Hay
Date
June 23, 2025, 1:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.002152] ==================================================================
[   29.002713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.002982] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.003436] 
[   29.003513] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.003704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.003744] Hardware name: linux,dummy-virt (DT)
[   29.003786] Call trace:
[   29.003837]  show_stack+0x20/0x38 (C)
[   29.003960]  dump_stack_lvl+0x8c/0xd0
[   29.004099]  print_report+0x118/0x608
[   29.004220]  kasan_report+0xdc/0x128
[   29.004555]  __asan_report_store8_noabort+0x20/0x30
[   29.004846]  kasan_atomics_helper+0x3e5c/0x4858
[   29.005435]  kasan_atomics+0x198/0x2e0
[   29.005580]  kunit_try_run_case+0x170/0x3f0
[   29.005718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.005871]  kthread+0x328/0x630
[   29.005992]  ret_from_fork+0x10/0x20
[   29.006119] 
[   29.006168] Allocated by task 267:
[   29.006284]  kasan_save_stack+0x3c/0x68
[   29.006495]  kasan_save_track+0x20/0x40
[   29.006638]  kasan_save_alloc_info+0x40/0x58
[   29.006757]  __kasan_kmalloc+0xd4/0xd8
[   29.006950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.007092]  kasan_atomics+0xb8/0x2e0
[   29.007190]  kunit_try_run_case+0x170/0x3f0
[   29.007308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007547]  kthread+0x328/0x630
[   29.007656]  ret_from_fork+0x10/0x20
[   29.007932] 
[   29.008049] The buggy address belongs to the object at fff00000c7054a00
[   29.008049]  which belongs to the cache kmalloc-64 of size 64
[   29.008222] The buggy address is located 0 bytes to the right of
[   29.008222]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.008376] 
[   29.008445] The buggy address belongs to the physical page:
[   29.008520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.008688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.008808] page_type: f5(slab)
[   29.009070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.009419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.009528] page dumped because: kasan: bad access detected
[   29.009657] 
[   29.009744] Memory state around the buggy address:
[   29.009882]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.010003]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.010134] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.010329]                                      ^
[   29.010452]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010646]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.010754] ==================================================================
[   29.329988] ==================================================================
[   29.330127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.330306] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.330490] 
[   29.330578] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.330799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.330870] Hardware name: linux,dummy-virt (DT)
[   29.331042] Call trace:
[   29.331106]  show_stack+0x20/0x38 (C)
[   29.331273]  dump_stack_lvl+0x8c/0xd0
[   29.331626]  print_report+0x118/0x608
[   29.331815]  kasan_report+0xdc/0x128
[   29.332160]  __asan_report_load8_noabort+0x20/0x30
[   29.332295]  kasan_atomics_helper+0x3df4/0x4858
[   29.332440]  kasan_atomics+0x198/0x2e0
[   29.332660]  kunit_try_run_case+0x170/0x3f0
[   29.332873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.333282]  kthread+0x328/0x630
[   29.333750]  ret_from_fork+0x10/0x20
[   29.333907] 
[   29.333965] Allocated by task 267:
[   29.334053]  kasan_save_stack+0x3c/0x68
[   29.334277]  kasan_save_track+0x20/0x40
[   29.334493]  kasan_save_alloc_info+0x40/0x58
[   29.334606]  __kasan_kmalloc+0xd4/0xd8
[   29.334706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.334807]  kasan_atomics+0xb8/0x2e0
[   29.334908]  kunit_try_run_case+0x170/0x3f0
[   29.335017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.335137]  kthread+0x328/0x630
[   29.335228]  ret_from_fork+0x10/0x20
[   29.335342] 
[   29.335426] The buggy address belongs to the object at fff00000c7054a00
[   29.335426]  which belongs to the cache kmalloc-64 of size 64
[   29.335743] The buggy address is located 0 bytes to the right of
[   29.335743]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.335924] 
[   29.336014] The buggy address belongs to the physical page:
[   29.336134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.336432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.336574] page_type: f5(slab)
[   29.336777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.336906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.337115] page dumped because: kasan: bad access detected
[   29.337271] 
[   29.337404] Memory state around the buggy address:
[   29.337570]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.337687]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.337796] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.337906]                                      ^
[   29.338138]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.338248]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.338352] ==================================================================
[   29.177609] ==================================================================
[   29.177711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.177816] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.177932] 
[   29.178004] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.178198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.178262] Hardware name: linux,dummy-virt (DT)
[   29.178338] Call trace:
[   29.178410]  show_stack+0x20/0x38 (C)
[   29.178592]  dump_stack_lvl+0x8c/0xd0
[   29.178739]  print_report+0x118/0x608
[   29.178881]  kasan_report+0xdc/0x128
[   29.179018]  kasan_check_range+0x100/0x1a8
[   29.179165]  __kasan_check_write+0x20/0x30
[   29.179302]  kasan_atomics_helper+0x12d8/0x4858
[   29.179555]  kasan_atomics+0x198/0x2e0
[   29.179860]  kunit_try_run_case+0x170/0x3f0
[   29.180408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.180613]  kthread+0x328/0x630
[   29.180822]  ret_from_fork+0x10/0x20
[   29.181032] 
[   29.181092] Allocated by task 267:
[   29.181655]  kasan_save_stack+0x3c/0x68
[   29.181831]  kasan_save_track+0x20/0x40
[   29.182213]  kasan_save_alloc_info+0x40/0x58
[   29.182603]  __kasan_kmalloc+0xd4/0xd8
[   29.182845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.183073]  kasan_atomics+0xb8/0x2e0
[   29.183218]  kunit_try_run_case+0x170/0x3f0
[   29.183419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.183608]  kthread+0x328/0x630
[   29.183710]  ret_from_fork+0x10/0x20
[   29.183834] 
[   29.183886] The buggy address belongs to the object at fff00000c7054a00
[   29.183886]  which belongs to the cache kmalloc-64 of size 64
[   29.184030] The buggy address is located 0 bytes to the right of
[   29.184030]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.184774] 
[   29.185151] The buggy address belongs to the physical page:
[   29.185436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.186160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.186929] page_type: f5(slab)
[   29.187107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.187861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.188124] page dumped because: kasan: bad access detected
[   29.189514] 
[   29.189991] Memory state around the buggy address:
[   29.190269]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.190625]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.191141] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.191265]                                      ^
[   29.191754]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.192085]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.192188] ==================================================================
[   29.075794] ==================================================================
[   29.075946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.076060] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.076245] 
[   29.076411] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.076620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.077429] Hardware name: linux,dummy-virt (DT)
[   29.077542] Call trace:
[   29.077620]  show_stack+0x20/0x38 (C)
[   29.078170]  dump_stack_lvl+0x8c/0xd0
[   29.078303]  print_report+0x118/0x608
[   29.078994]  kasan_report+0xdc/0x128
[   29.079551]  kasan_check_range+0x100/0x1a8
[   29.079726]  __kasan_check_write+0x20/0x30
[   29.079853]  kasan_atomics_helper+0x10c0/0x4858
[   29.080074]  kasan_atomics+0x198/0x2e0
[   29.080199]  kunit_try_run_case+0x170/0x3f0
[   29.080337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.080876]  kthread+0x328/0x630
[   29.081140]  ret_from_fork+0x10/0x20
[   29.081569] 
[   29.081656] Allocated by task 267:
[   29.081915]  kasan_save_stack+0x3c/0x68
[   29.082148]  kasan_save_track+0x20/0x40
[   29.082268]  kasan_save_alloc_info+0x40/0x58
[   29.082367]  __kasan_kmalloc+0xd4/0xd8
[   29.082852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.082967]  kasan_atomics+0xb8/0x2e0
[   29.083631]  kunit_try_run_case+0x170/0x3f0
[   29.084109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.084222]  kthread+0x328/0x630
[   29.084314]  ret_from_fork+0x10/0x20
[   29.085582] 
[   29.085638] The buggy address belongs to the object at fff00000c7054a00
[   29.085638]  which belongs to the cache kmalloc-64 of size 64
[   29.086438] The buggy address is located 0 bytes to the right of
[   29.086438]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.086596] 
[   29.086655] The buggy address belongs to the physical page:
[   29.088476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.088608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.088723] page_type: f5(slab)
[   29.088826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.089523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.089634] page dumped because: kasan: bad access detected
[   29.089715] 
[   29.089764] Memory state around the buggy address:
[   29.089849]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.091656]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.092640] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.092895]                                      ^
[   29.093380]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.094360]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.094951] ==================================================================
[   29.043788] ==================================================================
[   29.043891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.044011] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.044461] 
[   29.044675] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.045005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.045079] Hardware name: linux,dummy-virt (DT)
[   29.045165] Call trace:
[   29.045235]  show_stack+0x20/0x38 (C)
[   29.045458]  dump_stack_lvl+0x8c/0xd0
[   29.046089]  print_report+0x118/0x608
[   29.046230]  kasan_report+0xdc/0x128
[   29.046355]  kasan_check_range+0x100/0x1a8
[   29.046497]  __kasan_check_write+0x20/0x30
[   29.046689]  kasan_atomics_helper+0xf88/0x4858
[   29.047336]  kasan_atomics+0x198/0x2e0
[   29.047512]  kunit_try_run_case+0x170/0x3f0
[   29.047645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.047838]  kthread+0x328/0x630
[   29.048202]  ret_from_fork+0x10/0x20
[   29.048774] 
[   29.048838] Allocated by task 267:
[   29.048902]  kasan_save_stack+0x3c/0x68
[   29.048959]  kasan_save_track+0x20/0x40
[   29.049005]  kasan_save_alloc_info+0x40/0x58
[   29.049364]  __kasan_kmalloc+0xd4/0xd8
[   29.049537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.049670]  kasan_atomics+0xb8/0x2e0
[   29.049762]  kunit_try_run_case+0x170/0x3f0
[   29.049857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.050513]  kthread+0x328/0x630
[   29.050730]  ret_from_fork+0x10/0x20
[   29.051073] 
[   29.051214] The buggy address belongs to the object at fff00000c7054a00
[   29.051214]  which belongs to the cache kmalloc-64 of size 64
[   29.051692] The buggy address is located 0 bytes to the right of
[   29.051692]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.051808] 
[   29.051835] The buggy address belongs to the physical page:
[   29.051874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.051939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.052000] page_type: f5(slab)
[   29.052050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.052113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.052164] page dumped because: kasan: bad access detected
[   29.052206] 
[   29.052229] Memory state around the buggy address:
[   29.052269]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.052324]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.052378] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.052619]                                      ^
[   29.052718]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.052833]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.053030] ==================================================================
[   28.924935] ==================================================================
[   28.925042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   28.925167] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.925753] 
[   28.925842] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.926605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.926739] Hardware name: linux,dummy-virt (DT)
[   28.926974] Call trace:
[   28.927038]  show_stack+0x20/0x38 (C)
[   28.927171]  dump_stack_lvl+0x8c/0xd0
[   28.927293]  print_report+0x118/0x608
[   28.927439]  kasan_report+0xdc/0x128
[   28.927709]  __asan_report_load4_noabort+0x20/0x30
[   28.927887]  kasan_atomics_helper+0x3dd8/0x4858
[   28.928038]  kasan_atomics+0x198/0x2e0
[   28.928161]  kunit_try_run_case+0x170/0x3f0
[   28.928506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.928647]  kthread+0x328/0x630
[   28.928808]  ret_from_fork+0x10/0x20
[   28.929171] 
[   28.929337] Allocated by task 267:
[   28.929430]  kasan_save_stack+0x3c/0x68
[   28.929543]  kasan_save_track+0x20/0x40
[   28.929650]  kasan_save_alloc_info+0x40/0x58
[   28.929801]  __kasan_kmalloc+0xd4/0xd8
[   28.930069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.930186]  kasan_atomics+0xb8/0x2e0
[   28.930298]  kunit_try_run_case+0x170/0x3f0
[   28.931518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.931648]  kthread+0x328/0x630
[   28.932235]  ret_from_fork+0x10/0x20
[   28.932620] 
[   28.932675] The buggy address belongs to the object at fff00000c7054a00
[   28.932675]  which belongs to the cache kmalloc-64 of size 64
[   28.932848] The buggy address is located 0 bytes to the right of
[   28.932848]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.933040] 
[   28.933152] The buggy address belongs to the physical page:
[   28.933341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.933494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.933618] page_type: f5(slab)
[   28.933819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.933952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.934057] page dumped because: kasan: bad access detected
[   28.934136] 
[   28.934182] Memory state around the buggy address:
[   28.934273]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.935058]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.935374] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.936114]                                      ^
[   28.936241]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.936358]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.936627] ==================================================================
[   29.226779] ==================================================================
[   29.227513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.227657] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.227789] 
[   29.227998] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.228205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.228282] Hardware name: linux,dummy-virt (DT)
[   29.228361] Call trace:
[   29.228442]  show_stack+0x20/0x38 (C)
[   29.228564]  dump_stack_lvl+0x8c/0xd0
[   29.228685]  print_report+0x118/0x608
[   29.228798]  kasan_report+0xdc/0x128
[   29.228913]  __asan_report_load8_noabort+0x20/0x30
[   29.229038]  kasan_atomics_helper+0x3f04/0x4858
[   29.229153]  kasan_atomics+0x198/0x2e0
[   29.229281]  kunit_try_run_case+0x170/0x3f0
[   29.229426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.229561]  kthread+0x328/0x630
[   29.229678]  ret_from_fork+0x10/0x20
[   29.229796] 
[   29.229847] Allocated by task 267:
[   29.229914]  kasan_save_stack+0x3c/0x68
[   29.230009]  kasan_save_track+0x20/0x40
[   29.231071]  kasan_save_alloc_info+0x40/0x58
[   29.231253]  __kasan_kmalloc+0xd4/0xd8
[   29.231355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.231608]  kasan_atomics+0xb8/0x2e0
[   29.231708]  kunit_try_run_case+0x170/0x3f0
[   29.232437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.232590]  kthread+0x328/0x630
[   29.232817]  ret_from_fork+0x10/0x20
[   29.233090] 
[   29.233262] The buggy address belongs to the object at fff00000c7054a00
[   29.233262]  which belongs to the cache kmalloc-64 of size 64
[   29.233547] The buggy address is located 0 bytes to the right of
[   29.233547]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.233730] 
[   29.233788] The buggy address belongs to the physical page:
[   29.233833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.233901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.235284] page_type: f5(slab)
[   29.235521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.236217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.236356] page dumped because: kasan: bad access detected
[   29.236468] 
[   29.236524] Memory state around the buggy address:
[   29.236612]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.236867]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.237020] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.237130]                                      ^
[   29.237232]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.237415]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.237671] ==================================================================
[   29.011936] ==================================================================
[   29.012054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.012165] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.012282] 
[   29.012350] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.012563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.012635] Hardware name: linux,dummy-virt (DT)
[   29.012711] Call trace:
[   29.012763]  show_stack+0x20/0x38 (C)
[   29.012879]  dump_stack_lvl+0x8c/0xd0
[   29.013001]  print_report+0x118/0x608
[   29.013113]  kasan_report+0xdc/0x128
[   29.013236]  kasan_check_range+0x100/0x1a8
[   29.013356]  __kasan_check_write+0x20/0x30
[   29.013499]  kasan_atomics_helper+0xeb8/0x4858
[   29.013640]  kasan_atomics+0x198/0x2e0
[   29.015006]  kunit_try_run_case+0x170/0x3f0
[   29.015233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.015406]  kthread+0x328/0x630
[   29.016223]  ret_from_fork+0x10/0x20
[   29.016638] 
[   29.017349] Allocated by task 267:
[   29.017468]  kasan_save_stack+0x3c/0x68
[   29.017654]  kasan_save_track+0x20/0x40
[   29.017910]  kasan_save_alloc_info+0x40/0x58
[   29.018064]  __kasan_kmalloc+0xd4/0xd8
[   29.018167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.018270]  kasan_atomics+0xb8/0x2e0
[   29.018360]  kunit_try_run_case+0x170/0x3f0
[   29.018483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.018597]  kthread+0x328/0x630
[   29.018695]  ret_from_fork+0x10/0x20
[   29.018787] 
[   29.018837] The buggy address belongs to the object at fff00000c7054a00
[   29.018837]  which belongs to the cache kmalloc-64 of size 64
[   29.018979] The buggy address is located 0 bytes to the right of
[   29.018979]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.021845] 
[   29.022267] The buggy address belongs to the physical page:
[   29.023221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.023587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.023797] page_type: f5(slab)
[   29.024929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.025063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.026226] page dumped because: kasan: bad access detected
[   29.026318] 
[   29.026368] Memory state around the buggy address:
[   29.027204]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027648]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.027772] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.027863]                                      ^
[   29.027947]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.028054]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.029556] ==================================================================
[   29.277535] ==================================================================
[   29.277639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.278029] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.278403] 
[   29.279011] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.279260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.279882] Hardware name: linux,dummy-virt (DT)
[   29.279969] Call trace:
[   29.280038]  show_stack+0x20/0x38 (C)
[   29.280335]  dump_stack_lvl+0x8c/0xd0
[   29.280508]  print_report+0x118/0x608
[   29.280621]  kasan_report+0xdc/0x128
[   29.280745]  kasan_check_range+0x100/0x1a8
[   29.281022]  __kasan_check_write+0x20/0x30
[   29.281167]  kasan_atomics_helper+0x154c/0x4858
[   29.281309]  kasan_atomics+0x198/0x2e0
[   29.281444]  kunit_try_run_case+0x170/0x3f0
[   29.281566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281757]  kthread+0x328/0x630
[   29.282088]  ret_from_fork+0x10/0x20
[   29.282218] 
[   29.282268] Allocated by task 267:
[   29.282372]  kasan_save_stack+0x3c/0x68
[   29.282503]  kasan_save_track+0x20/0x40
[   29.282771]  kasan_save_alloc_info+0x40/0x58
[   29.282933]  __kasan_kmalloc+0xd4/0xd8
[   29.283051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.283156]  kasan_atomics+0xb8/0x2e0
[   29.283270]  kunit_try_run_case+0x170/0x3f0
[   29.283385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.283569]  kthread+0x328/0x630
[   29.283708]  ret_from_fork+0x10/0x20
[   29.284013] 
[   29.284311] The buggy address belongs to the object at fff00000c7054a00
[   29.284311]  which belongs to the cache kmalloc-64 of size 64
[   29.284484] The buggy address is located 0 bytes to the right of
[   29.284484]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.284714] 
[   29.284773] The buggy address belongs to the physical page:
[   29.284867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.285168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.285522] page_type: f5(slab)
[   29.285681] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.285808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.285915] page dumped because: kasan: bad access detected
[   29.286036] 
[   29.286083] Memory state around the buggy address:
[   29.286163]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.286384]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.286657] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.286848]                                      ^
[   29.286942]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287063]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.287175] ==================================================================
[   29.112673] ==================================================================
[   29.112794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.113089] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.113263] 
[   29.113473] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.114702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.114795] Hardware name: linux,dummy-virt (DT)
[   29.115145] Call trace:
[   29.115487]  show_stack+0x20/0x38 (C)
[   29.115621]  dump_stack_lvl+0x8c/0xd0
[   29.116241]  print_report+0x118/0x608
[   29.116363]  kasan_report+0xdc/0x128
[   29.117345]  kasan_check_range+0x100/0x1a8
[   29.118414]  __kasan_check_write+0x20/0x30
[   29.119119]  kasan_atomics_helper+0x1190/0x4858
[   29.119845]  kasan_atomics+0x198/0x2e0
[   29.119969]  kunit_try_run_case+0x170/0x3f0
[   29.120105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.122047]  kthread+0x328/0x630
[   29.122363]  ret_from_fork+0x10/0x20
[   29.123337] 
[   29.123410] Allocated by task 267:
[   29.123714]  kasan_save_stack+0x3c/0x68
[   29.124400]  kasan_save_track+0x20/0x40
[   29.124898]  kasan_save_alloc_info+0x40/0x58
[   29.125767]  __kasan_kmalloc+0xd4/0xd8
[   29.125874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.127364]  kasan_atomics+0xb8/0x2e0
[   29.127563]  kunit_try_run_case+0x170/0x3f0
[   29.127952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.128458]  kthread+0x328/0x630
[   29.128575]  ret_from_fork+0x10/0x20
[   29.128762] 
[   29.130531] The buggy address belongs to the object at fff00000c7054a00
[   29.130531]  which belongs to the cache kmalloc-64 of size 64
[   29.130701] The buggy address is located 0 bytes to the right of
[   29.130701]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.130861] 
[   29.130913] The buggy address belongs to the physical page:
[   29.130985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.131111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.131233] page_type: f5(slab)
[   29.133658] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.134116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.135015] page dumped because: kasan: bad access detected
[   29.135094] 
[   29.135138] Memory state around the buggy address:
[   29.135215]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.135318]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.135441] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.135540]                                      ^
[   29.137907]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.138020]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.138117] ==================================================================
[   28.969553] ==================================================================
[   28.969655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   28.969767] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.969884] 
[   28.970339] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.970573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.970646] Hardware name: linux,dummy-virt (DT)
[   28.970756] Call trace:
[   28.970840]  show_stack+0x20/0x38 (C)
[   28.970999]  dump_stack_lvl+0x8c/0xd0
[   28.971163]  print_report+0x118/0x608
[   28.971375]  kasan_report+0xdc/0x128
[   28.971511]  kasan_check_range+0x100/0x1a8
[   28.971631]  __kasan_check_read+0x20/0x30
[   28.971779]  kasan_atomics_helper+0xdd4/0x4858
[   28.971907]  kasan_atomics+0x198/0x2e0
[   28.972019]  kunit_try_run_case+0x170/0x3f0
[   28.972188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.973095]  kthread+0x328/0x630
[   28.973462]  ret_from_fork+0x10/0x20
[   28.973629] 
[   28.973685] Allocated by task 267:
[   28.973757]  kasan_save_stack+0x3c/0x68
[   28.973913]  kasan_save_track+0x20/0x40
[   28.974205]  kasan_save_alloc_info+0x40/0x58
[   28.974336]  __kasan_kmalloc+0xd4/0xd8
[   28.974450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.974618]  kasan_atomics+0xb8/0x2e0
[   28.974735]  kunit_try_run_case+0x170/0x3f0
[   28.975253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.975572]  kthread+0x328/0x630
[   28.975704]  ret_from_fork+0x10/0x20
[   28.975860] 
[   28.976105] The buggy address belongs to the object at fff00000c7054a00
[   28.976105]  which belongs to the cache kmalloc-64 of size 64
[   28.976680] The buggy address is located 0 bytes to the right of
[   28.976680]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.977121] 
[   28.977314] The buggy address belongs to the physical page:
[   28.977517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.977655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.977808] page_type: f5(slab)
[   28.977954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.978097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.978256] page dumped because: kasan: bad access detected
[   28.978441] 
[   28.978501] Memory state around the buggy address:
[   28.978643]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.978771]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.979842] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.979974]                                      ^
[   28.980066]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.980176]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.980316] ==================================================================
[   29.288532] ==================================================================
[   29.288654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.288772] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.288893] 
[   29.290161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.290885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.290992] Hardware name: linux,dummy-virt (DT)
[   29.291077] Call trace:
[   29.291150]  show_stack+0x20/0x38 (C)
[   29.291283]  dump_stack_lvl+0x8c/0xd0
[   29.291622]  print_report+0x118/0x608
[   29.291848]  kasan_report+0xdc/0x128
[   29.292095]  kasan_check_range+0x100/0x1a8
[   29.292241]  __kasan_check_write+0x20/0x30
[   29.292465]  kasan_atomics_helper+0x15b4/0x4858
[   29.292596]  kasan_atomics+0x198/0x2e0
[   29.292710]  kunit_try_run_case+0x170/0x3f0
[   29.292839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.292975]  kthread+0x328/0x630
[   29.293088]  ret_from_fork+0x10/0x20
[   29.293229] 
[   29.293289] Allocated by task 267:
[   29.293365]  kasan_save_stack+0x3c/0x68
[   29.293883]  kasan_save_track+0x20/0x40
[   29.294320]  kasan_save_alloc_info+0x40/0x58
[   29.294627]  __kasan_kmalloc+0xd4/0xd8
[   29.295064]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.295175]  kasan_atomics+0xb8/0x2e0
[   29.295748]  kunit_try_run_case+0x170/0x3f0
[   29.295869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.296098]  kthread+0x328/0x630
[   29.296229]  ret_from_fork+0x10/0x20
[   29.296803] 
[   29.296878] The buggy address belongs to the object at fff00000c7054a00
[   29.296878]  which belongs to the cache kmalloc-64 of size 64
[   29.297039] The buggy address is located 0 bytes to the right of
[   29.297039]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.297327] 
[   29.297519] The buggy address belongs to the physical page:
[   29.297604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.297732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.297855] page_type: f5(slab)
[   29.297951] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.298149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.298425] page dumped because: kasan: bad access detected
[   29.298565] 
[   29.298617] Memory state around the buggy address:
[   29.298699]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.298879]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.299010] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.299118]                                      ^
[   29.299287]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299413]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299509] ==================================================================
[   29.389547] ==================================================================
[   29.389652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.389768] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.389894] 
[   29.389993] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.390204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.390288] Hardware name: linux,dummy-virt (DT)
[   29.390377] Call trace:
[   29.390750]  show_stack+0x20/0x38 (C)
[   29.390967]  dump_stack_lvl+0x8c/0xd0
[   29.391150]  print_report+0x118/0x608
[   29.391698]  kasan_report+0xdc/0x128
[   29.391983]  kasan_check_range+0x100/0x1a8
[   29.392202]  __kasan_check_write+0x20/0x30
[   29.392426]  kasan_atomics_helper+0x17ec/0x4858
[   29.392629]  kasan_atomics+0x198/0x2e0
[   29.392810]  kunit_try_run_case+0x170/0x3f0
[   29.393051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.393226]  kthread+0x328/0x630
[   29.393852]  ret_from_fork+0x10/0x20
[   29.394105] 
[   29.394602] Allocated by task 267:
[   29.394685]  kasan_save_stack+0x3c/0x68
[   29.394741]  kasan_save_track+0x20/0x40
[   29.394789]  kasan_save_alloc_info+0x40/0x58
[   29.394919]  __kasan_kmalloc+0xd4/0xd8
[   29.395145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.395303]  kasan_atomics+0xb8/0x2e0
[   29.395555]  kunit_try_run_case+0x170/0x3f0
[   29.395677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.395800]  kthread+0x328/0x630
[   29.396062]  ret_from_fork+0x10/0x20
[   29.396184] 
[   29.396247] The buggy address belongs to the object at fff00000c7054a00
[   29.396247]  which belongs to the cache kmalloc-64 of size 64
[   29.396409] The buggy address is located 0 bytes to the right of
[   29.396409]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.396695] 
[   29.396829] The buggy address belongs to the physical page:
[   29.396918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.397072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.397359] page_type: f5(slab)
[   29.397562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.397775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.397891] page dumped because: kasan: bad access detected
[   29.398037] 
[   29.398102] Memory state around the buggy address:
[   29.398261]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.398407]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.398525] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.398625]                                      ^
[   29.398708]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.398896]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.399122] ==================================================================
[   29.250258] ==================================================================
[   29.250807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.250974] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.251103] 
[   29.251272] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.251773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.251847] Hardware name: linux,dummy-virt (DT)
[   29.251966] Call trace:
[   29.252053]  show_stack+0x20/0x38 (C)
[   29.252547]  dump_stack_lvl+0x8c/0xd0
[   29.252689]  print_report+0x118/0x608
[   29.252808]  kasan_report+0xdc/0x128
[   29.253240]  kasan_check_range+0x100/0x1a8
[   29.254070]  __kasan_check_write+0x20/0x30
[   29.254276]  kasan_atomics_helper+0x147c/0x4858
[   29.254467]  kasan_atomics+0x198/0x2e0
[   29.254739]  kunit_try_run_case+0x170/0x3f0
[   29.254878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.255019]  kthread+0x328/0x630
[   29.255138]  ret_from_fork+0x10/0x20
[   29.255273] 
[   29.255322] Allocated by task 267:
[   29.255465]  kasan_save_stack+0x3c/0x68
[   29.255600]  kasan_save_track+0x20/0x40
[   29.255881]  kasan_save_alloc_info+0x40/0x58
[   29.256076]  __kasan_kmalloc+0xd4/0xd8
[   29.256171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.256263]  kasan_atomics+0xb8/0x2e0
[   29.256353]  kunit_try_run_case+0x170/0x3f0
[   29.256504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.256788]  kthread+0x328/0x630
[   29.256888]  ret_from_fork+0x10/0x20
[   29.256987] 
[   29.257068] The buggy address belongs to the object at fff00000c7054a00
[   29.257068]  which belongs to the cache kmalloc-64 of size 64
[   29.257440] The buggy address is located 0 bytes to the right of
[   29.257440]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.257616] 
[   29.257682] The buggy address belongs to the physical page:
[   29.257771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.257977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.259249] page_type: f5(slab)
[   29.259679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.259869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.259981] page dumped because: kasan: bad access detected
[   29.260317] 
[   29.260721] Memory state around the buggy address:
[   29.260821]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.261204]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.261325] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.261446]                                      ^
[   29.261530]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261637]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.261732] ==================================================================
[   29.375674] ==================================================================
[   29.375793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.376145] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.376271] 
[   29.376364] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.376930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.377131] Hardware name: linux,dummy-virt (DT)
[   29.377289] Call trace:
[   29.377348]  show_stack+0x20/0x38 (C)
[   29.377507]  dump_stack_lvl+0x8c/0xd0
[   29.378112]  print_report+0x118/0x608
[   29.378711]  kasan_report+0xdc/0x128
[   29.379227]  __asan_report_load8_noabort+0x20/0x30
[   29.379517]  kasan_atomics_helper+0x3e20/0x4858
[   29.379775]  kasan_atomics+0x198/0x2e0
[   29.380275]  kunit_try_run_case+0x170/0x3f0
[   29.380434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.381007]  kthread+0x328/0x630
[   29.381166]  ret_from_fork+0x10/0x20
[   29.381570] 
[   29.381704] Allocated by task 267:
[   29.381783]  kasan_save_stack+0x3c/0x68
[   29.381891]  kasan_save_track+0x20/0x40
[   29.382190]  kasan_save_alloc_info+0x40/0x58
[   29.382350]  __kasan_kmalloc+0xd4/0xd8
[   29.382550]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.383473]  kasan_atomics+0xb8/0x2e0
[   29.383578]  kunit_try_run_case+0x170/0x3f0
[   29.383673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.383782]  kthread+0x328/0x630
[   29.383871]  ret_from_fork+0x10/0x20
[   29.383971] 
[   29.384026] The buggy address belongs to the object at fff00000c7054a00
[   29.384026]  which belongs to the cache kmalloc-64 of size 64
[   29.384962] The buggy address is located 0 bytes to the right of
[   29.384962]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.385140] 
[   29.385214] The buggy address belongs to the physical page:
[   29.385304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.385474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.385616] page_type: f5(slab)
[   29.385761] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.386025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.386133] page dumped because: kasan: bad access detected
[   29.386213] 
[   29.386261] Memory state around the buggy address:
[   29.386344]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.386488]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.387884] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.387973]                                      ^
[   29.388059]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.388357]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.388485] ==================================================================
[   28.981970] ==================================================================
[   28.982077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   28.982182] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.982302] 
[   28.982384] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.982660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.982748] Hardware name: linux,dummy-virt (DT)
[   28.982844] Call trace:
[   28.983262]  show_stack+0x20/0x38 (C)
[   28.983423]  dump_stack_lvl+0x8c/0xd0
[   28.983606]  print_report+0x118/0x608
[   28.983772]  kasan_report+0xdc/0x128
[   28.983918]  __asan_report_load8_noabort+0x20/0x30
[   28.984299]  kasan_atomics_helper+0x3f58/0x4858
[   28.984454]  kasan_atomics+0x198/0x2e0
[   28.984775]  kunit_try_run_case+0x170/0x3f0
[   28.984906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.985080]  kthread+0x328/0x630
[   28.985239]  ret_from_fork+0x10/0x20
[   28.985416] 
[   28.985466] Allocated by task 267:
[   28.985557]  kasan_save_stack+0x3c/0x68
[   28.985672]  kasan_save_track+0x20/0x40
[   28.986227]  kasan_save_alloc_info+0x40/0x58
[   28.986348]  __kasan_kmalloc+0xd4/0xd8
[   28.986783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.986969]  kasan_atomics+0xb8/0x2e0
[   28.987063]  kunit_try_run_case+0x170/0x3f0
[   28.987170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.987314]  kthread+0x328/0x630
[   28.987476]  ret_from_fork+0x10/0x20
[   28.987791] 
[   28.987882] The buggy address belongs to the object at fff00000c7054a00
[   28.987882]  which belongs to the cache kmalloc-64 of size 64
[   28.988063] The buggy address is located 0 bytes to the right of
[   28.988063]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.988231] 
[   28.988294] The buggy address belongs to the physical page:
[   28.988421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.988552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.988879] page_type: f5(slab)
[   28.989087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.989301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.989656] page dumped because: kasan: bad access detected
[   28.990212] 
[   28.990266] Memory state around the buggy address:
[   28.990421]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.990678]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.990803] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.991310]                                      ^
[   28.991410]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.991529]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.991666] ==================================================================
[   29.065048] ==================================================================
[   29.065318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.065537] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.065698] 
[   29.065771] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.066216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.067105] Hardware name: linux,dummy-virt (DT)
[   29.067347] Call trace:
[   29.067438]  show_stack+0x20/0x38 (C)
[   29.067589]  dump_stack_lvl+0x8c/0xd0
[   29.067779]  print_report+0x118/0x608
[   29.068382]  kasan_report+0xdc/0x128
[   29.069004]  kasan_check_range+0x100/0x1a8
[   29.069307]  __kasan_check_write+0x20/0x30
[   29.069580]  kasan_atomics_helper+0x1058/0x4858
[   29.069852]  kasan_atomics+0x198/0x2e0
[   29.070041]  kunit_try_run_case+0x170/0x3f0
[   29.070207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.070347]  kthread+0x328/0x630
[   29.070591]  ret_from_fork+0x10/0x20
[   29.070789] 
[   29.070875] Allocated by task 267:
[   29.070956]  kasan_save_stack+0x3c/0x68
[   29.071117]  kasan_save_track+0x20/0x40
[   29.071315]  kasan_save_alloc_info+0x40/0x58
[   29.071467]  __kasan_kmalloc+0xd4/0xd8
[   29.071568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.071660]  kasan_atomics+0xb8/0x2e0
[   29.071748]  kunit_try_run_case+0x170/0x3f0
[   29.071846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.071952]  kthread+0x328/0x630
[   29.072044]  ret_from_fork+0x10/0x20
[   29.072178] 
[   29.072293] The buggy address belongs to the object at fff00000c7054a00
[   29.072293]  which belongs to the cache kmalloc-64 of size 64
[   29.072614] The buggy address is located 0 bytes to the right of
[   29.072614]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.072776] 
[   29.072871] The buggy address belongs to the physical page:
[   29.072958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.073155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.073326] page_type: f5(slab)
[   29.073440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.073692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.073805] page dumped because: kasan: bad access detected
[   29.073884] 
[   29.073963] Memory state around the buggy address:
[   29.074154]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074264]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074540] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.074658]                                      ^
[   29.074773]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.074897]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.075069] ==================================================================
[   28.992348] ==================================================================
[   28.992710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   28.992881] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.993405] 
[   28.993525] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.993734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.993806] Hardware name: linux,dummy-virt (DT)
[   28.993881] Call trace:
[   28.993949]  show_stack+0x20/0x38 (C)
[   28.994199]  dump_stack_lvl+0x8c/0xd0
[   28.994615]  print_report+0x118/0x608
[   28.994849]  kasan_report+0xdc/0x128
[   28.994992]  kasan_check_range+0x100/0x1a8
[   28.995173]  __kasan_check_write+0x20/0x30
[   28.995338]  kasan_atomics_helper+0xe44/0x4858
[   28.995498]  kasan_atomics+0x198/0x2e0
[   28.995699]  kunit_try_run_case+0x170/0x3f0
[   28.995887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.996079]  kthread+0x328/0x630
[   28.996238]  ret_from_fork+0x10/0x20
[   28.996377] 
[   28.996517] Allocated by task 267:
[   28.996619]  kasan_save_stack+0x3c/0x68
[   28.996738]  kasan_save_track+0x20/0x40
[   28.996895]  kasan_save_alloc_info+0x40/0x58
[   28.997123]  __kasan_kmalloc+0xd4/0xd8
[   28.997240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.997378]  kasan_atomics+0xb8/0x2e0
[   28.997489]  kunit_try_run_case+0x170/0x3f0
[   28.997657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.997825]  kthread+0x328/0x630
[   28.997927]  ret_from_fork+0x10/0x20
[   28.998086] 
[   28.998142] The buggy address belongs to the object at fff00000c7054a00
[   28.998142]  which belongs to the cache kmalloc-64 of size 64
[   28.998291] The buggy address is located 0 bytes to the right of
[   28.998291]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.998603] 
[   28.998680] The buggy address belongs to the physical page:
[   28.998846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.999021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.999325] page_type: f5(slab)
[   28.999452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.999782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.000203] page dumped because: kasan: bad access detected
[   29.000288] 
[   29.000757] Memory state around the buggy address:
[   29.000928]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.001049]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.001151] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.001291]                                      ^
[   29.001423]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.001533]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.001627] ==================================================================
[   29.053630] ==================================================================
[   29.053692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.053748] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.053810] 
[   29.053846] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.053946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.053978] Hardware name: linux,dummy-virt (DT)
[   29.054018] Call trace:
[   29.054046]  show_stack+0x20/0x38 (C)
[   29.054106]  dump_stack_lvl+0x8c/0xd0
[   29.054165]  print_report+0x118/0x608
[   29.054222]  kasan_report+0xdc/0x128
[   29.054275]  kasan_check_range+0x100/0x1a8
[   29.054335]  __kasan_check_write+0x20/0x30
[   29.054429]  kasan_atomics_helper+0xff0/0x4858
[   29.054555]  kasan_atomics+0x198/0x2e0
[   29.054661]  kunit_try_run_case+0x170/0x3f0
[   29.054843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.054995]  kthread+0x328/0x630
[   29.055118]  ret_from_fork+0x10/0x20
[   29.055259] 
[   29.055320] Allocated by task 267:
[   29.055526]  kasan_save_stack+0x3c/0x68
[   29.055980]  kasan_save_track+0x20/0x40
[   29.056203]  kasan_save_alloc_info+0x40/0x58
[   29.056501]  __kasan_kmalloc+0xd4/0xd8
[   29.056629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.056742]  kasan_atomics+0xb8/0x2e0
[   29.056983]  kunit_try_run_case+0x170/0x3f0
[   29.057323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.057532]  kthread+0x328/0x630
[   29.057649]  ret_from_fork+0x10/0x20
[   29.058084] 
[   29.058374] The buggy address belongs to the object at fff00000c7054a00
[   29.058374]  which belongs to the cache kmalloc-64 of size 64
[   29.058730] The buggy address is located 0 bytes to the right of
[   29.058730]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.059119] 
[   29.059484] The buggy address belongs to the physical page:
[   29.059704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.060068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.060280] page_type: f5(slab)
[   29.060508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.060722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.061256] page dumped because: kasan: bad access detected
[   29.061461] 
[   29.061595] Memory state around the buggy address:
[   29.061683]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.062447]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.062561] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.062665]                                      ^
[   29.063747]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.064207]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.064341] ==================================================================
[   28.835800] ==================================================================
[   28.835903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   28.836014] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.836150] 
[   28.836245] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.836557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.836754] Hardware name: linux,dummy-virt (DT)
[   28.836847] Call trace:
[   28.836910]  show_stack+0x20/0x38 (C)
[   28.837035]  dump_stack_lvl+0x8c/0xd0
[   28.837156]  print_report+0x118/0x608
[   28.837289]  kasan_report+0xdc/0x128
[   28.837437]  kasan_check_range+0x100/0x1a8
[   28.837648]  __kasan_check_write+0x20/0x30
[   28.837799]  kasan_atomics_helper+0xad4/0x4858
[   28.838055]  kasan_atomics+0x198/0x2e0
[   28.838198]  kunit_try_run_case+0x170/0x3f0
[   28.838408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.838577]  kthread+0x328/0x630
[   28.838808]  ret_from_fork+0x10/0x20
[   28.839032] 
[   28.839112] Allocated by task 267:
[   28.839198]  kasan_save_stack+0x3c/0x68
[   28.839314]  kasan_save_track+0x20/0x40
[   28.839464]  kasan_save_alloc_info+0x40/0x58
[   28.839689]  __kasan_kmalloc+0xd4/0xd8
[   28.839804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.839928]  kasan_atomics+0xb8/0x2e0
[   28.840045]  kunit_try_run_case+0x170/0x3f0
[   28.840181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.840310]  kthread+0x328/0x630
[   28.840492]  ret_from_fork+0x10/0x20
[   28.840601] 
[   28.840698] The buggy address belongs to the object at fff00000c7054a00
[   28.840698]  which belongs to the cache kmalloc-64 of size 64
[   28.840923] The buggy address is located 0 bytes to the right of
[   28.840923]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.841103] 
[   28.841160] The buggy address belongs to the physical page:
[   28.841373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.841967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.842237] page_type: f5(slab)
[   28.842642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.843025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.843132] page dumped because: kasan: bad access detected
[   28.843218] 
[   28.843270] Memory state around the buggy address:
[   28.843777]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.844103]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.844214] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.845107]                                      ^
[   28.845704]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.845905]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.846007] ==================================================================
[   28.539928] ==================================================================
[   28.542253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   28.543002] 
[   28.543117] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.543359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.543471] Hardware name: linux,dummy-virt (DT)
[   28.543561] Call trace:
[   28.544331]  print_report+0x118/0x608
[   28.545032]  kasan_atomics_helper+0x40fc/0x4858
[   28.545611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.546280] 
[   28.546733]  kasan_save_stack+0x3c/0x68
[   28.547463]  __kasan_kmalloc+0xd4/0xd8
[   28.548872]  ret_from_fork+0x10/0x20
[   28.549702] 
[   28.549864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.550892] page dumped because: kasan: bad access detected
[   28.553506]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.560650] 
[   28.561271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.564354]  kthread+0x328/0x630
[   28.566209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.568055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.571374]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.575903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   28.576973]  print_report+0x118/0x608
[   28.583026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.585334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.587180]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.589500] ==================================================================
[   29.238506] ==================================================================
[   29.238701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.239133] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.239288] 
[   29.239360] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.239574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.239674] Hardware name: linux,dummy-virt (DT)
[   29.239905] Call trace:
[   29.240056]  show_stack+0x20/0x38 (C)
[   29.240193]  dump_stack_lvl+0x8c/0xd0
[   29.240327]  print_report+0x118/0x608
[   29.240479]  kasan_report+0xdc/0x128
[   29.241213]  kasan_check_range+0x100/0x1a8
[   29.241468]  __kasan_check_write+0x20/0x30
[   29.241606]  kasan_atomics_helper+0x1414/0x4858
[   29.241730]  kasan_atomics+0x198/0x2e0
[   29.241864]  kunit_try_run_case+0x170/0x3f0
[   29.242409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.242572]  kthread+0x328/0x630
[   29.242896]  ret_from_fork+0x10/0x20
[   29.243027] 
[   29.243114] Allocated by task 267:
[   29.243190]  kasan_save_stack+0x3c/0x68
[   29.243301]  kasan_save_track+0x20/0x40
[   29.243624]  kasan_save_alloc_info+0x40/0x58
[   29.243762]  __kasan_kmalloc+0xd4/0xd8
[   29.244177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.244417]  kasan_atomics+0xb8/0x2e0
[   29.244694]  kunit_try_run_case+0x170/0x3f0
[   29.244880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.245071]  kthread+0x328/0x630
[   29.245163]  ret_from_fork+0x10/0x20
[   29.245306] 
[   29.245462] The buggy address belongs to the object at fff00000c7054a00
[   29.245462]  which belongs to the cache kmalloc-64 of size 64
[   29.245609] The buggy address is located 0 bytes to the right of
[   29.245609]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.245776] 
[   29.245892] The buggy address belongs to the physical page:
[   29.246009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.246324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.246515] page_type: f5(slab)
[   29.247125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.247266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.247375] page dumped because: kasan: bad access detected
[   29.247472] 
[   29.247528] Memory state around the buggy address:
[   29.247614]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247721]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247832] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.247931]                                      ^
[   29.249196]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249535]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.249748] ==================================================================
[   28.937584] ==================================================================
[   28.937694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   28.937861] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.938040] 
[   28.938165] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.938430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.938507] Hardware name: linux,dummy-virt (DT)
[   28.938620] Call trace:
[   28.938680]  show_stack+0x20/0x38 (C)
[   28.939457]  dump_stack_lvl+0x8c/0xd0
[   28.939610]  print_report+0x118/0x608
[   28.940078]  kasan_report+0xdc/0x128
[   28.940592]  kasan_check_range+0x100/0x1a8
[   28.940720]  __kasan_check_write+0x20/0x30
[   28.940847]  kasan_atomics_helper+0xd3c/0x4858
[   28.941652]  kasan_atomics+0x198/0x2e0
[   28.941809]  kunit_try_run_case+0x170/0x3f0
[   28.942062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.942215]  kthread+0x328/0x630
[   28.942413]  ret_from_fork+0x10/0x20
[   28.942575] 
[   28.942638] Allocated by task 267:
[   28.942727]  kasan_save_stack+0x3c/0x68
[   28.942835]  kasan_save_track+0x20/0x40
[   28.942959]  kasan_save_alloc_info+0x40/0x58
[   28.943249]  __kasan_kmalloc+0xd4/0xd8
[   28.943357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.943483]  kasan_atomics+0xb8/0x2e0
[   28.943589]  kunit_try_run_case+0x170/0x3f0
[   28.943714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.944058]  kthread+0x328/0x630
[   28.944941]  ret_from_fork+0x10/0x20
[   28.945059] 
[   28.945125] The buggy address belongs to the object at fff00000c7054a00
[   28.945125]  which belongs to the cache kmalloc-64 of size 64
[   28.945296] The buggy address is located 0 bytes to the right of
[   28.945296]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.945682] 
[   28.945750] The buggy address belongs to the physical page:
[   28.945835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.945971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.946092] page_type: f5(slab)
[   28.946359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.946510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.947006] page dumped because: kasan: bad access detected
[   28.947456] 
[   28.947519] Memory state around the buggy address:
[   28.947670]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.948023]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.948165] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.948283]                                      ^
[   28.948380]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.948717]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.948834] ==================================================================
[   28.847510] ==================================================================
[   28.847610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   28.847823] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.848492] 
[   28.848599] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.849398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.849489] Hardware name: linux,dummy-virt (DT)
[   28.849911] Call trace:
[   28.850384]  show_stack+0x20/0x38 (C)
[   28.850537]  dump_stack_lvl+0x8c/0xd0
[   28.850673]  print_report+0x118/0x608
[   28.851103]  kasan_report+0xdc/0x128
[   28.851278]  __asan_report_load4_noabort+0x20/0x30
[   28.852027]  kasan_atomics_helper+0x3dcc/0x4858
[   28.852405]  kasan_atomics+0x198/0x2e0
[   28.852639]  kunit_try_run_case+0x170/0x3f0
[   28.852862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.853067]  kthread+0x328/0x630
[   28.853670]  ret_from_fork+0x10/0x20
[   28.854070] 
[   28.854206] Allocated by task 267:
[   28.854781]  kasan_save_stack+0x3c/0x68
[   28.855111]  kasan_save_track+0x20/0x40
[   28.855237]  kasan_save_alloc_info+0x40/0x58
[   28.855682]  __kasan_kmalloc+0xd4/0xd8
[   28.856111]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.856534]  kasan_atomics+0xb8/0x2e0
[   28.856637]  kunit_try_run_case+0x170/0x3f0
[   28.857346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.857504]  kthread+0x328/0x630
[   28.857883] 
[   28.859548] page_type: f5(slab)
[   28.860097]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.864454]  kasan_atomics+0x198/0x2e0
[   28.870039] The buggy address is located 0 bytes to the right of
[   28.870039]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.872943]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.874612] ==================================================================
[   28.951736] ==================================================================
[   28.951848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   28.952051] Read of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.952246] 
[   28.952417] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.952943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.953145] Hardware name: linux,dummy-virt (DT)
[   28.953340] Call trace:
[   28.953502]  show_stack+0x20/0x38 (C)
[   28.953709]  dump_stack_lvl+0x8c/0xd0
[   28.954061]  print_report+0x118/0x608
[   28.954254]  kasan_report+0xdc/0x128
[   28.954493]  __asan_report_load4_noabort+0x20/0x30
[   28.954819]  kasan_atomics_helper+0x3e04/0x4858
[   28.954963]  kasan_atomics+0x198/0x2e0
[   28.955097]  kunit_try_run_case+0x170/0x3f0
[   28.955528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.955905]  kthread+0x328/0x630
[   28.956029]  ret_from_fork+0x10/0x20
[   28.956534] 
[   28.957296] Allocated by task 267:
[   28.957424]  kasan_save_stack+0x3c/0x68
[   28.957549]  kasan_save_track+0x20/0x40
[   28.957648]  kasan_save_alloc_info+0x40/0x58
[   28.958503]  __kasan_kmalloc+0xd4/0xd8
[   28.958670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.958793]  kasan_atomics+0xb8/0x2e0
[   28.959038]  kunit_try_run_case+0x170/0x3f0
[   28.959174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.959530]  kthread+0x328/0x630
[   28.959933]  ret_from_fork+0x10/0x20
[   28.960045] 
[   28.960097] The buggy address belongs to the object at fff00000c7054a00
[   28.960097]  which belongs to the cache kmalloc-64 of size 64
[   28.960294] The buggy address is located 0 bytes to the right of
[   28.960294]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.960471] 
[   28.960523] The buggy address belongs to the physical page:
[   28.960604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.961086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.961943] page_type: f5(slab)
[   28.962685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.963616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.963830] page dumped because: kasan: bad access detected
[   28.964677] 
[   28.964792] Memory state around the buggy address:
[   28.964893]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.966031]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.966592] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.966992]                                      ^
[   28.967098]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.967222]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.967825] ==================================================================
[   29.339105] ==================================================================
[   29.339220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.339531] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.339659] 
[   29.339730] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.339933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.340006] Hardware name: linux,dummy-virt (DT)
[   29.340077] Call trace:
[   29.340137]  show_stack+0x20/0x38 (C)
[   29.340251]  dump_stack_lvl+0x8c/0xd0
[   29.340372]  print_report+0x118/0x608
[   29.340518]  kasan_report+0xdc/0x128
[   29.340852]  kasan_check_range+0x100/0x1a8
[   29.341216]  __kasan_check_write+0x20/0x30
[   29.341408]  kasan_atomics_helper+0x16d0/0x4858
[   29.341557]  kasan_atomics+0x198/0x2e0
[   29.341686]  kunit_try_run_case+0x170/0x3f0
[   29.341896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.342211]  kthread+0x328/0x630
[   29.342347]  ret_from_fork+0x10/0x20
[   29.342506] 
[   29.342571] Allocated by task 267:
[   29.342720]  kasan_save_stack+0x3c/0x68
[   29.342969]  kasan_save_track+0x20/0x40
[   29.343153]  kasan_save_alloc_info+0x40/0x58
[   29.343521]  __kasan_kmalloc+0xd4/0xd8
[   29.343664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.343799]  kasan_atomics+0xb8/0x2e0
[   29.343900]  kunit_try_run_case+0x170/0x3f0
[   29.344031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.344341]  kthread+0x328/0x630
[   29.344677]  ret_from_fork+0x10/0x20
[   29.345320] 
[   29.345475] The buggy address belongs to the object at fff00000c7054a00
[   29.345475]  which belongs to the cache kmalloc-64 of size 64
[   29.345705] The buggy address is located 0 bytes to the right of
[   29.345705]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.345867] 
[   29.345966] The buggy address belongs to the physical page:
[   29.346058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.346212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.346330] page_type: f5(slab)
[   29.346444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.347250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.347797] page dumped because: kasan: bad access detected
[   29.347914] 
[   29.348101] Memory state around the buggy address:
[   29.348223]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.348788]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.349065] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.349196]                                      ^
[   29.349286]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.349948]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.350061] ==================================================================
[   29.031479] ==================================================================
[   29.031628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.031786] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.031912] 
[   29.031985] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.032187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.032429] Hardware name: linux,dummy-virt (DT)
[   29.032516] Call trace:
[   29.032572]  show_stack+0x20/0x38 (C)
[   29.032690]  dump_stack_lvl+0x8c/0xd0
[   29.032809]  print_report+0x118/0x608
[   29.032920]  kasan_report+0xdc/0x128
[   29.033032]  kasan_check_range+0x100/0x1a8
[   29.033151]  __kasan_check_write+0x20/0x30
[   29.033282]  kasan_atomics_helper+0xf20/0x4858
[   29.033805]  kasan_atomics+0x198/0x2e0
[   29.033961]  kunit_try_run_case+0x170/0x3f0
[   29.034566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.034959]  kthread+0x328/0x630
[   29.035444]  ret_from_fork+0x10/0x20
[   29.035765] 
[   29.035894] Allocated by task 267:
[   29.035995]  kasan_save_stack+0x3c/0x68
[   29.036097]  kasan_save_track+0x20/0x40
[   29.036472]  kasan_save_alloc_info+0x40/0x58
[   29.036613]  __kasan_kmalloc+0xd4/0xd8
[   29.036722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.036994]  kasan_atomics+0xb8/0x2e0
[   29.037199]  kunit_try_run_case+0x170/0x3f0
[   29.037482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.037605]  kthread+0x328/0x630
[   29.038063]  ret_from_fork+0x10/0x20
[   29.038170] 
[   29.038273] The buggy address belongs to the object at fff00000c7054a00
[   29.038273]  which belongs to the cache kmalloc-64 of size 64
[   29.038439] The buggy address is located 0 bytes to the right of
[   29.038439]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.038640] 
[   29.038689] The buggy address belongs to the physical page:
[   29.038768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.039551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.039683] page_type: f5(slab)
[   29.039780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.040786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.041289] page dumped because: kasan: bad access detected
[   29.041444] 
[   29.041605] Memory state around the buggy address:
[   29.041768]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.041882]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.041988] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.042083]                                      ^
[   29.042160]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.042266]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.042364] ==================================================================
[   28.656249] ==================================================================
[   28.656361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   28.656622] 
[   28.656903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.657857]  __kasan_check_write+0x20/0x30
[   28.658426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.659858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.660690] The buggy address belongs to the physical page:
[   28.662442] page dumped because: kasan: bad access detected
[   28.663335]                                      ^
[   28.666229] 
[   28.669189] 
[   28.670488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.671997] page dumped because: kasan: bad access detected
[   28.673489] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.679339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.683209]  kthread+0x328/0x630
[   28.685766]  kunit_try_run_case+0x170/0x3f0
[   28.687793] 
[   28.691095] 
[   28.692220] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.707284] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.713357]  __kasan_kmalloc+0xd4/0xd8
[   28.717545] 
[   28.718673] page_type: f5(slab)
[   28.719755] 
[   28.719821] Memory state around the buggy address:
[   28.720695] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.721911]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.725189] 
[   28.725488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.727564]  kunit_try_run_case+0x170/0x3f0
[   28.730231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.731462] 
[   28.732421] page_type: f5(slab)
[   28.732997] page dumped because: kasan: bad access detected
[   28.734108]                                      ^
[   28.734654] ==================================================================
[   29.262771] ==================================================================
[   29.262875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.262940] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.263223] 
[   29.263306] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.263523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.263600] Hardware name: linux,dummy-virt (DT)
[   29.263679] Call trace:
[   29.263856]  show_stack+0x20/0x38 (C)
[   29.264238]  dump_stack_lvl+0x8c/0xd0
[   29.264408]  print_report+0x118/0x608
[   29.264525]  kasan_report+0xdc/0x128
[   29.264638]  kasan_check_range+0x100/0x1a8
[   29.264755]  __kasan_check_write+0x20/0x30
[   29.264870]  kasan_atomics_helper+0x14e4/0x4858
[   29.264988]  kasan_atomics+0x198/0x2e0
[   29.265106]  kunit_try_run_case+0x170/0x3f0
[   29.265242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.265375]  kthread+0x328/0x630
[   29.265505]  ret_from_fork+0x10/0x20
[   29.268498] 
[   29.268571] Allocated by task 267:
[   29.268659]  kasan_save_stack+0x3c/0x68
[   29.268771]  kasan_save_track+0x20/0x40
[   29.268883]  kasan_save_alloc_info+0x40/0x58
[   29.268998]  __kasan_kmalloc+0xd4/0xd8
[   29.269110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.269231]  kasan_atomics+0xb8/0x2e0
[   29.269331]  kunit_try_run_case+0x170/0x3f0
[   29.269438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.269550]  kthread+0x328/0x630
[   29.271067]  ret_from_fork+0x10/0x20
[   29.271266] 
[   29.271357] The buggy address belongs to the object at fff00000c7054a00
[   29.271357]  which belongs to the cache kmalloc-64 of size 64
[   29.271612] The buggy address is located 0 bytes to the right of
[   29.271612]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.272354] 
[   29.272459] The buggy address belongs to the physical page:
[   29.272537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.272666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.272788] page_type: f5(slab)
[   29.273802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.273964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.274085] page dumped because: kasan: bad access detected
[   29.274731] 
[   29.274881] Memory state around the buggy address:
[   29.274971]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.275473]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.275983] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.276608]                                      ^
[   29.276713]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276990]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.277087] ==================================================================
[   28.771457] ==================================================================
[   28.771573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.772536]  dump_stack_lvl+0x8c/0xd0
[   28.776123]  kasan_save_track+0x20/0x40
[   28.776552]  __kasan_kmalloc+0xd4/0xd8
[   28.779551] 
[   28.781229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.784717] ==================================================================
[   29.299839] ==================================================================
[   29.299976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.300130] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.300257] 
[   29.300344] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.300579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.300698] Hardware name: linux,dummy-virt (DT)
[   29.300859] Call trace:
[   29.300922]  show_stack+0x20/0x38 (C)
[   29.301188]  dump_stack_lvl+0x8c/0xd0
[   29.301331]  print_report+0x118/0x608
[   29.301474]  kasan_report+0xdc/0x128
[   29.301637]  __asan_report_load8_noabort+0x20/0x30
[   29.301815]  kasan_atomics_helper+0x3db0/0x4858
[   29.301949]  kasan_atomics+0x198/0x2e0
[   29.302072]  kunit_try_run_case+0x170/0x3f0
[   29.302194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.302330]  kthread+0x328/0x630
[   29.302469]  ret_from_fork+0x10/0x20
[   29.302613] 
[   29.302678] Allocated by task 267:
[   29.302780]  kasan_save_stack+0x3c/0x68
[   29.302927]  kasan_save_track+0x20/0x40
[   29.303023]  kasan_save_alloc_info+0x40/0x58
[   29.303250]  __kasan_kmalloc+0xd4/0xd8
[   29.303367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.303647]  kasan_atomics+0xb8/0x2e0
[   29.303747]  kunit_try_run_case+0x170/0x3f0
[   29.303855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.303966]  kthread+0x328/0x630
[   29.304054]  ret_from_fork+0x10/0x20
[   29.304146] 
[   29.304205] The buggy address belongs to the object at fff00000c7054a00
[   29.304205]  which belongs to the cache kmalloc-64 of size 64
[   29.304412] The buggy address is located 0 bytes to the right of
[   29.304412]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.304682] 
[   29.304772] The buggy address belongs to the physical page:
[   29.304859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.304988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.305108] page_type: f5(slab)
[   29.305289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.305437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.305545] page dumped because: kasan: bad access detected
[   29.305626] 
[   29.305674] Memory state around the buggy address:
[   29.305777]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306164]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306576] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.306681]                                      ^
[   29.307513]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.307842]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.307948] ==================================================================
[   29.360075] ==================================================================
[   29.360338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.360643] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.360765] 
[   29.360834] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.361030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.361095] Hardware name: linux,dummy-virt (DT)
[   29.361170] Call trace:
[   29.361237]  show_stack+0x20/0x38 (C)
[   29.361358]  dump_stack_lvl+0x8c/0xd0
[   29.362708]  print_report+0x118/0x608
[   29.362846]  kasan_report+0xdc/0x128
[   29.362959]  kasan_check_range+0x100/0x1a8
[   29.363078]  __kasan_check_write+0x20/0x30
[   29.363204]  kasan_atomics_helper+0x175c/0x4858
[   29.364783]  kasan_atomics+0x198/0x2e0
[   29.365065]  kunit_try_run_case+0x170/0x3f0
[   29.365332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.365499]  kthread+0x328/0x630
[   29.365632]  ret_from_fork+0x10/0x20
[   29.366297] 
[   29.366775] Allocated by task 267:
[   29.366856]  kasan_save_stack+0x3c/0x68
[   29.367061]  kasan_save_track+0x20/0x40
[   29.367295]  kasan_save_alloc_info+0x40/0x58
[   29.367510]  __kasan_kmalloc+0xd4/0xd8
[   29.367643]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.367836]  kasan_atomics+0xb8/0x2e0
[   29.367944]  kunit_try_run_case+0x170/0x3f0
[   29.368526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.368721]  kthread+0x328/0x630
[   29.368854]  ret_from_fork+0x10/0x20
[   29.369333] 
[   29.369409] The buggy address belongs to the object at fff00000c7054a00
[   29.369409]  which belongs to the cache kmalloc-64 of size 64
[   29.369936] The buggy address is located 0 bytes to the right of
[   29.369936]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.370360] 
[   29.370630] The buggy address belongs to the physical page:
[   29.370722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.370907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.371488] page_type: f5(slab)
[   29.371703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.371848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.372345] page dumped because: kasan: bad access detected
[   29.372499] 
[   29.372612] Memory state around the buggy address:
[   29.372824]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.372954]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.373066] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.373625]                                      ^
[   29.373989]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.374271]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.374377] ==================================================================
[   29.096837] ==================================================================
[   29.097001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.097147] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.098583] 
[   29.098680] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.098895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.098965] Hardware name: linux,dummy-virt (DT)
[   29.099044] Call trace:
[   29.099104]  show_stack+0x20/0x38 (C)
[   29.099222]  dump_stack_lvl+0x8c/0xd0
[   29.099342]  print_report+0x118/0x608
[   29.101464]  kasan_report+0xdc/0x128
[   29.102719]  kasan_check_range+0x100/0x1a8
[   29.103339]  __kasan_check_write+0x20/0x30
[   29.103509]  kasan_atomics_helper+0x1128/0x4858
[   29.104339]  kasan_atomics+0x198/0x2e0
[   29.104618]  kunit_try_run_case+0x170/0x3f0
[   29.104987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.105161]  kthread+0x328/0x630
[   29.105511]  ret_from_fork+0x10/0x20
[   29.105659] 
[   29.105812] Allocated by task 267:
[   29.105893]  kasan_save_stack+0x3c/0x68
[   29.105999]  kasan_save_track+0x20/0x40
[   29.106090]  kasan_save_alloc_info+0x40/0x58
[   29.106186]  __kasan_kmalloc+0xd4/0xd8
[   29.106272]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.106368]  kasan_atomics+0xb8/0x2e0
[   29.106477]  kunit_try_run_case+0x170/0x3f0
[   29.106589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.106929]  kthread+0x328/0x630
[   29.107119]  ret_from_fork+0x10/0x20
[   29.107211] 
[   29.107659] The buggy address belongs to the object at fff00000c7054a00
[   29.107659]  which belongs to the cache kmalloc-64 of size 64
[   29.108130] The buggy address is located 0 bytes to the right of
[   29.108130]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.108332] 
[   29.108420] The buggy address belongs to the physical page:
[   29.108504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.108831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.108962] page_type: f5(slab)
[   29.109065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.109485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.109831] page dumped because: kasan: bad access detected
[   29.109921] 
[   29.109975] Memory state around the buggy address:
[   29.110058]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.110528]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.110744] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.110874]                                      ^
[   29.110969]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.111135]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.111250] ==================================================================
[   29.309344] ==================================================================
[   29.309464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.309571] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.309688] 
[   29.309757] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.311252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.311369] Hardware name: linux,dummy-virt (DT)
[   29.311627] Call trace:
[   29.311692]  show_stack+0x20/0x38 (C)
[   29.311828]  dump_stack_lvl+0x8c/0xd0
[   29.312861]  print_report+0x118/0x608
[   29.313099]  kasan_report+0xdc/0x128
[   29.313228]  kasan_check_range+0x100/0x1a8
[   29.313814]  __kasan_check_write+0x20/0x30
[   29.314504]  kasan_atomics_helper+0x1644/0x4858
[   29.314649]  kasan_atomics+0x198/0x2e0
[   29.314787]  kunit_try_run_case+0x170/0x3f0
[   29.315415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.315639]  kthread+0x328/0x630
[   29.315765]  ret_from_fork+0x10/0x20
[   29.315892] 
[   29.315954] Allocated by task 267:
[   29.316027]  kasan_save_stack+0x3c/0x68
[   29.317168]  kasan_save_track+0x20/0x40
[   29.318244]  kasan_save_alloc_info+0x40/0x58
[   29.318432]  __kasan_kmalloc+0xd4/0xd8
[   29.318986]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.319610]  kasan_atomics+0xb8/0x2e0
[   29.319718]  kunit_try_run_case+0x170/0x3f0
[   29.319991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.320600]  kthread+0x328/0x630
[   29.321154]  ret_from_fork+0x10/0x20
[   29.321884] 
[   29.322326] The buggy address belongs to the object at fff00000c7054a00
[   29.322326]  which belongs to the cache kmalloc-64 of size 64
[   29.322789] The buggy address is located 0 bytes to the right of
[   29.322789]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.322955] 
[   29.323009] The buggy address belongs to the physical page:
[   29.323754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.324233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.324573] page_type: f5(slab)
[   29.324752] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.324940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.325125] page dumped because: kasan: bad access detected
[   29.325631] 
[   29.325816] Memory state around the buggy address:
[   29.326065]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.326179]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.326289] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.326406]                                      ^
[   29.327308]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.327684]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.327786] ==================================================================
[   29.194016] ==================================================================
[   29.194121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.194226] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.196445] 
[   29.196651] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.197695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.197764] Hardware name: linux,dummy-virt (DT)
[   29.197842] Call trace:
[   29.197899]  show_stack+0x20/0x38 (C)
[   29.198025]  dump_stack_lvl+0x8c/0xd0
[   29.198146]  print_report+0x118/0x608
[   29.198265]  kasan_report+0xdc/0x128
[   29.198376]  kasan_check_range+0x100/0x1a8
[   29.201731]  __kasan_check_write+0x20/0x30
[   29.202441]  kasan_atomics_helper+0x1384/0x4858
[   29.202571]  kasan_atomics+0x198/0x2e0
[   29.204079]  kunit_try_run_case+0x170/0x3f0
[   29.204222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.205421]  kthread+0x328/0x630
[   29.206019]  ret_from_fork+0x10/0x20
[   29.207002] 
[   29.207065] Allocated by task 267:
[   29.207139]  kasan_save_stack+0x3c/0x68
[   29.207247]  kasan_save_track+0x20/0x40
[   29.208590]  kasan_save_alloc_info+0x40/0x58
[   29.209121]  __kasan_kmalloc+0xd4/0xd8
[   29.209228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.209330]  kasan_atomics+0xb8/0x2e0
[   29.210956]  kunit_try_run_case+0x170/0x3f0
[   29.211561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.211672]  kthread+0x328/0x630
[   29.212965]  ret_from_fork+0x10/0x20
[   29.213449] 
[   29.213931] The buggy address belongs to the object at fff00000c7054a00
[   29.213931]  which belongs to the cache kmalloc-64 of size 64
[   29.214213] The buggy address is located 0 bytes to the right of
[   29.214213]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.215294] 
[   29.215517] The buggy address belongs to the physical page:
[   29.216595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.216934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.218056] page_type: f5(slab)
[   29.218171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.219367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.220607] page dumped because: kasan: bad access detected
[   29.220932] 
[   29.221306] Memory state around the buggy address:
[   29.221575]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.221730]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.222243] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.222834]                                      ^
[   29.223219]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.223484]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.223936] ==================================================================
[   29.351095] ==================================================================
[   29.351205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.351328] Read of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.351485] 
[   29.351560] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.351814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.351899] Hardware name: linux,dummy-virt (DT)
[   29.351981] Call trace:
[   29.352045]  show_stack+0x20/0x38 (C)
[   29.352317]  dump_stack_lvl+0x8c/0xd0
[   29.352481]  print_report+0x118/0x608
[   29.352598]  kasan_report+0xdc/0x128
[   29.352716]  __asan_report_load8_noabort+0x20/0x30
[   29.352841]  kasan_atomics_helper+0x3e10/0x4858
[   29.352960]  kasan_atomics+0x198/0x2e0
[   29.353080]  kunit_try_run_case+0x170/0x3f0
[   29.353213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.353351]  kthread+0x328/0x630
[   29.353489]  ret_from_fork+0x10/0x20
[   29.353606] 
[   29.353656] Allocated by task 267:
[   29.353723]  kasan_save_stack+0x3c/0x68
[   29.353819]  kasan_save_track+0x20/0x40
[   29.353907]  kasan_save_alloc_info+0x40/0x58
[   29.354004]  __kasan_kmalloc+0xd4/0xd8
[   29.354089]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.354184]  kasan_atomics+0xb8/0x2e0
[   29.354287]  kunit_try_run_case+0x170/0x3f0
[   29.354427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.354604]  kthread+0x328/0x630
[   29.354723]  ret_from_fork+0x10/0x20
[   29.354830] 
[   29.354889] The buggy address belongs to the object at fff00000c7054a00
[   29.354889]  which belongs to the cache kmalloc-64 of size 64
[   29.355040] The buggy address is located 0 bytes to the right of
[   29.355040]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.355221] 
[   29.355279] The buggy address belongs to the physical page:
[   29.355404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.355828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.356625] page_type: f5(slab)
[   29.356999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.357511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.357633] page dumped because: kasan: bad access detected
[   29.357727] 
[   29.357881] Memory state around the buggy address:
[   29.357967]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.358407]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.358759] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.358875]                                      ^
[   29.359370]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.359529]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.359664] ==================================================================
[   28.798183] ==================================================================
[   28.798340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.798650] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.798785] 
[   28.798870] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.799067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.799152] Hardware name: linux,dummy-virt (DT)
[   28.799379] Call trace:
[   28.799568]  show_stack+0x20/0x38 (C)
[   28.799921]  dump_stack_lvl+0x8c/0xd0
[   28.800051]  print_report+0x118/0x608
[   28.800172]  kasan_report+0xdc/0x128
[   28.800291]  kasan_check_range+0x100/0x1a8
[   28.800785]  __kasan_check_write+0x20/0x30
[   28.801240]  kasan_atomics_helper+0x99c/0x4858
[   28.801468]  kasan_atomics+0x198/0x2e0
[   28.801608]  kunit_try_run_case+0x170/0x3f0
[   28.801736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.801935]  kthread+0x328/0x630
[   28.802058]  ret_from_fork+0x10/0x20
[   28.802286] 
[   28.802581] Allocated by task 267:
[   28.802682]  kasan_save_stack+0x3c/0x68
[   28.803096]  kasan_save_track+0x20/0x40
[   28.803235]  kasan_save_alloc_info+0x40/0x58
[   28.803402]  __kasan_kmalloc+0xd4/0xd8
[   28.803641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.803801]  kasan_atomics+0xb8/0x2e0
[   28.804061]  kunit_try_run_case+0x170/0x3f0
[   28.804173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.804336]  kthread+0x328/0x630
[   28.804469]  ret_from_fork+0x10/0x20
[   28.804613] 
[   28.804834] The buggy address belongs to the object at fff00000c7054a00
[   28.804834]  which belongs to the cache kmalloc-64 of size 64
[   28.805052] The buggy address is located 0 bytes to the right of
[   28.805052]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.805226] 
[   28.806463] The buggy address belongs to the physical page:
[   28.806561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.806817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.807193] page_type: f5(slab)
[   28.807533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.807732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.807865] page dumped because: kasan: bad access detected
[   28.807951] 
[   28.808184] Memory state around the buggy address:
[   28.808352]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.808620]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.808776] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.809018]                                      ^
[   28.809117]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.809237]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.809492] ==================================================================
[   29.161671] ==================================================================
[   29.161919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.162457] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.162616] 
[   29.163296] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.163686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.163757] Hardware name: linux,dummy-virt (DT)
[   29.163934] Call trace:
[   29.163992]  show_stack+0x20/0x38 (C)
[   29.164204]  dump_stack_lvl+0x8c/0xd0
[   29.164322]  print_report+0x118/0x608
[   29.164476]  kasan_report+0xdc/0x128
[   29.164968]  kasan_check_range+0x100/0x1a8
[   29.165363]  __kasan_check_write+0x20/0x30
[   29.165887]  kasan_atomics_helper+0x126c/0x4858
[   29.166015]  kasan_atomics+0x198/0x2e0
[   29.166129]  kunit_try_run_case+0x170/0x3f0
[   29.166250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.166380]  kthread+0x328/0x630
[   29.166521]  ret_from_fork+0x10/0x20
[   29.167263] 
[   29.167347] Allocated by task 267:
[   29.167980]  kasan_save_stack+0x3c/0x68
[   29.168747]  kasan_save_track+0x20/0x40
[   29.168884]  kasan_save_alloc_info+0x40/0x58
[   29.169377]  __kasan_kmalloc+0xd4/0xd8
[   29.169512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.169635]  kasan_atomics+0xb8/0x2e0
[   29.169738]  kunit_try_run_case+0x170/0x3f0
[   29.170366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.170705]  kthread+0x328/0x630
[   29.171024]  ret_from_fork+0x10/0x20
[   29.171359] 
[   29.171437] The buggy address belongs to the object at fff00000c7054a00
[   29.171437]  which belongs to the cache kmalloc-64 of size 64
[   29.171768] The buggy address is located 0 bytes to the right of
[   29.171768]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.172063] 
[   29.172145] The buggy address belongs to the physical page:
[   29.173248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.173501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.173877] page_type: f5(slab)
[   29.174276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.174527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.174909] page dumped because: kasan: bad access detected
[   29.175023] 
[   29.175080] Memory state around the buggy address:
[   29.175178]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.175307]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.175658] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.175780]                                      ^
[   29.175973]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.176076]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.176789] ==================================================================
[   28.827050] ==================================================================
[   28.827199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   28.827348] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.827650] 
[   28.827812] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.828016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.828086] Hardware name: linux,dummy-virt (DT)
[   28.828167] Call trace:
[   28.828224]  show_stack+0x20/0x38 (C)
[   28.828344]  dump_stack_lvl+0x8c/0xd0
[   28.828490]  print_report+0x118/0x608
[   28.828607]  kasan_report+0xdc/0x128
[   28.828719]  kasan_check_range+0x100/0x1a8
[   28.828839]  __kasan_check_write+0x20/0x30
[   28.828962]  kasan_atomics_helper+0xa6c/0x4858
[   28.829083]  kasan_atomics+0x198/0x2e0
[   28.829208]  kunit_try_run_case+0x170/0x3f0
[   28.829342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.829527]  kthread+0x328/0x630
[   28.829824]  ret_from_fork+0x10/0x20
[   28.829980] 
[   28.830040] Allocated by task 267:
[   28.830130]  kasan_save_stack+0x3c/0x68
[   28.830245]  kasan_save_track+0x20/0x40
[   28.830357]  kasan_save_alloc_info+0x40/0x58
[   28.830490]  __kasan_kmalloc+0xd4/0xd8
[   28.830676]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.830834]  kasan_atomics+0xb8/0x2e0
[   28.830951]  kunit_try_run_case+0x170/0x3f0
[   28.831094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.831493]  kthread+0x328/0x630
[   28.831598]  ret_from_fork+0x10/0x20
[   28.831706] 
[   28.831761] The buggy address belongs to the object at fff00000c7054a00
[   28.831761]  which belongs to the cache kmalloc-64 of size 64
[   28.831898] The buggy address is located 0 bytes to the right of
[   28.831898]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.832169] 
[   28.832240] The buggy address belongs to the physical page:
[   28.832321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.832480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.832690] page_type: f5(slab)
[   28.832814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.832940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.833071] page dumped because: kasan: bad access detected
[   28.833219] 
[   28.833283] Memory state around the buggy address:
[   28.833449]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.833578]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.833699] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.833860]                                      ^
[   28.833983]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.834194]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.834463] ==================================================================
[   28.811775] ==================================================================
[   28.811883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   28.812000] Write of size 4 at addr fff00000c7054a30 by task kunit_try_catch/267
[   28.812132] 
[   28.812216] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   28.813477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.813820] Hardware name: linux,dummy-virt (DT)
[   28.814232] Call trace:
[   28.814629]  show_stack+0x20/0x38 (C)
[   28.815139]  dump_stack_lvl+0x8c/0xd0
[   28.815244]  print_report+0x118/0x608
[   28.815364]  kasan_report+0xdc/0x128
[   28.816913]  kasan_check_range+0x100/0x1a8
[   28.817048]  __kasan_check_write+0x20/0x30
[   28.817212]  kasan_atomics_helper+0xa04/0x4858
[   28.817604]  kasan_atomics+0x198/0x2e0
[   28.817730]  kunit_try_run_case+0x170/0x3f0
[   28.817856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.817998]  kthread+0x328/0x630
[   28.818114]  ret_from_fork+0x10/0x20
[   28.818277] 
[   28.818426] Allocated by task 267:
[   28.818519]  kasan_save_stack+0x3c/0x68
[   28.818700]  kasan_save_track+0x20/0x40
[   28.819165]  kasan_save_alloc_info+0x40/0x58
[   28.819439]  __kasan_kmalloc+0xd4/0xd8
[   28.819713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.820059]  kasan_atomics+0xb8/0x2e0
[   28.820177]  kunit_try_run_case+0x170/0x3f0
[   28.820291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.820434]  kthread+0x328/0x630
[   28.820537]  ret_from_fork+0x10/0x20
[   28.821251] 
[   28.821530] The buggy address belongs to the object at fff00000c7054a00
[   28.821530]  which belongs to the cache kmalloc-64 of size 64
[   28.821762] The buggy address is located 0 bytes to the right of
[   28.821762]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   28.822070] 
[   28.822125] The buggy address belongs to the physical page:
[   28.822205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   28.822404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.822818] page_type: f5(slab)
[   28.822985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.823367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.823588] page dumped because: kasan: bad access detected
[   28.823712] 
[   28.823785] Memory state around the buggy address:
[   28.823872]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.824037]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.824333] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.824449]                                      ^
[   28.824581]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.824995]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.825261] ==================================================================
[   29.143304] ==================================================================
[   29.143446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.143570] Write of size 8 at addr fff00000c7054a30 by task kunit_try_catch/267
[   29.143689] 
[   29.143770] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT 
[   29.143968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.146471] Hardware name: linux,dummy-virt (DT)
[   29.146768] Call trace:
[   29.146889]  show_stack+0x20/0x38 (C)
[   29.147227]  dump_stack_lvl+0x8c/0xd0
[   29.147492]  print_report+0x118/0x608
[   29.147713]  kasan_report+0xdc/0x128
[   29.147827]  kasan_check_range+0x100/0x1a8
[   29.149213]  __kasan_check_write+0x20/0x30
[   29.149379]  kasan_atomics_helper+0x11f8/0x4858
[   29.149793]  kasan_atomics+0x198/0x2e0
[   29.149931]  kunit_try_run_case+0x170/0x3f0
[   29.150557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.150831]  kthread+0x328/0x630
[   29.151662]  ret_from_fork+0x10/0x20
[   29.152231] 
[   29.152401] Allocated by task 267:
[   29.152479]  kasan_save_stack+0x3c/0x68
[   29.152941]  kasan_save_track+0x20/0x40
[   29.153261]  kasan_save_alloc_info+0x40/0x58
[   29.153372]  __kasan_kmalloc+0xd4/0xd8
[   29.153606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.153941]  kasan_atomics+0xb8/0x2e0
[   29.154527]  kunit_try_run_case+0x170/0x3f0
[   29.154959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.155474]  kthread+0x328/0x630
[   29.155834]  ret_from_fork+0x10/0x20
[   29.156016] 
[   29.156491] The buggy address belongs to the object at fff00000c7054a00
[   29.156491]  which belongs to the cache kmalloc-64 of size 64
[   29.156877] The buggy address is located 0 bytes to the right of
[   29.156877]  allocated 48-byte region [fff00000c7054a00, fff00000c7054a30)
[   29.157139] 
[   29.157207] The buggy address belongs to the physical page:
[   29.157815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107054
[   29.157966] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.158087] page_type: f5(slab)
[   29.158279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.158425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.158661] page dumped because: kasan: bad access detected
[   29.158746] 
[   29.158804] Memory state around the buggy address:
[   29.159157]  fff00000c7054900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.159367]  fff00000c7054980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.159505] >fff00000c7054a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.159722]                                      ^
[   29.159817]  fff00000c7054a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160278]  fff00000c7054b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.160762] ==================================================================

[   22.641999] ==================================================================
[   22.642758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   22.643566] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.644109] 
[   22.644397] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.644523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.644560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.644636] Call Trace:
[   22.644694]  <TASK>
[   22.644745]  dump_stack_lvl+0x73/0xb0
[   22.644831]  print_report+0xd1/0x650
[   22.644909]  ? __virt_addr_valid+0x1db/0x2d0
[   22.644987]  ? kasan_atomics_helper+0x49ce/0x5450
[   22.645067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.645148]  ? kasan_atomics_helper+0x49ce/0x5450
[   22.645267]  kasan_report+0x141/0x180
[   22.645349]  ? kasan_atomics_helper+0x49ce/0x5450
[   22.645437]  __asan_report_load4_noabort+0x18/0x20
[   22.645509]  kasan_atomics_helper+0x49ce/0x5450
[   22.645591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.645689]  ? ret_from_fork_asm+0x1a/0x30
[   22.645792]  kasan_atomics+0x1dc/0x310
[   22.645863]  ? __pfx_kasan_atomics+0x10/0x10
[   22.645939]  ? __pfx_read_tsc+0x10/0x10
[   22.646010]  ? ktime_get_ts64+0x86/0x230
[   22.646098]  kunit_try_run_case+0x1a5/0x480
[   22.646186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.646306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.646387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.646435]  ? __kthread_parkme+0x82/0x180
[   22.646470]  ? preempt_count_sub+0x50/0x80
[   22.646510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.646548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.646584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.646648]  kthread+0x337/0x6f0
[   22.646676]  ? trace_preempt_on+0x20/0xc0
[   22.646714]  ? __pfx_kthread+0x10/0x10
[   22.646741]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.646775]  ? calculate_sigpending+0x7b/0xa0
[   22.646810]  ? __pfx_kthread+0x10/0x10
[   22.646838]  ret_from_fork+0x41/0x80
[   22.646870]  ? __pfx_kthread+0x10/0x10
[   22.646897]  ret_from_fork_asm+0x1a/0x30
[   22.646941]  </TASK>
[   22.646956] 
[   22.663000] Allocated by task 286:
[   22.663445]  kasan_save_stack+0x45/0x70
[   22.663861]  kasan_save_track+0x18/0x40
[   22.664271]  kasan_save_alloc_info+0x3b/0x50
[   22.664682]  __kasan_kmalloc+0xb7/0xc0
[   22.665043]  __kmalloc_cache_noprof+0x189/0x420
[   22.665529]  kasan_atomics+0x95/0x310
[   22.665914]  kunit_try_run_case+0x1a5/0x480
[   22.666364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.666836]  kthread+0x337/0x6f0
[   22.667188]  ret_from_fork+0x41/0x80
[   22.667576]  ret_from_fork_asm+0x1a/0x30
[   22.668034] 
[   22.668321] The buggy address belongs to the object at ffff888102a2c100
[   22.668321]  which belongs to the cache kmalloc-64 of size 64
[   22.669183] The buggy address is located 0 bytes to the right of
[   22.669183]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.670099] 
[   22.670392] The buggy address belongs to the physical page:
[   22.670870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.671557] flags: 0x200000000000000(node=0|zone=2)
[   22.671992] page_type: f5(slab)
[   22.672392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.672917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.673652] page dumped because: kasan: bad access detected
[   22.674037] 
[   22.674273] Memory state around the buggy address:
[   22.674728]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.675410]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.675977] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.676567]                                      ^
[   22.677034]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.677694]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.678260] ==================================================================
[   21.482593] ==================================================================
[   21.483687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   21.484633] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.485414] 
[   21.485967] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.486088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.486127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.486183] Call Trace:
[   21.486232]  <TASK>
[   21.486280]  dump_stack_lvl+0x73/0xb0
[   21.486359]  print_report+0xd1/0x650
[   21.486522]  ? __virt_addr_valid+0x1db/0x2d0
[   21.486619]  ? kasan_atomics_helper+0x4b3a/0x5450
[   21.486860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.486999]  ? kasan_atomics_helper+0x4b3a/0x5450
[   21.487106]  kasan_report+0x141/0x180
[   21.487186]  ? kasan_atomics_helper+0x4b3a/0x5450
[   21.487276]  __asan_report_store4_noabort+0x1b/0x30
[   21.487331]  kasan_atomics_helper+0x4b3a/0x5450
[   21.487369]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.487405]  ? ret_from_fork_asm+0x1a/0x30
[   21.487444]  kasan_atomics+0x1dc/0x310
[   21.487473]  ? __pfx_kasan_atomics+0x10/0x10
[   21.487502]  ? __pfx_read_tsc+0x10/0x10
[   21.487534]  ? ktime_get_ts64+0x86/0x230
[   21.487570]  kunit_try_run_case+0x1a5/0x480
[   21.487677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.487770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.487857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.487948]  ? __kthread_parkme+0x82/0x180
[   21.487990]  ? preempt_count_sub+0x50/0x80
[   21.488085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.488139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.488200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.488273]  kthread+0x337/0x6f0
[   21.488302]  ? trace_preempt_on+0x20/0xc0
[   21.488340]  ? __pfx_kthread+0x10/0x10
[   21.488368]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.488401]  ? calculate_sigpending+0x7b/0xa0
[   21.488433]  ? __pfx_kthread+0x10/0x10
[   21.488460]  ret_from_fork+0x41/0x80
[   21.488492]  ? __pfx_kthread+0x10/0x10
[   21.488517]  ret_from_fork_asm+0x1a/0x30
[   21.488560]  </TASK>
[   21.488576] 
[   21.510166] Allocated by task 286:
[   21.510852]  kasan_save_stack+0x45/0x70
[   21.511367]  kasan_save_track+0x18/0x40
[   21.512064]  kasan_save_alloc_info+0x3b/0x50
[   21.512774]  __kasan_kmalloc+0xb7/0xc0
[   21.513224]  __kmalloc_cache_noprof+0x189/0x420
[   21.514164]  kasan_atomics+0x95/0x310
[   21.514654]  kunit_try_run_case+0x1a5/0x480
[   21.515239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.515991]  kthread+0x337/0x6f0
[   21.516485]  ret_from_fork+0x41/0x80
[   21.517344]  ret_from_fork_asm+0x1a/0x30
[   21.518062] 
[   21.518430] The buggy address belongs to the object at ffff888102a2c100
[   21.518430]  which belongs to the cache kmalloc-64 of size 64
[   21.520096] The buggy address is located 0 bytes to the right of
[   21.520096]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.521587] 
[   21.521962] The buggy address belongs to the physical page:
[   21.522653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.523219] flags: 0x200000000000000(node=0|zone=2)
[   21.524136] page_type: f5(slab)
[   21.524801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.525619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.526173] page dumped because: kasan: bad access detected
[   21.526563] 
[   21.526812] Memory state around the buggy address:
[   21.527214]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.527907]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.529053] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.529624]                                      ^
[   21.530699]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.531427]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.531780] ==================================================================
[   23.414128] ==================================================================
[   23.415440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   23.416104] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.417229] 
[   23.417577] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.417718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.417768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.417825] Call Trace:
[   23.417876]  <TASK>
[   23.417923]  dump_stack_lvl+0x73/0xb0
[   23.418003]  print_report+0xd1/0x650
[   23.418083]  ? __virt_addr_valid+0x1db/0x2d0
[   23.418160]  ? kasan_atomics_helper+0x1d7a/0x5450
[   23.418257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.418340]  ? kasan_atomics_helper+0x1d7a/0x5450
[   23.418416]  kasan_report+0x141/0x180
[   23.418464]  ? kasan_atomics_helper+0x1d7a/0x5450
[   23.418505]  kasan_check_range+0x10c/0x1c0
[   23.418534]  __kasan_check_write+0x18/0x20
[   23.418566]  kasan_atomics_helper+0x1d7a/0x5450
[   23.418626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.418666]  ? ret_from_fork_asm+0x1a/0x30
[   23.418706]  kasan_atomics+0x1dc/0x310
[   23.418736]  ? __pfx_kasan_atomics+0x10/0x10
[   23.418765]  ? __pfx_read_tsc+0x10/0x10
[   23.418793]  ? ktime_get_ts64+0x86/0x230
[   23.418828]  kunit_try_run_case+0x1a5/0x480
[   23.418866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.418901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.418936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.418971]  ? __kthread_parkme+0x82/0x180
[   23.419003]  ? preempt_count_sub+0x50/0x80
[   23.419040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.419075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.419110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.419143]  kthread+0x337/0x6f0
[   23.419168]  ? trace_preempt_on+0x20/0xc0
[   23.419202]  ? __pfx_kthread+0x10/0x10
[   23.419259]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.419296]  ? calculate_sigpending+0x7b/0xa0
[   23.419329]  ? __pfx_kthread+0x10/0x10
[   23.419355]  ret_from_fork+0x41/0x80
[   23.419388]  ? __pfx_kthread+0x10/0x10
[   23.419413]  ret_from_fork_asm+0x1a/0x30
[   23.419455]  </TASK>
[   23.419470] 
[   23.436653] Allocated by task 286:
[   23.437356]  kasan_save_stack+0x45/0x70
[   23.438107]  kasan_save_track+0x18/0x40
[   23.438530]  kasan_save_alloc_info+0x3b/0x50
[   23.438979]  __kasan_kmalloc+0xb7/0xc0
[   23.439528]  __kmalloc_cache_noprof+0x189/0x420
[   23.439922]  kasan_atomics+0x95/0x310
[   23.440353]  kunit_try_run_case+0x1a5/0x480
[   23.440797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.441381]  kthread+0x337/0x6f0
[   23.441884]  ret_from_fork+0x41/0x80
[   23.442364]  ret_from_fork_asm+0x1a/0x30
[   23.442844] 
[   23.443042] The buggy address belongs to the object at ffff888102a2c100
[   23.443042]  which belongs to the cache kmalloc-64 of size 64
[   23.444141] The buggy address is located 0 bytes to the right of
[   23.444141]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.445115] 
[   23.445503] The buggy address belongs to the physical page:
[   23.446089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.446780] flags: 0x200000000000000(node=0|zone=2)
[   23.447374] page_type: f5(slab)
[   23.447827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.448660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.449371] page dumped because: kasan: bad access detected
[   23.449798] 
[   23.450020] Memory state around the buggy address:
[   23.450631]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451358]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451921] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.452682]                                      ^
[   23.453081]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.453795]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.454462] ==================================================================
[   21.871434] ==================================================================
[   21.872088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   21.872778] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.873401] 
[   21.873693] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.873819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.873859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.873916] Call Trace:
[   21.873958]  <TASK>
[   21.874006]  dump_stack_lvl+0x73/0xb0
[   21.874088]  print_report+0xd1/0x650
[   21.874167]  ? __virt_addr_valid+0x1db/0x2d0
[   21.874298]  ? kasan_atomics_helper+0x992/0x5450
[   21.874381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.874457]  ? kasan_atomics_helper+0x992/0x5450
[   21.874537]  kasan_report+0x141/0x180
[   21.874631]  ? kasan_atomics_helper+0x992/0x5450
[   21.874724]  kasan_check_range+0x10c/0x1c0
[   21.874797]  __kasan_check_write+0x18/0x20
[   21.874854]  kasan_atomics_helper+0x992/0x5450
[   21.874908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.874981]  ? ret_from_fork_asm+0x1a/0x30
[   21.875071]  kasan_atomics+0x1dc/0x310
[   21.875149]  ? __pfx_kasan_atomics+0x10/0x10
[   21.875279]  ? __pfx_read_tsc+0x10/0x10
[   21.875356]  ? ktime_get_ts64+0x86/0x230
[   21.875446]  kunit_try_run_case+0x1a5/0x480
[   21.875531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.875624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.875707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.875748]  ? __kthread_parkme+0x82/0x180
[   21.875786]  ? preempt_count_sub+0x50/0x80
[   21.875826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.875865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.875902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.875940]  kthread+0x337/0x6f0
[   21.875966]  ? trace_preempt_on+0x20/0xc0
[   21.876003]  ? __pfx_kthread+0x10/0x10
[   21.876031]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.876065]  ? calculate_sigpending+0x7b/0xa0
[   21.876099]  ? __pfx_kthread+0x10/0x10
[   21.876126]  ret_from_fork+0x41/0x80
[   21.876158]  ? __pfx_kthread+0x10/0x10
[   21.876186]  ret_from_fork_asm+0x1a/0x30
[   21.876273]  </TASK>
[   21.876293] 
[   21.892358] Allocated by task 286:
[   21.892806]  kasan_save_stack+0x45/0x70
[   21.893270]  kasan_save_track+0x18/0x40
[   21.894240]  kasan_save_alloc_info+0x3b/0x50
[   21.894862]  __kasan_kmalloc+0xb7/0xc0
[   21.895473]  __kmalloc_cache_noprof+0x189/0x420
[   21.895934]  kasan_atomics+0x95/0x310
[   21.896289]  kunit_try_run_case+0x1a5/0x480
[   21.896727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.897240]  kthread+0x337/0x6f0
[   21.897659]  ret_from_fork+0x41/0x80
[   21.898107]  ret_from_fork_asm+0x1a/0x30
[   21.898616] 
[   21.898827] The buggy address belongs to the object at ffff888102a2c100
[   21.898827]  which belongs to the cache kmalloc-64 of size 64
[   21.899836] The buggy address is located 0 bytes to the right of
[   21.899836]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.900912] 
[   21.901149] The buggy address belongs to the physical page:
[   21.901736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.902489] flags: 0x200000000000000(node=0|zone=2)
[   21.902994] page_type: f5(slab)
[   21.903393] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.904120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.904822] page dumped because: kasan: bad access detected
[   21.905394] 
[   21.905594] Memory state around the buggy address:
[   21.906135]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.906785]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.907402] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.908014]                                      ^
[   21.908523]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.909128]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.909791] ==================================================================
[   22.848236] ==================================================================
[   22.849631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   22.850435] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.851015] 
[   22.851288] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.851417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.851457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.851515] Call Trace:
[   22.851570]  <TASK>
[   22.851635]  dump_stack_lvl+0x73/0xb0
[   22.851715]  print_report+0xd1/0x650
[   22.851792]  ? __virt_addr_valid+0x1db/0x2d0
[   22.851870]  ? kasan_atomics_helper+0x151d/0x5450
[   22.851945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.852018]  ? kasan_atomics_helper+0x151d/0x5450
[   22.852093]  kasan_report+0x141/0x180
[   22.852168]  ? kasan_atomics_helper+0x151d/0x5450
[   22.852288]  kasan_check_range+0x10c/0x1c0
[   22.852333]  __kasan_check_write+0x18/0x20
[   22.852369]  kasan_atomics_helper+0x151d/0x5450
[   22.852405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.852438]  ? ret_from_fork_asm+0x1a/0x30
[   22.852477]  kasan_atomics+0x1dc/0x310
[   22.852506]  ? __pfx_kasan_atomics+0x10/0x10
[   22.852540]  ? __pfx_read_tsc+0x10/0x10
[   22.852569]  ? ktime_get_ts64+0x86/0x230
[   22.852628]  kunit_try_run_case+0x1a5/0x480
[   22.852669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.852705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.852740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.852774]  ? __kthread_parkme+0x82/0x180
[   22.852806]  ? preempt_count_sub+0x50/0x80
[   22.852842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.852878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.852912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.852947]  kthread+0x337/0x6f0
[   22.852971]  ? trace_preempt_on+0x20/0xc0
[   22.853006]  ? __pfx_kthread+0x10/0x10
[   22.853032]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.853064]  ? calculate_sigpending+0x7b/0xa0
[   22.853094]  ? __pfx_kthread+0x10/0x10
[   22.853120]  ret_from_fork+0x41/0x80
[   22.853153]  ? __pfx_kthread+0x10/0x10
[   22.853178]  ret_from_fork_asm+0x1a/0x30
[   22.853262]  </TASK>
[   22.853282] 
[   22.870839] Allocated by task 286:
[   22.871465]  kasan_save_stack+0x45/0x70
[   22.872087]  kasan_save_track+0x18/0x40
[   22.872869]  kasan_save_alloc_info+0x3b/0x50
[   22.873479]  __kasan_kmalloc+0xb7/0xc0
[   22.874108]  __kmalloc_cache_noprof+0x189/0x420
[   22.874699]  kasan_atomics+0x95/0x310
[   22.875333]  kunit_try_run_case+0x1a5/0x480
[   22.875845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.876594]  kthread+0x337/0x6f0
[   22.876986]  ret_from_fork+0x41/0x80
[   22.877338]  ret_from_fork_asm+0x1a/0x30
[   22.877853] 
[   22.878128] The buggy address belongs to the object at ffff888102a2c100
[   22.878128]  which belongs to the cache kmalloc-64 of size 64
[   22.879080] The buggy address is located 0 bytes to the right of
[   22.879080]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.880081] 
[   22.880326] The buggy address belongs to the physical page:
[   22.880837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.881516] flags: 0x200000000000000(node=0|zone=2)
[   22.881944] page_type: f5(slab)
[   22.882351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.883035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.883855] page dumped because: kasan: bad access detected
[   22.884358] 
[   22.884631] Memory state around the buggy address:
[   22.885069]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.885581]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.886645] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.887105]                                      ^
[   22.887640]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.888256]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.888760] ==================================================================
[   22.153647] ==================================================================
[   22.154864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   22.155701] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.157093] 
[   22.157571] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.157716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.157766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.157923] Call Trace:
[   22.157982]  <TASK>
[   22.158023]  dump_stack_lvl+0x73/0xb0
[   22.158064]  print_report+0xd1/0x650
[   22.158099]  ? __virt_addr_valid+0x1db/0x2d0
[   22.158132]  ? kasan_atomics_helper+0xde0/0x5450
[   22.158166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.158199]  ? kasan_atomics_helper+0xde0/0x5450
[   22.158264]  kasan_report+0x141/0x180
[   22.158302]  ? kasan_atomics_helper+0xde0/0x5450
[   22.158343]  kasan_check_range+0x10c/0x1c0
[   22.158373]  __kasan_check_write+0x18/0x20
[   22.158404]  kasan_atomics_helper+0xde0/0x5450
[   22.158440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.158473]  ? ret_from_fork_asm+0x1a/0x30
[   22.158513]  kasan_atomics+0x1dc/0x310
[   22.158542]  ? __pfx_kasan_atomics+0x10/0x10
[   22.158571]  ? __pfx_read_tsc+0x10/0x10
[   22.158599]  ? ktime_get_ts64+0x86/0x230
[   22.158661]  kunit_try_run_case+0x1a5/0x480
[   22.158698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.158732]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.158767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.158803]  ? __kthread_parkme+0x82/0x180
[   22.158834]  ? preempt_count_sub+0x50/0x80
[   22.158870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.158905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.158940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.158976]  kthread+0x337/0x6f0
[   22.159000]  ? trace_preempt_on+0x20/0xc0
[   22.159035]  ? __pfx_kthread+0x10/0x10
[   22.159060]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.159092]  ? calculate_sigpending+0x7b/0xa0
[   22.159123]  ? __pfx_kthread+0x10/0x10
[   22.159149]  ret_from_fork+0x41/0x80
[   22.159181]  ? __pfx_kthread+0x10/0x10
[   22.159208]  ret_from_fork_asm+0x1a/0x30
[   22.159277]  </TASK>
[   22.159294] 
[   22.177061] Allocated by task 286:
[   22.177475]  kasan_save_stack+0x45/0x70
[   22.177894]  kasan_save_track+0x18/0x40
[   22.178210]  kasan_save_alloc_info+0x3b/0x50
[   22.178600]  __kasan_kmalloc+0xb7/0xc0
[   22.179048]  __kmalloc_cache_noprof+0x189/0x420
[   22.179513]  kasan_atomics+0x95/0x310
[   22.179957]  kunit_try_run_case+0x1a5/0x480
[   22.180379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.180812]  kthread+0x337/0x6f0
[   22.181176]  ret_from_fork+0x41/0x80
[   22.181636]  ret_from_fork_asm+0x1a/0x30
[   22.182075] 
[   22.182361] The buggy address belongs to the object at ffff888102a2c100
[   22.182361]  which belongs to the cache kmalloc-64 of size 64
[   22.183310] The buggy address is located 0 bytes to the right of
[   22.183310]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.184282] 
[   22.184487] The buggy address belongs to the physical page:
[   22.184992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.185664] flags: 0x200000000000000(node=0|zone=2)
[   22.186059] page_type: f5(slab)
[   22.186368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.186824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.187298] page dumped because: kasan: bad access detected
[   22.187667] 
[   22.187854] Memory state around the buggy address:
[   22.188252]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.188743]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.189188] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.189926]                                      ^
[   22.190441]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.191434]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192058] ==================================================================
[   23.827649] ==================================================================
[   23.828172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   23.828926] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.829640] 
[   23.830488] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.831168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.831266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.831329] Call Trace:
[   23.831376]  <TASK>
[   23.831419]  dump_stack_lvl+0x73/0xb0
[   23.831521]  print_report+0xd1/0x650
[   23.831644]  ? __virt_addr_valid+0x1db/0x2d0
[   23.831694]  ? kasan_atomics_helper+0x4fa5/0x5450
[   23.831733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.831771]  ? kasan_atomics_helper+0x4fa5/0x5450
[   23.831808]  kasan_report+0x141/0x180
[   23.831844]  ? kasan_atomics_helper+0x4fa5/0x5450
[   23.831884]  __asan_report_load8_noabort+0x18/0x20
[   23.831916]  kasan_atomics_helper+0x4fa5/0x5450
[   23.831952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.831986]  ? ret_from_fork_asm+0x1a/0x30
[   23.832027]  kasan_atomics+0x1dc/0x310
[   23.832056]  ? __pfx_kasan_atomics+0x10/0x10
[   23.832087]  ? __pfx_read_tsc+0x10/0x10
[   23.832117]  ? ktime_get_ts64+0x86/0x230
[   23.832155]  kunit_try_run_case+0x1a5/0x480
[   23.832193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.832265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.832307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.832346]  ? __kthread_parkme+0x82/0x180
[   23.832379]  ? preempt_count_sub+0x50/0x80
[   23.832416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.832454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.832490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.832525]  kthread+0x337/0x6f0
[   23.832551]  ? trace_preempt_on+0x20/0xc0
[   23.832587]  ? __pfx_kthread+0x10/0x10
[   23.832639]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.832677]  ? calculate_sigpending+0x7b/0xa0
[   23.832710]  ? __pfx_kthread+0x10/0x10
[   23.832737]  ret_from_fork+0x41/0x80
[   23.832770]  ? __pfx_kthread+0x10/0x10
[   23.832797]  ret_from_fork_asm+0x1a/0x30
[   23.832839]  </TASK>
[   23.832854] 
[   23.848901] Allocated by task 286:
[   23.849704]  kasan_save_stack+0x45/0x70
[   23.850675]  kasan_save_track+0x18/0x40
[   23.851362]  kasan_save_alloc_info+0x3b/0x50
[   23.851823]  __kasan_kmalloc+0xb7/0xc0
[   23.852231]  __kmalloc_cache_noprof+0x189/0x420
[   23.852650]  kasan_atomics+0x95/0x310
[   23.853041]  kunit_try_run_case+0x1a5/0x480
[   23.853481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.854021]  kthread+0x337/0x6f0
[   23.854362]  ret_from_fork+0x41/0x80
[   23.854799]  ret_from_fork_asm+0x1a/0x30
[   23.855176] 
[   23.855408] The buggy address belongs to the object at ffff888102a2c100
[   23.855408]  which belongs to the cache kmalloc-64 of size 64
[   23.856342] The buggy address is located 0 bytes to the right of
[   23.856342]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.858068] 
[   23.858268] The buggy address belongs to the physical page:
[   23.859149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.859974] flags: 0x200000000000000(node=0|zone=2)
[   23.860739] page_type: f5(slab)
[   23.861014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.861869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.862419] page dumped because: kasan: bad access detected
[   23.862908] 
[   23.863132] Memory state around the buggy address:
[   23.863517]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.864250]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.864850] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.865489]                                      ^
[   23.865985]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.866643]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867282] ==================================================================
[   23.787159] ==================================================================
[   23.787759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   23.788475] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.789082] 
[   23.789358] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.789485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.789562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.789642] Call Trace:
[   23.789693]  <TASK>
[   23.789786]  dump_stack_lvl+0x73/0xb0
[   23.789870]  print_report+0xd1/0x650
[   23.789945]  ? __virt_addr_valid+0x1db/0x2d0
[   23.790018]  ? kasan_atomics_helper+0x218a/0x5450
[   23.790091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.790240]  ? kasan_atomics_helper+0x218a/0x5450
[   23.790329]  kasan_report+0x141/0x180
[   23.790404]  ? kasan_atomics_helper+0x218a/0x5450
[   23.790453]  kasan_check_range+0x10c/0x1c0
[   23.790529]  __kasan_check_write+0x18/0x20
[   23.790620]  kasan_atomics_helper+0x218a/0x5450
[   23.790744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.790826]  ? ret_from_fork_asm+0x1a/0x30
[   23.790919]  kasan_atomics+0x1dc/0x310
[   23.791036]  ? __pfx_kasan_atomics+0x10/0x10
[   23.791115]  ? __pfx_read_tsc+0x10/0x10
[   23.791184]  ? ktime_get_ts64+0x86/0x230
[   23.791279]  kunit_try_run_case+0x1a5/0x480
[   23.791320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.791357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.791395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.791433]  ? __kthread_parkme+0x82/0x180
[   23.791465]  ? preempt_count_sub+0x50/0x80
[   23.791501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.791538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.791574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.791641]  kthread+0x337/0x6f0
[   23.791687]  ? trace_preempt_on+0x20/0xc0
[   23.791723]  ? __pfx_kthread+0x10/0x10
[   23.791748]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.791780]  ? calculate_sigpending+0x7b/0xa0
[   23.791810]  ? __pfx_kthread+0x10/0x10
[   23.791835]  ret_from_fork+0x41/0x80
[   23.791866]  ? __pfx_kthread+0x10/0x10
[   23.791890]  ret_from_fork_asm+0x1a/0x30
[   23.791931]  </TASK>
[   23.791945] 
[   23.807817] Allocated by task 286:
[   23.808318]  kasan_save_stack+0x45/0x70
[   23.808865]  kasan_save_track+0x18/0x40
[   23.809288]  kasan_save_alloc_info+0x3b/0x50
[   23.809634]  __kasan_kmalloc+0xb7/0xc0
[   23.810041]  __kmalloc_cache_noprof+0x189/0x420
[   23.810636]  kasan_atomics+0x95/0x310
[   23.811111]  kunit_try_run_case+0x1a5/0x480
[   23.811735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.812391]  kthread+0x337/0x6f0
[   23.812756]  ret_from_fork+0x41/0x80
[   23.813056]  ret_from_fork_asm+0x1a/0x30
[   23.813538] 
[   23.813804] The buggy address belongs to the object at ffff888102a2c100
[   23.813804]  which belongs to the cache kmalloc-64 of size 64
[   23.814985] The buggy address is located 0 bytes to the right of
[   23.814985]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.816737] 
[   23.817020] The buggy address belongs to the physical page:
[   23.818022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.818794] flags: 0x200000000000000(node=0|zone=2)
[   23.819325] page_type: f5(slab)
[   23.820036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.820775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.821517] page dumped because: kasan: bad access detected
[   23.821876] 
[   23.822108] Memory state around the buggy address:
[   23.822912]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.823554]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.824127] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.824777]                                      ^
[   23.825288]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.825896]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.826538] ==================================================================
[   23.085594] ==================================================================
[   23.086859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   23.087929] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.088502] 
[   23.088756] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.088880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.088920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.088976] Call Trace:
[   23.089032]  <TASK>
[   23.089075]  dump_stack_lvl+0x73/0xb0
[   23.089154]  print_report+0xd1/0x650
[   23.089223]  ? __virt_addr_valid+0x1db/0x2d0
[   23.089275]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.089337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.089415]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.089496]  kasan_report+0x141/0x180
[   23.089574]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.089769]  kasan_check_range+0x10c/0x1c0
[   23.089846]  __kasan_check_write+0x18/0x20
[   23.089911]  kasan_atomics_helper+0x18b1/0x5450
[   23.089952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.089987]  ? ret_from_fork_asm+0x1a/0x30
[   23.090027]  kasan_atomics+0x1dc/0x310
[   23.090057]  ? __pfx_kasan_atomics+0x10/0x10
[   23.090089]  ? __pfx_read_tsc+0x10/0x10
[   23.090117]  ? ktime_get_ts64+0x86/0x230
[   23.090156]  kunit_try_run_case+0x1a5/0x480
[   23.090193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.090267]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.090308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.090343]  ? __kthread_parkme+0x82/0x180
[   23.090377]  ? preempt_count_sub+0x50/0x80
[   23.090414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.090450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.090483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.090519]  kthread+0x337/0x6f0
[   23.090543]  ? trace_preempt_on+0x20/0xc0
[   23.090577]  ? __pfx_kthread+0x10/0x10
[   23.090624]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.090665]  ? calculate_sigpending+0x7b/0xa0
[   23.090697]  ? __pfx_kthread+0x10/0x10
[   23.090725]  ret_from_fork+0x41/0x80
[   23.090757]  ? __pfx_kthread+0x10/0x10
[   23.090784]  ret_from_fork_asm+0x1a/0x30
[   23.090826]  </TASK>
[   23.090841] 
[   23.107098] Allocated by task 286:
[   23.107559]  kasan_save_stack+0x45/0x70
[   23.108030]  kasan_save_track+0x18/0x40
[   23.108573]  kasan_save_alloc_info+0x3b/0x50
[   23.109111]  __kasan_kmalloc+0xb7/0xc0
[   23.109590]  __kmalloc_cache_noprof+0x189/0x420
[   23.110131]  kasan_atomics+0x95/0x310
[   23.110689]  kunit_try_run_case+0x1a5/0x480
[   23.111159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.111784]  kthread+0x337/0x6f0
[   23.112143]  ret_from_fork+0x41/0x80
[   23.112676]  ret_from_fork_asm+0x1a/0x30
[   23.113205] 
[   23.113515] The buggy address belongs to the object at ffff888102a2c100
[   23.113515]  which belongs to the cache kmalloc-64 of size 64
[   23.114568] The buggy address is located 0 bytes to the right of
[   23.114568]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.115767] 
[   23.116028] The buggy address belongs to the physical page:
[   23.116652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.117513] flags: 0x200000000000000(node=0|zone=2)
[   23.118046] page_type: f5(slab)
[   23.118579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.119319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.120014] page dumped because: kasan: bad access detected
[   23.120635] 
[   23.120869] Memory state around the buggy address:
[   23.121397]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.122005]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.122656] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.123383]                                      ^
[   23.123914]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.124436]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.125265] ==================================================================
[   22.024893] ==================================================================
[   22.025802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   22.026630] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.027188] 
[   22.027447] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.027572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.027632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.027694] Call Trace:
[   22.027747]  <TASK>
[   22.027791]  dump_stack_lvl+0x73/0xb0
[   22.027871]  print_report+0xd1/0x650
[   22.027949]  ? __virt_addr_valid+0x1db/0x2d0
[   22.028026]  ? kasan_atomics_helper+0xc70/0x5450
[   22.028102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.028181]  ? kasan_atomics_helper+0xc70/0x5450
[   22.028263]  kasan_report+0x141/0x180
[   22.028346]  ? kasan_atomics_helper+0xc70/0x5450
[   22.028437]  kasan_check_range+0x10c/0x1c0
[   22.028518]  __kasan_check_write+0x18/0x20
[   22.028588]  kasan_atomics_helper+0xc70/0x5450
[   22.028688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.028768]  ? ret_from_fork_asm+0x1a/0x30
[   22.028856]  kasan_atomics+0x1dc/0x310
[   22.028927]  ? __pfx_kasan_atomics+0x10/0x10
[   22.029000]  ? __pfx_read_tsc+0x10/0x10
[   22.029064]  ? ktime_get_ts64+0x86/0x230
[   22.029145]  kunit_try_run_case+0x1a5/0x480
[   22.029231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.029305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.029386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.029463]  ? __kthread_parkme+0x82/0x180
[   22.029533]  ? preempt_count_sub+0x50/0x80
[   22.029630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.029711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.029800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.029876]  kthread+0x337/0x6f0
[   22.029936]  ? trace_preempt_on+0x20/0xc0
[   22.030012]  ? __pfx_kthread+0x10/0x10
[   22.030077]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.030149]  ? calculate_sigpending+0x7b/0xa0
[   22.030221]  ? __pfx_kthread+0x10/0x10
[   22.030285]  ret_from_fork+0x41/0x80
[   22.030338]  ? __pfx_kthread+0x10/0x10
[   22.030395]  ret_from_fork_asm+0x1a/0x30
[   22.030486]  </TASK>
[   22.030528] 
[   22.044184] Allocated by task 286:
[   22.044545]  kasan_save_stack+0x45/0x70
[   22.044982]  kasan_save_track+0x18/0x40
[   22.045503]  kasan_save_alloc_info+0x3b/0x50
[   22.045978]  __kasan_kmalloc+0xb7/0xc0
[   22.046502]  __kmalloc_cache_noprof+0x189/0x420
[   22.046929]  kasan_atomics+0x95/0x310
[   22.047299]  kunit_try_run_case+0x1a5/0x480
[   22.047736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.048195]  kthread+0x337/0x6f0
[   22.048575]  ret_from_fork+0x41/0x80
[   22.048943]  ret_from_fork_asm+0x1a/0x30
[   22.049266] 
[   22.049570] The buggy address belongs to the object at ffff888102a2c100
[   22.049570]  which belongs to the cache kmalloc-64 of size 64
[   22.050554] The buggy address is located 0 bytes to the right of
[   22.050554]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.051287] 
[   22.051470] The buggy address belongs to the physical page:
[   22.051957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.052733] flags: 0x200000000000000(node=0|zone=2)
[   22.053477] page_type: f5(slab)
[   22.053802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.054282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.055046] page dumped because: kasan: bad access detected
[   22.055814] 
[   22.056147] Memory state around the buggy address:
[   22.056708]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.059521]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.059988] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.061333]                                      ^
[   22.062747]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.063921]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.065137] ==================================================================
[   21.243970] ==================================================================
[   21.244922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   21.245547] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.246081] 
[   21.246335] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.246454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.246492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.246543] Call Trace:
[   21.246579]  <TASK>
[   21.246635]  dump_stack_lvl+0x73/0xb0
[   21.246797]  print_report+0xd1/0x650
[   21.246882]  ? __virt_addr_valid+0x1db/0x2d0
[   21.246953]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.247023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.247095]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.247164]  kasan_report+0x141/0x180
[   21.247235]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.247324]  __asan_report_load4_noabort+0x18/0x20
[   21.247390]  kasan_atomics_helper+0x4b88/0x5450
[   21.247446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.247519]  ? ret_from_fork_asm+0x1a/0x30
[   21.247625]  kasan_atomics+0x1dc/0x310
[   21.247699]  ? __pfx_kasan_atomics+0x10/0x10
[   21.247775]  ? __pfx_read_tsc+0x10/0x10
[   21.247843]  ? ktime_get_ts64+0x86/0x230
[   21.247924]  kunit_try_run_case+0x1a5/0x480
[   21.248005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.248075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.248154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.248233]  ? __kthread_parkme+0x82/0x180
[   21.248404]  ? preempt_count_sub+0x50/0x80
[   21.248496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.248571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.248746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.248824]  kthread+0x337/0x6f0
[   21.248884]  ? trace_preempt_on+0x20/0xc0
[   21.248960]  ? __pfx_kthread+0x10/0x10
[   21.249020]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.249088]  ? calculate_sigpending+0x7b/0xa0
[   21.249152]  ? __pfx_kthread+0x10/0x10
[   21.249183]  ret_from_fork+0x41/0x80
[   21.249223]  ? __pfx_kthread+0x10/0x10
[   21.249275]  ret_from_fork_asm+0x1a/0x30
[   21.249317]  </TASK>
[   21.249332] 
[   21.272192] Allocated by task 286:
[   21.272854]  kasan_save_stack+0x45/0x70
[   21.273332]  kasan_save_track+0x18/0x40
[   21.273857]  kasan_save_alloc_info+0x3b/0x50
[   21.274289]  __kasan_kmalloc+0xb7/0xc0
[   21.274700]  __kmalloc_cache_noprof+0x189/0x420
[   21.275140]  kasan_atomics+0x95/0x310
[   21.275482]  kunit_try_run_case+0x1a5/0x480
[   21.276184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.276656]  kthread+0x337/0x6f0
[   21.277021]  ret_from_fork+0x41/0x80
[   21.277429]  ret_from_fork_asm+0x1a/0x30
[   21.277958] 
[   21.278198] The buggy address belongs to the object at ffff888102a2c100
[   21.278198]  which belongs to the cache kmalloc-64 of size 64
[   21.279244] The buggy address is located 0 bytes to the right of
[   21.279244]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.280537] 
[   21.280906] The buggy address belongs to the physical page:
[   21.281459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.282707] flags: 0x200000000000000(node=0|zone=2)
[   21.283187] page_type: f5(slab)
[   21.283738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.284455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.285261] page dumped because: kasan: bad access detected
[   21.285933] 
[   21.286155] Memory state around the buggy address:
[   21.287014]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.287666]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.288256] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.288939]                                      ^
[   21.289483]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290257]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.291193] ==================================================================
[   23.208878] ==================================================================
[   23.209471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   23.210257] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.211498] 
[   23.211885] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.212008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.212049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.212131] Call Trace:
[   23.212212]  <TASK>
[   23.212259]  dump_stack_lvl+0x73/0xb0
[   23.212355]  print_report+0xd1/0x650
[   23.212406]  ? __virt_addr_valid+0x1db/0x2d0
[   23.212441]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.212474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.212509]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.212543]  kasan_report+0x141/0x180
[   23.212579]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.212646]  kasan_check_range+0x10c/0x1c0
[   23.212681]  __kasan_check_write+0x18/0x20
[   23.212711]  kasan_atomics_helper+0x1a7f/0x5450
[   23.212746]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.212780]  ? ret_from_fork_asm+0x1a/0x30
[   23.212819]  kasan_atomics+0x1dc/0x310
[   23.212848]  ? __pfx_kasan_atomics+0x10/0x10
[   23.212880]  ? __pfx_read_tsc+0x10/0x10
[   23.212908]  ? ktime_get_ts64+0x86/0x230
[   23.212945]  kunit_try_run_case+0x1a5/0x480
[   23.212981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.213016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.213052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.213086]  ? __kthread_parkme+0x82/0x180
[   23.213118]  ? preempt_count_sub+0x50/0x80
[   23.213154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.213191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.213260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.213304]  kthread+0x337/0x6f0
[   23.213331]  ? trace_preempt_on+0x20/0xc0
[   23.213368]  ? __pfx_kthread+0x10/0x10
[   23.213393]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.213427]  ? calculate_sigpending+0x7b/0xa0
[   23.213458]  ? __pfx_kthread+0x10/0x10
[   23.213484]  ret_from_fork+0x41/0x80
[   23.213515]  ? __pfx_kthread+0x10/0x10
[   23.213541]  ret_from_fork_asm+0x1a/0x30
[   23.213584]  </TASK>
[   23.213616] 
[   23.230536] Allocated by task 286:
[   23.230857]  kasan_save_stack+0x45/0x70
[   23.231298]  kasan_save_track+0x18/0x40
[   23.231804]  kasan_save_alloc_info+0x3b/0x50
[   23.232223]  __kasan_kmalloc+0xb7/0xc0
[   23.232557]  __kmalloc_cache_noprof+0x189/0x420
[   23.233105]  kasan_atomics+0x95/0x310
[   23.233620]  kunit_try_run_case+0x1a5/0x480
[   23.234029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.234474]  kthread+0x337/0x6f0
[   23.235537]  ret_from_fork+0x41/0x80
[   23.236290]  ret_from_fork_asm+0x1a/0x30
[   23.236747] 
[   23.236960] The buggy address belongs to the object at ffff888102a2c100
[   23.236960]  which belongs to the cache kmalloc-64 of size 64
[   23.238261] The buggy address is located 0 bytes to the right of
[   23.238261]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.239531] 
[   23.239734] The buggy address belongs to the physical page:
[   23.240548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.241222] flags: 0x200000000000000(node=0|zone=2)
[   23.241653] page_type: f5(slab)
[   23.242000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.242682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.243155] page dumped because: kasan: bad access detected
[   23.243676] 
[   23.243903] Memory state around the buggy address:
[   23.244312]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.245169]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.246077] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.246652]                                      ^
[   23.247285]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.248236]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.249040] ==================================================================
[   21.731354] ==================================================================
[   21.732007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   21.732753] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.733553] 
[   21.733834] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.734024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.734070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.734130] Call Trace:
[   21.734187]  <TASK>
[   21.734274]  dump_stack_lvl+0x73/0xb0
[   21.734362]  print_report+0xd1/0x650
[   21.734446]  ? __virt_addr_valid+0x1db/0x2d0
[   21.734529]  ? kasan_atomics_helper+0x7c7/0x5450
[   21.734625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.734710]  ? kasan_atomics_helper+0x7c7/0x5450
[   21.734811]  kasan_report+0x141/0x180
[   21.734923]  ? kasan_atomics_helper+0x7c7/0x5450
[   21.735011]  kasan_check_range+0x10c/0x1c0
[   21.735085]  __kasan_check_write+0x18/0x20
[   21.735155]  kasan_atomics_helper+0x7c7/0x5450
[   21.735272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.735355]  ? ret_from_fork_asm+0x1a/0x30
[   21.735444]  kasan_atomics+0x1dc/0x310
[   21.735516]  ? __pfx_kasan_atomics+0x10/0x10
[   21.735589]  ? __pfx_read_tsc+0x10/0x10
[   21.735710]  ? ktime_get_ts64+0x86/0x230
[   21.735796]  kunit_try_run_case+0x1a5/0x480
[   21.735883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.735927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.735964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.736000]  ? __kthread_parkme+0x82/0x180
[   21.736031]  ? preempt_count_sub+0x50/0x80
[   21.736068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.736105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.736139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.736175]  kthread+0x337/0x6f0
[   21.736198]  ? trace_preempt_on+0x20/0xc0
[   21.736275]  ? __pfx_kthread+0x10/0x10
[   21.736305]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.736338]  ? calculate_sigpending+0x7b/0xa0
[   21.736370]  ? __pfx_kthread+0x10/0x10
[   21.736395]  ret_from_fork+0x41/0x80
[   21.736428]  ? __pfx_kthread+0x10/0x10
[   21.736454]  ret_from_fork_asm+0x1a/0x30
[   21.736498]  </TASK>
[   21.736513] 
[   21.758400] Allocated by task 286:
[   21.759344]  kasan_save_stack+0x45/0x70
[   21.759952]  kasan_save_track+0x18/0x40
[   21.760485]  kasan_save_alloc_info+0x3b/0x50
[   21.761164]  __kasan_kmalloc+0xb7/0xc0
[   21.761804]  __kmalloc_cache_noprof+0x189/0x420
[   21.762395]  kasan_atomics+0x95/0x310
[   21.762986]  kunit_try_run_case+0x1a5/0x480
[   21.763477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.764509]  kthread+0x337/0x6f0
[   21.764967]  ret_from_fork+0x41/0x80
[   21.765321]  ret_from_fork_asm+0x1a/0x30
[   21.765799] 
[   21.766048] The buggy address belongs to the object at ffff888102a2c100
[   21.766048]  which belongs to the cache kmalloc-64 of size 64
[   21.767347] The buggy address is located 0 bytes to the right of
[   21.767347]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.768631] 
[   21.768957] The buggy address belongs to the physical page:
[   21.769340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.770538] flags: 0x200000000000000(node=0|zone=2)
[   21.771040] page_type: f5(slab)
[   21.771388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.772010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.772593] page dumped because: kasan: bad access detected
[   21.773718] 
[   21.773960] Memory state around the buggy address:
[   21.774789]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.775094]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.776100] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.777188]                                      ^
[   21.777545]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.778063]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.779279] ==================================================================
[   22.435406] ==================================================================
[   22.436042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   22.436748] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.437539] 
[   22.437832] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.437955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.437996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.438053] Call Trace:
[   22.438159]  <TASK>
[   22.438254]  dump_stack_lvl+0x73/0xb0
[   22.438398]  print_report+0xd1/0x650
[   22.438485]  ? __virt_addr_valid+0x1db/0x2d0
[   22.438563]  ? kasan_atomics_helper+0x1148/0x5450
[   22.438657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.438708]  ? kasan_atomics_helper+0x1148/0x5450
[   22.438747]  kasan_report+0x141/0x180
[   22.438786]  ? kasan_atomics_helper+0x1148/0x5450
[   22.438827]  kasan_check_range+0x10c/0x1c0
[   22.438860]  __kasan_check_write+0x18/0x20
[   22.438890]  kasan_atomics_helper+0x1148/0x5450
[   22.438924]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.438960]  ? ret_from_fork_asm+0x1a/0x30
[   22.439001]  kasan_atomics+0x1dc/0x310
[   22.439031]  ? __pfx_kasan_atomics+0x10/0x10
[   22.439063]  ? __pfx_read_tsc+0x10/0x10
[   22.439092]  ? ktime_get_ts64+0x86/0x230
[   22.439129]  kunit_try_run_case+0x1a5/0x480
[   22.439169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.439205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.439283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.439321]  ? __kthread_parkme+0x82/0x180
[   22.439355]  ? preempt_count_sub+0x50/0x80
[   22.439393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.439431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.439467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.439503]  kthread+0x337/0x6f0
[   22.439529]  ? trace_preempt_on+0x20/0xc0
[   22.439565]  ? __pfx_kthread+0x10/0x10
[   22.439593]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.439653]  ? calculate_sigpending+0x7b/0xa0
[   22.439689]  ? __pfx_kthread+0x10/0x10
[   22.439716]  ret_from_fork+0x41/0x80
[   22.439748]  ? __pfx_kthread+0x10/0x10
[   22.439775]  ret_from_fork_asm+0x1a/0x30
[   22.439819]  </TASK>
[   22.439833] 
[   22.457433] Allocated by task 286:
[   22.458157]  kasan_save_stack+0x45/0x70
[   22.458869]  kasan_save_track+0x18/0x40
[   22.459184]  kasan_save_alloc_info+0x3b/0x50
[   22.459639]  __kasan_kmalloc+0xb7/0xc0
[   22.460107]  __kmalloc_cache_noprof+0x189/0x420
[   22.460792]  kasan_atomics+0x95/0x310
[   22.461222]  kunit_try_run_case+0x1a5/0x480
[   22.461663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.462224]  kthread+0x337/0x6f0
[   22.462576]  ret_from_fork+0x41/0x80
[   22.463007]  ret_from_fork_asm+0x1a/0x30
[   22.463450] 
[   22.463669] The buggy address belongs to the object at ffff888102a2c100
[   22.463669]  which belongs to the cache kmalloc-64 of size 64
[   22.464662] The buggy address is located 0 bytes to the right of
[   22.464662]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.465429] 
[   22.465686] The buggy address belongs to the physical page:
[   22.466193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.466931] flags: 0x200000000000000(node=0|zone=2)
[   22.467524] page_type: f5(slab)
[   22.467908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.468926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.469439] page dumped because: kasan: bad access detected
[   22.470010] 
[   22.470169] Memory state around the buggy address:
[   22.470470]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.471153]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.471577] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.473171]                                      ^
[   22.473658]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.474197]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.475166] ==================================================================
[   23.495194] ==================================================================
[   23.496005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   23.497777] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.498585] 
[   23.498850] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.498964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.498985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.499015] Call Trace:
[   23.499038]  <TASK>
[   23.499059]  dump_stack_lvl+0x73/0xb0
[   23.499136]  print_report+0xd1/0x650
[   23.499230]  ? __virt_addr_valid+0x1db/0x2d0
[   23.499309]  ? kasan_atomics_helper+0x1eaa/0x5450
[   23.499379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.499458]  ? kasan_atomics_helper+0x1eaa/0x5450
[   23.499524]  kasan_report+0x141/0x180
[   23.499562]  ? kasan_atomics_helper+0x1eaa/0x5450
[   23.499625]  kasan_check_range+0x10c/0x1c0
[   23.499662]  __kasan_check_write+0x18/0x20
[   23.499694]  kasan_atomics_helper+0x1eaa/0x5450
[   23.499729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.499764]  ? ret_from_fork_asm+0x1a/0x30
[   23.499804]  kasan_atomics+0x1dc/0x310
[   23.499832]  ? __pfx_kasan_atomics+0x10/0x10
[   23.499863]  ? __pfx_read_tsc+0x10/0x10
[   23.499893]  ? ktime_get_ts64+0x86/0x230
[   23.499930]  kunit_try_run_case+0x1a5/0x480
[   23.499967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.500001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.500037]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.500071]  ? __kthread_parkme+0x82/0x180
[   23.500102]  ? preempt_count_sub+0x50/0x80
[   23.500138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.500174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.500210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.500272]  kthread+0x337/0x6f0
[   23.500299]  ? trace_preempt_on+0x20/0xc0
[   23.500334]  ? __pfx_kthread+0x10/0x10
[   23.500361]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.500394]  ? calculate_sigpending+0x7b/0xa0
[   23.500426]  ? __pfx_kthread+0x10/0x10
[   23.500452]  ret_from_fork+0x41/0x80
[   23.500483]  ? __pfx_kthread+0x10/0x10
[   23.500507]  ret_from_fork_asm+0x1a/0x30
[   23.500549]  </TASK>
[   23.500564] 
[   23.520389] Allocated by task 286:
[   23.521206]  kasan_save_stack+0x45/0x70
[   23.521845]  kasan_save_track+0x18/0x40
[   23.522281]  kasan_save_alloc_info+0x3b/0x50
[   23.522913]  __kasan_kmalloc+0xb7/0xc0
[   23.523428]  __kmalloc_cache_noprof+0x189/0x420
[   23.523881]  kasan_atomics+0x95/0x310
[   23.524047]  kunit_try_run_case+0x1a5/0x480
[   23.524233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.524796]  kthread+0x337/0x6f0
[   23.525164]  ret_from_fork+0x41/0x80
[   23.525722]  ret_from_fork_asm+0x1a/0x30
[   23.526153] 
[   23.526668] The buggy address belongs to the object at ffff888102a2c100
[   23.526668]  which belongs to the cache kmalloc-64 of size 64
[   23.528245] The buggy address is located 0 bytes to the right of
[   23.528245]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.529496] 
[   23.530030] The buggy address belongs to the physical page:
[   23.530442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.531448] flags: 0x200000000000000(node=0|zone=2)
[   23.532091] page_type: f5(slab)
[   23.532424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.533018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.533700] page dumped because: kasan: bad access detected
[   23.534143] 
[   23.534341] Memory state around the buggy address:
[   23.534896]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.536056]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.536781] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.537745]                                      ^
[   23.538136]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.538800]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.539364] ==================================================================
[   22.559416] ==================================================================
[   22.561115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   22.562351] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.563560] 
[   22.564093] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.564296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.564339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.564407] Call Trace:
[   22.564455]  <TASK>
[   22.564496]  dump_stack_lvl+0x73/0xb0
[   22.564544]  print_report+0xd1/0x650
[   22.564581]  ? __virt_addr_valid+0x1db/0x2d0
[   22.564636]  ? kasan_atomics_helper+0x49e8/0x5450
[   22.564674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.564709]  ? kasan_atomics_helper+0x49e8/0x5450
[   22.564744]  kasan_report+0x141/0x180
[   22.564778]  ? kasan_atomics_helper+0x49e8/0x5450
[   22.564818]  __asan_report_load4_noabort+0x18/0x20
[   22.564850]  kasan_atomics_helper+0x49e8/0x5450
[   22.564885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.564919]  ? ret_from_fork_asm+0x1a/0x30
[   22.564956]  kasan_atomics+0x1dc/0x310
[   22.564985]  ? __pfx_kasan_atomics+0x10/0x10
[   22.565015]  ? __pfx_read_tsc+0x10/0x10
[   22.565044]  ? ktime_get_ts64+0x86/0x230
[   22.565079]  kunit_try_run_case+0x1a5/0x480
[   22.565116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.565149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.565185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.565234]  ? __kthread_parkme+0x82/0x180
[   22.565284]  ? preempt_count_sub+0x50/0x80
[   22.565321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.565358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.565392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.565428]  kthread+0x337/0x6f0
[   22.565451]  ? trace_preempt_on+0x20/0xc0
[   22.565485]  ? __pfx_kthread+0x10/0x10
[   22.565510]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.565542]  ? calculate_sigpending+0x7b/0xa0
[   22.565572]  ? __pfx_kthread+0x10/0x10
[   22.565598]  ret_from_fork+0x41/0x80
[   22.565652]  ? __pfx_kthread+0x10/0x10
[   22.565679]  ret_from_fork_asm+0x1a/0x30
[   22.565722]  </TASK>
[   22.565737] 
[   22.583088] Allocated by task 286:
[   22.583962]  kasan_save_stack+0x45/0x70
[   22.584492]  kasan_save_track+0x18/0x40
[   22.584902]  kasan_save_alloc_info+0x3b/0x50
[   22.585566]  __kasan_kmalloc+0xb7/0xc0
[   22.585908]  __kmalloc_cache_noprof+0x189/0x420
[   22.586592]  kasan_atomics+0x95/0x310
[   22.587011]  kunit_try_run_case+0x1a5/0x480
[   22.587616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.588282]  kthread+0x337/0x6f0
[   22.588621]  ret_from_fork+0x41/0x80
[   22.589135]  ret_from_fork_asm+0x1a/0x30
[   22.589763] 
[   22.589950] The buggy address belongs to the object at ffff888102a2c100
[   22.589950]  which belongs to the cache kmalloc-64 of size 64
[   22.591185] The buggy address is located 0 bytes to the right of
[   22.591185]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.592455] 
[   22.592713] The buggy address belongs to the physical page:
[   22.593432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.594255] flags: 0x200000000000000(node=0|zone=2)
[   22.594797] page_type: f5(slab)
[   22.595169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.596123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.596925] page dumped because: kasan: bad access detected
[   22.597518] 
[   22.597782] Memory state around the buggy address:
[   22.598283]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.598874]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.599520] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.600139]                                      ^
[   22.600630]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601178]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601862] ==================================================================
[   22.927432] ==================================================================
[   22.928128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   22.928836] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.929371] 
[   22.929585] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.929776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.929817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.929873] Call Trace:
[   22.929921]  <TASK>
[   22.929964]  dump_stack_lvl+0x73/0xb0
[   22.930041]  print_report+0xd1/0x650
[   22.930120]  ? __virt_addr_valid+0x1db/0x2d0
[   22.930198]  ? kasan_atomics_helper+0x164f/0x5450
[   22.930320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.930384]  ? kasan_atomics_helper+0x164f/0x5450
[   22.930446]  kasan_report+0x141/0x180
[   22.930524]  ? kasan_atomics_helper+0x164f/0x5450
[   22.930634]  kasan_check_range+0x10c/0x1c0
[   22.930715]  __kasan_check_write+0x18/0x20
[   22.930792]  kasan_atomics_helper+0x164f/0x5450
[   22.930873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.930954]  ? ret_from_fork_asm+0x1a/0x30
[   22.931049]  kasan_atomics+0x1dc/0x310
[   22.931121]  ? __pfx_kasan_atomics+0x10/0x10
[   22.931201]  ? __pfx_read_tsc+0x10/0x10
[   22.931311]  ? ktime_get_ts64+0x86/0x230
[   22.931394]  kunit_try_run_case+0x1a5/0x480
[   22.931474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.931545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.931639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.931720]  ? __kthread_parkme+0x82/0x180
[   22.931792]  ? preempt_count_sub+0x50/0x80
[   22.931872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.931950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.932026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.932092]  kthread+0x337/0x6f0
[   22.932121]  ? trace_preempt_on+0x20/0xc0
[   22.932156]  ? __pfx_kthread+0x10/0x10
[   22.932183]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.932267]  ? calculate_sigpending+0x7b/0xa0
[   22.932307]  ? __pfx_kthread+0x10/0x10
[   22.932335]  ret_from_fork+0x41/0x80
[   22.932367]  ? __pfx_kthread+0x10/0x10
[   22.932393]  ret_from_fork_asm+0x1a/0x30
[   22.932435]  </TASK>
[   22.932448] 
[   22.946471] Allocated by task 286:
[   22.946853]  kasan_save_stack+0x45/0x70
[   22.947261]  kasan_save_track+0x18/0x40
[   22.947665]  kasan_save_alloc_info+0x3b/0x50
[   22.948020]  __kasan_kmalloc+0xb7/0xc0
[   22.948389]  __kmalloc_cache_noprof+0x189/0x420
[   22.948756]  kasan_atomics+0x95/0x310
[   22.949108]  kunit_try_run_case+0x1a5/0x480
[   22.949620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.950168]  kthread+0x337/0x6f0
[   22.950590]  ret_from_fork+0x41/0x80
[   22.951026]  ret_from_fork_asm+0x1a/0x30
[   22.951496] 
[   22.951753] The buggy address belongs to the object at ffff888102a2c100
[   22.951753]  which belongs to the cache kmalloc-64 of size 64
[   22.952512] The buggy address is located 0 bytes to the right of
[   22.952512]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.953596] 
[   22.953849] The buggy address belongs to the physical page:
[   22.954341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.954984] flags: 0x200000000000000(node=0|zone=2)
[   22.955493] page_type: f5(slab)
[   22.955837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.956371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.956963] page dumped because: kasan: bad access detected
[   22.957535] 
[   22.957793] Memory state around the buggy address:
[   22.958294]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.958921]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.959582] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.960113]                                      ^
[   22.960491]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.961113]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.961800] ==================================================================
[   22.963929] ==================================================================
[   22.965896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   22.966658] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.967995] 
[   22.968482] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.968632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.968674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.968730] Call Trace:
[   22.968778]  <TASK>
[   22.968821]  dump_stack_lvl+0x73/0xb0
[   22.968897]  print_report+0xd1/0x650
[   22.968972]  ? __virt_addr_valid+0x1db/0x2d0
[   22.969047]  ? kasan_atomics_helper+0x16e7/0x5450
[   22.969122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.969218]  ? kasan_atomics_helper+0x16e7/0x5450
[   22.969286]  kasan_report+0x141/0x180
[   22.969326]  ? kasan_atomics_helper+0x16e7/0x5450
[   22.969368]  kasan_check_range+0x10c/0x1c0
[   22.969401]  __kasan_check_write+0x18/0x20
[   22.969432]  kasan_atomics_helper+0x16e7/0x5450
[   22.969467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.969503]  ? ret_from_fork_asm+0x1a/0x30
[   22.969542]  kasan_atomics+0x1dc/0x310
[   22.969571]  ? __pfx_kasan_atomics+0x10/0x10
[   22.969623]  ? __pfx_read_tsc+0x10/0x10
[   22.969657]  ? ktime_get_ts64+0x86/0x230
[   22.969694]  kunit_try_run_case+0x1a5/0x480
[   22.969731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.969775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.969811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.969847]  ? __kthread_parkme+0x82/0x180
[   22.969877]  ? preempt_count_sub+0x50/0x80
[   22.969913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.969949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.969983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.970017]  kthread+0x337/0x6f0
[   22.970040]  ? trace_preempt_on+0x20/0xc0
[   22.970075]  ? __pfx_kthread+0x10/0x10
[   22.970099]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.970131]  ? calculate_sigpending+0x7b/0xa0
[   22.970163]  ? __pfx_kthread+0x10/0x10
[   22.970188]  ret_from_fork+0x41/0x80
[   22.970256]  ? __pfx_kthread+0x10/0x10
[   22.970290]  ret_from_fork_asm+0x1a/0x30
[   22.970333]  </TASK>
[   22.970348] 
[   22.984563] Allocated by task 286:
[   22.984958]  kasan_save_stack+0x45/0x70
[   22.985446]  kasan_save_track+0x18/0x40
[   22.985882]  kasan_save_alloc_info+0x3b/0x50
[   22.986297]  __kasan_kmalloc+0xb7/0xc0
[   22.986689]  __kmalloc_cache_noprof+0x189/0x420
[   22.987113]  kasan_atomics+0x95/0x310
[   22.987720]  kunit_try_run_case+0x1a5/0x480
[   22.988111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.988635]  kthread+0x337/0x6f0
[   22.988916]  ret_from_fork+0x41/0x80
[   22.989214]  ret_from_fork_asm+0x1a/0x30
[   22.989637] 
[   22.989883] The buggy address belongs to the object at ffff888102a2c100
[   22.989883]  which belongs to the cache kmalloc-64 of size 64
[   22.990974] The buggy address is located 0 bytes to the right of
[   22.990974]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.991884] 
[   22.992068] The buggy address belongs to the physical page:
[   22.992508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.993436] flags: 0x200000000000000(node=0|zone=2)
[   22.993891] page_type: f5(slab)
[   22.994257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.994872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.995367] page dumped because: kasan: bad access detected
[   22.996188] 
[   22.996394] Memory state around the buggy address:
[   22.996750]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.997197]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.999106] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.000722]                                      ^
[   23.001624]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.002091]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.002590] ==================================================================
[   21.158094] ==================================================================
[   21.159779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   21.160481] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.161170] 
[   21.161925] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.162105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.162147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.162205] Call Trace:
[   21.162246]  <TASK>
[   21.162290]  dump_stack_lvl+0x73/0xb0
[   21.162363]  print_report+0xd1/0x650
[   21.162435]  ? __virt_addr_valid+0x1db/0x2d0
[   21.162508]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.162571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.162714]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.162757]  kasan_report+0x141/0x180
[   21.162792]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.162834]  __asan_report_load4_noabort+0x18/0x20
[   21.162865]  kasan_atomics_helper+0x4bbc/0x5450
[   21.162901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.162935]  ? ret_from_fork_asm+0x1a/0x30
[   21.162977]  kasan_atomics+0x1dc/0x310
[   21.163005]  ? __pfx_kasan_atomics+0x10/0x10
[   21.163037]  ? __pfx_read_tsc+0x10/0x10
[   21.163067]  ? ktime_get_ts64+0x86/0x230
[   21.163103]  kunit_try_run_case+0x1a5/0x480
[   21.163141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.163175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.163213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.163277]  ? __kthread_parkme+0x82/0x180
[   21.163314]  ? preempt_count_sub+0x50/0x80
[   21.163351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.163387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.163422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.163456]  kthread+0x337/0x6f0
[   21.163481]  ? trace_preempt_on+0x20/0xc0
[   21.163515]  ? __pfx_kthread+0x10/0x10
[   21.163542]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.163574]  ? calculate_sigpending+0x7b/0xa0
[   21.163649]  ? __pfx_kthread+0x10/0x10
[   21.163722]  ret_from_fork+0x41/0x80
[   21.163797]  ? __pfx_kthread+0x10/0x10
[   21.163829]  ret_from_fork_asm+0x1a/0x30
[   21.163871]  </TASK>
[   21.163887] 
[   21.181217] Allocated by task 286:
[   21.181782]  kasan_save_stack+0x45/0x70
[   21.182193]  kasan_save_track+0x18/0x40
[   21.182584]  kasan_save_alloc_info+0x3b/0x50
[   21.183162]  __kasan_kmalloc+0xb7/0xc0
[   21.183764]  __kmalloc_cache_noprof+0x189/0x420
[   21.184105]  kasan_atomics+0x95/0x310
[   21.184550]  kunit_try_run_case+0x1a5/0x480
[   21.185126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.185888]  kthread+0x337/0x6f0
[   21.186256]  ret_from_fork+0x41/0x80
[   21.186814]  ret_from_fork_asm+0x1a/0x30
[   21.187194] 
[   21.187430] The buggy address belongs to the object at ffff888102a2c100
[   21.187430]  which belongs to the cache kmalloc-64 of size 64
[   21.188592] The buggy address is located 0 bytes to the right of
[   21.188592]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.189782] 
[   21.190014] The buggy address belongs to the physical page:
[   21.190553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.191368] flags: 0x200000000000000(node=0|zone=2)
[   21.191919] page_type: f5(slab)
[   21.192283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.192919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.193516] page dumped because: kasan: bad access detected
[   21.194039] 
[   21.194316] Memory state around the buggy address:
[   21.194897]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.195504]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196140] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.196966]                                      ^
[   21.197398]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197950]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198543] ==================================================================
[   21.434171] ==================================================================
[   21.434923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   21.435569] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.436906] 
[   21.437153] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.437280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.437320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.437377] Call Trace:
[   21.437425]  <TASK>
[   21.437473]  dump_stack_lvl+0x73/0xb0
[   21.437547]  print_report+0xd1/0x650
[   21.437637]  ? __virt_addr_valid+0x1db/0x2d0
[   21.437720]  ? kasan_atomics_helper+0x4a0/0x5450
[   21.437879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.437966]  ? kasan_atomics_helper+0x4a0/0x5450
[   21.438042]  kasan_report+0x141/0x180
[   21.438122]  ? kasan_atomics_helper+0x4a0/0x5450
[   21.438204]  kasan_check_range+0x10c/0x1c0
[   21.438239]  __kasan_check_write+0x18/0x20
[   21.438272]  kasan_atomics_helper+0x4a0/0x5450
[   21.438307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.438342]  ? ret_from_fork_asm+0x1a/0x30
[   21.438416]  kasan_atomics+0x1dc/0x310
[   21.438450]  ? __pfx_kasan_atomics+0x10/0x10
[   21.438483]  ? __pfx_read_tsc+0x10/0x10
[   21.438514]  ? ktime_get_ts64+0x86/0x230
[   21.438553]  kunit_try_run_case+0x1a5/0x480
[   21.438591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.438675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.438745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.438783]  ? __kthread_parkme+0x82/0x180
[   21.438818]  ? preempt_count_sub+0x50/0x80
[   21.438855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.438894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.438930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.438966]  kthread+0x337/0x6f0
[   21.438990]  ? trace_preempt_on+0x20/0xc0
[   21.439027]  ? __pfx_kthread+0x10/0x10
[   21.439055]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.439088]  ? calculate_sigpending+0x7b/0xa0
[   21.439120]  ? __pfx_kthread+0x10/0x10
[   21.439148]  ret_from_fork+0x41/0x80
[   21.439180]  ? __pfx_kthread+0x10/0x10
[   21.439207]  ret_from_fork_asm+0x1a/0x30
[   21.439279]  </TASK>
[   21.439295] 
[   21.460441] Allocated by task 286:
[   21.461300]  kasan_save_stack+0x45/0x70
[   21.461666]  kasan_save_track+0x18/0x40
[   21.462010]  kasan_save_alloc_info+0x3b/0x50
[   21.462420]  __kasan_kmalloc+0xb7/0xc0
[   21.463034]  __kmalloc_cache_noprof+0x189/0x420
[   21.464300]  kasan_atomics+0x95/0x310
[   21.465004]  kunit_try_run_case+0x1a5/0x480
[   21.465768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.466012]  kthread+0x337/0x6f0
[   21.466159]  ret_from_fork+0x41/0x80
[   21.466442]  ret_from_fork_asm+0x1a/0x30
[   21.467458] 
[   21.467797] The buggy address belongs to the object at ffff888102a2c100
[   21.467797]  which belongs to the cache kmalloc-64 of size 64
[   21.468808] The buggy address is located 0 bytes to the right of
[   21.468808]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.470523] 
[   21.470828] The buggy address belongs to the physical page:
[   21.471567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.472423] flags: 0x200000000000000(node=0|zone=2)
[   21.473136] page_type: f5(slab)
[   21.473721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.474575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.475252] page dumped because: kasan: bad access detected
[   21.475735] 
[   21.475954] Memory state around the buggy address:
[   21.476377]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.477838]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.478443] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.479455]                                      ^
[   21.480015]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.480704]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.481569] ==================================================================
[   21.987941] ==================================================================
[   21.988492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   21.989002] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.989542] 
[   21.989846] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.990002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.990044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.990098] Call Trace:
[   21.990143]  <TASK>
[   21.990183]  dump_stack_lvl+0x73/0xb0
[   21.990310]  print_report+0xd1/0x650
[   21.990386]  ? __virt_addr_valid+0x1db/0x2d0
[   21.990464]  ? kasan_atomics_helper+0xb6a/0x5450
[   21.990541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.990641]  ? kasan_atomics_helper+0xb6a/0x5450
[   21.990718]  kasan_report+0x141/0x180
[   21.990800]  ? kasan_atomics_helper+0xb6a/0x5450
[   21.990891]  kasan_check_range+0x10c/0x1c0
[   21.990969]  __kasan_check_write+0x18/0x20
[   21.991040]  kasan_atomics_helper+0xb6a/0x5450
[   21.991118]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.991187]  ? ret_from_fork_asm+0x1a/0x30
[   21.991323]  kasan_atomics+0x1dc/0x310
[   21.991398]  ? __pfx_kasan_atomics+0x10/0x10
[   21.991467]  ? __pfx_read_tsc+0x10/0x10
[   21.991533]  ? ktime_get_ts64+0x86/0x230
[   21.991631]  kunit_try_run_case+0x1a5/0x480
[   21.991703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.991775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.991854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.991934]  ? __kthread_parkme+0x82/0x180
[   21.992010]  ? preempt_count_sub+0x50/0x80
[   21.992092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.992172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.992301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.992384]  kthread+0x337/0x6f0
[   21.992453]  ? trace_preempt_on+0x20/0xc0
[   21.992535]  ? __pfx_kthread+0x10/0x10
[   21.992617]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.992690]  ? calculate_sigpending+0x7b/0xa0
[   21.992761]  ? __pfx_kthread+0x10/0x10
[   21.992828]  ret_from_fork+0x41/0x80
[   21.992898]  ? __pfx_kthread+0x10/0x10
[   21.992962]  ret_from_fork_asm+0x1a/0x30
[   21.993051]  </TASK>
[   21.993087] 
[   22.007812] Allocated by task 286:
[   22.008173]  kasan_save_stack+0x45/0x70
[   22.008589]  kasan_save_track+0x18/0x40
[   22.009092]  kasan_save_alloc_info+0x3b/0x50
[   22.009501]  __kasan_kmalloc+0xb7/0xc0
[   22.009850]  __kmalloc_cache_noprof+0x189/0x420
[   22.010196]  kasan_atomics+0x95/0x310
[   22.010503]  kunit_try_run_case+0x1a5/0x480
[   22.010970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.011499]  kthread+0x337/0x6f0
[   22.011895]  ret_from_fork+0x41/0x80
[   22.012335]  ret_from_fork_asm+0x1a/0x30
[   22.012800] 
[   22.013018] The buggy address belongs to the object at ffff888102a2c100
[   22.013018]  which belongs to the cache kmalloc-64 of size 64
[   22.014178] The buggy address is located 0 bytes to the right of
[   22.014178]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.014921] 
[   22.015104] The buggy address belongs to the physical page:
[   22.015908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.016834] flags: 0x200000000000000(node=0|zone=2)
[   22.017249] page_type: f5(slab)
[   22.017616] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.018229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.018869] page dumped because: kasan: bad access detected
[   22.019329] 
[   22.019553] Memory state around the buggy address:
[   22.019986]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.020577]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.021042] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.021653]                                      ^
[   22.022131]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.022891]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.023328] ==================================================================
[   23.250358] ==================================================================
[   23.250855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   23.251394] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.252054] 
[   23.252341] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.252467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.252509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.252562] Call Trace:
[   23.252631]  <TASK>
[   23.252677]  dump_stack_lvl+0x73/0xb0
[   23.252757]  print_report+0xd1/0x650
[   23.252837]  ? __virt_addr_valid+0x1db/0x2d0
[   23.252913]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.252993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.253071]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.253151]  kasan_report+0x141/0x180
[   23.253230]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.253319]  kasan_check_range+0x10c/0x1c0
[   23.253392]  __kasan_check_write+0x18/0x20
[   23.253467]  kasan_atomics_helper+0x1b22/0x5450
[   23.253546]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.253670]  ? ret_from_fork_asm+0x1a/0x30
[   23.253742]  kasan_atomics+0x1dc/0x310
[   23.253787]  ? __pfx_kasan_atomics+0x10/0x10
[   23.253819]  ? __pfx_read_tsc+0x10/0x10
[   23.253849]  ? ktime_get_ts64+0x86/0x230
[   23.253888]  kunit_try_run_case+0x1a5/0x480
[   23.253927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.253962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.254000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.254036]  ? __kthread_parkme+0x82/0x180
[   23.254069]  ? preempt_count_sub+0x50/0x80
[   23.254106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.254143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.254177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.254236]  kthread+0x337/0x6f0
[   23.254281]  ? trace_preempt_on+0x20/0xc0
[   23.254319]  ? __pfx_kthread+0x10/0x10
[   23.254345]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.254380]  ? calculate_sigpending+0x7b/0xa0
[   23.254413]  ? __pfx_kthread+0x10/0x10
[   23.254441]  ret_from_fork+0x41/0x80
[   23.254471]  ? __pfx_kthread+0x10/0x10
[   23.254498]  ret_from_fork_asm+0x1a/0x30
[   23.254542]  </TASK>
[   23.254557] 
[   23.272800] Allocated by task 286:
[   23.273352]  kasan_save_stack+0x45/0x70
[   23.274139]  kasan_save_track+0x18/0x40
[   23.274694]  kasan_save_alloc_info+0x3b/0x50
[   23.275068]  __kasan_kmalloc+0xb7/0xc0
[   23.275514]  __kmalloc_cache_noprof+0x189/0x420
[   23.275913]  kasan_atomics+0x95/0x310
[   23.276316]  kunit_try_run_case+0x1a5/0x480
[   23.276803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.277327]  kthread+0x337/0x6f0
[   23.277706]  ret_from_fork+0x41/0x80
[   23.278034]  ret_from_fork_asm+0x1a/0x30
[   23.278500] 
[   23.279171] The buggy address belongs to the object at ffff888102a2c100
[   23.279171]  which belongs to the cache kmalloc-64 of size 64
[   23.279933] The buggy address is located 0 bytes to the right of
[   23.279933]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.281058] 
[   23.281392] The buggy address belongs to the physical page:
[   23.281914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.282796] flags: 0x200000000000000(node=0|zone=2)
[   23.283269] page_type: f5(slab)
[   23.283554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.284213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.285002] page dumped because: kasan: bad access detected
[   23.285640] 
[   23.285833] Memory state around the buggy address:
[   23.286162]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286778]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.287418] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.288019]                                      ^
[   23.288490]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.289070]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.290079] ==================================================================
[   23.623867] ==================================================================
[   23.624566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   23.625171] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.625897] 
[   23.626120] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.626286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.626328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.626384] Call Trace:
[   23.626455]  <TASK>
[   23.626505]  dump_stack_lvl+0x73/0xb0
[   23.626625]  print_report+0xd1/0x650
[   23.626703]  ? __virt_addr_valid+0x1db/0x2d0
[   23.626776]  ? kasan_atomics_helper+0x2006/0x5450
[   23.626847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.626927]  ? kasan_atomics_helper+0x2006/0x5450
[   23.627008]  kasan_report+0x141/0x180
[   23.627086]  ? kasan_atomics_helper+0x2006/0x5450
[   23.627257]  kasan_check_range+0x10c/0x1c0
[   23.627342]  __kasan_check_write+0x18/0x20
[   23.627435]  kasan_atomics_helper+0x2006/0x5450
[   23.627549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.627644]  ? ret_from_fork_asm+0x1a/0x30
[   23.627704]  kasan_atomics+0x1dc/0x310
[   23.627735]  ? __pfx_kasan_atomics+0x10/0x10
[   23.627803]  ? __pfx_read_tsc+0x10/0x10
[   23.627872]  ? ktime_get_ts64+0x86/0x230
[   23.627981]  kunit_try_run_case+0x1a5/0x480
[   23.628093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.628303]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.628412]  ? __kthread_parkme+0x82/0x180
[   23.628484]  ? preempt_count_sub+0x50/0x80
[   23.628529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.628625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.628665]  kthread+0x337/0x6f0
[   23.628690]  ? trace_preempt_on+0x20/0xc0
[   23.628726]  ? __pfx_kthread+0x10/0x10
[   23.628752]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.628783]  ? calculate_sigpending+0x7b/0xa0
[   23.628813]  ? __pfx_kthread+0x10/0x10
[   23.628838]  ret_from_fork+0x41/0x80
[   23.628870]  ? __pfx_kthread+0x10/0x10
[   23.628894]  ret_from_fork_asm+0x1a/0x30
[   23.628936]  </TASK>
[   23.628951] 
[   23.643462] Allocated by task 286:
[   23.643849]  kasan_save_stack+0x45/0x70
[   23.644380]  kasan_save_track+0x18/0x40
[   23.644860]  kasan_save_alloc_info+0x3b/0x50
[   23.645336]  __kasan_kmalloc+0xb7/0xc0
[   23.645787]  __kmalloc_cache_noprof+0x189/0x420
[   23.646325]  kasan_atomics+0x95/0x310
[   23.646745]  kunit_try_run_case+0x1a5/0x480
[   23.647269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.647769]  kthread+0x337/0x6f0
[   23.648172]  ret_from_fork+0x41/0x80
[   23.648522]  ret_from_fork_asm+0x1a/0x30
[   23.648955] 
[   23.649185] The buggy address belongs to the object at ffff888102a2c100
[   23.649185]  which belongs to the cache kmalloc-64 of size 64
[   23.650178] The buggy address is located 0 bytes to the right of
[   23.650178]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.652418] 
[   23.652702] The buggy address belongs to the physical page:
[   23.653230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.653974] flags: 0x200000000000000(node=0|zone=2)
[   23.654394] page_type: f5(slab)
[   23.655502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.656150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.656825] page dumped because: kasan: bad access detected
[   23.657380] 
[   23.657653] Memory state around the buggy address:
[   23.658052]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.658783]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.659357] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.659978]                                      ^
[   23.660520]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.661090]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.661778] ==================================================================
[   23.745248] ==================================================================
[   23.746199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   23.746865] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.747468] 
[   23.747743] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.747864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.747902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.747962] Call Trace:
[   23.748014]  <TASK>
[   23.748101]  dump_stack_lvl+0x73/0xb0
[   23.748182]  print_report+0xd1/0x650
[   23.748266]  ? __virt_addr_valid+0x1db/0x2d0
[   23.748343]  ? kasan_atomics_helper+0x4fb2/0x5450
[   23.748450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.748540]  ? kasan_atomics_helper+0x4fb2/0x5450
[   23.748635]  kasan_report+0x141/0x180
[   23.748754]  ? kasan_atomics_helper+0x4fb2/0x5450
[   23.748850]  __asan_report_load8_noabort+0x18/0x20
[   23.748931]  kasan_atomics_helper+0x4fb2/0x5450
[   23.749051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.749133]  ? ret_from_fork_asm+0x1a/0x30
[   23.749222]  kasan_atomics+0x1dc/0x310
[   23.749298]  ? __pfx_kasan_atomics+0x10/0x10
[   23.749372]  ? __pfx_read_tsc+0x10/0x10
[   23.749434]  ? ktime_get_ts64+0x86/0x230
[   23.749476]  kunit_try_run_case+0x1a5/0x480
[   23.749518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.749554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.749592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.749659]  ? __kthread_parkme+0x82/0x180
[   23.749694]  ? preempt_count_sub+0x50/0x80
[   23.749733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.749779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.749815]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.749853]  kthread+0x337/0x6f0
[   23.749878]  ? trace_preempt_on+0x20/0xc0
[   23.749915]  ? __pfx_kthread+0x10/0x10
[   23.749942]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.749975]  ? calculate_sigpending+0x7b/0xa0
[   23.750007]  ? __pfx_kthread+0x10/0x10
[   23.750034]  ret_from_fork+0x41/0x80
[   23.750066]  ? __pfx_kthread+0x10/0x10
[   23.750092]  ret_from_fork_asm+0x1a/0x30
[   23.750135]  </TASK>
[   23.750150] 
[   23.767923] Allocated by task 286:
[   23.768328]  kasan_save_stack+0x45/0x70
[   23.768870]  kasan_save_track+0x18/0x40
[   23.769382]  kasan_save_alloc_info+0x3b/0x50
[   23.769865]  __kasan_kmalloc+0xb7/0xc0
[   23.770173]  __kmalloc_cache_noprof+0x189/0x420
[   23.770901]  kasan_atomics+0x95/0x310
[   23.771510]  kunit_try_run_case+0x1a5/0x480
[   23.771995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.772587]  kthread+0x337/0x6f0
[   23.773016]  ret_from_fork+0x41/0x80
[   23.773553]  ret_from_fork_asm+0x1a/0x30
[   23.774089] 
[   23.774332] The buggy address belongs to the object at ffff888102a2c100
[   23.774332]  which belongs to the cache kmalloc-64 of size 64
[   23.775321] The buggy address is located 0 bytes to the right of
[   23.775321]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.776387] 
[   23.776641] The buggy address belongs to the physical page:
[   23.777268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.777887] flags: 0x200000000000000(node=0|zone=2)
[   23.778481] page_type: f5(slab)
[   23.778868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.779702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.780377] page dumped because: kasan: bad access detected
[   23.780942] 
[   23.781118] Memory state around the buggy address:
[   23.781692]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.782412]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.783131] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.783799]                                      ^
[   23.784518]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.785265]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.785833] ==================================================================
[   21.633371] ==================================================================
[   21.633879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   21.635301] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.636040] 
[   21.636282] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.636412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.636453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.636509] Call Trace:
[   21.636565]  <TASK>
[   21.636627]  dump_stack_lvl+0x73/0xb0
[   21.636707]  print_report+0xd1/0x650
[   21.636784]  ? __virt_addr_valid+0x1db/0x2d0
[   21.636856]  ? kasan_atomics_helper+0x697/0x5450
[   21.636929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.637006]  ? kasan_atomics_helper+0x697/0x5450
[   21.637089]  kasan_report+0x141/0x180
[   21.637171]  ? kasan_atomics_helper+0x697/0x5450
[   21.637226]  kasan_check_range+0x10c/0x1c0
[   21.637281]  __kasan_check_write+0x18/0x20
[   21.637316]  kasan_atomics_helper+0x697/0x5450
[   21.637353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.637388]  ? ret_from_fork_asm+0x1a/0x30
[   21.637429]  kasan_atomics+0x1dc/0x310
[   21.637459]  ? __pfx_kasan_atomics+0x10/0x10
[   21.637494]  ? __pfx_read_tsc+0x10/0x10
[   21.637525]  ? ktime_get_ts64+0x86/0x230
[   21.637562]  kunit_try_run_case+0x1a5/0x480
[   21.637620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.637699]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.637760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.637799]  ? __kthread_parkme+0x82/0x180
[   21.637831]  ? preempt_count_sub+0x50/0x80
[   21.637872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.637909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.637945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.637981]  kthread+0x337/0x6f0
[   21.638007]  ? trace_preempt_on+0x20/0xc0
[   21.638043]  ? __pfx_kthread+0x10/0x10
[   21.638070]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.638102]  ? calculate_sigpending+0x7b/0xa0
[   21.638134]  ? __pfx_kthread+0x10/0x10
[   21.638161]  ret_from_fork+0x41/0x80
[   21.638194]  ? __pfx_kthread+0x10/0x10
[   21.638256]  ret_from_fork_asm+0x1a/0x30
[   21.638307]  </TASK>
[   21.638323] 
[   21.660664] Allocated by task 286:
[   21.661066]  kasan_save_stack+0x45/0x70
[   21.661924]  kasan_save_track+0x18/0x40
[   21.662465]  kasan_save_alloc_info+0x3b/0x50
[   21.663182]  __kasan_kmalloc+0xb7/0xc0
[   21.663533]  __kmalloc_cache_noprof+0x189/0x420
[   21.664243]  kasan_atomics+0x95/0x310
[   21.664559]  kunit_try_run_case+0x1a5/0x480
[   21.665176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.666127]  kthread+0x337/0x6f0
[   21.666812]  ret_from_fork+0x41/0x80
[   21.667299]  ret_from_fork_asm+0x1a/0x30
[   21.667878] 
[   21.668066] The buggy address belongs to the object at ffff888102a2c100
[   21.668066]  which belongs to the cache kmalloc-64 of size 64
[   21.669471] The buggy address is located 0 bytes to the right of
[   21.669471]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.670719] 
[   21.671820] The buggy address belongs to the physical page:
[   21.672221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.673257] flags: 0x200000000000000(node=0|zone=2)
[   21.673734] page_type: f5(slab)
[   21.674124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.675129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.676530] page dumped because: kasan: bad access detected
[   21.676906] 
[   21.677204] Memory state around the buggy address:
[   21.678142]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.678907]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.679434] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.679962]                                      ^
[   21.680323]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.680813]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.682312] ==================================================================
[   22.314972] ==================================================================
[   22.315722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   22.316295] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.316981] 
[   22.317324] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.317447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.317483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.317538] Call Trace:
[   22.317590]  <TASK>
[   22.317654]  dump_stack_lvl+0x73/0xb0
[   22.317791]  print_report+0xd1/0x650
[   22.317907]  ? __virt_addr_valid+0x1db/0x2d0
[   22.318017]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.318123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.318249]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.318331]  kasan_report+0x141/0x180
[   22.318408]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.318493]  __asan_report_load4_noabort+0x18/0x20
[   22.318564]  kasan_atomics_helper+0x4a36/0x5450
[   22.318660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.318739]  ? ret_from_fork_asm+0x1a/0x30
[   22.318867]  kasan_atomics+0x1dc/0x310
[   22.318950]  ? __pfx_kasan_atomics+0x10/0x10
[   22.319067]  ? __pfx_read_tsc+0x10/0x10
[   22.319135]  ? ktime_get_ts64+0x86/0x230
[   22.319258]  kunit_try_run_case+0x1a5/0x480
[   22.319330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.319369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.319405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.319442]  ? __kthread_parkme+0x82/0x180
[   22.319473]  ? preempt_count_sub+0x50/0x80
[   22.319509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.319545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.319578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.319641]  kthread+0x337/0x6f0
[   22.319669]  ? trace_preempt_on+0x20/0xc0
[   22.319705]  ? __pfx_kthread+0x10/0x10
[   22.319730]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.319762]  ? calculate_sigpending+0x7b/0xa0
[   22.319792]  ? __pfx_kthread+0x10/0x10
[   22.319818]  ret_from_fork+0x41/0x80
[   22.319852]  ? __pfx_kthread+0x10/0x10
[   22.319878]  ret_from_fork_asm+0x1a/0x30
[   22.319921]  </TASK>
[   22.319935] 
[   22.334566] Allocated by task 286:
[   22.335001]  kasan_save_stack+0x45/0x70
[   22.335468]  kasan_save_track+0x18/0x40
[   22.335918]  kasan_save_alloc_info+0x3b/0x50
[   22.336454]  __kasan_kmalloc+0xb7/0xc0
[   22.336872]  __kmalloc_cache_noprof+0x189/0x420
[   22.337392]  kasan_atomics+0x95/0x310
[   22.337815]  kunit_try_run_case+0x1a5/0x480
[   22.338334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.338901]  kthread+0x337/0x6f0
[   22.339272]  ret_from_fork+0x41/0x80
[   22.339578]  ret_from_fork_asm+0x1a/0x30
[   22.340041] 
[   22.340351] The buggy address belongs to the object at ffff888102a2c100
[   22.340351]  which belongs to the cache kmalloc-64 of size 64
[   22.341467] The buggy address is located 0 bytes to the right of
[   22.341467]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.342380] 
[   22.342648] The buggy address belongs to the physical page:
[   22.343244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.343869] flags: 0x200000000000000(node=0|zone=2)
[   22.344402] page_type: f5(slab)
[   22.344855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.345580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.346314] page dumped because: kasan: bad access detected
[   22.346805] 
[   22.347040] Memory state around the buggy address:
[   22.347570]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.348282]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.348961] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.349687]                                      ^
[   22.350095]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.350617]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.351336] ==================================================================
[   22.679320] ==================================================================
[   22.679915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   22.680443] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.681100] 
[   22.681401] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.681519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.681557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.681631] Call Trace:
[   22.681684]  <TASK>
[   22.681726]  dump_stack_lvl+0x73/0xb0
[   22.681815]  print_report+0xd1/0x650
[   22.681895]  ? __virt_addr_valid+0x1db/0x2d0
[   22.681972]  ? kasan_atomics_helper+0x13b5/0x5450
[   22.682050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.682131]  ? kasan_atomics_helper+0x13b5/0x5450
[   22.682249]  kasan_report+0x141/0x180
[   22.682338]  ? kasan_atomics_helper+0x13b5/0x5450
[   22.682433]  kasan_check_range+0x10c/0x1c0
[   22.682506]  __kasan_check_read+0x15/0x20
[   22.682564]  kasan_atomics_helper+0x13b5/0x5450
[   22.682642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.682714]  ? ret_from_fork_asm+0x1a/0x30
[   22.682801]  kasan_atomics+0x1dc/0x310
[   22.682879]  ? __pfx_kasan_atomics+0x10/0x10
[   22.682955]  ? __pfx_read_tsc+0x10/0x10
[   22.683021]  ? ktime_get_ts64+0x86/0x230
[   22.683102]  kunit_try_run_case+0x1a5/0x480
[   22.683180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.683308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.683391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.683475]  ? __kthread_parkme+0x82/0x180
[   22.683553]  ? preempt_count_sub+0x50/0x80
[   22.683651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.683734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.683813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.683894]  kthread+0x337/0x6f0
[   22.683956]  ? trace_preempt_on+0x20/0xc0
[   22.684033]  ? __pfx_kthread+0x10/0x10
[   22.684097]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.684168]  ? calculate_sigpending+0x7b/0xa0
[   22.684269]  ? __pfx_kthread+0x10/0x10
[   22.684303]  ret_from_fork+0x41/0x80
[   22.684338]  ? __pfx_kthread+0x10/0x10
[   22.684365]  ret_from_fork_asm+0x1a/0x30
[   22.684408]  </TASK>
[   22.684424] 
[   22.702357] Allocated by task 286:
[   22.702800]  kasan_save_stack+0x45/0x70
[   22.703344]  kasan_save_track+0x18/0x40
[   22.703834]  kasan_save_alloc_info+0x3b/0x50
[   22.704367]  __kasan_kmalloc+0xb7/0xc0
[   22.704843]  __kmalloc_cache_noprof+0x189/0x420
[   22.705424]  kasan_atomics+0x95/0x310
[   22.705946]  kunit_try_run_case+0x1a5/0x480
[   22.706490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.707112]  kthread+0x337/0x6f0
[   22.707529]  ret_from_fork+0x41/0x80
[   22.708011]  ret_from_fork_asm+0x1a/0x30
[   22.708571] 
[   22.709665] The buggy address belongs to the object at ffff888102a2c100
[   22.709665]  which belongs to the cache kmalloc-64 of size 64
[   22.710998] The buggy address is located 0 bytes to the right of
[   22.710998]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.712085] 
[   22.712314] The buggy address belongs to the physical page:
[   22.712815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.713923] flags: 0x200000000000000(node=0|zone=2)
[   22.714425] page_type: f5(slab)
[   22.714860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.715493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.716109] page dumped because: kasan: bad access detected
[   22.716662] 
[   22.716912] Memory state around the buggy address:
[   22.717385]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.718002]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.718595] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.719164]                                      ^
[   22.719568]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.720272]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.720857] ==================================================================
[   23.540391] ==================================================================
[   23.541903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   23.542164] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.543673] 
[   23.544167] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.544295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.544336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.544392] Call Trace:
[   23.544442]  <TASK>
[   23.544484]  dump_stack_lvl+0x73/0xb0
[   23.544566]  print_report+0xd1/0x650
[   23.544659]  ? __virt_addr_valid+0x1db/0x2d0
[   23.544698]  ? kasan_atomics_helper+0x1f43/0x5450
[   23.544755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.544793]  ? kasan_atomics_helper+0x1f43/0x5450
[   23.544828]  kasan_report+0x141/0x180
[   23.544862]  ? kasan_atomics_helper+0x1f43/0x5450
[   23.544902]  kasan_check_range+0x10c/0x1c0
[   23.544933]  __kasan_check_write+0x18/0x20
[   23.544962]  kasan_atomics_helper+0x1f43/0x5450
[   23.544998]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.545031]  ? ret_from_fork_asm+0x1a/0x30
[   23.545069]  kasan_atomics+0x1dc/0x310
[   23.545099]  ? __pfx_kasan_atomics+0x10/0x10
[   23.545129]  ? __pfx_read_tsc+0x10/0x10
[   23.545157]  ? ktime_get_ts64+0x86/0x230
[   23.545193]  kunit_try_run_case+0x1a5/0x480
[   23.545268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.545309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.545346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.545380]  ? __kthread_parkme+0x82/0x180
[   23.545411]  ? preempt_count_sub+0x50/0x80
[   23.545446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.545482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.545517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.545551]  kthread+0x337/0x6f0
[   23.545575]  ? trace_preempt_on+0x20/0xc0
[   23.545633]  ? __pfx_kthread+0x10/0x10
[   23.545663]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.545694]  ? calculate_sigpending+0x7b/0xa0
[   23.545726]  ? __pfx_kthread+0x10/0x10
[   23.545762]  ret_from_fork+0x41/0x80
[   23.545797]  ? __pfx_kthread+0x10/0x10
[   23.545823]  ret_from_fork_asm+0x1a/0x30
[   23.545867]  </TASK>
[   23.545882] 
[   23.564413] Allocated by task 286:
[   23.565164]  kasan_save_stack+0x45/0x70
[   23.565841]  kasan_save_track+0x18/0x40
[   23.566235]  kasan_save_alloc_info+0x3b/0x50
[   23.566591]  __kasan_kmalloc+0xb7/0xc0
[   23.566959]  __kmalloc_cache_noprof+0x189/0x420
[   23.567348]  kasan_atomics+0x95/0x310
[   23.567813]  kunit_try_run_case+0x1a5/0x480
[   23.568281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.568681]  kthread+0x337/0x6f0
[   23.569034]  ret_from_fork+0x41/0x80
[   23.569667]  ret_from_fork_asm+0x1a/0x30
[   23.570108] 
[   23.570390] The buggy address belongs to the object at ffff888102a2c100
[   23.570390]  which belongs to the cache kmalloc-64 of size 64
[   23.571468] The buggy address is located 0 bytes to the right of
[   23.571468]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.572626] 
[   23.572923] The buggy address belongs to the physical page:
[   23.573517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.574275] flags: 0x200000000000000(node=0|zone=2)
[   23.574850] page_type: f5(slab)
[   23.575299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.576080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.576772] page dumped because: kasan: bad access detected
[   23.577395] 
[   23.577689] Memory state around the buggy address:
[   23.578203]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.578900]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.579664] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.580173]                                      ^
[   23.580746]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581348]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.582051] ==================================================================
[   23.329918] ==================================================================
[   23.331198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   23.333090] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.334192] 
[   23.334514] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.334654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.334693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.334820] Call Trace:
[   23.334875]  <TASK>
[   23.334918]  dump_stack_lvl+0x73/0xb0
[   23.334997]  print_report+0xd1/0x650
[   23.335131]  ? __virt_addr_valid+0x1db/0x2d0
[   23.335209]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.335286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.335366]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.335440]  kasan_report+0x141/0x180
[   23.335556]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.335691]  __asan_report_load8_noabort+0x18/0x20
[   23.335765]  kasan_atomics_helper+0x4f30/0x5450
[   23.335844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.335914]  ? ret_from_fork_asm+0x1a/0x30
[   23.335958]  kasan_atomics+0x1dc/0x310
[   23.335989]  ? __pfx_kasan_atomics+0x10/0x10
[   23.336022]  ? __pfx_read_tsc+0x10/0x10
[   23.336051]  ? ktime_get_ts64+0x86/0x230
[   23.336088]  kunit_try_run_case+0x1a5/0x480
[   23.336128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.336164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.336200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.336278]  ? __kthread_parkme+0x82/0x180
[   23.336315]  ? preempt_count_sub+0x50/0x80
[   23.336353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.336389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.336425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.336459]  kthread+0x337/0x6f0
[   23.336484]  ? trace_preempt_on+0x20/0xc0
[   23.336519]  ? __pfx_kthread+0x10/0x10
[   23.336545]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.336576]  ? calculate_sigpending+0x7b/0xa0
[   23.336631]  ? __pfx_kthread+0x10/0x10
[   23.336662]  ret_from_fork+0x41/0x80
[   23.336693]  ? __pfx_kthread+0x10/0x10
[   23.336719]  ret_from_fork_asm+0x1a/0x30
[   23.336762]  </TASK>
[   23.336776] 
[   23.354093] Allocated by task 286:
[   23.354495]  kasan_save_stack+0x45/0x70
[   23.354872]  kasan_save_track+0x18/0x40
[   23.355286]  kasan_save_alloc_info+0x3b/0x50
[   23.355875]  __kasan_kmalloc+0xb7/0xc0
[   23.356407]  __kmalloc_cache_noprof+0x189/0x420
[   23.356767]  kasan_atomics+0x95/0x310
[   23.357073]  kunit_try_run_case+0x1a5/0x480
[   23.357817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.358475]  kthread+0x337/0x6f0
[   23.358964]  ret_from_fork+0x41/0x80
[   23.359436]  ret_from_fork_asm+0x1a/0x30
[   23.359991] 
[   23.360342] The buggy address belongs to the object at ffff888102a2c100
[   23.360342]  which belongs to the cache kmalloc-64 of size 64
[   23.361324] The buggy address is located 0 bytes to the right of
[   23.361324]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.362617] 
[   23.362835] The buggy address belongs to the physical page:
[   23.363565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.364339] flags: 0x200000000000000(node=0|zone=2)
[   23.364821] page_type: f5(slab)
[   23.365492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.366140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.366978] page dumped because: kasan: bad access detected
[   23.367560] 
[   23.367801] Memory state around the buggy address:
[   23.368571]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.369262]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.369862] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.370496]                                      ^
[   23.370957]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.371669]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.372274] ==================================================================
[   22.521045] ==================================================================
[   22.521823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   22.522534] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.523172] 
[   22.523417] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.523545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.523676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.523761] Call Trace:
[   22.523816]  <TASK>
[   22.523860]  dump_stack_lvl+0x73/0xb0
[   22.524062]  print_report+0xd1/0x650
[   22.524177]  ? __virt_addr_valid+0x1db/0x2d0
[   22.524297]  ? kasan_atomics_helper+0x1217/0x5450
[   22.524371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.524426]  ? kasan_atomics_helper+0x1217/0x5450
[   22.524484]  kasan_report+0x141/0x180
[   22.524562]  ? kasan_atomics_helper+0x1217/0x5450
[   22.524748]  kasan_check_range+0x10c/0x1c0
[   22.524830]  __kasan_check_write+0x18/0x20
[   22.524955]  kasan_atomics_helper+0x1217/0x5450
[   22.525074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.525151]  ? ret_from_fork_asm+0x1a/0x30
[   22.525198]  kasan_atomics+0x1dc/0x310
[   22.525271]  ? __pfx_kasan_atomics+0x10/0x10
[   22.525308]  ? __pfx_read_tsc+0x10/0x10
[   22.525337]  ? ktime_get_ts64+0x86/0x230
[   22.525376]  kunit_try_run_case+0x1a5/0x480
[   22.525413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.525447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.525484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.525519]  ? __kthread_parkme+0x82/0x180
[   22.525551]  ? preempt_count_sub+0x50/0x80
[   22.525587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.525650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.525689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.525726]  kthread+0x337/0x6f0
[   22.525763]  ? trace_preempt_on+0x20/0xc0
[   22.525800]  ? __pfx_kthread+0x10/0x10
[   22.525825]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.525857]  ? calculate_sigpending+0x7b/0xa0
[   22.525888]  ? __pfx_kthread+0x10/0x10
[   22.525913]  ret_from_fork+0x41/0x80
[   22.525945]  ? __pfx_kthread+0x10/0x10
[   22.525969]  ret_from_fork_asm+0x1a/0x30
[   22.526011]  </TASK>
[   22.526025] 
[   22.542124] Allocated by task 286:
[   22.542560]  kasan_save_stack+0x45/0x70
[   22.543019]  kasan_save_track+0x18/0x40
[   22.543484]  kasan_save_alloc_info+0x3b/0x50
[   22.543864]  __kasan_kmalloc+0xb7/0xc0
[   22.544174]  __kmalloc_cache_noprof+0x189/0x420
[   22.544675]  kasan_atomics+0x95/0x310
[   22.545087]  kunit_try_run_case+0x1a5/0x480
[   22.545573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.546125]  kthread+0x337/0x6f0
[   22.546526]  ret_from_fork+0x41/0x80
[   22.546901]  ret_from_fork_asm+0x1a/0x30
[   22.547367] 
[   22.547593] The buggy address belongs to the object at ffff888102a2c100
[   22.547593]  which belongs to the cache kmalloc-64 of size 64
[   22.548543] The buggy address is located 0 bytes to the right of
[   22.548543]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.549424] 
[   22.549627] The buggy address belongs to the physical page:
[   22.550157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.550927] flags: 0x200000000000000(node=0|zone=2)
[   22.551430] page_type: f5(slab)
[   22.551778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.552410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.553076] page dumped because: kasan: bad access detected
[   22.553554] 
[   22.553802] Memory state around the buggy address:
[   22.554277]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.554800]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.555378] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.555907]                                      ^
[   22.556335]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.557640]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.558457] ==================================================================
[   23.456030] ==================================================================
[   23.457301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   23.458148] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.459000] 
[   23.459549] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.459699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.459738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.459818] Call Trace:
[   23.459898]  <TASK>
[   23.459944]  dump_stack_lvl+0x73/0xb0
[   23.460001]  print_report+0xd1/0x650
[   23.460042]  ? __virt_addr_valid+0x1db/0x2d0
[   23.460076]  ? kasan_atomics_helper+0x1e12/0x5450
[   23.460112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.460147]  ? kasan_atomics_helper+0x1e12/0x5450
[   23.460181]  kasan_report+0x141/0x180
[   23.460227]  ? kasan_atomics_helper+0x1e12/0x5450
[   23.460291]  kasan_check_range+0x10c/0x1c0
[   23.460323]  __kasan_check_write+0x18/0x20
[   23.460354]  kasan_atomics_helper+0x1e12/0x5450
[   23.460390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.460424]  ? ret_from_fork_asm+0x1a/0x30
[   23.460464]  kasan_atomics+0x1dc/0x310
[   23.460493]  ? __pfx_kasan_atomics+0x10/0x10
[   23.460524]  ? __pfx_read_tsc+0x10/0x10
[   23.460554]  ? ktime_get_ts64+0x86/0x230
[   23.460592]  kunit_try_run_case+0x1a5/0x480
[   23.460656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.460694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.460731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.460767]  ? __kthread_parkme+0x82/0x180
[   23.460801]  ? preempt_count_sub+0x50/0x80
[   23.460838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.460874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.460911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.460947]  kthread+0x337/0x6f0
[   23.460972]  ? trace_preempt_on+0x20/0xc0
[   23.461007]  ? __pfx_kthread+0x10/0x10
[   23.461035]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.461068]  ? calculate_sigpending+0x7b/0xa0
[   23.461100]  ? __pfx_kthread+0x10/0x10
[   23.461128]  ret_from_fork+0x41/0x80
[   23.461160]  ? __pfx_kthread+0x10/0x10
[   23.461186]  ret_from_fork_asm+0x1a/0x30
[   23.461259]  </TASK>
[   23.461278] 
[   23.476989] Allocated by task 286:
[   23.477445]  kasan_save_stack+0x45/0x70
[   23.477945]  kasan_save_track+0x18/0x40
[   23.478434]  kasan_save_alloc_info+0x3b/0x50
[   23.478880]  __kasan_kmalloc+0xb7/0xc0
[   23.479279]  __kmalloc_cache_noprof+0x189/0x420
[   23.479643]  kasan_atomics+0x95/0x310
[   23.480065]  kunit_try_run_case+0x1a5/0x480
[   23.480628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.481193]  kthread+0x337/0x6f0
[   23.481630]  ret_from_fork+0x41/0x80
[   23.482084]  ret_from_fork_asm+0x1a/0x30
[   23.482480] 
[   23.482685] The buggy address belongs to the object at ffff888102a2c100
[   23.482685]  which belongs to the cache kmalloc-64 of size 64
[   23.483792] The buggy address is located 0 bytes to the right of
[   23.483792]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.484744] 
[   23.484934] The buggy address belongs to the physical page:
[   23.485379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.486132] flags: 0x200000000000000(node=0|zone=2)
[   23.486641] page_type: f5(slab)
[   23.487039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.487732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.488188] page dumped because: kasan: bad access detected
[   23.488684] 
[   23.488946] Memory state around the buggy address:
[   23.489502]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.490162]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.490845] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.491442]                                      ^
[   23.491885]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493155]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493893] ==================================================================
[   21.780563] ==================================================================
[   21.781528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   21.782163] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.782772] 
[   21.783045] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.783172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.783248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.783313] Call Trace:
[   21.783366]  <TASK>
[   21.783415]  dump_stack_lvl+0x73/0xb0
[   21.783500]  print_report+0xd1/0x650
[   21.783583]  ? __virt_addr_valid+0x1db/0x2d0
[   21.783789]  ? kasan_atomics_helper+0x860/0x5450
[   21.783868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.783948]  ? kasan_atomics_helper+0x860/0x5450
[   21.784024]  kasan_report+0x141/0x180
[   21.784107]  ? kasan_atomics_helper+0x860/0x5450
[   21.784196]  kasan_check_range+0x10c/0x1c0
[   21.784319]  __kasan_check_write+0x18/0x20
[   21.784392]  kasan_atomics_helper+0x860/0x5450
[   21.784473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.784554]  ? ret_from_fork_asm+0x1a/0x30
[   21.784770]  kasan_atomics+0x1dc/0x310
[   21.784831]  ? __pfx_kasan_atomics+0x10/0x10
[   21.784866]  ? __pfx_read_tsc+0x10/0x10
[   21.784897]  ? ktime_get_ts64+0x86/0x230
[   21.784936]  kunit_try_run_case+0x1a5/0x480
[   21.784976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.785011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.785049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.785086]  ? __kthread_parkme+0x82/0x180
[   21.785120]  ? preempt_count_sub+0x50/0x80
[   21.785158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.785195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.785271]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.785311]  kthread+0x337/0x6f0
[   21.785339]  ? trace_preempt_on+0x20/0xc0
[   21.785376]  ? __pfx_kthread+0x10/0x10
[   21.785403]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.785436]  ? calculate_sigpending+0x7b/0xa0
[   21.785468]  ? __pfx_kthread+0x10/0x10
[   21.785496]  ret_from_fork+0x41/0x80
[   21.785527]  ? __pfx_kthread+0x10/0x10
[   21.785552]  ret_from_fork_asm+0x1a/0x30
[   21.785598]  </TASK>
[   21.785675] 
[   21.806077] Allocated by task 286:
[   21.806591]  kasan_save_stack+0x45/0x70
[   21.807324]  kasan_save_track+0x18/0x40
[   21.808007]  kasan_save_alloc_info+0x3b/0x50
[   21.808565]  __kasan_kmalloc+0xb7/0xc0
[   21.808950]  __kmalloc_cache_noprof+0x189/0x420
[   21.809797]  kasan_atomics+0x95/0x310
[   21.810287]  kunit_try_run_case+0x1a5/0x480
[   21.811113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.811714]  kthread+0x337/0x6f0
[   21.812248]  ret_from_fork+0x41/0x80
[   21.812807]  ret_from_fork_asm+0x1a/0x30
[   21.813291] 
[   21.813729] The buggy address belongs to the object at ffff888102a2c100
[   21.813729]  which belongs to the cache kmalloc-64 of size 64
[   21.815015] The buggy address is located 0 bytes to the right of
[   21.815015]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.816520] 
[   21.816947] The buggy address belongs to the physical page:
[   21.817500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.818189] flags: 0x200000000000000(node=0|zone=2)
[   21.818724] page_type: f5(slab)
[   21.819151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.819819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.820459] page dumped because: kasan: bad access detected
[   21.821336] 
[   21.821968] Memory state around the buggy address:
[   21.822691]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.823425]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.824277] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.825174]                                      ^
[   21.825731]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.826926]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.827506] ==================================================================
[   21.911322] ==================================================================
[   21.912016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   21.912717] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.913404] 
[   21.913736] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.913870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.913911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.913967] Call Trace:
[   21.914017]  <TASK>
[   21.914065]  dump_stack_lvl+0x73/0xb0
[   21.914154]  print_report+0xd1/0x650
[   21.914286]  ? __virt_addr_valid+0x1db/0x2d0
[   21.914361]  ? kasan_atomics_helper+0xa2b/0x5450
[   21.914432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.914506]  ? kasan_atomics_helper+0xa2b/0x5450
[   21.914582]  kasan_report+0x141/0x180
[   21.914682]  ? kasan_atomics_helper+0xa2b/0x5450
[   21.914795]  kasan_check_range+0x10c/0x1c0
[   21.914898]  __kasan_check_write+0x18/0x20
[   21.914971]  kasan_atomics_helper+0xa2b/0x5450
[   21.915074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.915183]  ? ret_from_fork_asm+0x1a/0x30
[   21.915296]  kasan_atomics+0x1dc/0x310
[   21.915330]  ? __pfx_kasan_atomics+0x10/0x10
[   21.915362]  ? __pfx_read_tsc+0x10/0x10
[   21.915390]  ? ktime_get_ts64+0x86/0x230
[   21.915428]  kunit_try_run_case+0x1a5/0x480
[   21.915464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.915499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.915535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.915571]  ? __kthread_parkme+0x82/0x180
[   21.915630]  ? preempt_count_sub+0x50/0x80
[   21.915703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.915743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.915780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.915815]  kthread+0x337/0x6f0
[   21.915839]  ? trace_preempt_on+0x20/0xc0
[   21.915875]  ? __pfx_kthread+0x10/0x10
[   21.915902]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.915934]  ? calculate_sigpending+0x7b/0xa0
[   21.915966]  ? __pfx_kthread+0x10/0x10
[   21.915992]  ret_from_fork+0x41/0x80
[   21.916022]  ? __pfx_kthread+0x10/0x10
[   21.916048]  ret_from_fork_asm+0x1a/0x30
[   21.916089]  </TASK>
[   21.916104] 
[   21.931146] Allocated by task 286:
[   21.931571]  kasan_save_stack+0x45/0x70
[   21.931979]  kasan_save_track+0x18/0x40
[   21.932490]  kasan_save_alloc_info+0x3b/0x50
[   21.932941]  __kasan_kmalloc+0xb7/0xc0
[   21.933392]  __kmalloc_cache_noprof+0x189/0x420
[   21.933873]  kasan_atomics+0x95/0x310
[   21.934378]  kunit_try_run_case+0x1a5/0x480
[   21.934766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.935152]  kthread+0x337/0x6f0
[   21.935481]  ret_from_fork+0x41/0x80
[   21.935899]  ret_from_fork_asm+0x1a/0x30
[   21.936412] 
[   21.936666] The buggy address belongs to the object at ffff888102a2c100
[   21.936666]  which belongs to the cache kmalloc-64 of size 64
[   21.937777] The buggy address is located 0 bytes to the right of
[   21.937777]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.938809] 
[   21.938996] The buggy address belongs to the physical page:
[   21.939426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.940123] flags: 0x200000000000000(node=0|zone=2)
[   21.940618] page_type: f5(slab)
[   21.940986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.941692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.942431] page dumped because: kasan: bad access detected
[   21.942954] 
[   21.943165] Memory state around the buggy address:
[   21.943695]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.944398]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.945030] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.945707]                                      ^
[   21.946190]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.946713]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.947441] ==================================================================
[   22.272966] ==================================================================
[   22.273656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   22.274171] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.274788] 
[   22.275009] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.275128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.275169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.275225] Call Trace:
[   22.275275]  <TASK>
[   22.275434]  dump_stack_lvl+0x73/0xb0
[   22.275548]  print_report+0xd1/0x650
[   22.275640]  ? __virt_addr_valid+0x1db/0x2d0
[   22.275719]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.275791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.275865]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.275940]  kasan_report+0x141/0x180
[   22.276017]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.276101]  kasan_check_range+0x10c/0x1c0
[   22.276175]  __kasan_check_write+0x18/0x20
[   22.276267]  kasan_atomics_helper+0xfa9/0x5450
[   22.276344]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.276420]  ? ret_from_fork_asm+0x1a/0x30
[   22.276504]  kasan_atomics+0x1dc/0x310
[   22.276570]  ? __pfx_kasan_atomics+0x10/0x10
[   22.276659]  ? __pfx_read_tsc+0x10/0x10
[   22.276711]  ? ktime_get_ts64+0x86/0x230
[   22.276781]  kunit_try_run_case+0x1a5/0x480
[   22.276861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.276940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.277022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.277104]  ? __kthread_parkme+0x82/0x180
[   22.277179]  ? preempt_count_sub+0x50/0x80
[   22.277261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.277345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.277424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.277551]  kthread+0x337/0x6f0
[   22.277632]  ? trace_preempt_on+0x20/0xc0
[   22.277714]  ? __pfx_kthread+0x10/0x10
[   22.277790]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.277863]  ? calculate_sigpending+0x7b/0xa0
[   22.277932]  ? __pfx_kthread+0x10/0x10
[   22.277997]  ret_from_fork+0x41/0x80
[   22.278069]  ? __pfx_kthread+0x10/0x10
[   22.278133]  ret_from_fork_asm+0x1a/0x30
[   22.278255]  </TASK>
[   22.278283] 
[   22.296031] Allocated by task 286:
[   22.296816]  kasan_save_stack+0x45/0x70
[   22.297587]  kasan_save_track+0x18/0x40
[   22.297944]  kasan_save_alloc_info+0x3b/0x50
[   22.298443]  __kasan_kmalloc+0xb7/0xc0
[   22.299023]  __kmalloc_cache_noprof+0x189/0x420
[   22.299400]  kasan_atomics+0x95/0x310
[   22.299833]  kunit_try_run_case+0x1a5/0x480
[   22.300257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.300729]  kthread+0x337/0x6f0
[   22.301075]  ret_from_fork+0x41/0x80
[   22.301630]  ret_from_fork_asm+0x1a/0x30
[   22.301961] 
[   22.302150] The buggy address belongs to the object at ffff888102a2c100
[   22.302150]  which belongs to the cache kmalloc-64 of size 64
[   22.303996] The buggy address is located 0 bytes to the right of
[   22.303996]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.305094] 
[   22.305342] The buggy address belongs to the physical page:
[   22.305889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.306577] flags: 0x200000000000000(node=0|zone=2)
[   22.307032] page_type: f5(slab)
[   22.307486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.308262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.308849] page dumped because: kasan: bad access detected
[   22.309443] 
[   22.309700] Memory state around the buggy address:
[   22.310169]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.310839]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.311465] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.312116]                                      ^
[   22.312642]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.313259]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.313926] ==================================================================
[   22.066500] ==================================================================
[   22.067858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   22.068482] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.069049] 
[   22.069314] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.069435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.069476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.069533] Call Trace:
[   22.069581]  <TASK>
[   22.069677]  dump_stack_lvl+0x73/0xb0
[   22.069768]  print_report+0xd1/0x650
[   22.069844]  ? __virt_addr_valid+0x1db/0x2d0
[   22.069916]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.069989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.070065]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.070141]  kasan_report+0x141/0x180
[   22.070222]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.070299]  __asan_report_load4_noabort+0x18/0x20
[   22.070337]  kasan_atomics_helper+0x4a84/0x5450
[   22.070374]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.070412]  ? ret_from_fork_asm+0x1a/0x30
[   22.070453]  kasan_atomics+0x1dc/0x310
[   22.070484]  ? __pfx_kasan_atomics+0x10/0x10
[   22.070517]  ? __pfx_read_tsc+0x10/0x10
[   22.070547]  ? ktime_get_ts64+0x86/0x230
[   22.070585]  kunit_try_run_case+0x1a5/0x480
[   22.070652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.070692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.070728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.070764]  ? __kthread_parkme+0x82/0x180
[   22.070796]  ? preempt_count_sub+0x50/0x80
[   22.070833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.070871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.070906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.070940]  kthread+0x337/0x6f0
[   22.070966]  ? trace_preempt_on+0x20/0xc0
[   22.071001]  ? __pfx_kthread+0x10/0x10
[   22.071029]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.071061]  ? calculate_sigpending+0x7b/0xa0
[   22.071094]  ? __pfx_kthread+0x10/0x10
[   22.071121]  ret_from_fork+0x41/0x80
[   22.071153]  ? __pfx_kthread+0x10/0x10
[   22.071180]  ret_from_fork_asm+0x1a/0x30
[   22.071259]  </TASK>
[   22.071278] 
[   22.087050] Allocated by task 286:
[   22.087540]  kasan_save_stack+0x45/0x70
[   22.088062]  kasan_save_track+0x18/0x40
[   22.088626]  kasan_save_alloc_info+0x3b/0x50
[   22.089139]  __kasan_kmalloc+0xb7/0xc0
[   22.089707]  __kmalloc_cache_noprof+0x189/0x420
[   22.090266]  kasan_atomics+0x95/0x310
[   22.090777]  kunit_try_run_case+0x1a5/0x480
[   22.091333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.091929]  kthread+0x337/0x6f0
[   22.092393]  ret_from_fork+0x41/0x80
[   22.092752]  ret_from_fork_asm+0x1a/0x30
[   22.093188] 
[   22.093435] The buggy address belongs to the object at ffff888102a2c100
[   22.093435]  which belongs to the cache kmalloc-64 of size 64
[   22.094512] The buggy address is located 0 bytes to the right of
[   22.094512]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.095598] 
[   22.095804] The buggy address belongs to the physical page:
[   22.096159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.097174] flags: 0x200000000000000(node=0|zone=2)
[   22.097820] page_type: f5(slab)
[   22.098348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.099174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.099812] page dumped because: kasan: bad access detected
[   22.100175] 
[   22.100400] Memory state around the buggy address:
[   22.100886]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.101644]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.102308] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.102766]                                      ^
[   22.103205]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.103951]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105018] ==================================================================
[   22.352785] ==================================================================
[   22.353501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   22.354295] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.355055] 
[   22.355461] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.355586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.356108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.356167] Call Trace:
[   22.356408]  <TASK>
[   22.356462]  dump_stack_lvl+0x73/0xb0
[   22.356543]  print_report+0xd1/0x650
[   22.356634]  ? __virt_addr_valid+0x1db/0x2d0
[   22.356713]  ? kasan_atomics_helper+0x1079/0x5450
[   22.356776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.356813]  ? kasan_atomics_helper+0x1079/0x5450
[   22.356847]  kasan_report+0x141/0x180
[   22.356883]  ? kasan_atomics_helper+0x1079/0x5450
[   22.356921]  kasan_check_range+0x10c/0x1c0
[   22.356950]  __kasan_check_write+0x18/0x20
[   22.356981]  kasan_atomics_helper+0x1079/0x5450
[   22.357016]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.357053]  ? ret_from_fork_asm+0x1a/0x30
[   22.357094]  kasan_atomics+0x1dc/0x310
[   22.357124]  ? __pfx_kasan_atomics+0x10/0x10
[   22.357154]  ? __pfx_read_tsc+0x10/0x10
[   22.357181]  ? ktime_get_ts64+0x86/0x230
[   22.357284]  kunit_try_run_case+0x1a5/0x480
[   22.357377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.357942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.358029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.358109]  ? __kthread_parkme+0x82/0x180
[   22.358184]  ? preempt_count_sub+0x50/0x80
[   22.358276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.358338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.358415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.358494]  kthread+0x337/0x6f0
[   22.358559]  ? trace_preempt_on+0x20/0xc0
[   22.358664]  ? __pfx_kthread+0x10/0x10
[   22.358733]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.358814]  ? calculate_sigpending+0x7b/0xa0
[   22.358887]  ? __pfx_kthread+0x10/0x10
[   22.358957]  ret_from_fork+0x41/0x80
[   22.359032]  ? __pfx_kthread+0x10/0x10
[   22.359103]  ret_from_fork_asm+0x1a/0x30
[   22.359198]  </TASK>
[   22.359259] 
[   22.374496] Allocated by task 286:
[   22.374853]  kasan_save_stack+0x45/0x70
[   22.375362]  kasan_save_track+0x18/0x40
[   22.375814]  kasan_save_alloc_info+0x3b/0x50
[   22.376348]  __kasan_kmalloc+0xb7/0xc0
[   22.376713]  __kmalloc_cache_noprof+0x189/0x420
[   22.377195]  kasan_atomics+0x95/0x310
[   22.377705]  kunit_try_run_case+0x1a5/0x480
[   22.378179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.378781]  kthread+0x337/0x6f0
[   22.379158]  ret_from_fork+0x41/0x80
[   22.379631]  ret_from_fork_asm+0x1a/0x30
[   22.380040] 
[   22.380320] The buggy address belongs to the object at ffff888102a2c100
[   22.380320]  which belongs to the cache kmalloc-64 of size 64
[   22.381332] The buggy address is located 0 bytes to the right of
[   22.381332]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.382375] 
[   22.382584] The buggy address belongs to the physical page:
[   22.383091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.383814] flags: 0x200000000000000(node=0|zone=2)
[   22.384346] page_type: f5(slab)
[   22.384762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.385474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.386150] page dumped because: kasan: bad access detected
[   22.387111] 
[   22.387689] Memory state around the buggy address:
[   22.388843]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.389324]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.389996] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.390660]                                      ^
[   22.391032]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.391530]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.392004] ==================================================================
[   21.202075] ==================================================================
[   21.203104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   21.203873] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.204460] 
[   21.204849] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.204966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.205001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.205051] Call Trace:
[   21.205086]  <TASK>
[   21.205121]  dump_stack_lvl+0x73/0xb0
[   21.205191]  print_report+0xd1/0x650
[   21.205261]  ? __virt_addr_valid+0x1db/0x2d0
[   21.205400]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.205482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.205559]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.205691]  kasan_report+0x141/0x180
[   21.205777]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.205870]  __asan_report_store4_noabort+0x1b/0x30
[   21.205939]  kasan_atomics_helper+0x4ba2/0x5450
[   21.205977]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.206011]  ? ret_from_fork_asm+0x1a/0x30
[   21.206051]  kasan_atomics+0x1dc/0x310
[   21.206079]  ? __pfx_kasan_atomics+0x10/0x10
[   21.206109]  ? __pfx_read_tsc+0x10/0x10
[   21.206136]  ? ktime_get_ts64+0x86/0x230
[   21.206170]  kunit_try_run_case+0x1a5/0x480
[   21.206206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.206316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.206402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.206442]  ? __kthread_parkme+0x82/0x180
[   21.206473]  ? preempt_count_sub+0x50/0x80
[   21.206511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.206546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.206580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.206652]  kthread+0x337/0x6f0
[   21.206721]  ? trace_preempt_on+0x20/0xc0
[   21.206759]  ? __pfx_kthread+0x10/0x10
[   21.206783]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.206814]  ? calculate_sigpending+0x7b/0xa0
[   21.206843]  ? __pfx_kthread+0x10/0x10
[   21.206868]  ret_from_fork+0x41/0x80
[   21.206897]  ? __pfx_kthread+0x10/0x10
[   21.206921]  ret_from_fork_asm+0x1a/0x30
[   21.206959]  </TASK>
[   21.206972] 
[   21.224250] Allocated by task 286:
[   21.224991]  kasan_save_stack+0x45/0x70
[   21.225483]  kasan_save_track+0x18/0x40
[   21.226005]  kasan_save_alloc_info+0x3b/0x50
[   21.226448]  __kasan_kmalloc+0xb7/0xc0
[   21.227112]  __kmalloc_cache_noprof+0x189/0x420
[   21.227673]  kasan_atomics+0x95/0x310
[   21.228102]  kunit_try_run_case+0x1a5/0x480
[   21.228437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.228902]  kthread+0x337/0x6f0
[   21.229432]  ret_from_fork+0x41/0x80
[   21.230259]  ret_from_fork_asm+0x1a/0x30
[   21.230802] 
[   21.231047] The buggy address belongs to the object at ffff888102a2c100
[   21.231047]  which belongs to the cache kmalloc-64 of size 64
[   21.232154] The buggy address is located 0 bytes to the right of
[   21.232154]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.233165] 
[   21.233499] The buggy address belongs to the physical page:
[   21.234010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.234666] flags: 0x200000000000000(node=0|zone=2)
[   21.235026] page_type: f5(slab)
[   21.235398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.236115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.236805] page dumped because: kasan: bad access detected
[   21.237158] 
[   21.237432] Memory state around the buggy address:
[   21.237911]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.238853]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.239452] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.239906]                                      ^
[   21.240353]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.241425]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.242355] ==================================================================
[   23.868497] ==================================================================
[   23.869128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   23.869740] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.870509] 
[   23.870782] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.870902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.870943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.870999] Call Trace:
[   23.871067]  <TASK>
[   23.871116]  dump_stack_lvl+0x73/0xb0
[   23.871257]  print_report+0xd1/0x650
[   23.871340]  ? __virt_addr_valid+0x1db/0x2d0
[   23.871462]  ? kasan_atomics_helper+0x224c/0x5450
[   23.871540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.871637]  ? kasan_atomics_helper+0x224c/0x5450
[   23.871742]  kasan_report+0x141/0x180
[   23.871849]  ? kasan_atomics_helper+0x224c/0x5450
[   23.871940]  kasan_check_range+0x10c/0x1c0
[   23.872016]  __kasan_check_write+0x18/0x20
[   23.872137]  kasan_atomics_helper+0x224c/0x5450
[   23.872262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.872367]  ? ret_from_fork_asm+0x1a/0x30
[   23.872486]  kasan_atomics+0x1dc/0x310
[   23.872563]  ? __pfx_kasan_atomics+0x10/0x10
[   23.872635]  ? __pfx_read_tsc+0x10/0x10
[   23.872669]  ? ktime_get_ts64+0x86/0x230
[   23.872710]  kunit_try_run_case+0x1a5/0x480
[   23.872750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.872785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.872820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.872856]  ? __kthread_parkme+0x82/0x180
[   23.872889]  ? preempt_count_sub+0x50/0x80
[   23.872926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.872963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.872998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.873032]  kthread+0x337/0x6f0
[   23.873057]  ? trace_preempt_on+0x20/0xc0
[   23.873092]  ? __pfx_kthread+0x10/0x10
[   23.873118]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.873149]  ? calculate_sigpending+0x7b/0xa0
[   23.873179]  ? __pfx_kthread+0x10/0x10
[   23.873204]  ret_from_fork+0x41/0x80
[   23.873275]  ? __pfx_kthread+0x10/0x10
[   23.873304]  ret_from_fork_asm+0x1a/0x30
[   23.873347]  </TASK>
[   23.873362] 
[   23.892175] Allocated by task 286:
[   23.892744]  kasan_save_stack+0x45/0x70
[   23.893073]  kasan_save_track+0x18/0x40
[   23.893740]  kasan_save_alloc_info+0x3b/0x50
[   23.894508]  __kasan_kmalloc+0xb7/0xc0
[   23.895129]  __kmalloc_cache_noprof+0x189/0x420
[   23.895826]  kasan_atomics+0x95/0x310
[   23.896186]  kunit_try_run_case+0x1a5/0x480
[   23.896595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.897079]  kthread+0x337/0x6f0
[   23.897446]  ret_from_fork+0x41/0x80
[   23.897850]  ret_from_fork_asm+0x1a/0x30
[   23.898311] 
[   23.898531] The buggy address belongs to the object at ffff888102a2c100
[   23.898531]  which belongs to the cache kmalloc-64 of size 64
[   23.899493] The buggy address is located 0 bytes to the right of
[   23.899493]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.900425] 
[   23.900626] The buggy address belongs to the physical page:
[   23.901117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.901824] flags: 0x200000000000000(node=0|zone=2)
[   23.902176] page_type: f5(slab)
[   23.902585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.903298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.904021] page dumped because: kasan: bad access detected
[   23.904519] 
[   23.904755] Memory state around the buggy address:
[   23.905291]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.905947]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.906632] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.907329]                                      ^
[   23.907812]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.908300]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.908974] ==================================================================
[   22.603174] ==================================================================
[   22.604209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   22.605066] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.605693] 
[   22.605947] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.606042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.606062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.606092] Call Trace:
[   22.606116]  <TASK>
[   22.606138]  dump_stack_lvl+0x73/0xb0
[   22.606176]  print_report+0xd1/0x650
[   22.606211]  ? __virt_addr_valid+0x1db/0x2d0
[   22.606246]  ? kasan_atomics_helper+0x12e6/0x5450
[   22.606283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.606318]  ? kasan_atomics_helper+0x12e6/0x5450
[   22.606352]  kasan_report+0x141/0x180
[   22.606387]  ? kasan_atomics_helper+0x12e6/0x5450
[   22.606427]  kasan_check_range+0x10c/0x1c0
[   22.606457]  __kasan_check_write+0x18/0x20
[   22.606488]  kasan_atomics_helper+0x12e6/0x5450
[   22.606523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.606557]  ? ret_from_fork_asm+0x1a/0x30
[   22.606598]  kasan_atomics+0x1dc/0x310
[   22.606711]  ? __pfx_kasan_atomics+0x10/0x10
[   22.606787]  ? __pfx_read_tsc+0x10/0x10
[   22.607059]  ? ktime_get_ts64+0x86/0x230
[   22.607179]  kunit_try_run_case+0x1a5/0x480
[   22.607265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.607339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.607415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.607511]  ? __kthread_parkme+0x82/0x180
[   22.607592]  ? preempt_count_sub+0x50/0x80
[   22.607738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.607867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.607980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.608060]  kthread+0x337/0x6f0
[   22.608119]  ? trace_preempt_on+0x20/0xc0
[   22.608158]  ? __pfx_kthread+0x10/0x10
[   22.608186]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.608227]  ? calculate_sigpending+0x7b/0xa0
[   22.608285]  ? __pfx_kthread+0x10/0x10
[   22.608313]  ret_from_fork+0x41/0x80
[   22.608348]  ? __pfx_kthread+0x10/0x10
[   22.608374]  ret_from_fork_asm+0x1a/0x30
[   22.608417]  </TASK>
[   22.608432] 
[   22.623653] Allocated by task 286:
[   22.624025]  kasan_save_stack+0x45/0x70
[   22.624475]  kasan_save_track+0x18/0x40
[   22.624833]  kasan_save_alloc_info+0x3b/0x50
[   22.625317]  __kasan_kmalloc+0xb7/0xc0
[   22.625654]  __kmalloc_cache_noprof+0x189/0x420
[   22.626011]  kasan_atomics+0x95/0x310
[   22.626370]  kunit_try_run_case+0x1a5/0x480
[   22.626860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.627462]  kthread+0x337/0x6f0
[   22.627860]  ret_from_fork+0x41/0x80
[   22.629348]  ret_from_fork_asm+0x1a/0x30
[   22.629793] 
[   22.630041] The buggy address belongs to the object at ffff888102a2c100
[   22.630041]  which belongs to the cache kmalloc-64 of size 64
[   22.631824] The buggy address is located 0 bytes to the right of
[   22.631824]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.632692] 
[   22.632927] The buggy address belongs to the physical page:
[   22.633396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.634034] flags: 0x200000000000000(node=0|zone=2)
[   22.634390] page_type: f5(slab)
[   22.634841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.635517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.636095] page dumped because: kasan: bad access detected
[   22.636632] 
[   22.636858] Memory state around the buggy address:
[   22.637359]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.637963]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.638478] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.639143]                                      ^
[   22.639569]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.640157]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.640809] ==================================================================
[   21.684024] ==================================================================
[   21.684694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   21.685504] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.686264] 
[   21.686728] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.686934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.686977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.687037] Call Trace:
[   21.687078]  <TASK>
[   21.687123]  dump_stack_lvl+0x73/0xb0
[   21.687204]  print_report+0xd1/0x650
[   21.687330]  ? __virt_addr_valid+0x1db/0x2d0
[   21.687441]  ? kasan_atomics_helper+0x72f/0x5450
[   21.687522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.687594]  ? kasan_atomics_helper+0x72f/0x5450
[   21.687697]  kasan_report+0x141/0x180
[   21.687782]  ? kasan_atomics_helper+0x72f/0x5450
[   21.687872]  kasan_check_range+0x10c/0x1c0
[   21.687967]  __kasan_check_write+0x18/0x20
[   21.688043]  kasan_atomics_helper+0x72f/0x5450
[   21.688114]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.688183]  ? ret_from_fork_asm+0x1a/0x30
[   21.688320]  kasan_atomics+0x1dc/0x310
[   21.688406]  ? __pfx_kasan_atomics+0x10/0x10
[   21.688482]  ? __pfx_read_tsc+0x10/0x10
[   21.688545]  ? ktime_get_ts64+0x86/0x230
[   21.688644]  kunit_try_run_case+0x1a5/0x480
[   21.688731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.688810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.688892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.688976]  ? __kthread_parkme+0x82/0x180
[   21.689053]  ? preempt_count_sub+0x50/0x80
[   21.689100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.689139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.689176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.689219]  kthread+0x337/0x6f0
[   21.689274]  ? trace_preempt_on+0x20/0xc0
[   21.689314]  ? __pfx_kthread+0x10/0x10
[   21.689343]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.689375]  ? calculate_sigpending+0x7b/0xa0
[   21.689411]  ? __pfx_kthread+0x10/0x10
[   21.689440]  ret_from_fork+0x41/0x80
[   21.689472]  ? __pfx_kthread+0x10/0x10
[   21.689499]  ret_from_fork_asm+0x1a/0x30
[   21.689540]  </TASK>
[   21.689556] 
[   21.709310] Allocated by task 286:
[   21.709948]  kasan_save_stack+0x45/0x70
[   21.710950]  kasan_save_track+0x18/0x40
[   21.712134]  kasan_save_alloc_info+0x3b/0x50
[   21.712869]  __kasan_kmalloc+0xb7/0xc0
[   21.713192]  __kmalloc_cache_noprof+0x189/0x420
[   21.714149]  kasan_atomics+0x95/0x310
[   21.714686]  kunit_try_run_case+0x1a5/0x480
[   21.715479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.715963]  kthread+0x337/0x6f0
[   21.716635]  ret_from_fork+0x41/0x80
[   21.717153]  ret_from_fork_asm+0x1a/0x30
[   21.717564] 
[   21.718102] The buggy address belongs to the object at ffff888102a2c100
[   21.718102]  which belongs to the cache kmalloc-64 of size 64
[   21.719157] The buggy address is located 0 bytes to the right of
[   21.719157]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.720124] 
[   21.720418] The buggy address belongs to the physical page:
[   21.720942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.721973] flags: 0x200000000000000(node=0|zone=2)
[   21.722368] page_type: f5(slab)
[   21.723011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.723881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.724533] page dumped because: kasan: bad access detected
[   21.725289] 
[   21.725508] Memory state around the buggy address:
[   21.726362]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.726978]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727564] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.728336]                                      ^
[   21.728754]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.729556]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.730146] ==================================================================
[   21.948530] ==================================================================
[   21.949585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   21.950300] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.950968] 
[   21.951311] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.951402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.951422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.951451] Call Trace:
[   21.951474]  <TASK>
[   21.951511]  dump_stack_lvl+0x73/0xb0
[   21.951568]  print_report+0xd1/0x650
[   21.951654]  ? __virt_addr_valid+0x1db/0x2d0
[   21.951731]  ? kasan_atomics_helper+0xac7/0x5450
[   21.951806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.951886]  ? kasan_atomics_helper+0xac7/0x5450
[   21.951965]  kasan_report+0x141/0x180
[   21.952044]  ? kasan_atomics_helper+0xac7/0x5450
[   21.952135]  kasan_check_range+0x10c/0x1c0
[   21.952251]  __kasan_check_write+0x18/0x20
[   21.952334]  kasan_atomics_helper+0xac7/0x5450
[   21.952414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.952514]  ? ret_from_fork_asm+0x1a/0x30
[   21.952645]  kasan_atomics+0x1dc/0x310
[   21.952719]  ? __pfx_kasan_atomics+0x10/0x10
[   21.952793]  ? __pfx_read_tsc+0x10/0x10
[   21.952858]  ? ktime_get_ts64+0x86/0x230
[   21.952936]  kunit_try_run_case+0x1a5/0x480
[   21.953014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.953087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.953162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.953283]  ? __kthread_parkme+0x82/0x180
[   21.953359]  ? preempt_count_sub+0x50/0x80
[   21.953440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.953516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.953584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.953663]  kthread+0x337/0x6f0
[   21.953727]  ? trace_preempt_on+0x20/0xc0
[   21.953823]  ? __pfx_kthread+0x10/0x10
[   21.953941]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.954025]  ? calculate_sigpending+0x7b/0xa0
[   21.954101]  ? __pfx_kthread+0x10/0x10
[   21.954170]  ret_from_fork+0x41/0x80
[   21.954287]  ? __pfx_kthread+0x10/0x10
[   21.954359]  ret_from_fork_asm+0x1a/0x30
[   21.954469]  </TASK>
[   21.954513] 
[   21.969412] Allocated by task 286:
[   21.969707]  kasan_save_stack+0x45/0x70
[   21.970089]  kasan_save_track+0x18/0x40
[   21.970583]  kasan_save_alloc_info+0x3b/0x50
[   21.971122]  __kasan_kmalloc+0xb7/0xc0
[   21.971574]  __kmalloc_cache_noprof+0x189/0x420
[   21.972113]  kasan_atomics+0x95/0x310
[   21.972475]  kunit_try_run_case+0x1a5/0x480
[   21.972966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.973565]  kthread+0x337/0x6f0
[   21.973961]  ret_from_fork+0x41/0x80
[   21.974353]  ret_from_fork_asm+0x1a/0x30
[   21.974839] 
[   21.975110] The buggy address belongs to the object at ffff888102a2c100
[   21.975110]  which belongs to the cache kmalloc-64 of size 64
[   21.975894] The buggy address is located 0 bytes to the right of
[   21.975894]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.976664] 
[   21.976940] The buggy address belongs to the physical page:
[   21.977503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.978271] flags: 0x200000000000000(node=0|zone=2)
[   21.978777] page_type: f5(slab)
[   21.979149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.979887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.980591] page dumped because: kasan: bad access detected
[   21.980972] 
[   21.981150] Memory state around the buggy address:
[   21.981637]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.982382]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.983051] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.983765]                                      ^
[   21.984260]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.984921]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985506] ==================================================================
[   22.393281] ==================================================================
[   22.393939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   22.394658] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.395163] 
[   22.395421] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.395541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.395580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.395656] Call Trace:
[   22.395704]  <TASK>
[   22.395745]  dump_stack_lvl+0x73/0xb0
[   22.395820]  print_report+0xd1/0x650
[   22.395891]  ? __virt_addr_valid+0x1db/0x2d0
[   22.395963]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.396041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.396121]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.396199]  kasan_report+0x141/0x180
[   22.396324]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.396418]  __asan_report_load4_noabort+0x18/0x20
[   22.396496]  kasan_atomics_helper+0x4a1c/0x5450
[   22.396579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.396680]  ? ret_from_fork_asm+0x1a/0x30
[   22.396776]  kasan_atomics+0x1dc/0x310
[   22.396850]  ? __pfx_kasan_atomics+0x10/0x10
[   22.396924]  ? __pfx_read_tsc+0x10/0x10
[   22.396996]  ? ktime_get_ts64+0x86/0x230
[   22.397082]  kunit_try_run_case+0x1a5/0x480
[   22.397167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.397287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.397365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.397441]  ? __kthread_parkme+0x82/0x180
[   22.397513]  ? preempt_count_sub+0x50/0x80
[   22.397592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.397691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.397776]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.397855]  kthread+0x337/0x6f0
[   22.397923]  ? trace_preempt_on+0x20/0xc0
[   22.398006]  ? __pfx_kthread+0x10/0x10
[   22.398072]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.398118]  ? calculate_sigpending+0x7b/0xa0
[   22.398150]  ? __pfx_kthread+0x10/0x10
[   22.398179]  ret_from_fork+0x41/0x80
[   22.398239]  ? __pfx_kthread+0x10/0x10
[   22.398287]  ret_from_fork_asm+0x1a/0x30
[   22.398331]  </TASK>
[   22.398348] 
[   22.414970] Allocated by task 286:
[   22.415441]  kasan_save_stack+0x45/0x70
[   22.415950]  kasan_save_track+0x18/0x40
[   22.416544]  kasan_save_alloc_info+0x3b/0x50
[   22.417041]  __kasan_kmalloc+0xb7/0xc0
[   22.417512]  __kmalloc_cache_noprof+0x189/0x420
[   22.418087]  kasan_atomics+0x95/0x310
[   22.418632]  kunit_try_run_case+0x1a5/0x480
[   22.419112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.419783]  kthread+0x337/0x6f0
[   22.420068]  ret_from_fork+0x41/0x80
[   22.420788]  ret_from_fork_asm+0x1a/0x30
[   22.421496] 
[   22.421766] The buggy address belongs to the object at ffff888102a2c100
[   22.421766]  which belongs to the cache kmalloc-64 of size 64
[   22.422739] The buggy address is located 0 bytes to the right of
[   22.422739]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.424017] 
[   22.424480] The buggy address belongs to the physical page:
[   22.425126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.425856] flags: 0x200000000000000(node=0|zone=2)
[   22.426261] page_type: f5(slab)
[   22.426853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.427648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.428330] page dumped because: kasan: bad access detected
[   22.428843] 
[   22.429079] Memory state around the buggy address:
[   22.429687]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.430301]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.430956] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.431524]                                      ^
[   22.432035]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.432885]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.433643] ==================================================================
[   22.804935] ==================================================================
[   22.806112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   22.806820] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.808078] 
[   22.808440] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.808571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.808629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.808706] Call Trace:
[   22.808786]  <TASK>
[   22.808835]  dump_stack_lvl+0x73/0xb0
[   22.808901]  print_report+0xd1/0x650
[   22.808940]  ? __virt_addr_valid+0x1db/0x2d0
[   22.808974]  ? kasan_atomics_helper+0x50d4/0x5450
[   22.809011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.809047]  ? kasan_atomics_helper+0x50d4/0x5450
[   22.809081]  kasan_report+0x141/0x180
[   22.809117]  ? kasan_atomics_helper+0x50d4/0x5450
[   22.809157]  __asan_report_store8_noabort+0x1b/0x30
[   22.809192]  kasan_atomics_helper+0x50d4/0x5450
[   22.809269]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.809310]  ? ret_from_fork_asm+0x1a/0x30
[   22.809351]  kasan_atomics+0x1dc/0x310
[   22.809381]  ? __pfx_kasan_atomics+0x10/0x10
[   22.809412]  ? __pfx_read_tsc+0x10/0x10
[   22.809443]  ? ktime_get_ts64+0x86/0x230
[   22.809479]  kunit_try_run_case+0x1a5/0x480
[   22.809516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.809553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.809590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.809653]  ? __kthread_parkme+0x82/0x180
[   22.809688]  ? preempt_count_sub+0x50/0x80
[   22.809727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.809779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.809818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.809855]  kthread+0x337/0x6f0
[   22.809881]  ? trace_preempt_on+0x20/0xc0
[   22.809917]  ? __pfx_kthread+0x10/0x10
[   22.809945]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.809978]  ? calculate_sigpending+0x7b/0xa0
[   22.810009]  ? __pfx_kthread+0x10/0x10
[   22.810036]  ret_from_fork+0x41/0x80
[   22.810069]  ? __pfx_kthread+0x10/0x10
[   22.810096]  ret_from_fork_asm+0x1a/0x30
[   22.810141]  </TASK>
[   22.810156] 
[   22.827777] Allocated by task 286:
[   22.828130]  kasan_save_stack+0x45/0x70
[   22.828710]  kasan_save_track+0x18/0x40
[   22.829103]  kasan_save_alloc_info+0x3b/0x50
[   22.829507]  __kasan_kmalloc+0xb7/0xc0
[   22.829846]  __kmalloc_cache_noprof+0x189/0x420
[   22.830186]  kasan_atomics+0x95/0x310
[   22.830723]  kunit_try_run_case+0x1a5/0x480
[   22.831199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.831729]  kthread+0x337/0x6f0
[   22.832225]  ret_from_fork+0x41/0x80
[   22.832666]  ret_from_fork_asm+0x1a/0x30
[   22.833084] 
[   22.833391] The buggy address belongs to the object at ffff888102a2c100
[   22.833391]  which belongs to the cache kmalloc-64 of size 64
[   22.834277] The buggy address is located 0 bytes to the right of
[   22.834277]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.836706] 
[   22.836943] The buggy address belongs to the physical page:
[   22.837425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.838132] flags: 0x200000000000000(node=0|zone=2)
[   22.839005] page_type: f5(slab)
[   22.839598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.840336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.840962] page dumped because: kasan: bad access detected
[   22.841629] 
[   22.841842] Memory state around the buggy address:
[   22.842276]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.843030]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.843591] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.844154]                                      ^
[   22.844561]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.845130]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.846157] ==================================================================
[   23.583416] ==================================================================
[   23.584064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   23.584810] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.585539] 
[   23.585806] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.585911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.585943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.585990] Call Trace:
[   23.586032]  <TASK>
[   23.586070]  dump_stack_lvl+0x73/0xb0
[   23.586183]  print_report+0xd1/0x650
[   23.586370]  ? __virt_addr_valid+0x1db/0x2d0
[   23.586492]  ? kasan_atomics_helper+0x4f71/0x5450
[   23.586576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.586670]  ? kasan_atomics_helper+0x4f71/0x5450
[   23.586745]  kasan_report+0x141/0x180
[   23.586824]  ? kasan_atomics_helper+0x4f71/0x5450
[   23.586915]  __asan_report_load8_noabort+0x18/0x20
[   23.586994]  kasan_atomics_helper+0x4f71/0x5450
[   23.587041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.587080]  ? ret_from_fork_asm+0x1a/0x30
[   23.587121]  kasan_atomics+0x1dc/0x310
[   23.587178]  ? __pfx_kasan_atomics+0x10/0x10
[   23.587389]  ? __pfx_read_tsc+0x10/0x10
[   23.587461]  ? ktime_get_ts64+0x86/0x230
[   23.587704]  kunit_try_run_case+0x1a5/0x480
[   23.587795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.587870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.587949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.588025]  ? __kthread_parkme+0x82/0x180
[   23.588077]  ? preempt_count_sub+0x50/0x80
[   23.588117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.588155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.588190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.588266]  kthread+0x337/0x6f0
[   23.588298]  ? trace_preempt_on+0x20/0xc0
[   23.588335]  ? __pfx_kthread+0x10/0x10
[   23.588362]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.588395]  ? calculate_sigpending+0x7b/0xa0
[   23.588429]  ? __pfx_kthread+0x10/0x10
[   23.588455]  ret_from_fork+0x41/0x80
[   23.588488]  ? __pfx_kthread+0x10/0x10
[   23.588514]  ret_from_fork_asm+0x1a/0x30
[   23.588557]  </TASK>
[   23.588573] 
[   23.604036] Allocated by task 286:
[   23.604376]  kasan_save_stack+0x45/0x70
[   23.604830]  kasan_save_track+0x18/0x40
[   23.605377]  kasan_save_alloc_info+0x3b/0x50
[   23.605870]  __kasan_kmalloc+0xb7/0xc0
[   23.606357]  __kmalloc_cache_noprof+0x189/0x420
[   23.606903]  kasan_atomics+0x95/0x310
[   23.607368]  kunit_try_run_case+0x1a5/0x480
[   23.607850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.608464]  kthread+0x337/0x6f0
[   23.608895]  ret_from_fork+0x41/0x80
[   23.609399]  ret_from_fork_asm+0x1a/0x30
[   23.609834] 
[   23.610176] The buggy address belongs to the object at ffff888102a2c100
[   23.610176]  which belongs to the cache kmalloc-64 of size 64
[   23.611349] The buggy address is located 0 bytes to the right of
[   23.611349]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.612626] 
[   23.612911] The buggy address belongs to the physical page:
[   23.613473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.614295] flags: 0x200000000000000(node=0|zone=2)
[   23.614862] page_type: f5(slab)
[   23.615303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.616003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.616772] page dumped because: kasan: bad access detected
[   23.617296] 
[   23.617578] Memory state around the buggy address:
[   23.617995]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.618728]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.619432] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.620739]                                      ^
[   23.621268]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.621736]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.622422] ==================================================================
[   23.126894] ==================================================================
[   23.127554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   23.129055] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.129723] 
[   23.130044] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.130293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.130337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.130396] Call Trace:
[   23.130446]  <TASK>
[   23.130488]  dump_stack_lvl+0x73/0xb0
[   23.130619]  print_report+0xd1/0x650
[   23.130707]  ? __virt_addr_valid+0x1db/0x2d0
[   23.130785]  ? kasan_atomics_helper+0x194a/0x5450
[   23.130855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.130894]  ? kasan_atomics_helper+0x194a/0x5450
[   23.130929]  kasan_report+0x141/0x180
[   23.130965]  ? kasan_atomics_helper+0x194a/0x5450
[   23.131006]  kasan_check_range+0x10c/0x1c0
[   23.131036]  __kasan_check_write+0x18/0x20
[   23.131067]  kasan_atomics_helper+0x194a/0x5450
[   23.131102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.131135]  ? ret_from_fork_asm+0x1a/0x30
[   23.131174]  kasan_atomics+0x1dc/0x310
[   23.131203]  ? __pfx_kasan_atomics+0x10/0x10
[   23.131277]  ? __pfx_read_tsc+0x10/0x10
[   23.131309]  ? ktime_get_ts64+0x86/0x230
[   23.131347]  kunit_try_run_case+0x1a5/0x480
[   23.131385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.131419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.131454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.131489]  ? __kthread_parkme+0x82/0x180
[   23.131519]  ? preempt_count_sub+0x50/0x80
[   23.131555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.131590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.131652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.131689]  kthread+0x337/0x6f0
[   23.131713]  ? trace_preempt_on+0x20/0xc0
[   23.131748]  ? __pfx_kthread+0x10/0x10
[   23.131774]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.131807]  ? calculate_sigpending+0x7b/0xa0
[   23.131837]  ? __pfx_kthread+0x10/0x10
[   23.131863]  ret_from_fork+0x41/0x80
[   23.131895]  ? __pfx_kthread+0x10/0x10
[   23.131920]  ret_from_fork_asm+0x1a/0x30
[   23.131962]  </TASK>
[   23.131976] 
[   23.147304] Allocated by task 286:
[   23.147752]  kasan_save_stack+0x45/0x70
[   23.148182]  kasan_save_track+0x18/0x40
[   23.148699]  kasan_save_alloc_info+0x3b/0x50
[   23.149180]  __kasan_kmalloc+0xb7/0xc0
[   23.149542]  __kmalloc_cache_noprof+0x189/0x420
[   23.150044]  kasan_atomics+0x95/0x310
[   23.150548]  kunit_try_run_case+0x1a5/0x480
[   23.151031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.151614]  kthread+0x337/0x6f0
[   23.151988]  ret_from_fork+0x41/0x80
[   23.152347]  ret_from_fork_asm+0x1a/0x30
[   23.152701] 
[   23.152864] The buggy address belongs to the object at ffff888102a2c100
[   23.152864]  which belongs to the cache kmalloc-64 of size 64
[   23.153921] The buggy address is located 0 bytes to the right of
[   23.153921]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.154843] 
[   23.155123] The buggy address belongs to the physical page:
[   23.155742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.156452] flags: 0x200000000000000(node=0|zone=2)
[   23.156938] page_type: f5(slab)
[   23.157363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.158063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.158765] page dumped because: kasan: bad access detected
[   23.159301] 
[   23.159554] Memory state around the buggy address:
[   23.159976]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.160476]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.161111] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.161843]                                      ^
[   23.162370]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.162930]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164353] ==================================================================
[   22.233122] ==================================================================
[   22.234314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   22.235410] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.236116] 
[   22.236417] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.236541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.236577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.236651] Call Trace:
[   22.236703]  <TASK>
[   22.236746]  dump_stack_lvl+0x73/0xb0
[   22.236822]  print_report+0xd1/0x650
[   22.236894]  ? __virt_addr_valid+0x1db/0x2d0
[   22.236968]  ? kasan_atomics_helper+0xf10/0x5450
[   22.237038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.237112]  ? kasan_atomics_helper+0xf10/0x5450
[   22.237186]  kasan_report+0x141/0x180
[   22.237310]  ? kasan_atomics_helper+0xf10/0x5450
[   22.237398]  kasan_check_range+0x10c/0x1c0
[   22.237470]  __kasan_check_write+0x18/0x20
[   22.237537]  kasan_atomics_helper+0xf10/0x5450
[   22.237630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.237717]  ? ret_from_fork_asm+0x1a/0x30
[   22.237857]  kasan_atomics+0x1dc/0x310
[   22.237967]  ? __pfx_kasan_atomics+0x10/0x10
[   22.238102]  ? __pfx_read_tsc+0x10/0x10
[   22.238176]  ? ktime_get_ts64+0x86/0x230
[   22.238289]  kunit_try_run_case+0x1a5/0x480
[   22.238362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.238434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.238580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.238713]  ? __kthread_parkme+0x82/0x180
[   22.238797]  ? preempt_count_sub+0x50/0x80
[   22.238879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.238961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.239041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.239121]  kthread+0x337/0x6f0
[   22.239188]  ? trace_preempt_on+0x20/0xc0
[   22.239283]  ? __pfx_kthread+0x10/0x10
[   22.239350]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.239422]  ? calculate_sigpending+0x7b/0xa0
[   22.239497]  ? __pfx_kthread+0x10/0x10
[   22.239565]  ret_from_fork+0x41/0x80
[   22.239717]  ? __pfx_kthread+0x10/0x10
[   22.239790]  ret_from_fork_asm+0x1a/0x30
[   22.239883]  </TASK>
[   22.239921] 
[   22.254838] Allocated by task 286:
[   22.255289]  kasan_save_stack+0x45/0x70
[   22.255703]  kasan_save_track+0x18/0x40
[   22.256150]  kasan_save_alloc_info+0x3b/0x50
[   22.256621]  __kasan_kmalloc+0xb7/0xc0
[   22.257010]  __kmalloc_cache_noprof+0x189/0x420
[   22.257571]  kasan_atomics+0x95/0x310
[   22.257938]  kunit_try_run_case+0x1a5/0x480
[   22.258442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.259014]  kthread+0x337/0x6f0
[   22.259338]  ret_from_fork+0x41/0x80
[   22.259820]  ret_from_fork_asm+0x1a/0x30
[   22.260311] 
[   22.260578] The buggy address belongs to the object at ffff888102a2c100
[   22.260578]  which belongs to the cache kmalloc-64 of size 64
[   22.261548] The buggy address is located 0 bytes to the right of
[   22.261548]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.262696] 
[   22.262931] The buggy address belongs to the physical page:
[   22.263501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.264269] flags: 0x200000000000000(node=0|zone=2)
[   22.264792] page_type: f5(slab)
[   22.265170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.265949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.266634] page dumped because: kasan: bad access detected
[   22.267061] 
[   22.267318] Memory state around the buggy address:
[   22.267821]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.268556]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.269156] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.269651]                                      ^
[   22.270085]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.270820]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.271537] ==================================================================
[   23.165242] ==================================================================
[   23.165803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   23.166790] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.167727] 
[   23.168876] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.169055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.169097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.169154] Call Trace:
[   23.169201]  <TASK>
[   23.169284]  dump_stack_lvl+0x73/0xb0
[   23.169361]  print_report+0xd1/0x650
[   23.169433]  ? __virt_addr_valid+0x1db/0x2d0
[   23.169505]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.169577]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.169653]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.169694]  kasan_report+0x141/0x180
[   23.169730]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.169781]  kasan_check_range+0x10c/0x1c0
[   23.169813]  __kasan_check_write+0x18/0x20
[   23.169846]  kasan_atomics_helper+0x19e3/0x5450
[   23.169884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.169919]  ? ret_from_fork_asm+0x1a/0x30
[   23.169958]  kasan_atomics+0x1dc/0x310
[   23.169987]  ? __pfx_kasan_atomics+0x10/0x10
[   23.170018]  ? __pfx_read_tsc+0x10/0x10
[   23.170047]  ? ktime_get_ts64+0x86/0x230
[   23.170081]  kunit_try_run_case+0x1a5/0x480
[   23.170120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.170154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.170189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.170258]  ? __kthread_parkme+0x82/0x180
[   23.170295]  ? preempt_count_sub+0x50/0x80
[   23.170335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.170370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.170405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.170440]  kthread+0x337/0x6f0
[   23.170465]  ? trace_preempt_on+0x20/0xc0
[   23.170499]  ? __pfx_kthread+0x10/0x10
[   23.170525]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.170557]  ? calculate_sigpending+0x7b/0xa0
[   23.170588]  ? __pfx_kthread+0x10/0x10
[   23.170637]  ret_from_fork+0x41/0x80
[   23.170671]  ? __pfx_kthread+0x10/0x10
[   23.170699]  ret_from_fork_asm+0x1a/0x30
[   23.170742]  </TASK>
[   23.170757] 
[   23.188635] Allocated by task 286:
[   23.189006]  kasan_save_stack+0x45/0x70
[   23.189539]  kasan_save_track+0x18/0x40
[   23.189882]  kasan_save_alloc_info+0x3b/0x50
[   23.190549]  __kasan_kmalloc+0xb7/0xc0
[   23.190995]  __kmalloc_cache_noprof+0x189/0x420
[   23.191659]  kasan_atomics+0x95/0x310
[   23.192127]  kunit_try_run_case+0x1a5/0x480
[   23.192669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.193302]  kthread+0x337/0x6f0
[   23.193693]  ret_from_fork+0x41/0x80
[   23.194195]  ret_from_fork_asm+0x1a/0x30
[   23.194712] 
[   23.195036] The buggy address belongs to the object at ffff888102a2c100
[   23.195036]  which belongs to the cache kmalloc-64 of size 64
[   23.196014] The buggy address is located 0 bytes to the right of
[   23.196014]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.197126] 
[   23.197465] The buggy address belongs to the physical page:
[   23.197944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.198782] flags: 0x200000000000000(node=0|zone=2)
[   23.199319] page_type: f5(slab)
[   23.199721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.200554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.201293] page dumped because: kasan: bad access detected
[   23.201783] 
[   23.202018] Memory state around the buggy address:
[   23.202687]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.203471]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.204110] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.204668]                                      ^
[   23.205330]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.205894]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.206642] ==================================================================
[   23.662890] ==================================================================
[   23.663397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   23.664104] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.664813] 
[   23.665085] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.665277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.665323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.665380] Call Trace:
[   23.665434]  <TASK>
[   23.665482]  dump_stack_lvl+0x73/0xb0
[   23.665559]  print_report+0xd1/0x650
[   23.665656]  ? __virt_addr_valid+0x1db/0x2d0
[   23.665734]  ? kasan_atomics_helper+0x4f98/0x5450
[   23.665836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.665944]  ? kasan_atomics_helper+0x4f98/0x5450
[   23.666022]  kasan_report+0x141/0x180
[   23.666101]  ? kasan_atomics_helper+0x4f98/0x5450
[   23.666185]  __asan_report_load8_noabort+0x18/0x20
[   23.666313]  kasan_atomics_helper+0x4f98/0x5450
[   23.666444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.666527]  ? ret_from_fork_asm+0x1a/0x30
[   23.666633]  kasan_atomics+0x1dc/0x310
[   23.666732]  ? __pfx_kasan_atomics+0x10/0x10
[   23.666834]  ? __pfx_read_tsc+0x10/0x10
[   23.666902]  ? ktime_get_ts64+0x86/0x230
[   23.666945]  kunit_try_run_case+0x1a5/0x480
[   23.666986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.667022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.667060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.667099]  ? __kthread_parkme+0x82/0x180
[   23.667132]  ? preempt_count_sub+0x50/0x80
[   23.667169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.667204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.667279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.667316]  kthread+0x337/0x6f0
[   23.667341]  ? trace_preempt_on+0x20/0xc0
[   23.667377]  ? __pfx_kthread+0x10/0x10
[   23.667404]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.667437]  ? calculate_sigpending+0x7b/0xa0
[   23.667468]  ? __pfx_kthread+0x10/0x10
[   23.667495]  ret_from_fork+0x41/0x80
[   23.667525]  ? __pfx_kthread+0x10/0x10
[   23.667551]  ret_from_fork_asm+0x1a/0x30
[   23.667592]  </TASK>
[   23.667631] 
[   23.683396] Allocated by task 286:
[   23.683802]  kasan_save_stack+0x45/0x70
[   23.684276]  kasan_save_track+0x18/0x40
[   23.684716]  kasan_save_alloc_info+0x3b/0x50
[   23.685161]  __kasan_kmalloc+0xb7/0xc0
[   23.685594]  __kmalloc_cache_noprof+0x189/0x420
[   23.686109]  kasan_atomics+0x95/0x310
[   23.686588]  kunit_try_run_case+0x1a5/0x480
[   23.687021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.687564]  kthread+0x337/0x6f0
[   23.687969]  ret_from_fork+0x41/0x80
[   23.688420]  ret_from_fork_asm+0x1a/0x30
[   23.688911] 
[   23.689142] The buggy address belongs to the object at ffff888102a2c100
[   23.689142]  which belongs to the cache kmalloc-64 of size 64
[   23.690153] The buggy address is located 0 bytes to the right of
[   23.690153]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.691147] 
[   23.691402] The buggy address belongs to the physical page:
[   23.691876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.692671] flags: 0x200000000000000(node=0|zone=2)
[   23.693156] page_type: f5(slab)
[   23.693589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.694266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.694748] page dumped because: kasan: bad access detected
[   23.695299] 
[   23.695592] Memory state around the buggy address:
[   23.696114]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.696848]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.697549] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.698196]                                      ^
[   23.698888]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.700156]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.701170] ==================================================================
[   21.292555] ==================================================================
[   21.293358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   21.294290] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.295005] 
[   21.295360] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.295502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.295545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.295724] Call Trace:
[   21.295848]  <TASK>
[   21.295896]  dump_stack_lvl+0x73/0xb0
[   21.295974]  print_report+0xd1/0x650
[   21.296049]  ? __virt_addr_valid+0x1db/0x2d0
[   21.296126]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.296268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.296354]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.296434]  kasan_report+0x141/0x180
[   21.296532]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.296670]  __asan_report_store4_noabort+0x1b/0x30
[   21.296785]  kasan_atomics_helper+0x4b6e/0x5450
[   21.296873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.296960]  ? ret_from_fork_asm+0x1a/0x30
[   21.297038]  kasan_atomics+0x1dc/0x310
[   21.297070]  ? __pfx_kasan_atomics+0x10/0x10
[   21.297104]  ? __pfx_read_tsc+0x10/0x10
[   21.297135]  ? ktime_get_ts64+0x86/0x230
[   21.297172]  kunit_try_run_case+0x1a5/0x480
[   21.297231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.297288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.297327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.297364]  ? __kthread_parkme+0x82/0x180
[   21.297397]  ? preempt_count_sub+0x50/0x80
[   21.297437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.297474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.297509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.297544]  kthread+0x337/0x6f0
[   21.297570]  ? trace_preempt_on+0x20/0xc0
[   21.297652]  ? __pfx_kthread+0x10/0x10
[   21.297729]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.297775]  ? calculate_sigpending+0x7b/0xa0
[   21.297810]  ? __pfx_kthread+0x10/0x10
[   21.297838]  ret_from_fork+0x41/0x80
[   21.297870]  ? __pfx_kthread+0x10/0x10
[   21.297896]  ret_from_fork_asm+0x1a/0x30
[   21.297939]  </TASK>
[   21.297954] 
[   21.318040] Allocated by task 286:
[   21.318536]  kasan_save_stack+0x45/0x70
[   21.319483]  kasan_save_track+0x18/0x40
[   21.320079]  kasan_save_alloc_info+0x3b/0x50
[   21.320748]  __kasan_kmalloc+0xb7/0xc0
[   21.321203]  __kmalloc_cache_noprof+0x189/0x420
[   21.321868]  kasan_atomics+0x95/0x310
[   21.322309]  kunit_try_run_case+0x1a5/0x480
[   21.322992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.323591]  kthread+0x337/0x6f0
[   21.324184]  ret_from_fork+0x41/0x80
[   21.324515]  ret_from_fork_asm+0x1a/0x30
[   21.324951] 
[   21.325238] The buggy address belongs to the object at ffff888102a2c100
[   21.325238]  which belongs to the cache kmalloc-64 of size 64
[   21.326965] The buggy address is located 0 bytes to the right of
[   21.326965]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.328394] 
[   21.328649] The buggy address belongs to the physical page:
[   21.329122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.329726] flags: 0x200000000000000(node=0|zone=2)
[   21.330138] page_type: f5(slab)
[   21.330519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.331555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.332306] page dumped because: kasan: bad access detected
[   21.332734] 
[   21.332965] Memory state around the buggy address:
[   21.333417]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.334936]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.335937] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.337027]                                      ^
[   21.337996]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.339044]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.339528] ==================================================================
[   22.107356] ==================================================================
[   22.109029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   22.109784] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.110491] 
[   22.110876] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.110981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.111018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.111072] Call Trace:
[   22.111117]  <TASK>
[   22.111152]  dump_stack_lvl+0x73/0xb0
[   22.111222]  print_report+0xd1/0x650
[   22.111300]  ? __virt_addr_valid+0x1db/0x2d0
[   22.111374]  ? kasan_atomics_helper+0xd47/0x5450
[   22.111575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.111693]  ? kasan_atomics_helper+0xd47/0x5450
[   22.111769]  kasan_report+0x141/0x180
[   22.111848]  ? kasan_atomics_helper+0xd47/0x5450
[   22.111944]  kasan_check_range+0x10c/0x1c0
[   22.112079]  __kasan_check_write+0x18/0x20
[   22.112263]  kasan_atomics_helper+0xd47/0x5450
[   22.112353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.112434]  ? ret_from_fork_asm+0x1a/0x30
[   22.112525]  kasan_atomics+0x1dc/0x310
[   22.112580]  ? __pfx_kasan_atomics+0x10/0x10
[   22.112640]  ? __pfx_read_tsc+0x10/0x10
[   22.112673]  ? ktime_get_ts64+0x86/0x230
[   22.112713]  kunit_try_run_case+0x1a5/0x480
[   22.112751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.112785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.112820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.112855]  ? __kthread_parkme+0x82/0x180
[   22.112887]  ? preempt_count_sub+0x50/0x80
[   22.112923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.112958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.112993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.113028]  kthread+0x337/0x6f0
[   22.113053]  ? trace_preempt_on+0x20/0xc0
[   22.113086]  ? __pfx_kthread+0x10/0x10
[   22.113112]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.113143]  ? calculate_sigpending+0x7b/0xa0
[   22.113175]  ? __pfx_kthread+0x10/0x10
[   22.113200]  ret_from_fork+0x41/0x80
[   22.113261]  ? __pfx_kthread+0x10/0x10
[   22.113291]  ret_from_fork_asm+0x1a/0x30
[   22.113333]  </TASK>
[   22.113350] 
[   22.129904] Allocated by task 286:
[   22.130416]  kasan_save_stack+0x45/0x70
[   22.130907]  kasan_save_track+0x18/0x40
[   22.131315]  kasan_save_alloc_info+0x3b/0x50
[   22.131839]  __kasan_kmalloc+0xb7/0xc0
[   22.132248]  __kmalloc_cache_noprof+0x189/0x420
[   22.132637]  kasan_atomics+0x95/0x310
[   22.133038]  kunit_try_run_case+0x1a5/0x480
[   22.133537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.133951]  kthread+0x337/0x6f0
[   22.134231]  ret_from_fork+0x41/0x80
[   22.134650]  ret_from_fork_asm+0x1a/0x30
[   22.135207] 
[   22.135469] The buggy address belongs to the object at ffff888102a2c100
[   22.135469]  which belongs to the cache kmalloc-64 of size 64
[   22.136718] The buggy address is located 0 bytes to the right of
[   22.136718]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.137790] 
[   22.138099] The buggy address belongs to the physical page:
[   22.138836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.139665] flags: 0x200000000000000(node=0|zone=2)
[   22.140022] page_type: f5(slab)
[   22.140552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.141371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.142096] page dumped because: kasan: bad access detected
[   22.142579] 
[   22.144636] Memory state around the buggy address:
[   22.145276]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.147021]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.148977] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.150146]                                      ^
[   22.150823]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.151481]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.152284] ==================================================================
[   21.340597] ==================================================================
[   21.341407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   21.342157] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.343100] 
[   21.343394] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.343518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.343559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.343635] Call Trace:
[   21.343692]  <TASK>
[   21.343737]  dump_stack_lvl+0x73/0xb0
[   21.343816]  print_report+0xd1/0x650
[   21.343892]  ? __virt_addr_valid+0x1db/0x2d0
[   21.343967]  ? kasan_atomics_helper+0x3df/0x5450
[   21.344047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.344126]  ? kasan_atomics_helper+0x3df/0x5450
[   21.344207]  kasan_report+0x141/0x180
[   21.344284]  ? kasan_atomics_helper+0x3df/0x5450
[   21.344369]  kasan_check_range+0x10c/0x1c0
[   21.344441]  __kasan_check_read+0x15/0x20
[   21.344509]  kasan_atomics_helper+0x3df/0x5450
[   21.344585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.344721]  ? ret_from_fork_asm+0x1a/0x30
[   21.344812]  kasan_atomics+0x1dc/0x310
[   21.344890]  ? __pfx_kasan_atomics+0x10/0x10
[   21.344966]  ? __pfx_read_tsc+0x10/0x10
[   21.345036]  ? ktime_get_ts64+0x86/0x230
[   21.345111]  kunit_try_run_case+0x1a5/0x480
[   21.345153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.345191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.345264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.345303]  ? __kthread_parkme+0x82/0x180
[   21.345336]  ? preempt_count_sub+0x50/0x80
[   21.345374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.345410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.345446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.345481]  kthread+0x337/0x6f0
[   21.345506]  ? trace_preempt_on+0x20/0xc0
[   21.345542]  ? __pfx_kthread+0x10/0x10
[   21.345569]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.345620]  ? calculate_sigpending+0x7b/0xa0
[   21.345698]  ? __pfx_kthread+0x10/0x10
[   21.345782]  ret_from_fork+0x41/0x80
[   21.345862]  ? __pfx_kthread+0x10/0x10
[   21.345934]  ret_from_fork_asm+0x1a/0x30
[   21.346021]  </TASK>
[   21.346039] 
[   21.366715] Allocated by task 286:
[   21.367039]  kasan_save_stack+0x45/0x70
[   21.367783]  kasan_save_track+0x18/0x40
[   21.368491]  kasan_save_alloc_info+0x3b/0x50
[   21.369086]  __kasan_kmalloc+0xb7/0xc0
[   21.369396]  __kmalloc_cache_noprof+0x189/0x420
[   21.369874]  kasan_atomics+0x95/0x310
[   21.370176]  kunit_try_run_case+0x1a5/0x480
[   21.370516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.370927]  kthread+0x337/0x6f0
[   21.371194]  ret_from_fork+0x41/0x80
[   21.371481]  ret_from_fork_asm+0x1a/0x30
[   21.372498] 
[   21.372708] The buggy address belongs to the object at ffff888102a2c100
[   21.372708]  which belongs to the cache kmalloc-64 of size 64
[   21.373561] The buggy address is located 0 bytes to the right of
[   21.373561]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.374482] 
[   21.374725] The buggy address belongs to the physical page:
[   21.375187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.376347] flags: 0x200000000000000(node=0|zone=2)
[   21.376924] page_type: f5(slab)
[   21.377253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.378066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.378787] page dumped because: kasan: bad access detected
[   21.379309] 
[   21.379538] Memory state around the buggy address:
[   21.380010]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.381040]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.381805] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.382411]                                      ^
[   21.382837]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383395]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383850] ==================================================================
[   21.582454] ==================================================================
[   21.583244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   21.584499] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.585118] 
[   21.585988] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.586121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.586159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.586217] Call Trace:
[   21.586269]  <TASK>
[   21.586316]  dump_stack_lvl+0x73/0xb0
[   21.586393]  print_report+0xd1/0x650
[   21.586468]  ? __virt_addr_valid+0x1db/0x2d0
[   21.586543]  ? kasan_atomics_helper+0x5fe/0x5450
[   21.586635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.586740]  ? kasan_atomics_helper+0x5fe/0x5450
[   21.586826]  kasan_report+0x141/0x180
[   21.586873]  ? kasan_atomics_helper+0x5fe/0x5450
[   21.586917]  kasan_check_range+0x10c/0x1c0
[   21.586950]  __kasan_check_write+0x18/0x20
[   21.586984]  kasan_atomics_helper+0x5fe/0x5450
[   21.587021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.587057]  ? ret_from_fork_asm+0x1a/0x30
[   21.587099]  kasan_atomics+0x1dc/0x310
[   21.587129]  ? __pfx_kasan_atomics+0x10/0x10
[   21.587159]  ? __pfx_read_tsc+0x10/0x10
[   21.587189]  ? ktime_get_ts64+0x86/0x230
[   21.587226]  kunit_try_run_case+0x1a5/0x480
[   21.587266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.587301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.587365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.587405]  ? __kthread_parkme+0x82/0x180
[   21.587439]  ? preempt_count_sub+0x50/0x80
[   21.587477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.587514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.587549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.587584]  kthread+0x337/0x6f0
[   21.587653]  ? trace_preempt_on+0x20/0xc0
[   21.587729]  ? __pfx_kthread+0x10/0x10
[   21.587761]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.587794]  ? calculate_sigpending+0x7b/0xa0
[   21.587827]  ? __pfx_kthread+0x10/0x10
[   21.587854]  ret_from_fork+0x41/0x80
[   21.587886]  ? __pfx_kthread+0x10/0x10
[   21.587911]  ret_from_fork_asm+0x1a/0x30
[   21.587954]  </TASK>
[   21.587969] 
[   21.609691] Allocated by task 286:
[   21.610440]  kasan_save_stack+0x45/0x70
[   21.611120]  kasan_save_track+0x18/0x40
[   21.612065]  kasan_save_alloc_info+0x3b/0x50
[   21.613167]  __kasan_kmalloc+0xb7/0xc0
[   21.613874]  __kmalloc_cache_noprof+0x189/0x420
[   21.614267]  kasan_atomics+0x95/0x310
[   21.614566]  kunit_try_run_case+0x1a5/0x480
[   21.615566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.616403]  kthread+0x337/0x6f0
[   21.616737]  ret_from_fork+0x41/0x80
[   21.617326]  ret_from_fork_asm+0x1a/0x30
[   21.617700] 
[   21.617963] The buggy address belongs to the object at ffff888102a2c100
[   21.617963]  which belongs to the cache kmalloc-64 of size 64
[   21.618804] The buggy address is located 0 bytes to the right of
[   21.618804]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.619849] 
[   21.620156] The buggy address belongs to the physical page:
[   21.620681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.621494] flags: 0x200000000000000(node=0|zone=2)
[   21.622472] page_type: f5(slab)
[   21.623174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.624488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.625131] page dumped because: kasan: bad access detected
[   21.625894] 
[   21.626487] Memory state around the buggy address:
[   21.627057]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.627801]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.628561] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.629152]                                      ^
[   21.629700]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.630628]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.631649] ==================================================================
[   23.910056] ==================================================================
[   23.910716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   23.911323] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.911977] 
[   23.912305] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.912479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.912521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.912579] Call Trace:
[   23.912678]  <TASK>
[   23.912755]  dump_stack_lvl+0x73/0xb0
[   23.912863]  print_report+0xd1/0x650
[   23.912972]  ? __virt_addr_valid+0x1db/0x2d0
[   23.913050]  ? kasan_atomics_helper+0x5115/0x5450
[   23.913126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.913201]  ? kasan_atomics_helper+0x5115/0x5450
[   23.913325]  kasan_report+0x141/0x180
[   23.913404]  ? kasan_atomics_helper+0x5115/0x5450
[   23.913492]  __asan_report_load8_noabort+0x18/0x20
[   23.913565]  kasan_atomics_helper+0x5115/0x5450
[   23.913660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.913741]  ? ret_from_fork_asm+0x1a/0x30
[   23.913844]  kasan_atomics+0x1dc/0x310
[   23.913913]  ? __pfx_kasan_atomics+0x10/0x10
[   23.913985]  ? __pfx_read_tsc+0x10/0x10
[   23.914054]  ? ktime_get_ts64+0x86/0x230
[   23.914176]  kunit_try_run_case+0x1a5/0x480
[   23.914337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.914425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.914508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.914588]  ? __kthread_parkme+0x82/0x180
[   23.914680]  ? preempt_count_sub+0x50/0x80
[   23.914724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.914762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.914799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.914836]  kthread+0x337/0x6f0
[   23.914861]  ? trace_preempt_on+0x20/0xc0
[   23.914898]  ? __pfx_kthread+0x10/0x10
[   23.914925]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.914958]  ? calculate_sigpending+0x7b/0xa0
[   23.914990]  ? __pfx_kthread+0x10/0x10
[   23.915019]  ret_from_fork+0x41/0x80
[   23.915050]  ? __pfx_kthread+0x10/0x10
[   23.915076]  ret_from_fork_asm+0x1a/0x30
[   23.915119]  </TASK>
[   23.915135] 
[   23.930392] Allocated by task 286:
[   23.930819]  kasan_save_stack+0x45/0x70
[   23.931348]  kasan_save_track+0x18/0x40
[   23.931739]  kasan_save_alloc_info+0x3b/0x50
[   23.932267]  __kasan_kmalloc+0xb7/0xc0
[   23.932703]  __kmalloc_cache_noprof+0x189/0x420
[   23.933175]  kasan_atomics+0x95/0x310
[   23.933628]  kunit_try_run_case+0x1a5/0x480
[   23.934094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.934711]  kthread+0x337/0x6f0
[   23.935097]  ret_from_fork+0x41/0x80
[   23.936031]  ret_from_fork_asm+0x1a/0x30
[   23.936954] 
[   23.937197] The buggy address belongs to the object at ffff888102a2c100
[   23.937197]  which belongs to the cache kmalloc-64 of size 64
[   23.937935] The buggy address is located 0 bytes to the right of
[   23.937935]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.939024] 
[   23.939324] The buggy address belongs to the physical page:
[   23.939881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.940625] flags: 0x200000000000000(node=0|zone=2)
[   23.940978] page_type: f5(slab)
[   23.941307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.941954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.942727] page dumped because: kasan: bad access detected
[   23.943338] 
[   23.943623] Memory state around the buggy address:
[   23.944121]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.944679]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.945126] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.945851]                                      ^
[   23.946418]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.947108]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.947787] ==================================================================
[   23.373458] ==================================================================
[   23.374123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   23.374757] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.375270] 
[   23.375545] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.375679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.375716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.375771] Call Trace:
[   23.375812]  <TASK>
[   23.375850]  dump_stack_lvl+0x73/0xb0
[   23.375922]  print_report+0xd1/0x650
[   23.375999]  ? __virt_addr_valid+0x1db/0x2d0
[   23.376074]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.376148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.376268]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.376352]  kasan_report+0x141/0x180
[   23.376435]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.376528]  kasan_check_range+0x10c/0x1c0
[   23.376621]  __kasan_check_write+0x18/0x20
[   23.376697]  kasan_atomics_helper+0x1ce1/0x5450
[   23.376778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.376858]  ? ret_from_fork_asm+0x1a/0x30
[   23.376951]  kasan_atomics+0x1dc/0x310
[   23.377022]  ? __pfx_kasan_atomics+0x10/0x10
[   23.377094]  ? __pfx_read_tsc+0x10/0x10
[   23.377162]  ? ktime_get_ts64+0x86/0x230
[   23.377285]  kunit_try_run_case+0x1a5/0x480
[   23.377375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.377449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.377521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.377562]  ? __kthread_parkme+0x82/0x180
[   23.377594]  ? preempt_count_sub+0x50/0x80
[   23.377660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.377699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.377735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.377784]  kthread+0x337/0x6f0
[   23.377809]  ? trace_preempt_on+0x20/0xc0
[   23.377845]  ? __pfx_kthread+0x10/0x10
[   23.377870]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.377901]  ? calculate_sigpending+0x7b/0xa0
[   23.377931]  ? __pfx_kthread+0x10/0x10
[   23.377956]  ret_from_fork+0x41/0x80
[   23.377988]  ? __pfx_kthread+0x10/0x10
[   23.378013]  ret_from_fork_asm+0x1a/0x30
[   23.378055]  </TASK>
[   23.378069] 
[   23.394648] Allocated by task 286:
[   23.395083]  kasan_save_stack+0x45/0x70
[   23.395567]  kasan_save_track+0x18/0x40
[   23.396017]  kasan_save_alloc_info+0x3b/0x50
[   23.396515]  __kasan_kmalloc+0xb7/0xc0
[   23.396932]  __kmalloc_cache_noprof+0x189/0x420
[   23.397426]  kasan_atomics+0x95/0x310
[   23.397932]  kunit_try_run_case+0x1a5/0x480
[   23.398528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.399060]  kthread+0x337/0x6f0
[   23.399446]  ret_from_fork+0x41/0x80
[   23.399903]  ret_from_fork_asm+0x1a/0x30
[   23.400394] 
[   23.400664] The buggy address belongs to the object at ffff888102a2c100
[   23.400664]  which belongs to the cache kmalloc-64 of size 64
[   23.401663] The buggy address is located 0 bytes to the right of
[   23.401663]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.402692] 
[   23.402962] The buggy address belongs to the physical page:
[   23.403474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.404212] flags: 0x200000000000000(node=0|zone=2)
[   23.404569] page_type: f5(slab)
[   23.404881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.405875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.407302] page dumped because: kasan: bad access detected
[   23.407961] 
[   23.408144] Memory state around the buggy address:
[   23.408492]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.409006]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.410498] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.411319]                                      ^
[   23.411655]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.412203]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.412806] ==================================================================
[   22.193830] ==================================================================
[   22.194414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   22.195077] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.195828] 
[   22.196081] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.196196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.196278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.196337] Call Trace:
[   22.196390]  <TASK>
[   22.196437]  dump_stack_lvl+0x73/0xb0
[   22.196515]  print_report+0xd1/0x650
[   22.196595]  ? __virt_addr_valid+0x1db/0x2d0
[   22.196688]  ? kasan_atomics_helper+0xe78/0x5450
[   22.196760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.196829]  ? kasan_atomics_helper+0xe78/0x5450
[   22.196918]  kasan_report+0x141/0x180
[   22.196989]  ? kasan_atomics_helper+0xe78/0x5450
[   22.197070]  kasan_check_range+0x10c/0x1c0
[   22.197138]  __kasan_check_write+0x18/0x20
[   22.197206]  kasan_atomics_helper+0xe78/0x5450
[   22.197367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.197446]  ? ret_from_fork_asm+0x1a/0x30
[   22.197535]  kasan_atomics+0x1dc/0x310
[   22.197623]  ? __pfx_kasan_atomics+0x10/0x10
[   22.197699]  ? __pfx_read_tsc+0x10/0x10
[   22.197771]  ? ktime_get_ts64+0x86/0x230
[   22.197852]  kunit_try_run_case+0x1a5/0x480
[   22.197932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.198005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.198081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.198157]  ? __kthread_parkme+0x82/0x180
[   22.198313]  ? preempt_count_sub+0x50/0x80
[   22.198404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.198481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.198557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.198654]  kthread+0x337/0x6f0
[   22.198720]  ? trace_preempt_on+0x20/0xc0
[   22.198803]  ? __pfx_kthread+0x10/0x10
[   22.198910]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.198995]  ? calculate_sigpending+0x7b/0xa0
[   22.199072]  ? __pfx_kthread+0x10/0x10
[   22.199141]  ret_from_fork+0x41/0x80
[   22.199284]  ? __pfx_kthread+0x10/0x10
[   22.199365]  ret_from_fork_asm+0x1a/0x30
[   22.199466]  </TASK>
[   22.199504] 
[   22.214630] Allocated by task 286:
[   22.215025]  kasan_save_stack+0x45/0x70
[   22.215478]  kasan_save_track+0x18/0x40
[   22.215965]  kasan_save_alloc_info+0x3b/0x50
[   22.216459]  __kasan_kmalloc+0xb7/0xc0
[   22.216903]  __kmalloc_cache_noprof+0x189/0x420
[   22.217444]  kasan_atomics+0x95/0x310
[   22.217783]  kunit_try_run_case+0x1a5/0x480
[   22.218264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.218821]  kthread+0x337/0x6f0
[   22.219124]  ret_from_fork+0x41/0x80
[   22.219522]  ret_from_fork_asm+0x1a/0x30
[   22.220026] 
[   22.220254] The buggy address belongs to the object at ffff888102a2c100
[   22.220254]  which belongs to the cache kmalloc-64 of size 64
[   22.221170] The buggy address is located 0 bytes to the right of
[   22.221170]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.222205] 
[   22.222436] The buggy address belongs to the physical page:
[   22.222972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.223757] flags: 0x200000000000000(node=0|zone=2)
[   22.224318] page_type: f5(slab)
[   22.224745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.225437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.226102] page dumped because: kasan: bad access detected
[   22.226634] 
[   22.226864] Memory state around the buggy address:
[   22.227389]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.228054]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.228715] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.229379]                                      ^
[   22.229843]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.230477]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.231086] ==================================================================
[   22.762909] ==================================================================
[   22.764097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   22.764752] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.765316] 
[   22.765617] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.765743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.765793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.765857] Call Trace:
[   22.765909]  <TASK>
[   22.765960]  dump_stack_lvl+0x73/0xb0
[   22.766043]  print_report+0xd1/0x650
[   22.766121]  ? __virt_addr_valid+0x1db/0x2d0
[   22.766198]  ? kasan_atomics_helper+0x1467/0x5450
[   22.766278]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.766358]  ? kasan_atomics_helper+0x1467/0x5450
[   22.766434]  kasan_report+0x141/0x180
[   22.766515]  ? kasan_atomics_helper+0x1467/0x5450
[   22.766622]  kasan_check_range+0x10c/0x1c0
[   22.766701]  __kasan_check_write+0x18/0x20
[   22.766773]  kasan_atomics_helper+0x1467/0x5450
[   22.766855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.766929]  ? ret_from_fork_asm+0x1a/0x30
[   22.766981]  kasan_atomics+0x1dc/0x310
[   22.767013]  ? __pfx_kasan_atomics+0x10/0x10
[   22.767046]  ? __pfx_read_tsc+0x10/0x10
[   22.767075]  ? ktime_get_ts64+0x86/0x230
[   22.767112]  kunit_try_run_case+0x1a5/0x480
[   22.767149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.767185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.767251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.767299]  ? __kthread_parkme+0x82/0x180
[   22.767334]  ? preempt_count_sub+0x50/0x80
[   22.767375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.767412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.767447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.767484]  kthread+0x337/0x6f0
[   22.767509]  ? trace_preempt_on+0x20/0xc0
[   22.767546]  ? __pfx_kthread+0x10/0x10
[   22.767573]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.767628]  ? calculate_sigpending+0x7b/0xa0
[   22.767665]  ? __pfx_kthread+0x10/0x10
[   22.767693]  ret_from_fork+0x41/0x80
[   22.767724]  ? __pfx_kthread+0x10/0x10
[   22.767751]  ret_from_fork_asm+0x1a/0x30
[   22.767794]  </TASK>
[   22.767809] 
[   22.785122] Allocated by task 286:
[   22.785540]  kasan_save_stack+0x45/0x70
[   22.786313]  kasan_save_track+0x18/0x40
[   22.786983]  kasan_save_alloc_info+0x3b/0x50
[   22.787384]  __kasan_kmalloc+0xb7/0xc0
[   22.787811]  __kmalloc_cache_noprof+0x189/0x420
[   22.788281]  kasan_atomics+0x95/0x310
[   22.788737]  kunit_try_run_case+0x1a5/0x480
[   22.789185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.789787]  kthread+0x337/0x6f0
[   22.790069]  ret_from_fork+0x41/0x80
[   22.790369]  ret_from_fork_asm+0x1a/0x30
[   22.790995] 
[   22.791286] The buggy address belongs to the object at ffff888102a2c100
[   22.791286]  which belongs to the cache kmalloc-64 of size 64
[   22.792752] The buggy address is located 0 bytes to the right of
[   22.792752]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.794170] 
[   22.794361] The buggy address belongs to the physical page:
[   22.795090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.796180] flags: 0x200000000000000(node=0|zone=2)
[   22.796581] page_type: f5(slab)
[   22.796872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.797595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.798552] page dumped because: kasan: bad access detected
[   22.798951] 
[   22.799391] Memory state around the buggy address:
[   22.800023]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.800682]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.801275] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.801887]                                      ^
[   22.802396]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.803048]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.803662] ==================================================================
[   22.722175] ==================================================================
[   22.723171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   22.724745] Read of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.725932] 
[   22.726525] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.726628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.726650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.726681] Call Trace:
[   22.726707]  <TASK>
[   22.726727]  dump_stack_lvl+0x73/0xb0
[   22.726766]  print_report+0xd1/0x650
[   22.726803]  ? __virt_addr_valid+0x1db/0x2d0
[   22.726838]  ? kasan_atomics_helper+0x4eae/0x5450
[   22.726872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.726908]  ? kasan_atomics_helper+0x4eae/0x5450
[   22.726942]  kasan_report+0x141/0x180
[   22.726978]  ? kasan_atomics_helper+0x4eae/0x5450
[   22.727018]  __asan_report_load8_noabort+0x18/0x20
[   22.727051]  kasan_atomics_helper+0x4eae/0x5450
[   22.727087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.727122]  ? ret_from_fork_asm+0x1a/0x30
[   22.727163]  kasan_atomics+0x1dc/0x310
[   22.727192]  ? __pfx_kasan_atomics+0x10/0x10
[   22.727259]  ? __pfx_read_tsc+0x10/0x10
[   22.727294]  ? ktime_get_ts64+0x86/0x230
[   22.727335]  kunit_try_run_case+0x1a5/0x480
[   22.727374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.727409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.727446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.727484]  ? __kthread_parkme+0x82/0x180
[   22.727517]  ? preempt_count_sub+0x50/0x80
[   22.727555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.727592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.727650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.727688]  kthread+0x337/0x6f0
[   22.727712]  ? trace_preempt_on+0x20/0xc0
[   22.727749]  ? __pfx_kthread+0x10/0x10
[   22.727776]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.727809]  ? calculate_sigpending+0x7b/0xa0
[   22.727841]  ? __pfx_kthread+0x10/0x10
[   22.727868]  ret_from_fork+0x41/0x80
[   22.727900]  ? __pfx_kthread+0x10/0x10
[   22.727925]  ret_from_fork_asm+0x1a/0x30
[   22.727968]  </TASK>
[   22.727983] 
[   22.744292] Allocated by task 286:
[   22.744622]  kasan_save_stack+0x45/0x70
[   22.744954]  kasan_save_track+0x18/0x40
[   22.745327]  kasan_save_alloc_info+0x3b/0x50
[   22.745801]  __kasan_kmalloc+0xb7/0xc0
[   22.746260]  __kmalloc_cache_noprof+0x189/0x420
[   22.746744]  kasan_atomics+0x95/0x310
[   22.747142]  kunit_try_run_case+0x1a5/0x480
[   22.747644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.748162]  kthread+0x337/0x6f0
[   22.748519]  ret_from_fork+0x41/0x80
[   22.748950]  ret_from_fork_asm+0x1a/0x30
[   22.749370] 
[   22.749623] The buggy address belongs to the object at ffff888102a2c100
[   22.749623]  which belongs to the cache kmalloc-64 of size 64
[   22.750379] The buggy address is located 0 bytes to the right of
[   22.750379]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.751411] 
[   22.751648] The buggy address belongs to the physical page:
[   22.752096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.752704] flags: 0x200000000000000(node=0|zone=2)
[   22.753058] page_type: f5(slab)
[   22.753471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.754138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.754839] page dumped because: kasan: bad access detected
[   22.755367] 
[   22.755627] Memory state around the buggy address:
[   22.756075]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.756598]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.757261] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.757928]                                      ^
[   22.759308]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.759939]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.761645] ==================================================================
[   22.890157] ==================================================================
[   22.890844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   22.891522] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.892147] 
[   22.892382] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.892501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.892543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.892598] Call Trace:
[   22.892668]  <TASK>
[   22.892709]  dump_stack_lvl+0x73/0xb0
[   22.892786]  print_report+0xd1/0x650
[   22.892868]  ? __virt_addr_valid+0x1db/0x2d0
[   22.892943]  ? kasan_atomics_helper+0x15b6/0x5450
[   22.893022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.893100]  ? kasan_atomics_helper+0x15b6/0x5450
[   22.893173]  kasan_report+0x141/0x180
[   22.893251]  ? kasan_atomics_helper+0x15b6/0x5450
[   22.893343]  kasan_check_range+0x10c/0x1c0
[   22.893415]  __kasan_check_write+0x18/0x20
[   22.893485]  kasan_atomics_helper+0x15b6/0x5450
[   22.893566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.893684]  ? ret_from_fork_asm+0x1a/0x30
[   22.893831]  kasan_atomics+0x1dc/0x310
[   22.893934]  ? __pfx_kasan_atomics+0x10/0x10
[   22.893992]  ? __pfx_read_tsc+0x10/0x10
[   22.894024]  ? ktime_get_ts64+0x86/0x230
[   22.894062]  kunit_try_run_case+0x1a5/0x480
[   22.894100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.894168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.894261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.894364]  ? __kthread_parkme+0x82/0x180
[   22.894469]  ? preempt_count_sub+0x50/0x80
[   22.894560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.894680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.894793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.894875]  kthread+0x337/0x6f0
[   22.894947]  ? trace_preempt_on+0x20/0xc0
[   22.894989]  ? __pfx_kthread+0x10/0x10
[   22.895035]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.895072]  ? calculate_sigpending+0x7b/0xa0
[   22.895119]  ? __pfx_kthread+0x10/0x10
[   22.895151]  ret_from_fork+0x41/0x80
[   22.895185]  ? __pfx_kthread+0x10/0x10
[   22.895251]  ret_from_fork_asm+0x1a/0x30
[   22.895316]  </TASK>
[   22.895334] 
[   22.910386] Allocated by task 286:
[   22.910784]  kasan_save_stack+0x45/0x70
[   22.911190]  kasan_save_track+0x18/0x40
[   22.911691]  kasan_save_alloc_info+0x3b/0x50
[   22.912122]  __kasan_kmalloc+0xb7/0xc0
[   22.912478]  __kmalloc_cache_noprof+0x189/0x420
[   22.912840]  kasan_atomics+0x95/0x310
[   22.913290]  kunit_try_run_case+0x1a5/0x480
[   22.913802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.914384]  kthread+0x337/0x6f0
[   22.914763]  ret_from_fork+0x41/0x80
[   22.915244]  ret_from_fork_asm+0x1a/0x30
[   22.915659] 
[   22.915901] The buggy address belongs to the object at ffff888102a2c100
[   22.915901]  which belongs to the cache kmalloc-64 of size 64
[   22.916675] The buggy address is located 0 bytes to the right of
[   22.916675]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.917820] 
[   22.918059] The buggy address belongs to the physical page:
[   22.918523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.919022] flags: 0x200000000000000(node=0|zone=2)
[   22.919565] page_type: f5(slab)
[   22.919995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.920742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.921404] page dumped because: kasan: bad access detected
[   22.921928] 
[   22.922155] Memory state around the buggy address:
[   22.922622]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.923109]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.923820] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.924480]                                      ^
[   22.925006]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.925668]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.926273] ==================================================================
[   21.384947] ==================================================================
[   21.385970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   21.386831] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.387530] 
[   21.387936] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.388057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.388098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.388154] Call Trace:
[   21.388207]  <TASK>
[   21.388252]  dump_stack_lvl+0x73/0xb0
[   21.388377]  print_report+0xd1/0x650
[   21.388457]  ? __virt_addr_valid+0x1db/0x2d0
[   21.388540]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.388752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.388836]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.388914]  kasan_report+0x141/0x180
[   21.388996]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.389087]  __asan_report_load4_noabort+0x18/0x20
[   21.389163]  kasan_atomics_helper+0x4b54/0x5450
[   21.389242]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.389362]  ? ret_from_fork_asm+0x1a/0x30
[   21.389451]  kasan_atomics+0x1dc/0x310
[   21.389523]  ? __pfx_kasan_atomics+0x10/0x10
[   21.389632]  ? __pfx_read_tsc+0x10/0x10
[   21.389807]  ? ktime_get_ts64+0x86/0x230
[   21.389894]  kunit_try_run_case+0x1a5/0x480
[   21.389974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.390044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.390119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.390160]  ? __kthread_parkme+0x82/0x180
[   21.390192]  ? preempt_count_sub+0x50/0x80
[   21.390229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.390268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.390304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.390339]  kthread+0x337/0x6f0
[   21.390364]  ? trace_preempt_on+0x20/0xc0
[   21.390400]  ? __pfx_kthread+0x10/0x10
[   21.390425]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.390458]  ? calculate_sigpending+0x7b/0xa0
[   21.390489]  ? __pfx_kthread+0x10/0x10
[   21.390515]  ret_from_fork+0x41/0x80
[   21.390547]  ? __pfx_kthread+0x10/0x10
[   21.390573]  ret_from_fork_asm+0x1a/0x30
[   21.390686]  </TASK>
[   21.390736] 
[   21.412154] Allocated by task 286:
[   21.412540]  kasan_save_stack+0x45/0x70
[   21.413261]  kasan_save_track+0x18/0x40
[   21.413787]  kasan_save_alloc_info+0x3b/0x50
[   21.414272]  __kasan_kmalloc+0xb7/0xc0
[   21.414737]  __kmalloc_cache_noprof+0x189/0x420
[   21.415256]  kasan_atomics+0x95/0x310
[   21.415679]  kunit_try_run_case+0x1a5/0x480
[   21.416142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.416666]  kthread+0x337/0x6f0
[   21.417025]  ret_from_fork+0x41/0x80
[   21.417446]  ret_from_fork_asm+0x1a/0x30
[   21.417901] 
[   21.418136] The buggy address belongs to the object at ffff888102a2c100
[   21.418136]  which belongs to the cache kmalloc-64 of size 64
[   21.419581] The buggy address is located 0 bytes to the right of
[   21.419581]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.421647] 
[   21.421840] The buggy address belongs to the physical page:
[   21.422438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.423666] flags: 0x200000000000000(node=0|zone=2)
[   21.424497] page_type: f5(slab)
[   21.424897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.425856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.426327] page dumped because: kasan: bad access detected
[   21.426870] 
[   21.427401] Memory state around the buggy address:
[   21.428129]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.429247]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.430076] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.430726]                                      ^
[   21.431513]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.432182]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.432951] ==================================================================
[   23.004295] ==================================================================
[   23.004785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   23.005861] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.006508] 
[   23.006765] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.006871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.006892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.006923] Call Trace:
[   23.006947]  <TASK>
[   23.006969]  dump_stack_lvl+0x73/0xb0
[   23.007049]  print_report+0xd1/0x650
[   23.007202]  ? __virt_addr_valid+0x1db/0x2d0
[   23.007323]  ? kasan_atomics_helper+0x177f/0x5450
[   23.007397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.007474]  ? kasan_atomics_helper+0x177f/0x5450
[   23.007547]  kasan_report+0x141/0x180
[   23.007644]  ? kasan_atomics_helper+0x177f/0x5450
[   23.007721]  kasan_check_range+0x10c/0x1c0
[   23.007754]  __kasan_check_write+0x18/0x20
[   23.007784]  kasan_atomics_helper+0x177f/0x5450
[   23.007819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.007854]  ? ret_from_fork_asm+0x1a/0x30
[   23.007893]  kasan_atomics+0x1dc/0x310
[   23.007924]  ? __pfx_kasan_atomics+0x10/0x10
[   23.007954]  ? __pfx_read_tsc+0x10/0x10
[   23.007983]  ? ktime_get_ts64+0x86/0x230
[   23.008019]  kunit_try_run_case+0x1a5/0x480
[   23.008056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.008090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.008127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.008161]  ? __kthread_parkme+0x82/0x180
[   23.008193]  ? preempt_count_sub+0x50/0x80
[   23.008270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.008311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.008346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.008381]  kthread+0x337/0x6f0
[   23.008406]  ? trace_preempt_on+0x20/0xc0
[   23.008441]  ? __pfx_kthread+0x10/0x10
[   23.008467]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.008499]  ? calculate_sigpending+0x7b/0xa0
[   23.008530]  ? __pfx_kthread+0x10/0x10
[   23.008555]  ret_from_fork+0x41/0x80
[   23.008587]  ? __pfx_kthread+0x10/0x10
[   23.008638]  ret_from_fork_asm+0x1a/0x30
[   23.008683]  </TASK>
[   23.008698] 
[   23.023988] Allocated by task 286:
[   23.024285]  kasan_save_stack+0x45/0x70
[   23.024597]  kasan_save_track+0x18/0x40
[   23.025026]  kasan_save_alloc_info+0x3b/0x50
[   23.025458]  __kasan_kmalloc+0xb7/0xc0
[   23.025887]  __kmalloc_cache_noprof+0x189/0x420
[   23.026344]  kasan_atomics+0x95/0x310
[   23.026842]  kunit_try_run_case+0x1a5/0x480
[   23.027358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.027894]  kthread+0x337/0x6f0
[   23.028183]  ret_from_fork+0x41/0x80
[   23.028538]  ret_from_fork_asm+0x1a/0x30
[   23.028994] 
[   23.029298] The buggy address belongs to the object at ffff888102a2c100
[   23.029298]  which belongs to the cache kmalloc-64 of size 64
[   23.030400] The buggy address is located 0 bytes to the right of
[   23.030400]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.031293] 
[   23.031478] The buggy address belongs to the physical page:
[   23.031949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.032680] flags: 0x200000000000000(node=0|zone=2)
[   23.033247] page_type: f5(slab)
[   23.033680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.034284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.034814] page dumped because: kasan: bad access detected
[   23.035409] 
[   23.035654] Memory state around the buggy address:
[   23.036148]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.036863]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.037418] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.038082]                                      ^
[   23.038645]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.039280]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.040004] ==================================================================
[   23.042937] ==================================================================
[   23.044277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   23.046053] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.047380] 
[   23.047664] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.047795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.047837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.047940] Call Trace:
[   23.047995]  <TASK>
[   23.048045]  dump_stack_lvl+0x73/0xb0
[   23.048125]  print_report+0xd1/0x650
[   23.048198]  ? __virt_addr_valid+0x1db/0x2d0
[   23.048272]  ? kasan_atomics_helper+0x1818/0x5450
[   23.048345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.048443]  ? kasan_atomics_helper+0x1818/0x5450
[   23.048500]  kasan_report+0x141/0x180
[   23.048538]  ? kasan_atomics_helper+0x1818/0x5450
[   23.048581]  kasan_check_range+0x10c/0x1c0
[   23.048636]  __kasan_check_write+0x18/0x20
[   23.048671]  kasan_atomics_helper+0x1818/0x5450
[   23.048706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.048742]  ? ret_from_fork_asm+0x1a/0x30
[   23.048782]  kasan_atomics+0x1dc/0x310
[   23.048811]  ? __pfx_kasan_atomics+0x10/0x10
[   23.048841]  ? __pfx_read_tsc+0x10/0x10
[   23.048872]  ? ktime_get_ts64+0x86/0x230
[   23.048912]  kunit_try_run_case+0x1a5/0x480
[   23.048950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.048985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.049023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.049060]  ? __kthread_parkme+0x82/0x180
[   23.049093]  ? preempt_count_sub+0x50/0x80
[   23.049133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.049169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.049209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.049274]  kthread+0x337/0x6f0
[   23.049303]  ? trace_preempt_on+0x20/0xc0
[   23.049341]  ? __pfx_kthread+0x10/0x10
[   23.049367]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.049400]  ? calculate_sigpending+0x7b/0xa0
[   23.049433]  ? __pfx_kthread+0x10/0x10
[   23.049460]  ret_from_fork+0x41/0x80
[   23.049493]  ? __pfx_kthread+0x10/0x10
[   23.049520]  ret_from_fork_asm+0x1a/0x30
[   23.049562]  </TASK>
[   23.049577] 
[   23.066712] Allocated by task 286:
[   23.067143]  kasan_save_stack+0x45/0x70
[   23.067656]  kasan_save_track+0x18/0x40
[   23.068039]  kasan_save_alloc_info+0x3b/0x50
[   23.068714]  __kasan_kmalloc+0xb7/0xc0
[   23.069182]  __kmalloc_cache_noprof+0x189/0x420
[   23.069767]  kasan_atomics+0x95/0x310
[   23.070183]  kunit_try_run_case+0x1a5/0x480
[   23.070761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.071419]  kthread+0x337/0x6f0
[   23.071786]  ret_from_fork+0x41/0x80
[   23.072288]  ret_from_fork_asm+0x1a/0x30
[   23.072790] 
[   23.073002] The buggy address belongs to the object at ffff888102a2c100
[   23.073002]  which belongs to the cache kmalloc-64 of size 64
[   23.074129] The buggy address is located 0 bytes to the right of
[   23.074129]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.075341] 
[   23.075580] The buggy address belongs to the physical page:
[   23.076082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.076757] flags: 0x200000000000000(node=0|zone=2)
[   23.077250] page_type: f5(slab)
[   23.077710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.078204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.078795] page dumped because: kasan: bad access detected
[   23.079366] 
[   23.079597] Memory state around the buggy address:
[   23.080152]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.080906]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.081578] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.082166]                                      ^
[   23.082546]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.083882]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.084457] ==================================================================
[   23.703453] ==================================================================
[   23.704136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   23.704728] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.705398] 
[   23.705681] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.705814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.705854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.705912] Call Trace:
[   23.705962]  <TASK>
[   23.706006]  dump_stack_lvl+0x73/0xb0
[   23.706085]  print_report+0xd1/0x650
[   23.706197]  ? __virt_addr_valid+0x1db/0x2d0
[   23.706279]  ? kasan_atomics_helper+0x20c8/0x5450
[   23.706355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.706432]  ? kasan_atomics_helper+0x20c8/0x5450
[   23.706502]  kasan_report+0x141/0x180
[   23.706583]  ? kasan_atomics_helper+0x20c8/0x5450
[   23.706720]  kasan_check_range+0x10c/0x1c0
[   23.706803]  __kasan_check_write+0x18/0x20
[   23.706879]  kasan_atomics_helper+0x20c8/0x5450
[   23.706959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.707036]  ? ret_from_fork_asm+0x1a/0x30
[   23.707107]  kasan_atomics+0x1dc/0x310
[   23.707141]  ? __pfx_kasan_atomics+0x10/0x10
[   23.707173]  ? __pfx_read_tsc+0x10/0x10
[   23.707204]  ? ktime_get_ts64+0x86/0x230
[   23.707272]  kunit_try_run_case+0x1a5/0x480
[   23.707315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.707351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.707388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.707423]  ? __kthread_parkme+0x82/0x180
[   23.707454]  ? preempt_count_sub+0x50/0x80
[   23.707492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.707530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.707564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.707599]  kthread+0x337/0x6f0
[   23.707652]  ? trace_preempt_on+0x20/0xc0
[   23.707689]  ? __pfx_kthread+0x10/0x10
[   23.707715]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.707749]  ? calculate_sigpending+0x7b/0xa0
[   23.707781]  ? __pfx_kthread+0x10/0x10
[   23.707809]  ret_from_fork+0x41/0x80
[   23.707841]  ? __pfx_kthread+0x10/0x10
[   23.707869]  ret_from_fork_asm+0x1a/0x30
[   23.707911]  </TASK>
[   23.707927] 
[   23.725631] Allocated by task 286:
[   23.725936]  kasan_save_stack+0x45/0x70
[   23.726429]  kasan_save_track+0x18/0x40
[   23.726927]  kasan_save_alloc_info+0x3b/0x50
[   23.727468]  __kasan_kmalloc+0xb7/0xc0
[   23.727928]  __kmalloc_cache_noprof+0x189/0x420
[   23.728441]  kasan_atomics+0x95/0x310
[   23.728882]  kunit_try_run_case+0x1a5/0x480
[   23.729326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.729917]  kthread+0x337/0x6f0
[   23.731122]  ret_from_fork+0x41/0x80
[   23.731532]  ret_from_fork_asm+0x1a/0x30
[   23.732060] 
[   23.732385] The buggy address belongs to the object at ffff888102a2c100
[   23.732385]  which belongs to the cache kmalloc-64 of size 64
[   23.733345] The buggy address is located 0 bytes to the right of
[   23.733345]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.734525] 
[   23.734921] The buggy address belongs to the physical page:
[   23.735534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.736330] flags: 0x200000000000000(node=0|zone=2)
[   23.736843] page_type: f5(slab)
[   23.737286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.738018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.738558] page dumped because: kasan: bad access detected
[   23.739168] 
[   23.739486] Memory state around the buggy address:
[   23.740020]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.740744]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.741478] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.742102]                                      ^
[   23.742688]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.743274]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.743860] ==================================================================
[   23.291412] ==================================================================
[   23.292233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   23.292971] Write of size 8 at addr ffff888102a2c130 by task kunit_try_catch/286
[   23.293688] 
[   23.294009] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   23.294420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.294462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.294553] Call Trace:
[   23.294621]  <TASK>
[   23.294665]  dump_stack_lvl+0x73/0xb0
[   23.294746]  print_report+0xd1/0x650
[   23.294865]  ? __virt_addr_valid+0x1db/0x2d0
[   23.294972]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.295050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.295129]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.295206]  kasan_report+0x141/0x180
[   23.295288]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.295377]  kasan_check_range+0x10c/0x1c0
[   23.295449]  __kasan_check_write+0x18/0x20
[   23.295518]  kasan_atomics_helper+0x1c18/0x5450
[   23.295594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.295691]  ? ret_from_fork_asm+0x1a/0x30
[   23.295776]  kasan_atomics+0x1dc/0x310
[   23.295836]  ? __pfx_kasan_atomics+0x10/0x10
[   23.295871]  ? __pfx_read_tsc+0x10/0x10
[   23.295900]  ? ktime_get_ts64+0x86/0x230
[   23.295941]  kunit_try_run_case+0x1a5/0x480
[   23.295980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.296016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.296054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.296091]  ? __kthread_parkme+0x82/0x180
[   23.296124]  ? preempt_count_sub+0x50/0x80
[   23.296161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.296199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.296265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.296304]  kthread+0x337/0x6f0
[   23.296329]  ? trace_preempt_on+0x20/0xc0
[   23.296365]  ? __pfx_kthread+0x10/0x10
[   23.296390]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.296422]  ? calculate_sigpending+0x7b/0xa0
[   23.296454]  ? __pfx_kthread+0x10/0x10
[   23.296482]  ret_from_fork+0x41/0x80
[   23.296514]  ? __pfx_kthread+0x10/0x10
[   23.296541]  ret_from_fork_asm+0x1a/0x30
[   23.296582]  </TASK>
[   23.296598] 
[   23.312075] Allocated by task 286:
[   23.312517]  kasan_save_stack+0x45/0x70
[   23.312964]  kasan_save_track+0x18/0x40
[   23.313404]  kasan_save_alloc_info+0x3b/0x50
[   23.313920]  __kasan_kmalloc+0xb7/0xc0
[   23.314431]  __kmalloc_cache_noprof+0x189/0x420
[   23.314908]  kasan_atomics+0x95/0x310
[   23.315250]  kunit_try_run_case+0x1a5/0x480
[   23.315725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.316383]  kthread+0x337/0x6f0
[   23.316808]  ret_from_fork+0x41/0x80
[   23.317204]  ret_from_fork_asm+0x1a/0x30
[   23.317595] 
[   23.317912] The buggy address belongs to the object at ffff888102a2c100
[   23.317912]  which belongs to the cache kmalloc-64 of size 64
[   23.318778] The buggy address is located 0 bytes to the right of
[   23.318778]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   23.319876] 
[   23.320128] The buggy address belongs to the physical page:
[   23.320705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   23.321419] flags: 0x200000000000000(node=0|zone=2)
[   23.321906] page_type: f5(slab)
[   23.322359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.323052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.323635] page dumped because: kasan: bad access detected
[   23.323997] 
[   23.324179] Memory state around the buggy address:
[   23.324739]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.325454]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.326135] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.326828]                                      ^
[   23.327159]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327817]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.328563] ==================================================================
[   22.477502] ==================================================================
[   22.479120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   22.480679] Read of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   22.482289] 
[   22.483126] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   22.483262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.483302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.483357] Call Trace:
[   22.483409]  <TASK>
[   22.483448]  dump_stack_lvl+0x73/0xb0
[   22.483488]  print_report+0xd1/0x650
[   22.483568]  ? __virt_addr_valid+0x1db/0x2d0
[   22.483639]  ? kasan_atomics_helper+0x4a02/0x5450
[   22.483683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.483719]  ? kasan_atomics_helper+0x4a02/0x5450
[   22.483752]  kasan_report+0x141/0x180
[   22.483788]  ? kasan_atomics_helper+0x4a02/0x5450
[   22.483830]  __asan_report_load4_noabort+0x18/0x20
[   22.483863]  kasan_atomics_helper+0x4a02/0x5450
[   22.483897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.483931]  ? ret_from_fork_asm+0x1a/0x30
[   22.483970]  kasan_atomics+0x1dc/0x310
[   22.483999]  ? __pfx_kasan_atomics+0x10/0x10
[   22.484029]  ? __pfx_read_tsc+0x10/0x10
[   22.484057]  ? ktime_get_ts64+0x86/0x230
[   22.484093]  kunit_try_run_case+0x1a5/0x480
[   22.484129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.484163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.484199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.484261]  ? __kthread_parkme+0x82/0x180
[   22.484297]  ? preempt_count_sub+0x50/0x80
[   22.484334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.484370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.484404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.484440]  kthread+0x337/0x6f0
[   22.484464]  ? trace_preempt_on+0x20/0xc0
[   22.484499]  ? __pfx_kthread+0x10/0x10
[   22.484523]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.484556]  ? calculate_sigpending+0x7b/0xa0
[   22.484587]  ? __pfx_kthread+0x10/0x10
[   22.484636]  ret_from_fork+0x41/0x80
[   22.484672]  ? __pfx_kthread+0x10/0x10
[   22.484697]  ret_from_fork_asm+0x1a/0x30
[   22.484739]  </TASK>
[   22.484754] 
[   22.501856] Allocated by task 286:
[   22.502320]  kasan_save_stack+0x45/0x70
[   22.502843]  kasan_save_track+0x18/0x40
[   22.503410]  kasan_save_alloc_info+0x3b/0x50
[   22.503946]  __kasan_kmalloc+0xb7/0xc0
[   22.504465]  __kmalloc_cache_noprof+0x189/0x420
[   22.505047]  kasan_atomics+0x95/0x310
[   22.505518]  kunit_try_run_case+0x1a5/0x480
[   22.506007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.506501]  kthread+0x337/0x6f0
[   22.506972]  ret_from_fork+0x41/0x80
[   22.507424]  ret_from_fork_asm+0x1a/0x30
[   22.507888] 
[   22.508123] The buggy address belongs to the object at ffff888102a2c100
[   22.508123]  which belongs to the cache kmalloc-64 of size 64
[   22.508940] The buggy address is located 0 bytes to the right of
[   22.508940]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   22.509783] 
[   22.510023] The buggy address belongs to the physical page:
[   22.510515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   22.511581] flags: 0x200000000000000(node=0|zone=2)
[   22.512249] page_type: f5(slab)
[   22.512673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.513249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.513843] page dumped because: kasan: bad access detected
[   22.514660] 
[   22.514981] Memory state around the buggy address:
[   22.515497]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.516137]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.516779] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.517368]                                      ^
[   22.517933]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.518647]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.519434] ==================================================================
[   21.828997] ==================================================================
[   21.829910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   21.831261] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.832413] 
[   21.832657] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.832724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.832743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.832773] Call Trace:
[   21.832792]  <TASK>
[   21.832809]  dump_stack_lvl+0x73/0xb0
[   21.832846]  print_report+0xd1/0x650
[   21.832883]  ? __virt_addr_valid+0x1db/0x2d0
[   21.832915]  ? kasan_atomics_helper+0x8f9/0x5450
[   21.832950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.832984]  ? kasan_atomics_helper+0x8f9/0x5450
[   21.833020]  kasan_report+0x141/0x180
[   21.833056]  ? kasan_atomics_helper+0x8f9/0x5450
[   21.833097]  kasan_check_range+0x10c/0x1c0
[   21.833128]  __kasan_check_write+0x18/0x20
[   21.833159]  kasan_atomics_helper+0x8f9/0x5450
[   21.833195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.833262]  ? ret_from_fork_asm+0x1a/0x30
[   21.833362]  kasan_atomics+0x1dc/0x310
[   21.833508]  ? __pfx_kasan_atomics+0x10/0x10
[   21.833592]  ? __pfx_read_tsc+0x10/0x10
[   21.833679]  ? ktime_get_ts64+0x86/0x230
[   21.833819]  kunit_try_run_case+0x1a5/0x480
[   21.833921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.833997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.834079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.834159]  ? __kthread_parkme+0x82/0x180
[   21.834256]  ? preempt_count_sub+0x50/0x80
[   21.834346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.834428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.834511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.834595]  kthread+0x337/0x6f0
[   21.834679]  ? trace_preempt_on+0x20/0xc0
[   21.834757]  ? __pfx_kthread+0x10/0x10
[   21.834824]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.834900]  ? calculate_sigpending+0x7b/0xa0
[   21.834974]  ? __pfx_kthread+0x10/0x10
[   21.835040]  ret_from_fork+0x41/0x80
[   21.835115]  ? __pfx_kthread+0x10/0x10
[   21.835149]  ret_from_fork_asm+0x1a/0x30
[   21.835193]  </TASK>
[   21.835211] 
[   21.850786] Allocated by task 286:
[   21.851158]  kasan_save_stack+0x45/0x70
[   21.851556]  kasan_save_track+0x18/0x40
[   21.851900]  kasan_save_alloc_info+0x3b/0x50
[   21.852409]  __kasan_kmalloc+0xb7/0xc0
[   21.853139]  __kmalloc_cache_noprof+0x189/0x420
[   21.854327]  kasan_atomics+0x95/0x310
[   21.855010]  kunit_try_run_case+0x1a5/0x480
[   21.855651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.856124]  kthread+0x337/0x6f0
[   21.856675]  ret_from_fork+0x41/0x80
[   21.857262]  ret_from_fork_asm+0x1a/0x30
[   21.857999] 
[   21.858271] The buggy address belongs to the object at ffff888102a2c100
[   21.858271]  which belongs to the cache kmalloc-64 of size 64
[   21.859468] The buggy address is located 0 bytes to the right of
[   21.859468]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.860726] 
[   21.860894] The buggy address belongs to the physical page:
[   21.861427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.862529] flags: 0x200000000000000(node=0|zone=2)
[   21.862944] page_type: f5(slab)
[   21.863363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.864053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.864989] page dumped because: kasan: bad access detected
[   21.865381] 
[   21.865629] Memory state around the buggy address:
[   21.866261]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.866981]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.867803] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.868353]                                      ^
[   21.868788]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869298]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869904] ==================================================================
[   21.533244] ==================================================================
[   21.534206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   21.534817] Write of size 4 at addr ffff888102a2c130 by task kunit_try_catch/286
[   21.535398] 
[   21.535785] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc1 #1 PREEMPT(voluntary) 
[   21.535917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.535958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.536017] Call Trace:
[   21.536071]  <TASK>
[   21.536122]  dump_stack_lvl+0x73/0xb0
[   21.536204]  print_report+0xd1/0x650
[   21.536329]  ? __virt_addr_valid+0x1db/0x2d0
[   21.536410]  ? kasan_atomics_helper+0x565/0x5450
[   21.536486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.536567]  ? kasan_atomics_helper+0x565/0x5450
[   21.536776]  kasan_report+0x141/0x180
[   21.536855]  ? kasan_atomics_helper+0x565/0x5450
[   21.536942]  kasan_check_range+0x10c/0x1c0
[   21.537022]  __kasan_check_write+0x18/0x20
[   21.537101]  kasan_atomics_helper+0x565/0x5450
[   21.537179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.537284]  ? ret_from_fork_asm+0x1a/0x30
[   21.537332]  kasan_atomics+0x1dc/0x310
[   21.537363]  ? __pfx_kasan_atomics+0x10/0x10
[   21.537394]  ? __pfx_read_tsc+0x10/0x10
[   21.537423]  ? ktime_get_ts64+0x86/0x230
[   21.537462]  kunit_try_run_case+0x1a5/0x480
[   21.537500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.537537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.537573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.537673]  ? __kthread_parkme+0x82/0x180
[   21.537748]  ? preempt_count_sub+0x50/0x80
[   21.537803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.537841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.537876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.537912]  kthread+0x337/0x6f0
[   21.537937]  ? trace_preempt_on+0x20/0xc0
[   21.537971]  ? __pfx_kthread+0x10/0x10
[   21.537996]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.538028]  ? calculate_sigpending+0x7b/0xa0
[   21.538058]  ? __pfx_kthread+0x10/0x10
[   21.538083]  ret_from_fork+0x41/0x80
[   21.538115]  ? __pfx_kthread+0x10/0x10
[   21.538140]  ret_from_fork_asm+0x1a/0x30
[   21.538182]  </TASK>
[   21.538197] 
[   21.559113] Allocated by task 286:
[   21.559896]  kasan_save_stack+0x45/0x70
[   21.560271]  kasan_save_track+0x18/0x40
[   21.560591]  kasan_save_alloc_info+0x3b/0x50
[   21.560966]  __kasan_kmalloc+0xb7/0xc0
[   21.561301]  __kmalloc_cache_noprof+0x189/0x420
[   21.562595]  kasan_atomics+0x95/0x310
[   21.563245]  kunit_try_run_case+0x1a5/0x480
[   21.564322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.564963]  kthread+0x337/0x6f0
[   21.565281]  ret_from_fork+0x41/0x80
[   21.565618]  ret_from_fork_asm+0x1a/0x30
[   21.565975] 
[   21.566138] The buggy address belongs to the object at ffff888102a2c100
[   21.566138]  which belongs to the cache kmalloc-64 of size 64
[   21.568319] The buggy address is located 0 bytes to the right of
[   21.568319]  allocated 48-byte region [ffff888102a2c100, ffff888102a2c130)
[   21.569630] 
[   21.569872] The buggy address belongs to the physical page:
[   21.570342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2c
[   21.571566] flags: 0x200000000000000(node=0|zone=2)
[   21.572143] page_type: f5(slab)
[   21.572452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.573723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.574383] page dumped because: kasan: bad access detected
[   21.574998] 
[   21.575193] Memory state around the buggy address:
[   21.575561]  ffff888102a2c000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.576220]  ffff888102a2c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.577123] >ffff888102a2c100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.578115]                                      ^
[   21.578847]  ffff888102a2c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.579470]  ffff888102a2c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.580744] ==================================================================