumped because: kasan: bad access detected
[   48.768215] 
[   48.769690] Memory state around the buggy address:
[   48.774471]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.781673]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.788878] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.796079]                                      ^
[   48.800857]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.808062]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.815263] ==================================================================
[   50.141179] ==================================================================
[   50.148232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.155521] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.162899] 
[   50.164381] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.164430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.164447] Hardware name: WinLink E850-96 board (DT)
[   50.164468] Call trace:
[   50.164479]  show_stack+0x20/0x38 (C)
[   50.164513]  dump_stack_lvl+0x8c/0xd0
[   50.164550]  print_report+0x118/0x608
[   50.164581]  kasan_report+0xdc/0x128
[   50.164611]  kasan_check_range+0x100/0x1a8
[   50.164642]  __kasan_check_write+0x20/0x30
[   50.164675]  kasan_atomics_helper+0x61c/0x4858
[   50.164705]  kasan_atomics+0x198/0x2e0
[   50.164732]  kunit_try_run_case+0x170/0x3f0
[   50.164767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.164806]  kthread+0x328/0x630
[   50.164838]  ret_from_fork+0x10/0x20
[   50.164873] 
[   50.234599] Allocated by task 314:
[   50.237984]  kasan_save_stack+0x3c/0x68
[   50.241804]  kasan_save_track+0x20/0x40
[   50.245623]  kasan_save_alloc_info+0x40/0x58
[   50.249877]  __kasan_kmalloc+0xd4/0xd8
[   50.253609]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.258123]  kasan_atomics+0xb8/0x2e0
[   50.261769]  kunit_try_run_case+0x170/0x3f0
[   50.265936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.271404]  kthread+0x328/0x630
[   50.274616]  ret_from_fork+0x10/0x20
[   50.278175] 
[   50.279650] The buggy address belongs to the object at ffff000800d61a00
[   50.279650]  which belongs to the cache kmalloc-64 of size 64
[   50.291977] The buggy address is located 0 bytes to the right of
[   50.291977]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.304824] 
[   50.306301] The buggy address belongs to the physical page:
[   50.311855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.319841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.326351] page_type: f5(slab)
[   50.329487] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.337208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.344927] page dumped because: kasan: bad access detected
[   50.350483] 
[   50.351958] Memory state around the buggy address:
[   50.356737]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.363941]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.371146] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.378347]                                      ^
[   50.383125]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.390330]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.397531] ==================================================================
[   53.038704] ==================================================================
[   53.045758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.053047] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.060425] 
[   53.061906] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.061952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.061968] Hardware name: WinLink E850-96 board (DT)
[   53.061987] Call trace:
[   53.062002]  show_stack+0x20/0x38 (C)
[   53.062035]  dump_stack_lvl+0x8c/0xd0
[   53.062071]  print_report+0x118/0x608
[   53.062102]  kasan_report+0xdc/0x128
[   53.062132]  kasan_check_range+0x100/0x1a8
[   53.062164]  __kasan_check_write+0x20/0x30
[   53.062199]  kasan_atomics_helper+0xad4/0x4858
[   53.062229]  kasan_atomics+0x198/0x2e0
[   53.062258]  kunit_try_run_case+0x170/0x3f0
[   53.062295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.062333]  kthread+0x328/0x630
[   53.062367]  ret_from_fork+0x10/0x20
[   53.062401] 
[   53.132125] Allocated by task 314:
[   53.135512]  kasan_save_stack+0x3c/0x68
[   53.139330]  kasan_save_track+0x20/0x40
[   53.143149]  kasan_save_alloc_info+0x40/0x58
[   53.147403]  __kasan_kmalloc+0xd4/0xd8
[   53.151135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.155649]  kasan_atomics+0xb8/0x2e0
[   53.159295]  kunit_try_run_case+0x170/0x3f0
[   53.163461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.168930]  kthread+0x328/0x630
[   53.172142]  ret_from_fork+0x10/0x20
[   53.175701] 
[   53.177176] The buggy address belongs to the object at ffff000800d61a00
[   53.177176]  which belongs to the cache kmalloc-64 of size 64
[   53.189503] The buggy address is located 0 bytes to the right of
[   53.189503]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.202349] 
[   53.203826] The buggy address belongs to the physical page:
[   53.209382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.217367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.223877] page_type: f5(slab)
[   53.227013] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.234735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.242453] page dumped because: kasan: bad access detected
[   53.248009] 
[   53.249484] Memory state around the buggy address:
[   53.254264]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.261467]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.268672] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.275873]                                      ^
[   53.280651]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.287856]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.295057] ==================================================================
[   55.398906] ==================================================================
[   55.405965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.413341] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.420633] 
[   55.422117] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.422165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.422181] Hardware name: WinLink E850-96 board (DT)
[   55.422198] Call trace:
[   55.422211]  show_stack+0x20/0x38 (C)
[   55.422244]  dump_stack_lvl+0x8c/0xd0
[   55.422280]  print_report+0x118/0x608
[   55.422309]  kasan_report+0xdc/0x128
[   55.422340]  __asan_report_load4_noabort+0x20/0x30
[   55.422375]  kasan_atomics_helper+0x3e04/0x4858
[   55.422403]  kasan_atomics+0x198/0x2e0
[   55.422431]  kunit_try_run_case+0x170/0x3f0
[   55.422467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.422507]  kthread+0x328/0x630
[   55.422540]  ret_from_fork+0x10/0x20
[   55.422571] 
[   55.489034] Allocated by task 314:
[   55.492420]  kasan_save_stack+0x3c/0x68
[   55.496239]  kasan_save_track+0x20/0x40
[   55.500058]  kasan_save_alloc_info+0x40/0x58
[   55.504312]  __kasan_kmalloc+0xd4/0xd8
[   55.508044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.512558]  kasan_atomics+0xb8/0x2e0
[   55.516204]  kunit_try_run_case+0x170/0x3f0
[   55.520371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.525839]  kthread+0x328/0x630
[   55.529051]  ret_from_fork+0x10/0x20
[   55.532610] 
[   55.534086] The buggy address belongs to the object at ffff000800d61a00
[   55.534086]  which belongs to the cache kmalloc-64 of size 64
[   55.546412] The buggy address is located 0 bytes to the right of
[   55.546412]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.559259] 
[   55.560735] The buggy address belongs to the physical page:
[   55.566291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.574276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.580786] page_type: f5(slab)
[   55.583922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.591643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.599362] page dumped because: kasan: bad access detected
[   55.604918] 
[   55.606393] Memory state around the buggy address:
[   55.611172]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.618376]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.625581] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.632782]                                      ^
[   55.637560]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.644764]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.651966] ==================================================================
[   62.238031] ==================================================================
[   62.245099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.252475] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.259853] 
[   62.261336] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.261386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.261401] Hardware name: WinLink E850-96 board (DT)
[   62.261420] Call trace:
[   62.261432]  show_stack+0x20/0x38 (C)
[   62.261463]  dump_stack_lvl+0x8c/0xd0
[   62.261498]  print_report+0x118/0x608
[   62.261528]  kasan_report+0xdc/0x128
[   62.261557]  kasan_check_range+0x100/0x1a8
[   62.261589]  __kasan_check_write+0x20/0x30
[   62.261622]  kasan_atomics_helper+0x16d0/0x4858
[   62.261652]  kasan_atomics+0x198/0x2e0
[   62.261680]  kunit_try_run_case+0x170/0x3f0
[   62.261717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.261757]  kthread+0x328/0x630
[   62.261790]  ret_from_fork+0x10/0x20
[   62.261823] 
[   62.331639] Allocated by task 314:
[   62.335026]  kasan_save_stack+0x3c/0x68
[   62.338844]  kasan_save_track+0x20/0x40
[   62.342663]  kasan_save_alloc_info+0x40/0x58
[   62.346917]  __kasan_kmalloc+0xd4/0xd8
[   62.350650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.355163]  kasan_atomics+0xb8/0x2e0
[   62.358809]  kunit_try_run_case+0x170/0x3f0
[   62.362976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.368445]  kthread+0x328/0x630
[   62.371656]  ret_from_fork+0x10/0x20
[   62.375215] 
[   62.376691] The buggy address belongs to the object at ffff000800d61a00
[   62.376691]  which belongs to the cache kmalloc-64 of size 64
[   62.389018] The buggy address is located 0 bytes to the right of
[   62.389018]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.401864] 
[   62.403342] The buggy address belongs to the physical page:
[   62.408896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.416882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.423392] page_type: f5(slab)
[   62.426527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.434249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.441968] page dumped because: kasan: bad access detected
[   62.447523] 
[   62.448999] Memory state around the buggy address:
[   62.453777]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.460982]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.468187] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.475387]                                      ^
[   62.480166]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.487370]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.494571] ==================================================================
[   63.026239] ==================================================================
[   63.033282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.040657] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   63.047948] 
[   63.049432] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.049482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.049498] Hardware name: WinLink E850-96 board (DT)
[   63.049517] Call trace:
[   63.049530]  show_stack+0x20/0x38 (C)
[   63.049562]  dump_stack_lvl+0x8c/0xd0
[   63.049598]  print_report+0x118/0x608
[   63.049628]  kasan_report+0xdc/0x128
[   63.049657]  __asan_report_load8_noabort+0x20/0x30
[   63.049692]  kasan_atomics_helper+0x3e20/0x4858
[   63.049722]  kasan_atomics+0x198/0x2e0
[   63.049752]  kunit_try_run_case+0x170/0x3f0
[   63.049788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.049828]  kthread+0x328/0x630
[   63.049861]  ret_from_fork+0x10/0x20
[   63.049896] 
[   63.116350] Allocated by task 314:
[   63.119737]  kasan_save_stack+0x3c/0x68
[   63.123555]  kasan_save_track+0x20/0x40
[   63.127374]  kasan_save_alloc_info+0x40/0x58
[   63.131628]  __kasan_kmalloc+0xd4/0xd8
[   63.135360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.139874]  kasan_atomics+0xb8/0x2e0
[   63.143520]  kunit_try_run_case+0x170/0x3f0
[   63.147686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.153155]  kthread+0x328/0x630
[   63.156367]  ret_from_fork+0x10/0x20
[   63.159926] 
[   63.161401] The buggy address belongs to the object at ffff000800d61a00
[   63.161401]  which belongs to the cache kmalloc-64 of size 64
[   63.173729] The buggy address is located 0 bytes to the right of
[   63.173729]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   63.186575] 
[   63.188052] The buggy address belongs to the physical page:
[   63.193608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   63.201592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.208102] page_type: f5(slab)
[   63.211237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.218960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.226678] page dumped because: kasan: bad access detected
[   63.232234] 
[   63.233709] Memory state around the buggy address:
[   63.238489]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.245692]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.252897] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.260098]                                      ^
[   63.264876]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.272081]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.279282] ==================================================================
[   46.983525] ==================================================================
[   46.990471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   46.997756] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.005047] 
[   47.006533] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.006594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.006611] Hardware name: WinLink E850-96 board (DT)
[   47.006633] Call trace:
[   47.006649]  show_stack+0x20/0x38 (C)
[   47.006684]  dump_stack_lvl+0x8c/0xd0
[   47.006726]  print_report+0x118/0x608
[   47.006757]  kasan_report+0xdc/0x128
[   47.006788]  kasan_check_range+0x100/0x1a8
[   47.006824]  __kasan_check_read+0x20/0x30
[   47.006857]  kasan_atomics_helper+0x1ec/0x4858
[   47.006889]  kasan_atomics+0x198/0x2e0
[   47.006918]  kunit_try_run_case+0x170/0x3f0
[   47.006957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.006997]  kthread+0x328/0x630
[   47.007033]  ret_from_fork+0x10/0x20
[   47.007069] 
[   47.076661] Allocated by task 314:
[   47.080049]  kasan_save_stack+0x3c/0x68
[   47.083865]  kasan_save_track+0x20/0x40
[   47.087685]  kasan_save_alloc_info+0x40/0x58
[   47.091938]  __kasan_kmalloc+0xd4/0xd8
[   47.095671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.100184]  kasan_atomics+0xb8/0x2e0
[   47.103830]  kunit_try_run_case+0x170/0x3f0
[   47.107997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.113466]  kthread+0x328/0x630
[   47.116677]  ret_from_fork+0x10/0x20
[   47.120236] 
[   47.121712] The buggy address belongs to the object at ffff000800d61a00
[   47.121712]  which belongs to the cache kmalloc-64 of size 64
[   47.134042] The buggy address is located 0 bytes to the right of
[   47.134042]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.146885] 
[   47.148363] The buggy address belongs to the physical page:
[   47.153921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.161905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.168413] page_type: f5(slab)
[   47.171552] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.179270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.186989] page dumped because: kasan: bad access detected
[   47.192545] 
[   47.194020] Memory state around the buggy address:
[   47.198802]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.206003]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.213208] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.220408]                                      ^
[   47.225186]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.232391]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.239592] ==================================================================
[   47.510722] ==================================================================
[   47.517716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.525005] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.532297] 
[   47.533781] CPU: 6 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.533839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.533855] Hardware name: WinLink E850-96 board (DT)
[   47.533879] Call trace:
[   47.533893]  show_stack+0x20/0x38 (C)
[   47.533928]  dump_stack_lvl+0x8c/0xd0
[   47.533967]  print_report+0x118/0x608
[   47.533996]  kasan_report+0xdc/0x128
[   47.534028]  kasan_check_range+0x100/0x1a8
[   47.534064]  __kasan_check_read+0x20/0x30
[   47.534096]  kasan_atomics_helper+0x2b0/0x4858
[   47.534128]  kasan_atomics+0x198/0x2e0
[   47.534156]  kunit_try_run_case+0x170/0x3f0
[   47.534192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.534233]  kthread+0x328/0x630
[   47.534265]  ret_from_fork+0x10/0x20
[   47.534303] 
[   47.603910] Allocated by task 314:
[   47.607299]  kasan_save_stack+0x3c/0x68
[   47.611115]  kasan_save_track+0x20/0x40
[   47.614933]  kasan_save_alloc_info+0x40/0x58
[   47.619187]  __kasan_kmalloc+0xd4/0xd8
[   47.622920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.627433]  kasan_atomics+0xb8/0x2e0
[   47.631079]  kunit_try_run_case+0x170/0x3f0
[   47.635246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.640714]  kthread+0x328/0x630
[   47.643926]  ret_from_fork+0x10/0x20
[   47.647485] 
[   47.648962] The buggy address belongs to the object at ffff000800d61a00
[   47.648962]  which belongs to the cache kmalloc-64 of size 64
[   47.661289] The buggy address is located 0 bytes to the right of
[   47.661289]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.674134] 
[   47.675613] The buggy address belongs to the physical page:
[   47.681169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.689154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.695662] page_type: f5(slab)
[   47.698800] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.706519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.714238] page dumped because: kasan: bad access detected
[   47.719793] 
[   47.721268] Memory state around the buggy address:
[   47.726048]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.733252]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.740456] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.747657]                                      ^
[   47.752435]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.759640]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.766842] ==================================================================
[   53.562816] ==================================================================
[   53.569880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.577171] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.584549] 
[   53.586032] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.586081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.586096] Hardware name: WinLink E850-96 board (DT)
[   53.586116] Call trace:
[   53.586128]  show_stack+0x20/0x38 (C)
[   53.586159]  dump_stack_lvl+0x8c/0xd0
[   53.586197]  print_report+0x118/0x608
[   53.586227]  kasan_report+0xdc/0x128
[   53.586255]  kasan_check_range+0x100/0x1a8
[   53.586286]  __kasan_check_write+0x20/0x30
[   53.586319]  kasan_atomics_helper+0xb70/0x4858
[   53.586350]  kasan_atomics+0x198/0x2e0
[   53.586378]  kunit_try_run_case+0x170/0x3f0
[   53.586413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.586453]  kthread+0x328/0x630
[   53.586485]  ret_from_fork+0x10/0x20
[   53.586519] 
[   53.656249] Allocated by task 314:
[   53.659636]  kasan_save_stack+0x3c/0x68
[   53.663454]  kasan_save_track+0x20/0x40
[   53.667273]  kasan_save_alloc_info+0x40/0x58
[   53.671527]  __kasan_kmalloc+0xd4/0xd8
[   53.675259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.679773]  kasan_atomics+0xb8/0x2e0
[   53.683419]  kunit_try_run_case+0x170/0x3f0
[   53.687586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.693054]  kthread+0x328/0x630
[   53.696266]  ret_from_fork+0x10/0x20
[   53.699825] 
[   53.701301] The buggy address belongs to the object at ffff000800d61a00
[   53.701301]  which belongs to the cache kmalloc-64 of size 64
[   53.713627] The buggy address is located 0 bytes to the right of
[   53.713627]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.726473] 
[   53.727951] The buggy address belongs to the physical page:
[   53.733506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.741491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.748001] page_type: f5(slab)
[   53.751136] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.758859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.766577] page dumped because: kasan: bad access detected
[   53.772133] 
[   53.773608] Memory state around the buggy address:
[   53.778388]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.785591]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.792796] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.799997]                                      ^
[   53.804775]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.811980]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.819181] ==================================================================
[   51.195986] ==================================================================
[   51.203076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.210366] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.217744] 
[   51.219227] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.219275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.219290] Hardware name: WinLink E850-96 board (DT)
[   51.219308] Call trace:
[   51.219320]  show_stack+0x20/0x38 (C)
[   51.219350]  dump_stack_lvl+0x8c/0xd0
[   51.219387]  print_report+0x118/0x608
[   51.219418]  kasan_report+0xdc/0x128
[   51.219448]  kasan_check_range+0x100/0x1a8
[   51.219479]  __kasan_check_write+0x20/0x30
[   51.219513]  kasan_atomics_helper+0x7cc/0x4858
[   51.219543]  kasan_atomics+0x198/0x2e0
[   51.219571]  kunit_try_run_case+0x170/0x3f0
[   51.219607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.219646]  kthread+0x328/0x630
[   51.219679]  ret_from_fork+0x10/0x20
[   51.219709] 
[   51.289444] Allocated by task 314:
[   51.292830]  kasan_save_stack+0x3c/0x68
[   51.296649]  kasan_save_track+0x20/0x40
[   51.300469]  kasan_save_alloc_info+0x40/0x58
[   51.304722]  __kasan_kmalloc+0xd4/0xd8
[   51.308454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.312968]  kasan_atomics+0xb8/0x2e0
[   51.316614]  kunit_try_run_case+0x170/0x3f0
[   51.320781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.326249]  kthread+0x328/0x630
[   51.329461]  ret_from_fork+0x10/0x20
[   51.333020] 
[   51.334496] The buggy address belongs to the object at ffff000800d61a00
[   51.334496]  which belongs to the cache kmalloc-64 of size 64
[   51.346822] The buggy address is located 0 bytes to the right of
[   51.346822]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.359669] 
[   51.361146] The buggy address belongs to the physical page:
[   51.366702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.374686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.381196] page_type: f5(slab)
[   51.384330] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.392054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.399773] page dumped because: kasan: bad access detected
[   51.405328] 
[   51.406804] Memory state around the buggy address:
[   51.411583]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.418787]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.425991] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.433192]                                      ^
[   51.437970]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.445175]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.452376] ==================================================================
[   55.135218] ==================================================================
[   55.142253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.149543] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.156921] 
[   55.158406] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.158455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.158469] Hardware name: WinLink E850-96 board (DT)
[   55.158486] Call trace:
[   55.158498]  show_stack+0x20/0x38 (C)
[   55.158530]  dump_stack_lvl+0x8c/0xd0
[   55.158565]  print_report+0x118/0x608
[   55.158597]  kasan_report+0xdc/0x128
[   55.158627]  kasan_check_range+0x100/0x1a8
[   55.158660]  __kasan_check_write+0x20/0x30
[   55.158693]  kasan_atomics_helper+0xd3c/0x4858
[   55.158725]  kasan_atomics+0x198/0x2e0
[   55.158755]  kunit_try_run_case+0x170/0x3f0
[   55.158789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.158828]  kthread+0x328/0x630
[   55.158858]  ret_from_fork+0x10/0x20
[   55.158891] 
[   55.228621] Allocated by task 314:
[   55.232008]  kasan_save_stack+0x3c/0x68
[   55.235826]  kasan_save_track+0x20/0x40
[   55.239646]  kasan_save_alloc_info+0x40/0x58
[   55.243899]  __kasan_kmalloc+0xd4/0xd8
[   55.247631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.252145]  kasan_atomics+0xb8/0x2e0
[   55.255791]  kunit_try_run_case+0x170/0x3f0
[   55.259958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.265426]  kthread+0x328/0x630
[   55.268638]  ret_from_fork+0x10/0x20
[   55.272197] 
[   55.273673] The buggy address belongs to the object at ffff000800d61a00
[   55.273673]  which belongs to the cache kmalloc-64 of size 64
[   55.285999] The buggy address is located 0 bytes to the right of
[   55.285999]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.298846] 
[   55.300322] The buggy address belongs to the physical page:
[   55.305878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.313863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.320373] page_type: f5(slab)
[   55.323507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.331231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.338950] page dumped because: kasan: bad access detected
[   55.344505] 
[   55.345981] Memory state around the buggy address:
[   55.350760]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.357964]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.365168] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.372369]                                      ^
[   55.377147]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.384352]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.391553] ==================================================================
[   59.081807] ==================================================================
[   59.088896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.096272] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.103650] 
[   59.105136] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.105184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.105202] Hardware name: WinLink E850-96 board (DT)
[   59.105221] Call trace:
[   59.105233]  show_stack+0x20/0x38 (C)
[   59.105264]  dump_stack_lvl+0x8c/0xd0
[   59.105297]  print_report+0x118/0x608
[   59.105329]  kasan_report+0xdc/0x128
[   59.105359]  kasan_check_range+0x100/0x1a8
[   59.105390]  __kasan_check_write+0x20/0x30
[   59.105423]  kasan_atomics_helper+0x126c/0x4858
[   59.105453]  kasan_atomics+0x198/0x2e0
[   59.105480]  kunit_try_run_case+0x170/0x3f0
[   59.105516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.105554]  kthread+0x328/0x630
[   59.105587]  ret_from_fork+0x10/0x20
[   59.105617] 
[   59.175437] Allocated by task 314:
[   59.178824]  kasan_save_stack+0x3c/0x68
[   59.182642]  kasan_save_track+0x20/0x40
[   59.186461]  kasan_save_alloc_info+0x40/0x58
[   59.190715]  __kasan_kmalloc+0xd4/0xd8
[   59.194447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.198961]  kasan_atomics+0xb8/0x2e0
[   59.202607]  kunit_try_run_case+0x170/0x3f0
[   59.206773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.212242]  kthread+0x328/0x630
[   59.215454]  ret_from_fork+0x10/0x20
[   59.219013] 
[   59.220489] The buggy address belongs to the object at ffff000800d61a00
[   59.220489]  which belongs to the cache kmalloc-64 of size 64
[   59.232815] The buggy address is located 0 bytes to the right of
[   59.232815]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.245662] 
[   59.247139] The buggy address belongs to the physical page:
[   59.252693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.260679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.267189] page_type: f5(slab)
[   59.270324] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.278047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.285765] page dumped because: kasan: bad access detected
[   59.291321] 
[   59.292796] Memory state around the buggy address:
[   59.297576]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.304779]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.311984] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.319185]                                      ^
[   59.323963]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.331168]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.338369] ==================================================================
[   49.350031] ==================================================================
[   49.357097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.364387] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.371765] 
[   49.373248] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.373297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.373315] Hardware name: WinLink E850-96 board (DT)
[   49.373331] Call trace:
[   49.373344]  show_stack+0x20/0x38 (C)
[   49.373374]  dump_stack_lvl+0x8c/0xd0
[   49.373412]  print_report+0x118/0x608
[   49.373442]  kasan_report+0xdc/0x128
[   49.373471]  kasan_check_range+0x100/0x1a8
[   49.373504]  __kasan_check_write+0x20/0x30
[   49.373537]  kasan_atomics_helper+0x4e4/0x4858
[   49.373568]  kasan_atomics+0x198/0x2e0
[   49.373596]  kunit_try_run_case+0x170/0x3f0
[   49.373632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.373672]  kthread+0x328/0x630
[   49.373706]  ret_from_fork+0x10/0x20
[   49.373739] 
[   49.443465] Allocated by task 314:
[   49.446851]  kasan_save_stack+0x3c/0x68
[   49.450670]  kasan_save_track+0x20/0x40
[   49.454489]  kasan_save_alloc_info+0x40/0x58
[   49.458743]  __kasan_kmalloc+0xd4/0xd8
[   49.462475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.466989]  kasan_atomics+0xb8/0x2e0
[   49.470635]  kunit_try_run_case+0x170/0x3f0
[   49.474801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.480270]  kthread+0x328/0x630
[   49.483482]  ret_from_fork+0x10/0x20
[   49.487041] 
[   49.488516] The buggy address belongs to the object at ffff000800d61a00
[   49.488516]  which belongs to the cache kmalloc-64 of size 64
[   49.500843] The buggy address is located 0 bytes to the right of
[   49.500843]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.513690] 
[   49.515167] The buggy address belongs to the physical page:
[   49.520723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.528707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.535217] page_type: f5(slab)
[   49.538353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.546075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.553794] page dumped because: kasan: bad access detected
[   49.559349] 
[   49.560824] Memory state around the buggy address:
[   49.565603]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.572807]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.580012] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.587213]                                      ^
[   49.591991]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.599196]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.606397] ==================================================================
[   58.554061] ==================================================================
[   58.561125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.568502] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.575880] 
[   58.577365] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.577415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.577431] Hardware name: WinLink E850-96 board (DT)
[   58.577454] Call trace:
[   58.577466]  show_stack+0x20/0x38 (C)
[   58.577498]  dump_stack_lvl+0x8c/0xd0
[   58.577534]  print_report+0x118/0x608
[   58.577566]  kasan_report+0xdc/0x128
[   58.577595]  kasan_check_range+0x100/0x1a8
[   58.577626]  __kasan_check_write+0x20/0x30
[   58.577660]  kasan_atomics_helper+0x1190/0x4858
[   58.577691]  kasan_atomics+0x198/0x2e0
[   58.577718]  kunit_try_run_case+0x170/0x3f0
[   58.577754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.577793]  kthread+0x328/0x630
[   58.577826]  ret_from_fork+0x10/0x20
[   58.577859] 
[   58.647667] Allocated by task 314:
[   58.651055]  kasan_save_stack+0x3c/0x68
[   58.654872]  kasan_save_track+0x20/0x40
[   58.658692]  kasan_save_alloc_info+0x40/0x58
[   58.662945]  __kasan_kmalloc+0xd4/0xd8
[   58.666677]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.671191]  kasan_atomics+0xb8/0x2e0
[   58.674837]  kunit_try_run_case+0x170/0x3f0
[   58.679004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.684472]  kthread+0x328/0x630
[   58.687684]  ret_from_fork+0x10/0x20
[   58.691243] 
[   58.692719] The buggy address belongs to the object at ffff000800d61a00
[   58.692719]  which belongs to the cache kmalloc-64 of size 64
[   58.705045] The buggy address is located 0 bytes to the right of
[   58.705045]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.717892] 
[   58.719369] The buggy address belongs to the physical page:
[   58.724924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.732909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.739419] page_type: f5(slab)
[   58.742554] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.750277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.757995] page dumped because: kasan: bad access detected
[   58.763551] 
[   58.765026] Memory state around the buggy address:
[   58.769805]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.777010]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.784214] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.791415]                                      ^
[   58.796193]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.803398]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.810599] ==================================================================
[   52.511241] ==================================================================
[   52.518335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.525624] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.533002] 
[   52.534485] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.534531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.534547] Hardware name: WinLink E850-96 board (DT)
[   52.534565] Call trace:
[   52.534578]  show_stack+0x20/0x38 (C)
[   52.534609]  dump_stack_lvl+0x8c/0xd0
[   52.534644]  print_report+0x118/0x608
[   52.534673]  kasan_report+0xdc/0x128
[   52.534701]  kasan_check_range+0x100/0x1a8
[   52.534733]  __kasan_check_write+0x20/0x30
[   52.534765]  kasan_atomics_helper+0xa04/0x4858
[   52.534796]  kasan_atomics+0x198/0x2e0
[   52.534823]  kunit_try_run_case+0x170/0x3f0
[   52.534857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.534896]  kthread+0x328/0x630
[   52.534931]  ret_from_fork+0x10/0x20
[   52.534962] 
[   52.604702] Allocated by task 314:
[   52.608088]  kasan_save_stack+0x3c/0x68
[   52.611907]  kasan_save_track+0x20/0x40
[   52.615727]  kasan_save_alloc_info+0x40/0x58
[   52.619980]  __kasan_kmalloc+0xd4/0xd8
[   52.623713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.628226]  kasan_atomics+0xb8/0x2e0
[   52.631872]  kunit_try_run_case+0x170/0x3f0
[   52.636039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.641508]  kthread+0x328/0x630
[   52.644719]  ret_from_fork+0x10/0x20
[   52.648278] 
[   52.649754] The buggy address belongs to the object at ffff000800d61a00
[   52.649754]  which belongs to the cache kmalloc-64 of size 64
[   52.662080] The buggy address is located 0 bytes to the right of
[   52.662080]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.674927] 
[   52.676403] The buggy address belongs to the physical page:
[   52.681959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.689944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.696454] page_type: f5(slab)
[   52.699589] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.707312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.715031] page dumped because: kasan: bad access detected
[   52.720586] 
[   52.722061] Memory state around the buggy address:
[   52.726841]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.734045]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.741249] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.748450]                                      ^
[   52.753228]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.760433]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.767634] ==================================================================
[   49.877481] ==================================================================
[   49.884520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.891810] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.899188] 
[   49.900670] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.900718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.900735] Hardware name: WinLink E850-96 board (DT)
[   49.900753] Call trace:
[   49.900767]  show_stack+0x20/0x38 (C)
[   49.900799]  dump_stack_lvl+0x8c/0xd0
[   49.900835]  print_report+0x118/0x608
[   49.900865]  kasan_report+0xdc/0x128
[   49.900896]  kasan_check_range+0x100/0x1a8
[   49.900927]  __kasan_check_write+0x20/0x30
[   49.900961]  kasan_atomics_helper+0x5b4/0x4858
[   49.900992]  kasan_atomics+0x198/0x2e0
[   49.901020]  kunit_try_run_case+0x170/0x3f0
[   49.901054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.901094]  kthread+0x328/0x630
[   49.901127]  ret_from_fork+0x10/0x20
[   49.901161] 
[   49.970888] Allocated by task 314:
[   49.974275]  kasan_save_stack+0x3c/0x68
[   49.978092]  kasan_save_track+0x20/0x40
[   49.981912]  kasan_save_alloc_info+0x40/0x58
[   49.986165]  __kasan_kmalloc+0xd4/0xd8
[   49.989898]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.994412]  kasan_atomics+0xb8/0x2e0
[   49.998058]  kunit_try_run_case+0x170/0x3f0
[   50.002224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.007693]  kthread+0x328/0x630
[   50.010905]  ret_from_fork+0x10/0x20
[   50.014463] 
[   50.015939] The buggy address belongs to the object at ffff000800d61a00
[   50.015939]  which belongs to the cache kmalloc-64 of size 64
[   50.028266] The buggy address is located 0 bytes to the right of
[   50.028266]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.041112] 
[   50.042590] The buggy address belongs to the physical page:
[   50.048144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.056130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.062640] page_type: f5(slab)
[   50.065775] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.073497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.081216] page dumped because: kasan: bad access detected
[   50.086771] 
[   50.088247] Memory state around the buggy address:
[   50.093027]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.100230]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.107435] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.114636]                                      ^
[   50.119414]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.126619]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.133819] ==================================================================
[   50.404900] ==================================================================
[   50.411941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.419232] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.426610] 
[   50.428096] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.428144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.428161] Hardware name: WinLink E850-96 board (DT)
[   50.428178] Call trace:
[   50.428191]  show_stack+0x20/0x38 (C)
[   50.428224]  dump_stack_lvl+0x8c/0xd0
[   50.428261]  print_report+0x118/0x608
[   50.428290]  kasan_report+0xdc/0x128
[   50.428319]  kasan_check_range+0x100/0x1a8
[   50.428350]  __kasan_check_write+0x20/0x30
[   50.428383]  kasan_atomics_helper+0x684/0x4858
[   50.428415]  kasan_atomics+0x198/0x2e0
[   50.428443]  kunit_try_run_case+0x170/0x3f0
[   50.428478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.428518]  kthread+0x328/0x630
[   50.428550]  ret_from_fork+0x10/0x20
[   50.428581] 
[   50.498310] Allocated by task 314:
[   50.501696]  kasan_save_stack+0x3c/0x68
[   50.505515]  kasan_save_track+0x20/0x40
[   50.509335]  kasan_save_alloc_info+0x40/0x58
[   50.513588]  __kasan_kmalloc+0xd4/0xd8
[   50.517320]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.521834]  kasan_atomics+0xb8/0x2e0
[   50.525480]  kunit_try_run_case+0x170/0x3f0
[   50.529647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.535115]  kthread+0x328/0x630
[   50.538327]  ret_from_fork+0x10/0x20
[   50.541886] 
[   50.543362] The buggy address belongs to the object at ffff000800d61a00
[   50.543362]  which belongs to the cache kmalloc-64 of size 64
[   50.555688] The buggy address is located 0 bytes to the right of
[   50.555688]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.568535] 
[   50.570012] The buggy address belongs to the physical page:
[   50.575568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.583552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.590063] page_type: f5(slab)
[   50.593199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.600920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.608639] page dumped because: kasan: bad access detected
[   50.614194] 
[   50.615670] Memory state around the buggy address:
[   50.620448]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.627653]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.634858] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.642058]                                      ^
[   50.646836]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.654041]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.661242] ==================================================================
[   54.350621] ==================================================================
[   54.357716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.365093] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.372384] 
[   54.373868] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.373914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.373932] Hardware name: WinLink E850-96 board (DT)
[   54.373950] Call trace:
[   54.373963]  show_stack+0x20/0x38 (C)
[   54.373992]  dump_stack_lvl+0x8c/0xd0
[   54.374027]  print_report+0x118/0x608
[   54.374055]  kasan_report+0xdc/0x128
[   54.374086]  __asan_report_load4_noabort+0x20/0x30
[   54.374121]  kasan_atomics_helper+0x3de4/0x4858
[   54.374150]  kasan_atomics+0x198/0x2e0
[   54.374178]  kunit_try_run_case+0x170/0x3f0
[   54.374212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.374251]  kthread+0x328/0x630
[   54.374286]  ret_from_fork+0x10/0x20
[   54.374317] 
[   54.440786] Allocated by task 314:
[   54.444173]  kasan_save_stack+0x3c/0x68
[   54.447990]  kasan_save_track+0x20/0x40
[   54.451810]  kasan_save_alloc_info+0x40/0x58
[   54.456064]  __kasan_kmalloc+0xd4/0xd8
[   54.459796]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.464310]  kasan_atomics+0xb8/0x2e0
[   54.467956]  kunit_try_run_case+0x170/0x3f0
[   54.472122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.477591]  kthread+0x328/0x630
[   54.480803]  ret_from_fork+0x10/0x20
[   54.484362] 
[   54.485837] The buggy address belongs to the object at ffff000800d61a00
[   54.485837]  which belongs to the cache kmalloc-64 of size 64
[   54.498164] The buggy address is located 0 bytes to the right of
[   54.498164]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.511010] 
[   54.512486] The buggy address belongs to the physical page:
[   54.518042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.526028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.532538] page_type: f5(slab)
[   54.535674] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.543396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.551114] page dumped because: kasan: bad access detected
[   54.556669] 
[   54.558145] Memory state around the buggy address:
[   54.562924]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.570128]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.577333] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.584534]                                      ^
[   54.589312]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.596517]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.603718] ==================================================================
[   56.183271] ==================================================================
[   56.190328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.197617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.204996] 
[   56.206478] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.206524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.206539] Hardware name: WinLink E850-96 board (DT)
[   56.206560] Call trace:
[   56.206573]  show_stack+0x20/0x38 (C)
[   56.206606]  dump_stack_lvl+0x8c/0xd0
[   56.206642]  print_report+0x118/0x608
[   56.206671]  kasan_report+0xdc/0x128
[   56.206701]  kasan_check_range+0x100/0x1a8
[   56.206733]  __kasan_check_write+0x20/0x30
[   56.206767]  kasan_atomics_helper+0xe44/0x4858
[   56.206797]  kasan_atomics+0x198/0x2e0
[   56.206825]  kunit_try_run_case+0x170/0x3f0
[   56.206861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.206902]  kthread+0x328/0x630
[   56.206936]  ret_from_fork+0x10/0x20
[   56.206968] 
[   56.276696] Allocated by task 314:
[   56.280081]  kasan_save_stack+0x3c/0x68
[   56.283900]  kasan_save_track+0x20/0x40
[   56.287720]  kasan_save_alloc_info+0x40/0x58
[   56.291973]  __kasan_kmalloc+0xd4/0xd8
[   56.295706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.300220]  kasan_atomics+0xb8/0x2e0
[   56.303866]  kunit_try_run_case+0x170/0x3f0
[   56.308032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.313501]  kthread+0x328/0x630
[   56.316713]  ret_from_fork+0x10/0x20
[   56.320272] 
[   56.321747] The buggy address belongs to the object at ffff000800d61a00
[   56.321747]  which belongs to the cache kmalloc-64 of size 64
[   56.334074] The buggy address is located 0 bytes to the right of
[   56.334074]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.346920] 
[   56.348396] The buggy address belongs to the physical page:
[   56.353954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.361938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.368448] page_type: f5(slab)
[   56.371581] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.379306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.387024] page dumped because: kasan: bad access detected
[   56.392580] 
[   56.394055] Memory state around the buggy address:
[   56.398835]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.406038]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.413243] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.420444]                                      ^
[   56.425222]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.432426]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.439628] ==================================================================
[   59.873515] ==================================================================
[   59.880551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   59.887927] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.895218] 
[   59.896700] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.896747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.896763] Hardware name: WinLink E850-96 board (DT)
[   59.896782] Call trace:
[   59.896794]  show_stack+0x20/0x38 (C)
[   59.896827]  dump_stack_lvl+0x8c/0xd0
[   59.896863]  print_report+0x118/0x608
[   59.896895]  kasan_report+0xdc/0x128
[   59.896924]  __asan_report_load8_noabort+0x20/0x30
[   59.896959]  kasan_atomics_helper+0x3f04/0x4858
[   59.896990]  kasan_atomics+0x198/0x2e0
[   59.897019]  kunit_try_run_case+0x170/0x3f0
[   59.897054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.897091]  kthread+0x328/0x630
[   59.897121]  ret_from_fork+0x10/0x20
[   59.897153] 
[   59.963620] Allocated by task 314:
[   59.967007]  kasan_save_stack+0x3c/0x68
[   59.970824]  kasan_save_track+0x20/0x40
[   59.974644]  kasan_save_alloc_info+0x40/0x58
[   59.978897]  __kasan_kmalloc+0xd4/0xd8
[   59.982630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.987144]  kasan_atomics+0xb8/0x2e0
[   59.990789]  kunit_try_run_case+0x170/0x3f0
[   59.994956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.000424]  kthread+0x328/0x630
[   60.003636]  ret_from_fork+0x10/0x20
[   60.007195] 
[   60.008671] The buggy address belongs to the object at ffff000800d61a00
[   60.008671]  which belongs to the cache kmalloc-64 of size 64
[   60.020998] The buggy address is located 0 bytes to the right of
[   60.020998]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.033844] 
[   60.035322] The buggy address belongs to the physical page:
[   60.040876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.048862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.055371] page_type: f5(slab)
[   60.058507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.066229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.073948] page dumped because: kasan: bad access detected
[   60.079503] 
[   60.080979] Memory state around the buggy address:
[   60.085759]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.092962]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.100167] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.107367]                                      ^
[   60.112146]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.119350]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.126551] ==================================================================
[   60.397753] ==================================================================
[   60.404848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.412224] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.419602] 
[   60.421086] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.421133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.421149] Hardware name: WinLink E850-96 board (DT)
[   60.421168] Call trace:
[   60.421181]  show_stack+0x20/0x38 (C)
[   60.421213]  dump_stack_lvl+0x8c/0xd0
[   60.421247]  print_report+0x118/0x608
[   60.421276]  kasan_report+0xdc/0x128
[   60.421307]  kasan_check_range+0x100/0x1a8
[   60.421339]  __kasan_check_write+0x20/0x30
[   60.421372]  kasan_atomics_helper+0x147c/0x4858
[   60.421403]  kasan_atomics+0x198/0x2e0
[   60.421431]  kunit_try_run_case+0x170/0x3f0
[   60.421465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.421504]  kthread+0x328/0x630
[   60.421537]  ret_from_fork+0x10/0x20
[   60.421572] 
[   60.491389] Allocated by task 314:
[   60.494775]  kasan_save_stack+0x3c/0x68
[   60.498594]  kasan_save_track+0x20/0x40
[   60.502414]  kasan_save_alloc_info+0x40/0x58
[   60.506667]  __kasan_kmalloc+0xd4/0xd8
[   60.510400]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.514913]  kasan_atomics+0xb8/0x2e0
[   60.518559]  kunit_try_run_case+0x170/0x3f0
[   60.522726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.528194]  kthread+0x328/0x630
[   60.531406]  ret_from_fork+0x10/0x20
[   60.534965] 
[   60.536440] The buggy address belongs to the object at ffff000800d61a00
[   60.536440]  which belongs to the cache kmalloc-64 of size 64
[   60.548767] The buggy address is located 0 bytes to the right of
[   60.548767]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.561614] 
[   60.563091] The buggy address belongs to the physical page:
[   60.568646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.576631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.583142] page_type: f5(slab)
[   60.586277] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.593999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.601718] page dumped because: kasan: bad access detected
[   60.607273] 
[   60.608748] Memory state around the buggy address:
[   60.613527]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.620732]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.627937] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.635137]                                      ^
[   60.639915]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.647121]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.654321] ==================================================================
[   61.189469] ==================================================================
[   61.196503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.203879] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.211257] 
[   61.212740] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.212787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.212803] Hardware name: WinLink E850-96 board (DT)
[   61.212819] Call trace:
[   61.212832]  show_stack+0x20/0x38 (C)
[   61.212861]  dump_stack_lvl+0x8c/0xd0
[   61.212896]  print_report+0x118/0x608
[   61.212927]  kasan_report+0xdc/0x128
[   61.212959]  kasan_check_range+0x100/0x1a8
[   61.212992]  __kasan_check_write+0x20/0x30
[   61.213025]  kasan_atomics_helper+0x15b4/0x4858
[   61.213056]  kasan_atomics+0x198/0x2e0
[   61.213084]  kunit_try_run_case+0x170/0x3f0
[   61.213118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.213156]  kthread+0x328/0x630
[   61.213189]  ret_from_fork+0x10/0x20
[   61.213223] 
[   61.283044] Allocated by task 314:
[   61.286430]  kasan_save_stack+0x3c/0x68
[   61.290249]  kasan_save_track+0x20/0x40
[   61.294069]  kasan_save_alloc_info+0x40/0x58
[   61.298322]  __kasan_kmalloc+0xd4/0xd8
[   61.302054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.306568]  kasan_atomics+0xb8/0x2e0
[   61.310214]  kunit_try_run_case+0x170/0x3f0
[   61.314380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.319849]  kthread+0x328/0x630
[   61.323061]  ret_from_fork+0x10/0x20
[   61.326620] 
[   61.328096] The buggy address belongs to the object at ffff000800d61a00
[   61.328096]  which belongs to the cache kmalloc-64 of size 64
[   61.340422] The buggy address is located 0 bytes to the right of
[   61.340422]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.353269] 
[   61.354745] The buggy address belongs to the physical page:
[   61.360301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.368287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.374796] page_type: f5(slab)
[   61.377931] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.385654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.393373] page dumped because: kasan: bad access detected
[   61.398928] 
[   61.400403] Memory state around the buggy address:
[   61.405182]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.412387]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.419592] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.426792]                                      ^
[   61.431570]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.438775]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.445976] ==================================================================
[   60.661664] ==================================================================
[   60.668732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.676109] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.683487] 
[   60.684970] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.685018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.685036] Hardware name: WinLink E850-96 board (DT)
[   60.685054] Call trace:
[   60.685067]  show_stack+0x20/0x38 (C)
[   60.685098]  dump_stack_lvl+0x8c/0xd0
[   60.685136]  print_report+0x118/0x608
[   60.685168]  kasan_report+0xdc/0x128
[   60.685197]  kasan_check_range+0x100/0x1a8
[   60.685229]  __kasan_check_write+0x20/0x30
[   60.685262]  kasan_atomics_helper+0x14e4/0x4858
[   60.685293]  kasan_atomics+0x198/0x2e0
[   60.685323]  kunit_try_run_case+0x170/0x3f0
[   60.685356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.685394]  kthread+0x328/0x630
[   60.685428]  ret_from_fork+0x10/0x20
[   60.685461] 
[   60.755274] Allocated by task 314:
[   60.758661]  kasan_save_stack+0x3c/0x68
[   60.762479]  kasan_save_track+0x20/0x40
[   60.766298]  kasan_save_alloc_info+0x40/0x58
[   60.770552]  __kasan_kmalloc+0xd4/0xd8
[   60.774285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.778798]  kasan_atomics+0xb8/0x2e0
[   60.782444]  kunit_try_run_case+0x170/0x3f0
[   60.786611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.792080]  kthread+0x328/0x630
[   60.795291]  ret_from_fork+0x10/0x20
[   60.798850] 
[   60.800326] The buggy address belongs to the object at ffff000800d61a00
[   60.800326]  which belongs to the cache kmalloc-64 of size 64
[   60.812652] The buggy address is located 0 bytes to the right of
[   60.812652]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.825499] 
[   60.826976] The buggy address belongs to the physical page:
[   60.832531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.840516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.847027] page_type: f5(slab)
[   60.850161] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.857884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.865603] page dumped because: kasan: bad access detected
[   60.871158] 
[   60.872634] Memory state around the buggy address:
[   60.877412]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.884617]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.891822] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.899023]                                      ^
[   60.903800]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.911005]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.918206] ==================================================================
[   49.613718] ==================================================================
[   49.620808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.628098] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.635476] 
[   49.636959] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.637009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.637026] Hardware name: WinLink E850-96 board (DT)
[   49.637046] Call trace:
[   49.637058]  show_stack+0x20/0x38 (C)
[   49.637088]  dump_stack_lvl+0x8c/0xd0
[   49.637125]  print_report+0x118/0x608
[   49.637155]  kasan_report+0xdc/0x128
[   49.637184]  kasan_check_range+0x100/0x1a8
[   49.637215]  __kasan_check_write+0x20/0x30
[   49.637251]  kasan_atomics_helper+0x54c/0x4858
[   49.637283]  kasan_atomics+0x198/0x2e0
[   49.637310]  kunit_try_run_case+0x170/0x3f0
[   49.637344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.637383]  kthread+0x328/0x630
[   49.637416]  ret_from_fork+0x10/0x20
[   49.637450] 
[   49.707176] Allocated by task 314:
[   49.710562]  kasan_save_stack+0x3c/0x68
[   49.714381]  kasan_save_track+0x20/0x40
[   49.718201]  kasan_save_alloc_info+0x40/0x58
[   49.722454]  __kasan_kmalloc+0xd4/0xd8
[   49.726187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.730700]  kasan_atomics+0xb8/0x2e0
[   49.734346]  kunit_try_run_case+0x170/0x3f0
[   49.738513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.743982]  kthread+0x328/0x630
[   49.747193]  ret_from_fork+0x10/0x20
[   49.750752] 
[   49.752228] The buggy address belongs to the object at ffff000800d61a00
[   49.752228]  which belongs to the cache kmalloc-64 of size 64
[   49.764554] The buggy address is located 0 bytes to the right of
[   49.764554]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.777401] 
[   49.778878] The buggy address belongs to the physical page:
[   49.784433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.792418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.798928] page_type: f5(slab)
[   49.802063] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.809786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.817505] page dumped because: kasan: bad access detected
[   49.823060] 
[   49.824536] Memory state around the buggy address:
[   49.829314]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.836519]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.843724] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.850924]                                      ^
[   49.855702]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.862907]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.870108] ==================================================================
[   57.498666] ==================================================================
[   57.505759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.513049] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.520427] 
[   57.521909] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.521958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.521972] Hardware name: WinLink E850-96 board (DT)
[   57.521991] Call trace:
[   57.522002]  show_stack+0x20/0x38 (C)
[   57.522033]  dump_stack_lvl+0x8c/0xd0
[   57.522067]  print_report+0x118/0x608
[   57.522096]  kasan_report+0xdc/0x128
[   57.522126]  kasan_check_range+0x100/0x1a8
[   57.522157]  __kasan_check_write+0x20/0x30
[   57.522190]  kasan_atomics_helper+0xff0/0x4858
[   57.522222]  kasan_atomics+0x198/0x2e0
[   57.522250]  kunit_try_run_case+0x170/0x3f0
[   57.522284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.522324]  kthread+0x328/0x630
[   57.522356]  ret_from_fork+0x10/0x20
[   57.522389] 
[   57.592127] Allocated by task 314:
[   57.595513]  kasan_save_stack+0x3c/0x68
[   57.599332]  kasan_save_track+0x20/0x40
[   57.603152]  kasan_save_alloc_info+0x40/0x58
[   57.607405]  __kasan_kmalloc+0xd4/0xd8
[   57.611138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.615651]  kasan_atomics+0xb8/0x2e0
[   57.619297]  kunit_try_run_case+0x170/0x3f0
[   57.623464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.628933]  kthread+0x328/0x630
[   57.632144]  ret_from_fork+0x10/0x20
[   57.635703] 
[   57.637179] The buggy address belongs to the object at ffff000800d61a00
[   57.637179]  which belongs to the cache kmalloc-64 of size 64
[   57.649505] The buggy address is located 0 bytes to the right of
[   57.649505]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.662352] 
[   57.663828] The buggy address belongs to the physical page:
[   57.669384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.677369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.683880] page_type: f5(slab)
[   57.687014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.694737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.702456] page dumped because: kasan: bad access detected
[   57.708011] 
[   57.709487] Memory state around the buggy address:
[   57.714266]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.721470]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.728674] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.735875]                                      ^
[   57.740653]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.747858]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.755059] ==================================================================
[   50.932298] ==================================================================
[   50.939364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   50.946655] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.954033] 
[   50.955515] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.955561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.955579] Hardware name: WinLink E850-96 board (DT)
[   50.955597] Call trace:
[   50.955609]  show_stack+0x20/0x38 (C)
[   50.955642]  dump_stack_lvl+0x8c/0xd0
[   50.955676]  print_report+0x118/0x608
[   50.955708]  kasan_report+0xdc/0x128
[   50.955737]  kasan_check_range+0x100/0x1a8
[   50.955768]  __kasan_check_write+0x20/0x30
[   50.955800]  kasan_atomics_helper+0x760/0x4858
[   50.955831]  kasan_atomics+0x198/0x2e0
[   50.955860]  kunit_try_run_case+0x170/0x3f0
[   50.955894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.955934]  kthread+0x328/0x630
[   50.955967]  ret_from_fork+0x10/0x20
[   50.955997] 
[   51.025733] Allocated by task 314:
[   51.029120]  kasan_save_stack+0x3c/0x68
[   51.032938]  kasan_save_track+0x20/0x40
[   51.036757]  kasan_save_alloc_info+0x40/0x58
[   51.041010]  __kasan_kmalloc+0xd4/0xd8
[   51.044743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.049257]  kasan_atomics+0xb8/0x2e0
[   51.052903]  kunit_try_run_case+0x170/0x3f0
[   51.057069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.062538]  kthread+0x328/0x630
[   51.065750]  ret_from_fork+0x10/0x20
[   51.069309] 
[   51.070785] The buggy address belongs to the object at ffff000800d61a00
[   51.070785]  which belongs to the cache kmalloc-64 of size 64
[   51.083111] The buggy address is located 0 bytes to the right of
[   51.083111]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.095958] 
[   51.097435] The buggy address belongs to the physical page:
[   51.102991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.110977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.117485] page_type: f5(slab)
[   51.120620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.128342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.136061] page dumped because: kasan: bad access detected
[   51.141617] 
[   51.143092] Memory state around the buggy address:
[   51.147872]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.155076]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.162280] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.169481]                                      ^
[   51.174259]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.181464]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.188664] ==================================================================
[   57.762432] ==================================================================
[   57.769470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.776847] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.784225] 
[   57.785707] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.785756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.785772] Hardware name: WinLink E850-96 board (DT)
[   57.785790] Call trace:
[   57.785804]  show_stack+0x20/0x38 (C)
[   57.785836]  dump_stack_lvl+0x8c/0xd0
[   57.785873]  print_report+0x118/0x608
[   57.785903]  kasan_report+0xdc/0x128
[   57.785932]  kasan_check_range+0x100/0x1a8
[   57.785965]  __kasan_check_write+0x20/0x30
[   57.785998]  kasan_atomics_helper+0x1058/0x4858
[   57.786028]  kasan_atomics+0x198/0x2e0
[   57.786056]  kunit_try_run_case+0x170/0x3f0
[   57.786091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.786131]  kthread+0x328/0x630
[   57.786164]  ret_from_fork+0x10/0x20
[   57.786197] 
[   57.856012] Allocated by task 314:
[   57.859401]  kasan_save_stack+0x3c/0x68
[   57.863217]  kasan_save_track+0x20/0x40
[   57.867037]  kasan_save_alloc_info+0x40/0x58
[   57.871290]  __kasan_kmalloc+0xd4/0xd8
[   57.875023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.879537]  kasan_atomics+0xb8/0x2e0
[   57.883182]  kunit_try_run_case+0x170/0x3f0
[   57.887349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.892817]  kthread+0x328/0x630
[   57.896029]  ret_from_fork+0x10/0x20
[   57.899588] 
[   57.901063] The buggy address belongs to the object at ffff000800d61a00
[   57.901063]  which belongs to the cache kmalloc-64 of size 64
[   57.913392] The buggy address is located 0 bytes to the right of
[   57.913392]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.926237] 
[   57.927713] The buggy address belongs to the physical page:
[   57.933269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.941255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.947764] page_type: f5(slab)
[   57.950897] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.958622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.966341] page dumped because: kasan: bad access detected
[   57.971896] 
[   57.973372] Memory state around the buggy address:
[   57.978152]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.985355]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.992559] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.999760]                                      ^
[   58.004538]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.011743]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.018944] ==================================================================
[   56.707562] ==================================================================
[   56.714628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.721915] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.729293] 
[   56.730777] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.730823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.730839] Hardware name: WinLink E850-96 board (DT)
[   56.730856] Call trace:
[   56.730870]  show_stack+0x20/0x38 (C)
[   56.730902]  dump_stack_lvl+0x8c/0xd0
[   56.730936]  print_report+0x118/0x608
[   56.730967]  kasan_report+0xdc/0x128
[   56.730996]  kasan_check_range+0x100/0x1a8
[   56.731027]  __kasan_check_write+0x20/0x30
[   56.731059]  kasan_atomics_helper+0xeb8/0x4858
[   56.731087]  kasan_atomics+0x198/0x2e0
[   56.731118]  kunit_try_run_case+0x170/0x3f0
[   56.731151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.731190]  kthread+0x328/0x630
[   56.731222]  ret_from_fork+0x10/0x20
[   56.731256] 
[   56.800994] Allocated by task 314:
[   56.804379]  kasan_save_stack+0x3c/0x68
[   56.808198]  kasan_save_track+0x20/0x40
[   56.812018]  kasan_save_alloc_info+0x40/0x58
[   56.816271]  __kasan_kmalloc+0xd4/0xd8
[   56.820004]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.824517]  kasan_atomics+0xb8/0x2e0
[   56.828163]  kunit_try_run_case+0x170/0x3f0
[   56.832330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.837798]  kthread+0x328/0x630
[   56.841010]  ret_from_fork+0x10/0x20
[   56.844569] 
[   56.846045] The buggy address belongs to the object at ffff000800d61a00
[   56.846045]  which belongs to the cache kmalloc-64 of size 64
[   56.858371] The buggy address is located 0 bytes to the right of
[   56.858371]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.871218] 
[   56.872694] The buggy address belongs to the physical page:
[   56.878251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.886236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.892746] page_type: f5(slab)
[   56.895882] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.903603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.911322] page dumped because: kasan: bad access detected
[   56.916877] 
[   56.918353] Memory state around the buggy address:
[   56.923132]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.930336]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.937541] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.944741]                                      ^
[   56.949519]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.956724]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.963925] ==================================================================
[   59.345744] ==================================================================
[   59.352780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.360157] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.367535] 
[   59.369018] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.369067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.369083] Hardware name: WinLink E850-96 board (DT)
[   59.369100] Call trace:
[   59.369113]  show_stack+0x20/0x38 (C)
[   59.369144]  dump_stack_lvl+0x8c/0xd0
[   59.369182]  print_report+0x118/0x608
[   59.369211]  kasan_report+0xdc/0x128
[   59.369241]  kasan_check_range+0x100/0x1a8
[   59.369272]  __kasan_check_write+0x20/0x30
[   59.369304]  kasan_atomics_helper+0x12d8/0x4858
[   59.369334]  kasan_atomics+0x198/0x2e0
[   59.369361]  kunit_try_run_case+0x170/0x3f0
[   59.369395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.369435]  kthread+0x328/0x630
[   59.369470]  ret_from_fork+0x10/0x20
[   59.369501] 
[   59.439322] Allocated by task 314:
[   59.442708]  kasan_save_stack+0x3c/0x68
[   59.446527]  kasan_save_track+0x20/0x40
[   59.450346]  kasan_save_alloc_info+0x40/0x58
[   59.454599]  __kasan_kmalloc+0xd4/0xd8
[   59.458332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.462846]  kasan_atomics+0xb8/0x2e0
[   59.466492]  kunit_try_run_case+0x170/0x3f0
[   59.470658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.476127]  kthread+0x328/0x630
[   59.479339]  ret_from_fork+0x10/0x20
[   59.482898] 
[   59.484373] The buggy address belongs to the object at ffff000800d61a00
[   59.484373]  which belongs to the cache kmalloc-64 of size 64
[   59.496700] The buggy address is located 0 bytes to the right of
[   59.496700]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.509547] 
[   59.511024] The buggy address belongs to the physical page:
[   59.516578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.524564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.531074] page_type: f5(slab)
[   59.534209] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.541931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.549650] page dumped because: kasan: bad access detected
[   59.555205] 
[   59.556681] Memory state around the buggy address:
[   59.561461]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.568664]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.575869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.583070]                                      ^
[   59.587848]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.595053]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.602254] ==================================================================
[   63.286642] ==================================================================
[   63.293694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.301070] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   63.308448] 
[   63.309931] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.309978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.309993] Hardware name: WinLink E850-96 board (DT)
[   63.310013] Call trace:
[   63.310025]  show_stack+0x20/0x38 (C)
[   63.310057]  dump_stack_lvl+0x8c/0xd0
[   63.310092]  print_report+0x118/0x608
[   63.310123]  kasan_report+0xdc/0x128
[   63.310153]  kasan_check_range+0x100/0x1a8
[   63.310183]  __kasan_check_write+0x20/0x30
[   63.310217]  kasan_atomics_helper+0x17ec/0x4858
[   63.310248]  kasan_atomics+0x198/0x2e0
[   63.310275]  kunit_try_run_case+0x170/0x3f0
[   63.310311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.310349]  kthread+0x328/0x630
[   63.310383]  ret_from_fork+0x10/0x20
[   63.310416] 
[   63.380235] Allocated by task 314:
[   63.383621]  kasan_save_stack+0x3c/0x68
[   63.387440]  kasan_save_track+0x20/0x40
[   63.391259]  kasan_save_alloc_info+0x40/0x58
[   63.395512]  __kasan_kmalloc+0xd4/0xd8
[   63.399245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   63.403759]  kasan_atomics+0xb8/0x2e0
[   63.407405]  kunit_try_run_case+0x170/0x3f0
[   63.411571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.417040]  kthread+0x328/0x630
[   63.420252]  ret_from_fork+0x10/0x20
[   63.423811] 
[   63.425286] The buggy address belongs to the object at ffff000800d61a00
[   63.425286]  which belongs to the cache kmalloc-64 of size 64
[   63.437614] The buggy address is located 0 bytes to the right of
[   63.437614]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   63.450460] 
[   63.451937] The buggy address belongs to the physical page:
[   63.457493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   63.465477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.471987] page_type: f5(slab)
[   63.475121] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.482845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.490563] page dumped because: kasan: bad access detected
[   63.496119] 
[   63.497594] Memory state around the buggy address:
[   63.502374]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.509577]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.516782] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.523983]                                      ^
[   63.528761]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.535966]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.543167] ==================================================================
[   51.723445] ==================================================================
[   51.730501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.737875] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.745167] 
[   51.746650] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.746697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.746715] Hardware name: WinLink E850-96 board (DT)
[   51.746735] Call trace:
[   51.746747]  show_stack+0x20/0x38 (C)
[   51.746778]  dump_stack_lvl+0x8c/0xd0
[   51.746813]  print_report+0x118/0x608
[   51.746846]  kasan_report+0xdc/0x128
[   51.746876]  __asan_report_load4_noabort+0x20/0x30
[   51.746911]  kasan_atomics_helper+0x42d8/0x4858
[   51.746942]  kasan_atomics+0x198/0x2e0
[   51.746969]  kunit_try_run_case+0x170/0x3f0
[   51.747003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.747044]  kthread+0x328/0x630
[   51.747077]  ret_from_fork+0x10/0x20
[   51.747113] 
[   51.813568] Allocated by task 314:
[   51.816954]  kasan_save_stack+0x3c/0x68
[   51.820773]  kasan_save_track+0x20/0x40
[   51.824593]  kasan_save_alloc_info+0x40/0x58
[   51.828846]  __kasan_kmalloc+0xd4/0xd8
[   51.832578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.837092]  kasan_atomics+0xb8/0x2e0
[   51.840738]  kunit_try_run_case+0x170/0x3f0
[   51.844905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.850374]  kthread+0x328/0x630
[   51.853585]  ret_from_fork+0x10/0x20
[   51.857144] 
[   51.858620] The buggy address belongs to the object at ffff000800d61a00
[   51.858620]  which belongs to the cache kmalloc-64 of size 64
[   51.870947] The buggy address is located 0 bytes to the right of
[   51.870947]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.883793] 
[   51.885269] The buggy address belongs to the physical page:
[   51.890826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.898810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.905321] page_type: f5(slab)
[   51.908455] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.916178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.923896] page dumped because: kasan: bad access detected
[   51.929452] 
[   51.930928] Memory state around the buggy address:
[   51.935706]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.942911]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.950115] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.957316]                                      ^
[   51.962094]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.969299]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.976500] ==================================================================
[   47.247062] ==================================================================
[   47.254004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.261293] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.268672] 
[   47.270155] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.270213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.270232] Hardware name: WinLink E850-96 board (DT)
[   47.270254] Call trace:
[   47.270268]  show_stack+0x20/0x38 (C)
[   47.270308]  dump_stack_lvl+0x8c/0xd0
[   47.270346]  print_report+0x118/0x608
[   47.270376]  kasan_report+0xdc/0x128
[   47.270406]  kasan_check_range+0x100/0x1a8
[   47.270440]  __kasan_check_write+0x20/0x30
[   47.270475]  kasan_atomics_helper+0x24c/0x4858
[   47.270506]  kasan_atomics+0x198/0x2e0
[   47.270535]  kunit_try_run_case+0x170/0x3f0
[   47.270576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.270614]  kthread+0x328/0x630
[   47.270648]  ret_from_fork+0x10/0x20
[   47.270684] 
[   47.340371] Allocated by task 314:
[   47.343759]  kasan_save_stack+0x3c/0x68
[   47.347577]  kasan_save_track+0x20/0x40
[   47.351396]  kasan_save_alloc_info+0x40/0x58
[   47.355649]  __kasan_kmalloc+0xd4/0xd8
[   47.359382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.363896]  kasan_atomics+0xb8/0x2e0
[   47.367541]  kunit_try_run_case+0x170/0x3f0
[   47.371708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.377177]  kthread+0x328/0x630
[   47.380388]  ret_from_fork+0x10/0x20
[   47.383947] 
[   47.385423] The buggy address belongs to the object at ffff000800d61a00
[   47.385423]  which belongs to the cache kmalloc-64 of size 64
[   47.397751] The buggy address is located 0 bytes to the right of
[   47.397751]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.410596] 
[   47.412074] The buggy address belongs to the physical page:
[   47.417631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.425616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.432124] page_type: f5(slab)
[   47.435261] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.442981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.450700] page dumped because: kasan: bad access detected
[   47.456257] 
[   47.457731] Memory state around the buggy address:
[   47.462513]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.469714]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.476918] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.484120]                                      ^
[   47.488898]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.496102]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.503303] ==================================================================
[   55.659284] ==================================================================
[   55.666377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.673667] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.680958] 
[   55.682441] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.682490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.682506] Hardware name: WinLink E850-96 board (DT)
[   55.682526] Call trace:
[   55.682540]  show_stack+0x20/0x38 (C)
[   55.682570]  dump_stack_lvl+0x8c/0xd0
[   55.682606]  print_report+0x118/0x608
[   55.682637]  kasan_report+0xdc/0x128
[   55.682667]  kasan_check_range+0x100/0x1a8
[   55.682700]  __kasan_check_read+0x20/0x30
[   55.682734]  kasan_atomics_helper+0xdd4/0x4858
[   55.682764]  kasan_atomics+0x198/0x2e0
[   55.682792]  kunit_try_run_case+0x170/0x3f0
[   55.682827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.682865]  kthread+0x328/0x630
[   55.682898]  ret_from_fork+0x10/0x20
[   55.682931] 
[   55.752572] Allocated by task 314:
[   55.755959]  kasan_save_stack+0x3c/0x68
[   55.759776]  kasan_save_track+0x20/0x40
[   55.763596]  kasan_save_alloc_info+0x40/0x58
[   55.767849]  __kasan_kmalloc+0xd4/0xd8
[   55.771582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.776096]  kasan_atomics+0xb8/0x2e0
[   55.779741]  kunit_try_run_case+0x170/0x3f0
[   55.783908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.789377]  kthread+0x328/0x630
[   55.792589]  ret_from_fork+0x10/0x20
[   55.796147] 
[   55.797623] The buggy address belongs to the object at ffff000800d61a00
[   55.797623]  which belongs to the cache kmalloc-64 of size 64
[   55.809951] The buggy address is located 0 bytes to the right of
[   55.809951]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.822796] 
[   55.824272] The buggy address belongs to the physical page:
[   55.829828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.837814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.844324] page_type: f5(slab)
[   55.847459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.855181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.862900] page dumped because: kasan: bad access detected
[   55.868455] 
[   55.869931] Memory state around the buggy address:
[   55.874710]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.881914]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.889119] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.896320]                                      ^
[   55.901098]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.908302]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.915503] ==================================================================
[   56.447004] ==================================================================
[   56.454040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.461416] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.468794] 
[   56.470277] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.470324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.470342] Hardware name: WinLink E850-96 board (DT)
[   56.470361] Call trace:
[   56.470374]  show_stack+0x20/0x38 (C)
[   56.470405]  dump_stack_lvl+0x8c/0xd0
[   56.470438]  print_report+0x118/0x608
[   56.470468]  kasan_report+0xdc/0x128
[   56.470497]  __asan_report_store8_noabort+0x20/0x30
[   56.470533]  kasan_atomics_helper+0x3e5c/0x4858
[   56.470565]  kasan_atomics+0x198/0x2e0
[   56.470592]  kunit_try_run_case+0x170/0x3f0
[   56.470627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.470666]  kthread+0x328/0x630
[   56.470699]  ret_from_fork+0x10/0x20
[   56.470732] 
[   56.537282] Allocated by task 314:
[   56.540669]  kasan_save_stack+0x3c/0x68
[   56.544487]  kasan_save_track+0x20/0x40
[   56.548306]  kasan_save_alloc_info+0x40/0x58
[   56.552560]  __kasan_kmalloc+0xd4/0xd8
[   56.556292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.560806]  kasan_atomics+0xb8/0x2e0
[   56.564452]  kunit_try_run_case+0x170/0x3f0
[   56.568619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.574087]  kthread+0x328/0x630
[   56.577299]  ret_from_fork+0x10/0x20
[   56.580858] 
[   56.582334] The buggy address belongs to the object at ffff000800d61a00
[   56.582334]  which belongs to the cache kmalloc-64 of size 64
[   56.594660] The buggy address is located 0 bytes to the right of
[   56.594660]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.607506] 
[   56.608983] The buggy address belongs to the physical page:
[   56.614540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.622524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.629034] page_type: f5(slab)
[   56.632171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.639892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.647611] page dumped because: kasan: bad access detected
[   56.653166] 
[   56.654641] Memory state around the buggy address:
[   56.659420]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.666625]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.673829] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.681030]                                      ^
[   56.685808]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.693013]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.700214] ==================================================================
[   58.290202] ==================================================================
[   58.297240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.304617] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.311995] 
[   58.313480] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.313531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.313548] Hardware name: WinLink E850-96 board (DT)
[   58.313564] Call trace:
[   58.313580]  show_stack+0x20/0x38 (C)
[   58.313611]  dump_stack_lvl+0x8c/0xd0
[   58.313646]  print_report+0x118/0x608
[   58.313676]  kasan_report+0xdc/0x128
[   58.313705]  kasan_check_range+0x100/0x1a8
[   58.313736]  __kasan_check_write+0x20/0x30
[   58.313769]  kasan_atomics_helper+0x1128/0x4858
[   58.313801]  kasan_atomics+0x198/0x2e0
[   58.313829]  kunit_try_run_case+0x170/0x3f0
[   58.313864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.313901]  kthread+0x328/0x630
[   58.313933]  ret_from_fork+0x10/0x20
[   58.313963] 
[   58.383782] Allocated by task 314:
[   58.387170]  kasan_save_stack+0x3c/0x68
[   58.390987]  kasan_save_track+0x20/0x40
[   58.394806]  kasan_save_alloc_info+0x40/0x58
[   58.399060]  __kasan_kmalloc+0xd4/0xd8
[   58.402793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.407306]  kasan_atomics+0xb8/0x2e0
[   58.410952]  kunit_try_run_case+0x170/0x3f0
[   58.415119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.420587]  kthread+0x328/0x630
[   58.423799]  ret_from_fork+0x10/0x20
[   58.427358] 
[   58.428834] The buggy address belongs to the object at ffff000800d61a00
[   58.428834]  which belongs to the cache kmalloc-64 of size 64
[   58.441160] The buggy address is located 0 bytes to the right of
[   58.441160]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.454007] 
[   58.455484] The buggy address belongs to the physical page:
[   58.461039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.469024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.475534] page_type: f5(slab)
[   58.478669] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.486392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.494110] page dumped because: kasan: bad access detected
[   58.499666] 
[   58.501141] Memory state around the buggy address:
[   58.505920]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.513125]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.520329] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.527530]                                      ^
[   58.532308]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.539513]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.546714] ==================================================================
[   61.977594] ==================================================================
[   61.984685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   61.992063] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.999353] 
[   62.000835] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.000883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.000899] Hardware name: WinLink E850-96 board (DT)
[   62.000918] Call trace:
[   62.000932]  show_stack+0x20/0x38 (C)
[   62.000964]  dump_stack_lvl+0x8c/0xd0
[   62.000997]  print_report+0x118/0x608
[   62.001025]  kasan_report+0xdc/0x128
[   62.001056]  __asan_report_load8_noabort+0x20/0x30
[   62.001092]  kasan_atomics_helper+0x3df4/0x4858
[   62.001121]  kasan_atomics+0x198/0x2e0
[   62.001149]  kunit_try_run_case+0x170/0x3f0
[   62.001184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.001222]  kthread+0x328/0x630
[   62.001255]  ret_from_fork+0x10/0x20
[   62.001289] 
[   62.067754] Allocated by task 314:
[   62.071141]  kasan_save_stack+0x3c/0x68
[   62.074959]  kasan_save_track+0x20/0x40
[   62.078779]  kasan_save_alloc_info+0x40/0x58
[   62.083032]  __kasan_kmalloc+0xd4/0xd8
[   62.086765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.091279]  kasan_atomics+0xb8/0x2e0
[   62.094924]  kunit_try_run_case+0x170/0x3f0
[   62.099091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.104560]  kthread+0x328/0x630
[   62.107772]  ret_from_fork+0x10/0x20
[   62.111330] 
[   62.112806] The buggy address belongs to the object at ffff000800d61a00
[   62.112806]  which belongs to the cache kmalloc-64 of size 64
[   62.125133] The buggy address is located 0 bytes to the right of
[   62.125133]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.137979] 
[   62.139457] The buggy address belongs to the physical page:
[   62.145012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.152998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.159507] page_type: f5(slab)
[   62.162642] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.170364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.178083] page dumped because: kasan: bad access detected
[   62.183638] 
[   62.185114] Memory state around the buggy address:
[   62.189893]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.197097]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.204302] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.211503]                                      ^
[   62.216281]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.223485]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.230687] ==================================================================
[   53.826560] ==================================================================
[   53.833592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.840969] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.848260] 
[   53.849744] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.849793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.849810] Hardware name: WinLink E850-96 board (DT)
[   53.849829] Call trace:
[   53.849843]  show_stack+0x20/0x38 (C)
[   53.849874]  dump_stack_lvl+0x8c/0xd0
[   53.849910]  print_report+0x118/0x608
[   53.849940]  kasan_report+0xdc/0x128
[   53.849972]  __asan_report_load4_noabort+0x20/0x30
[   53.850006]  kasan_atomics_helper+0x3dbc/0x4858
[   53.850037]  kasan_atomics+0x198/0x2e0
[   53.850064]  kunit_try_run_case+0x170/0x3f0
[   53.850103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.850144]  kthread+0x328/0x630
[   53.850176]  ret_from_fork+0x10/0x20
[   53.850211] 
[   53.916662] Allocated by task 314:
[   53.920049]  kasan_save_stack+0x3c/0x68
[   53.923867]  kasan_save_track+0x20/0x40
[   53.927686]  kasan_save_alloc_info+0x40/0x58
[   53.931939]  __kasan_kmalloc+0xd4/0xd8
[   53.935672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.940186]  kasan_atomics+0xb8/0x2e0
[   53.943831]  kunit_try_run_case+0x170/0x3f0
[   53.947998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.953467]  kthread+0x328/0x630
[   53.956679]  ret_from_fork+0x10/0x20
[   53.960238] 
[   53.961713] The buggy address belongs to the object at ffff000800d61a00
[   53.961713]  which belongs to the cache kmalloc-64 of size 64
[   53.974040] The buggy address is located 0 bytes to the right of
[   53.974040]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.986886] 
[   53.988364] The buggy address belongs to the physical page:
[   53.993920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.001904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.008414] page_type: f5(slab)
[   54.011547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.019271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.026990] page dumped because: kasan: bad access detected
[   54.032545] 
[   54.034021] Memory state around the buggy address:
[   54.038799]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.046004]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.053209] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.060410]                                      ^
[   54.065188]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.072393]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.079594] ==================================================================
[   62.762334] ==================================================================
[   62.769395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.776773] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.784150] 
[   62.785634] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.785681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.785696] Hardware name: WinLink E850-96 board (DT)
[   62.785712] Call trace:
[   62.785725]  show_stack+0x20/0x38 (C)
[   62.785756]  dump_stack_lvl+0x8c/0xd0
[   62.785793]  print_report+0x118/0x608
[   62.785824]  kasan_report+0xdc/0x128
[   62.785853]  kasan_check_range+0x100/0x1a8
[   62.785884]  __kasan_check_write+0x20/0x30
[   62.785919]  kasan_atomics_helper+0x175c/0x4858
[   62.785949]  kasan_atomics+0x198/0x2e0
[   62.785976]  kunit_try_run_case+0x170/0x3f0
[   62.786013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.786052]  kthread+0x328/0x630
[   62.786085]  ret_from_fork+0x10/0x20
[   62.786118] 
[   62.855937] Allocated by task 314:
[   62.859323]  kasan_save_stack+0x3c/0x68
[   62.863142]  kasan_save_track+0x20/0x40
[   62.866962]  kasan_save_alloc_info+0x40/0x58
[   62.871215]  __kasan_kmalloc+0xd4/0xd8
[   62.874947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.879461]  kasan_atomics+0xb8/0x2e0
[   62.883107]  kunit_try_run_case+0x170/0x3f0
[   62.887273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.892742]  kthread+0x328/0x630
[   62.895954]  ret_from_fork+0x10/0x20
[   62.899513] 
[   62.900988] The buggy address belongs to the object at ffff000800d61a00
[   62.900988]  which belongs to the cache kmalloc-64 of size 64
[   62.913315] The buggy address is located 0 bytes to the right of
[   62.913315]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.926162] 
[   62.927641] The buggy address belongs to the physical page:
[   62.933195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.941180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.947689] page_type: f5(slab)
[   62.950825] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.958547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.966266] page dumped because: kasan: bad access detected
[   62.971821] 
[   62.973297] Memory state around the buggy address:
[   62.978075]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.985280]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.992484] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.999685]                                      ^
[   63.004464]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.011668]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.018869] ==================================================================
[   51.983854] ==================================================================
[   51.990912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   51.998201] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.005579] 
[   52.007063] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.007109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.007127] Hardware name: WinLink E850-96 board (DT)
[   52.007145] Call trace:
[   52.007158]  show_stack+0x20/0x38 (C)
[   52.007190]  dump_stack_lvl+0x8c/0xd0
[   52.007224]  print_report+0x118/0x608
[   52.007255]  kasan_report+0xdc/0x128
[   52.007286]  kasan_check_range+0x100/0x1a8
[   52.007317]  __kasan_check_write+0x20/0x30
[   52.007348]  kasan_atomics_helper+0x934/0x4858
[   52.007379]  kasan_atomics+0x198/0x2e0
[   52.007404]  kunit_try_run_case+0x170/0x3f0
[   52.007440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.007478]  kthread+0x328/0x630
[   52.007509]  ret_from_fork+0x10/0x20
[   52.007542] 
[   52.077280] Allocated by task 314:
[   52.080667]  kasan_save_stack+0x3c/0x68
[   52.084485]  kasan_save_track+0x20/0x40
[   52.088304]  kasan_save_alloc_info+0x40/0x58
[   52.092557]  __kasan_kmalloc+0xd4/0xd8
[   52.096290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.100804]  kasan_atomics+0xb8/0x2e0
[   52.104450]  kunit_try_run_case+0x170/0x3f0
[   52.108616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.114085]  kthread+0x328/0x630
[   52.117297]  ret_from_fork+0x10/0x20
[   52.120856] 
[   52.122331] The buggy address belongs to the object at ffff000800d61a00
[   52.122331]  which belongs to the cache kmalloc-64 of size 64
[   52.134658] The buggy address is located 0 bytes to the right of
[   52.134658]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.147504] 
[   52.148982] The buggy address belongs to the physical page:
[   52.154538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.162522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.169031] page_type: f5(slab)
[   52.172167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.179889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.187608] page dumped because: kasan: bad access detected
[   52.193163] 
[   52.194639] Memory state around the buggy address:
[   52.199417]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.206622]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.213827] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.221028]                                      ^
[   52.225806]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.233010]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.240211] ==================================================================
[   57.234982] ==================================================================
[   57.242047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.249338] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   57.256716] 
[   57.258199] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   57.258249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.258265] Hardware name: WinLink E850-96 board (DT)
[   57.258285] Call trace:
[   57.258297]  show_stack+0x20/0x38 (C)
[   57.258330]  dump_stack_lvl+0x8c/0xd0
[   57.258365]  print_report+0x118/0x608
[   57.258396]  kasan_report+0xdc/0x128
[   57.258425]  kasan_check_range+0x100/0x1a8
[   57.258457]  __kasan_check_write+0x20/0x30
[   57.258489]  kasan_atomics_helper+0xf88/0x4858
[   57.258519]  kasan_atomics+0x198/0x2e0
[   57.258547]  kunit_try_run_case+0x170/0x3f0
[   57.258581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.258621]  kthread+0x328/0x630
[   57.258652]  ret_from_fork+0x10/0x20
[   57.258684] 
[   57.328416] Allocated by task 314:
[   57.331802]  kasan_save_stack+0x3c/0x68
[   57.335621]  kasan_save_track+0x20/0x40
[   57.339441]  kasan_save_alloc_info+0x40/0x58
[   57.343694]  __kasan_kmalloc+0xd4/0xd8
[   57.347426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.351940]  kasan_atomics+0xb8/0x2e0
[   57.355586]  kunit_try_run_case+0x170/0x3f0
[   57.359753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.365221]  kthread+0x328/0x630
[   57.368433]  ret_from_fork+0x10/0x20
[   57.371992] 
[   57.373467] The buggy address belongs to the object at ffff000800d61a00
[   57.373467]  which belongs to the cache kmalloc-64 of size 64
[   57.385794] The buggy address is located 0 bytes to the right of
[   57.385794]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.398641] 
[   57.400117] The buggy address belongs to the physical page:
[   57.405673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.413659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.420168] page_type: f5(slab)
[   57.423303] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.431026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.438744] page dumped because: kasan: bad access detected
[   57.444300] 
[   57.445775] Memory state around the buggy address:
[   57.450555]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.457759]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.464963] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.472164]                                      ^
[   57.476942]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.484147]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.491348] ==================================================================
[   58.026301] ==================================================================
[   58.033355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.040732] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.048110] 
[   58.049593] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.049643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.049660] Hardware name: WinLink E850-96 board (DT)
[   58.049680] Call trace:
[   58.049692]  show_stack+0x20/0x38 (C)
[   58.049724]  dump_stack_lvl+0x8c/0xd0
[   58.049760]  print_report+0x118/0x608
[   58.049789]  kasan_report+0xdc/0x128
[   58.049818]  kasan_check_range+0x100/0x1a8
[   58.049850]  __kasan_check_write+0x20/0x30
[   58.049882]  kasan_atomics_helper+0x10c0/0x4858
[   58.049914]  kasan_atomics+0x198/0x2e0
[   58.049942]  kunit_try_run_case+0x170/0x3f0
[   58.049976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.050015]  kthread+0x328/0x630
[   58.050045]  ret_from_fork+0x10/0x20
[   58.050078] 
[   58.119897] Allocated by task 314:
[   58.123284]  kasan_save_stack+0x3c/0x68
[   58.127102]  kasan_save_track+0x20/0x40
[   58.130921]  kasan_save_alloc_info+0x40/0x58
[   58.135175]  __kasan_kmalloc+0xd4/0xd8
[   58.138908]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.143421]  kasan_atomics+0xb8/0x2e0
[   58.147067]  kunit_try_run_case+0x170/0x3f0
[   58.151234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.156702]  kthread+0x328/0x630
[   58.159914]  ret_from_fork+0x10/0x20
[   58.163473] 
[   58.164949] The buggy address belongs to the object at ffff000800d61a00
[   58.164949]  which belongs to the cache kmalloc-64 of size 64
[   58.177275] The buggy address is located 0 bytes to the right of
[   58.177275]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.190122] 
[   58.191600] The buggy address belongs to the physical page:
[   58.197155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.205139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.211649] page_type: f5(slab)
[   58.214786] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.222507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.230226] page dumped because: kasan: bad access detected
[   58.235781] 
[   58.237257] Memory state around the buggy address:
[   58.242036]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.249240]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.256444] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.263645]                                      ^
[   58.268423]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.275628]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.282829] ==================================================================
[   51.459752] ==================================================================
[   51.466788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.474077] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   51.481455] 
[   51.482939] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   51.482986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.483002] Hardware name: WinLink E850-96 board (DT)
[   51.483022] Call trace:
[   51.483036]  show_stack+0x20/0x38 (C)
[   51.483067]  dump_stack_lvl+0x8c/0xd0
[   51.483103]  print_report+0x118/0x608
[   51.483133]  kasan_report+0xdc/0x128
[   51.483162]  kasan_check_range+0x100/0x1a8
[   51.483194]  __kasan_check_write+0x20/0x30
[   51.483229]  kasan_atomics_helper+0x894/0x4858
[   51.483259]  kasan_atomics+0x198/0x2e0
[   51.483288]  kunit_try_run_case+0x170/0x3f0
[   51.483323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.483362]  kthread+0x328/0x630
[   51.483394]  ret_from_fork+0x10/0x20
[   51.483427] 
[   51.553155] Allocated by task 314:
[   51.556543]  kasan_save_stack+0x3c/0x68
[   51.560360]  kasan_save_track+0x20/0x40
[   51.564180]  kasan_save_alloc_info+0x40/0x58
[   51.568433]  __kasan_kmalloc+0xd4/0xd8
[   51.572166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.576680]  kasan_atomics+0xb8/0x2e0
[   51.580325]  kunit_try_run_case+0x170/0x3f0
[   51.584492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.589961]  kthread+0x328/0x630
[   51.593172]  ret_from_fork+0x10/0x20
[   51.596732] 
[   51.598207] The buggy address belongs to the object at ffff000800d61a00
[   51.598207]  which belongs to the cache kmalloc-64 of size 64
[   51.610533] The buggy address is located 0 bytes to the right of
[   51.610533]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   51.623380] 
[   51.624856] The buggy address belongs to the physical page:
[   51.630414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   51.638398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.644908] page_type: f5(slab)
[   51.648044] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.655765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.663484] page dumped because: kasan: bad access detected
[   51.669039] 
[   51.670515] Memory state around the buggy address:
[   51.675295]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.682498]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.689703] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.696904]                                      ^
[   51.701681]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.708887]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.716087] ==================================================================
[   55.922850] ==================================================================
[   55.929914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   55.937291] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   55.944583] 
[   55.946066] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   55.946115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.946131] Hardware name: WinLink E850-96 board (DT)
[   55.946151] Call trace:
[   55.946162]  show_stack+0x20/0x38 (C)
[   55.946193]  dump_stack_lvl+0x8c/0xd0
[   55.946227]  print_report+0x118/0x608
[   55.946259]  kasan_report+0xdc/0x128
[   55.946289]  __asan_report_load8_noabort+0x20/0x30
[   55.946326]  kasan_atomics_helper+0x3f58/0x4858
[   55.946356]  kasan_atomics+0x198/0x2e0
[   55.946384]  kunit_try_run_case+0x170/0x3f0
[   55.946418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.946457]  kthread+0x328/0x630
[   55.946491]  ret_from_fork+0x10/0x20
[   55.946524] 
[   56.012984] Allocated by task 314:
[   56.016371]  kasan_save_stack+0x3c/0x68
[   56.020189]  kasan_save_track+0x20/0x40
[   56.024009]  kasan_save_alloc_info+0x40/0x58
[   56.028262]  __kasan_kmalloc+0xd4/0xd8
[   56.031995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.036509]  kasan_atomics+0xb8/0x2e0
[   56.040154]  kunit_try_run_case+0x170/0x3f0
[   56.044321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.049790]  kthread+0x328/0x630
[   56.053001]  ret_from_fork+0x10/0x20
[   56.056560] 
[   56.058036] The buggy address belongs to the object at ffff000800d61a00
[   56.058036]  which belongs to the cache kmalloc-64 of size 64
[   56.070362] The buggy address is located 0 bytes to the right of
[   56.070362]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   56.083209] 
[   56.084685] The buggy address belongs to the physical page:
[   56.090243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   56.098226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.104737] page_type: f5(slab)
[   56.107871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.115594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.123313] page dumped because: kasan: bad access detected
[   56.128868] 
[   56.130344] Memory state around the buggy address:
[   56.135122]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.142327]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.149532] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.156732]                                      ^
[   56.161510]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.168715]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.175916] ==================================================================
[   62.501926] ==================================================================
[   62.508985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.516359] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   62.523651] 
[   62.525133] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   62.525181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.525199] Hardware name: WinLink E850-96 board (DT)
[   62.525216] Call trace:
[   62.525229]  show_stack+0x20/0x38 (C)
[   62.525260]  dump_stack_lvl+0x8c/0xd0
[   62.525294]  print_report+0x118/0x608
[   62.525325]  kasan_report+0xdc/0x128
[   62.525354]  __asan_report_load8_noabort+0x20/0x30
[   62.525390]  kasan_atomics_helper+0x3e10/0x4858
[   62.525422]  kasan_atomics+0x198/0x2e0
[   62.525448]  kunit_try_run_case+0x170/0x3f0
[   62.525485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.525524]  kthread+0x328/0x630
[   62.525556]  ret_from_fork+0x10/0x20
[   62.525588] 
[   62.592052] Allocated by task 314:
[   62.595438]  kasan_save_stack+0x3c/0x68
[   62.599257]  kasan_save_track+0x20/0x40
[   62.603077]  kasan_save_alloc_info+0x40/0x58
[   62.607330]  __kasan_kmalloc+0xd4/0xd8
[   62.611063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   62.615576]  kasan_atomics+0xb8/0x2e0
[   62.619222]  kunit_try_run_case+0x170/0x3f0
[   62.623389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.628858]  kthread+0x328/0x630
[   62.632069]  ret_from_fork+0x10/0x20
[   62.635628] 
[   62.637104] The buggy address belongs to the object at ffff000800d61a00
[   62.637104]  which belongs to the cache kmalloc-64 of size 64
[   62.649430] The buggy address is located 0 bytes to the right of
[   62.649430]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   62.662277] 
[   62.663754] The buggy address belongs to the physical page:
[   62.669310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   62.677295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.683804] page_type: f5(slab)
[   62.686939] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.694662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.702381] page dumped because: kasan: bad access detected
[   62.707936] 
[   62.709412] Memory state around the buggy address:
[   62.714190]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.721395]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.728599] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.735800]                                      ^
[   62.740578]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.747783]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.754984] ==================================================================
[   60.925555] ==================================================================
[   60.932617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   60.939994] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.947372] 
[   60.948855] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.948902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.948918] Hardware name: WinLink E850-96 board (DT)
[   60.948937] Call trace:
[   60.948949]  show_stack+0x20/0x38 (C)
[   60.948983]  dump_stack_lvl+0x8c/0xd0
[   60.949018]  print_report+0x118/0x608
[   60.949050]  kasan_report+0xdc/0x128
[   60.949079]  kasan_check_range+0x100/0x1a8
[   60.949111]  __kasan_check_write+0x20/0x30
[   60.949143]  kasan_atomics_helper+0x154c/0x4858
[   60.949174]  kasan_atomics+0x198/0x2e0
[   60.949202]  kunit_try_run_case+0x170/0x3f0
[   60.949237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.949275]  kthread+0x328/0x630
[   60.949310]  ret_from_fork+0x10/0x20
[   60.949344] 
[   61.019159] Allocated by task 314:
[   61.022545]  kasan_save_stack+0x3c/0x68
[   61.026364]  kasan_save_track+0x20/0x40
[   61.030183]  kasan_save_alloc_info+0x40/0x58
[   61.034437]  __kasan_kmalloc+0xd4/0xd8
[   61.038169]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.042683]  kasan_atomics+0xb8/0x2e0
[   61.046329]  kunit_try_run_case+0x170/0x3f0
[   61.050496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.055964]  kthread+0x328/0x630
[   61.059176]  ret_from_fork+0x10/0x20
[   61.062735] 
[   61.064211] The buggy address belongs to the object at ffff000800d61a00
[   61.064211]  which belongs to the cache kmalloc-64 of size 64
[   61.076537] The buggy address is located 0 bytes to the right of
[   61.076537]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.089384] 
[   61.090862] The buggy address belongs to the physical page:
[   61.096416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.104401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.110911] page_type: f5(slab)
[   61.114045] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.121769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.129488] page dumped because: kasan: bad access detected
[   61.135043] 
[   61.136519] Memory state around the buggy address:
[   61.141297]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.148502]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.155706] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.162907]                                      ^
[   61.167685]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.174890]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.182091] ==================================================================
[   58.817946] ==================================================================
[   58.825010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.832387] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   58.839765] 
[   58.841247] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   58.841296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.841312] Hardware name: WinLink E850-96 board (DT)
[   58.841331] Call trace:
[   58.841344]  show_stack+0x20/0x38 (C)
[   58.841375]  dump_stack_lvl+0x8c/0xd0
[   58.841411]  print_report+0x118/0x608
[   58.841442]  kasan_report+0xdc/0x128
[   58.841471]  kasan_check_range+0x100/0x1a8
[   58.841502]  __kasan_check_write+0x20/0x30
[   58.841535]  kasan_atomics_helper+0x11f8/0x4858
[   58.841565]  kasan_atomics+0x198/0x2e0
[   58.841593]  kunit_try_run_case+0x170/0x3f0
[   58.841628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.841668]  kthread+0x328/0x630
[   58.841701]  ret_from_fork+0x10/0x20
[   58.841733] 
[   58.911552] Allocated by task 314:
[   58.914939]  kasan_save_stack+0x3c/0x68
[   58.918757]  kasan_save_track+0x20/0x40
[   58.922576]  kasan_save_alloc_info+0x40/0x58
[   58.926830]  __kasan_kmalloc+0xd4/0xd8
[   58.930563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.935076]  kasan_atomics+0xb8/0x2e0
[   58.938722]  kunit_try_run_case+0x170/0x3f0
[   58.942888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.948357]  kthread+0x328/0x630
[   58.951569]  ret_from_fork+0x10/0x20
[   58.955128] 
[   58.956603] The buggy address belongs to the object at ffff000800d61a00
[   58.956603]  which belongs to the cache kmalloc-64 of size 64
[   58.968930] The buggy address is located 0 bytes to the right of
[   58.968930]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   58.981777] 
[   58.983254] The buggy address belongs to the physical page:
[   58.988808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   58.996794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.003304] page_type: f5(slab)
[   59.006439] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.014162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.021881] page dumped because: kasan: bad access detected
[   59.027435] 
[   59.028911] Memory state around the buggy address:
[   59.033690]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.040895]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.048099] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.055300]                                      ^
[   59.060078]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.067283]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.074484] ==================================================================
[   46.722987] ==================================================================
[   46.729883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.737256] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   46.744634] 
[   46.746121] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.746179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.746198] Hardware name: WinLink E850-96 board (DT)
[   46.746219] Call trace:
[   46.746236]  show_stack+0x20/0x38 (C)
[   46.746271]  dump_stack_lvl+0x8c/0xd0
[   46.746309]  print_report+0x118/0x608
[   46.746343]  kasan_report+0xdc/0x128
[   46.746374]  __asan_report_store4_noabort+0x20/0x30
[   46.746415]  kasan_atomics_helper+0x3f7c/0x4858
[   46.746445]  kasan_atomics+0x198/0x2e0
[   46.746474]  kunit_try_run_case+0x170/0x3f0
[   46.746509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.746547]  kthread+0x328/0x630
[   46.746581]  ret_from_fork+0x10/0x20
[   46.746618] 
[   46.813122] Allocated by task 314:
[   46.816511]  kasan_save_stack+0x3c/0x68
[   46.820327]  kasan_save_track+0x20/0x40
[   46.824146]  kasan_save_alloc_info+0x40/0x58
[   46.828400]  __kasan_kmalloc+0xd4/0xd8
[   46.832133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.836647]  kasan_atomics+0xb8/0x2e0
[   46.840292]  kunit_try_run_case+0x170/0x3f0
[   46.844459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.849928]  kthread+0x328/0x630
[   46.853139]  ret_from_fork+0x10/0x20
[   46.856698] 
[   46.858175] The buggy address belongs to the object at ffff000800d61a00
[   46.858175]  which belongs to the cache kmalloc-64 of size 64
[   46.870502] The buggy address is located 0 bytes to the right of
[   46.870502]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   46.883347] 
[   46.884826] The buggy address belongs to the physical page:
[   46.890383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   46.898367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.904875] page_type: f5(slab)
[   46.908011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.915732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.923451] page dumped because: kasan: bad access detected
[   46.929008] 
[   46.930482] Memory state around the buggy address:
[   46.935263]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.942465]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.949670] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.956871]                                      ^
[   46.961648]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.968853]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.976054] ==================================================================
[   50.668589] ==================================================================
[   50.675653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.682943] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   50.690322] 
[   50.691804] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   50.691854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.691871] Hardware name: WinLink E850-96 board (DT)
[   50.691892] Call trace:
[   50.691904]  show_stack+0x20/0x38 (C)
[   50.691936]  dump_stack_lvl+0x8c/0xd0
[   50.691970]  print_report+0x118/0x608
[   50.692000]  kasan_report+0xdc/0x128
[   50.692030]  kasan_check_range+0x100/0x1a8
[   50.692063]  __kasan_check_write+0x20/0x30
[   50.692098]  kasan_atomics_helper+0x6ec/0x4858
[   50.692129]  kasan_atomics+0x198/0x2e0
[   50.692155]  kunit_try_run_case+0x170/0x3f0
[   50.692191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.692229]  kthread+0x328/0x630
[   50.692261]  ret_from_fork+0x10/0x20
[   50.692293] 
[   50.762021] Allocated by task 314:
[   50.765408]  kasan_save_stack+0x3c/0x68
[   50.769226]  kasan_save_track+0x20/0x40
[   50.773046]  kasan_save_alloc_info+0x40/0x58
[   50.777299]  __kasan_kmalloc+0xd4/0xd8
[   50.781032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.785546]  kasan_atomics+0xb8/0x2e0
[   50.789192]  kunit_try_run_case+0x170/0x3f0
[   50.793358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.798827]  kthread+0x328/0x630
[   50.802038]  ret_from_fork+0x10/0x20
[   50.805598] 
[   50.807073] The buggy address belongs to the object at ffff000800d61a00
[   50.807073]  which belongs to the cache kmalloc-64 of size 64
[   50.819400] The buggy address is located 0 bytes to the right of
[   50.819400]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   50.832246] 
[   50.833724] The buggy address belongs to the physical page:
[   50.839280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   50.847265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.853774] page_type: f5(slab)
[   50.856909] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.864631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.872350] page dumped because: kasan: bad access detected
[   50.877905] 
[   50.879381] Memory state around the buggy address:
[   50.884161]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.891364]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.898569] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.905770]                                      ^
[   50.910548]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.917752]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.924953] ==================================================================
[   46.455310] ==================================================================
[   46.469469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.476845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   46.484134] 
[   46.485623] CPU: 7 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   46.485679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.485697] Hardware name: WinLink E850-96 board (DT)
[   46.485720] Call trace:
[   46.485734]  show_stack+0x20/0x38 (C)
[   46.485773]  dump_stack_lvl+0x8c/0xd0
[   46.485812]  print_report+0x118/0x608
[   46.485846]  kasan_report+0xdc/0x128
[   46.485877]  __asan_report_load4_noabort+0x20/0x30
[   46.485913]  kasan_atomics_helper+0x40a8/0x4858
[   46.485943]  kasan_atomics+0x198/0x2e0
[   46.485971]  kunit_try_run_case+0x170/0x3f0
[   46.486009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.486049]  kthread+0x328/0x630
[   46.486086]  ret_from_fork+0x10/0x20
[   46.486126] 
[   46.552537] Allocated by task 314:
[   46.555925]  kasan_save_stack+0x3c/0x68
[   46.559741]  kasan_save_track+0x20/0x40
[   46.563560]  kasan_save_alloc_info+0x40/0x58
[   46.567814]  __kasan_kmalloc+0xd4/0xd8
[   46.571546]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.576060]  kasan_atomics+0xb8/0x2e0
[   46.579706]  kunit_try_run_case+0x170/0x3f0
[   46.583873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.589341]  kthread+0x328/0x630
[   46.592553]  ret_from_fork+0x10/0x20
[   46.596112] 
[   46.597589] The buggy address belongs to the object at ffff000800d61a00
[   46.597589]  which belongs to the cache kmalloc-64 of size 64
[   46.609918] The buggy address is located 0 bytes to the right of
[   46.609918]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   46.622761] 
[   46.624240] The buggy address belongs to the physical page:
[   46.629798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   46.637780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.644290] page_type: f5(slab)
[   46.647429] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.655146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.662865] page dumped because: kasan: bad access detected
[   46.668420] 
[   46.669896] Memory state around the buggy address:
[   46.674675]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.681879]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.689084] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.696284]                                      ^
[   46.701063]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.708267]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.715469] ==================================================================
[   53.302428] ==================================================================
[   53.309468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.316845] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   53.324136] 
[   53.325619] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   53.325667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.325684] Hardware name: WinLink E850-96 board (DT)
[   53.325704] Call trace:
[   53.325717]  show_stack+0x20/0x38 (C)
[   53.325749]  dump_stack_lvl+0x8c/0xd0
[   53.325784]  print_report+0x118/0x608
[   53.325812]  kasan_report+0xdc/0x128
[   53.325841]  __asan_report_load4_noabort+0x20/0x30
[   53.325876]  kasan_atomics_helper+0x3dcc/0x4858
[   53.325906]  kasan_atomics+0x198/0x2e0
[   53.325935]  kunit_try_run_case+0x170/0x3f0
[   53.325972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.326012]  kthread+0x328/0x630
[   53.326044]  ret_from_fork+0x10/0x20
[   53.326078] 
[   53.392538] Allocated by task 314:
[   53.395925]  kasan_save_stack+0x3c/0x68
[   53.399742]  kasan_save_track+0x20/0x40
[   53.403562]  kasan_save_alloc_info+0x40/0x58
[   53.407815]  __kasan_kmalloc+0xd4/0xd8
[   53.411548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.416062]  kasan_atomics+0xb8/0x2e0
[   53.419707]  kunit_try_run_case+0x170/0x3f0
[   53.423874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.429343]  kthread+0x328/0x630
[   53.432554]  ret_from_fork+0x10/0x20
[   53.436114] 
[   53.437589] The buggy address belongs to the object at ffff000800d61a00
[   53.437589]  which belongs to the cache kmalloc-64 of size 64
[   53.449916] The buggy address is located 0 bytes to the right of
[   53.449916]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   53.462763] 
[   53.464238] The buggy address belongs to the physical page:
[   53.469794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   53.477780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.484290] page_type: f5(slab)
[   53.487423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.495147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.502866] page dumped because: kasan: bad access detected
[   53.508422] 
[   53.509897] Memory state around the buggy address:
[   53.514677]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.521880]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.529085] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.536286]                                      ^
[   53.541064]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.548269]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.555470] ==================================================================
[   54.874779] ==================================================================
[   54.881840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   54.889217] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.896508] 
[   54.897992] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.898038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.898055] Hardware name: WinLink E850-96 board (DT)
[   54.898074] Call trace:
[   54.898089]  show_stack+0x20/0x38 (C)
[   54.898121]  dump_stack_lvl+0x8c/0xd0
[   54.898157]  print_report+0x118/0x608
[   54.898189]  kasan_report+0xdc/0x128
[   54.898217]  __asan_report_load4_noabort+0x20/0x30
[   54.898253]  kasan_atomics_helper+0x3dd8/0x4858
[   54.898284]  kasan_atomics+0x198/0x2e0
[   54.898311]  kunit_try_run_case+0x170/0x3f0
[   54.898347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.898387]  kthread+0x328/0x630
[   54.898421]  ret_from_fork+0x10/0x20
[   54.898457] 
[   54.964910] Allocated by task 314:
[   54.968296]  kasan_save_stack+0x3c/0x68
[   54.972114]  kasan_save_track+0x20/0x40
[   54.975934]  kasan_save_alloc_info+0x40/0x58
[   54.980188]  __kasan_kmalloc+0xd4/0xd8
[   54.983920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.988434]  kasan_atomics+0xb8/0x2e0
[   54.992080]  kunit_try_run_case+0x170/0x3f0
[   54.996246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.001715]  kthread+0x328/0x630
[   55.004927]  ret_from_fork+0x10/0x20
[   55.008486] 
[   55.009961] The buggy address belongs to the object at ffff000800d61a00
[   55.009961]  which belongs to the cache kmalloc-64 of size 64
[   55.022288] The buggy address is located 0 bytes to the right of
[   55.022288]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   55.035135] 
[   55.036612] The buggy address belongs to the physical page:
[   55.042167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   55.050152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.056662] page_type: f5(slab)
[   55.059797] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.067520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.075238] page dumped because: kasan: bad access detected
[   55.080794] 
[   55.082269] Memory state around the buggy address:
[   55.087048]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.094252]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.101457] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.108658]                                      ^
[   55.113436]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.120640]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.127842] ==================================================================
[   56.971275] ==================================================================
[   56.978337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   56.985626] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   56.993005] 
[   56.994487] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   56.994537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.994553] Hardware name: WinLink E850-96 board (DT)
[   56.994573] Call trace:
[   56.994585]  show_stack+0x20/0x38 (C)
[   56.994618]  dump_stack_lvl+0x8c/0xd0
[   56.994652]  print_report+0x118/0x608
[   56.994682]  kasan_report+0xdc/0x128
[   56.994714]  kasan_check_range+0x100/0x1a8
[   56.994747]  __kasan_check_write+0x20/0x30
[   56.994780]  kasan_atomics_helper+0xf20/0x4858
[   56.994811]  kasan_atomics+0x198/0x2e0
[   56.994838]  kunit_try_run_case+0x170/0x3f0
[   56.994872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.994911]  kthread+0x328/0x630
[   56.994945]  ret_from_fork+0x10/0x20
[   56.994978] 
[   57.064705] Allocated by task 314:
[   57.068091]  kasan_save_stack+0x3c/0x68
[   57.071910]  kasan_save_track+0x20/0x40
[   57.075729]  kasan_save_alloc_info+0x40/0x58
[   57.079983]  __kasan_kmalloc+0xd4/0xd8
[   57.083715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.088229]  kasan_atomics+0xb8/0x2e0
[   57.091875]  kunit_try_run_case+0x170/0x3f0
[   57.096041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.101509]  kthread+0x328/0x630
[   57.104722]  ret_from_fork+0x10/0x20
[   57.108281] 
[   57.109756] The buggy address belongs to the object at ffff000800d61a00
[   57.109756]  which belongs to the cache kmalloc-64 of size 64
[   57.122083] The buggy address is located 0 bytes to the right of
[   57.122083]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   57.134930] 
[   57.136406] The buggy address belongs to the physical page:
[   57.141963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   57.149947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.156457] page_type: f5(slab)
[   57.159592] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.167314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.175033] page dumped because: kasan: bad access detected
[   57.180588] 
[   57.182064] Memory state around the buggy address:
[   57.186842]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.194047]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.201252] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.208453]                                      ^
[   57.213231]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.220436]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.227637] ==================================================================
[   52.247594] ==================================================================
[   52.254624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.261913] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.269291] 
[   52.270774] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.270823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.270840] Hardware name: WinLink E850-96 board (DT)
[   52.270861] Call trace:
[   52.270873]  show_stack+0x20/0x38 (C)
[   52.270904]  dump_stack_lvl+0x8c/0xd0
[   52.270941]  print_report+0x118/0x608
[   52.270972]  kasan_report+0xdc/0x128
[   52.271001]  kasan_check_range+0x100/0x1a8
[   52.271033]  __kasan_check_write+0x20/0x30
[   52.271065]  kasan_atomics_helper+0x99c/0x4858
[   52.271097]  kasan_atomics+0x198/0x2e0
[   52.271125]  kunit_try_run_case+0x170/0x3f0
[   52.271159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.271199]  kthread+0x328/0x630
[   52.271232]  ret_from_fork+0x10/0x20
[   52.271264] 
[   52.340991] Allocated by task 314:
[   52.344378]  kasan_save_stack+0x3c/0x68
[   52.348196]  kasan_save_track+0x20/0x40
[   52.352015]  kasan_save_alloc_info+0x40/0x58
[   52.356269]  __kasan_kmalloc+0xd4/0xd8
[   52.360001]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.364515]  kasan_atomics+0xb8/0x2e0
[   52.368161]  kunit_try_run_case+0x170/0x3f0
[   52.372328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.377796]  kthread+0x328/0x630
[   52.381008]  ret_from_fork+0x10/0x20
[   52.384567] 
[   52.386042] The buggy address belongs to the object at ffff000800d61a00
[   52.386042]  which belongs to the cache kmalloc-64 of size 64
[   52.398369] The buggy address is located 0 bytes to the right of
[   52.398369]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.411216] 
[   52.412692] The buggy address belongs to the physical page:
[   52.418249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.426233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.432743] page_type: f5(slab)
[   52.435878] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.443600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.451319] page dumped because: kasan: bad access detected
[   52.456874] 
[   52.458350] Memory state around the buggy address:
[   52.463130]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.470334]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.477538] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.484739]                                      ^
[   52.489517]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.496722]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.503923] ==================================================================
[   61.713767] ==================================================================
[   61.720800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.728177] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.735555] 
[   61.737037] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.737083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.737101] Hardware name: WinLink E850-96 board (DT)
[   61.737118] Call trace:
[   61.737132]  show_stack+0x20/0x38 (C)
[   61.737163]  dump_stack_lvl+0x8c/0xd0
[   61.737198]  print_report+0x118/0x608
[   61.737228]  kasan_report+0xdc/0x128
[   61.737257]  kasan_check_range+0x100/0x1a8
[   61.737288]  __kasan_check_write+0x20/0x30
[   61.737319]  kasan_atomics_helper+0x1644/0x4858
[   61.737351]  kasan_atomics+0x198/0x2e0
[   61.737379]  kunit_try_run_case+0x170/0x3f0
[   61.737417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.737454]  kthread+0x328/0x630
[   61.737487]  ret_from_fork+0x10/0x20
[   61.737519] 
[   61.807342] Allocated by task 314:
[   61.810729]  kasan_save_stack+0x3c/0x68
[   61.814547]  kasan_save_track+0x20/0x40
[   61.818366]  kasan_save_alloc_info+0x40/0x58
[   61.822620]  __kasan_kmalloc+0xd4/0xd8
[   61.826352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.830866]  kasan_atomics+0xb8/0x2e0
[   61.834512]  kunit_try_run_case+0x170/0x3f0
[   61.838678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.844147]  kthread+0x328/0x630
[   61.847359]  ret_from_fork+0x10/0x20
[   61.850918] 
[   61.852394] The buggy address belongs to the object at ffff000800d61a00
[   61.852394]  which belongs to the cache kmalloc-64 of size 64
[   61.864721] The buggy address is located 0 bytes to the right of
[   61.864721]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.877567] 
[   61.879042] The buggy address belongs to the physical page:
[   61.884598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.892584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.899094] page_type: f5(slab)
[   61.902230] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.909951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.917670] page dumped because: kasan: bad access detected
[   61.923225] 
[   61.924701] Memory state around the buggy address:
[   61.929481]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.936684]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.943889] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.951090]                                      ^
[   61.955868]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.963074]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.970274] ==================================================================
[   52.774976] ==================================================================
[   52.782045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.789335] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   52.796713] 
[   52.798198] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   52.798247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.798262] Hardware name: WinLink E850-96 board (DT)
[   52.798282] Call trace:
[   52.798294]  show_stack+0x20/0x38 (C)
[   52.798324]  dump_stack_lvl+0x8c/0xd0
[   52.798360]  print_report+0x118/0x608
[   52.798390]  kasan_report+0xdc/0x128
[   52.798420]  kasan_check_range+0x100/0x1a8
[   52.798452]  __kasan_check_write+0x20/0x30
[   52.798485]  kasan_atomics_helper+0xa6c/0x4858
[   52.798515]  kasan_atomics+0x198/0x2e0
[   52.798543]  kunit_try_run_case+0x170/0x3f0
[   52.798578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.798617]  kthread+0x328/0x630
[   52.798651]  ret_from_fork+0x10/0x20
[   52.798682] 
[   52.868414] Allocated by task 314:
[   52.871799]  kasan_save_stack+0x3c/0x68
[   52.875619]  kasan_save_track+0x20/0x40
[   52.879438]  kasan_save_alloc_info+0x40/0x58
[   52.883691]  __kasan_kmalloc+0xd4/0xd8
[   52.887424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.891937]  kasan_atomics+0xb8/0x2e0
[   52.895584]  kunit_try_run_case+0x170/0x3f0
[   52.899750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.905219]  kthread+0x328/0x630
[   52.908431]  ret_from_fork+0x10/0x20
[   52.911989] 
[   52.913465] The buggy address belongs to the object at ffff000800d61a00
[   52.913465]  which belongs to the cache kmalloc-64 of size 64
[   52.925793] The buggy address is located 0 bytes to the right of
[   52.925793]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   52.938638] 
[   52.940114] The buggy address belongs to the physical page:
[   52.945670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   52.953656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.960166] page_type: f5(slab)
[   52.963301] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.971023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.978742] page dumped because: kasan: bad access detected
[   52.984297] 
[   52.985773] Memory state around the buggy address:
[   52.990553]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.997756]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.004961] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.012162]                                      ^
[   53.016940]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.024144]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.031346] ==================================================================
[   61.453332] ==================================================================
[   61.460388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.467764] Read of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   61.475055] 
[   61.476538] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   61.476585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.476600] Hardware name: WinLink E850-96 board (DT)
[   61.476619] Call trace:
[   61.476632]  show_stack+0x20/0x38 (C)
[   61.476663]  dump_stack_lvl+0x8c/0xd0
[   61.476699]  print_report+0x118/0x608
[   61.476730]  kasan_report+0xdc/0x128
[   61.476760]  __asan_report_load8_noabort+0x20/0x30
[   61.476793]  kasan_atomics_helper+0x3db0/0x4858
[   61.476824]  kasan_atomics+0x198/0x2e0
[   61.476851]  kunit_try_run_case+0x170/0x3f0
[   61.476887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.476924]  kthread+0x328/0x630
[   61.476957]  ret_from_fork+0x10/0x20
[   61.476990] 
[   61.543457] Allocated by task 314:
[   61.546842]  kasan_save_stack+0x3c/0x68
[   61.550662]  kasan_save_track+0x20/0x40
[   61.554481]  kasan_save_alloc_info+0x40/0x58
[   61.558735]  __kasan_kmalloc+0xd4/0xd8
[   61.562467]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.566981]  kasan_atomics+0xb8/0x2e0
[   61.570627]  kunit_try_run_case+0x170/0x3f0
[   61.574793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.580262]  kthread+0x328/0x630
[   61.583474]  ret_from_fork+0x10/0x20
[   61.587033] 
[   61.588508] The buggy address belongs to the object at ffff000800d61a00
[   61.588508]  which belongs to the cache kmalloc-64 of size 64
[   61.600835] The buggy address is located 0 bytes to the right of
[   61.600835]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   61.613681] 
[   61.615158] The buggy address belongs to the physical page:
[   61.620714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   61.628700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.635209] page_type: f5(slab)
[   61.638344] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.646067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.653786] page dumped because: kasan: bad access detected
[   61.659341] 
[   61.660816] Memory state around the buggy address:
[   61.665596]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.672799]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.680004] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.687205]                                      ^
[   61.691983]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.699187]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.706389] ==================================================================
[   48.822647] ==================================================================
[   48.829674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.836964] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.844342] 
[   48.845825] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.845876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.845893] Hardware name: WinLink E850-96 board (DT)
[   48.845912] Call trace:
[   48.845924]  show_stack+0x20/0x38 (C)
[   48.845953]  dump_stack_lvl+0x8c/0xd0
[   48.845988]  print_report+0x118/0x608
[   48.846017]  kasan_report+0xdc/0x128
[   48.846048]  kasan_check_range+0x100/0x1a8
[   48.846080]  __kasan_check_write+0x20/0x30
[   48.846112]  kasan_atomics_helper+0x414/0x4858
[   48.846141]  kasan_atomics+0x198/0x2e0
[   48.846170]  kunit_try_run_case+0x170/0x3f0
[   48.846205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.846245]  kthread+0x328/0x630
[   48.846278]  ret_from_fork+0x10/0x20
[   48.846310] 
[   48.916042] Allocated by task 314:
[   48.919428]  kasan_save_stack+0x3c/0x68
[   48.923247]  kasan_save_track+0x20/0x40
[   48.927067]  kasan_save_alloc_info+0x40/0x58
[   48.931320]  __kasan_kmalloc+0xd4/0xd8
[   48.935053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.939566]  kasan_atomics+0xb8/0x2e0
[   48.943212]  kunit_try_run_case+0x170/0x3f0
[   48.947379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.952847]  kthread+0x328/0x630
[   48.956059]  ret_from_fork+0x10/0x20
[   48.959618] 
[   48.961094] The buggy address belongs to the object at ffff000800d61a00
[   48.961094]  which belongs to the cache kmalloc-64 of size 64
[   48.973420] The buggy address is located 0 bytes to the right of
[   48.973420]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.986267] 
[   48.987745] The buggy address belongs to the physical page:
[   48.993301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.001284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.007794] page_type: f5(slab)
[   49.010929] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.018652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.026370] page dumped because: kasan: bad access detected
[   49.031926] 
[   49.033402] Memory state around the buggy address:
[   49.038182]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.045385]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.052590] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.059790]                                      ^
[   49.064568]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.071773]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.078974] ==================================================================
[   48.034698] ==================================================================
[   48.041667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.048955] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.056333] 
[   48.057818] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.057870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.057887] Hardware name: WinLink E850-96 board (DT)
[   48.057908] Call trace:
[   48.057924]  show_stack+0x20/0x38 (C)
[   48.057959]  dump_stack_lvl+0x8c/0xd0
[   48.057997]  print_report+0x118/0x608
[   48.058029]  kasan_report+0xdc/0x128
[   48.058058]  kasan_check_range+0x100/0x1a8
[   48.058093]  __kasan_check_write+0x20/0x30
[   48.058127]  kasan_atomics_helper+0x32c/0x4858
[   48.058156]  kasan_atomics+0x198/0x2e0
[   48.058185]  kunit_try_run_case+0x170/0x3f0
[   48.058223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.058261]  kthread+0x328/0x630
[   48.058296]  ret_from_fork+0x10/0x20
[   48.058330] 
[   48.128034] Allocated by task 314:
[   48.131421]  kasan_save_stack+0x3c/0x68
[   48.135238]  kasan_save_track+0x20/0x40
[   48.139058]  kasan_save_alloc_info+0x40/0x58
[   48.143311]  __kasan_kmalloc+0xd4/0xd8
[   48.147044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.151558]  kasan_atomics+0xb8/0x2e0
[   48.155203]  kunit_try_run_case+0x170/0x3f0
[   48.159370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.164839]  kthread+0x328/0x630
[   48.168050]  ret_from_fork+0x10/0x20
[   48.171609] 
[   48.173086] The buggy address belongs to the object at ffff000800d61a00
[   48.173086]  which belongs to the cache kmalloc-64 of size 64
[   48.185413] The buggy address is located 0 bytes to the right of
[   48.185413]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.198258] 
[   48.199734] The buggy address belongs to the physical page:
[   48.205294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.213278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.219786] page_type: f5(slab)
[   48.222922] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.230643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.238361] page dumped because: kasan: bad access detected
[   48.243917] 
[   48.245393] Memory state around the buggy address:
[   48.250174]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.257376]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.264580] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.271781]                                      ^
[   48.276559]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.283764]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.290965] ==================================================================
[   48.298373] ==================================================================
[   48.305378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.312753] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   48.320131] 
[   48.321617] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   48.321667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.321684] Hardware name: WinLink E850-96 board (DT)
[   48.321704] Call trace:
[   48.321714]  show_stack+0x20/0x38 (C)
[   48.321749]  dump_stack_lvl+0x8c/0xd0
[   48.321787]  print_report+0x118/0x608
[   48.321819]  kasan_report+0xdc/0x128
[   48.321848]  __asan_report_store4_noabort+0x20/0x30
[   48.321884]  kasan_atomics_helper+0x3f94/0x4858
[   48.321915]  kasan_atomics+0x198/0x2e0
[   48.321943]  kunit_try_run_case+0x170/0x3f0
[   48.321981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.322021]  kthread+0x328/0x630
[   48.322055]  ret_from_fork+0x10/0x20
[   48.322088] 
[   48.388620] Allocated by task 314:
[   48.392008]  kasan_save_stack+0x3c/0x68
[   48.395825]  kasan_save_track+0x20/0x40
[   48.399644]  kasan_save_alloc_info+0x40/0x58
[   48.403897]  __kasan_kmalloc+0xd4/0xd8
[   48.407630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.412144]  kasan_atomics+0xb8/0x2e0
[   48.415789]  kunit_try_run_case+0x170/0x3f0
[   48.419956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.425425]  kthread+0x328/0x630
[   48.428637]  ret_from_fork+0x10/0x20
[   48.432196] 
[   48.433671] The buggy address belongs to the object at ffff000800d61a00
[   48.433671]  which belongs to the cache kmalloc-64 of size 64
[   48.445999] The buggy address is located 0 bytes to the right of
[   48.445999]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   48.458844] 
[   48.460322] The buggy address belongs to the physical page:
[   48.465878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   48.473865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.480372] page_type: f5(slab)
[   48.483508] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.491229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.498948] page dumped because: kasan: bad access detected
[   48.504503] 
[   48.505979] Memory state around the buggy address:
[   48.510759]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.517962]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.525166] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.532368]                                      ^
[   48.537146]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.544351]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.551551] ==================================================================
[   49.086332] ==================================================================
[   49.093385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.100676] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   49.108054] 
[   49.109539] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   49.109587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.109604] Hardware name: WinLink E850-96 board (DT)
[   49.109624] Call trace:
[   49.109637]  show_stack+0x20/0x38 (C)
[   49.109669]  dump_stack_lvl+0x8c/0xd0
[   49.109705]  print_report+0x118/0x608
[   49.109735]  kasan_report+0xdc/0x128
[   49.109765]  kasan_check_range+0x100/0x1a8
[   49.109798]  __kasan_check_write+0x20/0x30
[   49.109834]  kasan_atomics_helper+0x47c/0x4858
[   49.109865]  kasan_atomics+0x198/0x2e0
[   49.109893]  kunit_try_run_case+0x170/0x3f0
[   49.109927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.109966]  kthread+0x328/0x630
[   49.110000]  ret_from_fork+0x10/0x20
[   49.110032] 
[   49.179754] Allocated by task 314:
[   49.183140]  kasan_save_stack+0x3c/0x68
[   49.186958]  kasan_save_track+0x20/0x40
[   49.190778]  kasan_save_alloc_info+0x40/0x58
[   49.195031]  __kasan_kmalloc+0xd4/0xd8
[   49.198764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.203278]  kasan_atomics+0xb8/0x2e0
[   49.206924]  kunit_try_run_case+0x170/0x3f0
[   49.211090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.216559]  kthread+0x328/0x630
[   49.219771]  ret_from_fork+0x10/0x20
[   49.223330] 
[   49.224805] The buggy address belongs to the object at ffff000800d61a00
[   49.224805]  which belongs to the cache kmalloc-64 of size 64
[   49.237132] The buggy address is located 0 bytes to the right of
[   49.237132]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   49.249978] 
[   49.251457] The buggy address belongs to the physical page:
[   49.257012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   49.264996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.271506] page_type: f5(slab)
[   49.274641] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.282364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.290082] page dumped because: kasan: bad access detected
[   49.295638] 
[   49.297113] Memory state around the buggy address:
[   49.301893]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.309096]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.316301] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.323502]                                      ^
[   49.328280]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.335484]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.342685] ==================================================================
[   54.086917] ==================================================================
[   54.094005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.101295] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.108673] 
[   54.110156] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.110206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.110223] Hardware name: WinLink E850-96 board (DT)
[   54.110241] Call trace:
[   54.110254]  show_stack+0x20/0x38 (C)
[   54.110286]  dump_stack_lvl+0x8c/0xd0
[   54.110320]  print_report+0x118/0x608
[   54.110351]  kasan_report+0xdc/0x128
[   54.110380]  kasan_check_range+0x100/0x1a8
[   54.110413]  __kasan_check_write+0x20/0x30
[   54.110447]  kasan_atomics_helper+0xc08/0x4858
[   54.110477]  kasan_atomics+0x198/0x2e0
[   54.110504]  kunit_try_run_case+0x170/0x3f0
[   54.110539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.110578]  kthread+0x328/0x630
[   54.110612]  ret_from_fork+0x10/0x20
[   54.110645] 
[   54.180373] Allocated by task 314:
[   54.183760]  kasan_save_stack+0x3c/0x68
[   54.187578]  kasan_save_track+0x20/0x40
[   54.191397]  kasan_save_alloc_info+0x40/0x58
[   54.195651]  __kasan_kmalloc+0xd4/0xd8
[   54.199383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.203897]  kasan_atomics+0xb8/0x2e0
[   54.207543]  kunit_try_run_case+0x170/0x3f0
[   54.211709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.217178]  kthread+0x328/0x630
[   54.220390]  ret_from_fork+0x10/0x20
[   54.223949] 
[   54.225425] The buggy address belongs to the object at ffff000800d61a00
[   54.225425]  which belongs to the cache kmalloc-64 of size 64
[   54.237751] The buggy address is located 0 bytes to the right of
[   54.237751]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.250598] 
[   54.252074] The buggy address belongs to the physical page:
[   54.257629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.265615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.272125] page_type: f5(slab)
[   54.275260] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.282983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.290701] page dumped because: kasan: bad access detected
[   54.296257] 
[   54.297732] Memory state around the buggy address:
[   54.302510]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.309715]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.316920] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.324121]                                      ^
[   54.328899]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.336104]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.343305] ==================================================================
[   60.133902] ==================================================================
[   60.140962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.148339] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   60.155717] 
[   60.157200] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   60.157246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.157262] Hardware name: WinLink E850-96 board (DT)
[   60.157278] Call trace:
[   60.157292]  show_stack+0x20/0x38 (C)
[   60.157322]  dump_stack_lvl+0x8c/0xd0
[   60.157359]  print_report+0x118/0x608
[   60.157389]  kasan_report+0xdc/0x128
[   60.157417]  kasan_check_range+0x100/0x1a8
[   60.157448]  __kasan_check_write+0x20/0x30
[   60.157481]  kasan_atomics_helper+0x1414/0x4858
[   60.157512]  kasan_atomics+0x198/0x2e0
[   60.157540]  kunit_try_run_case+0x170/0x3f0
[   60.157575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.157614]  kthread+0x328/0x630
[   60.157646]  ret_from_fork+0x10/0x20
[   60.157679] 
[   60.227504] Allocated by task 314:
[   60.230892]  kasan_save_stack+0x3c/0x68
[   60.234709]  kasan_save_track+0x20/0x40
[   60.238529]  kasan_save_alloc_info+0x40/0x58
[   60.242782]  __kasan_kmalloc+0xd4/0xd8
[   60.246515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.251029]  kasan_atomics+0xb8/0x2e0
[   60.254674]  kunit_try_run_case+0x170/0x3f0
[   60.258841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.264310]  kthread+0x328/0x630
[   60.267521]  ret_from_fork+0x10/0x20
[   60.271080] 
[   60.272556] The buggy address belongs to the object at ffff000800d61a00
[   60.272556]  which belongs to the cache kmalloc-64 of size 64
[   60.284883] The buggy address is located 0 bytes to the right of
[   60.284883]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   60.297729] 
[   60.299205] The buggy address belongs to the physical page:
[   60.304762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   60.312746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.319257] page_type: f5(slab)
[   60.322390] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.330114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.337833] page dumped because: kasan: bad access detected
[   60.343388] 
[   60.344864] Memory state around the buggy address:
[   60.349643]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.356847]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.364052] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.371253]                                      ^
[   60.376030]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.383235]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.390436] ==================================================================
[   54.611094] ==================================================================
[   54.618129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.625419] Write of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   54.632797] 
[   54.634280] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   54.634330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.634347] Hardware name: WinLink E850-96 board (DT)
[   54.634365] Call trace:
[   54.634378]  show_stack+0x20/0x38 (C)
[   54.634408]  dump_stack_lvl+0x8c/0xd0
[   54.634443]  print_report+0x118/0x608
[   54.634475]  kasan_report+0xdc/0x128
[   54.634504]  kasan_check_range+0x100/0x1a8
[   54.634537]  __kasan_check_write+0x20/0x30
[   54.634570]  kasan_atomics_helper+0xca0/0x4858
[   54.634600]  kasan_atomics+0x198/0x2e0
[   54.634628]  kunit_try_run_case+0x170/0x3f0
[   54.634663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.634701]  kthread+0x328/0x630
[   54.634735]  ret_from_fork+0x10/0x20
[   54.634767] 
[   54.704497] Allocated by task 314:
[   54.707884]  kasan_save_stack+0x3c/0x68
[   54.711702]  kasan_save_track+0x20/0x40
[   54.715521]  kasan_save_alloc_info+0x40/0x58
[   54.719775]  __kasan_kmalloc+0xd4/0xd8
[   54.723507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.728021]  kasan_atomics+0xb8/0x2e0
[   54.731667]  kunit_try_run_case+0x170/0x3f0
[   54.735833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.741302]  kthread+0x328/0x630
[   54.744514]  ret_from_fork+0x10/0x20
[   54.748073] 
[   54.749549] The buggy address belongs to the object at ffff000800d61a00
[   54.749549]  which belongs to the cache kmalloc-64 of size 64
[   54.761875] The buggy address is located 0 bytes to the right of
[   54.761875]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   54.774722] 
[   54.776199] The buggy address belongs to the physical page:
[   54.781754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   54.789739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.796249] page_type: f5(slab)
[   54.799384] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.807107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.814826] page dumped because: kasan: bad access detected
[   54.820381] 
[   54.821856] Memory state around the buggy address:
[   54.826636]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.833840]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.841044] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.848245]                                      ^
[   54.853023]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.860228]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.867429] ==================================================================
[   47.774266] ==================================================================
[   47.781255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.788629] Read of size 4 at addr ffff000800d61a30 by task kunit_try_catch/314
[   47.795921] 
[   47.797407] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   47.797461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.797479] Hardware name: WinLink E850-96 board (DT)
[   47.797500] Call trace:
[   47.797514]  show_stack+0x20/0x38 (C)
[   47.797550]  dump_stack_lvl+0x8c/0xd0
[   47.797587]  print_report+0x118/0x608
[   47.797619]  kasan_report+0xdc/0x128
[   47.797647]  __asan_report_load4_noabort+0x20/0x30
[   47.797686]  kasan_atomics_helper+0x40fc/0x4858
[   47.797715]  kasan_atomics+0x198/0x2e0
[   47.797743]  kunit_try_run_case+0x170/0x3f0
[   47.797782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.797822]  kthread+0x328/0x630
[   47.797857]  ret_from_fork+0x10/0x20
[   47.797891] 
[   47.864323] Allocated by task 314:
[   47.867709]  kasan_save_stack+0x3c/0x68
[   47.871527]  kasan_save_track+0x20/0x40
[   47.875347]  kasan_save_alloc_info+0x40/0x58
[   47.879600]  __kasan_kmalloc+0xd4/0xd8
[   47.883332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.887846]  kasan_atomics+0xb8/0x2e0
[   47.891492]  kunit_try_run_case+0x170/0x3f0
[   47.895658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.901127]  kthread+0x328/0x630
[   47.904339]  ret_from_fork+0x10/0x20
[   47.907898] 
[   47.909375] The buggy address belongs to the object at ffff000800d61a00
[   47.909375]  which belongs to the cache kmalloc-64 of size 64
[   47.921702] The buggy address is located 0 bytes to the right of
[   47.921702]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   47.934547] 
[   47.936025] The buggy address belongs to the physical page:
[   47.941579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   47.949566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.956075] page_type: f5(slab)
[   47.959212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.966931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.974651] page dumped because: kasan: bad access detected
[   47.980206] 
[   47.981681] Memory state around the buggy address:
[   47.986461]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.993665]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.000869] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.008070]                                      ^
[   48.012848]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.020053]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.027254] ==================================================================
[   59.609607] ==================================================================
[   59.616664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.624042] Write of size 8 at addr ffff000800d61a30 by task kunit_try_catch/314
[   59.631420] 
[   59.632904] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   59.632953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.632969] Hardware name: WinLink E850-96 board (DT)
[   59.632989] Call trace:
[   59.633001]  show_stack+0x20/0x38 (C)
[   59.633032]  dump_stack_lvl+0x8c/0xd0
[   59.633068]  print_report+0x118/0x608
[   59.633099]  kasan_report+0xdc/0x128
[   59.633130]  kasan_check_range+0x100/0x1a8
[   59.633161]  __kasan_check_write+0x20/0x30
[   59.633195]  kasan_atomics_helper+0x1384/0x4858
[   59.633225]  kasan_atomics+0x198/0x2e0
[   59.633252]  kunit_try_run_case+0x170/0x3f0
[   59.633289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.633331]  kthread+0x328/0x630
[   59.633363]  ret_from_fork+0x10/0x20
[   59.633398] 
[   59.703207] Allocated by task 314:
[   59.706594]  kasan_save_stack+0x3c/0x68
[   59.710411]  kasan_save_track+0x20/0x40
[   59.714231]  kasan_save_alloc_info+0x40/0x58
[   59.718485]  __kasan_kmalloc+0xd4/0xd8
[   59.722217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.726731]  kasan_atomics+0xb8/0x2e0
[   59.730377]  kunit_try_run_case+0x170/0x3f0
[   59.734543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.740012]  kthread+0x328/0x630
[   59.743224]  ret_from_fork+0x10/0x20
[   59.746783] 
[   59.748258] The buggy address belongs to the object at ffff000800d61a00
[   59.748258]  which belongs to the cache kmalloc-64 of size 64
[   59.760585] The buggy address is located 0 bytes to the right of
[   59.760585]  allocated 48-byte region [ffff000800d61a00, ffff000800d61a30)
[   59.773431] 
[   59.774909] The buggy address belongs to the physical page:
[   59.780465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d61
[   59.788449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.794959] page_type: f5(slab)
[   59.798095] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.805816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.813535] page dumped because: kasan: bad access detected
[   59.819090] 
[   59.820566] Memory state around the buggy address:
[   59.825346]  ffff000800d61900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.832549]  ffff000800d61980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.839754] >ffff000800d61a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.846954]                                      ^
[   59.851733]  ffff000800d61a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.858938]  ffff000800d61b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.866139] ==================================================================

[   20.741104] ==================================================================
[   20.741157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.741209] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.741396] 
[   20.741533] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.741824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.741869] Hardware name: linux,dummy-virt (DT)
[   20.741928] Call trace:
[   20.741954]  show_stack+0x20/0x38 (C)
[   20.742350]  dump_stack_lvl+0x8c/0xd0
[   20.742427]  print_report+0x118/0x608
[   20.742476]  kasan_report+0xdc/0x128
[   20.742521]  kasan_check_range+0x100/0x1a8
[   20.742780]  __kasan_check_read+0x20/0x30
[   20.742914]  kasan_atomics_helper+0xdd4/0x4858
[   20.742971]  kasan_atomics+0x198/0x2e0
[   20.743265]  kunit_try_run_case+0x170/0x3f0
[   20.743357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.743426]  kthread+0x328/0x630
[   20.743698]  ret_from_fork+0x10/0x20
[   20.743779] 
[   20.743823] Allocated by task 267:
[   20.743864]  kasan_save_stack+0x3c/0x68
[   20.744032]  kasan_save_track+0x20/0x40
[   20.744108]  kasan_save_alloc_info+0x40/0x58
[   20.744253]  __kasan_kmalloc+0xd4/0xd8
[   20.744296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.744337]  kasan_atomics+0xb8/0x2e0
[   20.744381]  kunit_try_run_case+0x170/0x3f0
[   20.744658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.744757]  kthread+0x328/0x630
[   20.745509]  ret_from_fork+0x10/0x20
[   20.745602] 
[   20.745657] The buggy address belongs to the object at fff00000c7a67680
[   20.745657]  which belongs to the cache kmalloc-64 of size 64
[   20.745745] The buggy address is located 0 bytes to the right of
[   20.745745]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.745974] 
[   20.746179] The buggy address belongs to the physical page:
[   20.746240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.746384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.746485] page_type: f5(slab)
[   20.746765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.746882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.746986] page dumped because: kasan: bad access detected
[   20.747064] 
[   20.747470] Memory state around the buggy address:
[   20.747546]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.747602]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.747925] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.747975]                                      ^
[   20.748013]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748100]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.748154] ==================================================================
[   20.777770] ==================================================================
[   20.778088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.778161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.778214] 
[   20.778491] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.778635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.778667] Hardware name: linux,dummy-virt (DT)
[   20.778707] Call trace:
[   20.778732]  show_stack+0x20/0x38 (C)
[   20.779056]  dump_stack_lvl+0x8c/0xd0
[   20.779138]  print_report+0x118/0x608
[   20.779304]  kasan_report+0xdc/0x128
[   20.779371]  kasan_check_range+0x100/0x1a8
[   20.779434]  __kasan_check_write+0x20/0x30
[   20.779485]  kasan_atomics_helper+0xf20/0x4858
[   20.779533]  kasan_atomics+0x198/0x2e0
[   20.779580]  kunit_try_run_case+0x170/0x3f0
[   20.779631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779688]  kthread+0x328/0x630
[   20.779740]  ret_from_fork+0x10/0x20
[   20.779789] 
[   20.779818] Allocated by task 267:
[   20.779850]  kasan_save_stack+0x3c/0x68
[   20.779904]  kasan_save_track+0x20/0x40
[   20.779952]  kasan_save_alloc_info+0x40/0x58
[   20.779999]  __kasan_kmalloc+0xd4/0xd8
[   20.780038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.780078]  kasan_atomics+0xb8/0x2e0
[   20.780114]  kunit_try_run_case+0x170/0x3f0
[   20.780155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.780202]  kthread+0x328/0x630
[   20.780241]  ret_from_fork+0x10/0x20
[   20.780279] 
[   20.780301] The buggy address belongs to the object at fff00000c7a67680
[   20.780301]  which belongs to the cache kmalloc-64 of size 64
[   20.780362] The buggy address is located 0 bytes to the right of
[   20.780362]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.780428] 
[   20.780459] The buggy address belongs to the physical page:
[   20.780492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.780545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.780595] page_type: f5(slab)
[   20.780636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.780692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.780738] page dumped because: kasan: bad access detected
[   20.780782] 
[   20.780811] Memory state around the buggy address:
[   20.780845]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.781612]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.781681] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.781727]                                      ^
[   20.781763]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.781811]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.782632] ==================================================================
[   20.904915] ==================================================================
[   20.904966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.905015] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.905067] 
[   20.905096] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.905339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.905377] Hardware name: linux,dummy-virt (DT)
[   20.905411] Call trace:
[   20.905435]  show_stack+0x20/0x38 (C)
[   20.905486]  dump_stack_lvl+0x8c/0xd0
[   20.905533]  print_report+0x118/0x608
[   20.905704]  kasan_report+0xdc/0x128
[   20.905760]  kasan_check_range+0x100/0x1a8
[   20.905808]  __kasan_check_write+0x20/0x30
[   20.906038]  kasan_atomics_helper+0x175c/0x4858
[   20.906182]  kasan_atomics+0x198/0x2e0
[   20.906365]  kunit_try_run_case+0x170/0x3f0
[   20.906488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.906546]  kthread+0x328/0x630
[   20.906591]  ret_from_fork+0x10/0x20
[   20.906639] 
[   20.906661] Allocated by task 267:
[   20.906689]  kasan_save_stack+0x3c/0x68
[   20.906920]  kasan_save_track+0x20/0x40
[   20.907070]  kasan_save_alloc_info+0x40/0x58
[   20.907114]  __kasan_kmalloc+0xd4/0xd8
[   20.907160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.907212]  kasan_atomics+0xb8/0x2e0
[   20.907250]  kunit_try_run_case+0x170/0x3f0
[   20.907291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907338]  kthread+0x328/0x630
[   20.907376]  ret_from_fork+0x10/0x20
[   20.907413] 
[   20.907434] The buggy address belongs to the object at fff00000c7a67680
[   20.907434]  which belongs to the cache kmalloc-64 of size 64
[   20.907495] The buggy address is located 0 bytes to the right of
[   20.907495]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.907564] 
[   20.907586] The buggy address belongs to the physical page:
[   20.907618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.907682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.907733] page_type: f5(slab)
[   20.907784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.907840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.908276] page dumped because: kasan: bad access detected
[   20.908413] 
[   20.908435] Memory state around the buggy address:
[   20.908469]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908722]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.908795] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.908837]                                      ^
[   20.908883]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.908931]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.908973] ==================================================================
[   20.884633] ==================================================================
[   20.884681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.884728] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.884945] 
[   20.885001] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.885088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.885117] Hardware name: linux,dummy-virt (DT)
[   20.885150] Call trace:
[   20.885173]  show_stack+0x20/0x38 (C)
[   20.885375]  dump_stack_lvl+0x8c/0xd0
[   20.885428]  print_report+0x118/0x608
[   20.885474]  kasan_report+0xdc/0x128
[   20.885629]  kasan_check_range+0x100/0x1a8
[   20.885731]  __kasan_check_write+0x20/0x30
[   20.885782]  kasan_atomics_helper+0x1644/0x4858
[   20.885964]  kasan_atomics+0x198/0x2e0
[   20.886039]  kunit_try_run_case+0x170/0x3f0
[   20.886091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886153]  kthread+0x328/0x630
[   20.886355]  ret_from_fork+0x10/0x20
[   20.886561] 
[   20.886647] Allocated by task 267:
[   20.886743]  kasan_save_stack+0x3c/0x68
[   20.886818]  kasan_save_track+0x20/0x40
[   20.886886]  kasan_save_alloc_info+0x40/0x58
[   20.886928]  __kasan_kmalloc+0xd4/0xd8
[   20.886965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.887013]  kasan_atomics+0xb8/0x2e0
[   20.887049]  kunit_try_run_case+0x170/0x3f0
[   20.887091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.887137]  kthread+0x328/0x630
[   20.887179]  ret_from_fork+0x10/0x20
[   20.887217] 
[   20.887248] The buggy address belongs to the object at fff00000c7a67680
[   20.887248]  which belongs to the cache kmalloc-64 of size 64
[   20.887317] The buggy address is located 0 bytes to the right of
[   20.887317]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.887393] 
[   20.887423] The buggy address belongs to the physical page:
[   20.887457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.887511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.887560] page_type: f5(slab)
[   20.887599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.887800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.887921] page dumped because: kasan: bad access detected
[   20.888070] 
[   20.888093] Memory state around the buggy address:
[   20.888129]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888193]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.888240] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.888284]                                      ^
[   20.888319]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888387]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.888430] ==================================================================
[   20.662827] ==================================================================
[   20.662944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.663108] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.663197] 
[   20.663469] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.663589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.663739]  dump_stack_lvl+0x8c/0xd0
[   20.666233]  __kasan_kmalloc+0xd4/0xd8
[   20.666443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.666519]  kasan_atomics+0xb8/0x2e0
[   20.666884]  kunit_try_run_case+0x170/0x3f0
[   20.666965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667138]  kthread+0x328/0x630
[   20.667325]  ret_from_fork+0x10/0x20
[   20.667430] 
[   20.667534] The buggy address belongs to the object at fff00000c7a67680
[   20.667534]  which belongs to the cache kmalloc-64 of size 64
[   20.667839] The buggy address is located 0 bytes to the right of
[   20.667839]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.668272] 
[   20.668603] The buggy address belongs to the physical page:
[   20.668653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.668713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.668765] page_type: f5(slab)
[   20.668807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.669128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.669669] 
[   20.670068]                                      ^
[   20.672488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.674708] 
[   20.674885]  kasan_save_stack+0x3c/0x68
[   20.675428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.675469]  kasan_atomics+0xb8/0x2e0
[   20.675506]  kunit_try_run_case+0x170/0x3f0
[   20.675547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675806] The buggy address is located 0 bytes to the right of
[   20.675806]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.677355] page dumped because: kasan: bad access detected
[   20.678144]                                      ^
[   20.679645] ==================================================================
[   20.717248] ==================================================================
[   20.717332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.717387] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.717539] 
[   20.717590] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.717872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.718261] Hardware name: linux,dummy-virt (DT)
[   20.718419] Call trace:
[   20.718468]  show_stack+0x20/0x38 (C)
[   20.718553]  dump_stack_lvl+0x8c/0xd0
[   20.718607]  print_report+0x118/0x608
[   20.718715]  kasan_report+0xdc/0x128
[   20.718760]  __asan_report_load4_noabort+0x20/0x30
[   20.718814]  kasan_atomics_helper+0x3dd8/0x4858
[   20.719038]  kasan_atomics+0x198/0x2e0
[   20.719099]  kunit_try_run_case+0x170/0x3f0
[   20.719167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.719557]  kthread+0x328/0x630
[   20.719699]  ret_from_fork+0x10/0x20
[   20.719815] 
[   20.719844] Allocated by task 267:
[   20.719890]  kasan_save_stack+0x3c/0x68
[   20.720154]  kasan_save_track+0x20/0x40
[   20.720367]  kasan_save_alloc_info+0x40/0x58
[   20.720417]  __kasan_kmalloc+0xd4/0xd8
[   20.720455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.720494]  kasan_atomics+0xb8/0x2e0
[   20.720531]  kunit_try_run_case+0x170/0x3f0
[   20.720573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720620]  kthread+0x328/0x630
[   20.720914]  ret_from_fork+0x10/0x20
[   20.721036] 
[   20.721202] The buggy address belongs to the object at fff00000c7a67680
[   20.721202]  which belongs to the cache kmalloc-64 of size 64
[   20.721498] The buggy address is located 0 bytes to the right of
[   20.721498]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.721594] 
[   20.722025] The buggy address belongs to the physical page:
[   20.722088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.722354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.722698] page_type: f5(slab)
[   20.722768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.723228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.723301] page dumped because: kasan: bad access detected
[   20.723620] 
[   20.723678] Memory state around the buggy address:
[   20.723765]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.724073]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.724149] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.724370]                                      ^
[   20.724577]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724631]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.724830] ==================================================================
[   20.850515] ==================================================================
[   20.850560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.850847] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.850926] 
[   20.851067] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.851177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.851209] Hardware name: linux,dummy-virt (DT)
[   20.851243] Call trace:
[   20.851272]  show_stack+0x20/0x38 (C)
[   20.851324]  dump_stack_lvl+0x8c/0xd0
[   20.851390]  print_report+0x118/0x608
[   20.851488]  kasan_report+0xdc/0x128
[   20.851553]  __asan_report_load8_noabort+0x20/0x30
[   20.851606]  kasan_atomics_helper+0x3f04/0x4858
[   20.851654]  kasan_atomics+0x198/0x2e0
[   20.851701]  kunit_try_run_case+0x170/0x3f0
[   20.851789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.851867]  kthread+0x328/0x630
[   20.852009]  ret_from_fork+0x10/0x20
[   20.852289] 
[   20.852312] Allocated by task 267:
[   20.852438]  kasan_save_stack+0x3c/0x68
[   20.852599]  kasan_save_track+0x20/0x40
[   20.852647]  kasan_save_alloc_info+0x40/0x58
[   20.852688]  __kasan_kmalloc+0xd4/0xd8
[   20.852731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.852776]  kasan_atomics+0xb8/0x2e0
[   20.852812]  kunit_try_run_case+0x170/0x3f0
[   20.852868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853059]  kthread+0x328/0x630
[   20.853099]  ret_from_fork+0x10/0x20
[   20.853137] 
[   20.853159] The buggy address belongs to the object at fff00000c7a67680
[   20.853159]  which belongs to the cache kmalloc-64 of size 64
[   20.853220] The buggy address is located 0 bytes to the right of
[   20.853220]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.853289] 
[   20.853310] The buggy address belongs to the physical page:
[   20.853453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.853609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.853704] page_type: f5(slab)
[   20.853871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.854131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.854374] page dumped because: kasan: bad access detected
[   20.854593] 
[   20.854661] Memory state around the buggy address:
[   20.854696]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854746]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854936] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855138]                                      ^
[   20.855229]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855330]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855463] ==================================================================
[   20.900699] ==================================================================
[   20.900749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.900798] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.900851] 
[   20.900895] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.900980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.901127] Hardware name: linux,dummy-virt (DT)
[   20.901167] Call trace:
[   20.901191]  show_stack+0x20/0x38 (C)
[   20.901497]  dump_stack_lvl+0x8c/0xd0
[   20.901567]  print_report+0x118/0x608
[   20.901617]  kasan_report+0xdc/0x128
[   20.901663]  __asan_report_load8_noabort+0x20/0x30
[   20.901815]  kasan_atomics_helper+0x3e10/0x4858
[   20.902037]  kasan_atomics+0x198/0x2e0
[   20.902100]  kunit_try_run_case+0x170/0x3f0
[   20.902151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.902208]  kthread+0x328/0x630
[   20.902305]  ret_from_fork+0x10/0x20
[   20.902438] 
[   20.902486] Allocated by task 267:
[   20.902562]  kasan_save_stack+0x3c/0x68
[   20.902604]  kasan_save_track+0x20/0x40
[   20.902641]  kasan_save_alloc_info+0x40/0x58
[   20.902682]  __kasan_kmalloc+0xd4/0xd8
[   20.902717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.902792]  kasan_atomics+0xb8/0x2e0
[   20.902828]  kunit_try_run_case+0x170/0x3f0
[   20.902881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.903055]  kthread+0x328/0x630
[   20.903257]  ret_from_fork+0x10/0x20
[   20.903314] 
[   20.903336] The buggy address belongs to the object at fff00000c7a67680
[   20.903336]  which belongs to the cache kmalloc-64 of size 64
[   20.903397] The buggy address is located 0 bytes to the right of
[   20.903397]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.903465] 
[   20.903487] The buggy address belongs to the physical page:
[   20.903519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.903694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.903762] page_type: f5(slab)
[   20.903819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.903900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.903949] page dumped because: kasan: bad access detected
[   20.903982] 
[   20.904005] Memory state around the buggy address:
[   20.904060]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904110]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904270] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.904452]                                      ^
[   20.904538]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904585]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904641] ==================================================================
[   20.869635] ==================================================================
[   20.869687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.869763] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.869872] 
[   20.869920] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.870008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.870038] Hardware name: linux,dummy-virt (DT)
[   20.870071] Call trace:
[   20.870095]  show_stack+0x20/0x38 (C)
[   20.870182]  dump_stack_lvl+0x8c/0xd0
[   20.870339]  print_report+0x118/0x608
[   20.870413]  kasan_report+0xdc/0x128
[   20.870539]  kasan_check_range+0x100/0x1a8
[   20.870635]  __kasan_check_write+0x20/0x30
[   20.870757]  kasan_atomics_helper+0x154c/0x4858
[   20.870832]  kasan_atomics+0x198/0x2e0
[   20.870931]  kunit_try_run_case+0x170/0x3f0
[   20.870987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.871071]  kthread+0x328/0x630
[   20.871119]  ret_from_fork+0x10/0x20
[   20.871179] 
[   20.871227] Allocated by task 267:
[   20.871264]  kasan_save_stack+0x3c/0x68
[   20.871424]  kasan_save_track+0x20/0x40
[   20.871465]  kasan_save_alloc_info+0x40/0x58
[   20.871504]  __kasan_kmalloc+0xd4/0xd8
[   20.871663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.871710]  kasan_atomics+0xb8/0x2e0
[   20.871804]  kunit_try_run_case+0x170/0x3f0
[   20.871846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.872073]  kthread+0x328/0x630
[   20.872315]  ret_from_fork+0x10/0x20
[   20.872515] 
[   20.872623] The buggy address belongs to the object at fff00000c7a67680
[   20.872623]  which belongs to the cache kmalloc-64 of size 64
[   20.872687] The buggy address is located 0 bytes to the right of
[   20.872687]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.872826] 
[   20.872871] The buggy address belongs to the physical page:
[   20.872905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.873020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.873211] page_type: f5(slab)
[   20.873337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.873446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.873493] page dumped because: kasan: bad access detected
[   20.873703] 
[   20.873725] Memory state around the buggy address:
[   20.873758]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873807]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873863] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.873908]                                      ^
[   20.873942]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874098]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.874224] ==================================================================
[   20.783333] ==================================================================
[   20.783385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.783790] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.783968] 
[   20.784022] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.784117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.784148] Hardware name: linux,dummy-virt (DT)
[   20.784298] Call trace:
[   20.784522]  show_stack+0x20/0x38 (C)
[   20.784878]  dump_stack_lvl+0x8c/0xd0
[   20.785032]  print_report+0x118/0x608
[   20.785174]  kasan_report+0xdc/0x128
[   20.785227]  kasan_check_range+0x100/0x1a8
[   20.785697]  __kasan_check_write+0x20/0x30
[   20.785764]  kasan_atomics_helper+0xf88/0x4858
[   20.785945]  kasan_atomics+0x198/0x2e0
[   20.786060]  kunit_try_run_case+0x170/0x3f0
[   20.786117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.786443]  kthread+0x328/0x630
[   20.786567]  ret_from_fork+0x10/0x20
[   20.787118] 
[   20.787204] Allocated by task 267:
[   20.787391]  kasan_save_stack+0x3c/0x68
[   20.787492]  kasan_save_track+0x20/0x40
[   20.787538]  kasan_save_alloc_info+0x40/0x58
[   20.787948]  __kasan_kmalloc+0xd4/0xd8
[   20.788049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.788354]  kasan_atomics+0xb8/0x2e0
[   20.788469]  kunit_try_run_case+0x170/0x3f0
[   20.788595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.788759]  kthread+0x328/0x630
[   20.788917]  ret_from_fork+0x10/0x20
[   20.788982] 
[   20.789006] The buggy address belongs to the object at fff00000c7a67680
[   20.789006]  which belongs to the cache kmalloc-64 of size 64
[   20.789076] The buggy address is located 0 bytes to the right of
[   20.789076]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.789450] 
[   20.789507] The buggy address belongs to the physical page:
[   20.789576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.790025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.790120] page_type: f5(slab)
[   20.790163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.790486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.790659] page dumped because: kasan: bad access detected
[   20.790836] 
[   20.790932] Memory state around the buggy address:
[   20.791053]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.791103]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.791405] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.791893]                                      ^
[   20.791961]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792125]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.792170] ==================================================================
[   20.889069] ==================================================================
[   20.889120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.889382] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.889437] 
[   20.889587] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.889712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.889814] Hardware name: linux,dummy-virt (DT)
[   20.889848] Call trace:
[   20.889935]  show_stack+0x20/0x38 (C)
[   20.890037]  dump_stack_lvl+0x8c/0xd0
[   20.890121]  print_report+0x118/0x608
[   20.890217]  kasan_report+0xdc/0x128
[   20.890432]  __asan_report_load8_noabort+0x20/0x30
[   20.890484]  kasan_atomics_helper+0x3df4/0x4858
[   20.890533]  kasan_atomics+0x198/0x2e0
[   20.890596]  kunit_try_run_case+0x170/0x3f0
[   20.890673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.890826]  kthread+0x328/0x630
[   20.891086]  ret_from_fork+0x10/0x20
[   20.891290] 
[   20.891312] Allocated by task 267:
[   20.891343]  kasan_save_stack+0x3c/0x68
[   20.891532]  kasan_save_track+0x20/0x40
[   20.891675]  kasan_save_alloc_info+0x40/0x58
[   20.891719]  __kasan_kmalloc+0xd4/0xd8
[   20.891775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.891954]  kasan_atomics+0xb8/0x2e0
[   20.892048]  kunit_try_run_case+0x170/0x3f0
[   20.892150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.892199]  kthread+0x328/0x630
[   20.892236]  ret_from_fork+0x10/0x20
[   20.892506] 
[   20.892532] The buggy address belongs to the object at fff00000c7a67680
[   20.892532]  which belongs to the cache kmalloc-64 of size 64
[   20.892594] The buggy address is located 0 bytes to the right of
[   20.892594]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.892682] 
[   20.892750] The buggy address belongs to the physical page:
[   20.892911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.892973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.893039] page_type: f5(slab)
[   20.893081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.893139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.893190] page dumped because: kasan: bad access detected
[   20.893239] 
[   20.893260] Memory state around the buggy address:
[   20.893293]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893342]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.893454]                                      ^
[   20.893489]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893546]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.893600] ==================================================================
[   20.879413] ==================================================================
[   20.879462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.879510] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.879564] 
[   20.879593] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.879733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.879840] Hardware name: linux,dummy-virt (DT)
[   20.879897] Call trace:
[   20.879922]  show_stack+0x20/0x38 (C)
[   20.879987]  dump_stack_lvl+0x8c/0xd0
[   20.880073]  print_report+0x118/0x608
[   20.880142]  kasan_report+0xdc/0x128
[   20.880238]  __asan_report_load8_noabort+0x20/0x30
[   20.880525]  kasan_atomics_helper+0x3db0/0x4858
[   20.880705]  kasan_atomics+0x198/0x2e0
[   20.880789]  kunit_try_run_case+0x170/0x3f0
[   20.880939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881033]  kthread+0x328/0x630
[   20.881162]  ret_from_fork+0x10/0x20
[   20.881271] 
[   20.881393] Allocated by task 267:
[   20.881461]  kasan_save_stack+0x3c/0x68
[   20.881564]  kasan_save_track+0x20/0x40
[   20.881763]  kasan_save_alloc_info+0x40/0x58
[   20.881825]  __kasan_kmalloc+0xd4/0xd8
[   20.881870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.882086]  kasan_atomics+0xb8/0x2e0
[   20.882121]  kunit_try_run_case+0x170/0x3f0
[   20.882164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882331]  kthread+0x328/0x630
[   20.882619]  ret_from_fork+0x10/0x20
[   20.882705] 
[   20.882781] The buggy address belongs to the object at fff00000c7a67680
[   20.882781]  which belongs to the cache kmalloc-64 of size 64
[   20.883314] The buggy address is located 0 bytes to the right of
[   20.883314]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.883429] 
[   20.883513] The buggy address belongs to the physical page:
[   20.883693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.883778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.883830] page_type: f5(slab)
[   20.883878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.883935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.883982] page dumped because: kasan: bad access detected
[   20.884016] 
[   20.884037] Memory state around the buggy address:
[   20.884082]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.884182]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.884229] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.884273]                                      ^
[   20.884309]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884365]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.884408] ==================================================================
[   20.828476] ==================================================================
[   20.828527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.828584] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.828784] 
[   20.828818] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.829224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.829443] Hardware name: linux,dummy-virt (DT)
[   20.829490] Call trace:
[   20.829514]  show_stack+0x20/0x38 (C)
[   20.829566]  dump_stack_lvl+0x8c/0xd0
[   20.829617]  print_report+0x118/0x608
[   20.829662]  kasan_report+0xdc/0x128
[   20.830138]  kasan_check_range+0x100/0x1a8
[   20.830252]  __kasan_check_write+0x20/0x30
[   20.830302]  kasan_atomics_helper+0x11f8/0x4858
[   20.830350]  kasan_atomics+0x198/0x2e0
[   20.830396]  kunit_try_run_case+0x170/0x3f0
[   20.830446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.830502]  kthread+0x328/0x630
[   20.830549]  ret_from_fork+0x10/0x20
[   20.830597] 
[   20.830618] Allocated by task 267:
[   20.830647]  kasan_save_stack+0x3c/0x68
[   20.830688]  kasan_save_track+0x20/0x40
[   20.830725]  kasan_save_alloc_info+0x40/0x58
[   20.830777]  __kasan_kmalloc+0xd4/0xd8
[   20.830814]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.830866]  kasan_atomics+0xb8/0x2e0
[   20.830901]  kunit_try_run_case+0x170/0x3f0
[   20.830983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.831064]  kthread+0x328/0x630
[   20.831290]  ret_from_fork+0x10/0x20
[   20.831392] 
[   20.831417] The buggy address belongs to the object at fff00000c7a67680
[   20.831417]  which belongs to the cache kmalloc-64 of size 64
[   20.831507] The buggy address is located 0 bytes to the right of
[   20.831507]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.831607] 
[   20.831695] The buggy address belongs to the physical page:
[   20.831730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.831833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.831905] page_type: f5(slab)
[   20.832023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.832137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.832325] page dumped because: kasan: bad access detected
[   20.832361] 
[   20.832382] Memory state around the buggy address:
[   20.832673]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.832735]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.832783] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.832827]                                      ^
[   20.832902]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.832989]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.833134] ==================================================================
[   20.909623] ==================================================================
[   20.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.909779] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.909832] 
[   20.909877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.910056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.910184] Hardware name: linux,dummy-virt (DT)
[   20.910219] Call trace:
[   20.910241]  show_stack+0x20/0x38 (C)
[   20.910294]  dump_stack_lvl+0x8c/0xd0
[   20.910342]  print_report+0x118/0x608
[   20.910391]  kasan_report+0xdc/0x128
[   20.910438]  __asan_report_load8_noabort+0x20/0x30
[   20.910488]  kasan_atomics_helper+0x3e20/0x4858
[   20.910651]  kasan_atomics+0x198/0x2e0
[   20.910707]  kunit_try_run_case+0x170/0x3f0
[   20.910759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.910851]  kthread+0x328/0x630
[   20.911038]  ret_from_fork+0x10/0x20
[   20.911127] 
[   20.911254] Allocated by task 267:
[   20.911290]  kasan_save_stack+0x3c/0x68
[   20.911332]  kasan_save_track+0x20/0x40
[   20.911370]  kasan_save_alloc_info+0x40/0x58
[   20.911411]  __kasan_kmalloc+0xd4/0xd8
[   20.911448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.911487]  kasan_atomics+0xb8/0x2e0
[   20.911523]  kunit_try_run_case+0x170/0x3f0
[   20.911582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.911739]  kthread+0x328/0x630
[   20.911951]  ret_from_fork+0x10/0x20
[   20.911998] 
[   20.912019] The buggy address belongs to the object at fff00000c7a67680
[   20.912019]  which belongs to the cache kmalloc-64 of size 64
[   20.912080] The buggy address is located 0 bytes to the right of
[   20.912080]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.912149] 
[   20.912171] The buggy address belongs to the physical page:
[   20.912204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.912258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.912310] page_type: f5(slab)
[   20.912349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.912405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.912451] page dumped because: kasan: bad access detected
[   20.912486] 
[   20.912507] Memory state around the buggy address:
[   20.912540]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.912588]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.912636] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.912679]                                      ^
[   20.912713]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.912761]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.912804] ==================================================================
[   20.893817] ==================================================================
[   20.893880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.893954] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.894251] 
[   20.894291] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.894378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.894431] Hardware name: linux,dummy-virt (DT)
[   20.894463] Call trace:
[   20.894487]  show_stack+0x20/0x38 (C)
[   20.894552]  dump_stack_lvl+0x8c/0xd0
[   20.894604]  print_report+0x118/0x608
[   20.894651]  kasan_report+0xdc/0x128
[   20.894696]  kasan_check_range+0x100/0x1a8
[   20.894943]  __kasan_check_write+0x20/0x30
[   20.895002]  kasan_atomics_helper+0x16d0/0x4858
[   20.895087]  kasan_atomics+0x198/0x2e0
[   20.895165]  kunit_try_run_case+0x170/0x3f0
[   20.895325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.895556]  kthread+0x328/0x630
[   20.895611]  ret_from_fork+0x10/0x20
[   20.895716] 
[   20.895764] Allocated by task 267:
[   20.895954]  kasan_save_stack+0x3c/0x68
[   20.896076]  kasan_save_track+0x20/0x40
[   20.896117]  kasan_save_alloc_info+0x40/0x58
[   20.896157]  __kasan_kmalloc+0xd4/0xd8
[   20.896333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.896373]  kasan_atomics+0xb8/0x2e0
[   20.896410]  kunit_try_run_case+0x170/0x3f0
[   20.896450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.896704]  kthread+0x328/0x630
[   20.896839]  ret_from_fork+0x10/0x20
[   20.896997] 
[   20.897114] The buggy address belongs to the object at fff00000c7a67680
[   20.897114]  which belongs to the cache kmalloc-64 of size 64
[   20.897253] The buggy address is located 0 bytes to the right of
[   20.897253]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.897694] 
[   20.897793] The buggy address belongs to the physical page:
[   20.897944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.898050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.898342] page_type: f5(slab)
[   20.898387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.898540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.898745] page dumped because: kasan: bad access detected
[   20.898897] 
[   20.898918] Memory state around the buggy address:
[   20.898951]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.899006]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.899400] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.899536]                                      ^
[   20.899573]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.899721]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.900023] ==================================================================
[   20.732369] ==================================================================
[   20.732422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.732475] Read of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.732537] 
[   20.732567] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.732651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.732690] Hardware name: linux,dummy-virt (DT)
[   20.732724] Call trace:
[   20.732747]  show_stack+0x20/0x38 (C)
[   20.732805]  dump_stack_lvl+0x8c/0xd0
[   20.732867]  print_report+0x118/0x608
[   20.732913]  kasan_report+0xdc/0x128
[   20.732960]  __asan_report_load4_noabort+0x20/0x30
[   20.733011]  kasan_atomics_helper+0x3e04/0x4858
[   20.733059]  kasan_atomics+0x198/0x2e0
[   20.733105]  kunit_try_run_case+0x170/0x3f0
[   20.733904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.734012]  kthread+0x328/0x630
[   20.734064]  ret_from_fork+0x10/0x20
[   20.734325] 
[   20.734361] Allocated by task 267:
[   20.734411]  kasan_save_stack+0x3c/0x68
[   20.734521]  kasan_save_track+0x20/0x40
[   20.734578]  kasan_save_alloc_info+0x40/0x58
[   20.734619]  __kasan_kmalloc+0xd4/0xd8
[   20.734658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.734960]  kasan_atomics+0xb8/0x2e0
[   20.735042]  kunit_try_run_case+0x170/0x3f0
[   20.735087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.735403]  kthread+0x328/0x630
[   20.735531]  ret_from_fork+0x10/0x20
[   20.735575] 
[   20.735597] The buggy address belongs to the object at fff00000c7a67680
[   20.735597]  which belongs to the cache kmalloc-64 of size 64
[   20.735684] The buggy address is located 0 bytes to the right of
[   20.735684]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.735989] 
[   20.736086] The buggy address belongs to the physical page:
[   20.736405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.736594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.736662] page_type: f5(slab)
[   20.736879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.736951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.737148] page dumped because: kasan: bad access detected
[   20.737274] 
[   20.737437] Memory state around the buggy address:
[   20.737684]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.737740]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.737804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.738116]                                      ^
[   20.738185]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.738507]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.738582] ==================================================================
[   20.865579] ==================================================================
[   20.865637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.865688] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.865741] 
[   20.865770] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.865876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.865915] Hardware name: linux,dummy-virt (DT)
[   20.865948] Call trace:
[   20.865983]  show_stack+0x20/0x38 (C)
[   20.866033]  dump_stack_lvl+0x8c/0xd0
[   20.866089]  print_report+0x118/0x608
[   20.866137]  kasan_report+0xdc/0x128
[   20.866181]  kasan_check_range+0x100/0x1a8
[   20.866231]  __kasan_check_write+0x20/0x30
[   20.866278]  kasan_atomics_helper+0x14e4/0x4858
[   20.866326]  kasan_atomics+0x198/0x2e0
[   20.866371]  kunit_try_run_case+0x170/0x3f0
[   20.866419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866483]  kthread+0x328/0x630
[   20.866529]  ret_from_fork+0x10/0x20
[   20.866583] 
[   20.866609] Allocated by task 267:
[   20.866644]  kasan_save_stack+0x3c/0x68
[   20.866684]  kasan_save_track+0x20/0x40
[   20.866724]  kasan_save_alloc_info+0x40/0x58
[   20.866763]  __kasan_kmalloc+0xd4/0xd8
[   20.866800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.866839]  kasan_atomics+0xb8/0x2e0
[   20.866886]  kunit_try_run_case+0x170/0x3f0
[   20.866925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866973]  kthread+0x328/0x630
[   20.867010]  ret_from_fork+0x10/0x20
[   20.867048] 
[   20.867068] The buggy address belongs to the object at fff00000c7a67680
[   20.867068]  which belongs to the cache kmalloc-64 of size 64
[   20.867131] The buggy address is located 0 bytes to the right of
[   20.867131]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.867204] 
[   20.867249] The buggy address belongs to the physical page:
[   20.867592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.867662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.867817] page_type: f5(slab)
[   20.867878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.868019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.868181] page dumped because: kasan: bad access detected
[   20.868347] 
[   20.868436] Memory state around the buggy address:
[   20.868578]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868644]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.868804] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.868878]                                      ^
[   20.868913]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.868962]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869003] ==================================================================
[   20.834095] ==================================================================
[   20.834210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.834264] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.834316] 
[   20.834437] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.834577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.834623] Hardware name: linux,dummy-virt (DT)
[   20.835018] Call trace:
[   20.835085]  show_stack+0x20/0x38 (C)
[   20.835219]  dump_stack_lvl+0x8c/0xd0
[   20.835370]  print_report+0x118/0x608
[   20.835435]  kasan_report+0xdc/0x128
[   20.835509]  kasan_check_range+0x100/0x1a8
[   20.835628]  __kasan_check_write+0x20/0x30
[   20.835695]  kasan_atomics_helper+0x126c/0x4858
[   20.835750]  kasan_atomics+0x198/0x2e0
[   20.835802]  kunit_try_run_case+0x170/0x3f0
[   20.835864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.835928]  kthread+0x328/0x630
[   20.836005]  ret_from_fork+0x10/0x20
[   20.836065] 
[   20.836087] Allocated by task 267:
[   20.836117]  kasan_save_stack+0x3c/0x68
[   20.836185]  kasan_save_track+0x20/0x40
[   20.836224]  kasan_save_alloc_info+0x40/0x58
[   20.836266]  __kasan_kmalloc+0xd4/0xd8
[   20.836617]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.836731]  kasan_atomics+0xb8/0x2e0
[   20.836847]  kunit_try_run_case+0x170/0x3f0
[   20.836980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.837214]  kthread+0x328/0x630
[   20.837331]  ret_from_fork+0x10/0x20
[   20.837375] 
[   20.837399] The buggy address belongs to the object at fff00000c7a67680
[   20.837399]  which belongs to the cache kmalloc-64 of size 64
[   20.837538] The buggy address is located 0 bytes to the right of
[   20.837538]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.837627] 
[   20.837725] The buggy address belongs to the physical page:
[   20.837800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.837976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.838160] page_type: f5(slab)
[   20.838261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.838317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.838363] page dumped because: kasan: bad access detected
[   20.838704] 
[   20.838770] Memory state around the buggy address:
[   20.838892]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.839037]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.839293] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.839363]                                      ^
[   20.839616]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839778]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839821] ==================================================================
[   20.793650] ==================================================================
[   20.794129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.794209] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.794262] 
[   20.794296] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.794472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.794506] Hardware name: linux,dummy-virt (DT)
[   20.794540] Call trace:
[   20.794565]  show_stack+0x20/0x38 (C)
[   20.794661]  dump_stack_lvl+0x8c/0xd0
[   20.794735]  print_report+0x118/0x608
[   20.794782]  kasan_report+0xdc/0x128
[   20.794838]  kasan_check_range+0x100/0x1a8
[   20.794898]  __kasan_check_write+0x20/0x30
[   20.794948]  kasan_atomics_helper+0xff0/0x4858
[   20.795012]  kasan_atomics+0x198/0x2e0
[   20.795064]  kunit_try_run_case+0x170/0x3f0
[   20.795116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.795179]  kthread+0x328/0x630
[   20.795225]  ret_from_fork+0x10/0x20
[   20.795275] 
[   20.795304] Allocated by task 267:
[   20.795334]  kasan_save_stack+0x3c/0x68
[   20.795375]  kasan_save_track+0x20/0x40
[   20.795412]  kasan_save_alloc_info+0x40/0x58
[   20.795453]  __kasan_kmalloc+0xd4/0xd8
[   20.795489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.795531]  kasan_atomics+0xb8/0x2e0
[   20.795575]  kunit_try_run_case+0x170/0x3f0
[   20.795616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.795663]  kthread+0x328/0x630
[   20.795710]  ret_from_fork+0x10/0x20
[   20.795749] 
[   20.795771] The buggy address belongs to the object at fff00000c7a67680
[   20.795771]  which belongs to the cache kmalloc-64 of size 64
[   20.795831] The buggy address is located 0 bytes to the right of
[   20.795831]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.796555] 
[   20.796601] The buggy address belongs to the physical page:
[   20.796653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.796953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.797026] page_type: f5(slab)
[   20.797069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.797403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.797743] page dumped because: kasan: bad access detected
[   20.797786] 
[   20.797831] Memory state around the buggy address:
[   20.798177]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.798397]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.798592] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.798747]                                      ^
[   20.798792]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.798840]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.799174] ==================================================================
[   20.840435] ==================================================================
[   20.840484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.840532] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.840584] 
[   20.840614] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.840698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.840755] Hardware name: linux,dummy-virt (DT)
[   20.840789] Call trace:
[   20.840839]  show_stack+0x20/0x38 (C)
[   20.840906]  dump_stack_lvl+0x8c/0xd0
[   20.840991]  print_report+0x118/0x608
[   20.841084]  kasan_report+0xdc/0x128
[   20.841159]  kasan_check_range+0x100/0x1a8
[   20.841460]  __kasan_check_write+0x20/0x30
[   20.841531]  kasan_atomics_helper+0x12d8/0x4858
[   20.841831]  kasan_atomics+0x198/0x2e0
[   20.842020]  kunit_try_run_case+0x170/0x3f0
[   20.842072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.842128]  kthread+0x328/0x630
[   20.842199]  ret_from_fork+0x10/0x20
[   20.842605] 
[   20.842632] Allocated by task 267:
[   20.842680]  kasan_save_stack+0x3c/0x68
[   20.842742]  kasan_save_track+0x20/0x40
[   20.842893]  kasan_save_alloc_info+0x40/0x58
[   20.842983]  __kasan_kmalloc+0xd4/0xd8
[   20.843024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.843064]  kasan_atomics+0xb8/0x2e0
[   20.843142]  kunit_try_run_case+0x170/0x3f0
[   20.843306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.843391]  kthread+0x328/0x630
[   20.843525]  ret_from_fork+0x10/0x20
[   20.843592] 
[   20.843670] The buggy address belongs to the object at fff00000c7a67680
[   20.843670]  which belongs to the cache kmalloc-64 of size 64
[   20.843821] The buggy address is located 0 bytes to the right of
[   20.843821]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.843901] 
[   20.843924] The buggy address belongs to the physical page:
[   20.843958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.844077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.844149] page_type: f5(slab)
[   20.844189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.844247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.844293] page dumped because: kasan: bad access detected
[   20.844347] 
[   20.844368] Memory state around the buggy address:
[   20.844402]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.844450]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.844496] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.844539]                                      ^
[   20.844655]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844700]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844743] ==================================================================
[   20.874949] ==================================================================
[   20.875010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.875060] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.875257] 
[   20.875345] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.875488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.875646] Hardware name: linux,dummy-virt (DT)
[   20.875682] Call trace:
[   20.875707]  show_stack+0x20/0x38 (C)
[   20.875759]  dump_stack_lvl+0x8c/0xd0
[   20.876517]  print_report+0x118/0x608
[   20.876578]  kasan_report+0xdc/0x128
[   20.876625]  kasan_check_range+0x100/0x1a8
[   20.876674]  __kasan_check_write+0x20/0x30
[   20.876722]  kasan_atomics_helper+0x15b4/0x4858
[   20.876772]  kasan_atomics+0x198/0x2e0
[   20.876817]  kunit_try_run_case+0x170/0x3f0
[   20.876878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.876934]  kthread+0x328/0x630
[   20.876980]  ret_from_fork+0x10/0x20
[   20.877030] 
[   20.877050] Allocated by task 267:
[   20.877081]  kasan_save_stack+0x3c/0x68
[   20.877121]  kasan_save_track+0x20/0x40
[   20.877160]  kasan_save_alloc_info+0x40/0x58
[   20.877199]  __kasan_kmalloc+0xd4/0xd8
[   20.877237]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.877276]  kasan_atomics+0xb8/0x2e0
[   20.877313]  kunit_try_run_case+0x170/0x3f0
[   20.877353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877400]  kthread+0x328/0x630
[   20.877437]  ret_from_fork+0x10/0x20
[   20.877476] 
[   20.877496] The buggy address belongs to the object at fff00000c7a67680
[   20.877496]  which belongs to the cache kmalloc-64 of size 64
[   20.877558] The buggy address is located 0 bytes to the right of
[   20.877558]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.877626] 
[   20.877647] The buggy address belongs to the physical page:
[   20.877680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.877734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.877784] page_type: f5(slab)
[   20.877824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.877946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.878013] page dumped because: kasan: bad access detected
[   20.878061] 
[   20.878099] Memory state around the buggy address:
[   20.878132]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878235]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.878322] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.878373]                                      ^
[   20.878579]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878683]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.878808] ==================================================================
[   20.861059] ==================================================================
[   20.861113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.861161] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.861214] 
[   20.861411] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.861614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.861689] Hardware name: linux,dummy-virt (DT)
[   20.861793] Call trace:
[   20.861818]  show_stack+0x20/0x38 (C)
[   20.861912]  dump_stack_lvl+0x8c/0xd0
[   20.862007]  print_report+0x118/0x608
[   20.862082]  kasan_report+0xdc/0x128
[   20.862163]  kasan_check_range+0x100/0x1a8
[   20.862229]  __kasan_check_write+0x20/0x30
[   20.862301]  kasan_atomics_helper+0x147c/0x4858
[   20.862376]  kasan_atomics+0x198/0x2e0
[   20.862432]  kunit_try_run_case+0x170/0x3f0
[   20.862482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.862537]  kthread+0x328/0x630
[   20.862584]  ret_from_fork+0x10/0x20
[   20.862979] 
[   20.863026] Allocated by task 267:
[   20.863060]  kasan_save_stack+0x3c/0x68
[   20.863172]  kasan_save_track+0x20/0x40
[   20.863248]  kasan_save_alloc_info+0x40/0x58
[   20.863289]  __kasan_kmalloc+0xd4/0xd8
[   20.863327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.863366]  kasan_atomics+0xb8/0x2e0
[   20.863404]  kunit_try_run_case+0x170/0x3f0
[   20.863465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863554]  kthread+0x328/0x630
[   20.863596]  ret_from_fork+0x10/0x20
[   20.863636] 
[   20.863657] The buggy address belongs to the object at fff00000c7a67680
[   20.863657]  which belongs to the cache kmalloc-64 of size 64
[   20.863775] The buggy address is located 0 bytes to the right of
[   20.863775]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.863924] 
[   20.864003] The buggy address belongs to the physical page:
[   20.864066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.864121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.864236] page_type: f5(slab)
[   20.864372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.864477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.864524] page dumped because: kasan: bad access detected
[   20.864559] 
[   20.864752] Memory state around the buggy address:
[   20.864787]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.864835]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.864895] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.865039]                                      ^
[   20.865169]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.865289]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.865347] ==================================================================
[   20.749598] ==================================================================
[   20.749654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.749803] Read of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.749873] 
[   20.750155] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.750270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.750385] Hardware name: linux,dummy-virt (DT)
[   20.750441] Call trace:
[   20.750467]  show_stack+0x20/0x38 (C)
[   20.750583]  dump_stack_lvl+0x8c/0xd0
[   20.750659]  print_report+0x118/0x608
[   20.750771]  kasan_report+0xdc/0x128
[   20.750822]  __asan_report_load8_noabort+0x20/0x30
[   20.750885]  kasan_atomics_helper+0x3f58/0x4858
[   20.751291]  kasan_atomics+0x198/0x2e0
[   20.751413]  kunit_try_run_case+0x170/0x3f0
[   20.751477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.751652]  kthread+0x328/0x630
[   20.751715]  ret_from_fork+0x10/0x20
[   20.751847] 
[   20.751882] Allocated by task 267:
[   20.751990]  kasan_save_stack+0x3c/0x68
[   20.752160]  kasan_save_track+0x20/0x40
[   20.752340]  kasan_save_alloc_info+0x40/0x58
[   20.752414]  __kasan_kmalloc+0xd4/0xd8
[   20.752452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.752522]  kasan_atomics+0xb8/0x2e0
[   20.752560]  kunit_try_run_case+0x170/0x3f0
[   20.752602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752649]  kthread+0x328/0x630
[   20.752688]  ret_from_fork+0x10/0x20
[   20.752741] 
[   20.752769] The buggy address belongs to the object at fff00000c7a67680
[   20.752769]  which belongs to the cache kmalloc-64 of size 64
[   20.752838] The buggy address is located 0 bytes to the right of
[   20.752838]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.752930] 
[   20.752969] The buggy address belongs to the physical page:
[   20.753019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.753075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.753126] page_type: f5(slab)
[   20.753180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.753237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.753283] page dumped because: kasan: bad access detected
[   20.753326] 
[   20.753345] Memory state around the buggy address:
[   20.753378]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.753436]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.753482] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.753525]                                      ^
[   20.753561]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.753616]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.753669] ==================================================================
[   20.913252] ==================================================================
[   20.913332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.913387] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.913439] 
[   20.913524] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.913634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.913691] Hardware name: linux,dummy-virt (DT)
[   20.913725] Call trace:
[   20.913776]  show_stack+0x20/0x38 (C)
[   20.913824]  dump_stack_lvl+0x8c/0xd0
[   20.913943]  print_report+0x118/0x608
[   20.913990]  kasan_report+0xdc/0x128
[   20.914038]  kasan_check_range+0x100/0x1a8
[   20.914086]  __kasan_check_write+0x20/0x30
[   20.914134]  kasan_atomics_helper+0x17ec/0x4858
[   20.914182]  kasan_atomics+0x198/0x2e0
[   20.914226]  kunit_try_run_case+0x170/0x3f0
[   20.914415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.914531]  kthread+0x328/0x630
[   20.914617]  ret_from_fork+0x10/0x20
[   20.914731] 
[   20.914760] Allocated by task 267:
[   20.914947]  kasan_save_stack+0x3c/0x68
[   20.914994]  kasan_save_track+0x20/0x40
[   20.915057]  kasan_save_alloc_info+0x40/0x58
[   20.915291]  __kasan_kmalloc+0xd4/0xd8
[   20.915396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.915578]  kasan_atomics+0xb8/0x2e0
[   20.915616]  kunit_try_run_case+0x170/0x3f0
[   20.915711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.915824]  kthread+0x328/0x630
[   20.915909]  ret_from_fork+0x10/0x20
[   20.916008] 
[   20.916068] The buggy address belongs to the object at fff00000c7a67680
[   20.916068]  which belongs to the cache kmalloc-64 of size 64
[   20.916137] The buggy address is located 0 bytes to the right of
[   20.916137]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.916211] 
[   20.916235] The buggy address belongs to the physical page:
[   20.916267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.916506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.916557] page_type: f5(slab)
[   20.916596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.916937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.917172] page dumped because: kasan: bad access detected
[   20.917437] 
[   20.917483] Memory state around the buggy address:
[   20.917682]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917747]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.917928] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.918046]                                      ^
[   20.918125]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918172]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918215] ==================================================================
[   20.800436] ==================================================================
[   20.800558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.800651] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.800761] 
[   20.800840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.800951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.801257] Hardware name: linux,dummy-virt (DT)
[   20.801314] Call trace:
[   20.801340]  show_stack+0x20/0x38 (C)
[   20.801394]  dump_stack_lvl+0x8c/0xd0
[   20.801708]  print_report+0x118/0x608
[   20.801788]  kasan_report+0xdc/0x128
[   20.801931]  kasan_check_range+0x100/0x1a8
[   20.802005]  __kasan_check_write+0x20/0x30
[   20.802129]  kasan_atomics_helper+0x1058/0x4858
[   20.802192]  kasan_atomics+0x198/0x2e0
[   20.802240]  kunit_try_run_case+0x170/0x3f0
[   20.802597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.802687]  kthread+0x328/0x630
[   20.803000]  ret_from_fork+0x10/0x20
[   20.803080] 
[   20.803167] Allocated by task 267:
[   20.803228]  kasan_save_stack+0x3c/0x68
[   20.803271]  kasan_save_track+0x20/0x40
[   20.803372]  kasan_save_alloc_info+0x40/0x58
[   20.803416]  __kasan_kmalloc+0xd4/0xd8
[   20.803471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.803518]  kasan_atomics+0xb8/0x2e0
[   20.803557]  kunit_try_run_case+0x170/0x3f0
[   20.803616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.803913]  kthread+0x328/0x630
[   20.803999]  ret_from_fork+0x10/0x20
[   20.804339] 
[   20.804388] The buggy address belongs to the object at fff00000c7a67680
[   20.804388]  which belongs to the cache kmalloc-64 of size 64
[   20.804540] The buggy address is located 0 bytes to the right of
[   20.804540]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.804634] 
[   20.805037] The buggy address belongs to the physical page:
[   20.805115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.805520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.805681] page_type: f5(slab)
[   20.805738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.806197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.806484] page dumped because: kasan: bad access detected
[   20.807104] 
[   20.807236] Memory state around the buggy address:
[   20.807324]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.807401]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.807746] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.808157]                                      ^
[   20.808237]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.808310]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.808465] ==================================================================
[   20.755257] ==================================================================
[   20.755410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.755518] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.755839] 
[   20.755941] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.756032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.756294] Hardware name: linux,dummy-virt (DT)
[   20.756378] Call trace:
[   20.756427]  show_stack+0x20/0x38 (C)
[   20.756707]  dump_stack_lvl+0x8c/0xd0
[   20.756799]  print_report+0x118/0x608
[   20.756990]  kasan_report+0xdc/0x128
[   20.757112]  kasan_check_range+0x100/0x1a8
[   20.757202]  __kasan_check_write+0x20/0x30
[   20.757377]  kasan_atomics_helper+0xe44/0x4858
[   20.757430]  kasan_atomics+0x198/0x2e0
[   20.757713]  kunit_try_run_case+0x170/0x3f0
[   20.757893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.758102]  kthread+0x328/0x630
[   20.758290]  ret_from_fork+0x10/0x20
[   20.758418] 
[   20.758489] Allocated by task 267:
[   20.758569]  kasan_save_stack+0x3c/0x68
[   20.758742]  kasan_save_track+0x20/0x40
[   20.758804]  kasan_save_alloc_info+0x40/0x58
[   20.759102]  __kasan_kmalloc+0xd4/0xd8
[   20.759191]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.759474]  kasan_atomics+0xb8/0x2e0
[   20.759563]  kunit_try_run_case+0x170/0x3f0
[   20.759624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.759792]  kthread+0x328/0x630
[   20.759960]  ret_from_fork+0x10/0x20
[   20.760069] 
[   20.760163] The buggy address belongs to the object at fff00000c7a67680
[   20.760163]  which belongs to the cache kmalloc-64 of size 64
[   20.760276] The buggy address is located 0 bytes to the right of
[   20.760276]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.760438] 
[   20.760474] The buggy address belongs to the physical page:
[   20.760507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.761020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.761118] page_type: f5(slab)
[   20.761447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.761575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.761634] page dumped because: kasan: bad access detected
[   20.761670] 
[   20.761690] Memory state around the buggy address:
[   20.762120]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.762484]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.762550] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.762593]                                      ^
[   20.762657]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.762870]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.763037] ==================================================================
[   20.823129] ==================================================================
[   20.823332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.823439] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.823592] 
[   20.823640] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.823730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.824431] Hardware name: linux,dummy-virt (DT)
[   20.824613] Call trace:
[   20.824670]  show_stack+0x20/0x38 (C)
[   20.824789]  dump_stack_lvl+0x8c/0xd0
[   20.824994]  print_report+0x118/0x608
[   20.825085]  kasan_report+0xdc/0x128
[   20.825144]  kasan_check_range+0x100/0x1a8
[   20.825193]  __kasan_check_write+0x20/0x30
[   20.825243]  kasan_atomics_helper+0x1190/0x4858
[   20.825292]  kasan_atomics+0x198/0x2e0
[   20.825338]  kunit_try_run_case+0x170/0x3f0
[   20.826056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826130]  kthread+0x328/0x630
[   20.826180]  ret_from_fork+0x10/0x20
[   20.826231] 
[   20.826252] Allocated by task 267:
[   20.826283]  kasan_save_stack+0x3c/0x68
[   20.826324]  kasan_save_track+0x20/0x40
[   20.826363]  kasan_save_alloc_info+0x40/0x58
[   20.826402]  __kasan_kmalloc+0xd4/0xd8
[   20.826440]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.826479]  kasan_atomics+0xb8/0x2e0
[   20.826516]  kunit_try_run_case+0x170/0x3f0
[   20.826556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826604]  kthread+0x328/0x630
[   20.826641]  ret_from_fork+0x10/0x20
[   20.826677] 
[   20.826699] The buggy address belongs to the object at fff00000c7a67680
[   20.826699]  which belongs to the cache kmalloc-64 of size 64
[   20.826760] The buggy address is located 0 bytes to the right of
[   20.826760]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.826828] 
[   20.826851] The buggy address belongs to the physical page:
[   20.826896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.826951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.827001] page_type: f5(slab)
[   20.827042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.827099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.827151] page dumped because: kasan: bad access detected
[   20.827186] 
[   20.827262] Memory state around the buggy address:
[   20.827433]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827494]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827541] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.827584]                                      ^
[   20.827689]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827736]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.827809] ==================================================================
[   20.769952] ==================================================================
[   20.770229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.770305] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.770421] 
[   20.770481] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.770600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.770634] Hardware name: linux,dummy-virt (DT)
[   20.770668] Call trace:
[   20.770691]  show_stack+0x20/0x38 (C)
[   20.770756]  dump_stack_lvl+0x8c/0xd0
[   20.770919]  print_report+0x118/0x608
[   20.770982]  kasan_report+0xdc/0x128
[   20.771156]  kasan_check_range+0x100/0x1a8
[   20.771339]  __kasan_check_write+0x20/0x30
[   20.771506]  kasan_atomics_helper+0xeb8/0x4858
[   20.771617]  kasan_atomics+0x198/0x2e0
[   20.771669]  kunit_try_run_case+0x170/0x3f0
[   20.771768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.771829]  kthread+0x328/0x630
[   20.771946]  ret_from_fork+0x10/0x20
[   20.772147] 
[   20.772178] Allocated by task 267:
[   20.772210]  kasan_save_stack+0x3c/0x68
[   20.772253]  kasan_save_track+0x20/0x40
[   20.772300]  kasan_save_alloc_info+0x40/0x58
[   20.772632]  __kasan_kmalloc+0xd4/0xd8
[   20.772718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.772978]  kasan_atomics+0xb8/0x2e0
[   20.773037]  kunit_try_run_case+0x170/0x3f0
[   20.773392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.773487]  kthread+0x328/0x630
[   20.773909]  ret_from_fork+0x10/0x20
[   20.774253] 
[   20.774353] The buggy address belongs to the object at fff00000c7a67680
[   20.774353]  which belongs to the cache kmalloc-64 of size 64
[   20.774478] The buggy address is located 0 bytes to the right of
[   20.774478]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.774665] 
[   20.774818] The buggy address belongs to the physical page:
[   20.774979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.775039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.775329] page_type: f5(slab)
[   20.775420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.775759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.775863] page dumped because: kasan: bad access detected
[   20.775927] 
[   20.775948] Memory state around the buggy address:
[   20.775983]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776038]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776087] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.776239]                                      ^
[   20.776484]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.776552]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.776597] ==================================================================
[   20.764696] ==================================================================
[   20.764750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.764885] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.764968] 
[   20.765070] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.765176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765206] Hardware name: linux,dummy-virt (DT)
[   20.765240] Call trace:
[   20.765264]  show_stack+0x20/0x38 (C)
[   20.765569]  dump_stack_lvl+0x8c/0xd0
[   20.765648]  print_report+0x118/0x608
[   20.765821]  kasan_report+0xdc/0x128
[   20.765895]  __asan_report_store8_noabort+0x20/0x30
[   20.765948]  kasan_atomics_helper+0x3e5c/0x4858
[   20.765998]  kasan_atomics+0x198/0x2e0
[   20.766045]  kunit_try_run_case+0x170/0x3f0
[   20.766097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766154]  kthread+0x328/0x630
[   20.766204]  ret_from_fork+0x10/0x20
[   20.766255] 
[   20.766293] Allocated by task 267:
[   20.766332]  kasan_save_stack+0x3c/0x68
[   20.766383]  kasan_save_track+0x20/0x40
[   20.766421]  kasan_save_alloc_info+0x40/0x58
[   20.766468]  __kasan_kmalloc+0xd4/0xd8
[   20.766515]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.766554]  kasan_atomics+0xb8/0x2e0
[   20.766591]  kunit_try_run_case+0x170/0x3f0
[   20.766632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766683]  kthread+0x328/0x630
[   20.766729]  ret_from_fork+0x10/0x20
[   20.766768] 
[   20.766790] The buggy address belongs to the object at fff00000c7a67680
[   20.766790]  which belongs to the cache kmalloc-64 of size 64
[   20.766861] The buggy address is located 0 bytes to the right of
[   20.766861]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.766929] 
[   20.766950] The buggy address belongs to the physical page:
[   20.766982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.767038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.767547] page_type: f5(slab)
[   20.767608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.767675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.768031] page dumped because: kasan: bad access detected
[   20.768083] 
[   20.768103] Memory state around the buggy address:
[   20.768358]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768424]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768731] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.769039]                                      ^
[   20.769114]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769283]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769375] ==================================================================
[   20.813194] ==================================================================
[   20.813579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.813668] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.813808] 
[   20.813840] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.813939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.813970] Hardware name: linux,dummy-virt (DT)
[   20.814003] Call trace:
[   20.814028]  show_stack+0x20/0x38 (C)
[   20.814080]  dump_stack_lvl+0x8c/0xd0
[   20.814372]  print_report+0x118/0x608
[   20.814612]  kasan_report+0xdc/0x128
[   20.814821]  kasan_check_range+0x100/0x1a8
[   20.814953]  __kasan_check_write+0x20/0x30
[   20.815006]  kasan_atomics_helper+0x1128/0x4858
[   20.815057]  kasan_atomics+0x198/0x2e0
[   20.815387]  kunit_try_run_case+0x170/0x3f0
[   20.815485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.815552]  kthread+0x328/0x630
[   20.815895]  ret_from_fork+0x10/0x20
[   20.816127] 
[   20.816198] Allocated by task 267:
[   20.816364]  kasan_save_stack+0x3c/0x68
[   20.816421]  kasan_save_track+0x20/0x40
[   20.816465]  kasan_save_alloc_info+0x40/0x58
[   20.816507]  __kasan_kmalloc+0xd4/0xd8
[   20.816543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.816586]  kasan_atomics+0xb8/0x2e0
[   20.816622]  kunit_try_run_case+0x170/0x3f0
[   20.816993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.817471]  kthread+0x328/0x630
[   20.817602]  ret_from_fork+0x10/0x20
[   20.817801] 
[   20.817981] The buggy address belongs to the object at fff00000c7a67680
[   20.817981]  which belongs to the cache kmalloc-64 of size 64
[   20.818045] The buggy address is located 0 bytes to the right of
[   20.818045]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.818308] 
[   20.818410] The buggy address belongs to the physical page:
[   20.818550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.818903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.818971] page_type: f5(slab)
[   20.819013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.819725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.819805] page dumped because: kasan: bad access detected
[   20.819962] 
[   20.820030] Memory state around the buggy address:
[   20.820232]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.820459]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.820532] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.820698]                                      ^
[   20.820787]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.821106]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.821188] ==================================================================
[   20.655762] ==================================================================
[   20.655816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.655880] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.655935] 
[   20.655987] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.656077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656108] Hardware name: linux,dummy-virt (DT)
[   20.656142] Call trace:
[   20.656167]  show_stack+0x20/0x38 (C)
[   20.656217]  dump_stack_lvl+0x8c/0xd0
[   20.656265]  print_report+0x118/0x608
[   20.656313]  kasan_report+0xdc/0x128
[   20.656359]  kasan_check_range+0x100/0x1a8
[   20.656408]  __kasan_check_write+0x20/0x30
[   20.656456]  kasan_atomics_helper+0xa6c/0x4858
[   20.656505]  kasan_atomics+0x198/0x2e0
[   20.656551]  kunit_try_run_case+0x170/0x3f0
[   20.656601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656667]  kthread+0x328/0x630
[   20.656725]  ret_from_fork+0x10/0x20
[   20.656775] 
[   20.656804] Allocated by task 267:
[   20.656835]  kasan_save_stack+0x3c/0x68
[   20.657531]  kasan_save_track+0x20/0x40
[   20.657603]  kasan_save_alloc_info+0x40/0x58
[   20.657692]  __kasan_kmalloc+0xd4/0xd8
[   20.657801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.658014]  kasan_atomics+0xb8/0x2e0
[   20.658057]  kunit_try_run_case+0x170/0x3f0
[   20.658121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658435]  kthread+0x328/0x630
[   20.658592]  ret_from_fork+0x10/0x20
[   20.658707] 
[   20.658762] The buggy address belongs to the object at fff00000c7a67680
[   20.658762]  which belongs to the cache kmalloc-64 of size 64
[   20.658941] The buggy address is located 0 bytes to the right of
[   20.658941]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.659060] 
[   20.659136] The buggy address belongs to the physical page:
[   20.659182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.659273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.659643] page_type: f5(slab)
[   20.659761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.659924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.659981] page dumped because: kasan: bad access detected
[   20.660017] 
[   20.660181] Memory state around the buggy address:
[   20.660222]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.660286]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.660425] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.660472]                                      ^
[   20.660918]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.661024]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.661356] ==================================================================
[   20.845786] ==================================================================
[   20.845841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.845910] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.845962] 
[   20.845994] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.846224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.846272] Hardware name: linux,dummy-virt (DT)
[   20.846307] Call trace:
[   20.846330]  show_stack+0x20/0x38 (C)
[   20.846382]  dump_stack_lvl+0x8c/0xd0
[   20.846475]  print_report+0x118/0x608
[   20.846558]  kasan_report+0xdc/0x128
[   20.846606]  kasan_check_range+0x100/0x1a8
[   20.846653]  __kasan_check_write+0x20/0x30
[   20.846702]  kasan_atomics_helper+0x1384/0x4858
[   20.846749]  kasan_atomics+0x198/0x2e0
[   20.846794]  kunit_try_run_case+0x170/0x3f0
[   20.846844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.846912]  kthread+0x328/0x630
[   20.847026]  ret_from_fork+0x10/0x20
[   20.847081] 
[   20.847162] Allocated by task 267:
[   20.847241]  kasan_save_stack+0x3c/0x68
[   20.847325]  kasan_save_track+0x20/0x40
[   20.847383]  kasan_save_alloc_info+0x40/0x58
[   20.847435]  __kasan_kmalloc+0xd4/0xd8
[   20.847541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.847582]  kasan_atomics+0xb8/0x2e0
[   20.847622]  kunit_try_run_case+0x170/0x3f0
[   20.847665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.847710]  kthread+0x328/0x630
[   20.847747]  ret_from_fork+0x10/0x20
[   20.847786] 
[   20.847809] The buggy address belongs to the object at fff00000c7a67680
[   20.847809]  which belongs to the cache kmalloc-64 of size 64
[   20.847973] The buggy address is located 0 bytes to the right of
[   20.847973]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.848065] 
[   20.848086] The buggy address belongs to the physical page:
[   20.848303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.848426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.848481] page_type: f5(slab)
[   20.848522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.849314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.849623] page dumped because: kasan: bad access detected
[   20.849709] 
[   20.849733] Memory state around the buggy address:
[   20.849769]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.850032]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.850173] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.850231]                                      ^
[   20.850265]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850323]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.850366] ==================================================================
[   20.809103] ==================================================================
[   20.809155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.809613] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.809753] 
[   20.809785] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.809884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.809914] Hardware name: linux,dummy-virt (DT)
[   20.809947] Call trace:
[   20.809972]  show_stack+0x20/0x38 (C)
[   20.810025]  dump_stack_lvl+0x8c/0xd0
[   20.810092]  print_report+0x118/0x608
[   20.810140]  kasan_report+0xdc/0x128
[   20.810185]  kasan_check_range+0x100/0x1a8
[   20.810243]  __kasan_check_write+0x20/0x30
[   20.810298]  kasan_atomics_helper+0x10c0/0x4858
[   20.810348]  kasan_atomics+0x198/0x2e0
[   20.810395]  kunit_try_run_case+0x170/0x3f0
[   20.810444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.810499]  kthread+0x328/0x630
[   20.810551]  ret_from_fork+0x10/0x20
[   20.810610] 
[   20.810638] Allocated by task 267:
[   20.810674]  kasan_save_stack+0x3c/0x68
[   20.810714]  kasan_save_track+0x20/0x40
[   20.810762]  kasan_save_alloc_info+0x40/0x58
[   20.810803]  __kasan_kmalloc+0xd4/0xd8
[   20.810840]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.810888]  kasan_atomics+0xb8/0x2e0
[   20.810926]  kunit_try_run_case+0x170/0x3f0
[   20.810966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.811011]  kthread+0x328/0x630
[   20.811055]  ret_from_fork+0x10/0x20
[   20.811102] 
[   20.811123] The buggy address belongs to the object at fff00000c7a67680
[   20.811123]  which belongs to the cache kmalloc-64 of size 64
[   20.811190] The buggy address is located 0 bytes to the right of
[   20.811190]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.811258] 
[   20.811287] The buggy address belongs to the physical page:
[   20.811319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.811372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.811421] page_type: f5(slab)
[   20.811461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.811517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.811563] page dumped because: kasan: bad access detected
[   20.811598] 
[   20.811619] Memory state around the buggy address:
[   20.811652]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.811698]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.811745] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.811789]                                      ^
[   20.811822]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812340]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.812820] ==================================================================
[   20.709381] ==================================================================
[   20.711171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   20.711981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.712720]  kasan_check_range+0x100/0x1a8
[   20.713402]  kthread+0x328/0x630
[   20.714063] 
[   20.714084] The buggy address belongs to the object at fff00000c7a67680
[   20.714084]  which belongs to the cache kmalloc-64 of size 64
[   20.714154] The buggy address is located 0 bytes to the right of
[   20.714154]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.714222] 
[   20.714265] The buggy address belongs to the physical page:
[   20.714299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.714354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.714414] page_type: f5(slab)
[   20.714453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.714509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.714555] page dumped because: kasan: bad access detected
[   20.714599] 
[   20.714641] Memory state around the buggy address:
[   20.714673]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.714729]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.714773] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.714832]                                      ^
[   20.714877]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715443]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.715848] ==================================================================
[   20.856211] ==================================================================
[   20.856264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.856315] Write of size 8 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.856368] 
[   20.856399] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.856484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.856513] Hardware name: linux,dummy-virt (DT)
[   20.856546] Call trace:
[   20.856590]  show_stack+0x20/0x38 (C)
[   20.856642]  dump_stack_lvl+0x8c/0xd0
[   20.856693]  print_report+0x118/0x608
[   20.856738]  kasan_report+0xdc/0x128
[   20.856785]  kasan_check_range+0x100/0x1a8
[   20.856840]  __kasan_check_write+0x20/0x30
[   20.856909]  kasan_atomics_helper+0x1414/0x4858
[   20.856958]  kasan_atomics+0x198/0x2e0
[   20.857004]  kunit_try_run_case+0x170/0x3f0
[   20.857080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.857303]  kthread+0x328/0x630
[   20.857409]  ret_from_fork+0x10/0x20
[   20.857573] 
[   20.857601] Allocated by task 267:
[   20.857646]  kasan_save_stack+0x3c/0x68
[   20.857689]  kasan_save_track+0x20/0x40
[   20.857726]  kasan_save_alloc_info+0x40/0x58
[   20.857767]  __kasan_kmalloc+0xd4/0xd8
[   20.857826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.857879]  kasan_atomics+0xb8/0x2e0
[   20.858030]  kunit_try_run_case+0x170/0x3f0
[   20.858123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.858198]  kthread+0x328/0x630
[   20.858254]  ret_from_fork+0x10/0x20
[   20.858308] 
[   20.858365] The buggy address belongs to the object at fff00000c7a67680
[   20.858365]  which belongs to the cache kmalloc-64 of size 64
[   20.858521] The buggy address is located 0 bytes to the right of
[   20.858521]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.858591] 
[   20.858786] The buggy address belongs to the physical page:
[   20.858825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.858894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.858945] page_type: f5(slab)
[   20.858985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.859222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.859323] page dumped because: kasan: bad access detected
[   20.859398] 
[   20.859426] Memory state around the buggy address:
[   20.859463]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859511]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.859716] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.859881]                                      ^
[   20.859993]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860140]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860245] ==================================================================
[   20.726151] ==================================================================
[   20.726211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.726266] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.726593] 
[   20.726664] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.726946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.727176] Hardware name: linux,dummy-virt (DT)
[   20.727305] Call trace:
[   20.727335]  show_stack+0x20/0x38 (C)
[   20.727390]  dump_stack_lvl+0x8c/0xd0
[   20.727444]  print_report+0x118/0x608
[   20.727708]  kasan_report+0xdc/0x128
[   20.727785]  kasan_check_range+0x100/0x1a8
[   20.727964]  __kasan_check_write+0x20/0x30
[   20.728148]  kasan_atomics_helper+0xd3c/0x4858
[   20.728282]  kasan_atomics+0x198/0x2e0
[   20.728413]  kunit_try_run_case+0x170/0x3f0
[   20.728548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.728673]  kthread+0x328/0x630
[   20.728831]  ret_from_fork+0x10/0x20
[   20.729187] 
[   20.729270] Allocated by task 267:
[   20.729825]  kasan_save_stack+0x3c/0x68
[   20.729907]  kasan_save_track+0x20/0x40
[   20.730242]  kasan_save_alloc_info+0x40/0x58
[   20.730397]  __kasan_kmalloc+0xd4/0xd8
[   20.730458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.730758]  kasan_atomics+0xb8/0x2e0
[   20.730885]  kunit_try_run_case+0x170/0x3f0
[   20.731044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.731123]  kthread+0x328/0x630
[   20.731169]  ret_from_fork+0x10/0x20
[   20.731208] 
[   20.731231] The buggy address belongs to the object at fff00000c7a67680
[   20.731231]  which belongs to the cache kmalloc-64 of size 64
[   20.731303] The buggy address is located 0 bytes to the right of
[   20.731303]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.731382] 
[   20.731418] The buggy address belongs to the physical page:
[   20.731458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.731527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.731589] page_type: f5(slab)
[   20.731631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.731696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.731749] page dumped because: kasan: bad access detected
[   20.731794] 
[   20.731814] Memory state around the buggy address:
[   20.731849]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.731906]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.731953] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.731997]                                      ^
[   20.732040]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732105]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732169] ==================================================================
[   20.638755] ==================================================================
[   20.639085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.639181] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.639341] 
[   20.639424] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.639728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.639810] Hardware name: linux,dummy-virt (DT)
[   20.639846] Call trace:
[   20.640214]  show_stack+0x20/0x38 (C)
[   20.640389]  dump_stack_lvl+0x8c/0xd0
[   20.640533]  print_report+0x118/0x608
[   20.640584]  kasan_report+0xdc/0x128
[   20.640632]  kasan_check_range+0x100/0x1a8
[   20.641088]  __kasan_check_write+0x20/0x30
[   20.641229]  kasan_atomics_helper+0x99c/0x4858
[   20.641499]  kasan_atomics+0x198/0x2e0
[   20.642208]  ret_from_fork+0x10/0x20
[   20.642379] 
[   20.642848]  kasan_save_track+0x20/0x40
[   20.644324] 
[   20.644545] The buggy address is located 0 bytes to the right of
[   20.644545]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.645105] page dumped because: kasan: bad access detected
[   20.645275]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646786] Write of size 4 at addr fff00000c7a676b0 by task kunit_try_catch/267
[   20.648392]  kasan_atomics+0x198/0x2e0
[   20.649407] 
[   20.649474] Allocated by task 267:
[   20.649552]  kasan_save_stack+0x3c/0x68
[   20.649597]  kasan_save_track+0x20/0x40
[   20.649905]  kasan_save_alloc_info+0x40/0x58
[   20.649996]  __kasan_kmalloc+0xd4/0xd8
[   20.650133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.650228]  kasan_atomics+0xb8/0x2e0
[   20.650506]  kunit_try_run_case+0x170/0x3f0
[   20.650594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.650809]  kthread+0x328/0x630
[   20.650851]  ret_from_fork+0x10/0x20
[   20.651179] 
[   20.651231] The buggy address belongs to the object at fff00000c7a67680
[   20.651231]  which belongs to the cache kmalloc-64 of size 64
[   20.651331] The buggy address is located 0 bytes to the right of
[   20.651331]  allocated 48-byte region [fff00000c7a67680, fff00000c7a676b0)
[   20.651807] 
[   20.651907] The buggy address belongs to the physical page:
[   20.651964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a67
[   20.652102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.652325] page_type: f5(slab)
[   20.652433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.652768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.652937] page dumped because: kasan: bad access detected
[   20.653107] 
[   20.653247] Memory state around the buggy address:
[   20.653586]  fff00000c7a67580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.653663]  fff00000c7a67600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.653845] >fff00000c7a67680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.653988]                                      ^
[   20.654144]  fff00000c7a67700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654237]  fff00000c7a67780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.654551] ==================================================================

[   13.335959] ==================================================================
[   13.336300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.336651] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.337309] 
[   13.337427] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.337476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.337490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.337513] Call Trace:
[   13.337532]  <TASK>
[   13.337553]  dump_stack_lvl+0x73/0xb0
[   13.337581]  print_report+0xd1/0x650
[   13.337605]  ? __virt_addr_valid+0x1db/0x2d0
[   13.337628]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.337650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.337674]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.337697]  kasan_report+0x141/0x180
[   13.337720]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.337748]  __asan_report_load4_noabort+0x18/0x20
[   13.337770]  kasan_atomics_helper+0x4b88/0x5450
[   13.337794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.337817]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.337840]  ? kasan_atomics+0x152/0x310
[   13.337864]  kasan_atomics+0x1dc/0x310
[   13.337884]  ? __pfx_kasan_atomics+0x10/0x10
[   13.337905]  ? __pfx_read_tsc+0x10/0x10
[   13.337939]  ? ktime_get_ts64+0x86/0x230
[   13.337965]  kunit_try_run_case+0x1a5/0x480
[   13.337991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.338014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.338040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.338064]  ? __kthread_parkme+0x82/0x180
[   13.338087]  ? preempt_count_sub+0x50/0x80
[   13.338113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.338138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.338161]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.338186]  kthread+0x337/0x6f0
[   13.338204]  ? trace_preempt_on+0x20/0xc0
[   13.338229]  ? __pfx_kthread+0x10/0x10
[   13.338248]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.338270]  ? calculate_sigpending+0x7b/0xa0
[   13.338293]  ? __pfx_kthread+0x10/0x10
[   13.338312]  ret_from_fork+0x41/0x80
[   13.338333]  ? __pfx_kthread+0x10/0x10
[   13.338351]  ret_from_fork_asm+0x1a/0x30
[   13.338383]  </TASK>
[   13.338395] 
[   13.346126] Allocated by task 284:
[   13.346293]  kasan_save_stack+0x45/0x70
[   13.346438]  kasan_save_track+0x18/0x40
[   13.346570]  kasan_save_alloc_info+0x3b/0x50
[   13.346710]  __kasan_kmalloc+0xb7/0xc0
[   13.346892]  __kmalloc_cache_noprof+0x189/0x420
[   13.347110]  kasan_atomics+0x95/0x310
[   13.347293]  kunit_try_run_case+0x1a5/0x480
[   13.347494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.347923]  kthread+0x337/0x6f0
[   13.348051]  ret_from_fork+0x41/0x80
[   13.348179]  ret_from_fork_asm+0x1a/0x30
[   13.348320] 
[   13.348391] The buggy address belongs to the object at ffff888102a0bf80
[   13.348391]  which belongs to the cache kmalloc-64 of size 64
[   13.349280] The buggy address is located 0 bytes to the right of
[   13.349280]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.349869] 
[   13.349988] The buggy address belongs to the physical page:
[   13.350240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.350622] flags: 0x200000000000000(node=0|zone=2)
[   13.350841] page_type: f5(slab)
[   13.350978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.351257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.351616] page dumped because: kasan: bad access detected
[   13.351932] 
[   13.352050] Memory state around the buggy address:
[   13.352287]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.352666]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.353052] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.353367]                                      ^
[   13.353586]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.353903]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.354195] ==================================================================
[   13.739806] ==================================================================
[   13.740118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   13.740444] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.740902] 
[   13.741006] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.741054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.741067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.741100] Call Trace:
[   13.741119]  <TASK>
[   13.741138]  dump_stack_lvl+0x73/0xb0
[   13.741175]  print_report+0xd1/0x650
[   13.741198]  ? __virt_addr_valid+0x1db/0x2d0
[   13.741221]  ? kasan_atomics_helper+0xde0/0x5450
[   13.741245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.741269]  ? kasan_atomics_helper+0xde0/0x5450
[   13.741301]  kasan_report+0x141/0x180
[   13.741325]  ? kasan_atomics_helper+0xde0/0x5450
[   13.741363]  kasan_check_range+0x10c/0x1c0
[   13.741384]  __kasan_check_write+0x18/0x20
[   13.741404]  kasan_atomics_helper+0xde0/0x5450
[   13.741428]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.741460]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.741482]  ? kasan_atomics+0x152/0x310
[   13.741507]  kasan_atomics+0x1dc/0x310
[   13.741538]  ? __pfx_kasan_atomics+0x10/0x10
[   13.741559]  ? __pfx_read_tsc+0x10/0x10
[   13.741580]  ? ktime_get_ts64+0x86/0x230
[   13.741606]  kunit_try_run_case+0x1a5/0x480
[   13.741640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.741663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.741688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.741723]  ? __kthread_parkme+0x82/0x180
[   13.741746]  ? preempt_count_sub+0x50/0x80
[   13.741772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.741805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.741829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.741853]  kthread+0x337/0x6f0
[   13.741881]  ? trace_preempt_on+0x20/0xc0
[   13.741905]  ? __pfx_kthread+0x10/0x10
[   13.741933]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.741956]  ? calculate_sigpending+0x7b/0xa0
[   13.741986]  ? __pfx_kthread+0x10/0x10
[   13.742005]  ret_from_fork+0x41/0x80
[   13.742028]  ? __pfx_kthread+0x10/0x10
[   13.742058]  ret_from_fork_asm+0x1a/0x30
[   13.742090]  </TASK>
[   13.742100] 
[   13.750013] Allocated by task 284:
[   13.750178]  kasan_save_stack+0x45/0x70
[   13.750324]  kasan_save_track+0x18/0x40
[   13.750459]  kasan_save_alloc_info+0x3b/0x50
[   13.750604]  __kasan_kmalloc+0xb7/0xc0
[   13.750735]  __kmalloc_cache_noprof+0x189/0x420
[   13.750888]  kasan_atomics+0x95/0x310
[   13.751153]  kunit_try_run_case+0x1a5/0x480
[   13.751373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.751692]  kthread+0x337/0x6f0
[   13.751858]  ret_from_fork+0x41/0x80
[   13.752043]  ret_from_fork_asm+0x1a/0x30
[   13.752183] 
[   13.752259] The buggy address belongs to the object at ffff888102a0bf80
[   13.752259]  which belongs to the cache kmalloc-64 of size 64
[   13.752614] The buggy address is located 0 bytes to the right of
[   13.752614]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.753685] 
[   13.753783] The buggy address belongs to the physical page:
[   13.754069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.754428] flags: 0x200000000000000(node=0|zone=2)
[   13.754681] page_type: f5(slab)
[   13.754886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.755221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.755448] page dumped because: kasan: bad access detected
[   13.755635] 
[   13.755727] Memory state around the buggy address:
[   13.755984]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.756492]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.756775] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.757104]                                      ^
[   13.757330]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.757713]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.758009] ==================================================================
[   13.682429] ==================================================================
[   13.683070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   13.683361] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.683715] 
[   13.683817] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.683862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.683875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.683896] Call Trace:
[   13.683913]  <TASK>
[   13.683941]  dump_stack_lvl+0x73/0xb0
[   13.683965]  print_report+0xd1/0x650
[   13.683987]  ? __virt_addr_valid+0x1db/0x2d0
[   13.684022]  ? kasan_atomics_helper+0xc70/0x5450
[   13.684043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.684066]  ? kasan_atomics_helper+0xc70/0x5450
[   13.684089]  kasan_report+0x141/0x180
[   13.684113]  ? kasan_atomics_helper+0xc70/0x5450
[   13.684140]  kasan_check_range+0x10c/0x1c0
[   13.684161]  __kasan_check_write+0x18/0x20
[   13.684191]  kasan_atomics_helper+0xc70/0x5450
[   13.684215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.684238]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.684275]  ? kasan_atomics+0x152/0x310
[   13.684300]  kasan_atomics+0x1dc/0x310
[   13.684319]  ? __pfx_kasan_atomics+0x10/0x10
[   13.684341]  ? __pfx_read_tsc+0x10/0x10
[   13.684361]  ? ktime_get_ts64+0x86/0x230
[   13.684388]  kunit_try_run_case+0x1a5/0x480
[   13.684413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.684435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.684460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.684484]  ? __kthread_parkme+0x82/0x180
[   13.684507]  ? preempt_count_sub+0x50/0x80
[   13.684543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.684574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.684609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.684633]  kthread+0x337/0x6f0
[   13.684650]  ? trace_preempt_on+0x20/0xc0
[   13.684674]  ? __pfx_kthread+0x10/0x10
[   13.684693]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.684716]  ? calculate_sigpending+0x7b/0xa0
[   13.684738]  ? __pfx_kthread+0x10/0x10
[   13.684757]  ret_from_fork+0x41/0x80
[   13.684778]  ? __pfx_kthread+0x10/0x10
[   13.684797]  ret_from_fork_asm+0x1a/0x30
[   13.684828]  </TASK>
[   13.684839] 
[   13.692421] Allocated by task 284:
[   13.692566]  kasan_save_stack+0x45/0x70
[   13.692727]  kasan_save_track+0x18/0x40
[   13.692964]  kasan_save_alloc_info+0x3b/0x50
[   13.693171]  __kasan_kmalloc+0xb7/0xc0
[   13.693358]  __kmalloc_cache_noprof+0x189/0x420
[   13.693570]  kasan_atomics+0x95/0x310
[   13.693700]  kunit_try_run_case+0x1a5/0x480
[   13.693850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.694088]  kthread+0x337/0x6f0
[   13.694254]  ret_from_fork+0x41/0x80
[   13.694613]  ret_from_fork_asm+0x1a/0x30
[   13.694786] 
[   13.694861] The buggy address belongs to the object at ffff888102a0bf80
[   13.694861]  which belongs to the cache kmalloc-64 of size 64
[   13.695320] The buggy address is located 0 bytes to the right of
[   13.695320]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.695687] 
[   13.695782] The buggy address belongs to the physical page:
[   13.696047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.696427] flags: 0x200000000000000(node=0|zone=2)
[   13.696791] page_type: f5(slab)
[   13.696974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.697314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.697717] page dumped because: kasan: bad access detected
[   13.697942] 
[   13.698011] Memory state around the buggy address:
[   13.698169]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.698386]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.698861] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.699216]                                      ^
[   13.699458]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.699773]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.700072] ==================================================================
[   13.880331] ==================================================================
[   13.880661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   13.880900] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.881258] 
[   13.881376] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.881433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.881446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.881470] Call Trace:
[   13.881502]  <TASK>
[   13.881523]  dump_stack_lvl+0x73/0xb0
[   13.881550]  print_report+0xd1/0x650
[   13.881575]  ? __virt_addr_valid+0x1db/0x2d0
[   13.881598]  ? kasan_atomics_helper+0x1148/0x5450
[   13.881620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.881643]  ? kasan_atomics_helper+0x1148/0x5450
[   13.881666]  kasan_report+0x141/0x180
[   13.881689]  ? kasan_atomics_helper+0x1148/0x5450
[   13.881716]  kasan_check_range+0x10c/0x1c0
[   13.881737]  __kasan_check_write+0x18/0x20
[   13.881757]  kasan_atomics_helper+0x1148/0x5450
[   13.881782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.881805]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.881828]  ? kasan_atomics+0x152/0x310
[   13.881852]  kasan_atomics+0x1dc/0x310
[   13.881873]  ? __pfx_kasan_atomics+0x10/0x10
[   13.881894]  ? __pfx_read_tsc+0x10/0x10
[   13.881935]  ? ktime_get_ts64+0x86/0x230
[   13.881963]  kunit_try_run_case+0x1a5/0x480
[   13.881989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.882048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.882073]  ? __kthread_parkme+0x82/0x180
[   13.882096]  ? preempt_count_sub+0x50/0x80
[   13.882122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.882170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.882194]  kthread+0x337/0x6f0
[   13.882212]  ? trace_preempt_on+0x20/0xc0
[   13.882236]  ? __pfx_kthread+0x10/0x10
[   13.882258]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.882280]  ? calculate_sigpending+0x7b/0xa0
[   13.882302]  ? __pfx_kthread+0x10/0x10
[   13.882322]  ret_from_fork+0x41/0x80
[   13.882343]  ? __pfx_kthread+0x10/0x10
[   13.882361]  ret_from_fork_asm+0x1a/0x30
[   13.882394]  </TASK>
[   13.882406] 
[   13.890116] Allocated by task 284:
[   13.890267]  kasan_save_stack+0x45/0x70
[   13.890418]  kasan_save_track+0x18/0x40
[   13.890555]  kasan_save_alloc_info+0x3b/0x50
[   13.890967]  __kasan_kmalloc+0xb7/0xc0
[   13.891159]  __kmalloc_cache_noprof+0x189/0x420
[   13.891399]  kasan_atomics+0x95/0x310
[   13.891592]  kunit_try_run_case+0x1a5/0x480
[   13.891809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.892068]  kthread+0x337/0x6f0
[   13.892196]  ret_from_fork+0x41/0x80
[   13.892346]  ret_from_fork_asm+0x1a/0x30
[   13.892547] 
[   13.892680] The buggy address belongs to the object at ffff888102a0bf80
[   13.892680]  which belongs to the cache kmalloc-64 of size 64
[   13.893223] The buggy address is located 0 bytes to the right of
[   13.893223]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.893747] 
[   13.893869] The buggy address belongs to the physical page:
[   13.894100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.894434] flags: 0x200000000000000(node=0|zone=2)
[   13.894705] page_type: f5(slab)
[   13.894875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.895224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.895539] page dumped because: kasan: bad access detected
[   13.895766] 
[   13.895873] Memory state around the buggy address:
[   13.896105]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.896358]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.896579] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.896930]                                      ^
[   13.897152]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.897452]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.897887] ==================================================================
[   14.254602] ==================================================================
[   14.254855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.255849] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.256180] 
[   14.256284] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.256333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.256346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.256370] Call Trace:
[   14.256391]  <TASK>
[   14.256411]  dump_stack_lvl+0x73/0xb0
[   14.256439]  print_report+0xd1/0x650
[   14.256465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.256487]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.256511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.256535]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.256557]  kasan_report+0x141/0x180
[   14.256581]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.256609]  kasan_check_range+0x10c/0x1c0
[   14.256629]  __kasan_check_write+0x18/0x20
[   14.256660]  kasan_atomics_helper+0x19e3/0x5450
[   14.256684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.256707]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.256729]  ? kasan_atomics+0x152/0x310
[   14.256754]  kasan_atomics+0x1dc/0x310
[   14.256774]  ? __pfx_kasan_atomics+0x10/0x10
[   14.256794]  ? __pfx_read_tsc+0x10/0x10
[   14.256816]  ? ktime_get_ts64+0x86/0x230
[   14.256842]  kunit_try_run_case+0x1a5/0x480
[   14.256868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.256890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.256927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.256951]  ? __kthread_parkme+0x82/0x180
[   14.256974]  ? preempt_count_sub+0x50/0x80
[   14.257000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.257024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.257048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.257071]  kthread+0x337/0x6f0
[   14.257089]  ? trace_preempt_on+0x20/0xc0
[   14.257112]  ? __pfx_kthread+0x10/0x10
[   14.257131]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.257153]  ? calculate_sigpending+0x7b/0xa0
[   14.257176]  ? __pfx_kthread+0x10/0x10
[   14.257194]  ret_from_fork+0x41/0x80
[   14.257215]  ? __pfx_kthread+0x10/0x10
[   14.257233]  ret_from_fork_asm+0x1a/0x30
[   14.257265]  </TASK>
[   14.257276] 
[   14.264701] Allocated by task 284:
[   14.264892]  kasan_save_stack+0x45/0x70
[   14.265111]  kasan_save_track+0x18/0x40
[   14.265303]  kasan_save_alloc_info+0x3b/0x50
[   14.265511]  __kasan_kmalloc+0xb7/0xc0
[   14.265860]  __kmalloc_cache_noprof+0x189/0x420
[   14.266029]  kasan_atomics+0x95/0x310
[   14.266162]  kunit_try_run_case+0x1a5/0x480
[   14.266311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.266553]  kthread+0x337/0x6f0
[   14.266719]  ret_from_fork+0x41/0x80
[   14.266902]  ret_from_fork_asm+0x1a/0x30
[   14.267108] 
[   14.267208] The buggy address belongs to the object at ffff888102a0bf80
[   14.267208]  which belongs to the cache kmalloc-64 of size 64
[   14.267693] The buggy address is located 0 bytes to the right of
[   14.267693]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.268074] 
[   14.268149] The buggy address belongs to the physical page:
[   14.268389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.268741] flags: 0x200000000000000(node=0|zone=2)
[   14.269102] page_type: f5(slab)
[   14.269328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.269660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.269890] page dumped because: kasan: bad access detected
[   14.270071] 
[   14.270140] Memory state around the buggy address:
[   14.270468]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.271082]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.271403] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.271724]                                      ^
[   14.271932]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.272149]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.272448] ==================================================================
[   13.434010] ==================================================================
[   13.434379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.434930] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.435266] 
[   13.435355] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.435401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.435414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.435437] Call Trace:
[   13.435456]  <TASK>
[   13.435473]  dump_stack_lvl+0x73/0xb0
[   13.435498]  print_report+0xd1/0x650
[   13.435522]  ? __virt_addr_valid+0x1db/0x2d0
[   13.435545]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.435567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.435590]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.435613]  kasan_report+0x141/0x180
[   13.435637]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.435664]  __asan_report_store4_noabort+0x1b/0x30
[   13.435687]  kasan_atomics_helper+0x4b3a/0x5450
[   13.435712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.435737]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.435764]  ? kasan_atomics+0x152/0x310
[   13.435790]  kasan_atomics+0x1dc/0x310
[   13.435809]  ? __pfx_kasan_atomics+0x10/0x10
[   13.435832]  ? __pfx_read_tsc+0x10/0x10
[   13.435852]  ? ktime_get_ts64+0x86/0x230
[   13.435879]  kunit_try_run_case+0x1a5/0x480
[   13.435905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.435941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.435967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.435991]  ? __kthread_parkme+0x82/0x180
[   13.436014]  ? preempt_count_sub+0x50/0x80
[   13.436041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.436078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.436102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.436127]  kthread+0x337/0x6f0
[   13.436144]  ? trace_preempt_on+0x20/0xc0
[   13.436169]  ? __pfx_kthread+0x10/0x10
[   13.436188]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.436210]  ? calculate_sigpending+0x7b/0xa0
[   13.436232]  ? __pfx_kthread+0x10/0x10
[   13.436258]  ret_from_fork+0x41/0x80
[   13.436279]  ? __pfx_kthread+0x10/0x10
[   13.436298]  ret_from_fork_asm+0x1a/0x30
[   13.436331]  </TASK>
[   13.436343] 
[   13.443996] Allocated by task 284:
[   13.444188]  kasan_save_stack+0x45/0x70
[   13.444349]  kasan_save_track+0x18/0x40
[   13.444487]  kasan_save_alloc_info+0x3b/0x50
[   13.444674]  __kasan_kmalloc+0xb7/0xc0
[   13.444862]  __kmalloc_cache_noprof+0x189/0x420
[   13.445099]  kasan_atomics+0x95/0x310
[   13.445326]  kunit_try_run_case+0x1a5/0x480
[   13.445552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.445733]  kthread+0x337/0x6f0
[   13.445852]  ret_from_fork+0x41/0x80
[   13.445994]  ret_from_fork_asm+0x1a/0x30
[   13.446137] 
[   13.446208] The buggy address belongs to the object at ffff888102a0bf80
[   13.446208]  which belongs to the cache kmalloc-64 of size 64
[   13.446563] The buggy address is located 0 bytes to the right of
[   13.446563]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.446937] 
[   13.447034] The buggy address belongs to the physical page:
[   13.447286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.447636] flags: 0x200000000000000(node=0|zone=2)
[   13.447886] page_type: f5(slab)
[   13.448066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.448409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.448985] page dumped because: kasan: bad access detected
[   13.449234] 
[   13.449330] Memory state around the buggy address:
[   13.449554]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.450072]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.450287] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.450498]                                      ^
[   13.450651]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.450863]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.451515] ==================================================================
[   13.980213] ==================================================================
[   13.980562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   13.980993] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.981296] 
[   13.981410] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.981457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.981470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.981492] Call Trace:
[   13.981523]  <TASK>
[   13.981542]  dump_stack_lvl+0x73/0xb0
[   13.981568]  print_report+0xd1/0x650
[   13.981604]  ? __virt_addr_valid+0x1db/0x2d0
[   13.981626]  ? kasan_atomics_helper+0x49ce/0x5450
[   13.981648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.981685]  ? kasan_atomics_helper+0x49ce/0x5450
[   13.981707]  kasan_report+0x141/0x180
[   13.981731]  ? kasan_atomics_helper+0x49ce/0x5450
[   13.981769]  __asan_report_load4_noabort+0x18/0x20
[   13.981790]  kasan_atomics_helper+0x49ce/0x5450
[   13.981814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.981837]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.981860]  ? kasan_atomics+0x152/0x310
[   13.981883]  kasan_atomics+0x1dc/0x310
[   13.981903]  ? __pfx_kasan_atomics+0x10/0x10
[   13.981934]  ? __pfx_read_tsc+0x10/0x10
[   13.981955]  ? ktime_get_ts64+0x86/0x230
[   13.981982]  kunit_try_run_case+0x1a5/0x480
[   13.982007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.982030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.982054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.982079]  ? __kthread_parkme+0x82/0x180
[   13.982101]  ? preempt_count_sub+0x50/0x80
[   13.982127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.982151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.982175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.982198]  kthread+0x337/0x6f0
[   13.982216]  ? trace_preempt_on+0x20/0xc0
[   13.982240]  ? __pfx_kthread+0x10/0x10
[   13.982258]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.982280]  ? calculate_sigpending+0x7b/0xa0
[   13.982304]  ? __pfx_kthread+0x10/0x10
[   13.982323]  ret_from_fork+0x41/0x80
[   13.982353]  ? __pfx_kthread+0x10/0x10
[   13.982372]  ret_from_fork_asm+0x1a/0x30
[   13.982406]  </TASK>
[   13.982427] 
[   13.991721] Allocated by task 284:
[   13.992045]  kasan_save_stack+0x45/0x70
[   13.992339]  kasan_save_track+0x18/0x40
[   13.992645]  kasan_save_alloc_info+0x3b/0x50
[   13.992949]  __kasan_kmalloc+0xb7/0xc0
[   13.993102]  __kmalloc_cache_noprof+0x189/0x420
[   13.993433]  kasan_atomics+0x95/0x310
[   13.993745]  kunit_try_run_case+0x1a5/0x480
[   13.993927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.994304]  kthread+0x337/0x6f0
[   13.994580]  ret_from_fork+0x41/0x80
[   13.994821]  ret_from_fork_asm+0x1a/0x30
[   13.995058] 
[   13.995146] The buggy address belongs to the object at ffff888102a0bf80
[   13.995146]  which belongs to the cache kmalloc-64 of size 64
[   13.995928] The buggy address is located 0 bytes to the right of
[   13.995928]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.996575] 
[   13.996674] The buggy address belongs to the physical page:
[   13.997004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.997433] flags: 0x200000000000000(node=0|zone=2)
[   13.997791] page_type: f5(slab)
[   13.997988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.998437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.998857] page dumped because: kasan: bad access detected
[   13.999184] 
[   13.999272] Memory state around the buggy address:
[   13.999551]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.999879]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.000211] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.000507]                                      ^
[   14.000962]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.001249]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.001730] ==================================================================
[   14.350598] ==================================================================
[   14.351294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.351894] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.352489] 
[   14.352628] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.352676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.352690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.352714] Call Trace:
[   14.352736]  <TASK>
[   14.352769]  dump_stack_lvl+0x73/0xb0
[   14.352797]  print_report+0xd1/0x650
[   14.352834]  ? __virt_addr_valid+0x1db/0x2d0
[   14.352858]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.352880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.352904]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.352936]  kasan_report+0x141/0x180
[   14.352959]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.352987]  __asan_report_load8_noabort+0x18/0x20
[   14.353009]  kasan_atomics_helper+0x4f30/0x5450
[   14.353033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.353056]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.353078]  ? kasan_atomics+0x152/0x310
[   14.353103]  kasan_atomics+0x1dc/0x310
[   14.353122]  ? __pfx_kasan_atomics+0x10/0x10
[   14.353143]  ? __pfx_read_tsc+0x10/0x10
[   14.353165]  ? ktime_get_ts64+0x86/0x230
[   14.353191]  kunit_try_run_case+0x1a5/0x480
[   14.353217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.353240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.353265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.353289]  ? __kthread_parkme+0x82/0x180
[   14.353312]  ? preempt_count_sub+0x50/0x80
[   14.353338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.353362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.353411]  kthread+0x337/0x6f0
[   14.353428]  ? trace_preempt_on+0x20/0xc0
[   14.353453]  ? __pfx_kthread+0x10/0x10
[   14.353472]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.353494]  ? calculate_sigpending+0x7b/0xa0
[   14.353516]  ? __pfx_kthread+0x10/0x10
[   14.353535]  ret_from_fork+0x41/0x80
[   14.353575]  ? __pfx_kthread+0x10/0x10
[   14.353594]  ret_from_fork_asm+0x1a/0x30
[   14.353625]  </TASK>
[   14.353637] 
[   14.365647] Allocated by task 284:
[   14.366010]  kasan_save_stack+0x45/0x70
[   14.366397]  kasan_save_track+0x18/0x40
[   14.366775]  kasan_save_alloc_info+0x3b/0x50
[   14.367032]  __kasan_kmalloc+0xb7/0xc0
[   14.367167]  __kmalloc_cache_noprof+0x189/0x420
[   14.367321]  kasan_atomics+0x95/0x310
[   14.367451]  kunit_try_run_case+0x1a5/0x480
[   14.367705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.368191]  kthread+0x337/0x6f0
[   14.368502]  ret_from_fork+0x41/0x80
[   14.368871]  ret_from_fork_asm+0x1a/0x30
[   14.369242] 
[   14.369410] The buggy address belongs to the object at ffff888102a0bf80
[   14.369410]  which belongs to the cache kmalloc-64 of size 64
[   14.370483] The buggy address is located 0 bytes to the right of
[   14.370483]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.371037] 
[   14.371114] The buggy address belongs to the physical page:
[   14.371289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.371531] flags: 0x200000000000000(node=0|zone=2)
[   14.372056] page_type: f5(slab)
[   14.372372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.372737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.373382] page dumped because: kasan: bad access detected
[   14.373789] 
[   14.373861] Memory state around the buggy address:
[   14.374029]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.374248]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.374464] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.374977]                                      ^
[   14.375407]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.376044]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.376676] ==================================================================
[   13.940427] ==================================================================
[   13.941521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   13.942407] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.942861] 
[   13.942983] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.943044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.943057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.943080] Call Trace:
[   13.943111]  <TASK>
[   13.943131]  dump_stack_lvl+0x73/0xb0
[   13.943158]  print_report+0xd1/0x650
[   13.943182]  ? __virt_addr_valid+0x1db/0x2d0
[   13.943205]  ? kasan_atomics_helper+0x49e8/0x5450
[   13.943228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.943250]  ? kasan_atomics_helper+0x49e8/0x5450
[   13.943273]  kasan_report+0x141/0x180
[   13.943297]  ? kasan_atomics_helper+0x49e8/0x5450
[   13.943324]  __asan_report_load4_noabort+0x18/0x20
[   13.943348]  kasan_atomics_helper+0x49e8/0x5450
[   13.943382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.943405]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.943428]  ? kasan_atomics+0x152/0x310
[   13.943463]  kasan_atomics+0x1dc/0x310
[   13.943483]  ? __pfx_kasan_atomics+0x10/0x10
[   13.943504]  ? __pfx_read_tsc+0x10/0x10
[   13.943525]  ? ktime_get_ts64+0x86/0x230
[   13.943551]  kunit_try_run_case+0x1a5/0x480
[   13.943577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.943599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.943632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.943656]  ? __kthread_parkme+0x82/0x180
[   13.943679]  ? preempt_count_sub+0x50/0x80
[   13.943705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.943729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.943753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.943776]  kthread+0x337/0x6f0
[   13.943794]  ? trace_preempt_on+0x20/0xc0
[   13.943819]  ? __pfx_kthread+0x10/0x10
[   13.943837]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.943859]  ? calculate_sigpending+0x7b/0xa0
[   13.943881]  ? __pfx_kthread+0x10/0x10
[   13.943901]  ret_from_fork+0x41/0x80
[   13.943932]  ? __pfx_kthread+0x10/0x10
[   13.943950]  ret_from_fork_asm+0x1a/0x30
[   13.943982]  </TASK>
[   13.943994] 
[   13.952332] Allocated by task 284:
[   13.952477]  kasan_save_stack+0x45/0x70
[   13.952629]  kasan_save_track+0x18/0x40
[   13.952806]  kasan_save_alloc_info+0x3b/0x50
[   13.953046]  __kasan_kmalloc+0xb7/0xc0
[   13.953269]  __kmalloc_cache_noprof+0x189/0x420
[   13.953500]  kasan_atomics+0x95/0x310
[   13.953797]  kunit_try_run_case+0x1a5/0x480
[   13.953954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.954128]  kthread+0x337/0x6f0
[   13.954305]  ret_from_fork+0x41/0x80
[   13.954491]  ret_from_fork_asm+0x1a/0x30
[   13.954853] 
[   13.954978] The buggy address belongs to the object at ffff888102a0bf80
[   13.954978]  which belongs to the cache kmalloc-64 of size 64
[   13.955498] The buggy address is located 0 bytes to the right of
[   13.955498]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.956066] 
[   13.956142] The buggy address belongs to the physical page:
[   13.956401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.956814] flags: 0x200000000000000(node=0|zone=2)
[   13.957058] page_type: f5(slab)
[   13.957241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.957578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.957903] page dumped because: kasan: bad access detected
[   13.958157] 
[   13.958254] Memory state around the buggy address:
[   13.958480]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.958847]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.959158] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.959419]                                      ^
[   13.959577]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.959790]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.960030] ==================================================================
[   13.795456] ==================================================================
[   13.796011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   13.796361] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.796687] 
[   13.796813] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.796858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.796879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.796901] Call Trace:
[   13.796938]  <TASK>
[   13.796958]  dump_stack_lvl+0x73/0xb0
[   13.796983]  print_report+0xd1/0x650
[   13.797018]  ? __virt_addr_valid+0x1db/0x2d0
[   13.797040]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.797062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.797085]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.797108]  kasan_report+0x141/0x180
[   13.797131]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.797167]  kasan_check_range+0x10c/0x1c0
[   13.797188]  __kasan_check_write+0x18/0x20
[   13.797210]  kasan_atomics_helper+0xfa9/0x5450
[   13.797244]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.797267]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.797290]  ? kasan_atomics+0x152/0x310
[   13.797313]  kasan_atomics+0x1dc/0x310
[   13.797333]  ? __pfx_kasan_atomics+0x10/0x10
[   13.797355]  ? __pfx_read_tsc+0x10/0x10
[   13.797376]  ? ktime_get_ts64+0x86/0x230
[   13.797402]  kunit_try_run_case+0x1a5/0x480
[   13.797428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.797475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.797499]  ? __kthread_parkme+0x82/0x180
[   13.797522]  ? preempt_count_sub+0x50/0x80
[   13.797548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.797609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.797634]  kthread+0x337/0x6f0
[   13.797652]  ? trace_preempt_on+0x20/0xc0
[   13.797676]  ? __pfx_kthread+0x10/0x10
[   13.797695]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.797718]  ? calculate_sigpending+0x7b/0xa0
[   13.797741]  ? __pfx_kthread+0x10/0x10
[   13.797760]  ret_from_fork+0x41/0x80
[   13.797782]  ? __pfx_kthread+0x10/0x10
[   13.797800]  ret_from_fork_asm+0x1a/0x30
[   13.797831]  </TASK>
[   13.797843] 
[   13.805571] Allocated by task 284:
[   13.805760]  kasan_save_stack+0x45/0x70
[   13.805950]  kasan_save_track+0x18/0x40
[   13.806161]  kasan_save_alloc_info+0x3b/0x50
[   13.806351]  __kasan_kmalloc+0xb7/0xc0
[   13.806541]  __kmalloc_cache_noprof+0x189/0x420
[   13.806800]  kasan_atomics+0x95/0x310
[   13.806949]  kunit_try_run_case+0x1a5/0x480
[   13.807097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807275]  kthread+0x337/0x6f0
[   13.807394]  ret_from_fork+0x41/0x80
[   13.807525]  ret_from_fork_asm+0x1a/0x30
[   13.807684] 
[   13.807757] The buggy address belongs to the object at ffff888102a0bf80
[   13.807757]  which belongs to the cache kmalloc-64 of size 64
[   13.808304] The buggy address is located 0 bytes to the right of
[   13.808304]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.808867] 
[   13.808973] The buggy address belongs to the physical page:
[   13.809228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.809536] flags: 0x200000000000000(node=0|zone=2)
[   13.809744] page_type: f5(slab)
[   13.809896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.810169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.810398] page dumped because: kasan: bad access detected
[   13.810591] 
[   13.810661] Memory state around the buggy address:
[   13.810818]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.811150]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.811499] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.811868]                                      ^
[   13.812121]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.812469]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.812822] ==================================================================
[   14.194111] ==================================================================
[   14.194389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.194969] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.195249] 
[   14.195379] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.195427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.195439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.195472] Call Trace:
[   14.195494]  <TASK>
[   14.195514]  dump_stack_lvl+0x73/0xb0
[   14.195550]  print_report+0xd1/0x650
[   14.195585]  ? __virt_addr_valid+0x1db/0x2d0
[   14.195609]  ? kasan_atomics_helper+0x1818/0x5450
[   14.195631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.195655]  ? kasan_atomics_helper+0x1818/0x5450
[   14.195687]  kasan_report+0x141/0x180
[   14.195710]  ? kasan_atomics_helper+0x1818/0x5450
[   14.195748]  kasan_check_range+0x10c/0x1c0
[   14.195770]  __kasan_check_write+0x18/0x20
[   14.195790]  kasan_atomics_helper+0x1818/0x5450
[   14.195813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.195837]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.195859]  ? kasan_atomics+0x152/0x310
[   14.195883]  kasan_atomics+0x1dc/0x310
[   14.195903]  ? __pfx_kasan_atomics+0x10/0x10
[   14.195933]  ? __pfx_read_tsc+0x10/0x10
[   14.195954]  ? ktime_get_ts64+0x86/0x230
[   14.195981]  kunit_try_run_case+0x1a5/0x480
[   14.196007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.196030]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.196055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.196079]  ? __kthread_parkme+0x82/0x180
[   14.196102]  ? preempt_count_sub+0x50/0x80
[   14.196129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.196152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.196176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.196199]  kthread+0x337/0x6f0
[   14.196216]  ? trace_preempt_on+0x20/0xc0
[   14.196241]  ? __pfx_kthread+0x10/0x10
[   14.196266]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.196289]  ? calculate_sigpending+0x7b/0xa0
[   14.196312]  ? __pfx_kthread+0x10/0x10
[   14.196340]  ret_from_fork+0x41/0x80
[   14.196361]  ? __pfx_kthread+0x10/0x10
[   14.196379]  ret_from_fork_asm+0x1a/0x30
[   14.196422]  </TASK>
[   14.196433] 
[   14.204157] Allocated by task 284:
[   14.204381]  kasan_save_stack+0x45/0x70
[   14.204610]  kasan_save_track+0x18/0x40
[   14.204843]  kasan_save_alloc_info+0x3b/0x50
[   14.205053]  __kasan_kmalloc+0xb7/0xc0
[   14.205210]  __kmalloc_cache_noprof+0x189/0x420
[   14.205385]  kasan_atomics+0x95/0x310
[   14.205578]  kunit_try_run_case+0x1a5/0x480
[   14.205797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206028]  kthread+0x337/0x6f0
[   14.206217]  ret_from_fork+0x41/0x80
[   14.206367]  ret_from_fork_asm+0x1a/0x30
[   14.206507] 
[   14.206594] The buggy address belongs to the object at ffff888102a0bf80
[   14.206594]  which belongs to the cache kmalloc-64 of size 64
[   14.207151] The buggy address is located 0 bytes to the right of
[   14.207151]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.207760] 
[   14.207852] The buggy address belongs to the physical page:
[   14.208118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.208458] flags: 0x200000000000000(node=0|zone=2)
[   14.208732] page_type: f5(slab)
[   14.208861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.209105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.209337] page dumped because: kasan: bad access detected
[   14.209508] 
[   14.209583] Memory state around the buggy address:
[   14.209845]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.210267]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.210673] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.211004]                                      ^
[   14.211163]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.211379]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.211635] ==================================================================
[   14.469936] ==================================================================
[   14.470302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.470663] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.471106] 
[   14.471253] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.471311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.471324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.471348] Call Trace:
[   14.471405]  <TASK>
[   14.471426]  dump_stack_lvl+0x73/0xb0
[   14.471453]  print_report+0xd1/0x650
[   14.471488]  ? __virt_addr_valid+0x1db/0x2d0
[   14.471510]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.471533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.471557]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.471580]  kasan_report+0x141/0x180
[   14.471630]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.471675]  kasan_check_range+0x10c/0x1c0
[   14.471707]  __kasan_check_write+0x18/0x20
[   14.471727]  kasan_atomics_helper+0x1f43/0x5450
[   14.471752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.471775]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.471799]  ? kasan_atomics+0x152/0x310
[   14.471822]  kasan_atomics+0x1dc/0x310
[   14.471865]  ? __pfx_kasan_atomics+0x10/0x10
[   14.471887]  ? __pfx_read_tsc+0x10/0x10
[   14.471940]  ? ktime_get_ts64+0x86/0x230
[   14.471968]  kunit_try_run_case+0x1a5/0x480
[   14.472022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.472046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.472071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.472095]  ? __kthread_parkme+0x82/0x180
[   14.472119]  ? preempt_count_sub+0x50/0x80
[   14.472145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.472169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.472220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.472251]  kthread+0x337/0x6f0
[   14.472308]  ? trace_preempt_on+0x20/0xc0
[   14.472346]  ? __pfx_kthread+0x10/0x10
[   14.472378]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.472422]  ? calculate_sigpending+0x7b/0xa0
[   14.472444]  ? __pfx_kthread+0x10/0x10
[   14.472463]  ret_from_fork+0x41/0x80
[   14.472494]  ? __pfx_kthread+0x10/0x10
[   14.472512]  ret_from_fork_asm+0x1a/0x30
[   14.472545]  </TASK>
[   14.472556] 
[   14.481340] Allocated by task 284:
[   14.481640]  kasan_save_stack+0x45/0x70
[   14.481809]  kasan_save_track+0x18/0x40
[   14.482012]  kasan_save_alloc_info+0x3b/0x50
[   14.482200]  __kasan_kmalloc+0xb7/0xc0
[   14.482333]  __kmalloc_cache_noprof+0x189/0x420
[   14.482481]  kasan_atomics+0x95/0x310
[   14.482723]  kunit_try_run_case+0x1a5/0x480
[   14.482964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.483215]  kthread+0x337/0x6f0
[   14.483388]  ret_from_fork+0x41/0x80
[   14.483602]  ret_from_fork_asm+0x1a/0x30
[   14.483841] 
[   14.483953] The buggy address belongs to the object at ffff888102a0bf80
[   14.483953]  which belongs to the cache kmalloc-64 of size 64
[   14.484546] The buggy address is located 0 bytes to the right of
[   14.484546]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.485126] 
[   14.485224] The buggy address belongs to the physical page:
[   14.485473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.485884] flags: 0x200000000000000(node=0|zone=2)
[   14.486128] page_type: f5(slab)
[   14.486470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.486757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.486989] page dumped because: kasan: bad access detected
[   14.487154] 
[   14.487221] Memory state around the buggy address:
[   14.487374]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.487692]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.488019] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.488460]                                      ^
[   14.488937]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.489358]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.489734] ==================================================================
[   13.274328] ==================================================================
[   13.275577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.276487] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.276735] 
[   13.276832] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.276884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.276897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.276929] Call Trace:
[   13.276943]  <TASK>
[   13.276964]  dump_stack_lvl+0x73/0xb0
[   13.276993]  print_report+0xd1/0x650
[   13.277017]  ? __virt_addr_valid+0x1db/0x2d0
[   13.277039]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.277062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.277088]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.277111]  kasan_report+0x141/0x180
[   13.277135]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.277162]  __asan_report_load4_noabort+0x18/0x20
[   13.277183]  kasan_atomics_helper+0x4bbc/0x5450
[   13.277206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.277229]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.277251]  ? kasan_atomics+0x152/0x310
[   13.277275]  kasan_atomics+0x1dc/0x310
[   13.277294]  ? __pfx_kasan_atomics+0x10/0x10
[   13.277315]  ? __pfx_read_tsc+0x10/0x10
[   13.277335]  ? ktime_get_ts64+0x86/0x230
[   13.277360]  kunit_try_run_case+0x1a5/0x480
[   13.277386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.277408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.277432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.277455]  ? __kthread_parkme+0x82/0x180
[   13.277478]  ? preempt_count_sub+0x50/0x80
[   13.277503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.277527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.277550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.277573]  kthread+0x337/0x6f0
[   13.277590]  ? trace_preempt_on+0x20/0xc0
[   13.277614]  ? __pfx_kthread+0x10/0x10
[   13.277631]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.277653]  ? calculate_sigpending+0x7b/0xa0
[   13.277675]  ? __pfx_kthread+0x10/0x10
[   13.277693]  ret_from_fork+0x41/0x80
[   13.277714]  ? __pfx_kthread+0x10/0x10
[   13.277731]  ret_from_fork_asm+0x1a/0x30
[   13.277762]  </TASK>
[   13.277773] 
[   13.294584] Allocated by task 284:
[   13.295032]  kasan_save_stack+0x45/0x70
[   13.295487]  kasan_save_track+0x18/0x40
[   13.295989]  kasan_save_alloc_info+0x3b/0x50
[   13.296408]  __kasan_kmalloc+0xb7/0xc0
[   13.296846]  __kmalloc_cache_noprof+0x189/0x420
[   13.297369]  kasan_atomics+0x95/0x310
[   13.297813]  kunit_try_run_case+0x1a5/0x480
[   13.298318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.298833]  kthread+0x337/0x6f0
[   13.299214]  ret_from_fork+0x41/0x80
[   13.299597]  ret_from_fork_asm+0x1a/0x30
[   13.300043] 
[   13.300169] The buggy address belongs to the object at ffff888102a0bf80
[   13.300169]  which belongs to the cache kmalloc-64 of size 64
[   13.301274] The buggy address is located 0 bytes to the right of
[   13.301274]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.302259] 
[   13.302423] The buggy address belongs to the physical page:
[   13.302998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.303500] flags: 0x200000000000000(node=0|zone=2)
[   13.304064] page_type: f5(slab)
[   13.304253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.304476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.304701] page dumped because: kasan: bad access detected
[   13.304868] 
[   13.304951] Memory state around the buggy address:
[   13.305189]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.305885]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.306114] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.306319]                                      ^
[   13.306470]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.307092]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.307955] ==================================================================
[   14.293104] ==================================================================
[   14.293845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.294479] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.295194] 
[   14.295434] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.295484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.295497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.295521] Call Trace:
[   14.295541]  <TASK>
[   14.295624]  dump_stack_lvl+0x73/0xb0
[   14.295653]  print_report+0xd1/0x650
[   14.295691]  ? __virt_addr_valid+0x1db/0x2d0
[   14.295714]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.295737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.295761]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.295783]  kasan_report+0x141/0x180
[   14.295806]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.295833]  kasan_check_range+0x10c/0x1c0
[   14.295854]  __kasan_check_write+0x18/0x20
[   14.295874]  kasan_atomics_helper+0x1b22/0x5450
[   14.295898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.295929]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.295952]  ? kasan_atomics+0x152/0x310
[   14.295977]  kasan_atomics+0x1dc/0x310
[   14.295996]  ? __pfx_kasan_atomics+0x10/0x10
[   14.296017]  ? __pfx_read_tsc+0x10/0x10
[   14.296038]  ? ktime_get_ts64+0x86/0x230
[   14.296064]  kunit_try_run_case+0x1a5/0x480
[   14.296092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.296116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.296141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.296165]  ? __kthread_parkme+0x82/0x180
[   14.296189]  ? preempt_count_sub+0x50/0x80
[   14.296215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.296239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.296268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.296292]  kthread+0x337/0x6f0
[   14.296309]  ? trace_preempt_on+0x20/0xc0
[   14.296334]  ? __pfx_kthread+0x10/0x10
[   14.296352]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.296375]  ? calculate_sigpending+0x7b/0xa0
[   14.296398]  ? __pfx_kthread+0x10/0x10
[   14.296417]  ret_from_fork+0x41/0x80
[   14.296438]  ? __pfx_kthread+0x10/0x10
[   14.296456]  ret_from_fork_asm+0x1a/0x30
[   14.296488]  </TASK>
[   14.296500] 
[   14.309074] Allocated by task 284:
[   14.309437]  kasan_save_stack+0x45/0x70
[   14.309846]  kasan_save_track+0x18/0x40
[   14.310225]  kasan_save_alloc_info+0x3b/0x50
[   14.310595]  __kasan_kmalloc+0xb7/0xc0
[   14.310731]  __kmalloc_cache_noprof+0x189/0x420
[   14.310885]  kasan_atomics+0x95/0x310
[   14.311026]  kunit_try_run_case+0x1a5/0x480
[   14.311174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.311350]  kthread+0x337/0x6f0
[   14.311471]  ret_from_fork+0x41/0x80
[   14.311760]  ret_from_fork_asm+0x1a/0x30
[   14.312135] 
[   14.312300] The buggy address belongs to the object at ffff888102a0bf80
[   14.312300]  which belongs to the cache kmalloc-64 of size 64
[   14.313357] The buggy address is located 0 bytes to the right of
[   14.313357]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.314440] 
[   14.314640] The buggy address belongs to the physical page:
[   14.315142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.315843] flags: 0x200000000000000(node=0|zone=2)
[   14.316316] page_type: f5(slab)
[   14.316653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.317302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.317860] page dumped because: kasan: bad access detected
[   14.318042] 
[   14.318112] Memory state around the buggy address:
[   14.318270]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.318487]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.319072] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.319703]                                      ^
[   14.320133]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.320769]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.321375] ==================================================================
[   13.662746] ==================================================================
[   13.663288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.663535] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.663761] 
[   13.663959] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.664015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.664027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.664049] Call Trace:
[   13.664077]  <TASK>
[   13.664096]  dump_stack_lvl+0x73/0xb0
[   13.664121]  print_report+0xd1/0x650
[   13.664144]  ? __virt_addr_valid+0x1db/0x2d0
[   13.664167]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.664189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.664212]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.664234]  kasan_report+0x141/0x180
[   13.664262]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.664289]  kasan_check_range+0x10c/0x1c0
[   13.664310]  __kasan_check_write+0x18/0x20
[   13.664330]  kasan_atomics_helper+0xb6a/0x5450
[   13.664354]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.664377]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.664399]  ? kasan_atomics+0x152/0x310
[   13.664422]  kasan_atomics+0x1dc/0x310
[   13.664442]  ? __pfx_kasan_atomics+0x10/0x10
[   13.664473]  ? __pfx_read_tsc+0x10/0x10
[   13.664494]  ? ktime_get_ts64+0x86/0x230
[   13.664520]  kunit_try_run_case+0x1a5/0x480
[   13.664557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.664579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.664604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.664627]  ? __kthread_parkme+0x82/0x180
[   13.664650]  ? preempt_count_sub+0x50/0x80
[   13.664677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.664701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.664724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.664748]  kthread+0x337/0x6f0
[   13.664765]  ? trace_preempt_on+0x20/0xc0
[   13.664791]  ? __pfx_kthread+0x10/0x10
[   13.664809]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.664831]  ? calculate_sigpending+0x7b/0xa0
[   13.664854]  ? __pfx_kthread+0x10/0x10
[   13.664873]  ret_from_fork+0x41/0x80
[   13.664894]  ? __pfx_kthread+0x10/0x10
[   13.664912]  ret_from_fork_asm+0x1a/0x30
[   13.664952]  </TASK>
[   13.664963] 
[   13.673292] Allocated by task 284:
[   13.673497]  kasan_save_stack+0x45/0x70
[   13.673742]  kasan_save_track+0x18/0x40
[   13.673945]  kasan_save_alloc_info+0x3b/0x50
[   13.674150]  __kasan_kmalloc+0xb7/0xc0
[   13.674284]  __kmalloc_cache_noprof+0x189/0x420
[   13.674437]  kasan_atomics+0x95/0x310
[   13.674567]  kunit_try_run_case+0x1a5/0x480
[   13.674850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.675123]  kthread+0x337/0x6f0
[   13.675258]  ret_from_fork+0x41/0x80
[   13.675390]  ret_from_fork_asm+0x1a/0x30
[   13.675530] 
[   13.675601] The buggy address belongs to the object at ffff888102a0bf80
[   13.675601]  which belongs to the cache kmalloc-64 of size 64
[   13.676416] The buggy address is located 0 bytes to the right of
[   13.676416]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.677009] 
[   13.677174] The buggy address belongs to the physical page:
[   13.677430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.677857] flags: 0x200000000000000(node=0|zone=2)
[   13.678046] page_type: f5(slab)
[   13.678173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.678402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.678625] page dumped because: kasan: bad access detected
[   13.678804] 
[   13.678896] Memory state around the buggy address:
[   13.679341]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.679841]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.680109] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.680327]                                      ^
[   13.680483]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.681057]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.681373] ==================================================================
[   14.510866] ==================================================================
[   14.512383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.512859] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.513094] 
[   14.513186] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.513235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.513248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.513272] Call Trace:
[   14.513293]  <TASK>
[   14.513314]  dump_stack_lvl+0x73/0xb0
[   14.513341]  print_report+0xd1/0x650
[   14.513366]  ? __virt_addr_valid+0x1db/0x2d0
[   14.513389]  ? kasan_atomics_helper+0x2006/0x5450
[   14.513413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.513438]  ? kasan_atomics_helper+0x2006/0x5450
[   14.513461]  kasan_report+0x141/0x180
[   14.513485]  ? kasan_atomics_helper+0x2006/0x5450
[   14.513512]  kasan_check_range+0x10c/0x1c0
[   14.513536]  __kasan_check_write+0x18/0x20
[   14.513557]  kasan_atomics_helper+0x2006/0x5450
[   14.513581]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.513604]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.513628]  ? kasan_atomics+0x152/0x310
[   14.513653]  kasan_atomics+0x1dc/0x310
[   14.513673]  ? __pfx_kasan_atomics+0x10/0x10
[   14.513695]  ? __pfx_read_tsc+0x10/0x10
[   14.513716]  ? ktime_get_ts64+0x86/0x230
[   14.513742]  kunit_try_run_case+0x1a5/0x480
[   14.513768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.513792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.513817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.513842]  ? __kthread_parkme+0x82/0x180
[   14.513865]  ? preempt_count_sub+0x50/0x80
[   14.513891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.513926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.513950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.513974]  kthread+0x337/0x6f0
[   14.513993]  ? trace_preempt_on+0x20/0xc0
[   14.514017]  ? __pfx_kthread+0x10/0x10
[   14.514071]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.514095]  ? calculate_sigpending+0x7b/0xa0
[   14.514118]  ? __pfx_kthread+0x10/0x10
[   14.514149]  ret_from_fork+0x41/0x80
[   14.514170]  ? __pfx_kthread+0x10/0x10
[   14.514189]  ret_from_fork_asm+0x1a/0x30
[   14.514247]  </TASK>
[   14.514259] 
[   14.522654] Allocated by task 284:
[   14.522908]  kasan_save_stack+0x45/0x70
[   14.523134]  kasan_save_track+0x18/0x40
[   14.523340]  kasan_save_alloc_info+0x3b/0x50
[   14.523550]  __kasan_kmalloc+0xb7/0xc0
[   14.523802]  __kmalloc_cache_noprof+0x189/0x420
[   14.524027]  kasan_atomics+0x95/0x310
[   14.524293]  kunit_try_run_case+0x1a5/0x480
[   14.524476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524800]  kthread+0x337/0x6f0
[   14.524993]  ret_from_fork+0x41/0x80
[   14.525154]  ret_from_fork_asm+0x1a/0x30
[   14.525388] 
[   14.525526] The buggy address belongs to the object at ffff888102a0bf80
[   14.525526]  which belongs to the cache kmalloc-64 of size 64
[   14.526166] The buggy address is located 0 bytes to the right of
[   14.526166]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.526714] 
[   14.526813] The buggy address belongs to the physical page:
[   14.527092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.527454] flags: 0x200000000000000(node=0|zone=2)
[   14.527912] page_type: f5(slab)
[   14.528059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.528299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.528616] page dumped because: kasan: bad access detected
[   14.528869] 
[   14.529016] Memory state around the buggy address:
[   14.529243]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.529611]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.529930] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.530254]                                      ^
[   14.530484]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.530900]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.531236] ==================================================================
[   13.397663] ==================================================================
[   13.398465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.398724] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.399178] 
[   13.399331] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.399378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.399392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.399414] Call Trace:
[   13.399434]  <TASK>
[   13.399453]  dump_stack_lvl+0x73/0xb0
[   13.399478]  print_report+0xd1/0x650
[   13.399501]  ? __virt_addr_valid+0x1db/0x2d0
[   13.399524]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.399547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.399570]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.399593]  kasan_report+0x141/0x180
[   13.399617]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.399644]  __asan_report_load4_noabort+0x18/0x20
[   13.399666]  kasan_atomics_helper+0x4b54/0x5450
[   13.399690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.399713]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.399736]  ? kasan_atomics+0x152/0x310
[   13.399760]  kasan_atomics+0x1dc/0x310
[   13.399780]  ? __pfx_kasan_atomics+0x10/0x10
[   13.399802]  ? __pfx_read_tsc+0x10/0x10
[   13.399823]  ? ktime_get_ts64+0x86/0x230
[   13.399850]  kunit_try_run_case+0x1a5/0x480
[   13.399876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.399899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.399936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.399961]  ? __kthread_parkme+0x82/0x180
[   13.399984]  ? preempt_count_sub+0x50/0x80
[   13.400011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.400036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.400060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.400083]  kthread+0x337/0x6f0
[   13.400101]  ? trace_preempt_on+0x20/0xc0
[   13.400126]  ? __pfx_kthread+0x10/0x10
[   13.400145]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.400167]  ? calculate_sigpending+0x7b/0xa0
[   13.400189]  ? __pfx_kthread+0x10/0x10
[   13.400209]  ret_from_fork+0x41/0x80
[   13.400230]  ? __pfx_kthread+0x10/0x10
[   13.400254]  ret_from_fork_asm+0x1a/0x30
[   13.400286]  </TASK>
[   13.400297] 
[   13.407735] Allocated by task 284:
[   13.407872]  kasan_save_stack+0x45/0x70
[   13.408030]  kasan_save_track+0x18/0x40
[   13.408227]  kasan_save_alloc_info+0x3b/0x50
[   13.408441]  __kasan_kmalloc+0xb7/0xc0
[   13.408669]  __kmalloc_cache_noprof+0x189/0x420
[   13.408887]  kasan_atomics+0x95/0x310
[   13.409082]  kunit_try_run_case+0x1a5/0x480
[   13.409301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.409526]  kthread+0x337/0x6f0
[   13.409715]  ret_from_fork+0x41/0x80
[   13.409861]  ret_from_fork_asm+0x1a/0x30
[   13.410074] 
[   13.410168] The buggy address belongs to the object at ffff888102a0bf80
[   13.410168]  which belongs to the cache kmalloc-64 of size 64
[   13.410660] The buggy address is located 0 bytes to the right of
[   13.410660]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.411132] 
[   13.411228] The buggy address belongs to the physical page:
[   13.411449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.411792] flags: 0x200000000000000(node=0|zone=2)
[   13.411989] page_type: f5(slab)
[   13.412162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.412478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.412797] page dumped because: kasan: bad access detected
[   13.413078] 
[   13.413173] Memory state around the buggy address:
[   13.413380]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.413683]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.414047] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.414259]                                      ^
[   13.414413]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.414626]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.414837] ==================================================================
[   14.148968] ==================================================================
[   14.149756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.150579] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.151256] 
[   14.151459] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.151521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.151533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.151576] Call Trace:
[   14.151597]  <TASK>
[   14.151618]  dump_stack_lvl+0x73/0xb0
[   14.151647]  print_report+0xd1/0x650
[   14.151672]  ? __virt_addr_valid+0x1db/0x2d0
[   14.151694]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.151718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.151741]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.151763]  kasan_report+0x141/0x180
[   14.151787]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.151814]  kasan_check_range+0x10c/0x1c0
[   14.151835]  __kasan_check_write+0x18/0x20
[   14.151856]  kasan_atomics_helper+0x16e7/0x5450
[   14.151880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.151903]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.151938]  ? kasan_atomics+0x152/0x310
[   14.151963]  kasan_atomics+0x1dc/0x310
[   14.151993]  ? __pfx_kasan_atomics+0x10/0x10
[   14.152015]  ? __pfx_read_tsc+0x10/0x10
[   14.152036]  ? ktime_get_ts64+0x86/0x230
[   14.152073]  kunit_try_run_case+0x1a5/0x480
[   14.152101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.152125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.152150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.152175]  ? __kthread_parkme+0x82/0x180
[   14.152198]  ? preempt_count_sub+0x50/0x80
[   14.152225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.152256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.152280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.152304]  kthread+0x337/0x6f0
[   14.152321]  ? trace_preempt_on+0x20/0xc0
[   14.152346]  ? __pfx_kthread+0x10/0x10
[   14.152365]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.152387]  ? calculate_sigpending+0x7b/0xa0
[   14.152410]  ? __pfx_kthread+0x10/0x10
[   14.152429]  ret_from_fork+0x41/0x80
[   14.152450]  ? __pfx_kthread+0x10/0x10
[   14.152469]  ret_from_fork_asm+0x1a/0x30
[   14.152501]  </TASK>
[   14.152514] 
[   14.165557] Allocated by task 284:
[   14.165984]  kasan_save_stack+0x45/0x70
[   14.166145]  kasan_save_track+0x18/0x40
[   14.166376]  kasan_save_alloc_info+0x3b/0x50
[   14.166800]  __kasan_kmalloc+0xb7/0xc0
[   14.167158]  __kmalloc_cache_noprof+0x189/0x420
[   14.167540]  kasan_atomics+0x95/0x310
[   14.167673]  kunit_try_run_case+0x1a5/0x480
[   14.167821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.168006]  kthread+0x337/0x6f0
[   14.168127]  ret_from_fork+0x41/0x80
[   14.168264]  ret_from_fork_asm+0x1a/0x30
[   14.168405] 
[   14.168479] The buggy address belongs to the object at ffff888102a0bf80
[   14.168479]  which belongs to the cache kmalloc-64 of size 64
[   14.169455] The buggy address is located 0 bytes to the right of
[   14.169455]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.170760] 
[   14.170932] The buggy address belongs to the physical page:
[   14.171429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.171980] flags: 0x200000000000000(node=0|zone=2)
[   14.172149] page_type: f5(slab)
[   14.172283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.172516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.172790] page dumped because: kasan: bad access detected
[   14.173152] 
[   14.173246] Memory state around the buggy address:
[   14.173471]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.173748]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.174054] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.174325]                                      ^
[   14.174547]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.174881]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.175182] ==================================================================
[   13.832016] ==================================================================
[   13.832407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   13.833651] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.834524] 
[   13.834907] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.835048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.835062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.835155] Call Trace:
[   13.835177]  <TASK>
[   13.835199]  dump_stack_lvl+0x73/0xb0
[   13.835241]  print_report+0xd1/0x650
[   13.835272]  ? __virt_addr_valid+0x1db/0x2d0
[   13.835295]  ? kasan_atomics_helper+0x1079/0x5450
[   13.835318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.835342]  ? kasan_atomics_helper+0x1079/0x5450
[   13.835366]  kasan_report+0x141/0x180
[   13.835390]  ? kasan_atomics_helper+0x1079/0x5450
[   13.835417]  kasan_check_range+0x10c/0x1c0
[   13.835439]  __kasan_check_write+0x18/0x20
[   13.835459]  kasan_atomics_helper+0x1079/0x5450
[   13.835483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.835506]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.835529]  ? kasan_atomics+0x152/0x310
[   13.835608]  kasan_atomics+0x1dc/0x310
[   13.835632]  ? __pfx_kasan_atomics+0x10/0x10
[   13.835654]  ? __pfx_read_tsc+0x10/0x10
[   13.835674]  ? ktime_get_ts64+0x86/0x230
[   13.835700]  kunit_try_run_case+0x1a5/0x480
[   13.835728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.835751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.835776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.835800]  ? __kthread_parkme+0x82/0x180
[   13.835824]  ? preempt_count_sub+0x50/0x80
[   13.835851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.835875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.835899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.835933]  kthread+0x337/0x6f0
[   13.835951]  ? trace_preempt_on+0x20/0xc0
[   13.835976]  ? __pfx_kthread+0x10/0x10
[   13.835995]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.836017]  ? calculate_sigpending+0x7b/0xa0
[   13.836039]  ? __pfx_kthread+0x10/0x10
[   13.836058]  ret_from_fork+0x41/0x80
[   13.836079]  ? __pfx_kthread+0x10/0x10
[   13.836098]  ret_from_fork_asm+0x1a/0x30
[   13.836130]  </TASK>
[   13.836143] 
[   13.847287] Allocated by task 284:
[   13.847482]  kasan_save_stack+0x45/0x70
[   13.848119]  kasan_save_track+0x18/0x40
[   13.848386]  kasan_save_alloc_info+0x3b/0x50
[   13.848775]  __kasan_kmalloc+0xb7/0xc0
[   13.849099]  __kmalloc_cache_noprof+0x189/0x420
[   13.849509]  kasan_atomics+0x95/0x310
[   13.849835]  kunit_try_run_case+0x1a5/0x480
[   13.850046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850280]  kthread+0x337/0x6f0
[   13.850433]  ret_from_fork+0x41/0x80
[   13.850609]  ret_from_fork_asm+0x1a/0x30
[   13.850793] 
[   13.850880] The buggy address belongs to the object at ffff888102a0bf80
[   13.850880]  which belongs to the cache kmalloc-64 of size 64
[   13.852283] The buggy address is located 0 bytes to the right of
[   13.852283]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.853245] 
[   13.853488] The buggy address belongs to the physical page:
[   13.853996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.854349] flags: 0x200000000000000(node=0|zone=2)
[   13.854569] page_type: f5(slab)
[   13.854728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.855049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.855355] page dumped because: kasan: bad access detected
[   13.855968] 
[   13.856186] Memory state around the buggy address:
[   13.856690]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.857152]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.857844] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.858290]                                      ^
[   13.858805]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.859404]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.859878] ==================================================================
[   13.588179] ==================================================================
[   13.588478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.588868] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.589178] 
[   13.589314] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.589360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.589373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.589396] Call Trace:
[   13.589409]  <TASK>
[   13.589436]  dump_stack_lvl+0x73/0xb0
[   13.589462]  print_report+0xd1/0x650
[   13.589486]  ? __virt_addr_valid+0x1db/0x2d0
[   13.589521]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.589543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.589595]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.589618]  kasan_report+0x141/0x180
[   13.589642]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.589679]  kasan_check_range+0x10c/0x1c0
[   13.589700]  __kasan_check_write+0x18/0x20
[   13.589720]  kasan_atomics_helper+0x8f9/0x5450
[   13.589752]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.589776]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.589799]  ? kasan_atomics+0x152/0x310
[   13.589832]  kasan_atomics+0x1dc/0x310
[   13.589851]  ? __pfx_kasan_atomics+0x10/0x10
[   13.589873]  ? __pfx_read_tsc+0x10/0x10
[   13.589894]  ? ktime_get_ts64+0x86/0x230
[   13.589928]  kunit_try_run_case+0x1a5/0x480
[   13.589954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.589977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.590002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.590026]  ? __kthread_parkme+0x82/0x180
[   13.590058]  ? preempt_count_sub+0x50/0x80
[   13.590084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.590108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.590142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.590165]  kthread+0x337/0x6f0
[   13.590184]  ? trace_preempt_on+0x20/0xc0
[   13.590208]  ? __pfx_kthread+0x10/0x10
[   13.590227]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.590250]  ? calculate_sigpending+0x7b/0xa0
[   13.590272]  ? __pfx_kthread+0x10/0x10
[   13.590291]  ret_from_fork+0x41/0x80
[   13.590312]  ? __pfx_kthread+0x10/0x10
[   13.590330]  ret_from_fork_asm+0x1a/0x30
[   13.590363]  </TASK>
[   13.590374] 
[   13.597937] Allocated by task 284:
[   13.598073]  kasan_save_stack+0x45/0x70
[   13.598297]  kasan_save_track+0x18/0x40
[   13.598489]  kasan_save_alloc_info+0x3b/0x50
[   13.598699]  __kasan_kmalloc+0xb7/0xc0
[   13.598835]  __kmalloc_cache_noprof+0x189/0x420
[   13.598996]  kasan_atomics+0x95/0x310
[   13.599146]  kunit_try_run_case+0x1a5/0x480
[   13.599354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.599652]  kthread+0x337/0x6f0
[   13.599818]  ret_from_fork+0x41/0x80
[   13.600020]  ret_from_fork_asm+0x1a/0x30
[   13.600236] 
[   13.600335] The buggy address belongs to the object at ffff888102a0bf80
[   13.600335]  which belongs to the cache kmalloc-64 of size 64
[   13.600855] The buggy address is located 0 bytes to the right of
[   13.600855]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.601333] 
[   13.601407] The buggy address belongs to the physical page:
[   13.601609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.601895] flags: 0x200000000000000(node=0|zone=2)
[   13.602148] page_type: f5(slab)
[   13.602320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.602681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.603028] page dumped because: kasan: bad access detected
[   13.603238] 
[   13.603307] Memory state around the buggy address:
[   13.603467]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.603810]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.604164] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.604535]                                      ^
[   13.604755]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.605089]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.605391] ==================================================================
[   13.310641] ==================================================================
[   13.311426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.312469] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.313334] 
[   13.313666] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.313720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.313733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.313754] Call Trace:
[   13.313768]  <TASK>
[   13.313786]  dump_stack_lvl+0x73/0xb0
[   13.313817]  print_report+0xd1/0x650
[   13.313841]  ? __virt_addr_valid+0x1db/0x2d0
[   13.313864]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.313885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.313908]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.313942]  kasan_report+0x141/0x180
[   13.313965]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.313991]  __asan_report_store4_noabort+0x1b/0x30
[   13.314014]  kasan_atomics_helper+0x4ba2/0x5450
[   13.314038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.314061]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.314083]  ? kasan_atomics+0x152/0x310
[   13.314106]  kasan_atomics+0x1dc/0x310
[   13.314124]  ? __pfx_kasan_atomics+0x10/0x10
[   13.314145]  ? __pfx_read_tsc+0x10/0x10
[   13.314166]  ? ktime_get_ts64+0x86/0x230
[   13.314191]  kunit_try_run_case+0x1a5/0x480
[   13.314217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.314238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.314263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.314287]  ? __kthread_parkme+0x82/0x180
[   13.314309]  ? preempt_count_sub+0x50/0x80
[   13.314334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.314357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.314381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.314404]  kthread+0x337/0x6f0
[   13.314421]  ? trace_preempt_on+0x20/0xc0
[   13.314445]  ? __pfx_kthread+0x10/0x10
[   13.314462]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.314484]  ? calculate_sigpending+0x7b/0xa0
[   13.314505]  ? __pfx_kthread+0x10/0x10
[   13.314523]  ret_from_fork+0x41/0x80
[   13.314544]  ? __pfx_kthread+0x10/0x10
[   13.314698]  ret_from_fork_asm+0x1a/0x30
[   13.314739]  </TASK>
[   13.314752] 
[   13.327330] Allocated by task 284:
[   13.327548]  kasan_save_stack+0x45/0x70
[   13.327765]  kasan_save_track+0x18/0x40
[   13.327963]  kasan_save_alloc_info+0x3b/0x50
[   13.328140]  __kasan_kmalloc+0xb7/0xc0
[   13.328290]  __kmalloc_cache_noprof+0x189/0x420
[   13.328503]  kasan_atomics+0x95/0x310
[   13.328771]  kunit_try_run_case+0x1a5/0x480
[   13.328928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.329103]  kthread+0x337/0x6f0
[   13.329271]  ret_from_fork+0x41/0x80
[   13.329460]  ret_from_fork_asm+0x1a/0x30
[   13.329819] 
[   13.329933] The buggy address belongs to the object at ffff888102a0bf80
[   13.329933]  which belongs to the cache kmalloc-64 of size 64
[   13.330398] The buggy address is located 0 bytes to the right of
[   13.330398]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.331093] 
[   13.331171] The buggy address belongs to the physical page:
[   13.331404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.331726] flags: 0x200000000000000(node=0|zone=2)
[   13.332002] page_type: f5(slab)
[   13.332176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.332433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.332660] page dumped because: kasan: bad access detected
[   13.332897] 
[   13.332998] Memory state around the buggy address:
[   13.333225]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.333539]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.334022] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.334236]                                      ^
[   13.334403]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.334870]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.335140] ==================================================================
[   14.212446] ==================================================================
[   14.212867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.213544] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.213931] 
[   14.214060] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.214107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.214130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.214153] Call Trace:
[   14.214174]  <TASK>
[   14.214205]  dump_stack_lvl+0x73/0xb0
[   14.214231]  print_report+0xd1/0x650
[   14.214255]  ? __virt_addr_valid+0x1db/0x2d0
[   14.214279]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.214301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.214325]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.214347]  kasan_report+0x141/0x180
[   14.214372]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.214402]  kasan_check_range+0x10c/0x1c0
[   14.214423]  __kasan_check_write+0x18/0x20
[   14.214445]  kasan_atomics_helper+0x18b1/0x5450
[   14.214468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.214491]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.214514]  ? kasan_atomics+0x152/0x310
[   14.214540]  kasan_atomics+0x1dc/0x310
[   14.214589]  ? __pfx_kasan_atomics+0x10/0x10
[   14.214611]  ? __pfx_read_tsc+0x10/0x10
[   14.214633]  ? ktime_get_ts64+0x86/0x230
[   14.214671]  kunit_try_run_case+0x1a5/0x480
[   14.214697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.214720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.214754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.214777]  ? __kthread_parkme+0x82/0x180
[   14.214801]  ? preempt_count_sub+0x50/0x80
[   14.214837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.214861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.214886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.214926]  kthread+0x337/0x6f0
[   14.214945]  ? trace_preempt_on+0x20/0xc0
[   14.214970]  ? __pfx_kthread+0x10/0x10
[   14.214998]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.215020]  ? calculate_sigpending+0x7b/0xa0
[   14.215043]  ? __pfx_kthread+0x10/0x10
[   14.215063]  ret_from_fork+0x41/0x80
[   14.215093]  ? __pfx_kthread+0x10/0x10
[   14.215112]  ret_from_fork_asm+0x1a/0x30
[   14.215144]  </TASK>
[   14.215155] 
[   14.222824] Allocated by task 284:
[   14.222983]  kasan_save_stack+0x45/0x70
[   14.223138]  kasan_save_track+0x18/0x40
[   14.223274]  kasan_save_alloc_info+0x3b/0x50
[   14.223420]  __kasan_kmalloc+0xb7/0xc0
[   14.223574]  __kmalloc_cache_noprof+0x189/0x420
[   14.223734]  kasan_atomics+0x95/0x310
[   14.223927]  kunit_try_run_case+0x1a5/0x480
[   14.224174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.224461]  kthread+0x337/0x6f0
[   14.224687]  ret_from_fork+0x41/0x80
[   14.224908]  ret_from_fork_asm+0x1a/0x30
[   14.225112] 
[   14.225207] The buggy address belongs to the object at ffff888102a0bf80
[   14.225207]  which belongs to the cache kmalloc-64 of size 64
[   14.225673] The buggy address is located 0 bytes to the right of
[   14.225673]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.226049] 
[   14.226148] The buggy address belongs to the physical page:
[   14.226405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.226778] flags: 0x200000000000000(node=0|zone=2)
[   14.227026] page_type: f5(slab)
[   14.227201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.227535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.227828] page dumped because: kasan: bad access detected
[   14.228126] 
[   14.228219] Memory state around the buggy address:
[   14.228447]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.228781]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.229097] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.229399]                                      ^
[   14.229634]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.229962]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.230272] ==================================================================
[   14.611996] ==================================================================
[   14.612339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.612863] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.613250] 
[   14.613419] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.613468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.613481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.613504] Call Trace:
[   14.613525]  <TASK>
[   14.613576]  dump_stack_lvl+0x73/0xb0
[   14.613614]  print_report+0xd1/0x650
[   14.613638]  ? __virt_addr_valid+0x1db/0x2d0
[   14.613672]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.613695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.613719]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.613768]  kasan_report+0x141/0x180
[   14.613793]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.613821]  __asan_report_load8_noabort+0x18/0x20
[   14.613854]  kasan_atomics_helper+0x4fa5/0x5450
[   14.613878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.613935]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.613958]  ? kasan_atomics+0x152/0x310
[   14.613993]  kasan_atomics+0x1dc/0x310
[   14.614014]  ? __pfx_kasan_atomics+0x10/0x10
[   14.614035]  ? __pfx_read_tsc+0x10/0x10
[   14.614083]  ? ktime_get_ts64+0x86/0x230
[   14.614110]  kunit_try_run_case+0x1a5/0x480
[   14.614165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.614188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.614213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.614237]  ? __kthread_parkme+0x82/0x180
[   14.614260]  ? preempt_count_sub+0x50/0x80
[   14.614287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.614337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.614362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.614413]  kthread+0x337/0x6f0
[   14.614431]  ? trace_preempt_on+0x20/0xc0
[   14.614455]  ? __pfx_kthread+0x10/0x10
[   14.614474]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.614496]  ? calculate_sigpending+0x7b/0xa0
[   14.614519]  ? __pfx_kthread+0x10/0x10
[   14.614538]  ret_from_fork+0x41/0x80
[   14.614577]  ? __pfx_kthread+0x10/0x10
[   14.614604]  ret_from_fork_asm+0x1a/0x30
[   14.614637]  </TASK>
[   14.614675] 
[   14.622946] Allocated by task 284:
[   14.623142]  kasan_save_stack+0x45/0x70
[   14.623372]  kasan_save_track+0x18/0x40
[   14.623569]  kasan_save_alloc_info+0x3b/0x50
[   14.623786]  __kasan_kmalloc+0xb7/0xc0
[   14.623982]  __kmalloc_cache_noprof+0x189/0x420
[   14.624259]  kasan_atomics+0x95/0x310
[   14.624456]  kunit_try_run_case+0x1a5/0x480
[   14.624794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626297]  kthread+0x337/0x6f0
[   14.627849]  ret_from_fork+0x41/0x80
[   14.628124]  ret_from_fork_asm+0x1a/0x30
[   14.628275] 
[   14.628351] The buggy address belongs to the object at ffff888102a0bf80
[   14.628351]  which belongs to the cache kmalloc-64 of size 64
[   14.629146] The buggy address is located 0 bytes to the right of
[   14.629146]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.630331] 
[   14.630494] The buggy address belongs to the physical page:
[   14.631141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.631781] flags: 0x200000000000000(node=0|zone=2)
[   14.631957] page_type: f5(slab)
[   14.632083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.632322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.632548] page dumped because: kasan: bad access detected
[   14.633158] 
[   14.633315] Memory state around the buggy address:
[   14.633816]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.634467]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.635212] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.635874]                                      ^
[   14.636343]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.637100]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.637845] ==================================================================
[   14.658675] ==================================================================
[   14.659042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.659370] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.659930] 
[   14.660043] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.660091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.660104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.660137] Call Trace:
[   14.660157]  <TASK>
[   14.660179]  dump_stack_lvl+0x73/0xb0
[   14.660217]  print_report+0xd1/0x650
[   14.660241]  ? __virt_addr_valid+0x1db/0x2d0
[   14.660273]  ? kasan_atomics_helper+0x5115/0x5450
[   14.660299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.660323]  ? kasan_atomics_helper+0x5115/0x5450
[   14.660347]  kasan_report+0x141/0x180
[   14.660371]  ? kasan_atomics_helper+0x5115/0x5450
[   14.660400]  __asan_report_load8_noabort+0x18/0x20
[   14.660423]  kasan_atomics_helper+0x5115/0x5450
[   14.660447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.660470]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.660504]  ? kasan_atomics+0x152/0x310
[   14.660528]  kasan_atomics+0x1dc/0x310
[   14.660548]  ? __pfx_kasan_atomics+0x10/0x10
[   14.660581]  ? __pfx_read_tsc+0x10/0x10
[   14.660602]  ? ktime_get_ts64+0x86/0x230
[   14.660630]  kunit_try_run_case+0x1a5/0x480
[   14.660655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.660678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.660704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.660740]  ? __kthread_parkme+0x82/0x180
[   14.660763]  ? preempt_count_sub+0x50/0x80
[   14.660790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.660814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.660863]  kthread+0x337/0x6f0
[   14.660880]  ? trace_preempt_on+0x20/0xc0
[   14.660905]  ? __pfx_kthread+0x10/0x10
[   14.660933]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.660964]  ? calculate_sigpending+0x7b/0xa0
[   14.660987]  ? __pfx_kthread+0x10/0x10
[   14.661006]  ret_from_fork+0x41/0x80
[   14.661038]  ? __pfx_kthread+0x10/0x10
[   14.661057]  ret_from_fork_asm+0x1a/0x30
[   14.661088]  </TASK>
[   14.661100] 
[   14.668188] Allocated by task 284:
[   14.668413]  kasan_save_stack+0x45/0x70
[   14.668612]  kasan_save_track+0x18/0x40
[   14.668891]  kasan_save_alloc_info+0x3b/0x50
[   14.669083]  __kasan_kmalloc+0xb7/0xc0
[   14.669213]  __kmalloc_cache_noprof+0x189/0x420
[   14.669362]  kasan_atomics+0x95/0x310
[   14.669545]  kunit_try_run_case+0x1a5/0x480
[   14.669756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670033]  kthread+0x337/0x6f0
[   14.670172]  ret_from_fork+0x41/0x80
[   14.670334]  ret_from_fork_asm+0x1a/0x30
[   14.670540] 
[   14.670649] The buggy address belongs to the object at ffff888102a0bf80
[   14.670649]  which belongs to the cache kmalloc-64 of size 64
[   14.671004] The buggy address is located 0 bytes to the right of
[   14.671004]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.671455] 
[   14.671553] The buggy address belongs to the physical page:
[   14.671804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.672168] flags: 0x200000000000000(node=0|zone=2)
[   14.672392] page_type: f5(slab)
[   14.672519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.673150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.673505] page dumped because: kasan: bad access detected
[   14.673761] 
[   14.673870] Memory state around the buggy address:
[   14.674045]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674265]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674655] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.674980]                                      ^
[   14.675235]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.675532]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.675858] ==================================================================
[   14.406508] ==================================================================
[   14.407203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.407930] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.408610] 
[   14.408790] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.408849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.408861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.408895] Call Trace:
[   14.408925]  <TASK>
[   14.408946]  dump_stack_lvl+0x73/0xb0
[   14.408973]  print_report+0xd1/0x650
[   14.408997]  ? __virt_addr_valid+0x1db/0x2d0
[   14.409029]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.409052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.409075]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.409109]  kasan_report+0x141/0x180
[   14.409133]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.409160]  kasan_check_range+0x10c/0x1c0
[   14.409181]  __kasan_check_write+0x18/0x20
[   14.409202]  kasan_atomics_helper+0x1d7a/0x5450
[   14.409225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.409249]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.409272]  ? kasan_atomics+0x152/0x310
[   14.409296]  kasan_atomics+0x1dc/0x310
[   14.409315]  ? __pfx_kasan_atomics+0x10/0x10
[   14.409337]  ? __pfx_read_tsc+0x10/0x10
[   14.409358]  ? ktime_get_ts64+0x86/0x230
[   14.409384]  kunit_try_run_case+0x1a5/0x480
[   14.409411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.409458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.409481]  ? __kthread_parkme+0x82/0x180
[   14.409504]  ? preempt_count_sub+0x50/0x80
[   14.409530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.409598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.409622]  kthread+0x337/0x6f0
[   14.409640]  ? trace_preempt_on+0x20/0xc0
[   14.409664]  ? __pfx_kthread+0x10/0x10
[   14.409684]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.409706]  ? calculate_sigpending+0x7b/0xa0
[   14.409729]  ? __pfx_kthread+0x10/0x10
[   14.409747]  ret_from_fork+0x41/0x80
[   14.409769]  ? __pfx_kthread+0x10/0x10
[   14.409788]  ret_from_fork_asm+0x1a/0x30
[   14.409822]  </TASK>
[   14.409833] 
[   14.421788] Allocated by task 284:
[   14.421956]  kasan_save_stack+0x45/0x70
[   14.422194]  kasan_save_track+0x18/0x40
[   14.422409]  kasan_save_alloc_info+0x3b/0x50
[   14.422616]  __kasan_kmalloc+0xb7/0xc0
[   14.422853]  __kmalloc_cache_noprof+0x189/0x420
[   14.423224]  kasan_atomics+0x95/0x310
[   14.423413]  kunit_try_run_case+0x1a5/0x480
[   14.423594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.423902]  kthread+0x337/0x6f0
[   14.424079]  ret_from_fork+0x41/0x80
[   14.424214]  ret_from_fork_asm+0x1a/0x30
[   14.424360] 
[   14.424431] The buggy address belongs to the object at ffff888102a0bf80
[   14.424431]  which belongs to the cache kmalloc-64 of size 64
[   14.424982] The buggy address is located 0 bytes to the right of
[   14.424982]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.425650] 
[   14.425743] The buggy address belongs to the physical page:
[   14.425925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.426230] flags: 0x200000000000000(node=0|zone=2)
[   14.426480] page_type: f5(slab)
[   14.426754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.427117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.427416] page dumped because: kasan: bad access detected
[   14.427725] 
[   14.427807] Memory state around the buggy address:
[   14.428041]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.428352]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.428674] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.428888]                                      ^
[   14.429054]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.429369]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.429681] ==================================================================
[   13.379109] ==================================================================
[   13.379447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.380281] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.380604] 
[   13.380699] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.380749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.380761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.380785] Call Trace:
[   13.380804]  <TASK>
[   13.380824]  dump_stack_lvl+0x73/0xb0
[   13.380853]  print_report+0xd1/0x650
[   13.380878]  ? __virt_addr_valid+0x1db/0x2d0
[   13.380902]  ? kasan_atomics_helper+0x3df/0x5450
[   13.380950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.380976]  ? kasan_atomics_helper+0x3df/0x5450
[   13.380998]  kasan_report+0x141/0x180
[   13.381022]  ? kasan_atomics_helper+0x3df/0x5450
[   13.381049]  kasan_check_range+0x10c/0x1c0
[   13.381070]  __kasan_check_read+0x15/0x20
[   13.381090]  kasan_atomics_helper+0x3df/0x5450
[   13.381114]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.381137]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.381160]  ? kasan_atomics+0x152/0x310
[   13.381184]  kasan_atomics+0x1dc/0x310
[   13.381204]  ? __pfx_kasan_atomics+0x10/0x10
[   13.381225]  ? __pfx_read_tsc+0x10/0x10
[   13.381247]  ? ktime_get_ts64+0x86/0x230
[   13.381272]  kunit_try_run_case+0x1a5/0x480
[   13.381298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.381321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.381346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.381370]  ? __kthread_parkme+0x82/0x180
[   13.381393]  ? preempt_count_sub+0x50/0x80
[   13.381419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.381443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.381467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.381491]  kthread+0x337/0x6f0
[   13.381509]  ? trace_preempt_on+0x20/0xc0
[   13.381533]  ? __pfx_kthread+0x10/0x10
[   13.381553]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.381575]  ? calculate_sigpending+0x7b/0xa0
[   13.381598]  ? __pfx_kthread+0x10/0x10
[   13.381618]  ret_from_fork+0x41/0x80
[   13.381640]  ? __pfx_kthread+0x10/0x10
[   13.381659]  ret_from_fork_asm+0x1a/0x30
[   13.381691]  </TASK>
[   13.381703] 
[   13.389191] Allocated by task 284:
[   13.389330]  kasan_save_stack+0x45/0x70
[   13.389535]  kasan_save_track+0x18/0x40
[   13.389860]  kasan_save_alloc_info+0x3b/0x50
[   13.390017]  __kasan_kmalloc+0xb7/0xc0
[   13.390150]  __kmalloc_cache_noprof+0x189/0x420
[   13.390409]  kasan_atomics+0x95/0x310
[   13.390627]  kunit_try_run_case+0x1a5/0x480
[   13.390835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.391097]  kthread+0x337/0x6f0
[   13.391267]  ret_from_fork+0x41/0x80
[   13.391398]  ret_from_fork_asm+0x1a/0x30
[   13.391538] 
[   13.391613] The buggy address belongs to the object at ffff888102a0bf80
[   13.391613]  which belongs to the cache kmalloc-64 of size 64
[   13.392356] The buggy address is located 0 bytes to the right of
[   13.392356]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.392757] 
[   13.392830] The buggy address belongs to the physical page:
[   13.393012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.393529] flags: 0x200000000000000(node=0|zone=2)
[   13.393779] page_type: f5(slab)
[   13.393963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.394309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.394747] page dumped because: kasan: bad access detected
[   13.394978] 
[   13.395063] Memory state around the buggy address:
[   13.395258]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.395475]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.395864] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.396300]                                      ^
[   13.396482]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.396771]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.397062] ==================================================================
[   13.452532] ==================================================================
[   13.453208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.453528] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.453876] 
[   13.454000] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.454047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.454060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.454083] Call Trace:
[   13.454102]  <TASK>
[   13.454119]  dump_stack_lvl+0x73/0xb0
[   13.454147]  print_report+0xd1/0x650
[   13.454171]  ? __virt_addr_valid+0x1db/0x2d0
[   13.454193]  ? kasan_atomics_helper+0x565/0x5450
[   13.454215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.454238]  ? kasan_atomics_helper+0x565/0x5450
[   13.454261]  kasan_report+0x141/0x180
[   13.454284]  ? kasan_atomics_helper+0x565/0x5450
[   13.454312]  kasan_check_range+0x10c/0x1c0
[   13.454332]  __kasan_check_write+0x18/0x20
[   13.454353]  kasan_atomics_helper+0x565/0x5450
[   13.454376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.454399]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.454423]  ? kasan_atomics+0x152/0x310
[   13.454446]  kasan_atomics+0x1dc/0x310
[   13.454466]  ? __pfx_kasan_atomics+0x10/0x10
[   13.454487]  ? __pfx_read_tsc+0x10/0x10
[   13.454508]  ? ktime_get_ts64+0x86/0x230
[   13.454534]  kunit_try_run_case+0x1a5/0x480
[   13.454559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.454582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.454608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.454632]  ? __kthread_parkme+0x82/0x180
[   13.454655]  ? preempt_count_sub+0x50/0x80
[   13.454682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.454707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.454731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.454755]  kthread+0x337/0x6f0
[   13.454773]  ? trace_preempt_on+0x20/0xc0
[   13.454797]  ? __pfx_kthread+0x10/0x10
[   13.454816]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.454837]  ? calculate_sigpending+0x7b/0xa0
[   13.454860]  ? __pfx_kthread+0x10/0x10
[   13.454879]  ret_from_fork+0x41/0x80
[   13.454899]  ? __pfx_kthread+0x10/0x10
[   13.454929]  ret_from_fork_asm+0x1a/0x30
[   13.454961]  </TASK>
[   13.454972] 
[   13.467705] Allocated by task 284:
[   13.467863]  kasan_save_stack+0x45/0x70
[   13.468092]  kasan_save_track+0x18/0x40
[   13.468298]  kasan_save_alloc_info+0x3b/0x50
[   13.468511]  __kasan_kmalloc+0xb7/0xc0
[   13.468701]  __kmalloc_cache_noprof+0x189/0x420
[   13.468910]  kasan_atomics+0x95/0x310
[   13.469100]  kunit_try_run_case+0x1a5/0x480
[   13.469291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.469467]  kthread+0x337/0x6f0
[   13.469600]  ret_from_fork+0x41/0x80
[   13.469782]  ret_from_fork_asm+0x1a/0x30
[   13.469988] 
[   13.470077] The buggy address belongs to the object at ffff888102a0bf80
[   13.470077]  which belongs to the cache kmalloc-64 of size 64
[   13.470437] The buggy address is located 0 bytes to the right of
[   13.470437]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.471380] 
[   13.471459] The buggy address belongs to the physical page:
[   13.471634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.471960] flags: 0x200000000000000(node=0|zone=2)
[   13.472195] page_type: f5(slab)
[   13.472381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.472843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.473162] page dumped because: kasan: bad access detected
[   13.473343] 
[   13.473413] Memory state around the buggy address:
[   13.473570]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.473896]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.474231] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.474478]                                      ^
[   13.474735]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.475024]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.475281] ==================================================================
[   14.230953] ==================================================================
[   14.231309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.231803] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.232167] 
[   14.232316] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.232364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.232376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.232398] Call Trace:
[   14.232419]  <TASK>
[   14.232439]  dump_stack_lvl+0x73/0xb0
[   14.232467]  print_report+0xd1/0x650
[   14.232490]  ? __virt_addr_valid+0x1db/0x2d0
[   14.232514]  ? kasan_atomics_helper+0x194a/0x5450
[   14.232536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.232581]  ? kasan_atomics_helper+0x194a/0x5450
[   14.232605]  kasan_report+0x141/0x180
[   14.232638]  ? kasan_atomics_helper+0x194a/0x5450
[   14.232665]  kasan_check_range+0x10c/0x1c0
[   14.232686]  __kasan_check_write+0x18/0x20
[   14.232717]  kasan_atomics_helper+0x194a/0x5450
[   14.232741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.232765]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.232787]  ? kasan_atomics+0x152/0x310
[   14.232820]  kasan_atomics+0x1dc/0x310
[   14.232840]  ? __pfx_kasan_atomics+0x10/0x10
[   14.232861]  ? __pfx_read_tsc+0x10/0x10
[   14.232892]  ? ktime_get_ts64+0x86/0x230
[   14.232927]  kunit_try_run_case+0x1a5/0x480
[   14.232954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.232985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.233010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.233034]  ? __kthread_parkme+0x82/0x180
[   14.233068]  ? preempt_count_sub+0x50/0x80
[   14.233095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.233119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.233151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.233175]  kthread+0x337/0x6f0
[   14.233192]  ? trace_preempt_on+0x20/0xc0
[   14.233227]  ? __pfx_kthread+0x10/0x10
[   14.233245]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.233267]  ? calculate_sigpending+0x7b/0xa0
[   14.233290]  ? __pfx_kthread+0x10/0x10
[   14.233309]  ret_from_fork+0x41/0x80
[   14.233330]  ? __pfx_kthread+0x10/0x10
[   14.233348]  ret_from_fork_asm+0x1a/0x30
[   14.233381]  </TASK>
[   14.233391] 
[   14.240986] Allocated by task 284:
[   14.241192]  kasan_save_stack+0x45/0x70
[   14.241398]  kasan_save_track+0x18/0x40
[   14.241996]  kasan_save_alloc_info+0x3b/0x50
[   14.242228]  __kasan_kmalloc+0xb7/0xc0
[   14.242419]  __kmalloc_cache_noprof+0x189/0x420
[   14.243423]  kasan_atomics+0x95/0x310
[   14.243654]  kunit_try_run_case+0x1a5/0x480
[   14.243866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.244134]  kthread+0x337/0x6f0
[   14.244319]  ret_from_fork+0x41/0x80
[   14.244502]  ret_from_fork_asm+0x1a/0x30
[   14.245150] 
[   14.245389] The buggy address belongs to the object at ffff888102a0bf80
[   14.245389]  which belongs to the cache kmalloc-64 of size 64
[   14.246324] The buggy address is located 0 bytes to the right of
[   14.246324]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.247341] 
[   14.247626] The buggy address belongs to the physical page:
[   14.248257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.248873] flags: 0x200000000000000(node=0|zone=2)
[   14.249222] page_type: f5(slab)
[   14.249651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.250347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.251001] page dumped because: kasan: bad access detected
[   14.251263] 
[   14.251356] Memory state around the buggy address:
[   14.251829]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.252279]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.252788] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.253157]                                      ^
[   14.253336]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.253560]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.253816] ==================================================================
[   14.490503] ==================================================================
[   14.491317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.491715] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.492104] 
[   14.492199] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.492274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.492287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.492311] Call Trace:
[   14.492331]  <TASK>
[   14.492353]  dump_stack_lvl+0x73/0xb0
[   14.492379]  print_report+0xd1/0x650
[   14.492404]  ? __virt_addr_valid+0x1db/0x2d0
[   14.492427]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.492449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.492473]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.492497]  kasan_report+0x141/0x180
[   14.492520]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.492548]  __asan_report_load8_noabort+0x18/0x20
[   14.492584]  kasan_atomics_helper+0x4f71/0x5450
[   14.492608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.492632]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.492656]  ? kasan_atomics+0x152/0x310
[   14.492680]  kasan_atomics+0x1dc/0x310
[   14.492699]  ? __pfx_kasan_atomics+0x10/0x10
[   14.492730]  ? __pfx_read_tsc+0x10/0x10
[   14.492752]  ? ktime_get_ts64+0x86/0x230
[   14.492814]  kunit_try_run_case+0x1a5/0x480
[   14.492842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.492865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.492901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.492936]  ? __kthread_parkme+0x82/0x180
[   14.492959]  ? preempt_count_sub+0x50/0x80
[   14.492987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.493013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.493037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.493061]  kthread+0x337/0x6f0
[   14.493079]  ? trace_preempt_on+0x20/0xc0
[   14.493104]  ? __pfx_kthread+0x10/0x10
[   14.493123]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.493145]  ? calculate_sigpending+0x7b/0xa0
[   14.493195]  ? __pfx_kthread+0x10/0x10
[   14.493215]  ret_from_fork+0x41/0x80
[   14.493237]  ? __pfx_kthread+0x10/0x10
[   14.493256]  ret_from_fork_asm+0x1a/0x30
[   14.493299]  </TASK>
[   14.493310] 
[   14.502022] Allocated by task 284:
[   14.502222]  kasan_save_stack+0x45/0x70
[   14.502433]  kasan_save_track+0x18/0x40
[   14.502702]  kasan_save_alloc_info+0x3b/0x50
[   14.502922]  __kasan_kmalloc+0xb7/0xc0
[   14.503065]  __kmalloc_cache_noprof+0x189/0x420
[   14.503320]  kasan_atomics+0x95/0x310
[   14.503507]  kunit_try_run_case+0x1a5/0x480
[   14.503734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.504010]  kthread+0x337/0x6f0
[   14.504193]  ret_from_fork+0x41/0x80
[   14.504422]  ret_from_fork_asm+0x1a/0x30
[   14.504643] 
[   14.504763] The buggy address belongs to the object at ffff888102a0bf80
[   14.504763]  which belongs to the cache kmalloc-64 of size 64
[   14.505332] The buggy address is located 0 bytes to the right of
[   14.505332]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.505957] 
[   14.506134] The buggy address belongs to the physical page:
[   14.506484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.506951] flags: 0x200000000000000(node=0|zone=2)
[   14.507185] page_type: f5(slab)
[   14.507354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.507682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.507901] page dumped because: kasan: bad access detected
[   14.508075] 
[   14.508141] Memory state around the buggy address:
[   14.508302]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.508783]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.509145] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.509518]                                      ^
[   14.509766]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.510092]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.510333] ==================================================================
[   14.080453] ==================================================================
[   14.081428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.081846] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.082201] 
[   14.082321] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.082370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.082383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.082406] Call Trace:
[   14.082427]  <TASK>
[   14.082448]  dump_stack_lvl+0x73/0xb0
[   14.082475]  print_report+0xd1/0x650
[   14.082500]  ? __virt_addr_valid+0x1db/0x2d0
[   14.082523]  ? kasan_atomics_helper+0x151d/0x5450
[   14.082545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.082568]  ? kasan_atomics_helper+0x151d/0x5450
[   14.082591]  kasan_report+0x141/0x180
[   14.082615]  ? kasan_atomics_helper+0x151d/0x5450
[   14.082642]  kasan_check_range+0x10c/0x1c0
[   14.082664]  __kasan_check_write+0x18/0x20
[   14.082685]  kasan_atomics_helper+0x151d/0x5450
[   14.082709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.082732]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.082758]  ? kasan_atomics+0x152/0x310
[   14.082781]  kasan_atomics+0x1dc/0x310
[   14.082801]  ? __pfx_kasan_atomics+0x10/0x10
[   14.082823]  ? __pfx_read_tsc+0x10/0x10
[   14.082844]  ? ktime_get_ts64+0x86/0x230
[   14.082895]  kunit_try_run_case+0x1a5/0x480
[   14.082932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.082956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.082981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.083005]  ? __kthread_parkme+0x82/0x180
[   14.083027]  ? preempt_count_sub+0x50/0x80
[   14.083054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.083078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.083102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.083126]  kthread+0x337/0x6f0
[   14.083143]  ? trace_preempt_on+0x20/0xc0
[   14.083167]  ? __pfx_kthread+0x10/0x10
[   14.083185]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.083208]  ? calculate_sigpending+0x7b/0xa0
[   14.083230]  ? __pfx_kthread+0x10/0x10
[   14.083249]  ret_from_fork+0x41/0x80
[   14.083270]  ? __pfx_kthread+0x10/0x10
[   14.083289]  ret_from_fork_asm+0x1a/0x30
[   14.083321]  </TASK>
[   14.083332] 
[   14.091260] Allocated by task 284:
[   14.091451]  kasan_save_stack+0x45/0x70
[   14.091650]  kasan_save_track+0x18/0x40
[   14.091835]  kasan_save_alloc_info+0x3b/0x50
[   14.092049]  __kasan_kmalloc+0xb7/0xc0
[   14.092336]  __kmalloc_cache_noprof+0x189/0x420
[   14.092505]  kasan_atomics+0x95/0x310
[   14.092820]  kunit_try_run_case+0x1a5/0x480
[   14.093070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.093249]  kthread+0x337/0x6f0
[   14.093399]  ret_from_fork+0x41/0x80
[   14.093639]  ret_from_fork_asm+0x1a/0x30
[   14.093830] 
[   14.093942] The buggy address belongs to the object at ffff888102a0bf80
[   14.093942]  which belongs to the cache kmalloc-64 of size 64
[   14.094426] The buggy address is located 0 bytes to the right of
[   14.094426]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.094956] 
[   14.095057] The buggy address belongs to the physical page:
[   14.095314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.095692] flags: 0x200000000000000(node=0|zone=2)
[   14.095886] page_type: f5(slab)
[   14.096061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.096396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.096739] page dumped because: kasan: bad access detected
[   14.096972] 
[   14.097063] Memory state around the buggy address:
[   14.097273]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.097609]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.097895] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.098208]                                      ^
[   14.098408]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.098744]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.099052] ==================================================================
[   13.776985] ==================================================================
[   13.777324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   13.777679] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.778120] 
[   13.778259] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.778315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.778327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.778349] Call Trace:
[   13.778366]  <TASK>
[   13.778385]  dump_stack_lvl+0x73/0xb0
[   13.778410]  print_report+0xd1/0x650
[   13.778433]  ? __virt_addr_valid+0x1db/0x2d0
[   13.778456]  ? kasan_atomics_helper+0xf10/0x5450
[   13.778478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.778501]  ? kasan_atomics_helper+0xf10/0x5450
[   13.778523]  kasan_report+0x141/0x180
[   13.778547]  ? kasan_atomics_helper+0xf10/0x5450
[   13.778586]  kasan_check_range+0x10c/0x1c0
[   13.778607]  __kasan_check_write+0x18/0x20
[   13.778628]  kasan_atomics_helper+0xf10/0x5450
[   13.778651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.778675]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.778698]  ? kasan_atomics+0x152/0x310
[   13.778721]  kasan_atomics+0x1dc/0x310
[   13.778741]  ? __pfx_kasan_atomics+0x10/0x10
[   13.778762]  ? __pfx_read_tsc+0x10/0x10
[   13.778783]  ? ktime_get_ts64+0x86/0x230
[   13.778809]  kunit_try_run_case+0x1a5/0x480
[   13.778834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.778882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.778907]  ? __kthread_parkme+0x82/0x180
[   13.778949]  ? preempt_count_sub+0x50/0x80
[   13.778975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.779033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.779057]  kthread+0x337/0x6f0
[   13.779075]  ? trace_preempt_on+0x20/0xc0
[   13.779099]  ? __pfx_kthread+0x10/0x10
[   13.779119]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.779141]  ? calculate_sigpending+0x7b/0xa0
[   13.779164]  ? __pfx_kthread+0x10/0x10
[   13.779183]  ret_from_fork+0x41/0x80
[   13.779205]  ? __pfx_kthread+0x10/0x10
[   13.779223]  ret_from_fork_asm+0x1a/0x30
[   13.779255]  </TASK>
[   13.779266] 
[   13.787072] Allocated by task 284:
[   13.787275]  kasan_save_stack+0x45/0x70
[   13.787459]  kasan_save_track+0x18/0x40
[   13.787663]  kasan_save_alloc_info+0x3b/0x50
[   13.787879]  __kasan_kmalloc+0xb7/0xc0
[   13.788064]  __kmalloc_cache_noprof+0x189/0x420
[   13.788277]  kasan_atomics+0x95/0x310
[   13.788458]  kunit_try_run_case+0x1a5/0x480
[   13.788673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.788890]  kthread+0x337/0x6f0
[   13.789021]  ret_from_fork+0x41/0x80
[   13.789162]  ret_from_fork_asm+0x1a/0x30
[   13.789379] 
[   13.789473] The buggy address belongs to the object at ffff888102a0bf80
[   13.789473]  which belongs to the cache kmalloc-64 of size 64
[   13.790132] The buggy address is located 0 bytes to the right of
[   13.790132]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.790711] 
[   13.790789] The buggy address belongs to the physical page:
[   13.791032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.791268] flags: 0x200000000000000(node=0|zone=2)
[   13.791430] page_type: f5(slab)
[   13.791551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.791936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.792280] page dumped because: kasan: bad access detected
[   13.792529] 
[   13.792620] Memory state around the buggy address:
[   13.792857]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.793086]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.793308] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.793609]                                      ^
[   13.793868]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.794217]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.794536] ==================================================================
[   14.430318] ==================================================================
[   14.430617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.431098] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.431412] 
[   14.431528] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.431593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.431607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.431632] Call Trace:
[   14.431664]  <TASK>
[   14.431685]  dump_stack_lvl+0x73/0xb0
[   14.431711]  print_report+0xd1/0x650
[   14.431735]  ? __virt_addr_valid+0x1db/0x2d0
[   14.431758]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.431780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.431804]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.431827]  kasan_report+0x141/0x180
[   14.431850]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.431885]  kasan_check_range+0x10c/0x1c0
[   14.431906]  __kasan_check_write+0x18/0x20
[   14.431943]  kasan_atomics_helper+0x1e12/0x5450
[   14.431968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.431991]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.432014]  ? kasan_atomics+0x152/0x310
[   14.432038]  kasan_atomics+0x1dc/0x310
[   14.432067]  ? __pfx_kasan_atomics+0x10/0x10
[   14.432088]  ? __pfx_read_tsc+0x10/0x10
[   14.432110]  ? ktime_get_ts64+0x86/0x230
[   14.432146]  kunit_try_run_case+0x1a5/0x480
[   14.432172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.432195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.432229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.432259]  ? __kthread_parkme+0x82/0x180
[   14.432283]  ? preempt_count_sub+0x50/0x80
[   14.432318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.432342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.432365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.432397]  kthread+0x337/0x6f0
[   14.432414]  ? trace_preempt_on+0x20/0xc0
[   14.432439]  ? __pfx_kthread+0x10/0x10
[   14.432458]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.432491]  ? calculate_sigpending+0x7b/0xa0
[   14.432514]  ? __pfx_kthread+0x10/0x10
[   14.432534]  ret_from_fork+0x41/0x80
[   14.432554]  ? __pfx_kthread+0x10/0x10
[   14.432574]  ret_from_fork_asm+0x1a/0x30
[   14.432615]  </TASK>
[   14.432627] 
[   14.440350] Allocated by task 284:
[   14.440541]  kasan_save_stack+0x45/0x70
[   14.440792]  kasan_save_track+0x18/0x40
[   14.441034]  kasan_save_alloc_info+0x3b/0x50
[   14.441226]  __kasan_kmalloc+0xb7/0xc0
[   14.441426]  __kmalloc_cache_noprof+0x189/0x420
[   14.441732]  kasan_atomics+0x95/0x310
[   14.441951]  kunit_try_run_case+0x1a5/0x480
[   14.442164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.442364]  kthread+0x337/0x6f0
[   14.442490]  ret_from_fork+0x41/0x80
[   14.442774]  ret_from_fork_asm+0x1a/0x30
[   14.442995] 
[   14.443124] The buggy address belongs to the object at ffff888102a0bf80
[   14.443124]  which belongs to the cache kmalloc-64 of size 64
[   14.443739] The buggy address is located 0 bytes to the right of
[   14.443739]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.444347] 
[   14.444446] The buggy address belongs to the physical page:
[   14.444740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.445119] flags: 0x200000000000000(node=0|zone=2)
[   14.445282] page_type: f5(slab)
[   14.445405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.445739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.446152] page dumped because: kasan: bad access detected
[   14.446493] 
[   14.446667] Memory state around the buggy address:
[   14.446961]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.447273]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.447482] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.447826]                                      ^
[   14.448095]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.448541]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.448948] ==================================================================
[   13.512615] ==================================================================
[   13.513127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.513456] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.513746] 
[   13.513859] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.513905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.513929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.513951] Call Trace:
[   13.513970]  <TASK>
[   13.513989]  dump_stack_lvl+0x73/0xb0
[   13.514014]  print_report+0xd1/0x650
[   13.514037]  ? __virt_addr_valid+0x1db/0x2d0
[   13.514060]  ? kasan_atomics_helper+0x72f/0x5450
[   13.514082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.514105]  ? kasan_atomics_helper+0x72f/0x5450
[   13.514128]  kasan_report+0x141/0x180
[   13.514151]  ? kasan_atomics_helper+0x72f/0x5450
[   13.514178]  kasan_check_range+0x10c/0x1c0
[   13.514199]  __kasan_check_write+0x18/0x20
[   13.514220]  kasan_atomics_helper+0x72f/0x5450
[   13.514243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.514266]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.514289]  ? kasan_atomics+0x152/0x310
[   13.514312]  kasan_atomics+0x1dc/0x310
[   13.514332]  ? __pfx_kasan_atomics+0x10/0x10
[   13.514353]  ? __pfx_read_tsc+0x10/0x10
[   13.514374]  ? ktime_get_ts64+0x86/0x230
[   13.514399]  kunit_try_run_case+0x1a5/0x480
[   13.514425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.514448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.514473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.514498]  ? __kthread_parkme+0x82/0x180
[   13.514521]  ? preempt_count_sub+0x50/0x80
[   13.514547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.514572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.514596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.514620]  kthread+0x337/0x6f0
[   13.514637]  ? trace_preempt_on+0x20/0xc0
[   13.514661]  ? __pfx_kthread+0x10/0x10
[   13.514680]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.514703]  ? calculate_sigpending+0x7b/0xa0
[   13.514725]  ? __pfx_kthread+0x10/0x10
[   13.514744]  ret_from_fork+0x41/0x80
[   13.514765]  ? __pfx_kthread+0x10/0x10
[   13.514784]  ret_from_fork_asm+0x1a/0x30
[   13.514826]  </TASK>
[   13.514837] 
[   13.526527] Allocated by task 284:
[   13.526736]  kasan_save_stack+0x45/0x70
[   13.526899]  kasan_save_track+0x18/0x40
[   13.527765]  kasan_save_alloc_info+0x3b/0x50
[   13.528303]  __kasan_kmalloc+0xb7/0xc0
[   13.528778]  __kmalloc_cache_noprof+0x189/0x420
[   13.529338]  kasan_atomics+0x95/0x310
[   13.529822]  kunit_try_run_case+0x1a5/0x480
[   13.530414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.530960]  kthread+0x337/0x6f0
[   13.531576]  ret_from_fork+0x41/0x80
[   13.532051]  ret_from_fork_asm+0x1a/0x30
[   13.532687] 
[   13.532773] The buggy address belongs to the object at ffff888102a0bf80
[   13.532773]  which belongs to the cache kmalloc-64 of size 64
[   13.534199] The buggy address is located 0 bytes to the right of
[   13.534199]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.534964] 
[   13.535342] The buggy address belongs to the physical page:
[   13.536102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.536974] flags: 0x200000000000000(node=0|zone=2)
[   13.537153] page_type: f5(slab)
[   13.537282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.537527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.537764] page dumped because: kasan: bad access detected
[   13.537948] 
[   13.538021] Memory state around the buggy address:
[   13.538181]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.538400]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.538617] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.538829]                                      ^
[   13.539230]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.540084]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.540855] ==================================================================
[   14.062425] ==================================================================
[   14.062857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.063117] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.063344] 
[   14.063434] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.063480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.063494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.063516] Call Trace:
[   14.063538]  <TASK>
[   14.063558]  dump_stack_lvl+0x73/0xb0
[   14.063583]  print_report+0xd1/0x650
[   14.063606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.063630]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.063652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.063676]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.063699]  kasan_report+0x141/0x180
[   14.063722]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.063750]  __asan_report_store8_noabort+0x1b/0x30
[   14.063772]  kasan_atomics_helper+0x50d4/0x5450
[   14.063796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.063819]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.063842]  ? kasan_atomics+0x152/0x310
[   14.063866]  kasan_atomics+0x1dc/0x310
[   14.063886]  ? __pfx_kasan_atomics+0x10/0x10
[   14.063907]  ? __pfx_read_tsc+0x10/0x10
[   14.063940]  ? ktime_get_ts64+0x86/0x230
[   14.063966]  kunit_try_run_case+0x1a5/0x480
[   14.063992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.064015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.064040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.064065]  ? __kthread_parkme+0x82/0x180
[   14.064088]  ? preempt_count_sub+0x50/0x80
[   14.064114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.064139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.064163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.064187]  kthread+0x337/0x6f0
[   14.064206]  ? trace_preempt_on+0x20/0xc0
[   14.064232]  ? __pfx_kthread+0x10/0x10
[   14.064255]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.064277]  ? calculate_sigpending+0x7b/0xa0
[   14.064300]  ? __pfx_kthread+0x10/0x10
[   14.064319]  ret_from_fork+0x41/0x80
[   14.064340]  ? __pfx_kthread+0x10/0x10
[   14.064358]  ret_from_fork_asm+0x1a/0x30
[   14.064390]  </TASK>
[   14.064401] 
[   14.072033] Allocated by task 284:
[   14.072359]  kasan_save_stack+0x45/0x70
[   14.072573]  kasan_save_track+0x18/0x40
[   14.072771]  kasan_save_alloc_info+0x3b/0x50
[   14.072989]  __kasan_kmalloc+0xb7/0xc0
[   14.073180]  __kmalloc_cache_noprof+0x189/0x420
[   14.073369]  kasan_atomics+0x95/0x310
[   14.073534]  kunit_try_run_case+0x1a5/0x480
[   14.073717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.073885]  kthread+0x337/0x6f0
[   14.074012]  ret_from_fork+0x41/0x80
[   14.074139]  ret_from_fork_asm+0x1a/0x30
[   14.074277] 
[   14.074376] The buggy address belongs to the object at ffff888102a0bf80
[   14.074376]  which belongs to the cache kmalloc-64 of size 64
[   14.075344] The buggy address is located 0 bytes to the right of
[   14.075344]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.075818] 
[   14.075911] The buggy address belongs to the physical page:
[   14.076116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.076357] flags: 0x200000000000000(node=0|zone=2)
[   14.076524] page_type: f5(slab)
[   14.076765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.077116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.077448] page dumped because: kasan: bad access detected
[   14.077774] 
[   14.077842] Memory state around the buggy address:
[   14.078050]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.078368]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.078687] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.078970]                                      ^
[   14.079150]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.079357]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.079562] ==================================================================
[   14.099951] ==================================================================
[   14.100316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.100696] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.101172] 
[   14.101266] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.101313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.101326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.101350] Call Trace:
[   14.101369]  <TASK>
[   14.101389]  dump_stack_lvl+0x73/0xb0
[   14.101414]  print_report+0xd1/0x650
[   14.101439]  ? __virt_addr_valid+0x1db/0x2d0
[   14.101461]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.101483]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.101507]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.101530]  kasan_report+0x141/0x180
[   14.101553]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.101593]  kasan_check_range+0x10c/0x1c0
[   14.101614]  __kasan_check_write+0x18/0x20
[   14.101664]  kasan_atomics_helper+0x15b6/0x5450
[   14.101688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.101711]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.101752]  ? kasan_atomics+0x152/0x310
[   14.101777]  kasan_atomics+0x1dc/0x310
[   14.101797]  ? __pfx_kasan_atomics+0x10/0x10
[   14.101835]  ? __pfx_read_tsc+0x10/0x10
[   14.101856]  ? ktime_get_ts64+0x86/0x230
[   14.101882]  kunit_try_run_case+0x1a5/0x480
[   14.101937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.101960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.101985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.102011]  ? __kthread_parkme+0x82/0x180
[   14.102034]  ? preempt_count_sub+0x50/0x80
[   14.102079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.102104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.102127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.102152]  kthread+0x337/0x6f0
[   14.102169]  ? trace_preempt_on+0x20/0xc0
[   14.102194]  ? __pfx_kthread+0x10/0x10
[   14.102230]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.102254]  ? calculate_sigpending+0x7b/0xa0
[   14.102277]  ? __pfx_kthread+0x10/0x10
[   14.102296]  ret_from_fork+0x41/0x80
[   14.102317]  ? __pfx_kthread+0x10/0x10
[   14.102336]  ret_from_fork_asm+0x1a/0x30
[   14.102367]  </TASK>
[   14.102378] 
[   14.110389] Allocated by task 284:
[   14.110578]  kasan_save_stack+0x45/0x70
[   14.110773]  kasan_save_track+0x18/0x40
[   14.110996]  kasan_save_alloc_info+0x3b/0x50
[   14.111222]  __kasan_kmalloc+0xb7/0xc0
[   14.111405]  __kmalloc_cache_noprof+0x189/0x420
[   14.111607]  kasan_atomics+0x95/0x310
[   14.111757]  kunit_try_run_case+0x1a5/0x480
[   14.111902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.112139]  kthread+0x337/0x6f0
[   14.112331]  ret_from_fork+0x41/0x80
[   14.112533]  ret_from_fork_asm+0x1a/0x30
[   14.112773] 
[   14.112913] The buggy address belongs to the object at ffff888102a0bf80
[   14.112913]  which belongs to the cache kmalloc-64 of size 64
[   14.114239] The buggy address is located 0 bytes to the right of
[   14.114239]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.114690] 
[   14.114767] The buggy address belongs to the physical page:
[   14.115024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.115969] flags: 0x200000000000000(node=0|zone=2)
[   14.116222] page_type: f5(slab)
[   14.116396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.117623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.117935] page dumped because: kasan: bad access detected
[   14.118116] 
[   14.118188] Memory state around the buggy address:
[   14.118352]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.118579]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.118799] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.119022]                                      ^
[   14.119179]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.119398]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.119615] ==================================================================
[   13.355459] ==================================================================
[   13.355826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.356257] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.356638] 
[   13.356763] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.356810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.356824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.356864] Call Trace:
[   13.356877]  <TASK>
[   13.356895]  dump_stack_lvl+0x73/0xb0
[   13.356947]  print_report+0xd1/0x650
[   13.356985]  ? __virt_addr_valid+0x1db/0x2d0
[   13.357034]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.357056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.357080]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.357103]  kasan_report+0x141/0x180
[   13.357125]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.357153]  __asan_report_store4_noabort+0x1b/0x30
[   13.357175]  kasan_atomics_helper+0x4b6e/0x5450
[   13.357199]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.357222]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.357247]  ? kasan_atomics+0x152/0x310
[   13.357271]  kasan_atomics+0x1dc/0x310
[   13.357291]  ? __pfx_kasan_atomics+0x10/0x10
[   13.357313]  ? __pfx_read_tsc+0x10/0x10
[   13.357334]  ? ktime_get_ts64+0x86/0x230
[   13.357360]  kunit_try_run_case+0x1a5/0x480
[   13.357386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.357408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.357433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.357457]  ? __kthread_parkme+0x82/0x180
[   13.357480]  ? preempt_count_sub+0x50/0x80
[   13.357507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.357531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.357556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.357579]  kthread+0x337/0x6f0
[   13.357597]  ? trace_preempt_on+0x20/0xc0
[   13.357621]  ? __pfx_kthread+0x10/0x10
[   13.357640]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.357662]  ? calculate_sigpending+0x7b/0xa0
[   13.357684]  ? __pfx_kthread+0x10/0x10
[   13.357703]  ret_from_fork+0x41/0x80
[   13.357742]  ? __pfx_kthread+0x10/0x10
[   13.357774]  ret_from_fork_asm+0x1a/0x30
[   13.357819]  </TASK>
[   13.357831] 
[   13.367128] Allocated by task 284:
[   13.367332]  kasan_save_stack+0x45/0x70
[   13.367807]  kasan_save_track+0x18/0x40
[   13.368035]  kasan_save_alloc_info+0x3b/0x50
[   13.368369]  __kasan_kmalloc+0xb7/0xc0
[   13.368600]  __kmalloc_cache_noprof+0x189/0x420
[   13.368948]  kasan_atomics+0x95/0x310
[   13.369165]  kunit_try_run_case+0x1a5/0x480
[   13.369468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.369836]  kthread+0x337/0x6f0
[   13.369986]  ret_from_fork+0x41/0x80
[   13.370196]  ret_from_fork_asm+0x1a/0x30
[   13.370558] 
[   13.370697] The buggy address belongs to the object at ffff888102a0bf80
[   13.370697]  which belongs to the cache kmalloc-64 of size 64
[   13.371361] The buggy address is located 0 bytes to the right of
[   13.371361]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.372048] 
[   13.372297] The buggy address belongs to the physical page:
[   13.372574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.373053] flags: 0x200000000000000(node=0|zone=2)
[   13.373370] page_type: f5(slab)
[   13.373626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.373982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.374442] page dumped because: kasan: bad access detected
[   13.374893] 
[   13.375029] Memory state around the buggy address:
[   13.375363]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.375710]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.376158] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.376550]                                      ^
[   13.376795]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.377236]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.377648] ==================================================================
[   14.377878] ==================================================================
[   14.378690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.379638] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.379967] 
[   14.380183] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.380232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.380251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.380275] Call Trace:
[   14.380295]  <TASK>
[   14.380316]  dump_stack_lvl+0x73/0xb0
[   14.380344]  print_report+0xd1/0x650
[   14.380368]  ? __virt_addr_valid+0x1db/0x2d0
[   14.380392]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.380414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.380438]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.380461]  kasan_report+0x141/0x180
[   14.380485]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.380513]  kasan_check_range+0x10c/0x1c0
[   14.380534]  __kasan_check_write+0x18/0x20
[   14.380577]  kasan_atomics_helper+0x1ce1/0x5450
[   14.380604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.380629]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.380653]  ? kasan_atomics+0x152/0x310
[   14.380678]  kasan_atomics+0x1dc/0x310
[   14.380697]  ? __pfx_kasan_atomics+0x10/0x10
[   14.380745]  ? __pfx_read_tsc+0x10/0x10
[   14.380769]  ? ktime_get_ts64+0x86/0x230
[   14.380796]  kunit_try_run_case+0x1a5/0x480
[   14.380833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.380858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.380885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.380908]  ? __kthread_parkme+0x82/0x180
[   14.380941]  ? preempt_count_sub+0x50/0x80
[   14.380976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.381000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.381034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.381058]  kthread+0x337/0x6f0
[   14.381075]  ? trace_preempt_on+0x20/0xc0
[   14.381100]  ? __pfx_kthread+0x10/0x10
[   14.381119]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.381141]  ? calculate_sigpending+0x7b/0xa0
[   14.381163]  ? __pfx_kthread+0x10/0x10
[   14.381182]  ret_from_fork+0x41/0x80
[   14.381203]  ? __pfx_kthread+0x10/0x10
[   14.381222]  ret_from_fork_asm+0x1a/0x30
[   14.381254]  </TASK>
[   14.381266] 
[   14.393007] Allocated by task 284:
[   14.393364]  kasan_save_stack+0x45/0x70
[   14.393761]  kasan_save_track+0x18/0x40
[   14.394139]  kasan_save_alloc_info+0x3b/0x50
[   14.394545]  __kasan_kmalloc+0xb7/0xc0
[   14.394929]  __kmalloc_cache_noprof+0x189/0x420
[   14.395348]  kasan_atomics+0x95/0x310
[   14.395727]  kunit_try_run_case+0x1a5/0x480
[   14.396128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.396636]  kthread+0x337/0x6f0
[   14.396956]  ret_from_fork+0x41/0x80
[   14.397311]  ret_from_fork_asm+0x1a/0x30
[   14.397712] 
[   14.397876] The buggy address belongs to the object at ffff888102a0bf80
[   14.397876]  which belongs to the cache kmalloc-64 of size 64
[   14.398346] The buggy address is located 0 bytes to the right of
[   14.398346]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.399118] 
[   14.399279] The buggy address belongs to the physical page:
[   14.399802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.400502] flags: 0x200000000000000(node=0|zone=2)
[   14.400972] page_type: f5(slab)
[   14.401291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.401524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.402220] page dumped because: kasan: bad access detected
[   14.402739] 
[   14.402904] Memory state around the buggy address:
[   14.403295]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.403513]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.404142] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.404796]                                      ^
[   14.405082]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.405302]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.405517] ==================================================================
[   14.638907] ==================================================================
[   14.639581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.640253] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.640653] 
[   14.640746] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.640795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.640808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.640831] Call Trace:
[   14.640851]  <TASK>
[   14.640872]  dump_stack_lvl+0x73/0xb0
[   14.640900]  print_report+0xd1/0x650
[   14.640936]  ? __virt_addr_valid+0x1db/0x2d0
[   14.640959]  ? kasan_atomics_helper+0x224c/0x5450
[   14.640981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.641005]  ? kasan_atomics_helper+0x224c/0x5450
[   14.641029]  kasan_report+0x141/0x180
[   14.641053]  ? kasan_atomics_helper+0x224c/0x5450
[   14.641081]  kasan_check_range+0x10c/0x1c0
[   14.641102]  __kasan_check_write+0x18/0x20
[   14.641123]  kasan_atomics_helper+0x224c/0x5450
[   14.641147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.641170]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.641193]  ? kasan_atomics+0x152/0x310
[   14.641217]  kasan_atomics+0x1dc/0x310
[   14.641237]  ? __pfx_kasan_atomics+0x10/0x10
[   14.641258]  ? __pfx_read_tsc+0x10/0x10
[   14.641280]  ? ktime_get_ts64+0x86/0x230
[   14.641306]  kunit_try_run_case+0x1a5/0x480
[   14.641332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.641381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.641405]  ? __kthread_parkme+0x82/0x180
[   14.641429]  ? preempt_count_sub+0x50/0x80
[   14.641455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.641503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.641527]  kthread+0x337/0x6f0
[   14.641545]  ? trace_preempt_on+0x20/0xc0
[   14.641569]  ? __pfx_kthread+0x10/0x10
[   14.641588]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.641610]  ? calculate_sigpending+0x7b/0xa0
[   14.641633]  ? __pfx_kthread+0x10/0x10
[   14.641652]  ret_from_fork+0x41/0x80
[   14.641710]  ? __pfx_kthread+0x10/0x10
[   14.641729]  ret_from_fork_asm+0x1a/0x30
[   14.641785]  </TASK>
[   14.641797] 
[   14.650053] Allocated by task 284:
[   14.650200]  kasan_save_stack+0x45/0x70
[   14.650353]  kasan_save_track+0x18/0x40
[   14.650506]  kasan_save_alloc_info+0x3b/0x50
[   14.650901]  __kasan_kmalloc+0xb7/0xc0
[   14.651148]  __kmalloc_cache_noprof+0x189/0x420
[   14.651405]  kasan_atomics+0x95/0x310
[   14.651577]  kunit_try_run_case+0x1a5/0x480
[   14.651722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.652001]  kthread+0x337/0x6f0
[   14.652213]  ret_from_fork+0x41/0x80
[   14.652402]  ret_from_fork_asm+0x1a/0x30
[   14.652617] 
[   14.652693] The buggy address belongs to the object at ffff888102a0bf80
[   14.652693]  which belongs to the cache kmalloc-64 of size 64
[   14.653051] The buggy address is located 0 bytes to the right of
[   14.653051]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.653595] 
[   14.653708] The buggy address belongs to the physical page:
[   14.654035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.654487] flags: 0x200000000000000(node=0|zone=2)
[   14.654970] page_type: f5(slab)
[   14.655155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.655394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.655798] page dumped because: kasan: bad access detected
[   14.656099] 
[   14.656206] Memory state around the buggy address:
[   14.656400]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.656718]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.657047] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.657332]                                      ^
[   14.657484]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.657691]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.658022] ==================================================================
[   14.273277] ==================================================================
[   14.273569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.273954] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.274245] 
[   14.274362] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.274411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.274424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.274447] Call Trace:
[   14.274467]  <TASK>
[   14.274487]  dump_stack_lvl+0x73/0xb0
[   14.274514]  print_report+0xd1/0x650
[   14.274539]  ? __virt_addr_valid+0x1db/0x2d0
[   14.274564]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.274589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.274615]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.274638]  kasan_report+0x141/0x180
[   14.274663]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.274690]  kasan_check_range+0x10c/0x1c0
[   14.274711]  __kasan_check_write+0x18/0x20
[   14.274732]  kasan_atomics_helper+0x1a7f/0x5450
[   14.274756]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.274779]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.274802]  ? kasan_atomics+0x152/0x310
[   14.274827]  kasan_atomics+0x1dc/0x310
[   14.274847]  ? __pfx_kasan_atomics+0x10/0x10
[   14.274868]  ? __pfx_read_tsc+0x10/0x10
[   14.274890]  ? ktime_get_ts64+0x86/0x230
[   14.274927]  kunit_try_run_case+0x1a5/0x480
[   14.274953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.274976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.275001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.275025]  ? __kthread_parkme+0x82/0x180
[   14.275048]  ? preempt_count_sub+0x50/0x80
[   14.275074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.275122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.275147]  kthread+0x337/0x6f0
[   14.275164]  ? trace_preempt_on+0x20/0xc0
[   14.275189]  ? __pfx_kthread+0x10/0x10
[   14.275209]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.275234]  ? calculate_sigpending+0x7b/0xa0
[   14.275261]  ? __pfx_kthread+0x10/0x10
[   14.275282]  ret_from_fork+0x41/0x80
[   14.275305]  ? __pfx_kthread+0x10/0x10
[   14.275324]  ret_from_fork_asm+0x1a/0x30
[   14.275357]  </TASK>
[   14.275370] 
[   14.282986] Allocated by task 284:
[   14.283173]  kasan_save_stack+0x45/0x70
[   14.283325]  kasan_save_track+0x18/0x40
[   14.283520]  kasan_save_alloc_info+0x3b/0x50
[   14.283933]  __kasan_kmalloc+0xb7/0xc0
[   14.284123]  __kmalloc_cache_noprof+0x189/0x420
[   14.284328]  kasan_atomics+0x95/0x310
[   14.284493]  kunit_try_run_case+0x1a5/0x480
[   14.285299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.285870]  kthread+0x337/0x6f0
[   14.286017]  ret_from_fork+0x41/0x80
[   14.286148]  ret_from_fork_asm+0x1a/0x30
[   14.286306] 
[   14.286404] The buggy address belongs to the object at ffff888102a0bf80
[   14.286404]  which belongs to the cache kmalloc-64 of size 64
[   14.287680] The buggy address is located 0 bytes to the right of
[   14.287680]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.288081] 
[   14.288162] The buggy address belongs to the physical page:
[   14.288350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.288610] flags: 0x200000000000000(node=0|zone=2)
[   14.288780] page_type: f5(slab)
[   14.288908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.289150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.289379] page dumped because: kasan: bad access detected
[   14.289550] 
[   14.289620] Memory state around the buggy address:
[   14.289779]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.290077]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.290399] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.290854]                                      ^
[   14.291146]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.291532]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.291964] ==================================================================
[   14.591248] ==================================================================
[   14.591731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.592288] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.592517] 
[   14.592658] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.592705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.592718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.592740] Call Trace:
[   14.592761]  <TASK>
[   14.592781]  dump_stack_lvl+0x73/0xb0
[   14.592845]  print_report+0xd1/0x650
[   14.592870]  ? __virt_addr_valid+0x1db/0x2d0
[   14.592892]  ? kasan_atomics_helper+0x218a/0x5450
[   14.592935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.592960]  ? kasan_atomics_helper+0x218a/0x5450
[   14.592982]  kasan_report+0x141/0x180
[   14.593005]  ? kasan_atomics_helper+0x218a/0x5450
[   14.593033]  kasan_check_range+0x10c/0x1c0
[   14.593054]  __kasan_check_write+0x18/0x20
[   14.593102]  kasan_atomics_helper+0x218a/0x5450
[   14.593128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.593151]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.593185]  ? kasan_atomics+0x152/0x310
[   14.593208]  kasan_atomics+0x1dc/0x310
[   14.593253]  ? __pfx_kasan_atomics+0x10/0x10
[   14.593275]  ? __pfx_read_tsc+0x10/0x10
[   14.593296]  ? ktime_get_ts64+0x86/0x230
[   14.593333]  kunit_try_run_case+0x1a5/0x480
[   14.593359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.593433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.593457]  ? __kthread_parkme+0x82/0x180
[   14.593490]  ? preempt_count_sub+0x50/0x80
[   14.593517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.593575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.593599]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.593635]  kthread+0x337/0x6f0
[   14.593653]  ? trace_preempt_on+0x20/0xc0
[   14.593677]  ? __pfx_kthread+0x10/0x10
[   14.593729]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.593753]  ? calculate_sigpending+0x7b/0xa0
[   14.593776]  ? __pfx_kthread+0x10/0x10
[   14.593805]  ret_from_fork+0x41/0x80
[   14.593827]  ? __pfx_kthread+0x10/0x10
[   14.593868]  ret_from_fork_asm+0x1a/0x30
[   14.593900]  </TASK>
[   14.593912] 
[   14.602432] Allocated by task 284:
[   14.602615]  kasan_save_stack+0x45/0x70
[   14.602825]  kasan_save_track+0x18/0x40
[   14.603047]  kasan_save_alloc_info+0x3b/0x50
[   14.603275]  __kasan_kmalloc+0xb7/0xc0
[   14.603451]  __kmalloc_cache_noprof+0x189/0x420
[   14.603724]  kasan_atomics+0x95/0x310
[   14.603913]  kunit_try_run_case+0x1a5/0x480
[   14.604161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.604435]  kthread+0x337/0x6f0
[   14.604648]  ret_from_fork+0x41/0x80
[   14.604828]  ret_from_fork_asm+0x1a/0x30
[   14.605030] 
[   14.605155] The buggy address belongs to the object at ffff888102a0bf80
[   14.605155]  which belongs to the cache kmalloc-64 of size 64
[   14.605714] The buggy address is located 0 bytes to the right of
[   14.605714]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.606276] 
[   14.606411] The buggy address belongs to the physical page:
[   14.606781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.607118] flags: 0x200000000000000(node=0|zone=2)
[   14.607453] page_type: f5(slab)
[   14.607643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.607911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.608256] page dumped because: kasan: bad access detected
[   14.608542] 
[   14.608633] Memory state around the buggy address:
[   14.608962]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609173]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609487] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.610211]                                      ^
[   14.610449]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.610735]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.611099] ==================================================================
[   13.898642] ==================================================================
[   13.899280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   13.899522] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.899739] 
[   13.899856] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.899901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.899934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.899956] Call Trace:
[   13.899974]  <TASK>
[   13.899991]  dump_stack_lvl+0x73/0xb0
[   13.900015]  print_report+0xd1/0x650
[   13.900038]  ? __virt_addr_valid+0x1db/0x2d0
[   13.900061]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.900083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.900107]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.900129]  kasan_report+0x141/0x180
[   13.900152]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.900179]  __asan_report_load4_noabort+0x18/0x20
[   13.900201]  kasan_atomics_helper+0x4a02/0x5450
[   13.900224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.900255]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.900278]  ? kasan_atomics+0x152/0x310
[   13.900302]  kasan_atomics+0x1dc/0x310
[   13.900324]  ? __pfx_kasan_atomics+0x10/0x10
[   13.900346]  ? __pfx_read_tsc+0x10/0x10
[   13.900366]  ? ktime_get_ts64+0x86/0x230
[   13.900392]  kunit_try_run_case+0x1a5/0x480
[   13.900417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.900464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.900497]  ? __kthread_parkme+0x82/0x180
[   13.900521]  ? preempt_count_sub+0x50/0x80
[   13.900547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.900595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.900620]  kthread+0x337/0x6f0
[   13.900638]  ? trace_preempt_on+0x20/0xc0
[   13.900663]  ? __pfx_kthread+0x10/0x10
[   13.900692]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.900715]  ? calculate_sigpending+0x7b/0xa0
[   13.900737]  ? __pfx_kthread+0x10/0x10
[   13.900767]  ret_from_fork+0x41/0x80
[   13.900789]  ? __pfx_kthread+0x10/0x10
[   13.900807]  ret_from_fork_asm+0x1a/0x30
[   13.900839]  </TASK>
[   13.900849] 
[   13.908495] Allocated by task 284:
[   13.908699]  kasan_save_stack+0x45/0x70
[   13.908843]  kasan_save_track+0x18/0x40
[   13.909031]  kasan_save_alloc_info+0x3b/0x50
[   13.909238]  __kasan_kmalloc+0xb7/0xc0
[   13.909420]  __kmalloc_cache_noprof+0x189/0x420
[   13.909643]  kasan_atomics+0x95/0x310
[   13.909791]  kunit_try_run_case+0x1a5/0x480
[   13.909945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910115]  kthread+0x337/0x6f0
[   13.910229]  ret_from_fork+0x41/0x80
[   13.910357]  ret_from_fork_asm+0x1a/0x30
[   13.910490] 
[   13.910559] The buggy address belongs to the object at ffff888102a0bf80
[   13.910559]  which belongs to the cache kmalloc-64 of size 64
[   13.910899] The buggy address is located 0 bytes to the right of
[   13.910899]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.911438] 
[   13.911531] The buggy address belongs to the physical page:
[   13.912038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.912409] flags: 0x200000000000000(node=0|zone=2)
[   13.912649] page_type: f5(slab)
[   13.912818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.913246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.913517] page dumped because: kasan: bad access detected
[   13.913905] 
[   13.913982] Memory state around the buggy address:
[   13.914133]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.914340]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.914546] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.914861]                                      ^
[   13.915093]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.915447]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.915953] ==================================================================
[   14.120200] ==================================================================
[   14.120587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.121308] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.121961] 
[   14.122140] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.122188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.122200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.122224] Call Trace:
[   14.122244]  <TASK>
[   14.122267]  dump_stack_lvl+0x73/0xb0
[   14.122295]  print_report+0xd1/0x650
[   14.122319]  ? __virt_addr_valid+0x1db/0x2d0
[   14.122343]  ? kasan_atomics_helper+0x164f/0x5450
[   14.122366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.122390]  ? kasan_atomics_helper+0x164f/0x5450
[   14.122414]  kasan_report+0x141/0x180
[   14.122438]  ? kasan_atomics_helper+0x164f/0x5450
[   14.122466]  kasan_check_range+0x10c/0x1c0
[   14.122487]  __kasan_check_write+0x18/0x20
[   14.122508]  kasan_atomics_helper+0x164f/0x5450
[   14.122532]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.122587]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.122610]  ? kasan_atomics+0x152/0x310
[   14.122634]  kasan_atomics+0x1dc/0x310
[   14.122666]  ? __pfx_kasan_atomics+0x10/0x10
[   14.122688]  ? __pfx_read_tsc+0x10/0x10
[   14.122709]  ? ktime_get_ts64+0x86/0x230
[   14.122735]  kunit_try_run_case+0x1a5/0x480
[   14.122761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.122784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.122809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.122834]  ? __kthread_parkme+0x82/0x180
[   14.122857]  ? preempt_count_sub+0x50/0x80
[   14.122883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.122908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.122940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.122964]  kthread+0x337/0x6f0
[   14.122981]  ? trace_preempt_on+0x20/0xc0
[   14.123006]  ? __pfx_kthread+0x10/0x10
[   14.123025]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.123047]  ? calculate_sigpending+0x7b/0xa0
[   14.123070]  ? __pfx_kthread+0x10/0x10
[   14.123089]  ret_from_fork+0x41/0x80
[   14.123110]  ? __pfx_kthread+0x10/0x10
[   14.123129]  ret_from_fork_asm+0x1a/0x30
[   14.123161]  </TASK>
[   14.123172] 
[   14.135945] Allocated by task 284:
[   14.136326]  kasan_save_stack+0x45/0x70
[   14.136740]  kasan_save_track+0x18/0x40
[   14.137054]  kasan_save_alloc_info+0x3b/0x50
[   14.137203]  __kasan_kmalloc+0xb7/0xc0
[   14.137337]  __kmalloc_cache_noprof+0x189/0x420
[   14.137492]  kasan_atomics+0x95/0x310
[   14.137815]  kunit_try_run_case+0x1a5/0x480
[   14.138228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.138720]  kthread+0x337/0x6f0
[   14.139047]  ret_from_fork+0x41/0x80
[   14.139399]  ret_from_fork_asm+0x1a/0x30
[   14.139790] 
[   14.139957] The buggy address belongs to the object at ffff888102a0bf80
[   14.139957]  which belongs to the cache kmalloc-64 of size 64
[   14.141012] The buggy address is located 0 bytes to the right of
[   14.141012]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.141383] 
[   14.141458] The buggy address belongs to the physical page:
[   14.141825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.142525] flags: 0x200000000000000(node=0|zone=2)
[   14.143009] page_type: f5(slab)
[   14.143309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.143991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.144672] page dumped because: kasan: bad access detected
[   14.145161] 
[   14.145309] Memory state around the buggy address:
[   14.145672]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.145892]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.146121] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.146334]                                      ^
[   14.146493]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.147094]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.147737] ==================================================================
[   14.322398] ==================================================================
[   14.323112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.323464] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.324028] 
[   14.324231] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.324290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.324303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.324326] Call Trace:
[   14.324347]  <TASK>
[   14.324368]  dump_stack_lvl+0x73/0xb0
[   14.324396]  print_report+0xd1/0x650
[   14.324432]  ? __virt_addr_valid+0x1db/0x2d0
[   14.324456]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.324478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.324513]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.324536]  kasan_report+0x141/0x180
[   14.324579]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.324606]  kasan_check_range+0x10c/0x1c0
[   14.324627]  __kasan_check_write+0x18/0x20
[   14.324648]  kasan_atomics_helper+0x1c18/0x5450
[   14.324671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.324694]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.324717]  ? kasan_atomics+0x152/0x310
[   14.324742]  kasan_atomics+0x1dc/0x310
[   14.324761]  ? __pfx_kasan_atomics+0x10/0x10
[   14.324782]  ? __pfx_read_tsc+0x10/0x10
[   14.324804]  ? ktime_get_ts64+0x86/0x230
[   14.324831]  kunit_try_run_case+0x1a5/0x480
[   14.324858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.324882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.324906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.324940]  ? __kthread_parkme+0x82/0x180
[   14.324964]  ? preempt_count_sub+0x50/0x80
[   14.324990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.325013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.325036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.325060]  kthread+0x337/0x6f0
[   14.325077]  ? trace_preempt_on+0x20/0xc0
[   14.325102]  ? __pfx_kthread+0x10/0x10
[   14.325121]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.325143]  ? calculate_sigpending+0x7b/0xa0
[   14.325166]  ? __pfx_kthread+0x10/0x10
[   14.325185]  ret_from_fork+0x41/0x80
[   14.325208]  ? __pfx_kthread+0x10/0x10
[   14.325226]  ret_from_fork_asm+0x1a/0x30
[   14.325259]  </TASK>
[   14.325271] 
[   14.336508] Allocated by task 284:
[   14.336652]  kasan_save_stack+0x45/0x70
[   14.336802]  kasan_save_track+0x18/0x40
[   14.336993]  kasan_save_alloc_info+0x3b/0x50
[   14.337358]  __kasan_kmalloc+0xb7/0xc0
[   14.337726]  __kmalloc_cache_noprof+0x189/0x420
[   14.338175]  kasan_atomics+0x95/0x310
[   14.338546]  kunit_try_run_case+0x1a5/0x480
[   14.338963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.339442]  kthread+0x337/0x6f0
[   14.339774]  ret_from_fork+0x41/0x80
[   14.340117]  ret_from_fork_asm+0x1a/0x30
[   14.340497] 
[   14.340694] The buggy address belongs to the object at ffff888102a0bf80
[   14.340694]  which belongs to the cache kmalloc-64 of size 64
[   14.341835] The buggy address is located 0 bytes to the right of
[   14.341835]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.342943] 
[   14.343111] The buggy address belongs to the physical page:
[   14.343633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.344320] flags: 0x200000000000000(node=0|zone=2)
[   14.344780] page_type: f5(slab)
[   14.345094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.345718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.345960] page dumped because: kasan: bad access detected
[   14.346132] 
[   14.346200] Memory state around the buggy address:
[   14.346360]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.346637]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.347261] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.347890]                                      ^
[   14.348331]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.348964]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.349594] ==================================================================
[   13.415795] ==================================================================
[   13.416807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.417100] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.417415] 
[   13.417528] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.417575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.417587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.417609] Call Trace:
[   13.417628]  <TASK>
[   13.417647]  dump_stack_lvl+0x73/0xb0
[   13.417672]  print_report+0xd1/0x650
[   13.417696]  ? __virt_addr_valid+0x1db/0x2d0
[   13.417718]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.417740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.417763]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.417786]  kasan_report+0x141/0x180
[   13.417809]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.417836]  kasan_check_range+0x10c/0x1c0
[   13.417856]  __kasan_check_write+0x18/0x20
[   13.417878]  kasan_atomics_helper+0x4a0/0x5450
[   13.417902]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.417937]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.417959]  ? kasan_atomics+0x152/0x310
[   13.417983]  kasan_atomics+0x1dc/0x310
[   13.418003]  ? __pfx_kasan_atomics+0x10/0x10
[   13.418024]  ? __pfx_read_tsc+0x10/0x10
[   13.418045]  ? ktime_get_ts64+0x86/0x230
[   13.418072]  kunit_try_run_case+0x1a5/0x480
[   13.418098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.418121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.418146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.418171]  ? __kthread_parkme+0x82/0x180
[   13.418194]  ? preempt_count_sub+0x50/0x80
[   13.418221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.418246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.418270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.418294]  kthread+0x337/0x6f0
[   13.418312]  ? trace_preempt_on+0x20/0xc0
[   13.418337]  ? __pfx_kthread+0x10/0x10
[   13.418355]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.418377]  ? calculate_sigpending+0x7b/0xa0
[   13.418400]  ? __pfx_kthread+0x10/0x10
[   13.418420]  ret_from_fork+0x41/0x80
[   13.418441]  ? __pfx_kthread+0x10/0x10
[   13.418459]  ret_from_fork_asm+0x1a/0x30
[   13.418492]  </TASK>
[   13.418504] 
[   13.425840] Allocated by task 284:
[   13.426037]  kasan_save_stack+0x45/0x70
[   13.426240]  kasan_save_track+0x18/0x40
[   13.426408]  kasan_save_alloc_info+0x3b/0x50
[   13.426556]  __kasan_kmalloc+0xb7/0xc0
[   13.426742]  __kmalloc_cache_noprof+0x189/0x420
[   13.426975]  kasan_atomics+0x95/0x310
[   13.427140]  kunit_try_run_case+0x1a5/0x480
[   13.427287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.427509]  kthread+0x337/0x6f0
[   13.427798]  ret_from_fork+0x41/0x80
[   13.427991]  ret_from_fork_asm+0x1a/0x30
[   13.428164] 
[   13.428269] The buggy address belongs to the object at ffff888102a0bf80
[   13.428269]  which belongs to the cache kmalloc-64 of size 64
[   13.428807] The buggy address is located 0 bytes to the right of
[   13.428807]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.429297] 
[   13.429371] The buggy address belongs to the physical page:
[   13.429544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.429908] flags: 0x200000000000000(node=0|zone=2)
[   13.430162] page_type: f5(slab)
[   13.430310] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.430593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.430954] page dumped because: kasan: bad access detected
[   13.431174] 
[   13.431268] Memory state around the buggy address:
[   13.431463]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.431763]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.432022] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.432237]                                      ^
[   13.432397]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.432642]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.432963] ==================================================================
[   14.175868] ==================================================================
[   14.176202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.176568] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.176904] 
[   14.177029] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.177088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.177101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.177135] Call Trace:
[   14.177155]  <TASK>
[   14.177175]  dump_stack_lvl+0x73/0xb0
[   14.177200]  print_report+0xd1/0x650
[   14.177225]  ? __virt_addr_valid+0x1db/0x2d0
[   14.177248]  ? kasan_atomics_helper+0x177f/0x5450
[   14.177281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.177305]  ? kasan_atomics_helper+0x177f/0x5450
[   14.177328]  kasan_report+0x141/0x180
[   14.177362]  ? kasan_atomics_helper+0x177f/0x5450
[   14.177389]  kasan_check_range+0x10c/0x1c0
[   14.177410]  __kasan_check_write+0x18/0x20
[   14.177430]  kasan_atomics_helper+0x177f/0x5450
[   14.177454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.177478]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.177500]  ? kasan_atomics+0x152/0x310
[   14.177524]  kasan_atomics+0x1dc/0x310
[   14.177544]  ? __pfx_kasan_atomics+0x10/0x10
[   14.177576]  ? __pfx_read_tsc+0x10/0x10
[   14.177597]  ? ktime_get_ts64+0x86/0x230
[   14.177623]  kunit_try_run_case+0x1a5/0x480
[   14.177650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.177674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.177700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.177724]  ? __kthread_parkme+0x82/0x180
[   14.177756]  ? preempt_count_sub+0x50/0x80
[   14.177783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.177807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.177842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.177866]  kthread+0x337/0x6f0
[   14.177884]  ? trace_preempt_on+0x20/0xc0
[   14.177909]  ? __pfx_kthread+0x10/0x10
[   14.177936]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.177959]  ? calculate_sigpending+0x7b/0xa0
[   14.177981]  ? __pfx_kthread+0x10/0x10
[   14.178001]  ret_from_fork+0x41/0x80
[   14.178022]  ? __pfx_kthread+0x10/0x10
[   14.178041]  ret_from_fork_asm+0x1a/0x30
[   14.178073]  </TASK>
[   14.178085] 
[   14.185930] Allocated by task 284:
[   14.186118]  kasan_save_stack+0x45/0x70
[   14.186334]  kasan_save_track+0x18/0x40
[   14.186513]  kasan_save_alloc_info+0x3b/0x50
[   14.186746]  __kasan_kmalloc+0xb7/0xc0
[   14.186940]  __kmalloc_cache_noprof+0x189/0x420
[   14.187151]  kasan_atomics+0x95/0x310
[   14.187282]  kunit_try_run_case+0x1a5/0x480
[   14.187429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.187737]  kthread+0x337/0x6f0
[   14.187905]  ret_from_fork+0x41/0x80
[   14.188101]  ret_from_fork_asm+0x1a/0x30
[   14.188301] 
[   14.188396] The buggy address belongs to the object at ffff888102a0bf80
[   14.188396]  which belongs to the cache kmalloc-64 of size 64
[   14.188884] The buggy address is located 0 bytes to the right of
[   14.188884]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.189429] 
[   14.189544] The buggy address belongs to the physical page:
[   14.189789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.190169] flags: 0x200000000000000(node=0|zone=2)
[   14.190339] page_type: f5(slab)
[   14.190466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.190704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.191020] page dumped because: kasan: bad access detected
[   14.191324] 
[   14.191430] Memory state around the buggy address:
[   14.191676]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.192019]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.192357] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.192577]                                      ^
[   14.192802]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.193152]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.193467] ==================================================================
[   13.960665] ==================================================================
[   13.961622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   13.962021] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.962338] 
[   13.962429] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.962475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.962487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.962510] Call Trace:
[   13.962529]  <TASK>
[   13.962548]  dump_stack_lvl+0x73/0xb0
[   13.962575]  print_report+0xd1/0x650
[   13.962597]  ? __virt_addr_valid+0x1db/0x2d0
[   13.962621]  ? kasan_atomics_helper+0x12e6/0x5450
[   13.962642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.962666]  ? kasan_atomics_helper+0x12e6/0x5450
[   13.962690]  kasan_report+0x141/0x180
[   13.962717]  ? kasan_atomics_helper+0x12e6/0x5450
[   13.962757]  kasan_check_range+0x10c/0x1c0
[   13.962779]  __kasan_check_write+0x18/0x20
[   13.962800]  kasan_atomics_helper+0x12e6/0x5450
[   13.962835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.962860]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.962883]  ? kasan_atomics+0x152/0x310
[   13.962908]  kasan_atomics+0x1dc/0x310
[   13.962937]  ? __pfx_kasan_atomics+0x10/0x10
[   13.962959]  ? __pfx_read_tsc+0x10/0x10
[   13.962979]  ? ktime_get_ts64+0x86/0x230
[   13.963006]  kunit_try_run_case+0x1a5/0x480
[   13.963031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.963054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.963079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.963103]  ? __kthread_parkme+0x82/0x180
[   13.963126]  ? preempt_count_sub+0x50/0x80
[   13.963153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.963177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.963209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.963233]  kthread+0x337/0x6f0
[   13.963251]  ? trace_preempt_on+0x20/0xc0
[   13.963286]  ? __pfx_kthread+0x10/0x10
[   13.963304]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.963335]  ? calculate_sigpending+0x7b/0xa0
[   13.963357]  ? __pfx_kthread+0x10/0x10
[   13.963377]  ret_from_fork+0x41/0x80
[   13.963398]  ? __pfx_kthread+0x10/0x10
[   13.963426]  ret_from_fork_asm+0x1a/0x30
[   13.963458]  </TASK>
[   13.963469] 
[   13.971716] Allocated by task 284:
[   13.971905]  kasan_save_stack+0x45/0x70
[   13.972127]  kasan_save_track+0x18/0x40
[   13.972325]  kasan_save_alloc_info+0x3b/0x50
[   13.972539]  __kasan_kmalloc+0xb7/0xc0
[   13.972784]  __kmalloc_cache_noprof+0x189/0x420
[   13.973016]  kasan_atomics+0x95/0x310
[   13.973182]  kunit_try_run_case+0x1a5/0x480
[   13.973330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.973505]  kthread+0x337/0x6f0
[   13.973624]  ret_from_fork+0x41/0x80
[   13.973755]  ret_from_fork_asm+0x1a/0x30
[   13.973895] 
[   13.974001] The buggy address belongs to the object at ffff888102a0bf80
[   13.974001]  which belongs to the cache kmalloc-64 of size 64
[   13.974551] The buggy address is located 0 bytes to the right of
[   13.974551]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.975313] 
[   13.975400] The buggy address belongs to the physical page:
[   13.975577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.975968] flags: 0x200000000000000(node=0|zone=2)
[   13.976192] page_type: f5(slab)
[   13.976358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.976593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.976830] page dumped because: kasan: bad access detected
[   13.977089] 
[   13.977195] Memory state around the buggy address:
[   13.977436]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.977833]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.978181] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.978521]                                      ^
[   13.978761]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.979020]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.979308] ==================================================================
[   14.532054] ==================================================================
[   14.532351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.532753] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.533090] 
[   14.533195] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.533254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.533267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.533302] Call Trace:
[   14.533350]  <TASK>
[   14.533372]  dump_stack_lvl+0x73/0xb0
[   14.533426]  print_report+0xd1/0x650
[   14.533476]  ? __virt_addr_valid+0x1db/0x2d0
[   14.533513]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.533548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.533595]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.533636]  kasan_report+0x141/0x180
[   14.533687]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.533715]  __asan_report_load8_noabort+0x18/0x20
[   14.533737]  kasan_atomics_helper+0x4f98/0x5450
[   14.533771]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.533795]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.533817]  ? kasan_atomics+0x152/0x310
[   14.533842]  kasan_atomics+0x1dc/0x310
[   14.533862]  ? __pfx_kasan_atomics+0x10/0x10
[   14.533884]  ? __pfx_read_tsc+0x10/0x10
[   14.533906]  ? ktime_get_ts64+0x86/0x230
[   14.533942]  kunit_try_run_case+0x1a5/0x480
[   14.533968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.533992]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.534017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.534042]  ? __kthread_parkme+0x82/0x180
[   14.534064]  ? preempt_count_sub+0x50/0x80
[   14.534091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.534141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.534166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.534216]  kthread+0x337/0x6f0
[   14.534235]  ? trace_preempt_on+0x20/0xc0
[   14.534285]  ? __pfx_kthread+0x10/0x10
[   14.534304]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.534343]  ? calculate_sigpending+0x7b/0xa0
[   14.534376]  ? __pfx_kthread+0x10/0x10
[   14.534396]  ret_from_fork+0x41/0x80
[   14.534418]  ? __pfx_kthread+0x10/0x10
[   14.534437]  ret_from_fork_asm+0x1a/0x30
[   14.534470]  </TASK>
[   14.534482] 
[   14.542461] Allocated by task 284:
[   14.542720]  kasan_save_stack+0x45/0x70
[   14.542968]  kasan_save_track+0x18/0x40
[   14.543194]  kasan_save_alloc_info+0x3b/0x50
[   14.543380]  __kasan_kmalloc+0xb7/0xc0
[   14.543511]  __kmalloc_cache_noprof+0x189/0x420
[   14.543932]  kasan_atomics+0x95/0x310
[   14.544116]  kunit_try_run_case+0x1a5/0x480
[   14.544346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544518]  kthread+0x337/0x6f0
[   14.544634]  ret_from_fork+0x41/0x80
[   14.544866]  ret_from_fork_asm+0x1a/0x30
[   14.545021] 
[   14.545139] The buggy address belongs to the object at ffff888102a0bf80
[   14.545139]  which belongs to the cache kmalloc-64 of size 64
[   14.545736] The buggy address is located 0 bytes to the right of
[   14.545736]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.546285] 
[   14.546433] The buggy address belongs to the physical page:
[   14.546740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.547105] flags: 0x200000000000000(node=0|zone=2)
[   14.547370] page_type: f5(slab)
[   14.547579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.548028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.548266] page dumped because: kasan: bad access detected
[   14.548496] 
[   14.548696] Memory state around the buggy address:
[   14.548987]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.549330]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.549684] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.550025]                                      ^
[   14.550269]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.550634]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.551074] ==================================================================
[   13.475945] ==================================================================
[   13.476578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.477176] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.477410] 
[   13.477525] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.477586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.477599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.477622] Call Trace:
[   13.477641]  <TASK>
[   13.477660]  dump_stack_lvl+0x73/0xb0
[   13.477687]  print_report+0xd1/0x650
[   13.477711]  ? __virt_addr_valid+0x1db/0x2d0
[   13.477734]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.477757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.477780]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.477803]  kasan_report+0x141/0x180
[   13.477826]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.477854]  kasan_check_range+0x10c/0x1c0
[   13.477874]  __kasan_check_write+0x18/0x20
[   13.477895]  kasan_atomics_helper+0x5fe/0x5450
[   13.477931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.477955]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.477977]  ? kasan_atomics+0x152/0x310
[   13.478001]  kasan_atomics+0x1dc/0x310
[   13.478020]  ? __pfx_kasan_atomics+0x10/0x10
[   13.478041]  ? __pfx_read_tsc+0x10/0x10
[   13.478062]  ? ktime_get_ts64+0x86/0x230
[   13.478088]  kunit_try_run_case+0x1a5/0x480
[   13.478114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.478137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.478162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.478186]  ? __kthread_parkme+0x82/0x180
[   13.478209]  ? preempt_count_sub+0x50/0x80
[   13.478236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.478259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.478284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.478307]  kthread+0x337/0x6f0
[   13.478325]  ? trace_preempt_on+0x20/0xc0
[   13.478350]  ? __pfx_kthread+0x10/0x10
[   13.478368]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.478390]  ? calculate_sigpending+0x7b/0xa0
[   13.478413]  ? __pfx_kthread+0x10/0x10
[   13.478432]  ret_from_fork+0x41/0x80
[   13.478453]  ? __pfx_kthread+0x10/0x10
[   13.478471]  ret_from_fork_asm+0x1a/0x30
[   13.478504]  </TASK>
[   13.478515] 
[   13.485925] Allocated by task 284:
[   13.486102]  kasan_save_stack+0x45/0x70
[   13.486249]  kasan_save_track+0x18/0x40
[   13.486383]  kasan_save_alloc_info+0x3b/0x50
[   13.486527]  __kasan_kmalloc+0xb7/0xc0
[   13.486658]  __kmalloc_cache_noprof+0x189/0x420
[   13.486889]  kasan_atomics+0x95/0x310
[   13.487083]  kunit_try_run_case+0x1a5/0x480
[   13.487289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.487548]  kthread+0x337/0x6f0
[   13.487818]  ret_from_fork+0x41/0x80
[   13.488016]  ret_from_fork_asm+0x1a/0x30
[   13.488201] 
[   13.488290] The buggy address belongs to the object at ffff888102a0bf80
[   13.488290]  which belongs to the cache kmalloc-64 of size 64
[   13.488747] The buggy address is located 0 bytes to the right of
[   13.488747]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.489270] 
[   13.489379] The buggy address belongs to the physical page:
[   13.489588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.489958] flags: 0x200000000000000(node=0|zone=2)
[   13.490174] page_type: f5(slab)
[   13.490318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.490652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.490963] page dumped because: kasan: bad access detected
[   13.491181] 
[   13.491268] Memory state around the buggy address:
[   13.491460]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.491782]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.492065] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.492310]                                      ^
[   13.492465]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.492680]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.492893] ==================================================================
[   13.720544] ==================================================================
[   13.721048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   13.721399] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.721873] 
[   13.722001] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.722048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.722061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.722085] Call Trace:
[   13.722105]  <TASK>
[   13.722125]  dump_stack_lvl+0x73/0xb0
[   13.722151]  print_report+0xd1/0x650
[   13.722175]  ? __virt_addr_valid+0x1db/0x2d0
[   13.722198]  ? kasan_atomics_helper+0xd47/0x5450
[   13.722220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.722256]  ? kasan_atomics_helper+0xd47/0x5450
[   13.722279]  kasan_report+0x141/0x180
[   13.722302]  ? kasan_atomics_helper+0xd47/0x5450
[   13.722340]  kasan_check_range+0x10c/0x1c0
[   13.722361]  __kasan_check_write+0x18/0x20
[   13.722382]  kasan_atomics_helper+0xd47/0x5450
[   13.722414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.722437]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.722460]  ? kasan_atomics+0x152/0x310
[   13.722494]  kasan_atomics+0x1dc/0x310
[   13.722514]  ? __pfx_kasan_atomics+0x10/0x10
[   13.722535]  ? __pfx_read_tsc+0x10/0x10
[   13.722556]  ? ktime_get_ts64+0x86/0x230
[   13.722590]  kunit_try_run_case+0x1a5/0x480
[   13.722615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.722658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.722683]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.722707]  ? __kthread_parkme+0x82/0x180
[   13.722730]  ? preempt_count_sub+0x50/0x80
[   13.722764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.722789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.722812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.722847]  kthread+0x337/0x6f0
[   13.722864]  ? trace_preempt_on+0x20/0xc0
[   13.722888]  ? __pfx_kthread+0x10/0x10
[   13.722906]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.722938]  ? calculate_sigpending+0x7b/0xa0
[   13.722961]  ? __pfx_kthread+0x10/0x10
[   13.722980]  ret_from_fork+0x41/0x80
[   13.723001]  ? __pfx_kthread+0x10/0x10
[   13.723019]  ret_from_fork_asm+0x1a/0x30
[   13.723051]  </TASK>
[   13.723064] 
[   13.731055] Allocated by task 284:
[   13.731247]  kasan_save_stack+0x45/0x70
[   13.731480]  kasan_save_track+0x18/0x40
[   13.731669]  kasan_save_alloc_info+0x3b/0x50
[   13.731939]  __kasan_kmalloc+0xb7/0xc0
[   13.732162]  __kmalloc_cache_noprof+0x189/0x420
[   13.732355]  kasan_atomics+0x95/0x310
[   13.732485]  kunit_try_run_case+0x1a5/0x480
[   13.732632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.732806]  kthread+0x337/0x6f0
[   13.732935]  ret_from_fork+0x41/0x80
[   13.733067]  ret_from_fork_asm+0x1a/0x30
[   13.733207] 
[   13.733295] The buggy address belongs to the object at ffff888102a0bf80
[   13.733295]  which belongs to the cache kmalloc-64 of size 64
[   13.733975] The buggy address is located 0 bytes to the right of
[   13.733975]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.734508] 
[   13.734581] The buggy address belongs to the physical page:
[   13.734756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.735012] flags: 0x200000000000000(node=0|zone=2)
[   13.735177] page_type: f5(slab)
[   13.735302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.735680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.736030] page dumped because: kasan: bad access detected
[   13.736312] 
[   13.736418] Memory state around the buggy address:
[   13.736719]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.737084]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.737458] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.738074]                                      ^
[   13.738270]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.738486]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.739062] ==================================================================
[   14.571624] ==================================================================
[   14.572015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.572610] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.572956] 
[   14.573113] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.573160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.573172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.573195] Call Trace:
[   14.573215]  <TASK>
[   14.573234]  dump_stack_lvl+0x73/0xb0
[   14.573261]  print_report+0xd1/0x650
[   14.573284]  ? __virt_addr_valid+0x1db/0x2d0
[   14.573308]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.573330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.573355]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.573378]  kasan_report+0x141/0x180
[   14.573400]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.573428]  __asan_report_load8_noabort+0x18/0x20
[   14.573450]  kasan_atomics_helper+0x4fb2/0x5450
[   14.573474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.573497]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.573520]  ? kasan_atomics+0x152/0x310
[   14.573545]  kasan_atomics+0x1dc/0x310
[   14.573566]  ? __pfx_kasan_atomics+0x10/0x10
[   14.573587]  ? __pfx_read_tsc+0x10/0x10
[   14.573609]  ? ktime_get_ts64+0x86/0x230
[   14.573635]  kunit_try_run_case+0x1a5/0x480
[   14.573662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.573685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.573710]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.573734]  ? __kthread_parkme+0x82/0x180
[   14.573757]  ? preempt_count_sub+0x50/0x80
[   14.573784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.573808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.573832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.573855]  kthread+0x337/0x6f0
[   14.573883]  ? trace_preempt_on+0x20/0xc0
[   14.573908]  ? __pfx_kthread+0x10/0x10
[   14.573945]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.573967]  ? calculate_sigpending+0x7b/0xa0
[   14.573990]  ? __pfx_kthread+0x10/0x10
[   14.574009]  ret_from_fork+0x41/0x80
[   14.574031]  ? __pfx_kthread+0x10/0x10
[   14.574050]  ret_from_fork_asm+0x1a/0x30
[   14.574082]  </TASK>
[   14.574094] 
[   14.582274] Allocated by task 284:
[   14.582470]  kasan_save_stack+0x45/0x70
[   14.582713]  kasan_save_track+0x18/0x40
[   14.582868]  kasan_save_alloc_info+0x3b/0x50
[   14.583098]  __kasan_kmalloc+0xb7/0xc0
[   14.583309]  __kmalloc_cache_noprof+0x189/0x420
[   14.583525]  kasan_atomics+0x95/0x310
[   14.583819]  kunit_try_run_case+0x1a5/0x480
[   14.584074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.584313]  kthread+0x337/0x6f0
[   14.584486]  ret_from_fork+0x41/0x80
[   14.584710]  ret_from_fork_asm+0x1a/0x30
[   14.584927] 
[   14.585024] The buggy address belongs to the object at ffff888102a0bf80
[   14.585024]  which belongs to the cache kmalloc-64 of size 64
[   14.585550] The buggy address is located 0 bytes to the right of
[   14.585550]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.586150] 
[   14.586266] The buggy address belongs to the physical page:
[   14.586515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.586950] flags: 0x200000000000000(node=0|zone=2)
[   14.587200] page_type: f5(slab)
[   14.587378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.587735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.588112] page dumped because: kasan: bad access detected
[   14.588397] 
[   14.588482] Memory state around the buggy address:
[   14.588749]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.589120]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.589465] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.589755]                                      ^
[   14.589907]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.590185]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.590492] ==================================================================
[   13.569894] ==================================================================
[   13.570269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.570948] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.571271] 
[   13.571406] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.571454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.571467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.571490] Call Trace:
[   13.571511]  <TASK>
[   13.571540]  dump_stack_lvl+0x73/0xb0
[   13.571594]  print_report+0xd1/0x650
[   13.571627]  ? __virt_addr_valid+0x1db/0x2d0
[   13.571651]  ? kasan_atomics_helper+0x860/0x5450
[   13.571673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.571707]  ? kasan_atomics_helper+0x860/0x5450
[   13.571729]  kasan_report+0x141/0x180
[   13.571752]  ? kasan_atomics_helper+0x860/0x5450
[   13.571780]  kasan_check_range+0x10c/0x1c0
[   13.571801]  __kasan_check_write+0x18/0x20
[   13.571821]  kasan_atomics_helper+0x860/0x5450
[   13.571844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.571867]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.571890]  ? kasan_atomics+0x152/0x310
[   13.571914]  kasan_atomics+0x1dc/0x310
[   13.571942]  ? __pfx_kasan_atomics+0x10/0x10
[   13.571965]  ? __pfx_read_tsc+0x10/0x10
[   13.571986]  ? ktime_get_ts64+0x86/0x230
[   13.572012]  kunit_try_run_case+0x1a5/0x480
[   13.572038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.572061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.572086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.572109]  ? __kthread_parkme+0x82/0x180
[   13.572142]  ? preempt_count_sub+0x50/0x80
[   13.572168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.572203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.572227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.572255]  kthread+0x337/0x6f0
[   13.572272]  ? trace_preempt_on+0x20/0xc0
[   13.572297]  ? __pfx_kthread+0x10/0x10
[   13.572315]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.572337]  ? calculate_sigpending+0x7b/0xa0
[   13.572359]  ? __pfx_kthread+0x10/0x10
[   13.572378]  ret_from_fork+0x41/0x80
[   13.572398]  ? __pfx_kthread+0x10/0x10
[   13.572417]  ret_from_fork_asm+0x1a/0x30
[   13.572449]  </TASK>
[   13.572460] 
[   13.579991] Allocated by task 284:
[   13.580183]  kasan_save_stack+0x45/0x70
[   13.580397]  kasan_save_track+0x18/0x40
[   13.580603]  kasan_save_alloc_info+0x3b/0x50
[   13.580749]  __kasan_kmalloc+0xb7/0xc0
[   13.580911]  __kmalloc_cache_noprof+0x189/0x420
[   13.581137]  kasan_atomics+0x95/0x310
[   13.581348]  kunit_try_run_case+0x1a5/0x480
[   13.581602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.581819]  kthread+0x337/0x6f0
[   13.581994]  ret_from_fork+0x41/0x80
[   13.582203]  ret_from_fork_asm+0x1a/0x30
[   13.582413] 
[   13.582490] The buggy address belongs to the object at ffff888102a0bf80
[   13.582490]  which belongs to the cache kmalloc-64 of size 64
[   13.582990] The buggy address is located 0 bytes to the right of
[   13.582990]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.583385] 
[   13.583496] The buggy address belongs to the physical page:
[   13.583822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.584195] flags: 0x200000000000000(node=0|zone=2)
[   13.584433] page_type: f5(slab)
[   13.584628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.584886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.585231] page dumped because: kasan: bad access detected
[   13.585470] 
[   13.585581] Memory state around the buggy address:
[   13.585804]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.586121]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.586387] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.586624]                                      ^
[   13.586871]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.587195]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.587508] ==================================================================
[   13.625508] ==================================================================
[   13.626107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.626457] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.626790] 
[   13.626904] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.626971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.626983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.627017] Call Trace:
[   13.627036]  <TASK>
[   13.627054]  dump_stack_lvl+0x73/0xb0
[   13.627079]  print_report+0xd1/0x650
[   13.627102]  ? __virt_addr_valid+0x1db/0x2d0
[   13.627124]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.627157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.627182]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.627217]  kasan_report+0x141/0x180
[   13.627240]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.627267]  kasan_check_range+0x10c/0x1c0
[   13.627289]  __kasan_check_write+0x18/0x20
[   13.627318]  kasan_atomics_helper+0xa2b/0x5450
[   13.627342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.627367]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.627401]  ? kasan_atomics+0x152/0x310
[   13.627426]  kasan_atomics+0x1dc/0x310
[   13.627447]  ? __pfx_kasan_atomics+0x10/0x10
[   13.627468]  ? __pfx_read_tsc+0x10/0x10
[   13.627488]  ? ktime_get_ts64+0x86/0x230
[   13.627523]  kunit_try_run_case+0x1a5/0x480
[   13.627548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.627571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.627605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.627629]  ? __kthread_parkme+0x82/0x180
[   13.627662]  ? preempt_count_sub+0x50/0x80
[   13.627688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.627713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.627737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.627761]  kthread+0x337/0x6f0
[   13.627778]  ? trace_preempt_on+0x20/0xc0
[   13.627802]  ? __pfx_kthread+0x10/0x10
[   13.627822]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.627844]  ? calculate_sigpending+0x7b/0xa0
[   13.627866]  ? __pfx_kthread+0x10/0x10
[   13.627885]  ret_from_fork+0x41/0x80
[   13.627906]  ? __pfx_kthread+0x10/0x10
[   13.627934]  ret_from_fork_asm+0x1a/0x30
[   13.627966]  </TASK>
[   13.627976] 
[   13.635532] Allocated by task 284:
[   13.635672]  kasan_save_stack+0x45/0x70
[   13.635877]  kasan_save_track+0x18/0x40
[   13.636088]  kasan_save_alloc_info+0x3b/0x50
[   13.636318]  __kasan_kmalloc+0xb7/0xc0
[   13.636510]  __kmalloc_cache_noprof+0x189/0x420
[   13.636847]  kasan_atomics+0x95/0x310
[   13.637020]  kunit_try_run_case+0x1a5/0x480
[   13.637209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.637386]  kthread+0x337/0x6f0
[   13.637591]  ret_from_fork+0x41/0x80
[   13.637775]  ret_from_fork_asm+0x1a/0x30
[   13.637985] 
[   13.638099] The buggy address belongs to the object at ffff888102a0bf80
[   13.638099]  which belongs to the cache kmalloc-64 of size 64
[   13.638613] The buggy address is located 0 bytes to the right of
[   13.638613]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.639150] 
[   13.639259] The buggy address belongs to the physical page:
[   13.639508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.639944] flags: 0x200000000000000(node=0|zone=2)
[   13.640170] page_type: f5(slab)
[   13.640350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.640713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.641074] page dumped because: kasan: bad access detected
[   13.641266] 
[   13.641335] Memory state around the buggy address:
[   13.641493]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.641708]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.642002] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.642621]                                      ^
[   13.642802]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.643086]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.643401] ==================================================================
[   13.758537] ==================================================================
[   13.759077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   13.759388] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.759791] 
[   13.759895] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.759955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.759968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.759990] Call Trace:
[   13.760006]  <TASK>
[   13.760022]  dump_stack_lvl+0x73/0xb0
[   13.760047]  print_report+0xd1/0x650
[   13.760080]  ? __virt_addr_valid+0x1db/0x2d0
[   13.760102]  ? kasan_atomics_helper+0xe78/0x5450
[   13.760124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.760158]  ? kasan_atomics_helper+0xe78/0x5450
[   13.760181]  kasan_report+0x141/0x180
[   13.760204]  ? kasan_atomics_helper+0xe78/0x5450
[   13.760231]  kasan_check_range+0x10c/0x1c0
[   13.760256]  __kasan_check_write+0x18/0x20
[   13.760276]  kasan_atomics_helper+0xe78/0x5450
[   13.760300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.760323]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.760346]  ? kasan_atomics+0x152/0x310
[   13.760371]  kasan_atomics+0x1dc/0x310
[   13.760390]  ? __pfx_kasan_atomics+0x10/0x10
[   13.760411]  ? __pfx_read_tsc+0x10/0x10
[   13.760432]  ? ktime_get_ts64+0x86/0x230
[   13.760457]  kunit_try_run_case+0x1a5/0x480
[   13.760484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.760507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.760531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.760555]  ? __kthread_parkme+0x82/0x180
[   13.760578]  ? preempt_count_sub+0x50/0x80
[   13.760605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.760630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.760654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.760678]  kthread+0x337/0x6f0
[   13.760696]  ? trace_preempt_on+0x20/0xc0
[   13.760720]  ? __pfx_kthread+0x10/0x10
[   13.760739]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.760761]  ? calculate_sigpending+0x7b/0xa0
[   13.760784]  ? __pfx_kthread+0x10/0x10
[   13.760804]  ret_from_fork+0x41/0x80
[   13.760825]  ? __pfx_kthread+0x10/0x10
[   13.760843]  ret_from_fork_asm+0x1a/0x30
[   13.760874]  </TASK>
[   13.760885] 
[   13.768335] Allocated by task 284:
[   13.768539]  kasan_save_stack+0x45/0x70
[   13.768889]  kasan_save_track+0x18/0x40
[   13.769103]  kasan_save_alloc_info+0x3b/0x50
[   13.769275]  __kasan_kmalloc+0xb7/0xc0
[   13.769408]  __kmalloc_cache_noprof+0x189/0x420
[   13.769602]  kasan_atomics+0x95/0x310
[   13.769789]  kunit_try_run_case+0x1a5/0x480
[   13.770004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.770253]  kthread+0x337/0x6f0
[   13.770400]  ret_from_fork+0x41/0x80
[   13.770532]  ret_from_fork_asm+0x1a/0x30
[   13.770962] 
[   13.771042] The buggy address belongs to the object at ffff888102a0bf80
[   13.771042]  which belongs to the cache kmalloc-64 of size 64
[   13.771406] The buggy address is located 0 bytes to the right of
[   13.771406]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.771805] 
[   13.771904] The buggy address belongs to the physical page:
[   13.772200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.772753] flags: 0x200000000000000(node=0|zone=2)
[   13.772934] page_type: f5(slab)
[   13.773058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.773288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.773513] page dumped because: kasan: bad access detected
[   13.773682] 
[   13.773750] Memory state around the buggy address:
[   13.773906]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.774246]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.774574] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.774893]                                      ^
[   13.775129]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.775449]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.776056] ==================================================================
[   13.541902] ==================================================================
[   13.542743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.543610] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.544383] 
[   13.544649] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.544700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.544713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.544770] Call Trace:
[   13.544791]  <TASK>
[   13.544811]  dump_stack_lvl+0x73/0xb0
[   13.544839]  print_report+0xd1/0x650
[   13.544865]  ? __virt_addr_valid+0x1db/0x2d0
[   13.544888]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.544911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.544946]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.544969]  kasan_report+0x141/0x180
[   13.544991]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.545019]  kasan_check_range+0x10c/0x1c0
[   13.545040]  __kasan_check_write+0x18/0x20
[   13.545060]  kasan_atomics_helper+0x7c7/0x5450
[   13.545084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.545107]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.545130]  ? kasan_atomics+0x152/0x310
[   13.545154]  kasan_atomics+0x1dc/0x310
[   13.545174]  ? __pfx_kasan_atomics+0x10/0x10
[   13.545195]  ? __pfx_read_tsc+0x10/0x10
[   13.545216]  ? ktime_get_ts64+0x86/0x230
[   13.545242]  kunit_try_run_case+0x1a5/0x480
[   13.545286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.545309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.545334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.545358]  ? __kthread_parkme+0x82/0x180
[   13.545380]  ? preempt_count_sub+0x50/0x80
[   13.545406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.545431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.545454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.545477]  kthread+0x337/0x6f0
[   13.545495]  ? trace_preempt_on+0x20/0xc0
[   13.545519]  ? __pfx_kthread+0x10/0x10
[   13.545538]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.545578]  ? calculate_sigpending+0x7b/0xa0
[   13.545601]  ? __pfx_kthread+0x10/0x10
[   13.545620]  ret_from_fork+0x41/0x80
[   13.545642]  ? __pfx_kthread+0x10/0x10
[   13.545660]  ret_from_fork_asm+0x1a/0x30
[   13.545691]  </TASK>
[   13.545703] 
[   13.557581] Allocated by task 284:
[   13.558001]  kasan_save_stack+0x45/0x70
[   13.558334]  kasan_save_track+0x18/0x40
[   13.558526]  kasan_save_alloc_info+0x3b/0x50
[   13.558978]  __kasan_kmalloc+0xb7/0xc0
[   13.559288]  __kmalloc_cache_noprof+0x189/0x420
[   13.559731]  kasan_atomics+0x95/0x310
[   13.560105]  kunit_try_run_case+0x1a5/0x480
[   13.560517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.560980]  kthread+0x337/0x6f0
[   13.561270]  ret_from_fork+0x41/0x80
[   13.561680]  ret_from_fork_asm+0x1a/0x30
[   13.562000] 
[   13.562228] The buggy address belongs to the object at ffff888102a0bf80
[   13.562228]  which belongs to the cache kmalloc-64 of size 64
[   13.562945] The buggy address is located 0 bytes to the right of
[   13.562945]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.563459] 
[   13.563839] The buggy address belongs to the physical page:
[   13.564231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.565402] flags: 0x200000000000000(node=0|zone=2)
[   13.565679] page_type: f5(slab)
[   13.565872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.566207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.566498] page dumped because: kasan: bad access detected
[   13.566773] 
[   13.566872] Memory state around the buggy address:
[   13.567120]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.567402]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.567769] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.568059]                                      ^
[   13.568293]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.568636]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.568909] ==================================================================
[   13.644233] ==================================================================
[   13.644589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.644905] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.645269] 
[   13.645378] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.645425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.645437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.645459] Call Trace:
[   13.645476]  <TASK>
[   13.645494]  dump_stack_lvl+0x73/0xb0
[   13.645520]  print_report+0xd1/0x650
[   13.645543]  ? __virt_addr_valid+0x1db/0x2d0
[   13.645574]  ? kasan_atomics_helper+0xac7/0x5450
[   13.645596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.645619]  ? kasan_atomics_helper+0xac7/0x5450
[   13.645652]  kasan_report+0x141/0x180
[   13.645675]  ? kasan_atomics_helper+0xac7/0x5450
[   13.645702]  kasan_check_range+0x10c/0x1c0
[   13.645734]  __kasan_check_write+0x18/0x20
[   13.645754]  kasan_atomics_helper+0xac7/0x5450
[   13.645777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.645800]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.645832]  ? kasan_atomics+0x152/0x310
[   13.645855]  kasan_atomics+0x1dc/0x310
[   13.645874]  ? __pfx_kasan_atomics+0x10/0x10
[   13.645906]  ? __pfx_read_tsc+0x10/0x10
[   13.645934]  ? ktime_get_ts64+0x86/0x230
[   13.645961]  kunit_try_run_case+0x1a5/0x480
[   13.645987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.646043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.646067]  ? __kthread_parkme+0x82/0x180
[   13.646100]  ? preempt_count_sub+0x50/0x80
[   13.646126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.646150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.646184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.646208]  kthread+0x337/0x6f0
[   13.646226]  ? trace_preempt_on+0x20/0xc0
[   13.646260]  ? __pfx_kthread+0x10/0x10
[   13.646280]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.646303]  ? calculate_sigpending+0x7b/0xa0
[   13.646335]  ? __pfx_kthread+0x10/0x10
[   13.646354]  ret_from_fork+0x41/0x80
[   13.646375]  ? __pfx_kthread+0x10/0x10
[   13.646404]  ret_from_fork_asm+0x1a/0x30
[   13.646435]  </TASK>
[   13.646446] 
[   13.654302] Allocated by task 284:
[   13.654501]  kasan_save_stack+0x45/0x70
[   13.654794]  kasan_save_track+0x18/0x40
[   13.654966]  kasan_save_alloc_info+0x3b/0x50
[   13.655189]  __kasan_kmalloc+0xb7/0xc0
[   13.655339]  __kmalloc_cache_noprof+0x189/0x420
[   13.655578]  kasan_atomics+0x95/0x310
[   13.655722]  kunit_try_run_case+0x1a5/0x480
[   13.655946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.656167]  kthread+0x337/0x6f0
[   13.656350]  ret_from_fork+0x41/0x80
[   13.656528]  ret_from_fork_asm+0x1a/0x30
[   13.656711] 
[   13.656787] The buggy address belongs to the object at ffff888102a0bf80
[   13.656787]  which belongs to the cache kmalloc-64 of size 64
[   13.657169] The buggy address is located 0 bytes to the right of
[   13.657169]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.657549] 
[   13.657643] The buggy address belongs to the physical page:
[   13.658012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.658378] flags: 0x200000000000000(node=0|zone=2)
[   13.658630] page_type: f5(slab)
[   13.658800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.659347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.659573] page dumped because: kasan: bad access detected
[   13.659742] 
[   13.659809] Memory state around the buggy address:
[   13.659972]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.660186]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.660852] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.661181]                                      ^
[   13.661429]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.661751]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.662090] ==================================================================
[   13.606113] ==================================================================
[   13.607057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.607421] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.607775] 
[   13.607892] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.607948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.607961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.607985] Call Trace:
[   13.608004]  <TASK>
[   13.608024]  dump_stack_lvl+0x73/0xb0
[   13.608050]  print_report+0xd1/0x650
[   13.608074]  ? __virt_addr_valid+0x1db/0x2d0
[   13.608097]  ? kasan_atomics_helper+0x992/0x5450
[   13.608119]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.608142]  ? kasan_atomics_helper+0x992/0x5450
[   13.608165]  kasan_report+0x141/0x180
[   13.608199]  ? kasan_atomics_helper+0x992/0x5450
[   13.608226]  kasan_check_range+0x10c/0x1c0
[   13.608253]  __kasan_check_write+0x18/0x20
[   13.608284]  kasan_atomics_helper+0x992/0x5450
[   13.608308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.608331]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.608354]  ? kasan_atomics+0x152/0x310
[   13.608379]  kasan_atomics+0x1dc/0x310
[   13.608398]  ? __pfx_kasan_atomics+0x10/0x10
[   13.608420]  ? __pfx_read_tsc+0x10/0x10
[   13.608442]  ? ktime_get_ts64+0x86/0x230
[   13.608467]  kunit_try_run_case+0x1a5/0x480
[   13.608494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.608516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.608541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.608584]  ? __kthread_parkme+0x82/0x180
[   13.608607]  ? preempt_count_sub+0x50/0x80
[   13.608634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.608658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.608682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.608706]  kthread+0x337/0x6f0
[   13.608724]  ? trace_preempt_on+0x20/0xc0
[   13.608748]  ? __pfx_kthread+0x10/0x10
[   13.608767]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.608789]  ? calculate_sigpending+0x7b/0xa0
[   13.608812]  ? __pfx_kthread+0x10/0x10
[   13.608830]  ret_from_fork+0x41/0x80
[   13.608852]  ? __pfx_kthread+0x10/0x10
[   13.608871]  ret_from_fork_asm+0x1a/0x30
[   13.608902]  </TASK>
[   13.608912] 
[   13.616994] Allocated by task 284:
[   13.617198]  kasan_save_stack+0x45/0x70
[   13.617409]  kasan_save_track+0x18/0x40
[   13.617591]  kasan_save_alloc_info+0x3b/0x50
[   13.617785]  __kasan_kmalloc+0xb7/0xc0
[   13.617969]  __kmalloc_cache_noprof+0x189/0x420
[   13.618196]  kasan_atomics+0x95/0x310
[   13.618392]  kunit_try_run_case+0x1a5/0x480
[   13.618617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.618862]  kthread+0x337/0x6f0
[   13.619011]  ret_from_fork+0x41/0x80
[   13.619144]  ret_from_fork_asm+0x1a/0x30
[   13.619285] 
[   13.619356] The buggy address belongs to the object at ffff888102a0bf80
[   13.619356]  which belongs to the cache kmalloc-64 of size 64
[   13.620078] The buggy address is located 0 bytes to the right of
[   13.620078]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.620455] 
[   13.620528] The buggy address belongs to the physical page:
[   13.620839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.621236] flags: 0x200000000000000(node=0|zone=2)
[   13.621506] page_type: f5(slab)
[   13.621713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.622064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.622292] page dumped because: kasan: bad access detected
[   13.622567] 
[   13.622659] Memory state around the buggy address:
[   13.622883]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.623168]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.623384] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.624071]                                      ^
[   13.624239]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.624613]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.624868] ==================================================================
[   13.701779] ==================================================================
[   13.702120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   13.702407] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.702767] 
[   13.702880] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.702936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.702949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.702970] Call Trace:
[   13.702989]  <TASK>
[   13.703007]  dump_stack_lvl+0x73/0xb0
[   13.703033]  print_report+0xd1/0x650
[   13.703056]  ? __virt_addr_valid+0x1db/0x2d0
[   13.703079]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.703118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.703151]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.703174]  kasan_report+0x141/0x180
[   13.703197]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.703235]  __asan_report_load4_noabort+0x18/0x20
[   13.703257]  kasan_atomics_helper+0x4a84/0x5450
[   13.703281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.703304]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.703327]  ? kasan_atomics+0x152/0x310
[   13.703351]  kasan_atomics+0x1dc/0x310
[   13.703370]  ? __pfx_kasan_atomics+0x10/0x10
[   13.703392]  ? __pfx_read_tsc+0x10/0x10
[   13.703413]  ? ktime_get_ts64+0x86/0x230
[   13.703438]  kunit_try_run_case+0x1a5/0x480
[   13.703473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.703496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.703521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.703575]  ? __kthread_parkme+0x82/0x180
[   13.703599]  ? preempt_count_sub+0x50/0x80
[   13.703625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.703658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.703682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.703706]  kthread+0x337/0x6f0
[   13.703724]  ? trace_preempt_on+0x20/0xc0
[   13.703747]  ? __pfx_kthread+0x10/0x10
[   13.703767]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.703789]  ? calculate_sigpending+0x7b/0xa0
[   13.703820]  ? __pfx_kthread+0x10/0x10
[   13.703839]  ret_from_fork+0x41/0x80
[   13.703860]  ? __pfx_kthread+0x10/0x10
[   13.703879]  ret_from_fork_asm+0x1a/0x30
[   13.703929]  </TASK>
[   13.703940] 
[   13.711622] Allocated by task 284:
[   13.711832]  kasan_save_stack+0x45/0x70
[   13.712068]  kasan_save_track+0x18/0x40
[   13.712244]  kasan_save_alloc_info+0x3b/0x50
[   13.712463]  __kasan_kmalloc+0xb7/0xc0
[   13.712712]  __kmalloc_cache_noprof+0x189/0x420
[   13.712941]  kasan_atomics+0x95/0x310
[   13.713073]  kunit_try_run_case+0x1a5/0x480
[   13.713219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.713445]  kthread+0x337/0x6f0
[   13.713626]  ret_from_fork+0x41/0x80
[   13.713807]  ret_from_fork_asm+0x1a/0x30
[   13.714211] 
[   13.714288] The buggy address belongs to the object at ffff888102a0bf80
[   13.714288]  which belongs to the cache kmalloc-64 of size 64
[   13.714710] The buggy address is located 0 bytes to the right of
[   13.714710]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.715405] 
[   13.715512] The buggy address belongs to the physical page:
[   13.715725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.716111] flags: 0x200000000000000(node=0|zone=2)
[   13.716356] page_type: f5(slab)
[   13.716527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.716886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.717219] page dumped because: kasan: bad access detected
[   13.717404] 
[   13.717473] Memory state around the buggy address:
[   13.717630]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.717847]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.718315] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.718735]                                      ^
[   13.718966]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.719243]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.719457] ==================================================================
[   13.813537] ==================================================================
[   13.814076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   13.814434] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.814777] 
[   13.814904] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.814967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.814980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.815014] Call Trace:
[   13.815034]  <TASK>
[   13.815054]  dump_stack_lvl+0x73/0xb0
[   13.815089]  print_report+0xd1/0x650
[   13.815112]  ? __virt_addr_valid+0x1db/0x2d0
[   13.815134]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.815168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.815192]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.815216]  kasan_report+0x141/0x180
[   13.815248]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.815276]  __asan_report_load4_noabort+0x18/0x20
[   13.815297]  kasan_atomics_helper+0x4a36/0x5450
[   13.815331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.815355]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.815377]  ? kasan_atomics+0x152/0x310
[   13.815410]  kasan_atomics+0x1dc/0x310
[   13.815431]  ? __pfx_kasan_atomics+0x10/0x10
[   13.815453]  ? __pfx_read_tsc+0x10/0x10
[   13.815485]  ? ktime_get_ts64+0x86/0x230
[   13.815512]  kunit_try_run_case+0x1a5/0x480
[   13.815545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.815588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.815623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.815648]  ? __kthread_parkme+0x82/0x180
[   13.815670]  ? preempt_count_sub+0x50/0x80
[   13.815697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.815722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.815746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.815769]  kthread+0x337/0x6f0
[   13.815787]  ? trace_preempt_on+0x20/0xc0
[   13.815811]  ? __pfx_kthread+0x10/0x10
[   13.815830]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.815852]  ? calculate_sigpending+0x7b/0xa0
[   13.815874]  ? __pfx_kthread+0x10/0x10
[   13.815894]  ret_from_fork+0x41/0x80
[   13.815923]  ? __pfx_kthread+0x10/0x10
[   13.815942]  ret_from_fork_asm+0x1a/0x30
[   13.815974]  </TASK>
[   13.815985] 
[   13.823482] Allocated by task 284:
[   13.823673]  kasan_save_stack+0x45/0x70
[   13.823827]  kasan_save_track+0x18/0x40
[   13.823974]  kasan_save_alloc_info+0x3b/0x50
[   13.824131]  __kasan_kmalloc+0xb7/0xc0
[   13.824358]  __kmalloc_cache_noprof+0x189/0x420
[   13.824638]  kasan_atomics+0x95/0x310
[   13.824859]  kunit_try_run_case+0x1a5/0x480
[   13.825107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.825365]  kthread+0x337/0x6f0
[   13.825527]  ret_from_fork+0x41/0x80
[   13.825706]  ret_from_fork_asm+0x1a/0x30
[   13.825941] 
[   13.826037] The buggy address belongs to the object at ffff888102a0bf80
[   13.826037]  which belongs to the cache kmalloc-64 of size 64
[   13.826574] The buggy address is located 0 bytes to the right of
[   13.826574]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.827098] 
[   13.827199] The buggy address belongs to the physical page:
[   13.827432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.827801] flags: 0x200000000000000(node=0|zone=2)
[   13.828049] page_type: f5(slab)
[   13.828220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.828546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.828931] page dumped because: kasan: bad access detected
[   13.829139] 
[   13.829212] Memory state around the buggy address:
[   13.829370]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.829732]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.830025] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.830238]                                      ^
[   13.830448]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.830791]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.831142] ==================================================================
[   13.861294] ==================================================================
[   13.861833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   13.862521] Read of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.862828] 
[   13.862953] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.863004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.863019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.863043] Call Trace:
[   13.863065]  <TASK>
[   13.863087]  dump_stack_lvl+0x73/0xb0
[   13.863116]  print_report+0xd1/0x650
[   13.863140]  ? __virt_addr_valid+0x1db/0x2d0
[   13.863164]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.863187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.863210]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.863233]  kasan_report+0x141/0x180
[   13.863256]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.863283]  __asan_report_load4_noabort+0x18/0x20
[   13.863305]  kasan_atomics_helper+0x4a1c/0x5450
[   13.863329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.863353]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.863376]  ? kasan_atomics+0x152/0x310
[   13.863400]  kasan_atomics+0x1dc/0x310
[   13.863420]  ? __pfx_kasan_atomics+0x10/0x10
[   13.863441]  ? __pfx_read_tsc+0x10/0x10
[   13.863463]  ? ktime_get_ts64+0x86/0x230
[   13.863489]  kunit_try_run_case+0x1a5/0x480
[   13.863516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.863539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.863565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.863590]  ? __kthread_parkme+0x82/0x180
[   13.863613]  ? preempt_count_sub+0x50/0x80
[   13.863639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.863663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.863688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.863711]  kthread+0x337/0x6f0
[   13.863730]  ? trace_preempt_on+0x20/0xc0
[   13.863754]  ? __pfx_kthread+0x10/0x10
[   13.863773]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.863795]  ? calculate_sigpending+0x7b/0xa0
[   13.863831]  ? __pfx_kthread+0x10/0x10
[   13.863850]  ret_from_fork+0x41/0x80
[   13.863871]  ? __pfx_kthread+0x10/0x10
[   13.863890]  ret_from_fork_asm+0x1a/0x30
[   13.863944]  </TASK>
[   13.863955] 
[   13.871420] Allocated by task 284:
[   13.871700]  kasan_save_stack+0x45/0x70
[   13.871908]  kasan_save_track+0x18/0x40
[   13.872105]  kasan_save_alloc_info+0x3b/0x50
[   13.872321]  __kasan_kmalloc+0xb7/0xc0
[   13.872509]  __kmalloc_cache_noprof+0x189/0x420
[   13.872816]  kasan_atomics+0x95/0x310
[   13.873005]  kunit_try_run_case+0x1a5/0x480
[   13.873203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.873439]  kthread+0x337/0x6f0
[   13.873623]  ret_from_fork+0x41/0x80
[   13.873802]  ret_from_fork_asm+0x1a/0x30
[   13.873977] 
[   13.874101] The buggy address belongs to the object at ffff888102a0bf80
[   13.874101]  which belongs to the cache kmalloc-64 of size 64
[   13.874583] The buggy address is located 0 bytes to the right of
[   13.874583]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.875116] 
[   13.875214] The buggy address belongs to the physical page:
[   13.875412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.875795] flags: 0x200000000000000(node=0|zone=2)
[   13.876046] page_type: f5(slab)
[   13.876223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.876556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.876823] page dumped because: kasan: bad access detected
[   13.877019] 
[   13.877113] Memory state around the buggy address:
[   13.877380]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.877849]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.878167] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.878419]                                      ^
[   13.878682]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.879019]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.879328] ==================================================================
[   13.916796] ==================================================================
[   13.917075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   13.917314] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.917560] 
[   13.917674] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.917720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.917732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.917755] Call Trace:
[   13.917775]  <TASK>
[   13.917795]  dump_stack_lvl+0x73/0xb0
[   13.917821]  print_report+0xd1/0x650
[   13.917844]  ? __virt_addr_valid+0x1db/0x2d0
[   13.917866]  ? kasan_atomics_helper+0x1217/0x5450
[   13.917888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.917912]  ? kasan_atomics_helper+0x1217/0x5450
[   13.918132]  kasan_report+0x141/0x180
[   13.918157]  ? kasan_atomics_helper+0x1217/0x5450
[   13.918198]  kasan_check_range+0x10c/0x1c0
[   13.918219]  __kasan_check_write+0x18/0x20
[   13.918240]  kasan_atomics_helper+0x1217/0x5450
[   13.918263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.918288]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.918311]  ? kasan_atomics+0x152/0x310
[   13.918335]  kasan_atomics+0x1dc/0x310
[   13.918355]  ? __pfx_kasan_atomics+0x10/0x10
[   13.918376]  ? __pfx_read_tsc+0x10/0x10
[   13.918397]  ? ktime_get_ts64+0x86/0x230
[   13.918423]  kunit_try_run_case+0x1a5/0x480
[   13.918449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.918471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.918496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.918520]  ? __kthread_parkme+0x82/0x180
[   13.918542]  ? preempt_count_sub+0x50/0x80
[   13.918578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.918602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.918626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.918650]  kthread+0x337/0x6f0
[   13.918667]  ? trace_preempt_on+0x20/0xc0
[   13.918691]  ? __pfx_kthread+0x10/0x10
[   13.918710]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.918732]  ? calculate_sigpending+0x7b/0xa0
[   13.918754]  ? __pfx_kthread+0x10/0x10
[   13.918774]  ret_from_fork+0x41/0x80
[   13.918795]  ? __pfx_kthread+0x10/0x10
[   13.918823]  ret_from_fork_asm+0x1a/0x30
[   13.918855]  </TASK>
[   13.918866] 
[   13.927675] Allocated by task 284:
[   13.928021]  kasan_save_stack+0x45/0x70
[   13.928312]  kasan_save_track+0x18/0x40
[   13.928622]  kasan_save_alloc_info+0x3b/0x50
[   13.928781]  __kasan_kmalloc+0xb7/0xc0
[   13.929020]  __kmalloc_cache_noprof+0x189/0x420
[   13.929464]  kasan_atomics+0x95/0x310
[   13.929871]  kunit_try_run_case+0x1a5/0x480
[   13.930078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.930538]  kthread+0x337/0x6f0
[   13.930883]  ret_from_fork+0x41/0x80
[   13.931208]  ret_from_fork_asm+0x1a/0x30
[   13.931351] 
[   13.931423] The buggy address belongs to the object at ffff888102a0bf80
[   13.931423]  which belongs to the cache kmalloc-64 of size 64
[   13.932280] The buggy address is located 0 bytes to the right of
[   13.932280]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.933365] 
[   13.933534] The buggy address belongs to the physical page:
[   13.934048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.934488] flags: 0x200000000000000(node=0|zone=2)
[   13.934690] page_type: f5(slab)
[   13.935019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.935482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.935869] page dumped because: kasan: bad access detected
[   13.936268] 
[   13.936339] Memory state around the buggy address:
[   13.936497]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.936866]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.937330] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.937545]                                      ^
[   13.938011]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.938633]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.939267] ==================================================================
[   14.002978] ==================================================================
[   14.003307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.003780] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.004087] 
[   14.004211] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.004266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.004279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.004302] Call Trace:
[   14.004323]  <TASK>
[   14.004343]  dump_stack_lvl+0x73/0xb0
[   14.004370]  print_report+0xd1/0x650
[   14.004395]  ? __virt_addr_valid+0x1db/0x2d0
[   14.004420]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.004442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.004466]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.004489]  kasan_report+0x141/0x180
[   14.004512]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.004540]  kasan_check_range+0x10c/0x1c0
[   14.004561]  __kasan_check_read+0x15/0x20
[   14.004581]  kasan_atomics_helper+0x13b5/0x5450
[   14.004605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.004628]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.004651]  ? kasan_atomics+0x152/0x310
[   14.004675]  kasan_atomics+0x1dc/0x310
[   14.004695]  ? __pfx_kasan_atomics+0x10/0x10
[   14.004716]  ? __pfx_read_tsc+0x10/0x10
[   14.004737]  ? ktime_get_ts64+0x86/0x230
[   14.005182]  kunit_try_run_case+0x1a5/0x480
[   14.005218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.005268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.005292]  ? __kthread_parkme+0x82/0x180
[   14.005316]  ? preempt_count_sub+0x50/0x80
[   14.005342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.005391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.005414]  kthread+0x337/0x6f0
[   14.005432]  ? trace_preempt_on+0x20/0xc0
[   14.005456]  ? __pfx_kthread+0x10/0x10
[   14.005474]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.005496]  ? calculate_sigpending+0x7b/0xa0
[   14.005519]  ? __pfx_kthread+0x10/0x10
[   14.005538]  ret_from_fork+0x41/0x80
[   14.005574]  ? __pfx_kthread+0x10/0x10
[   14.005593]  ret_from_fork_asm+0x1a/0x30
[   14.005625]  </TASK>
[   14.005637] 
[   14.015319] Allocated by task 284:
[   14.015589]  kasan_save_stack+0x45/0x70
[   14.015864]  kasan_save_track+0x18/0x40
[   14.016074]  kasan_save_alloc_info+0x3b/0x50
[   14.016368]  __kasan_kmalloc+0xb7/0xc0
[   14.016561]  __kmalloc_cache_noprof+0x189/0x420
[   14.016903]  kasan_atomics+0x95/0x310
[   14.017178]  kunit_try_run_case+0x1a5/0x480
[   14.017374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.017750]  kthread+0x337/0x6f0
[   14.017897]  ret_from_fork+0x41/0x80
[   14.018105]  ret_from_fork_asm+0x1a/0x30
[   14.018447] 
[   14.018552] The buggy address belongs to the object at ffff888102a0bf80
[   14.018552]  which belongs to the cache kmalloc-64 of size 64
[   14.019167] The buggy address is located 0 bytes to the right of
[   14.019167]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.019846] 
[   14.020048] The buggy address belongs to the physical page:
[   14.020303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.020784] flags: 0x200000000000000(node=0|zone=2)
[   14.021092] page_type: f5(slab)
[   14.021241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.021658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.022061] page dumped because: kasan: bad access detected
[   14.022324] 
[   14.022413] Memory state around the buggy address:
[   14.022641]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.023197]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.023604] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.023880]                                      ^
[   14.024265]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.024685]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.025007] ==================================================================
[   14.026072] ==================================================================
[   14.026392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.026888] Read of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.027137] 
[   14.027254] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.027301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.027314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.027339] Call Trace:
[   14.027359]  <TASK>
[   14.027379]  dump_stack_lvl+0x73/0xb0
[   14.027406]  print_report+0xd1/0x650
[   14.027430]  ? __virt_addr_valid+0x1db/0x2d0
[   14.027453]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.027476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.027500]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.027522]  kasan_report+0x141/0x180
[   14.027546]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.027573]  __asan_report_load8_noabort+0x18/0x20
[   14.027594]  kasan_atomics_helper+0x4eae/0x5450
[   14.027620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.027642]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.027666]  ? kasan_atomics+0x152/0x310
[   14.027690]  kasan_atomics+0x1dc/0x310
[   14.027710]  ? __pfx_kasan_atomics+0x10/0x10
[   14.027742]  ? __pfx_read_tsc+0x10/0x10
[   14.027764]  ? ktime_get_ts64+0x86/0x230
[   14.027790]  kunit_try_run_case+0x1a5/0x480
[   14.027816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.027839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.027864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.027891]  ? __kthread_parkme+0x82/0x180
[   14.027926]  ? preempt_count_sub+0x50/0x80
[   14.027953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.027977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.028001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.028026]  kthread+0x337/0x6f0
[   14.028043]  ? trace_preempt_on+0x20/0xc0
[   14.028067]  ? __pfx_kthread+0x10/0x10
[   14.028086]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.028109]  ? calculate_sigpending+0x7b/0xa0
[   14.028131]  ? __pfx_kthread+0x10/0x10
[   14.028151]  ret_from_fork+0x41/0x80
[   14.028172]  ? __pfx_kthread+0x10/0x10
[   14.028191]  ret_from_fork_asm+0x1a/0x30
[   14.028223]  </TASK>
[   14.028235] 
[   14.035225] Allocated by task 284:
[   14.035360]  kasan_save_stack+0x45/0x70
[   14.035600]  kasan_save_track+0x18/0x40
[   14.035792]  kasan_save_alloc_info+0x3b/0x50
[   14.036030]  __kasan_kmalloc+0xb7/0xc0
[   14.036222]  __kmalloc_cache_noprof+0x189/0x420
[   14.036457]  kasan_atomics+0x95/0x310
[   14.036633]  kunit_try_run_case+0x1a5/0x480
[   14.036836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.037061]  kthread+0x337/0x6f0
[   14.037207]  ret_from_fork+0x41/0x80
[   14.037383]  ret_from_fork_asm+0x1a/0x30
[   14.037538] 
[   14.037633] The buggy address belongs to the object at ffff888102a0bf80
[   14.037633]  which belongs to the cache kmalloc-64 of size 64
[   14.038122] The buggy address is located 0 bytes to the right of
[   14.038122]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.038506] 
[   14.038601] The buggy address belongs to the physical page:
[   14.038853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.039217] flags: 0x200000000000000(node=0|zone=2)
[   14.039528] page_type: f5(slab)
[   14.039688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.040079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.040372] page dumped because: kasan: bad access detected
[   14.040564] 
[   14.040634] Memory state around the buggy address:
[   14.040791]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.041306]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.041635] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.041905]                                      ^
[   14.042152]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.042414]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.042749] ==================================================================
[   14.449628] ==================================================================
[   14.450116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.450364] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.450862] 
[   14.451022] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.451084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.451097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.451121] Call Trace:
[   14.451142]  <TASK>
[   14.451163]  dump_stack_lvl+0x73/0xb0
[   14.451189]  print_report+0xd1/0x650
[   14.451213]  ? __virt_addr_valid+0x1db/0x2d0
[   14.451237]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.451259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.451283]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.451306]  kasan_report+0x141/0x180
[   14.451330]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.451357]  kasan_check_range+0x10c/0x1c0
[   14.451379]  __kasan_check_write+0x18/0x20
[   14.451399]  kasan_atomics_helper+0x1eaa/0x5450
[   14.451423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.451449]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.451472]  ? kasan_atomics+0x152/0x310
[   14.451497]  kasan_atomics+0x1dc/0x310
[   14.451517]  ? __pfx_kasan_atomics+0x10/0x10
[   14.451539]  ? __pfx_read_tsc+0x10/0x10
[   14.451560]  ? ktime_get_ts64+0x86/0x230
[   14.451587]  kunit_try_run_case+0x1a5/0x480
[   14.451613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.451662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.451718]  ? __kthread_parkme+0x82/0x180
[   14.451741]  ? preempt_count_sub+0x50/0x80
[   14.451767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.451851]  kthread+0x337/0x6f0
[   14.451868]  ? trace_preempt_on+0x20/0xc0
[   14.451895]  ? __pfx_kthread+0x10/0x10
[   14.451913]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.451945]  ? calculate_sigpending+0x7b/0xa0
[   14.451967]  ? __pfx_kthread+0x10/0x10
[   14.451987]  ret_from_fork+0x41/0x80
[   14.452007]  ? __pfx_kthread+0x10/0x10
[   14.452026]  ret_from_fork_asm+0x1a/0x30
[   14.452057]  </TASK>
[   14.452069] 
[   14.460480] Allocated by task 284:
[   14.460622]  kasan_save_stack+0x45/0x70
[   14.460771]  kasan_save_track+0x18/0x40
[   14.460903]  kasan_save_alloc_info+0x3b/0x50
[   14.461117]  __kasan_kmalloc+0xb7/0xc0
[   14.461306]  __kmalloc_cache_noprof+0x189/0x420
[   14.461583]  kasan_atomics+0x95/0x310
[   14.461842]  kunit_try_run_case+0x1a5/0x480
[   14.462162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.462509]  kthread+0x337/0x6f0
[   14.462816]  ret_from_fork+0x41/0x80
[   14.463011]  ret_from_fork_asm+0x1a/0x30
[   14.463228] 
[   14.463350] The buggy address belongs to the object at ffff888102a0bf80
[   14.463350]  which belongs to the cache kmalloc-64 of size 64
[   14.463928] The buggy address is located 0 bytes to the right of
[   14.463928]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.464405] 
[   14.464508] The buggy address belongs to the physical page:
[   14.464895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.465147] flags: 0x200000000000000(node=0|zone=2)
[   14.465308] page_type: f5(slab)
[   14.465431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.466050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.466410] page dumped because: kasan: bad access detected
[   14.466891] 
[   14.467036] Memory state around the buggy address:
[   14.467278]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.467620]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.467877] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.468238]                                      ^
[   14.468482]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.468828]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.469155] ==================================================================
[   14.551972] ==================================================================
[   14.552327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.552739] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.553122] 
[   14.553279] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.553340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.553354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.553379] Call Trace:
[   14.553401]  <TASK>
[   14.553421]  dump_stack_lvl+0x73/0xb0
[   14.553449]  print_report+0xd1/0x650
[   14.553473]  ? __virt_addr_valid+0x1db/0x2d0
[   14.553497]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.553519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.553543]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.553566]  kasan_report+0x141/0x180
[   14.553601]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.553628]  kasan_check_range+0x10c/0x1c0
[   14.553649]  __kasan_check_write+0x18/0x20
[   14.553670]  kasan_atomics_helper+0x20c8/0x5450
[   14.553693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.553717]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.553770]  ? kasan_atomics+0x152/0x310
[   14.553795]  kasan_atomics+0x1dc/0x310
[   14.553815]  ? __pfx_kasan_atomics+0x10/0x10
[   14.553848]  ? __pfx_read_tsc+0x10/0x10
[   14.553868]  ? ktime_get_ts64+0x86/0x230
[   14.553895]  kunit_try_run_case+0x1a5/0x480
[   14.553957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.553980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.554016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.554041]  ? __kthread_parkme+0x82/0x180
[   14.554089]  ? preempt_count_sub+0x50/0x80
[   14.554116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.554141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.554199]  kthread+0x337/0x6f0
[   14.554241]  ? trace_preempt_on+0x20/0xc0
[   14.554267]  ? __pfx_kthread+0x10/0x10
[   14.554285]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.554318]  ? calculate_sigpending+0x7b/0xa0
[   14.554341]  ? __pfx_kthread+0x10/0x10
[   14.554385]  ret_from_fork+0x41/0x80
[   14.554407]  ? __pfx_kthread+0x10/0x10
[   14.554453]  ret_from_fork_asm+0x1a/0x30
[   14.554515]  </TASK>
[   14.554541] 
[   14.562790] Allocated by task 284:
[   14.562947]  kasan_save_stack+0x45/0x70
[   14.563144]  kasan_save_track+0x18/0x40
[   14.563385]  kasan_save_alloc_info+0x3b/0x50
[   14.563621]  __kasan_kmalloc+0xb7/0xc0
[   14.563857]  __kmalloc_cache_noprof+0x189/0x420
[   14.564109]  kasan_atomics+0x95/0x310
[   14.564316]  kunit_try_run_case+0x1a5/0x480
[   14.564556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.564845]  kthread+0x337/0x6f0
[   14.565035]  ret_from_fork+0x41/0x80
[   14.565228]  ret_from_fork_asm+0x1a/0x30
[   14.565456] 
[   14.565576] The buggy address belongs to the object at ffff888102a0bf80
[   14.565576]  which belongs to the cache kmalloc-64 of size 64
[   14.566063] The buggy address is located 0 bytes to the right of
[   14.566063]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.566649] 
[   14.566748] The buggy address belongs to the physical page:
[   14.566939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.567338] flags: 0x200000000000000(node=0|zone=2)
[   14.567618] page_type: f5(slab)
[   14.567821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.568195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.568496] page dumped because: kasan: bad access detected
[   14.568889] 
[   14.569007] Memory state around the buggy address:
[   14.569200]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.569595]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.569842] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.570123]                                      ^
[   14.570277]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.570486]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.571045] ==================================================================
[   14.043342] ==================================================================
[   14.044044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.044376] Write of size 8 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   14.044618] 
[   14.044709] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   14.044756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.044772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.044795] Call Trace:
[   14.044817]  <TASK>
[   14.044837]  dump_stack_lvl+0x73/0xb0
[   14.044862]  print_report+0xd1/0x650
[   14.044887]  ? __virt_addr_valid+0x1db/0x2d0
[   14.044910]  ? kasan_atomics_helper+0x1467/0x5450
[   14.045343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.045368]  ? kasan_atomics_helper+0x1467/0x5450
[   14.045392]  kasan_report+0x141/0x180
[   14.045418]  ? kasan_atomics_helper+0x1467/0x5450
[   14.045446]  kasan_check_range+0x10c/0x1c0
[   14.045468]  __kasan_check_write+0x18/0x20
[   14.045488]  kasan_atomics_helper+0x1467/0x5450
[   14.045512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.045535]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.045558]  ? kasan_atomics+0x152/0x310
[   14.045582]  kasan_atomics+0x1dc/0x310
[   14.045602]  ? __pfx_kasan_atomics+0x10/0x10
[   14.045624]  ? __pfx_read_tsc+0x10/0x10
[   14.045645]  ? ktime_get_ts64+0x86/0x230
[   14.045672]  kunit_try_run_case+0x1a5/0x480
[   14.045698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.045721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.045746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.045770]  ? __kthread_parkme+0x82/0x180
[   14.045793]  ? preempt_count_sub+0x50/0x80
[   14.045819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.045843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.045867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.045891]  kthread+0x337/0x6f0
[   14.045908]  ? trace_preempt_on+0x20/0xc0
[   14.046097]  ? __pfx_kthread+0x10/0x10
[   14.046116]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.046138]  ? calculate_sigpending+0x7b/0xa0
[   14.046161]  ? __pfx_kthread+0x10/0x10
[   14.046181]  ret_from_fork+0x41/0x80
[   14.046202]  ? __pfx_kthread+0x10/0x10
[   14.046221]  ret_from_fork_asm+0x1a/0x30
[   14.046253]  </TASK>
[   14.046266] 
[   14.053870] Allocated by task 284:
[   14.054173]  kasan_save_stack+0x45/0x70
[   14.054350]  kasan_save_track+0x18/0x40
[   14.054489]  kasan_save_alloc_info+0x3b/0x50
[   14.054827]  __kasan_kmalloc+0xb7/0xc0
[   14.055024]  __kmalloc_cache_noprof+0x189/0x420
[   14.055178]  kasan_atomics+0x95/0x310
[   14.055309]  kunit_try_run_case+0x1a5/0x480
[   14.055478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.055737]  kthread+0x337/0x6f0
[   14.055981]  ret_from_fork+0x41/0x80
[   14.056277]  ret_from_fork_asm+0x1a/0x30
[   14.056580] 
[   14.056668] The buggy address belongs to the object at ffff888102a0bf80
[   14.056668]  which belongs to the cache kmalloc-64 of size 64
[   14.057125] The buggy address is located 0 bytes to the right of
[   14.057125]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   14.057491] 
[   14.057564] The buggy address belongs to the physical page:
[   14.057739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   14.058105] flags: 0x200000000000000(node=0|zone=2)
[   14.058345] page_type: f5(slab)
[   14.058520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.058861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.059342] page dumped because: kasan: bad access detected
[   14.059545] 
[   14.059614] Memory state around the buggy address:
[   14.059771]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.060148]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.060472] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.060904]                                      ^
[   14.061178]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.061405]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   14.061652] ==================================================================
[   13.493982] ==================================================================
[   13.494346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.495173] Write of size 4 at addr ffff888102a0bfb0 by task kunit_try_catch/284
[   13.495495] 
[   13.495596] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.495640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.495653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.495676] Call Trace:
[   13.495693]  <TASK>
[   13.495711]  dump_stack_lvl+0x73/0xb0
[   13.495737]  print_report+0xd1/0x650
[   13.495760]  ? __virt_addr_valid+0x1db/0x2d0
[   13.495783]  ? kasan_atomics_helper+0x697/0x5450
[   13.495804]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.495828]  ? kasan_atomics_helper+0x697/0x5450
[   13.495850]  kasan_report+0x141/0x180
[   13.495873]  ? kasan_atomics_helper+0x697/0x5450
[   13.495900]  kasan_check_range+0x10c/0x1c0
[   13.495934]  __kasan_check_write+0x18/0x20
[   13.495955]  kasan_atomics_helper+0x697/0x5450
[   13.495979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.496002]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.496024]  ? kasan_atomics+0x152/0x310
[   13.496048]  kasan_atomics+0x1dc/0x310
[   13.496068]  ? __pfx_kasan_atomics+0x10/0x10
[   13.496089]  ? __pfx_read_tsc+0x10/0x10
[   13.496109]  ? ktime_get_ts64+0x86/0x230
[   13.496136]  kunit_try_run_case+0x1a5/0x480
[   13.496161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.496184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.496209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.496235]  ? __kthread_parkme+0x82/0x180
[   13.496264]  ? preempt_count_sub+0x50/0x80
[   13.496290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.496314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.496338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.496361]  kthread+0x337/0x6f0
[   13.496379]  ? trace_preempt_on+0x20/0xc0
[   13.496403]  ? __pfx_kthread+0x10/0x10
[   13.496422]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.496444]  ? calculate_sigpending+0x7b/0xa0
[   13.496467]  ? __pfx_kthread+0x10/0x10
[   13.496486]  ret_from_fork+0x41/0x80
[   13.496507]  ? __pfx_kthread+0x10/0x10
[   13.496526]  ret_from_fork_asm+0x1a/0x30
[   13.496558]  </TASK>
[   13.496568] 
[   13.503793] Allocated by task 284:
[   13.503942]  kasan_save_stack+0x45/0x70
[   13.504146]  kasan_save_track+0x18/0x40
[   13.504328]  kasan_save_alloc_info+0x3b/0x50
[   13.504505]  __kasan_kmalloc+0xb7/0xc0
[   13.504757]  __kmalloc_cache_noprof+0x189/0x420
[   13.504974]  kasan_atomics+0x95/0x310
[   13.505110]  kunit_try_run_case+0x1a5/0x480
[   13.505258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.505432]  kthread+0x337/0x6f0
[   13.505551]  ret_from_fork+0x41/0x80
[   13.505734]  ret_from_fork_asm+0x1a/0x30
[   13.505938] 
[   13.506033] The buggy address belongs to the object at ffff888102a0bf80
[   13.506033]  which belongs to the cache kmalloc-64 of size 64
[   13.506824] The buggy address is located 0 bytes to the right of
[   13.506824]  allocated 48-byte region [ffff888102a0bf80, ffff888102a0bfb0)
[   13.507229] 
[   13.507302] The buggy address belongs to the physical page:
[   13.507769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   13.508140] flags: 0x200000000000000(node=0|zone=2)
[   13.508358] page_type: f5(slab)
[   13.508510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.508949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.509180] page dumped because: kasan: bad access detected
[   13.509436] 
[   13.509530] Memory state around the buggy address:
[   13.509949]  ffff888102a0be80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.510220]  ffff888102a0bf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.510511] >ffff888102a0bf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.510778]                                      ^
[   13.510944]  ffff888102a0c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.511264]  ffff888102a0c080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   13.511612] ==================================================================