Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   49.379314] ==================================================================
[   49.386371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   49.393661] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.401040] 
[   49.402520] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.402566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.402583] Hardware name: WinLink E850-96 board (DT)
[   49.402602] Call trace:
[   49.402615]  show_stack+0x20/0x38 (C)
[   49.402645]  dump_stack_lvl+0x8c/0xd0
[   49.402677]  print_report+0x118/0x608
[   49.402706]  kasan_report+0xdc/0x128
[   49.402735]  kasan_check_range+0x100/0x1a8
[   49.402767]  __kasan_check_write+0x20/0x30
[   49.402800]  kasan_atomics_helper+0x894/0x4858
[   49.402827]  kasan_atomics+0x198/0x2e0
[   49.402854]  kunit_try_run_case+0x170/0x3f0
[   49.402885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.402924]  kthread+0x328/0x630
[   49.402957]  ret_from_fork+0x10/0x20
[   49.402986] 
[   49.472740] Allocated by task 314:
[   49.476127]  kasan_save_stack+0x3c/0x68
[   49.479944]  kasan_save_track+0x20/0x40
[   49.483764]  kasan_save_alloc_info+0x40/0x58
[   49.488018]  __kasan_kmalloc+0xd4/0xd8
[   49.491750]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.496264]  kasan_atomics+0xb8/0x2e0
[   49.499909]  kunit_try_run_case+0x170/0x3f0
[   49.504076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.509545]  kthread+0x328/0x630
[   49.512757]  ret_from_fork+0x10/0x20
[   49.516315] 
[   49.517791] The buggy address belongs to the object at ffff000803afab80
[   49.517791]  which belongs to the cache kmalloc-64 of size 64
[   49.530118] The buggy address is located 0 bytes to the right of
[   49.530118]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.542964] 
[   49.544440] The buggy address belongs to the physical page:
[   49.549996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.557982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.564492] page_type: f5(slab)
[   49.567624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.575349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.583068] page dumped because: kasan: bad access detected
[   49.588623] 
[   49.590099] Memory state around the buggy address:
[   49.594878]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.602082]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.609287] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.616488]                                      ^
[   49.621266]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.628470]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.635671] ==================================================================
[   47.269626] ==================================================================
[   47.276680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   47.283971] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.291349] 
[   47.292831] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.292878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.292894] Hardware name: WinLink E850-96 board (DT)
[   47.292913] Call trace:
[   47.292925]  show_stack+0x20/0x38 (C)
[   47.292956]  dump_stack_lvl+0x8c/0xd0
[   47.292990]  print_report+0x118/0x608
[   47.293019]  kasan_report+0xdc/0x128
[   47.293049]  kasan_check_range+0x100/0x1a8
[   47.293079]  __kasan_check_write+0x20/0x30
[   47.293111]  kasan_atomics_helper+0x4e4/0x4858
[   47.293138]  kasan_atomics+0x198/0x2e0
[   47.293167]  kunit_try_run_case+0x170/0x3f0
[   47.293200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.293237]  kthread+0x328/0x630
[   47.293268]  ret_from_fork+0x10/0x20
[   47.293296] 
[   47.363049] Allocated by task 314:
[   47.366435]  kasan_save_stack+0x3c/0x68
[   47.370254]  kasan_save_track+0x20/0x40
[   47.374073]  kasan_save_alloc_info+0x40/0x58
[   47.378327]  __kasan_kmalloc+0xd4/0xd8
[   47.382059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.386573]  kasan_atomics+0xb8/0x2e0
[   47.390219]  kunit_try_run_case+0x170/0x3f0
[   47.394386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.399854]  kthread+0x328/0x630
[   47.403066]  ret_from_fork+0x10/0x20
[   47.406625] 
[   47.408100] The buggy address belongs to the object at ffff000803afab80
[   47.408100]  which belongs to the cache kmalloc-64 of size 64
[   47.420427] The buggy address is located 0 bytes to the right of
[   47.420427]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.433274] 
[   47.434750] The buggy address belongs to the physical page:
[   47.440306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.448291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.454801] page_type: f5(slab)
[   47.457934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.465659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.473377] page dumped because: kasan: bad access detected
[   47.478933] 
[   47.480408] Memory state around the buggy address:
[   47.485188]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.492392]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.499596] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.506797]                                      ^
[   47.511575]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.518780]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.525982] ==================================================================
[   44.374859] ==================================================================
[   44.389056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   44.396429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.403719] 
[   44.405207] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.405265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.405284] Hardware name: WinLink E850-96 board (DT)
[   44.405306] Call trace:
[   44.405323]  show_stack+0x20/0x38 (C)
[   44.405357]  dump_stack_lvl+0x8c/0xd0
[   44.405395]  print_report+0x118/0x608
[   44.405430]  kasan_report+0xdc/0x128
[   44.405460]  __asan_report_load4_noabort+0x20/0x30
[   44.405496]  kasan_atomics_helper+0x40a8/0x4858
[   44.405529]  kasan_atomics+0x198/0x2e0
[   44.405556]  kunit_try_run_case+0x170/0x3f0
[   44.405594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.405634]  kthread+0x328/0x630
[   44.405669]  ret_from_fork+0x10/0x20
[   44.405706] 
[   44.472122] Allocated by task 314:
[   44.475510]  kasan_save_stack+0x3c/0x68
[   44.479325]  kasan_save_track+0x20/0x40
[   44.483145]  kasan_save_alloc_info+0x40/0x58
[   44.487398]  __kasan_kmalloc+0xd4/0xd8
[   44.491130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.495644]  kasan_atomics+0xb8/0x2e0
[   44.499291]  kunit_try_run_case+0x170/0x3f0
[   44.503456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.508925]  kthread+0x328/0x630
[   44.512137]  ret_from_fork+0x10/0x20
[   44.515696] 
[   44.517175] The buggy address belongs to the object at ffff000803afab80
[   44.517175]  which belongs to the cache kmalloc-64 of size 64
[   44.529502] The buggy address is located 0 bytes to the right of
[   44.529502]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   44.542345] 
[   44.543824] The buggy address belongs to the physical page:
[   44.549380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   44.557364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.563874] page_type: f5(slab)
[   44.567011] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.574730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.582451] page dumped because: kasan: bad access detected
[   44.588004] 
[   44.589479] Memory state around the buggy address:
[   44.594260]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.601464]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.608669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.615868]                                      ^
[   44.620648]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.627851]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.635054] ==================================================================
[   53.054767] ==================================================================
[   53.061836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.069127] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.076505] 
[   53.077985] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.078030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.078046] Hardware name: WinLink E850-96 board (DT)
[   53.078064] Call trace:
[   53.078076]  show_stack+0x20/0x38 (C)
[   53.078105]  dump_stack_lvl+0x8c/0xd0
[   53.078140]  print_report+0x118/0x608
[   53.078170]  kasan_report+0xdc/0x128
[   53.078198]  kasan_check_range+0x100/0x1a8
[   53.078231]  __kasan_check_write+0x20/0x30
[   53.078262]  kasan_atomics_helper+0xd3c/0x4858
[   53.078291]  kasan_atomics+0x198/0x2e0
[   53.078317]  kunit_try_run_case+0x170/0x3f0
[   53.078352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.078390]  kthread+0x328/0x630
[   53.078425]  ret_from_fork+0x10/0x20
[   53.078453] 
[   53.148205] Allocated by task 314:
[   53.151591]  kasan_save_stack+0x3c/0x68
[   53.155410]  kasan_save_track+0x20/0x40
[   53.159229]  kasan_save_alloc_info+0x40/0x58
[   53.163483]  __kasan_kmalloc+0xd4/0xd8
[   53.167215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.171729]  kasan_atomics+0xb8/0x2e0
[   53.175375]  kunit_try_run_case+0x170/0x3f0
[   53.179542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.185010]  kthread+0x328/0x630
[   53.188222]  ret_from_fork+0x10/0x20
[   53.191781] 
[   53.193257] The buggy address belongs to the object at ffff000803afab80
[   53.193257]  which belongs to the cache kmalloc-64 of size 64
[   53.205583] The buggy address is located 0 bytes to the right of
[   53.205583]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.218430] 
[   53.219906] The buggy address belongs to the physical page:
[   53.225462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.233447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.239958] page_type: f5(slab)
[   53.243090] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.250815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.258534] page dumped because: kasan: bad access detected
[   53.264089] 
[   53.265565] Memory state around the buggy address:
[   53.270346]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.277548]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.284753] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.291953]                                      ^
[   53.296731]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.303936]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.311139] ==================================================================
[   49.643032] ==================================================================
[   49.650086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   49.657460] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.664751] 
[   49.666233] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.666281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.666295] Hardware name: WinLink E850-96 board (DT)
[   49.666316] Call trace:
[   49.666328]  show_stack+0x20/0x38 (C)
[   49.666360]  dump_stack_lvl+0x8c/0xd0
[   49.666395]  print_report+0x118/0x608
[   49.666424]  kasan_report+0xdc/0x128
[   49.666451]  __asan_report_load4_noabort+0x20/0x30
[   49.666488]  kasan_atomics_helper+0x42d8/0x4858
[   49.666519]  kasan_atomics+0x198/0x2e0
[   49.666548]  kunit_try_run_case+0x170/0x3f0
[   49.666581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.666619]  kthread+0x328/0x630
[   49.666653]  ret_from_fork+0x10/0x20
[   49.666686] 
[   49.733153] Allocated by task 314:
[   49.736538]  kasan_save_stack+0x3c/0x68
[   49.740357]  kasan_save_track+0x20/0x40
[   49.744176]  kasan_save_alloc_info+0x40/0x58
[   49.748430]  __kasan_kmalloc+0xd4/0xd8
[   49.752163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.756676]  kasan_atomics+0xb8/0x2e0
[   49.760324]  kunit_try_run_case+0x170/0x3f0
[   49.764489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.769958]  kthread+0x328/0x630
[   49.773169]  ret_from_fork+0x10/0x20
[   49.776728] 
[   49.778205] The buggy address belongs to the object at ffff000803afab80
[   49.778205]  which belongs to the cache kmalloc-64 of size 64
[   49.790531] The buggy address is located 0 bytes to the right of
[   49.790531]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.803377] 
[   49.804853] The buggy address belongs to the physical page:
[   49.810410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.818394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.824905] page_type: f5(slab)
[   49.828040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.835762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.843482] page dumped because: kasan: bad access detected
[   49.849036] 
[   49.850512] Memory state around the buggy address:
[   49.855292]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.862495]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.869699] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.876900]                                      ^
[   49.881678]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.888883]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.896085] ==================================================================
[   51.222013] ==================================================================
[   51.229052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   51.236429] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.243720] 
[   51.245200] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.245244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.245261] Hardware name: WinLink E850-96 board (DT)
[   51.245278] Call trace:
[   51.245292]  show_stack+0x20/0x38 (C)
[   51.245322]  dump_stack_lvl+0x8c/0xd0
[   51.245354]  print_report+0x118/0x608
[   51.245383]  kasan_report+0xdc/0x128
[   51.245411]  __asan_report_load4_noabort+0x20/0x30
[   51.245444]  kasan_atomics_helper+0x3dcc/0x4858
[   51.245474]  kasan_atomics+0x198/0x2e0
[   51.245502]  kunit_try_run_case+0x170/0x3f0
[   51.245537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.245574]  kthread+0x328/0x630
[   51.245606]  ret_from_fork+0x10/0x20
[   51.245635] 
[   51.312122] Allocated by task 314:
[   51.315507]  kasan_save_stack+0x3c/0x68
[   51.319326]  kasan_save_track+0x20/0x40
[   51.323146]  kasan_save_alloc_info+0x40/0x58
[   51.327399]  __kasan_kmalloc+0xd4/0xd8
[   51.331132]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.335646]  kasan_atomics+0xb8/0x2e0
[   51.339292]  kunit_try_run_case+0x170/0x3f0
[   51.343458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.348927]  kthread+0x328/0x630
[   51.352139]  ret_from_fork+0x10/0x20
[   51.355697] 
[   51.357173] The buggy address belongs to the object at ffff000803afab80
[   51.357173]  which belongs to the cache kmalloc-64 of size 64
[   51.369500] The buggy address is located 0 bytes to the right of
[   51.369500]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.382347] 
[   51.383822] The buggy address belongs to the physical page:
[   51.389378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.397364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.403874] page_type: f5(slab)
[   51.407007] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.414731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.422450] page dumped because: kasan: bad access detected
[   51.428005] 
[   51.429481] Memory state around the buggy address:
[   51.434259]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.441464]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.448669] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.455870]                                      ^
[   51.460647]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.467853]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.475055] ==================================================================
[   54.102879] ==================================================================
[   54.109913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   54.117202] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.124580] 
[   54.126059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.126107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.126122] Hardware name: WinLink E850-96 board (DT)
[   54.126141] Call trace:
[   54.126153]  show_stack+0x20/0x38 (C)
[   54.126184]  dump_stack_lvl+0x8c/0xd0
[   54.126219]  print_report+0x118/0x608
[   54.126247]  kasan_report+0xdc/0x128
[   54.126277]  kasan_check_range+0x100/0x1a8
[   54.126308]  __kasan_check_write+0x20/0x30
[   54.126338]  kasan_atomics_helper+0xe44/0x4858
[   54.126367]  kasan_atomics+0x198/0x2e0
[   54.126394]  kunit_try_run_case+0x170/0x3f0
[   54.126427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.126465]  kthread+0x328/0x630
[   54.126497]  ret_from_fork+0x10/0x20
[   54.126528] 
[   54.196280] Allocated by task 314:
[   54.199665]  kasan_save_stack+0x3c/0x68
[   54.203485]  kasan_save_track+0x20/0x40
[   54.207304]  kasan_save_alloc_info+0x40/0x58
[   54.211557]  __kasan_kmalloc+0xd4/0xd8
[   54.215290]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.219804]  kasan_atomics+0xb8/0x2e0
[   54.223450]  kunit_try_run_case+0x170/0x3f0
[   54.227616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.233085]  kthread+0x328/0x630
[   54.236297]  ret_from_fork+0x10/0x20
[   54.239856] 
[   54.241331] The buggy address belongs to the object at ffff000803afab80
[   54.241331]  which belongs to the cache kmalloc-64 of size 64
[   54.253658] The buggy address is located 0 bytes to the right of
[   54.253658]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.266504] 
[   54.267981] The buggy address belongs to the physical page:
[   54.273536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.281522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.288032] page_type: f5(slab)
[   54.291165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.298889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.306608] page dumped because: kasan: bad access detected
[   54.312163] 
[   54.313639] Memory state around the buggy address:
[   54.318419]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.325622]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.332827] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.340028]                                      ^
[   54.344806]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.352011]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.359212] ==================================================================
[   57.001433] ==================================================================
[   57.008479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   57.015856] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.023234] 
[   57.024714] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.024759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.024773] Hardware name: WinLink E850-96 board (DT)
[   57.024791] Call trace:
[   57.024804]  show_stack+0x20/0x38 (C)
[   57.024834]  dump_stack_lvl+0x8c/0xd0
[   57.024867]  print_report+0x118/0x608
[   57.024895]  kasan_report+0xdc/0x128
[   57.024924]  kasan_check_range+0x100/0x1a8
[   57.024955]  __kasan_check_write+0x20/0x30
[   57.024987]  kasan_atomics_helper+0x126c/0x4858
[   57.025018]  kasan_atomics+0x198/0x2e0
[   57.025046]  kunit_try_run_case+0x170/0x3f0
[   57.025080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.025118]  kthread+0x328/0x630
[   57.025150]  ret_from_fork+0x10/0x20
[   57.025181] 
[   57.095021] Allocated by task 314:
[   57.098406]  kasan_save_stack+0x3c/0x68
[   57.102226]  kasan_save_track+0x20/0x40
[   57.106045]  kasan_save_alloc_info+0x40/0x58
[   57.110299]  __kasan_kmalloc+0xd4/0xd8
[   57.114031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.118545]  kasan_atomics+0xb8/0x2e0
[   57.122191]  kunit_try_run_case+0x170/0x3f0
[   57.126357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.131826]  kthread+0x328/0x630
[   57.135038]  ret_from_fork+0x10/0x20
[   57.138597] 
[   57.140072] The buggy address belongs to the object at ffff000803afab80
[   57.140072]  which belongs to the cache kmalloc-64 of size 64
[   57.152399] The buggy address is located 0 bytes to the right of
[   57.152399]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.165246] 
[   57.166722] The buggy address belongs to the physical page:
[   57.172278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.180263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.186773] page_type: f5(slab)
[   57.189906] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.197631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.205349] page dumped because: kasan: bad access detected
[   57.210905] 
[   57.212380] Memory state around the buggy address:
[   57.217160]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.224363]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.231568] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.238769]                                      ^
[   57.243547]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.250752]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.257953] ==================================================================
[   44.642448] ==================================================================
[   44.649468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   44.656840] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.664218] 
[   44.665704] CPU: 2 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.665760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.665778] Hardware name: WinLink E850-96 board (DT)
[   44.665797] Call trace:
[   44.665811]  show_stack+0x20/0x38 (C)
[   44.665843]  dump_stack_lvl+0x8c/0xd0
[   44.665882]  print_report+0x118/0x608
[   44.665913]  kasan_report+0xdc/0x128
[   44.665940]  __asan_report_store4_noabort+0x20/0x30
[   44.665977]  kasan_atomics_helper+0x3f7c/0x4858
[   44.666007]  kasan_atomics+0x198/0x2e0
[   44.666033]  kunit_try_run_case+0x170/0x3f0
[   44.666070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.666108]  kthread+0x328/0x630
[   44.666140]  ret_from_fork+0x10/0x20
[   44.666175] 
[   44.732707] Allocated by task 314:
[   44.736095]  kasan_save_stack+0x3c/0x68
[   44.739912]  kasan_save_track+0x20/0x40
[   44.743731]  kasan_save_alloc_info+0x40/0x58
[   44.747984]  __kasan_kmalloc+0xd4/0xd8
[   44.751717]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.756231]  kasan_atomics+0xb8/0x2e0
[   44.759877]  kunit_try_run_case+0x170/0x3f0
[   44.764043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.769512]  kthread+0x328/0x630
[   44.772723]  ret_from_fork+0x10/0x20
[   44.776282] 
[   44.777761] The buggy address belongs to the object at ffff000803afab80
[   44.777761]  which belongs to the cache kmalloc-64 of size 64
[   44.790085] The buggy address is located 0 bytes to the right of
[   44.790085]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   44.802931] 
[   44.804411] The buggy address belongs to the physical page:
[   44.809967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   44.817951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.824460] page_type: f5(slab)
[   44.827595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.835316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.843035] page dumped because: kasan: bad access detected
[   44.848590] 
[   44.850066] Memory state around the buggy address:
[   44.854846]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.862049]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.869255] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   44.876455]                                      ^
[   44.881234]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.888439]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.895640] ==================================================================
[   46.742171] ==================================================================
[   46.749258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   46.756548] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.763926] 
[   46.765409] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.765456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.765471] Hardware name: WinLink E850-96 board (DT)
[   46.765489] Call trace:
[   46.765502]  show_stack+0x20/0x38 (C)
[   46.765536]  dump_stack_lvl+0x8c/0xd0
[   46.765570]  print_report+0x118/0x608
[   46.765600]  kasan_report+0xdc/0x128
[   46.765628]  kasan_check_range+0x100/0x1a8
[   46.765659]  __kasan_check_write+0x20/0x30
[   46.765692]  kasan_atomics_helper+0x414/0x4858
[   46.765720]  kasan_atomics+0x198/0x2e0
[   46.765747]  kunit_try_run_case+0x170/0x3f0
[   46.765783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.765820]  kthread+0x328/0x630
[   46.765853]  ret_from_fork+0x10/0x20
[   46.765887] 
[   46.835626] Allocated by task 314:
[   46.839012]  kasan_save_stack+0x3c/0x68
[   46.842832]  kasan_save_track+0x20/0x40
[   46.846651]  kasan_save_alloc_info+0x40/0x58
[   46.850904]  __kasan_kmalloc+0xd4/0xd8
[   46.854637]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.859151]  kasan_atomics+0xb8/0x2e0
[   46.862796]  kunit_try_run_case+0x170/0x3f0
[   46.866963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.872432]  kthread+0x328/0x630
[   46.875643]  ret_from_fork+0x10/0x20
[   46.879202] 
[   46.880678] The buggy address belongs to the object at ffff000803afab80
[   46.880678]  which belongs to the cache kmalloc-64 of size 64
[   46.893005] The buggy address is located 0 bytes to the right of
[   46.893005]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.905851] 
[   46.907327] The buggy address belongs to the physical page:
[   46.912883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.920869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.927379] page_type: f5(slab)
[   46.930513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.938236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.945955] page dumped because: kasan: bad access detected
[   46.951510] 
[   46.952986] Memory state around the buggy address:
[   46.957764]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.964969]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.972174] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.979374]                                      ^
[   46.984152]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.991357]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.998560] ==================================================================
[   48.588171] ==================================================================
[   48.595237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   48.602527] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.609906] 
[   48.611387] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.611435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.611453] Hardware name: WinLink E850-96 board (DT)
[   48.611471] Call trace:
[   48.611482]  show_stack+0x20/0x38 (C)
[   48.611512]  dump_stack_lvl+0x8c/0xd0
[   48.611545]  print_report+0x118/0x608
[   48.611573]  kasan_report+0xdc/0x128
[   48.611603]  kasan_check_range+0x100/0x1a8
[   48.611635]  __kasan_check_write+0x20/0x30
[   48.611667]  kasan_atomics_helper+0x6ec/0x4858
[   48.611698]  kasan_atomics+0x198/0x2e0
[   48.611724]  kunit_try_run_case+0x170/0x3f0
[   48.611758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.611797]  kthread+0x328/0x630
[   48.611827]  ret_from_fork+0x10/0x20
[   48.611858] 
[   48.681606] Allocated by task 314:
[   48.684991]  kasan_save_stack+0x3c/0x68
[   48.688810]  kasan_save_track+0x20/0x40
[   48.692630]  kasan_save_alloc_info+0x40/0x58
[   48.696883]  __kasan_kmalloc+0xd4/0xd8
[   48.700616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.705130]  kasan_atomics+0xb8/0x2e0
[   48.708775]  kunit_try_run_case+0x170/0x3f0
[   48.712942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.718411]  kthread+0x328/0x630
[   48.721623]  ret_from_fork+0x10/0x20
[   48.725182] 
[   48.726657] The buggy address belongs to the object at ffff000803afab80
[   48.726657]  which belongs to the cache kmalloc-64 of size 64
[   48.738984] The buggy address is located 0 bytes to the right of
[   48.738984]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.751830] 
[   48.753307] The buggy address belongs to the physical page:
[   48.758862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.766848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.773358] page_type: f5(slab)
[   48.776492] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.784215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.791934] page dumped because: kasan: bad access detected
[   48.797489] 
[   48.798965] Memory state around the buggy address:
[   48.803743]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.810948]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.818153] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.825354]                                      ^
[   48.830131]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.837336]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.844537] ==================================================================
[   48.851889] ==================================================================
[   48.858949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   48.866239] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.873617] 
[   48.875099] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.875148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.875166] Hardware name: WinLink E850-96 board (DT)
[   48.875186] Call trace:
[   48.875201]  show_stack+0x20/0x38 (C)
[   48.875231]  dump_stack_lvl+0x8c/0xd0
[   48.875265]  print_report+0x118/0x608
[   48.875293]  kasan_report+0xdc/0x128
[   48.875322]  kasan_check_range+0x100/0x1a8
[   48.875353]  __kasan_check_write+0x20/0x30
[   48.875385]  kasan_atomics_helper+0x760/0x4858
[   48.875413]  kasan_atomics+0x198/0x2e0
[   48.875439]  kunit_try_run_case+0x170/0x3f0
[   48.875473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.875512]  kthread+0x328/0x630
[   48.875543]  ret_from_fork+0x10/0x20
[   48.875572] 
[   48.945318] Allocated by task 314:
[   48.948704]  kasan_save_stack+0x3c/0x68
[   48.952522]  kasan_save_track+0x20/0x40
[   48.956341]  kasan_save_alloc_info+0x40/0x58
[   48.960595]  __kasan_kmalloc+0xd4/0xd8
[   48.964327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.968841]  kasan_atomics+0xb8/0x2e0
[   48.972487]  kunit_try_run_case+0x170/0x3f0
[   48.976653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.982122]  kthread+0x328/0x630
[   48.985334]  ret_from_fork+0x10/0x20
[   48.988893] 
[   48.990368] The buggy address belongs to the object at ffff000803afab80
[   48.990368]  which belongs to the cache kmalloc-64 of size 64
[   49.002695] The buggy address is located 0 bytes to the right of
[   49.002695]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.015542] 
[   49.017018] The buggy address belongs to the physical page:
[   49.022573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.030559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.037069] page_type: f5(slab)
[   49.040202] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.047927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.055645] page dumped because: kasan: bad access detected
[   49.061200] 
[   49.062676] Memory state around the buggy address:
[   49.067457]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.074659]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.081864] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.089065]                                      ^
[   49.093843]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.101048]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.108250] ==================================================================
[   55.681994] ==================================================================
[   55.689054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   55.696431] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.703809] 
[   55.705289] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.705335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.705353] Hardware name: WinLink E850-96 board (DT)
[   55.705371] Call trace:
[   55.705383]  show_stack+0x20/0x38 (C)
[   55.705414]  dump_stack_lvl+0x8c/0xd0
[   55.705449]  print_report+0x118/0x608
[   55.705478]  kasan_report+0xdc/0x128
[   55.705506]  kasan_check_range+0x100/0x1a8
[   55.705535]  __kasan_check_write+0x20/0x30
[   55.705567]  kasan_atomics_helper+0x1058/0x4858
[   55.705596]  kasan_atomics+0x198/0x2e0
[   55.705624]  kunit_try_run_case+0x170/0x3f0
[   55.705657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.705694]  kthread+0x328/0x630
[   55.705727]  ret_from_fork+0x10/0x20
[   55.705758] 
[   55.775597] Allocated by task 314:
[   55.778982]  kasan_save_stack+0x3c/0x68
[   55.782801]  kasan_save_track+0x20/0x40
[   55.786621]  kasan_save_alloc_info+0x40/0x58
[   55.790874]  __kasan_kmalloc+0xd4/0xd8
[   55.794607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.799120]  kasan_atomics+0xb8/0x2e0
[   55.802766]  kunit_try_run_case+0x170/0x3f0
[   55.806933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.812401]  kthread+0x328/0x630
[   55.815613]  ret_from_fork+0x10/0x20
[   55.819172] 
[   55.820647] The buggy address belongs to the object at ffff000803afab80
[   55.820647]  which belongs to the cache kmalloc-64 of size 64
[   55.832975] The buggy address is located 0 bytes to the right of
[   55.832975]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.845821] 
[   55.847297] The buggy address belongs to the physical page:
[   55.852853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.860838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.867349] page_type: f5(slab)
[   55.870482] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.878206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.885925] page dumped because: kasan: bad access detected
[   55.891480] 
[   55.892955] Memory state around the buggy address:
[   55.897734]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.904939]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.912143] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.919344]                                      ^
[   55.924122]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.931327]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.938528] ==================================================================
[   58.845138] ==================================================================
[   58.852201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   58.859578] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.866956] 
[   58.868436] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.868482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.868499] Hardware name: WinLink E850-96 board (DT)
[   58.868519] Call trace:
[   58.868530]  show_stack+0x20/0x38 (C)
[   58.868560]  dump_stack_lvl+0x8c/0xd0
[   58.868593]  print_report+0x118/0x608
[   58.868622]  kasan_report+0xdc/0x128
[   58.868652]  kasan_check_range+0x100/0x1a8
[   58.868682]  __kasan_check_write+0x20/0x30
[   58.868714]  kasan_atomics_helper+0x154c/0x4858
[   58.868746]  kasan_atomics+0x198/0x2e0
[   58.868773]  kunit_try_run_case+0x170/0x3f0
[   58.868809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.868847]  kthread+0x328/0x630
[   58.868878]  ret_from_fork+0x10/0x20
[   58.868908] 
[   58.938743] Allocated by task 314:
[   58.942129]  kasan_save_stack+0x3c/0x68
[   58.945948]  kasan_save_track+0x20/0x40
[   58.949767]  kasan_save_alloc_info+0x40/0x58
[   58.954021]  __kasan_kmalloc+0xd4/0xd8
[   58.957754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.962267]  kasan_atomics+0xb8/0x2e0
[   58.965913]  kunit_try_run_case+0x170/0x3f0
[   58.970080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.975549]  kthread+0x328/0x630
[   58.978760]  ret_from_fork+0x10/0x20
[   58.982319] 
[   58.983795] The buggy address belongs to the object at ffff000803afab80
[   58.983795]  which belongs to the cache kmalloc-64 of size 64
[   58.996122] The buggy address is located 0 bytes to the right of
[   58.996122]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.008968] 
[   59.010444] The buggy address belongs to the physical page:
[   59.016001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.023985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.030496] page_type: f5(slab)
[   59.033629] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.041353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.049072] page dumped because: kasan: bad access detected
[   59.054627] 
[   59.056103] Memory state around the buggy address:
[   59.060882]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.068086]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.075291] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.082491]                                      ^
[   59.087269]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.094474]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.101676] ==================================================================
[   58.317374] ==================================================================
[   58.324431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   58.331809] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.339187] 
[   58.340666] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.340712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.340728] Hardware name: WinLink E850-96 board (DT)
[   58.340746] Call trace:
[   58.340759]  show_stack+0x20/0x38 (C)
[   58.340788]  dump_stack_lvl+0x8c/0xd0
[   58.340821]  print_report+0x118/0x608
[   58.340851]  kasan_report+0xdc/0x128
[   58.340880]  kasan_check_range+0x100/0x1a8
[   58.340911]  __kasan_check_write+0x20/0x30
[   58.340942]  kasan_atomics_helper+0x147c/0x4858
[   58.340971]  kasan_atomics+0x198/0x2e0
[   58.340997]  kunit_try_run_case+0x170/0x3f0
[   58.341033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.341070]  kthread+0x328/0x630
[   58.341102]  ret_from_fork+0x10/0x20
[   58.341134] 
[   58.410974] Allocated by task 314:
[   58.414359]  kasan_save_stack+0x3c/0x68
[   58.418179]  kasan_save_track+0x20/0x40
[   58.421998]  kasan_save_alloc_info+0x40/0x58
[   58.426251]  __kasan_kmalloc+0xd4/0xd8
[   58.429984]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.434497]  kasan_atomics+0xb8/0x2e0
[   58.438143]  kunit_try_run_case+0x170/0x3f0
[   58.442310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.447779]  kthread+0x328/0x630
[   58.450990]  ret_from_fork+0x10/0x20
[   58.454550] 
[   58.456025] The buggy address belongs to the object at ffff000803afab80
[   58.456025]  which belongs to the cache kmalloc-64 of size 64
[   58.468352] The buggy address is located 0 bytes to the right of
[   58.468352]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.481198] 
[   58.482674] The buggy address belongs to the physical page:
[   58.488230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.496216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.502725] page_type: f5(slab)
[   58.505860] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.513583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.521302] page dumped because: kasan: bad access detected
[   58.526857] 
[   58.528333] Memory state around the buggy address:
[   58.533112]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.540316]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.547521] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.554721]                                      ^
[   58.559499]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.566704]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.573905] ==================================================================
[   45.166488] ==================================================================
[   45.173591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   45.180877] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.188255] 
[   45.189742] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.189794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.189808] Hardware name: WinLink E850-96 board (DT)
[   45.189828] Call trace:
[   45.189839]  show_stack+0x20/0x38 (C)
[   45.189872]  dump_stack_lvl+0x8c/0xd0
[   45.189908]  print_report+0x118/0x608
[   45.189938]  kasan_report+0xdc/0x128
[   45.189968]  kasan_check_range+0x100/0x1a8
[   45.190000]  __kasan_check_write+0x20/0x30
[   45.190033]  kasan_atomics_helper+0x24c/0x4858
[   45.190061]  kasan_atomics+0x198/0x2e0
[   45.190090]  kunit_try_run_case+0x170/0x3f0
[   45.190124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.190163]  kthread+0x328/0x630
[   45.190197]  ret_from_fork+0x10/0x20
[   45.190231] 
[   45.259955] Allocated by task 314:
[   45.263341]  kasan_save_stack+0x3c/0x68
[   45.267161]  kasan_save_track+0x20/0x40
[   45.270980]  kasan_save_alloc_info+0x40/0x58
[   45.275233]  __kasan_kmalloc+0xd4/0xd8
[   45.278966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.283480]  kasan_atomics+0xb8/0x2e0
[   45.287125]  kunit_try_run_case+0x170/0x3f0
[   45.291292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.296761]  kthread+0x328/0x630
[   45.299972]  ret_from_fork+0x10/0x20
[   45.303532] 
[   45.305007] The buggy address belongs to the object at ffff000803afab80
[   45.305007]  which belongs to the cache kmalloc-64 of size 64
[   45.317333] The buggy address is located 0 bytes to the right of
[   45.317333]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.330181] 
[   45.331656] The buggy address belongs to the physical page:
[   45.337215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.345198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.351708] page_type: f5(slab)
[   45.354842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.362565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.370284] page dumped because: kasan: bad access detected
[   45.375839] 
[   45.377315] Memory state around the buggy address:
[   45.382096]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.389298]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.396504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.403704]                                      ^
[   45.408482]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.415687]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.422889] ==================================================================
[   51.482375] ==================================================================
[   51.489466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   51.496755] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.504133] 
[   51.505613] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.505659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.505674] Hardware name: WinLink E850-96 board (DT)
[   51.505695] Call trace:
[   51.505706]  show_stack+0x20/0x38 (C)
[   51.505736]  dump_stack_lvl+0x8c/0xd0
[   51.505769]  print_report+0x118/0x608
[   51.505799]  kasan_report+0xdc/0x128
[   51.505828]  kasan_check_range+0x100/0x1a8
[   51.505860]  __kasan_check_write+0x20/0x30
[   51.505891]  kasan_atomics_helper+0xb70/0x4858
[   51.505922]  kasan_atomics+0x198/0x2e0
[   51.505948]  kunit_try_run_case+0x170/0x3f0
[   51.505981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.506020]  kthread+0x328/0x630
[   51.506053]  ret_from_fork+0x10/0x20
[   51.506082] 
[   51.575833] Allocated by task 314:
[   51.579219]  kasan_save_stack+0x3c/0x68
[   51.583038]  kasan_save_track+0x20/0x40
[   51.586857]  kasan_save_alloc_info+0x40/0x58
[   51.591111]  __kasan_kmalloc+0xd4/0xd8
[   51.594843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.599357]  kasan_atomics+0xb8/0x2e0
[   51.603003]  kunit_try_run_case+0x170/0x3f0
[   51.607170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.612638]  kthread+0x328/0x630
[   51.615850]  ret_from_fork+0x10/0x20
[   51.619409] 
[   51.620884] The buggy address belongs to the object at ffff000803afab80
[   51.620884]  which belongs to the cache kmalloc-64 of size 64
[   51.633211] The buggy address is located 0 bytes to the right of
[   51.633211]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.646058] 
[   51.647534] The buggy address belongs to the physical page:
[   51.653089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.661075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.667585] page_type: f5(slab)
[   51.670718] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.678442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.686161] page dumped because: kasan: bad access detected
[   51.691717] 
[   51.693192] Memory state around the buggy address:
[   51.697971]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.705175]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.712380] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.719581]                                      ^
[   51.724359]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.731564]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.738765] ==================================================================
[   52.006545] ==================================================================
[   52.013590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   52.020879] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.028257] 
[   52.029739] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.029785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.029802] Hardware name: WinLink E850-96 board (DT)
[   52.029818] Call trace:
[   52.029830]  show_stack+0x20/0x38 (C)
[   52.029860]  dump_stack_lvl+0x8c/0xd0
[   52.029893]  print_report+0x118/0x608
[   52.029923]  kasan_report+0xdc/0x128
[   52.029952]  kasan_check_range+0x100/0x1a8
[   52.029982]  __kasan_check_write+0x20/0x30
[   52.030016]  kasan_atomics_helper+0xc08/0x4858
[   52.030046]  kasan_atomics+0x198/0x2e0
[   52.030074]  kunit_try_run_case+0x170/0x3f0
[   52.030108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.030146]  kthread+0x328/0x630
[   52.030180]  ret_from_fork+0x10/0x20
[   52.030211] 
[   52.099957] Allocated by task 314:
[   52.103343]  kasan_save_stack+0x3c/0x68
[   52.107162]  kasan_save_track+0x20/0x40
[   52.110981]  kasan_save_alloc_info+0x40/0x58
[   52.115235]  __kasan_kmalloc+0xd4/0xd8
[   52.118967]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.123481]  kasan_atomics+0xb8/0x2e0
[   52.127127]  kunit_try_run_case+0x170/0x3f0
[   52.131294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.136762]  kthread+0x328/0x630
[   52.139974]  ret_from_fork+0x10/0x20
[   52.143533] 
[   52.145010] The buggy address belongs to the object at ffff000803afab80
[   52.145010]  which belongs to the cache kmalloc-64 of size 64
[   52.157335] The buggy address is located 0 bytes to the right of
[   52.157335]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.170182] 
[   52.171658] The buggy address belongs to the physical page:
[   52.177213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.185199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.191710] page_type: f5(slab)
[   52.194842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.202567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.210285] page dumped because: kasan: bad access detected
[   52.215841] 
[   52.217316] Memory state around the buggy address:
[   52.222097]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.229300]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.236504] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.243705]                                      ^
[   52.248483]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.255688]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.262889] ==================================================================
[   53.318454] ==================================================================
[   53.325548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.332925] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.340216] 
[   53.341697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.341743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.341761] Hardware name: WinLink E850-96 board (DT)
[   53.341779] Call trace:
[   53.341793]  show_stack+0x20/0x38 (C)
[   53.341825]  dump_stack_lvl+0x8c/0xd0
[   53.341858]  print_report+0x118/0x608
[   53.341886]  kasan_report+0xdc/0x128
[   53.341915]  __asan_report_load4_noabort+0x20/0x30
[   53.341949]  kasan_atomics_helper+0x3e04/0x4858
[   53.341980]  kasan_atomics+0x198/0x2e0
[   53.342007]  kunit_try_run_case+0x170/0x3f0
[   53.342041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.342079]  kthread+0x328/0x630
[   53.342110]  ret_from_fork+0x10/0x20
[   53.342140] 
[   53.408618] Allocated by task 314:
[   53.412004]  kasan_save_stack+0x3c/0x68
[   53.415823]  kasan_save_track+0x20/0x40
[   53.419642]  kasan_save_alloc_info+0x40/0x58
[   53.423896]  __kasan_kmalloc+0xd4/0xd8
[   53.427628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.432142]  kasan_atomics+0xb8/0x2e0
[   53.435788]  kunit_try_run_case+0x170/0x3f0
[   53.439955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.445423]  kthread+0x328/0x630
[   53.448635]  ret_from_fork+0x10/0x20
[   53.452194] 
[   53.453669] The buggy address belongs to the object at ffff000803afab80
[   53.453669]  which belongs to the cache kmalloc-64 of size 64
[   53.465996] The buggy address is located 0 bytes to the right of
[   53.465996]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.478843] 
[   53.480319] The buggy address belongs to the physical page:
[   53.485875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.493860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.500370] page_type: f5(slab)
[   53.503503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.511227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.518946] page dumped because: kasan: bad access detected
[   53.524502] 
[   53.525977] Memory state around the buggy address:
[   53.530755]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.537960]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.545165] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.552366]                                      ^
[   53.557144]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.564349]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.571550] ==================================================================
[   54.890853] ==================================================================
[   54.897922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   54.905210] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.912589] 
[   54.914069] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.914116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.914132] Hardware name: WinLink E850-96 board (DT)
[   54.914150] Call trace:
[   54.914160]  show_stack+0x20/0x38 (C)
[   54.914189]  dump_stack_lvl+0x8c/0xd0
[   54.914222]  print_report+0x118/0x608
[   54.914251]  kasan_report+0xdc/0x128
[   54.914280]  kasan_check_range+0x100/0x1a8
[   54.914311]  __kasan_check_write+0x20/0x30
[   54.914343]  kasan_atomics_helper+0xf20/0x4858
[   54.914371]  kasan_atomics+0x198/0x2e0
[   54.914399]  kunit_try_run_case+0x170/0x3f0
[   54.914434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.914473]  kthread+0x328/0x630
[   54.914506]  ret_from_fork+0x10/0x20
[   54.914537] 
[   54.984290] Allocated by task 314:
[   54.987674]  kasan_save_stack+0x3c/0x68
[   54.991494]  kasan_save_track+0x20/0x40
[   54.995313]  kasan_save_alloc_info+0x40/0x58
[   54.999567]  __kasan_kmalloc+0xd4/0xd8
[   55.003299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.007813]  kasan_atomics+0xb8/0x2e0
[   55.011458]  kunit_try_run_case+0x170/0x3f0
[   55.015625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.021094]  kthread+0x328/0x630
[   55.024306]  ret_from_fork+0x10/0x20
[   55.027865] 
[   55.029340] The buggy address belongs to the object at ffff000803afab80
[   55.029340]  which belongs to the cache kmalloc-64 of size 64
[   55.041667] The buggy address is located 0 bytes to the right of
[   55.041667]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.054514] 
[   55.055990] The buggy address belongs to the physical page:
[   55.061545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.069531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.076041] page_type: f5(slab)
[   55.079174] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.086898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.094617] page dumped because: kasan: bad access detected
[   55.100172] 
[   55.101648] Memory state around the buggy address:
[   55.106427]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.113631]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.120836] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.128036]                                      ^
[   55.132814]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.140020]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.147221] ==================================================================
[   60.421504] ==================================================================
[   60.428566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   60.435943] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.443235] 
[   60.444716] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.444764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.444780] Hardware name: WinLink E850-96 board (DT)
[   60.444798] Call trace:
[   60.444811]  show_stack+0x20/0x38 (C)
[   60.444842]  dump_stack_lvl+0x8c/0xd0
[   60.444877]  print_report+0x118/0x608
[   60.444905]  kasan_report+0xdc/0x128
[   60.444935]  __asan_report_load8_noabort+0x20/0x30
[   60.444968]  kasan_atomics_helper+0x3e10/0x4858
[   60.444997]  kasan_atomics+0x198/0x2e0
[   60.445024]  kunit_try_run_case+0x170/0x3f0
[   60.445059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.445100]  kthread+0x328/0x630
[   60.445132]  ret_from_fork+0x10/0x20
[   60.445161] 
[   60.511636] Allocated by task 314:
[   60.515022]  kasan_save_stack+0x3c/0x68
[   60.518841]  kasan_save_track+0x20/0x40
[   60.522661]  kasan_save_alloc_info+0x40/0x58
[   60.526914]  __kasan_kmalloc+0xd4/0xd8
[   60.530647]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.535160]  kasan_atomics+0xb8/0x2e0
[   60.538806]  kunit_try_run_case+0x170/0x3f0
[   60.542973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.548442]  kthread+0x328/0x630
[   60.551653]  ret_from_fork+0x10/0x20
[   60.555212] 
[   60.556688] The buggy address belongs to the object at ffff000803afab80
[   60.556688]  which belongs to the cache kmalloc-64 of size 64
[   60.569015] The buggy address is located 0 bytes to the right of
[   60.569015]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.581861] 
[   60.583337] The buggy address belongs to the physical page:
[   60.588893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.596878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.603389] page_type: f5(slab)
[   60.606523] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.614246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.621965] page dumped because: kasan: bad access detected
[   60.627520] 
[   60.628996] Memory state around the buggy address:
[   60.633775]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.640978]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.648183] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.655384]                                      ^
[   60.660162]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.667367]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.674568] ==================================================================
[   60.945771] ==================================================================
[   60.952866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   60.960241] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.967533] 
[   60.969014] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.969062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.969077] Hardware name: WinLink E850-96 board (DT)
[   60.969095] Call trace:
[   60.969106]  show_stack+0x20/0x38 (C)
[   60.969138]  dump_stack_lvl+0x8c/0xd0
[   60.969170]  print_report+0x118/0x608
[   60.969200]  kasan_report+0xdc/0x128
[   60.969229]  __asan_report_load8_noabort+0x20/0x30
[   60.969263]  kasan_atomics_helper+0x3e20/0x4858
[   60.969292]  kasan_atomics+0x198/0x2e0
[   60.969319]  kunit_try_run_case+0x170/0x3f0
[   60.969352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.969390]  kthread+0x328/0x630
[   60.969421]  ret_from_fork+0x10/0x20
[   60.969450] 
[   61.035934] Allocated by task 314:
[   61.039320]  kasan_save_stack+0x3c/0x68
[   61.043139]  kasan_save_track+0x20/0x40
[   61.046958]  kasan_save_alloc_info+0x40/0x58
[   61.051212]  __kasan_kmalloc+0xd4/0xd8
[   61.054944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.059458]  kasan_atomics+0xb8/0x2e0
[   61.063104]  kunit_try_run_case+0x170/0x3f0
[   61.067270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.072739]  kthread+0x328/0x630
[   61.075951]  ret_from_fork+0x10/0x20
[   61.079510] 
[   61.080986] The buggy address belongs to the object at ffff000803afab80
[   61.080986]  which belongs to the cache kmalloc-64 of size 64
[   61.093312] The buggy address is located 0 bytes to the right of
[   61.093312]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   61.106159] 
[   61.107634] The buggy address belongs to the physical page:
[   61.113191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   61.121176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.127686] page_type: f5(slab)
[   61.130819] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.138544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.146262] page dumped because: kasan: bad access detected
[   61.151818] 
[   61.153293] Memory state around the buggy address:
[   61.158072]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.165276]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.172481] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.179682]                                      ^
[   61.184460]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.191665]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.198866] ==================================================================
[   57.793044] ==================================================================
[   57.800134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   57.807511] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.814802] 
[   57.816281] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.816327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.816343] Hardware name: WinLink E850-96 board (DT)
[   57.816360] Call trace:
[   57.816370]  show_stack+0x20/0x38 (C)
[   57.816401]  dump_stack_lvl+0x8c/0xd0
[   57.816433]  print_report+0x118/0x608
[   57.816464]  kasan_report+0xdc/0x128
[   57.816494]  __asan_report_load8_noabort+0x20/0x30
[   57.816527]  kasan_atomics_helper+0x3f04/0x4858
[   57.816555]  kasan_atomics+0x198/0x2e0
[   57.816583]  kunit_try_run_case+0x170/0x3f0
[   57.816615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.816653]  kthread+0x328/0x630
[   57.816686]  ret_from_fork+0x10/0x20
[   57.816717] 
[   57.883203] Allocated by task 314:
[   57.886589]  kasan_save_stack+0x3c/0x68
[   57.890408]  kasan_save_track+0x20/0x40
[   57.894228]  kasan_save_alloc_info+0x40/0x58
[   57.898481]  __kasan_kmalloc+0xd4/0xd8
[   57.902214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.906728]  kasan_atomics+0xb8/0x2e0
[   57.910374]  kunit_try_run_case+0x170/0x3f0
[   57.914540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.920009]  kthread+0x328/0x630
[   57.923220]  ret_from_fork+0x10/0x20
[   57.926779] 
[   57.928255] The buggy address belongs to the object at ffff000803afab80
[   57.928255]  which belongs to the cache kmalloc-64 of size 64
[   57.940582] The buggy address is located 0 bytes to the right of
[   57.940582]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.953429] 
[   57.954904] The buggy address belongs to the physical page:
[   57.960460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.968446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.974956] page_type: f5(slab)
[   57.978089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.985813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.993532] page dumped because: kasan: bad access detected
[   57.999087] 
[   58.000563] Memory state around the buggy address:
[   58.005341]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.012546]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.019752] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.026952]                                      ^
[   58.031730]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.038934]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.046136] ==================================================================
[   44.903038] ==================================================================
[   44.910055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   44.917342] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   44.924632] 
[   44.926116] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   44.926172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.926188] Hardware name: WinLink E850-96 board (DT)
[   44.926210] Call trace:
[   44.926224]  show_stack+0x20/0x38 (C)
[   44.926259]  dump_stack_lvl+0x8c/0xd0
[   44.926298]  print_report+0x118/0x608
[   44.926329]  kasan_report+0xdc/0x128
[   44.926358]  kasan_check_range+0x100/0x1a8
[   44.926390]  __kasan_check_read+0x20/0x30
[   44.926421]  kasan_atomics_helper+0x1ec/0x4858
[   44.926451]  kasan_atomics+0x198/0x2e0
[   44.926480]  kunit_try_run_case+0x170/0x3f0
[   44.926518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.926558]  kthread+0x328/0x630
[   44.926592]  ret_from_fork+0x10/0x20
[   44.926626] 
[   44.996244] Allocated by task 314:
[   44.999634]  kasan_save_stack+0x3c/0x68
[   45.003449]  kasan_save_track+0x20/0x40
[   45.007269]  kasan_save_alloc_info+0x40/0x58
[   45.011522]  __kasan_kmalloc+0xd4/0xd8
[   45.015255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.019768]  kasan_atomics+0xb8/0x2e0
[   45.023416]  kunit_try_run_case+0x170/0x3f0
[   45.027581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.033049]  kthread+0x328/0x630
[   45.036261]  ret_from_fork+0x10/0x20
[   45.039820] 
[   45.041296] The buggy address belongs to the object at ffff000803afab80
[   45.041296]  which belongs to the cache kmalloc-64 of size 64
[   45.053623] The buggy address is located 0 bytes to the right of
[   45.053623]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.066469] 
[   45.067948] The buggy address belongs to the physical page:
[   45.073505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.081488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.087997] page_type: f5(slab)
[   45.091133] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.098854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.106573] page dumped because: kasan: bad access detected
[   45.112128] 
[   45.113603] Memory state around the buggy address:
[   45.118385]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.125588]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.132792] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.139992]                                      ^
[   45.144771]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.151975]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.159178] ==================================================================
[   45.954234] ==================================================================
[   45.961252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   45.968539] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.975917] 
[   45.977400] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.977450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.977465] Hardware name: WinLink E850-96 board (DT)
[   45.977486] Call trace:
[   45.977499]  show_stack+0x20/0x38 (C)
[   45.977533]  dump_stack_lvl+0x8c/0xd0
[   45.977566]  print_report+0x118/0x608
[   45.977598]  kasan_report+0xdc/0x128
[   45.977627]  kasan_check_range+0x100/0x1a8
[   45.977659]  __kasan_check_write+0x20/0x30
[   45.977691]  kasan_atomics_helper+0x32c/0x4858
[   45.977721]  kasan_atomics+0x198/0x2e0
[   45.977748]  kunit_try_run_case+0x170/0x3f0
[   45.977784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.977821]  kthread+0x328/0x630
[   45.977854]  ret_from_fork+0x10/0x20
[   45.977886] 
[   46.047617] Allocated by task 314:
[   46.051005]  kasan_save_stack+0x3c/0x68
[   46.054822]  kasan_save_track+0x20/0x40
[   46.058642]  kasan_save_alloc_info+0x40/0x58
[   46.062895]  __kasan_kmalloc+0xd4/0xd8
[   46.066628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.071141]  kasan_atomics+0xb8/0x2e0
[   46.074787]  kunit_try_run_case+0x170/0x3f0
[   46.078954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.084422]  kthread+0x328/0x630
[   46.087634]  ret_from_fork+0x10/0x20
[   46.091193] 
[   46.092669] The buggy address belongs to the object at ffff000803afab80
[   46.092669]  which belongs to the cache kmalloc-64 of size 64
[   46.104996] The buggy address is located 0 bytes to the right of
[   46.104996]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.117842] 
[   46.119319] The buggy address belongs to the physical page:
[   46.124875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.132859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.139370] page_type: f5(slab)
[   46.142506] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.150227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.157946] page dumped because: kasan: bad access detected
[   46.163501] 
[   46.164976] Memory state around the buggy address:
[   46.169757]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.176960]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.184166] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.191365]                                      ^
[   46.196143]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.203348]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.210549] ==================================================================
[   58.053455] ==================================================================
[   58.060548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   58.067923] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.075302] 
[   58.076781] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.076829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.076844] Hardware name: WinLink E850-96 board (DT)
[   58.076861] Call trace:
[   58.076873]  show_stack+0x20/0x38 (C)
[   58.076903]  dump_stack_lvl+0x8c/0xd0
[   58.076936]  print_report+0x118/0x608
[   58.076966]  kasan_report+0xdc/0x128
[   58.076994]  kasan_check_range+0x100/0x1a8
[   58.077024]  __kasan_check_write+0x20/0x30
[   58.077056]  kasan_atomics_helper+0x1414/0x4858
[   58.077084]  kasan_atomics+0x198/0x2e0
[   58.077111]  kunit_try_run_case+0x170/0x3f0
[   58.077143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.077181]  kthread+0x328/0x630
[   58.077214]  ret_from_fork+0x10/0x20
[   58.077244] 
[   58.147089] Allocated by task 314:
[   58.150474]  kasan_save_stack+0x3c/0x68
[   58.154293]  kasan_save_track+0x20/0x40
[   58.158113]  kasan_save_alloc_info+0x40/0x58
[   58.162366]  __kasan_kmalloc+0xd4/0xd8
[   58.166099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.170613]  kasan_atomics+0xb8/0x2e0
[   58.174258]  kunit_try_run_case+0x170/0x3f0
[   58.178425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.183894]  kthread+0x328/0x630
[   58.187105]  ret_from_fork+0x10/0x20
[   58.190664] 
[   58.192140] The buggy address belongs to the object at ffff000803afab80
[   58.192140]  which belongs to the cache kmalloc-64 of size 64
[   58.204467] The buggy address is located 0 bytes to the right of
[   58.204467]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.217313] 
[   58.218789] The buggy address belongs to the physical page:
[   58.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.232331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.238841] page_type: f5(slab)
[   58.241973] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.249698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.257417] page dumped because: kasan: bad access detected
[   58.262972] 
[   58.264448] Memory state around the buggy address:
[   58.269227]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.276431]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.283636] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.290837]                                      ^
[   58.295615]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.302820]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.310020] ==================================================================
[   59.633321] ==================================================================
[   59.640385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   59.647761] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.655139] 
[   59.656619] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.656664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.656679] Hardware name: WinLink E850-96 board (DT)
[   59.656697] Call trace:
[   59.656711]  show_stack+0x20/0x38 (C)
[   59.656743]  dump_stack_lvl+0x8c/0xd0
[   59.656774]  print_report+0x118/0x608
[   59.656801]  kasan_report+0xdc/0x128
[   59.656829]  kasan_check_range+0x100/0x1a8
[   59.656858]  __kasan_check_write+0x20/0x30
[   59.656890]  kasan_atomics_helper+0x1644/0x4858
[   59.656919]  kasan_atomics+0x198/0x2e0
[   59.656946]  kunit_try_run_case+0x170/0x3f0
[   59.656981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.657019]  kthread+0x328/0x630
[   59.657052]  ret_from_fork+0x10/0x20
[   59.657084] 
[   59.726926] Allocated by task 314:
[   59.730312]  kasan_save_stack+0x3c/0x68
[   59.734131]  kasan_save_track+0x20/0x40
[   59.737950]  kasan_save_alloc_info+0x40/0x58
[   59.742204]  __kasan_kmalloc+0xd4/0xd8
[   59.745936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.750450]  kasan_atomics+0xb8/0x2e0
[   59.754096]  kunit_try_run_case+0x170/0x3f0
[   59.758262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.763731]  kthread+0x328/0x630
[   59.766943]  ret_from_fork+0x10/0x20
[   59.770502] 
[   59.771977] The buggy address belongs to the object at ffff000803afab80
[   59.771977]  which belongs to the cache kmalloc-64 of size 64
[   59.784304] The buggy address is located 0 bytes to the right of
[   59.784304]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.797151] 
[   59.798627] The buggy address belongs to the physical page:
[   59.804182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.812168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.818678] page_type: f5(slab)
[   59.821811] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.829535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.837254] page dumped because: kasan: bad access detected
[   59.842809] 
[   59.844285] Memory state around the buggy address:
[   59.849065]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.856268]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.863473] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.870674]                                      ^
[   59.875452]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.882657]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.889858] ==================================================================
[   49.903416] ==================================================================
[   49.910495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   49.917785] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.925164] 
[   49.926646] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.926691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.926707] Hardware name: WinLink E850-96 board (DT)
[   49.926728] Call trace:
[   49.926740]  show_stack+0x20/0x38 (C)
[   49.926771]  dump_stack_lvl+0x8c/0xd0
[   49.926805]  print_report+0x118/0x608
[   49.926833]  kasan_report+0xdc/0x128
[   49.926862]  kasan_check_range+0x100/0x1a8
[   49.926894]  __kasan_check_write+0x20/0x30
[   49.926925]  kasan_atomics_helper+0x934/0x4858
[   49.926956]  kasan_atomics+0x198/0x2e0
[   49.926981]  kunit_try_run_case+0x170/0x3f0
[   49.927014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.927052]  kthread+0x328/0x630
[   49.927083]  ret_from_fork+0x10/0x20
[   49.927115] 
[   49.996864] Allocated by task 314:
[   50.000249]  kasan_save_stack+0x3c/0x68
[   50.004069]  kasan_save_track+0x20/0x40
[   50.007888]  kasan_save_alloc_info+0x40/0x58
[   50.012141]  __kasan_kmalloc+0xd4/0xd8
[   50.015874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.020388]  kasan_atomics+0xb8/0x2e0
[   50.024034]  kunit_try_run_case+0x170/0x3f0
[   50.028200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.033669]  kthread+0x328/0x630
[   50.036881]  ret_from_fork+0x10/0x20
[   50.040440] 
[   50.041915] The buggy address belongs to the object at ffff000803afab80
[   50.041915]  which belongs to the cache kmalloc-64 of size 64
[   50.054242] The buggy address is located 0 bytes to the right of
[   50.054242]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.067088] 
[   50.068566] The buggy address belongs to the physical page:
[   50.074120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.082106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.088616] page_type: f5(slab)
[   50.091749] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.099473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.107192] page dumped because: kasan: bad access detected
[   50.112747] 
[   50.114223] Memory state around the buggy address:
[   50.119003]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.126206]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.133411] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.140612]                                      ^
[   50.145390]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.152595]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.159797] ==================================================================
[   51.746082] ==================================================================
[   51.753176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   51.760553] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   51.767844] 
[   51.769323] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   51.769367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.769382] Hardware name: WinLink E850-96 board (DT)
[   51.769403] Call trace:
[   51.769415]  show_stack+0x20/0x38 (C)
[   51.769446]  dump_stack_lvl+0x8c/0xd0
[   51.769478]  print_report+0x118/0x608
[   51.769508]  kasan_report+0xdc/0x128
[   51.769539]  __asan_report_load4_noabort+0x20/0x30
[   51.769571]  kasan_atomics_helper+0x3dbc/0x4858
[   51.769600]  kasan_atomics+0x198/0x2e0
[   51.769627]  kunit_try_run_case+0x170/0x3f0
[   51.769662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.769700]  kthread+0x328/0x630
[   51.769733]  ret_from_fork+0x10/0x20
[   51.769762] 
[   51.836246] Allocated by task 314:
[   51.839631]  kasan_save_stack+0x3c/0x68
[   51.843451]  kasan_save_track+0x20/0x40
[   51.847270]  kasan_save_alloc_info+0x40/0x58
[   51.851524]  __kasan_kmalloc+0xd4/0xd8
[   51.855256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.859770]  kasan_atomics+0xb8/0x2e0
[   51.863416]  kunit_try_run_case+0x170/0x3f0
[   51.867582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.873051]  kthread+0x328/0x630
[   51.876263]  ret_from_fork+0x10/0x20
[   51.879821] 
[   51.881297] The buggy address belongs to the object at ffff000803afab80
[   51.881297]  which belongs to the cache kmalloc-64 of size 64
[   51.893624] The buggy address is located 0 bytes to the right of
[   51.893624]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.906471] 
[   51.907946] The buggy address belongs to the physical page:
[   51.913504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.921488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.927998] page_type: f5(slab)
[   51.931131] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.938855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.946574] page dumped because: kasan: bad access detected
[   51.952129] 
[   51.953605] Memory state around the buggy address:
[   51.958383]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.965588]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.972793] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.979994]                                      ^
[   51.984772]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.991977]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.999178] ==================================================================
[   52.270236] ==================================================================
[   52.277301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   52.284677] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.291968] 
[   52.293449] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.293493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.293507] Hardware name: WinLink E850-96 board (DT)
[   52.293523] Call trace:
[   52.293536]  show_stack+0x20/0x38 (C)
[   52.293566]  dump_stack_lvl+0x8c/0xd0
[   52.293598]  print_report+0x118/0x608
[   52.293628]  kasan_report+0xdc/0x128
[   52.293657]  __asan_report_load4_noabort+0x20/0x30
[   52.293692]  kasan_atomics_helper+0x3de4/0x4858
[   52.293721]  kasan_atomics+0x198/0x2e0
[   52.293748]  kunit_try_run_case+0x170/0x3f0
[   52.293782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.293820]  kthread+0x328/0x630
[   52.293852]  ret_from_fork+0x10/0x20
[   52.293884] 
[   52.360370] Allocated by task 314:
[   52.363755]  kasan_save_stack+0x3c/0x68
[   52.367575]  kasan_save_track+0x20/0x40
[   52.371394]  kasan_save_alloc_info+0x40/0x58
[   52.375648]  __kasan_kmalloc+0xd4/0xd8
[   52.379380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.383894]  kasan_atomics+0xb8/0x2e0
[   52.387540]  kunit_try_run_case+0x170/0x3f0
[   52.391707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.397175]  kthread+0x328/0x630
[   52.400387]  ret_from_fork+0x10/0x20
[   52.403946] 
[   52.405421] The buggy address belongs to the object at ffff000803afab80
[   52.405421]  which belongs to the cache kmalloc-64 of size 64
[   52.417748] The buggy address is located 0 bytes to the right of
[   52.417748]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.430595] 
[   52.432071] The buggy address belongs to the physical page:
[   52.437626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.445612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.452122] page_type: f5(slab)
[   52.455255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.462979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.470698] page dumped because: kasan: bad access detected
[   52.476253] 
[   52.477729] Memory state around the buggy address:
[   52.482510]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.489712]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.496917] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.504118]                                      ^
[   52.508896]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.516100]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.523302] ==================================================================
[   59.109019] ==================================================================
[   59.116086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   59.123463] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.130841] 
[   59.132321] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.132366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.132384] Hardware name: WinLink E850-96 board (DT)
[   59.132402] Call trace:
[   59.132414]  show_stack+0x20/0x38 (C)
[   59.132443]  dump_stack_lvl+0x8c/0xd0
[   59.132477]  print_report+0x118/0x608
[   59.132507]  kasan_report+0xdc/0x128
[   59.132536]  kasan_check_range+0x100/0x1a8
[   59.132568]  __kasan_check_write+0x20/0x30
[   59.132600]  kasan_atomics_helper+0x15b4/0x4858
[   59.132629]  kasan_atomics+0x198/0x2e0
[   59.132655]  kunit_try_run_case+0x170/0x3f0
[   59.132690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.132729]  kthread+0x328/0x630
[   59.132762]  ret_from_fork+0x10/0x20
[   59.132792] 
[   59.202629] Allocated by task 314:
[   59.206014]  kasan_save_stack+0x3c/0x68
[   59.209833]  kasan_save_track+0x20/0x40
[   59.213653]  kasan_save_alloc_info+0x40/0x58
[   59.217906]  __kasan_kmalloc+0xd4/0xd8
[   59.221639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.226152]  kasan_atomics+0xb8/0x2e0
[   59.229798]  kunit_try_run_case+0x170/0x3f0
[   59.233965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.239433]  kthread+0x328/0x630
[   59.242645]  ret_from_fork+0x10/0x20
[   59.246204] 
[   59.247680] The buggy address belongs to the object at ffff000803afab80
[   59.247680]  which belongs to the cache kmalloc-64 of size 64
[   59.260007] The buggy address is located 0 bytes to the right of
[   59.260007]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.272853] 
[   59.274329] The buggy address belongs to the physical page:
[   59.279885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.287871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.294381] page_type: f5(slab)
[   59.297513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.305238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.312956] page dumped because: kasan: bad access detected
[   59.318512] 
[   59.319988] Memory state around the buggy address:
[   59.324767]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.331970]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.339176] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.346376]                                      ^
[   59.351154]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.358359]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.365560] ==================================================================
[   50.430857] ==================================================================
[   50.437917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   50.445208] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.452586] 
[   50.454067] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.454115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.454129] Hardware name: WinLink E850-96 board (DT)
[   50.454148] Call trace:
[   50.454159]  show_stack+0x20/0x38 (C)
[   50.454189]  dump_stack_lvl+0x8c/0xd0
[   50.454220]  print_report+0x118/0x608
[   50.454251]  kasan_report+0xdc/0x128
[   50.454279]  kasan_check_range+0x100/0x1a8
[   50.454310]  __kasan_check_write+0x20/0x30
[   50.454342]  kasan_atomics_helper+0xa04/0x4858
[   50.454372]  kasan_atomics+0x198/0x2e0
[   50.454399]  kunit_try_run_case+0x170/0x3f0
[   50.454434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.454470]  kthread+0x328/0x630
[   50.454502]  ret_from_fork+0x10/0x20
[   50.454532] 
[   50.524286] Allocated by task 314:
[   50.527673]  kasan_save_stack+0x3c/0x68
[   50.531491]  kasan_save_track+0x20/0x40
[   50.535311]  kasan_save_alloc_info+0x40/0x58
[   50.539564]  __kasan_kmalloc+0xd4/0xd8
[   50.543296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.547810]  kasan_atomics+0xb8/0x2e0
[   50.551456]  kunit_try_run_case+0x170/0x3f0
[   50.555623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.561092]  kthread+0x328/0x630
[   50.564303]  ret_from_fork+0x10/0x20
[   50.567862] 
[   50.569338] The buggy address belongs to the object at ffff000803afab80
[   50.569338]  which belongs to the cache kmalloc-64 of size 64
[   50.581664] The buggy address is located 0 bytes to the right of
[   50.581664]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.594511] 
[   50.595987] The buggy address belongs to the physical page:
[   50.601543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.609528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.616039] page_type: f5(slab)
[   50.619171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.626896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.634615] page dumped because: kasan: bad access detected
[   50.640170] 
[   50.641646] Memory state around the buggy address:
[   50.646427]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.653629]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.660834] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.668035]                                      ^
[   50.672812]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.680017]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.687219] ==================================================================
[   55.945899] ==================================================================
[   55.952940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   55.960316] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.967694] 
[   55.969175] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.969219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.969233] Hardware name: WinLink E850-96 board (DT)
[   55.969252] Call trace:
[   55.969265]  show_stack+0x20/0x38 (C)
[   55.969297]  dump_stack_lvl+0x8c/0xd0
[   55.969330]  print_report+0x118/0x608
[   55.969358]  kasan_report+0xdc/0x128
[   55.969387]  kasan_check_range+0x100/0x1a8
[   55.969419]  __kasan_check_write+0x20/0x30
[   55.969449]  kasan_atomics_helper+0x10c0/0x4858
[   55.969479]  kasan_atomics+0x198/0x2e0
[   55.969504]  kunit_try_run_case+0x170/0x3f0
[   55.969539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.969577]  kthread+0x328/0x630
[   55.969607]  ret_from_fork+0x10/0x20
[   55.969637] 
[   56.039481] Allocated by task 314:
[   56.042867]  kasan_save_stack+0x3c/0x68
[   56.046686]  kasan_save_track+0x20/0x40
[   56.050506]  kasan_save_alloc_info+0x40/0x58
[   56.054759]  __kasan_kmalloc+0xd4/0xd8
[   56.058491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.063005]  kasan_atomics+0xb8/0x2e0
[   56.066651]  kunit_try_run_case+0x170/0x3f0
[   56.070818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.076286]  kthread+0x328/0x630
[   56.079498]  ret_from_fork+0x10/0x20
[   56.083057] 
[   56.084532] The buggy address belongs to the object at ffff000803afab80
[   56.084532]  which belongs to the cache kmalloc-64 of size 64
[   56.096860] The buggy address is located 0 bytes to the right of
[   56.096860]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.109706] 
[   56.111182] The buggy address belongs to the physical page:
[   56.116738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.124723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.131234] page_type: f5(slab)
[   56.134366] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.142091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.149810] page dumped because: kasan: bad access detected
[   56.155365] 
[   56.156841] Memory state around the buggy address:
[   56.161620]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.168824]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.176028] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.183229]                                      ^
[   56.188007]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.195212]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.202413] ==================================================================
[   56.473640] ==================================================================
[   56.480709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   56.488086] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.495464] 
[   56.496944] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.496991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.497007] Hardware name: WinLink E850-96 board (DT)
[   56.497027] Call trace:
[   56.497038]  show_stack+0x20/0x38 (C)
[   56.497069]  dump_stack_lvl+0x8c/0xd0
[   56.497102]  print_report+0x118/0x608
[   56.497130]  kasan_report+0xdc/0x128
[   56.497159]  kasan_check_range+0x100/0x1a8
[   56.497190]  __kasan_check_write+0x20/0x30
[   56.497221]  kasan_atomics_helper+0x1190/0x4858
[   56.497250]  kasan_atomics+0x198/0x2e0
[   56.497277]  kunit_try_run_case+0x170/0x3f0
[   56.497312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.497349]  kthread+0x328/0x630
[   56.497379]  ret_from_fork+0x10/0x20
[   56.497412] 
[   56.567251] Allocated by task 314:
[   56.570637]  kasan_save_stack+0x3c/0x68
[   56.574456]  kasan_save_track+0x20/0x40
[   56.578275]  kasan_save_alloc_info+0x40/0x58
[   56.582529]  __kasan_kmalloc+0xd4/0xd8
[   56.586261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.590775]  kasan_atomics+0xb8/0x2e0
[   56.594421]  kunit_try_run_case+0x170/0x3f0
[   56.598587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.604056]  kthread+0x328/0x630
[   56.607268]  ret_from_fork+0x10/0x20
[   56.610827] 
[   56.612303] The buggy address belongs to the object at ffff000803afab80
[   56.612303]  which belongs to the cache kmalloc-64 of size 64
[   56.624629] The buggy address is located 0 bytes to the right of
[   56.624629]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.637476] 
[   56.638952] The buggy address belongs to the physical page:
[   56.644508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.652493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.659004] page_type: f5(slab)
[   56.662138] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.669861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.677580] page dumped because: kasan: bad access detected
[   56.683135] 
[   56.684610] Memory state around the buggy address:
[   56.689390]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.696594]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.703798] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.710999]                                      ^
[   56.715777]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.722982]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.730183] ==================================================================
[   47.797043] ==================================================================
[   47.804103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   47.811393] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.818772] 
[   47.820253] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.820301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.820318] Hardware name: WinLink E850-96 board (DT)
[   47.820335] Call trace:
[   47.820347]  show_stack+0x20/0x38 (C)
[   47.820377]  dump_stack_lvl+0x8c/0xd0
[   47.820412]  print_report+0x118/0x608
[   47.820443]  kasan_report+0xdc/0x128
[   47.820473]  kasan_check_range+0x100/0x1a8
[   47.820504]  __kasan_check_write+0x20/0x30
[   47.820536]  kasan_atomics_helper+0x5b4/0x4858
[   47.820566]  kasan_atomics+0x198/0x2e0
[   47.820593]  kunit_try_run_case+0x170/0x3f0
[   47.820628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.820665]  kthread+0x328/0x630
[   47.820699]  ret_from_fork+0x10/0x20
[   47.820731] 
[   47.890472] Allocated by task 314:
[   47.893857]  kasan_save_stack+0x3c/0x68
[   47.897677]  kasan_save_track+0x20/0x40
[   47.901496]  kasan_save_alloc_info+0x40/0x58
[   47.905749]  __kasan_kmalloc+0xd4/0xd8
[   47.909482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.913996]  kasan_atomics+0xb8/0x2e0
[   47.917642]  kunit_try_run_case+0x170/0x3f0
[   47.921808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.927277]  kthread+0x328/0x630
[   47.930489]  ret_from_fork+0x10/0x20
[   47.934047] 
[   47.935523] The buggy address belongs to the object at ffff000803afab80
[   47.935523]  which belongs to the cache kmalloc-64 of size 64
[   47.947850] The buggy address is located 0 bytes to the right of
[   47.947850]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.960697] 
[   47.962174] The buggy address belongs to the physical page:
[   47.967728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.975714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.982224] page_type: f5(slab)
[   47.985357] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.993081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.000800] page dumped because: kasan: bad access detected
[   48.006355] 
[   48.007831] Memory state around the buggy address:
[   48.012609]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.019814]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.027019] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.034220]                                      ^
[   48.038998]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.046202]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.053403] ==================================================================
[   45.693725] ==================================================================
[   45.700837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   45.708213] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.715505] 
[   45.716988] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.717035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.717052] Hardware name: WinLink E850-96 board (DT)
[   45.717071] Call trace:
[   45.717085]  show_stack+0x20/0x38 (C)
[   45.717119]  dump_stack_lvl+0x8c/0xd0
[   45.717151]  print_report+0x118/0x608
[   45.717179]  kasan_report+0xdc/0x128
[   45.717209]  __asan_report_load4_noabort+0x20/0x30
[   45.717244]  kasan_atomics_helper+0x40fc/0x4858
[   45.717274]  kasan_atomics+0x198/0x2e0
[   45.717301]  kunit_try_run_case+0x170/0x3f0
[   45.717334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.717373]  kthread+0x328/0x630
[   45.717403]  ret_from_fork+0x10/0x20
[   45.717437] 
[   45.783906] Allocated by task 314:
[   45.787292]  kasan_save_stack+0x3c/0x68
[   45.791111]  kasan_save_track+0x20/0x40
[   45.794931]  kasan_save_alloc_info+0x40/0x58
[   45.799184]  __kasan_kmalloc+0xd4/0xd8
[   45.802917]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.807430]  kasan_atomics+0xb8/0x2e0
[   45.811076]  kunit_try_run_case+0x170/0x3f0
[   45.815243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.820711]  kthread+0x328/0x630
[   45.823923]  ret_from_fork+0x10/0x20
[   45.827482] 
[   45.828958] The buggy address belongs to the object at ffff000803afab80
[   45.828958]  which belongs to the cache kmalloc-64 of size 64
[   45.841285] The buggy address is located 0 bytes to the right of
[   45.841285]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.854131] 
[   45.855607] The buggy address belongs to the physical page:
[   45.861164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.869148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.875658] page_type: f5(slab)
[   45.878791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.886516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.894235] page dumped because: kasan: bad access detected
[   45.899790] 
[   45.901265] Memory state around the buggy address:
[   45.906046]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.913248]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.920455] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.927654]                                      ^
[   45.932432]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.939637]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.946840] ==================================================================
[   49.115617] ==================================================================
[   49.122660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   49.129950] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   49.137328] 
[   49.138811] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   49.138857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.138872] Hardware name: WinLink E850-96 board (DT)
[   49.138890] Call trace:
[   49.138901]  show_stack+0x20/0x38 (C)
[   49.138931]  dump_stack_lvl+0x8c/0xd0
[   49.138964]  print_report+0x118/0x608
[   49.138994]  kasan_report+0xdc/0x128
[   49.139022]  kasan_check_range+0x100/0x1a8
[   49.139052]  __kasan_check_write+0x20/0x30
[   49.139084]  kasan_atomics_helper+0x7cc/0x4858
[   49.139113]  kasan_atomics+0x198/0x2e0
[   49.139139]  kunit_try_run_case+0x170/0x3f0
[   49.139173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.139212]  kthread+0x328/0x630
[   49.139245]  ret_from_fork+0x10/0x20
[   49.139275] 
[   49.209029] Allocated by task 314:
[   49.212414]  kasan_save_stack+0x3c/0x68
[   49.216233]  kasan_save_track+0x20/0x40
[   49.220053]  kasan_save_alloc_info+0x40/0x58
[   49.224306]  __kasan_kmalloc+0xd4/0xd8
[   49.228039]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.232552]  kasan_atomics+0xb8/0x2e0
[   49.236198]  kunit_try_run_case+0x170/0x3f0
[   49.240364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.245833]  kthread+0x328/0x630
[   49.249045]  ret_from_fork+0x10/0x20
[   49.252604] 
[   49.254079] The buggy address belongs to the object at ffff000803afab80
[   49.254079]  which belongs to the cache kmalloc-64 of size 64
[   49.266406] The buggy address is located 0 bytes to the right of
[   49.266406]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   49.279253] 
[   49.280729] The buggy address belongs to the physical page:
[   49.286285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   49.294270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.300781] page_type: f5(slab)
[   49.303913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.311638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.319357] page dumped because: kasan: bad access detected
[   49.324912] 
[   49.326387] Memory state around the buggy address:
[   49.331166]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.338371]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.345575] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.352776]                                      ^
[   49.357554]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.364759]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.371962] ==================================================================
[   60.157639] ==================================================================
[   60.164682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   60.172059] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.179437] 
[   60.180918] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.180964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.180981] Hardware name: WinLink E850-96 board (DT)
[   60.180998] Call trace:
[   60.181010]  show_stack+0x20/0x38 (C)
[   60.181039]  dump_stack_lvl+0x8c/0xd0
[   60.181073]  print_report+0x118/0x608
[   60.181100]  kasan_report+0xdc/0x128
[   60.181130]  kasan_check_range+0x100/0x1a8
[   60.181162]  __kasan_check_write+0x20/0x30
[   60.181194]  kasan_atomics_helper+0x16d0/0x4858
[   60.181223]  kasan_atomics+0x198/0x2e0
[   60.181251]  kunit_try_run_case+0x170/0x3f0
[   60.181285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.181323]  kthread+0x328/0x630
[   60.181354]  ret_from_fork+0x10/0x20
[   60.181387] 
[   60.251224] Allocated by task 314:
[   60.254611]  kasan_save_stack+0x3c/0x68
[   60.258428]  kasan_save_track+0x20/0x40
[   60.262248]  kasan_save_alloc_info+0x40/0x58
[   60.266501]  __kasan_kmalloc+0xd4/0xd8
[   60.270234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.274748]  kasan_atomics+0xb8/0x2e0
[   60.278393]  kunit_try_run_case+0x170/0x3f0
[   60.282560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.288029]  kthread+0x328/0x630
[   60.291240]  ret_from_fork+0x10/0x20
[   60.294800] 
[   60.296275] The buggy address belongs to the object at ffff000803afab80
[   60.296275]  which belongs to the cache kmalloc-64 of size 64
[   60.308602] The buggy address is located 0 bytes to the right of
[   60.308602]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.321448] 
[   60.322925] The buggy address belongs to the physical page:
[   60.328480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.336466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.342976] page_type: f5(slab)
[   60.346108] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.353833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.361552] page dumped because: kasan: bad access detected
[   60.367107] 
[   60.368583] Memory state around the buggy address:
[   60.373361]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.380566]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.387771] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.394972]                                      ^
[   60.399750]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.406954]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.414155] ==================================================================
[   45.430204] ==================================================================
[   45.437301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   45.444589] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   45.451880] 
[   45.453365] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   45.453413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.453430] Hardware name: WinLink E850-96 board (DT)
[   45.453448] Call trace:
[   45.453463]  show_stack+0x20/0x38 (C)
[   45.453496]  dump_stack_lvl+0x8c/0xd0
[   45.453529]  print_report+0x118/0x608
[   45.453563]  kasan_report+0xdc/0x128
[   45.453589]  kasan_check_range+0x100/0x1a8
[   45.453621]  __kasan_check_read+0x20/0x30
[   45.453652]  kasan_atomics_helper+0x2b0/0x4858
[   45.453681]  kasan_atomics+0x198/0x2e0
[   45.453708]  kunit_try_run_case+0x170/0x3f0
[   45.453743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.453782]  kthread+0x328/0x630
[   45.453815]  ret_from_fork+0x10/0x20
[   45.453848] 
[   45.523493] Allocated by task 314:
[   45.526881]  kasan_save_stack+0x3c/0x68
[   45.530698]  kasan_save_track+0x20/0x40
[   45.534518]  kasan_save_alloc_info+0x40/0x58
[   45.538771]  __kasan_kmalloc+0xd4/0xd8
[   45.542504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.547017]  kasan_atomics+0xb8/0x2e0
[   45.550663]  kunit_try_run_case+0x170/0x3f0
[   45.554830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.560298]  kthread+0x328/0x630
[   45.563510]  ret_from_fork+0x10/0x20
[   45.567069] 
[   45.568545] The buggy address belongs to the object at ffff000803afab80
[   45.568545]  which belongs to the cache kmalloc-64 of size 64
[   45.580872] The buggy address is located 0 bytes to the right of
[   45.580872]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   45.593718] 
[   45.595194] The buggy address belongs to the physical page:
[   45.600752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   45.608735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.615246] page_type: f5(slab)
[   45.618381] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   45.626103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   45.633822] page dumped because: kasan: bad access detected
[   45.639377] 
[   45.640853] Memory state around the buggy address:
[   45.645632]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.652836]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   45.660042] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   45.667241]                                      ^
[   45.672019]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.679224]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.686425] ==================================================================
[   61.206209] ==================================================================
[   61.213277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   61.220654] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   61.228032] 
[   61.229513] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.229559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.229574] Hardware name: WinLink E850-96 board (DT)
[   61.229596] Call trace:
[   61.229609]  show_stack+0x20/0x38 (C)
[   61.229639]  dump_stack_lvl+0x8c/0xd0
[   61.229671]  print_report+0x118/0x608
[   61.229700]  kasan_report+0xdc/0x128
[   61.229728]  kasan_check_range+0x100/0x1a8
[   61.229759]  __kasan_check_write+0x20/0x30
[   61.229791]  kasan_atomics_helper+0x17ec/0x4858
[   61.229821]  kasan_atomics+0x198/0x2e0
[   61.229847]  kunit_try_run_case+0x170/0x3f0
[   61.229881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.229920]  kthread+0x328/0x630
[   61.229953]  ret_from_fork+0x10/0x20
[   61.229986] 
[   61.299819] Allocated by task 314:
[   61.303205]  kasan_save_stack+0x3c/0x68
[   61.307024]  kasan_save_track+0x20/0x40
[   61.310843]  kasan_save_alloc_info+0x40/0x58
[   61.315097]  __kasan_kmalloc+0xd4/0xd8
[   61.318829]  __kmalloc_cache_noprof+0x16c/0x3c0
[   61.323343]  kasan_atomics+0xb8/0x2e0
[   61.326989]  kunit_try_run_case+0x170/0x3f0
[   61.331155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.336624]  kthread+0x328/0x630
[   61.339836]  ret_from_fork+0x10/0x20
[   61.343395] 
[   61.344871] The buggy address belongs to the object at ffff000803afab80
[   61.344871]  which belongs to the cache kmalloc-64 of size 64
[   61.357197] The buggy address is located 0 bytes to the right of
[   61.357197]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   61.370044] 
[   61.371522] The buggy address belongs to the physical page:
[   61.377076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   61.385061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.391571] page_type: f5(slab)
[   61.394704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.402428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.410147] page dumped because: kasan: bad access detected
[   61.415703] 
[   61.417178] Memory state around the buggy address:
[   61.421957]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.429161]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.436366] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.443567]                                      ^
[   61.448345]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.455550]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.462751] ==================================================================
[   47.005903] ==================================================================
[   47.012969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   47.020260] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.027638] 
[   47.029120] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.029167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.029181] Hardware name: WinLink E850-96 board (DT)
[   47.029202] Call trace:
[   47.029214]  show_stack+0x20/0x38 (C)
[   47.029244]  dump_stack_lvl+0x8c/0xd0
[   47.029281]  print_report+0x118/0x608
[   47.029309]  kasan_report+0xdc/0x128
[   47.029337]  kasan_check_range+0x100/0x1a8
[   47.029368]  __kasan_check_write+0x20/0x30
[   47.029399]  kasan_atomics_helper+0x47c/0x4858
[   47.029429]  kasan_atomics+0x198/0x2e0
[   47.029454]  kunit_try_run_case+0x170/0x3f0
[   47.029489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.029527]  kthread+0x328/0x630
[   47.029557]  ret_from_fork+0x10/0x20
[   47.029590] 
[   47.099338] Allocated by task 314:
[   47.102724]  kasan_save_stack+0x3c/0x68
[   47.106542]  kasan_save_track+0x20/0x40
[   47.110362]  kasan_save_alloc_info+0x40/0x58
[   47.114615]  __kasan_kmalloc+0xd4/0xd8
[   47.118348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.122862]  kasan_atomics+0xb8/0x2e0
[   47.126507]  kunit_try_run_case+0x170/0x3f0
[   47.130674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.136143]  kthread+0x328/0x630
[   47.139355]  ret_from_fork+0x10/0x20
[   47.142914] 
[   47.144389] The buggy address belongs to the object at ffff000803afab80
[   47.144389]  which belongs to the cache kmalloc-64 of size 64
[   47.156716] The buggy address is located 0 bytes to the right of
[   47.156716]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.169562] 
[   47.171038] The buggy address belongs to the physical page:
[   47.176594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.184580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.191090] page_type: f5(slab)
[   47.194223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.201947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.209666] page dumped because: kasan: bad access detected
[   47.215221] 
[   47.216697] Memory state around the buggy address:
[   47.221477]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.228680]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.235885] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.243086]                                      ^
[   47.247864]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.255068]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.262271] ==================================================================
[   54.366560] ==================================================================
[   54.373624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   54.381000] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.388378] 
[   54.389859] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.389903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.389920] Hardware name: WinLink E850-96 board (DT)
[   54.389940] Call trace:
[   54.389955]  show_stack+0x20/0x38 (C)
[   54.389987]  dump_stack_lvl+0x8c/0xd0
[   54.390019]  print_report+0x118/0x608
[   54.390047]  kasan_report+0xdc/0x128
[   54.390077]  __asan_report_store8_noabort+0x20/0x30
[   54.390109]  kasan_atomics_helper+0x3e5c/0x4858
[   54.390137]  kasan_atomics+0x198/0x2e0
[   54.390164]  kunit_try_run_case+0x170/0x3f0
[   54.390198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.390236]  kthread+0x328/0x630
[   54.390268]  ret_from_fork+0x10/0x20
[   54.390299] 
[   54.456866] Allocated by task 314:
[   54.460252]  kasan_save_stack+0x3c/0x68
[   54.464071]  kasan_save_track+0x20/0x40
[   54.467891]  kasan_save_alloc_info+0x40/0x58
[   54.472144]  __kasan_kmalloc+0xd4/0xd8
[   54.475876]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.480390]  kasan_atomics+0xb8/0x2e0
[   54.484036]  kunit_try_run_case+0x170/0x3f0
[   54.488203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.493671]  kthread+0x328/0x630
[   54.496883]  ret_from_fork+0x10/0x20
[   54.500442] 
[   54.501917] The buggy address belongs to the object at ffff000803afab80
[   54.501917]  which belongs to the cache kmalloc-64 of size 64
[   54.514244] The buggy address is located 0 bytes to the right of
[   54.514244]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.527091] 
[   54.528567] The buggy address belongs to the physical page:
[   54.534122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.542108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.548619] page_type: f5(slab)
[   54.551751] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.559476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.567194] page dumped because: kasan: bad access detected
[   54.572750] 
[   54.574225] Memory state around the buggy address:
[   54.579003]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.586208]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.593413] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.600614]                                      ^
[   54.605392]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.612597]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.619798] ==================================================================
[   50.167140] ==================================================================
[   50.174206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   50.181496] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.188875] 
[   50.190356] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.190402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.190418] Hardware name: WinLink E850-96 board (DT)
[   50.190435] Call trace:
[   50.190448]  show_stack+0x20/0x38 (C)
[   50.190479]  dump_stack_lvl+0x8c/0xd0
[   50.190512]  print_report+0x118/0x608
[   50.190543]  kasan_report+0xdc/0x128
[   50.190571]  kasan_check_range+0x100/0x1a8
[   50.190601]  __kasan_check_write+0x20/0x30
[   50.190632]  kasan_atomics_helper+0x99c/0x4858
[   50.190661]  kasan_atomics+0x198/0x2e0
[   50.190687]  kunit_try_run_case+0x170/0x3f0
[   50.190724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.190759]  kthread+0x328/0x630
[   50.190791]  ret_from_fork+0x10/0x20
[   50.190819] 
[   50.260575] Allocated by task 314:
[   50.263961]  kasan_save_stack+0x3c/0x68
[   50.267780]  kasan_save_track+0x20/0x40
[   50.271599]  kasan_save_alloc_info+0x40/0x58
[   50.275853]  __kasan_kmalloc+0xd4/0xd8
[   50.279585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.284099]  kasan_atomics+0xb8/0x2e0
[   50.287745]  kunit_try_run_case+0x170/0x3f0
[   50.291911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.297380]  kthread+0x328/0x630
[   50.300592]  ret_from_fork+0x10/0x20
[   50.304151] 
[   50.305626] The buggy address belongs to the object at ffff000803afab80
[   50.305626]  which belongs to the cache kmalloc-64 of size 64
[   50.317953] The buggy address is located 0 bytes to the right of
[   50.317953]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.330800] 
[   50.332275] The buggy address belongs to the physical page:
[   50.337831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.345817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.352327] page_type: f5(slab)
[   50.355460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.363184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.370904] page dumped because: kasan: bad access detected
[   50.376459] 
[   50.377934] Memory state around the buggy address:
[   50.382714]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.389918]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.397122] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.404323]                                      ^
[   50.409101]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.416306]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.423506] ==================================================================
[   54.627114] ==================================================================
[   54.634209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   54.641499] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   54.648877] 
[   54.650357] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   54.650405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.650421] Hardware name: WinLink E850-96 board (DT)
[   54.650440] Call trace:
[   54.650450]  show_stack+0x20/0x38 (C)
[   54.650479]  dump_stack_lvl+0x8c/0xd0
[   54.650511]  print_report+0x118/0x608
[   54.650541]  kasan_report+0xdc/0x128
[   54.650571]  kasan_check_range+0x100/0x1a8
[   54.650601]  __kasan_check_write+0x20/0x30
[   54.650634]  kasan_atomics_helper+0xeb8/0x4858
[   54.650661]  kasan_atomics+0x198/0x2e0
[   54.650689]  kunit_try_run_case+0x170/0x3f0
[   54.650724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.650761]  kthread+0x328/0x630
[   54.650793]  ret_from_fork+0x10/0x20
[   54.650827] 
[   54.720578] Allocated by task 314:
[   54.723963]  kasan_save_stack+0x3c/0x68
[   54.727782]  kasan_save_track+0x20/0x40
[   54.731602]  kasan_save_alloc_info+0x40/0x58
[   54.735855]  __kasan_kmalloc+0xd4/0xd8
[   54.739588]  __kmalloc_cache_noprof+0x16c/0x3c0
[   54.744101]  kasan_atomics+0xb8/0x2e0
[   54.747747]  kunit_try_run_case+0x170/0x3f0
[   54.751914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.757383]  kthread+0x328/0x630
[   54.760594]  ret_from_fork+0x10/0x20
[   54.764153] 
[   54.765629] The buggy address belongs to the object at ffff000803afab80
[   54.765629]  which belongs to the cache kmalloc-64 of size 64
[   54.777956] The buggy address is located 0 bytes to the right of
[   54.777956]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.790802] 
[   54.792278] The buggy address belongs to the physical page:
[   54.797835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.805819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.812330] page_type: f5(slab)
[   54.815464] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.823187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.830906] page dumped because: kasan: bad access detected
[   54.836461] 
[   54.837937] Memory state around the buggy address:
[   54.842716]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.849920]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.857125] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.864326]                                      ^
[   54.869104]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.876308]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.883509] ==================================================================
[   52.530671] ==================================================================
[   52.537713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   52.545003] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.552381] 
[   52.553862] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.553910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.553924] Hardware name: WinLink E850-96 board (DT)
[   52.553943] Call trace:
[   52.553954]  show_stack+0x20/0x38 (C)
[   52.553983]  dump_stack_lvl+0x8c/0xd0
[   52.554018]  print_report+0x118/0x608
[   52.554047]  kasan_report+0xdc/0x128
[   52.554076]  kasan_check_range+0x100/0x1a8
[   52.554108]  __kasan_check_write+0x20/0x30
[   52.554137]  kasan_atomics_helper+0xca0/0x4858
[   52.554168]  kasan_atomics+0x198/0x2e0
[   52.554196]  kunit_try_run_case+0x170/0x3f0
[   52.554231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.554268]  kthread+0x328/0x630
[   52.554301]  ret_from_fork+0x10/0x20
[   52.554333] 
[   52.624081] Allocated by task 314:
[   52.627467]  kasan_save_stack+0x3c/0x68
[   52.631286]  kasan_save_track+0x20/0x40
[   52.635106]  kasan_save_alloc_info+0x40/0x58
[   52.639359]  __kasan_kmalloc+0xd4/0xd8
[   52.643091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.647605]  kasan_atomics+0xb8/0x2e0
[   52.651251]  kunit_try_run_case+0x170/0x3f0
[   52.655418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.660886]  kthread+0x328/0x630
[   52.664098]  ret_from_fork+0x10/0x20
[   52.667657] 
[   52.669132] The buggy address belongs to the object at ffff000803afab80
[   52.669132]  which belongs to the cache kmalloc-64 of size 64
[   52.681459] The buggy address is located 0 bytes to the right of
[   52.681459]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.694306] 
[   52.695782] The buggy address belongs to the physical page:
[   52.701338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.709323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.715833] page_type: f5(slab)
[   52.718968] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.726691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.734410] page dumped because: kasan: bad access detected
[   52.739965] 
[   52.741440] Memory state around the buggy address:
[   52.746221]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.753423]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.760628] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.767829]                                      ^
[   52.772607]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.779812]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.787015] ==================================================================
[   46.478502] ==================================================================
[   46.485548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   46.492837] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.500215] 
[   46.501697] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.501750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.501765] Hardware name: WinLink E850-96 board (DT)
[   46.501784] Call trace:
[   46.501795]  show_stack+0x20/0x38 (C)
[   46.501827]  dump_stack_lvl+0x8c/0xd0
[   46.501862]  print_report+0x118/0x608
[   46.501890]  kasan_report+0xdc/0x128
[   46.501917]  kasan_check_range+0x100/0x1a8
[   46.501948]  __kasan_check_write+0x20/0x30
[   46.501978]  kasan_atomics_helper+0x3ac/0x4858
[   46.502007]  kasan_atomics+0x198/0x2e0
[   46.502034]  kunit_try_run_case+0x170/0x3f0
[   46.502070]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.502109]  kthread+0x328/0x630
[   46.502142]  ret_from_fork+0x10/0x20
[   46.502174] 
[   46.571915] Allocated by task 314:
[   46.575302]  kasan_save_stack+0x3c/0x68
[   46.579120]  kasan_save_track+0x20/0x40
[   46.582939]  kasan_save_alloc_info+0x40/0x58
[   46.587193]  __kasan_kmalloc+0xd4/0xd8
[   46.590925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.595439]  kasan_atomics+0xb8/0x2e0
[   46.599085]  kunit_try_run_case+0x170/0x3f0
[   46.603251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.608720]  kthread+0x328/0x630
[   46.611932]  ret_from_fork+0x10/0x20
[   46.615491] 
[   46.616966] The buggy address belongs to the object at ffff000803afab80
[   46.616966]  which belongs to the cache kmalloc-64 of size 64
[   46.629294] The buggy address is located 0 bytes to the right of
[   46.629294]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.642140] 
[   46.643616] The buggy address belongs to the physical page:
[   46.649174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.657157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.663667] page_type: f5(slab)
[   46.666802] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.674525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.682244] page dumped because: kasan: bad access detected
[   46.687799] 
[   46.689274] Memory state around the buggy address:
[   46.694055]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.701257]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.708462] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.715663]                                      ^
[   46.720441]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.727646]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.734847] ==================================================================
[   53.578920] ==================================================================
[   53.585962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.593251] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.600542] 
[   53.602023] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.602070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.602084] Hardware name: WinLink E850-96 board (DT)
[   53.602103] Call trace:
[   53.602115]  show_stack+0x20/0x38 (C)
[   53.602144]  dump_stack_lvl+0x8c/0xd0
[   53.602179]  print_report+0x118/0x608
[   53.602210]  kasan_report+0xdc/0x128
[   53.602239]  kasan_check_range+0x100/0x1a8
[   53.602270]  __kasan_check_read+0x20/0x30
[   53.602301]  kasan_atomics_helper+0xdd4/0x4858
[   53.602330]  kasan_atomics+0x198/0x2e0
[   53.602358]  kunit_try_run_case+0x170/0x3f0
[   53.602392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.602431]  kthread+0x328/0x630
[   53.602464]  ret_from_fork+0x10/0x20
[   53.602495] 
[   53.672155] Allocated by task 314:
[   53.675542]  kasan_save_stack+0x3c/0x68
[   53.679361]  kasan_save_track+0x20/0x40
[   53.683180]  kasan_save_alloc_info+0x40/0x58
[   53.687433]  __kasan_kmalloc+0xd4/0xd8
[   53.691166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.695680]  kasan_atomics+0xb8/0x2e0
[   53.699326]  kunit_try_run_case+0x170/0x3f0
[   53.703492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.708961]  kthread+0x328/0x630
[   53.712173]  ret_from_fork+0x10/0x20
[   53.715731] 
[   53.717207] The buggy address belongs to the object at ffff000803afab80
[   53.717207]  which belongs to the cache kmalloc-64 of size 64
[   53.729534] The buggy address is located 0 bytes to the right of
[   53.729534]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   53.742380] 
[   53.743857] The buggy address belongs to the physical page:
[   53.749412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   53.757398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.763908] page_type: f5(slab)
[   53.767041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.774765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.782484] page dumped because: kasan: bad access detected
[   53.788040] 
[   53.789515] Memory state around the buggy address:
[   53.794295]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.801498]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.808703] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.815904]                                      ^
[   53.820682]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.827887]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.835088] ==================================================================
[   59.372882] ==================================================================
[   59.379971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   59.387348] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.394640] 
[   59.396119] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.396163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.396179] Hardware name: WinLink E850-96 board (DT)
[   59.396197] Call trace:
[   59.396208]  show_stack+0x20/0x38 (C)
[   59.396238]  dump_stack_lvl+0x8c/0xd0
[   59.396270]  print_report+0x118/0x608
[   59.396299]  kasan_report+0xdc/0x128
[   59.396328]  __asan_report_load8_noabort+0x20/0x30
[   59.396362]  kasan_atomics_helper+0x3db0/0x4858
[   59.396391]  kasan_atomics+0x198/0x2e0
[   59.396418]  kunit_try_run_case+0x170/0x3f0
[   59.396451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.396488]  kthread+0x328/0x630
[   59.396522]  ret_from_fork+0x10/0x20
[   59.396552] 
[   59.463041] Allocated by task 314:
[   59.466426]  kasan_save_stack+0x3c/0x68
[   59.470246]  kasan_save_track+0x20/0x40
[   59.474065]  kasan_save_alloc_info+0x40/0x58
[   59.478319]  __kasan_kmalloc+0xd4/0xd8
[   59.482051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   59.486565]  kasan_atomics+0xb8/0x2e0
[   59.490211]  kunit_try_run_case+0x170/0x3f0
[   59.494378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.499846]  kthread+0x328/0x630
[   59.503058]  ret_from_fork+0x10/0x20
[   59.506617] 
[   59.508092] The buggy address belongs to the object at ffff000803afab80
[   59.508092]  which belongs to the cache kmalloc-64 of size 64
[   59.520419] The buggy address is located 0 bytes to the right of
[   59.520419]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   59.533266] 
[   59.534742] The buggy address belongs to the physical page:
[   59.540297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   59.548283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.554794] page_type: f5(slab)
[   59.557926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.565650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.573369] page dumped because: kasan: bad access detected
[   59.578925] 
[   59.580400] Memory state around the buggy address:
[   59.585181]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.592383]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.599588] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.606789]                                      ^
[   59.611567]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.618772]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.625973] ==================================================================
[   55.154573] ==================================================================
[   55.161631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   55.168922] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.176300] 
[   55.177780] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.177825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.177840] Hardware name: WinLink E850-96 board (DT)
[   55.177858] Call trace:
[   55.177870]  show_stack+0x20/0x38 (C)
[   55.177901]  dump_stack_lvl+0x8c/0xd0
[   55.177934]  print_report+0x118/0x608
[   55.177966]  kasan_report+0xdc/0x128
[   55.177992]  kasan_check_range+0x100/0x1a8
[   55.178024]  __kasan_check_write+0x20/0x30
[   55.178055]  kasan_atomics_helper+0xf88/0x4858
[   55.178084]  kasan_atomics+0x198/0x2e0
[   55.178109]  kunit_try_run_case+0x170/0x3f0
[   55.178144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.178183]  kthread+0x328/0x630
[   55.178215]  ret_from_fork+0x10/0x20
[   55.178248] 
[   55.248000] Allocated by task 314:
[   55.251386]  kasan_save_stack+0x3c/0x68
[   55.255205]  kasan_save_track+0x20/0x40
[   55.259024]  kasan_save_alloc_info+0x40/0x58
[   55.263278]  __kasan_kmalloc+0xd4/0xd8
[   55.267011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.271524]  kasan_atomics+0xb8/0x2e0
[   55.275170]  kunit_try_run_case+0x170/0x3f0
[   55.279337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.284805]  kthread+0x328/0x630
[   55.288017]  ret_from_fork+0x10/0x20
[   55.291576] 
[   55.293052] The buggy address belongs to the object at ffff000803afab80
[   55.293052]  which belongs to the cache kmalloc-64 of size 64
[   55.305378] The buggy address is located 0 bytes to the right of
[   55.305378]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.318225] 
[   55.319701] The buggy address belongs to the physical page:
[   55.325257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.333242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.339752] page_type: f5(slab)
[   55.342885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.350610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.358329] page dumped because: kasan: bad access detected
[   55.363884] 
[   55.365359] Memory state around the buggy address:
[   55.370139]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.377342]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.384547] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.391748]                                      ^
[   55.396526]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.403731]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.410932] ==================================================================
[   55.418297] ==================================================================
[   55.425344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   55.432633] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   55.440011] 
[   55.441491] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   55.441537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.441552] Hardware name: WinLink E850-96 board (DT)
[   55.441570] Call trace:
[   55.441580]  show_stack+0x20/0x38 (C)
[   55.441612]  dump_stack_lvl+0x8c/0xd0
[   55.441643]  print_report+0x118/0x608
[   55.441671]  kasan_report+0xdc/0x128
[   55.441699]  kasan_check_range+0x100/0x1a8
[   55.441729]  __kasan_check_write+0x20/0x30
[   55.441760]  kasan_atomics_helper+0xff0/0x4858
[   55.441791]  kasan_atomics+0x198/0x2e0
[   55.441818]  kunit_try_run_case+0x170/0x3f0
[   55.441851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.441889]  kthread+0x328/0x630
[   55.441920]  ret_from_fork+0x10/0x20
[   55.441950] 
[   55.511712] Allocated by task 314:
[   55.515097]  kasan_save_stack+0x3c/0x68
[   55.518916]  kasan_save_track+0x20/0x40
[   55.522736]  kasan_save_alloc_info+0x40/0x58
[   55.526989]  __kasan_kmalloc+0xd4/0xd8
[   55.530722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   55.535236]  kasan_atomics+0xb8/0x2e0
[   55.538881]  kunit_try_run_case+0x170/0x3f0
[   55.543048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.548517]  kthread+0x328/0x630
[   55.551728]  ret_from_fork+0x10/0x20
[   55.555287] 
[   55.556763] The buggy address belongs to the object at ffff000803afab80
[   55.556763]  which belongs to the cache kmalloc-64 of size 64
[   55.569089] The buggy address is located 0 bytes to the right of
[   55.569089]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   55.581936] 
[   55.583412] The buggy address belongs to the physical page:
[   55.588968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   55.596953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.603464] page_type: f5(slab)
[   55.606596] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.614321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.622040] page dumped because: kasan: bad access detected
[   55.627595] 
[   55.629071] Memory state around the buggy address:
[   55.633852]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.641054]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.648258] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.655459]                                      ^
[   55.660237]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.667442]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.674643] ==================================================================
[   50.694568] ==================================================================
[   50.701629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   50.708919] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.716297] 
[   50.717779] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.717824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.717840] Hardware name: WinLink E850-96 board (DT)
[   50.717858] Call trace:
[   50.717873]  show_stack+0x20/0x38 (C)
[   50.717902]  dump_stack_lvl+0x8c/0xd0
[   50.717936]  print_report+0x118/0x608
[   50.717966]  kasan_report+0xdc/0x128
[   50.717994]  kasan_check_range+0x100/0x1a8
[   50.718025]  __kasan_check_write+0x20/0x30
[   50.718056]  kasan_atomics_helper+0xa6c/0x4858
[   50.718085]  kasan_atomics+0x198/0x2e0
[   50.718113]  kunit_try_run_case+0x170/0x3f0
[   50.718146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.718184]  kthread+0x328/0x630
[   50.718217]  ret_from_fork+0x10/0x20
[   50.718247] 
[   50.787998] Allocated by task 314:
[   50.791383]  kasan_save_stack+0x3c/0x68
[   50.795203]  kasan_save_track+0x20/0x40
[   50.799022]  kasan_save_alloc_info+0x40/0x58
[   50.803275]  __kasan_kmalloc+0xd4/0xd8
[   50.807008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   50.811522]  kasan_atomics+0xb8/0x2e0
[   50.815168]  kunit_try_run_case+0x170/0x3f0
[   50.819334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.824803]  kthread+0x328/0x630
[   50.828015]  ret_from_fork+0x10/0x20
[   50.831574] 
[   50.833049] The buggy address belongs to the object at ffff000803afab80
[   50.833049]  which belongs to the cache kmalloc-64 of size 64
[   50.845376] The buggy address is located 0 bytes to the right of
[   50.845376]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   50.858222] 
[   50.859698] The buggy address belongs to the physical page:
[   50.865254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   50.873240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.879750] page_type: f5(slab)
[   50.882883] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.890607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.898326] page dumped because: kasan: bad access detected
[   50.903881] 
[   50.905357] Memory state around the buggy address:
[   50.910135]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.917340]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.924545] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.931745]                                      ^
[   50.936524]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.943729]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.950930] ==================================================================
[   46.217947] ==================================================================
[   46.224960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   46.232337] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   46.239715] 
[   46.241198] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   46.241247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.241262] Hardware name: WinLink E850-96 board (DT)
[   46.241282] Call trace:
[   46.241296]  show_stack+0x20/0x38 (C)
[   46.241329]  dump_stack_lvl+0x8c/0xd0
[   46.241362]  print_report+0x118/0x608
[   46.241391]  kasan_report+0xdc/0x128
[   46.241421]  __asan_report_store4_noabort+0x20/0x30
[   46.241454]  kasan_atomics_helper+0x3f94/0x4858
[   46.241481]  kasan_atomics+0x198/0x2e0
[   46.241508]  kunit_try_run_case+0x170/0x3f0
[   46.241542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.241579]  kthread+0x328/0x630
[   46.241610]  ret_from_fork+0x10/0x20
[   46.241644] 
[   46.308204] Allocated by task 314:
[   46.311591]  kasan_save_stack+0x3c/0x68
[   46.315409]  kasan_save_track+0x20/0x40
[   46.319228]  kasan_save_alloc_info+0x40/0x58
[   46.323482]  __kasan_kmalloc+0xd4/0xd8
[   46.327214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.331728]  kasan_atomics+0xb8/0x2e0
[   46.335374]  kunit_try_run_case+0x170/0x3f0
[   46.339540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.345009]  kthread+0x328/0x630
[   46.348221]  ret_from_fork+0x10/0x20
[   46.351780] 
[   46.353255] The buggy address belongs to the object at ffff000803afab80
[   46.353255]  which belongs to the cache kmalloc-64 of size 64
[   46.365582] The buggy address is located 0 bytes to the right of
[   46.365582]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   46.378428] 
[   46.379905] The buggy address belongs to the physical page:
[   46.385462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   46.393445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.399956] page_type: f5(slab)
[   46.403089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.410813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.418532] page dumped because: kasan: bad access detected
[   46.424087] 
[   46.425563] Memory state around the buggy address:
[   46.430341]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.437546]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.444751] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.451952]                                      ^
[   46.456730]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.463935]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.471136] ==================================================================
[   56.209731] ==================================================================
[   56.216824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   56.224201] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.231579] 
[   56.233059] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.233106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.233122] Hardware name: WinLink E850-96 board (DT)
[   56.233143] Call trace:
[   56.233155]  show_stack+0x20/0x38 (C)
[   56.233187]  dump_stack_lvl+0x8c/0xd0
[   56.233219]  print_report+0x118/0x608
[   56.233250]  kasan_report+0xdc/0x128
[   56.233279]  kasan_check_range+0x100/0x1a8
[   56.233312]  __kasan_check_write+0x20/0x30
[   56.233345]  kasan_atomics_helper+0x1128/0x4858
[   56.233373]  kasan_atomics+0x198/0x2e0
[   56.233399]  kunit_try_run_case+0x170/0x3f0
[   56.233431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.233469]  kthread+0x328/0x630
[   56.233502]  ret_from_fork+0x10/0x20
[   56.233529] 
[   56.303366] Allocated by task 314:
[   56.306752]  kasan_save_stack+0x3c/0x68
[   56.310571]  kasan_save_track+0x20/0x40
[   56.314391]  kasan_save_alloc_info+0x40/0x58
[   56.318644]  __kasan_kmalloc+0xd4/0xd8
[   56.322376]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.326890]  kasan_atomics+0xb8/0x2e0
[   56.330536]  kunit_try_run_case+0x170/0x3f0
[   56.334703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.340171]  kthread+0x328/0x630
[   56.343383]  ret_from_fork+0x10/0x20
[   56.346942] 
[   56.348418] The buggy address belongs to the object at ffff000803afab80
[   56.348418]  which belongs to the cache kmalloc-64 of size 64
[   56.360744] The buggy address is located 0 bytes to the right of
[   56.360744]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.373591] 
[   56.375067] The buggy address belongs to the physical page:
[   56.380623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.388608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.395119] page_type: f5(slab)
[   56.398251] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.405976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.413695] page dumped because: kasan: bad access detected
[   56.419250] 
[   56.420725] Memory state around the buggy address:
[   56.425505]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.432709]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.439913] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.447114]                                      ^
[   56.451892]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.459097]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.466298] ==================================================================
[   59.897211] ==================================================================
[   59.904270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   59.911646] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   59.918937] 
[   59.920419] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   59.920466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.920481] Hardware name: WinLink E850-96 board (DT)
[   59.920499] Call trace:
[   59.920511]  show_stack+0x20/0x38 (C)
[   59.920543]  dump_stack_lvl+0x8c/0xd0
[   59.920575]  print_report+0x118/0x608
[   59.920604]  kasan_report+0xdc/0x128
[   59.920632]  __asan_report_load8_noabort+0x20/0x30
[   59.920666]  kasan_atomics_helper+0x3df4/0x4858
[   59.920697]  kasan_atomics+0x198/0x2e0
[   59.920724]  kunit_try_run_case+0x170/0x3f0
[   59.920760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.920797]  kthread+0x328/0x630
[   59.920829]  ret_from_fork+0x10/0x20
[   59.920861] 
[   59.987340] Allocated by task 314:
[   59.990725]  kasan_save_stack+0x3c/0x68
[   59.994544]  kasan_save_track+0x20/0x40
[   59.998363]  kasan_save_alloc_info+0x40/0x58
[   60.002617]  __kasan_kmalloc+0xd4/0xd8
[   60.006349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.010863]  kasan_atomics+0xb8/0x2e0
[   60.014509]  kunit_try_run_case+0x170/0x3f0
[   60.018675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.024144]  kthread+0x328/0x630
[   60.027356]  ret_from_fork+0x10/0x20
[   60.030915] 
[   60.032390] The buggy address belongs to the object at ffff000803afab80
[   60.032390]  which belongs to the cache kmalloc-64 of size 64
[   60.044717] The buggy address is located 0 bytes to the right of
[   60.044717]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.057563] 
[   60.059039] The buggy address belongs to the physical page:
[   60.064595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.072581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.079091] page_type: f5(slab)
[   60.082224] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.089948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.097667] page dumped because: kasan: bad access detected
[   60.103222] 
[   60.104698] Memory state around the buggy address:
[   60.109476]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.116681]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.123886] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.131087]                                      ^
[   60.135865]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.143069]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.150272] ==================================================================
[   57.529209] ==================================================================
[   57.536249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   57.543626] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.551004] 
[   57.552484] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.552532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.552547] Hardware name: WinLink E850-96 board (DT)
[   57.552566] Call trace:
[   57.552578]  show_stack+0x20/0x38 (C)
[   57.552612]  dump_stack_lvl+0x8c/0xd0
[   57.552645]  print_report+0x118/0x608
[   57.552672]  kasan_report+0xdc/0x128
[   57.552700]  kasan_check_range+0x100/0x1a8
[   57.552731]  __kasan_check_write+0x20/0x30
[   57.552762]  kasan_atomics_helper+0x1384/0x4858
[   57.552792]  kasan_atomics+0x198/0x2e0
[   57.552819]  kunit_try_run_case+0x170/0x3f0
[   57.552852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.552889]  kthread+0x328/0x630
[   57.552922]  ret_from_fork+0x10/0x20
[   57.552956] 
[   57.622791] Allocated by task 314:
[   57.626177]  kasan_save_stack+0x3c/0x68
[   57.629996]  kasan_save_track+0x20/0x40
[   57.633815]  kasan_save_alloc_info+0x40/0x58
[   57.638069]  __kasan_kmalloc+0xd4/0xd8
[   57.641801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.646315]  kasan_atomics+0xb8/0x2e0
[   57.649961]  kunit_try_run_case+0x170/0x3f0
[   57.654127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.659596]  kthread+0x328/0x630
[   57.662808]  ret_from_fork+0x10/0x20
[   57.666367] 
[   57.667842] The buggy address belongs to the object at ffff000803afab80
[   57.667842]  which belongs to the cache kmalloc-64 of size 64
[   57.680169] The buggy address is located 0 bytes to the right of
[   57.680169]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.693016] 
[   57.694491] The buggy address belongs to the physical page:
[   57.700047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.708033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.714543] page_type: f5(slab)
[   57.717676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.725400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.733119] page dumped because: kasan: bad access detected
[   57.738674] 
[   57.740150] Memory state around the buggy address:
[   57.744928]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.752133]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.759338] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.766539]                                      ^
[   57.771317]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.778522]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.785722] ==================================================================
[   60.681930] ==================================================================
[   60.688979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   60.696356] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   60.703734] 
[   60.705216] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   60.705263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.705279] Hardware name: WinLink E850-96 board (DT)
[   60.705296] Call trace:
[   60.705307]  show_stack+0x20/0x38 (C)
[   60.705339]  dump_stack_lvl+0x8c/0xd0
[   60.705370]  print_report+0x118/0x608
[   60.705401]  kasan_report+0xdc/0x128
[   60.705429]  kasan_check_range+0x100/0x1a8
[   60.705461]  __kasan_check_write+0x20/0x30
[   60.705493]  kasan_atomics_helper+0x175c/0x4858
[   60.705521]  kasan_atomics+0x198/0x2e0
[   60.705548]  kunit_try_run_case+0x170/0x3f0
[   60.705583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.705620]  kthread+0x328/0x630
[   60.705651]  ret_from_fork+0x10/0x20
[   60.705679] 
[   60.775521] Allocated by task 314:
[   60.778907]  kasan_save_stack+0x3c/0x68
[   60.782726]  kasan_save_track+0x20/0x40
[   60.786545]  kasan_save_alloc_info+0x40/0x58
[   60.790799]  __kasan_kmalloc+0xd4/0xd8
[   60.794531]  __kmalloc_cache_noprof+0x16c/0x3c0
[   60.799045]  kasan_atomics+0xb8/0x2e0
[   60.802691]  kunit_try_run_case+0x170/0x3f0
[   60.806857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.812326]  kthread+0x328/0x630
[   60.815538]  ret_from_fork+0x10/0x20
[   60.819097] 
[   60.820573] The buggy address belongs to the object at ffff000803afab80
[   60.820573]  which belongs to the cache kmalloc-64 of size 64
[   60.832899] The buggy address is located 0 bytes to the right of
[   60.832899]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   60.845746] 
[   60.847222] The buggy address belongs to the physical page:
[   60.852778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   60.860763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.867274] page_type: f5(slab)
[   60.870408] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.878131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.885850] page dumped because: kasan: bad access detected
[   60.891405] 
[   60.892880] Memory state around the buggy address:
[   60.897659]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.904864]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.912068] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.919269]                                      ^
[   60.924047]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.931252]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.938453] ==================================================================
[   47.533354] ==================================================================
[   47.540393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   47.547682] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   47.555060] 
[   47.556542] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   47.556587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.556602] Hardware name: WinLink E850-96 board (DT)
[   47.556622] Call trace:
[   47.556636]  show_stack+0x20/0x38 (C)
[   47.556666]  dump_stack_lvl+0x8c/0xd0
[   47.556702]  print_report+0x118/0x608
[   47.556731]  kasan_report+0xdc/0x128
[   47.556759]  kasan_check_range+0x100/0x1a8
[   47.556789]  __kasan_check_write+0x20/0x30
[   47.556822]  kasan_atomics_helper+0x54c/0x4858
[   47.556851]  kasan_atomics+0x198/0x2e0
[   47.556879]  kunit_try_run_case+0x170/0x3f0
[   47.556914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.556951]  kthread+0x328/0x630
[   47.556982]  ret_from_fork+0x10/0x20
[   47.557014] 
[   47.626761] Allocated by task 314:
[   47.630146]  kasan_save_stack+0x3c/0x68
[   47.633965]  kasan_save_track+0x20/0x40
[   47.637785]  kasan_save_alloc_info+0x40/0x58
[   47.642038]  __kasan_kmalloc+0xd4/0xd8
[   47.645771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   47.650284]  kasan_atomics+0xb8/0x2e0
[   47.653930]  kunit_try_run_case+0x170/0x3f0
[   47.658097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.663565]  kthread+0x328/0x630
[   47.666777]  ret_from_fork+0x10/0x20
[   47.670336] 
[   47.671812] The buggy address belongs to the object at ffff000803afab80
[   47.671812]  which belongs to the cache kmalloc-64 of size 64
[   47.684139] The buggy address is located 0 bytes to the right of
[   47.684139]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   47.696985] 
[   47.698461] The buggy address belongs to the physical page:
[   47.704017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   47.712003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.718513] page_type: f5(slab)
[   47.721645] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.729370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.737089] page dumped because: kasan: bad access detected
[   47.742644] 
[   47.744120] Memory state around the buggy address:
[   47.748898]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.756103]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.763307] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.770508]                                      ^
[   47.775286]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.782491]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.789692] ==================================================================
[   50.958276] ==================================================================
[   50.965340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   50.972631] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   50.980009] 
[   50.981490] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   50.981537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.981551] Hardware name: WinLink E850-96 board (DT)
[   50.981569] Call trace:
[   50.981580]  show_stack+0x20/0x38 (C)
[   50.981610]  dump_stack_lvl+0x8c/0xd0
[   50.981645]  print_report+0x118/0x608
[   50.981675]  kasan_report+0xdc/0x128
[   50.981703]  kasan_check_range+0x100/0x1a8
[   50.981735]  __kasan_check_write+0x20/0x30
[   50.981767]  kasan_atomics_helper+0xad4/0x4858
[   50.981798]  kasan_atomics+0x198/0x2e0
[   50.981825]  kunit_try_run_case+0x170/0x3f0
[   50.981862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.981901]  kthread+0x328/0x630
[   50.981933]  ret_from_fork+0x10/0x20
[   50.981963] 
[   51.051709] Allocated by task 314:
[   51.055095]  kasan_save_stack+0x3c/0x68
[   51.058914]  kasan_save_track+0x20/0x40
[   51.062733]  kasan_save_alloc_info+0x40/0x58
[   51.066987]  __kasan_kmalloc+0xd4/0xd8
[   51.070719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   51.075233]  kasan_atomics+0xb8/0x2e0
[   51.078879]  kunit_try_run_case+0x170/0x3f0
[   51.083045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.088514]  kthread+0x328/0x630
[   51.091726]  ret_from_fork+0x10/0x20
[   51.095285] 
[   51.096760] The buggy address belongs to the object at ffff000803afab80
[   51.096760]  which belongs to the cache kmalloc-64 of size 64
[   51.109087] The buggy address is located 0 bytes to the right of
[   51.109087]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   51.121934] 
[   51.123410] The buggy address belongs to the physical page:
[   51.128965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   51.136951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.143461] page_type: f5(slab)
[   51.146595] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.154318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.162037] page dumped because: kasan: bad access detected
[   51.167593] 
[   51.169068] Memory state around the buggy address:
[   51.173848]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.181051]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.188256] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.195457]                                      ^
[   51.200235]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.207440]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.214641] ==================================================================
[   48.060792] ==================================================================
[   48.067814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   48.075105] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.082483] 
[   48.083964] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.084010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.084024] Hardware name: WinLink E850-96 board (DT)
[   48.084044] Call trace:
[   48.084057]  show_stack+0x20/0x38 (C)
[   48.084089]  dump_stack_lvl+0x8c/0xd0
[   48.084123]  print_report+0x118/0x608
[   48.084154]  kasan_report+0xdc/0x128
[   48.084182]  kasan_check_range+0x100/0x1a8
[   48.084212]  __kasan_check_write+0x20/0x30
[   48.084245]  kasan_atomics_helper+0x61c/0x4858
[   48.084274]  kasan_atomics+0x198/0x2e0
[   48.084301]  kunit_try_run_case+0x170/0x3f0
[   48.084338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.084375]  kthread+0x328/0x630
[   48.084406]  ret_from_fork+0x10/0x20
[   48.084437] 
[   48.154183] Allocated by task 314:
[   48.157569]  kasan_save_stack+0x3c/0x68
[   48.161388]  kasan_save_track+0x20/0x40
[   48.165207]  kasan_save_alloc_info+0x40/0x58
[   48.169461]  __kasan_kmalloc+0xd4/0xd8
[   48.173193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.177707]  kasan_atomics+0xb8/0x2e0
[   48.181353]  kunit_try_run_case+0x170/0x3f0
[   48.185520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.190988]  kthread+0x328/0x630
[   48.194200]  ret_from_fork+0x10/0x20
[   48.197759] 
[   48.199234] The buggy address belongs to the object at ffff000803afab80
[   48.199234]  which belongs to the cache kmalloc-64 of size 64
[   48.211561] The buggy address is located 0 bytes to the right of
[   48.211561]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.224408] 
[   48.225884] The buggy address belongs to the physical page:
[   48.231440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.239425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.245935] page_type: f5(slab)
[   48.249068] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.256792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.264511] page dumped because: kasan: bad access detected
[   48.270067] 
[   48.271542] Memory state around the buggy address:
[   48.276324]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.283526]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.290730] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.297931]                                      ^
[   48.302709]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.309914]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.317115] ==================================================================
[   52.794357] ==================================================================
[   52.801425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   52.808801] Read of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   52.816092] 
[   52.817573] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   52.817620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.817636] Hardware name: WinLink E850-96 board (DT)
[   52.817655] Call trace:
[   52.817665]  show_stack+0x20/0x38 (C)
[   52.817695]  dump_stack_lvl+0x8c/0xd0
[   52.817728]  print_report+0x118/0x608
[   52.817757]  kasan_report+0xdc/0x128
[   52.817787]  __asan_report_load4_noabort+0x20/0x30
[   52.817820]  kasan_atomics_helper+0x3dd8/0x4858
[   52.817851]  kasan_atomics+0x198/0x2e0
[   52.817877]  kunit_try_run_case+0x170/0x3f0
[   52.817911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.817949]  kthread+0x328/0x630
[   52.817981]  ret_from_fork+0x10/0x20
[   52.818014] 
[   52.884494] Allocated by task 314:
[   52.887879]  kasan_save_stack+0x3c/0x68
[   52.891699]  kasan_save_track+0x20/0x40
[   52.895518]  kasan_save_alloc_info+0x40/0x58
[   52.899772]  __kasan_kmalloc+0xd4/0xd8
[   52.903504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   52.908018]  kasan_atomics+0xb8/0x2e0
[   52.911664]  kunit_try_run_case+0x170/0x3f0
[   52.915830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.921299]  kthread+0x328/0x630
[   52.924511]  ret_from_fork+0x10/0x20
[   52.928070] 
[   52.929545] The buggy address belongs to the object at ffff000803afab80
[   52.929545]  which belongs to the cache kmalloc-64 of size 64
[   52.941872] The buggy address is located 0 bytes to the right of
[   52.941872]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   52.954719] 
[   52.956195] The buggy address belongs to the physical page:
[   52.961751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   52.969736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.976246] page_type: f5(slab)
[   52.979379] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.987103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.994822] page dumped because: kasan: bad access detected
[   53.000378] 
[   53.001853] Memory state around the buggy address:
[   53.006633]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.013836]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.021041] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.028242]                                      ^
[   53.033020]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.040225]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.047427] ==================================================================
[   58.581273] ==================================================================
[   58.588316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   58.595693] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   58.603072] 
[   58.604552] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   58.604597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.604613] Hardware name: WinLink E850-96 board (DT)
[   58.604631] Call trace:
[   58.604643]  show_stack+0x20/0x38 (C)
[   58.604672]  dump_stack_lvl+0x8c/0xd0
[   58.604705]  print_report+0x118/0x608
[   58.604735]  kasan_report+0xdc/0x128
[   58.604762]  kasan_check_range+0x100/0x1a8
[   58.604794]  __kasan_check_write+0x20/0x30
[   58.604826]  kasan_atomics_helper+0x14e4/0x4858
[   58.604855]  kasan_atomics+0x198/0x2e0
[   58.604881]  kunit_try_run_case+0x170/0x3f0
[   58.604914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.604951]  kthread+0x328/0x630
[   58.604983]  ret_from_fork+0x10/0x20
[   58.605011] 
[   58.674858] Allocated by task 314:
[   58.678244]  kasan_save_stack+0x3c/0x68
[   58.682063]  kasan_save_track+0x20/0x40
[   58.685883]  kasan_save_alloc_info+0x40/0x58
[   58.690136]  __kasan_kmalloc+0xd4/0xd8
[   58.693869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   58.698383]  kasan_atomics+0xb8/0x2e0
[   58.702028]  kunit_try_run_case+0x170/0x3f0
[   58.706195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.711664]  kthread+0x328/0x630
[   58.714875]  ret_from_fork+0x10/0x20
[   58.718434] 
[   58.719910] The buggy address belongs to the object at ffff000803afab80
[   58.719910]  which belongs to the cache kmalloc-64 of size 64
[   58.732237] The buggy address is located 0 bytes to the right of
[   58.732237]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   58.745083] 
[   58.746559] The buggy address belongs to the physical page:
[   58.752115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   58.760101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.766611] page_type: f5(slab)
[   58.769743] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.777468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.785187] page dumped because: kasan: bad access detected
[   58.790742] 
[   58.792218] Memory state around the buggy address:
[   58.796997]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.804201]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.811406] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.818606]                                      ^
[   58.823385]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.830589]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.837790] ==================================================================
[   53.842441] ==================================================================
[   53.849498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.856876] Read of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   53.864167] 
[   53.865648] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   53.865694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.865709] Hardware name: WinLink E850-96 board (DT)
[   53.865727] Call trace:
[   53.865739]  show_stack+0x20/0x38 (C)
[   53.865771]  dump_stack_lvl+0x8c/0xd0
[   53.865805]  print_report+0x118/0x608
[   53.865835]  kasan_report+0xdc/0x128
[   53.865863]  __asan_report_load8_noabort+0x20/0x30
[   53.865897]  kasan_atomics_helper+0x3f58/0x4858
[   53.865928]  kasan_atomics+0x198/0x2e0
[   53.865955]  kunit_try_run_case+0x170/0x3f0
[   53.865990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.866026]  kthread+0x328/0x630
[   53.866058]  ret_from_fork+0x10/0x20
[   53.866089] 
[   53.932569] Allocated by task 314:
[   53.935954]  kasan_save_stack+0x3c/0x68
[   53.939774]  kasan_save_track+0x20/0x40
[   53.943593]  kasan_save_alloc_info+0x40/0x58
[   53.947846]  __kasan_kmalloc+0xd4/0xd8
[   53.951579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   53.956093]  kasan_atomics+0xb8/0x2e0
[   53.959738]  kunit_try_run_case+0x170/0x3f0
[   53.963905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.969374]  kthread+0x328/0x630
[   53.972585]  ret_from_fork+0x10/0x20
[   53.976144] 
[   53.977620] The buggy address belongs to the object at ffff000803afab80
[   53.977620]  which belongs to the cache kmalloc-64 of size 64
[   53.989947] The buggy address is located 0 bytes to the right of
[   53.989947]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   54.002793] 
[   54.004270] The buggy address belongs to the physical page:
[   54.009825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   54.017811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.024321] page_type: f5(slab)
[   54.027453] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.035178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.042897] page dumped because: kasan: bad access detected
[   54.048452] 
[   54.049928] Memory state around the buggy address:
[   54.054707]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.061911]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.069116] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.076317]                                      ^
[   54.081094]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.088299]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.095500] ==================================================================
[   56.737533] ==================================================================
[   56.744594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   56.751971] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   56.759349] 
[   56.760829] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   56.760876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.760891] Hardware name: WinLink E850-96 board (DT)
[   56.760908] Call trace:
[   56.760920]  show_stack+0x20/0x38 (C)
[   56.760950]  dump_stack_lvl+0x8c/0xd0
[   56.760980]  print_report+0x118/0x608
[   56.761012]  kasan_report+0xdc/0x128
[   56.761038]  kasan_check_range+0x100/0x1a8
[   56.761069]  __kasan_check_write+0x20/0x30
[   56.761102]  kasan_atomics_helper+0x11f8/0x4858
[   56.761130]  kasan_atomics+0x198/0x2e0
[   56.761157]  kunit_try_run_case+0x170/0x3f0
[   56.761189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.761227]  kthread+0x328/0x630
[   56.761258]  ret_from_fork+0x10/0x20
[   56.761289] 
[   56.831136] Allocated by task 314:
[   56.834522]  kasan_save_stack+0x3c/0x68
[   56.838341]  kasan_save_track+0x20/0x40
[   56.842160]  kasan_save_alloc_info+0x40/0x58
[   56.846414]  __kasan_kmalloc+0xd4/0xd8
[   56.850146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   56.854660]  kasan_atomics+0xb8/0x2e0
[   56.858306]  kunit_try_run_case+0x170/0x3f0
[   56.862472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.867941]  kthread+0x328/0x630
[   56.871153]  ret_from_fork+0x10/0x20
[   56.874712] 
[   56.876188] The buggy address belongs to the object at ffff000803afab80
[   56.876188]  which belongs to the cache kmalloc-64 of size 64
[   56.888514] The buggy address is located 0 bytes to the right of
[   56.888514]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   56.901361] 
[   56.902837] The buggy address belongs to the physical page:
[   56.908393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   56.916378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.922888] page_type: f5(slab)
[   56.926021] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.933745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.941465] page dumped because: kasan: bad access detected
[   56.947020] 
[   56.948495] Memory state around the buggy address:
[   56.953274]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.960479]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.967683] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.974884]                                      ^
[   56.979662]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.986867]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.994068] ==================================================================
[   57.265299] ==================================================================
[   57.272365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   57.279741] Write of size 8 at addr ffff000803afabb0 by task kunit_try_catch/314
[   57.287119] 
[   57.288599] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   57.288645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.288662] Hardware name: WinLink E850-96 board (DT)
[   57.288678] Call trace:
[   57.288692]  show_stack+0x20/0x38 (C)
[   57.288725]  dump_stack_lvl+0x8c/0xd0
[   57.288757]  print_report+0x118/0x608
[   57.288787]  kasan_report+0xdc/0x128
[   57.288815]  kasan_check_range+0x100/0x1a8
[   57.288845]  __kasan_check_write+0x20/0x30
[   57.288879]  kasan_atomics_helper+0x12d8/0x4858
[   57.288907]  kasan_atomics+0x198/0x2e0
[   57.288935]  kunit_try_run_case+0x170/0x3f0
[   57.288967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.289004]  kthread+0x328/0x630
[   57.289037]  ret_from_fork+0x10/0x20
[   57.289069] 
[   57.358906] Allocated by task 314:
[   57.362292]  kasan_save_stack+0x3c/0x68
[   57.366111]  kasan_save_track+0x20/0x40
[   57.369930]  kasan_save_alloc_info+0x40/0x58
[   57.374184]  __kasan_kmalloc+0xd4/0xd8
[   57.377916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   57.382430]  kasan_atomics+0xb8/0x2e0
[   57.386076]  kunit_try_run_case+0x170/0x3f0
[   57.390242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.395711]  kthread+0x328/0x630
[   57.398923]  ret_from_fork+0x10/0x20
[   57.402482] 
[   57.403957] The buggy address belongs to the object at ffff000803afab80
[   57.403957]  which belongs to the cache kmalloc-64 of size 64
[   57.416284] The buggy address is located 0 bytes to the right of
[   57.416284]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   57.429131] 
[   57.430606] The buggy address belongs to the physical page:
[   57.436163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   57.444148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.450658] page_type: f5(slab)
[   57.453791] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.461516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.469234] page dumped because: kasan: bad access detected
[   57.474790] 
[   57.476265] Memory state around the buggy address:
[   57.481044]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.488248]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.495453] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.502654]                                      ^
[   57.507432]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.514637]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.521838] ==================================================================
[   48.324435] ==================================================================
[   48.331526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   48.338816] Write of size 4 at addr ffff000803afabb0 by task kunit_try_catch/314
[   48.346194] 
[   48.347675] CPU: 5 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   48.347720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.347736] Hardware name: WinLink E850-96 board (DT)
[   48.347755] Call trace:
[   48.347765]  show_stack+0x20/0x38 (C)
[   48.347796]  dump_stack_lvl+0x8c/0xd0
[   48.347830]  print_report+0x118/0x608
[   48.347862]  kasan_report+0xdc/0x128
[   48.347889]  kasan_check_range+0x100/0x1a8
[   48.347922]  __kasan_check_write+0x20/0x30
[   48.347955]  kasan_atomics_helper+0x684/0x4858
[   48.347983]  kasan_atomics+0x198/0x2e0
[   48.348009]  kunit_try_run_case+0x170/0x3f0
[   48.348044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.348081]  kthread+0x328/0x630
[   48.348113]  ret_from_fork+0x10/0x20
[   48.348145] 
[   48.417894] Allocated by task 314:
[   48.421280]  kasan_save_stack+0x3c/0x68
[   48.425100]  kasan_save_track+0x20/0x40
[   48.428919]  kasan_save_alloc_info+0x40/0x58
[   48.433172]  __kasan_kmalloc+0xd4/0xd8
[   48.436904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.441418]  kasan_atomics+0xb8/0x2e0
[   48.445064]  kunit_try_run_case+0x170/0x3f0
[   48.449231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.454699]  kthread+0x328/0x630
[   48.457911]  ret_from_fork+0x10/0x20
[   48.461470] 
[   48.462945] The buggy address belongs to the object at ffff000803afab80
[   48.462945]  which belongs to the cache kmalloc-64 of size 64
[   48.475272] The buggy address is located 0 bytes to the right of
[   48.475272]  allocated 48-byte region [ffff000803afab80, ffff000803afabb0)
[   48.488119] 
[   48.489595] The buggy address belongs to the physical page:
[   48.495151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883afa
[   48.503137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.509647] page_type: f5(slab)
[   48.512779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.520504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.528223] page dumped because: kasan: bad access detected
[   48.533778] 
[   48.535254] Memory state around the buggy address:
[   48.540033]  ffff000803afaa80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.547237]  ffff000803afab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.554441] >ffff000803afab80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.561642]                                      ^
[   48.566420]  ffff000803afac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.573625]  ffff000803afac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.580826] ==================================================================

[   18.453258] ==================================================================
[   18.453320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.453412] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.453515] 
[   18.453552] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.453789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.453818] Hardware name: linux,dummy-virt (DT)
[   18.454040] Call trace:
[   18.454378]  show_stack+0x20/0x38 (C)
[   18.454530]  dump_stack_lvl+0x8c/0xd0
[   18.454583]  print_report+0x118/0x608
[   18.454685]  kasan_report+0xdc/0x128
[   18.454774]  kasan_check_range+0x100/0x1a8
[   18.454954]  __kasan_check_write+0x20/0x30
[   18.455008]  kasan_atomics_helper+0x154c/0x4858
[   18.455341]  kasan_atomics+0x198/0x2e0
[   18.455410]  kunit_try_run_case+0x170/0x3f0
[   18.455495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.455550]  kthread+0x328/0x630
[   18.455883]  ret_from_fork+0x10/0x20
[   18.455958] 
[   18.456250] Allocated by task 270:
[   18.456344]  kasan_save_stack+0x3c/0x68
[   18.456515]  kasan_save_track+0x20/0x40
[   18.456882]  kasan_save_alloc_info+0x40/0x58
[   18.457204]  __kasan_kmalloc+0xd4/0xd8
[   18.457331]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.457441]  kasan_atomics+0xb8/0x2e0
[   18.457476]  kunit_try_run_case+0x170/0x3f0
[   18.457868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.457948]  kthread+0x328/0x630
[   18.458115]  ret_from_fork+0x10/0x20
[   18.458465] 
[   18.458606] The buggy address belongs to the object at fff00000c7948980
[   18.458606]  which belongs to the cache kmalloc-64 of size 64
[   18.458984] The buggy address is located 0 bytes to the right of
[   18.458984]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.459062] 
[   18.459084] The buggy address belongs to the physical page:
[   18.459118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.459390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.459786] page_type: f5(slab)
[   18.459882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.460277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.460343] page dumped because: kasan: bad access detected
[   18.460380] 
[   18.460409] Memory state around the buggy address:
[   18.460460]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.460663]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.460878] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.460963]                                      ^
[   18.461024]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.461399]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.461477] ==================================================================
[   18.204711] ==================================================================
[   18.204768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   18.205097] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.205322] 
[   18.205367] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.205520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.205578] Hardware name: linux,dummy-virt (DT)
[   18.205615] Call trace:
[   18.205808]  show_stack+0x20/0x38 (C)
[   18.205893]  dump_stack_lvl+0x8c/0xd0
[   18.205950]  print_report+0x118/0x608
[   18.206000]  kasan_report+0xdc/0x128
[   18.206324]  kasan_check_range+0x100/0x1a8
[   18.206689]  __kasan_check_write+0x20/0x30
[   18.207007]  kasan_atomics_helper+0xad4/0x4858
[   18.207079]  kasan_atomics+0x198/0x2e0
[   18.207439]  kunit_try_run_case+0x170/0x3f0
[   18.207516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.207600]  kthread+0x328/0x630
[   18.207673]  ret_from_fork+0x10/0x20
[   18.207722] 
[   18.207978] Allocated by task 270:
[   18.208070]  kasan_save_stack+0x3c/0x68
[   18.208398]  kasan_save_track+0x20/0x40
[   18.208744]  kasan_save_alloc_info+0x40/0x58
[   18.208967]  __kasan_kmalloc+0xd4/0xd8
[   18.209049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.209449]  kasan_atomics+0xb8/0x2e0
[   18.209520]  kunit_try_run_case+0x170/0x3f0
[   18.209666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.209717]  kthread+0x328/0x630
[   18.210089]  ret_from_fork+0x10/0x20
[   18.210171] 
[   18.210392] The buggy address belongs to the object at fff00000c7948980
[   18.210392]  which belongs to the cache kmalloc-64 of size 64
[   18.210548] The buggy address is located 0 bytes to the right of
[   18.210548]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.210621] 
[   18.210654] The buggy address belongs to the physical page:
[   18.210936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.211270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.211349] page_type: f5(slab)
[   18.211487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.211553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.211604] page dumped because: kasan: bad access detected
[   18.211700] 
[   18.211723] Memory state around the buggy address:
[   18.211774]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.211819]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.211865] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.211905]                                      ^
[   18.212203]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.212295]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.212772] ==================================================================
[   18.388569] ==================================================================
[   18.388783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.388855] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.389040] 
[   18.389076] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.389396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.389466] Hardware name: linux,dummy-virt (DT)
[   18.389501] Call trace:
[   18.389667]  show_stack+0x20/0x38 (C)
[   18.389748]  dump_stack_lvl+0x8c/0xd0
[   18.389800]  print_report+0x118/0x608
[   18.389844]  kasan_report+0xdc/0x128
[   18.389890]  kasan_check_range+0x100/0x1a8
[   18.389937]  __kasan_check_write+0x20/0x30
[   18.389987]  kasan_atomics_helper+0x11f8/0x4858
[   18.390106]  kasan_atomics+0x198/0x2e0
[   18.390156]  kunit_try_run_case+0x170/0x3f0
[   18.390206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.390261]  kthread+0x328/0x630
[   18.390312]  ret_from_fork+0x10/0x20
[   18.390361] 
[   18.390392] Allocated by task 270:
[   18.390423]  kasan_save_stack+0x3c/0x68
[   18.390462]  kasan_save_track+0x20/0x40
[   18.390501]  kasan_save_alloc_info+0x40/0x58
[   18.390540]  __kasan_kmalloc+0xd4/0xd8
[   18.390577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.390614]  kasan_atomics+0xb8/0x2e0
[   18.391109]  kunit_try_run_case+0x170/0x3f0
[   18.391377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.391447]  kthread+0x328/0x630
[   18.391493]  ret_from_fork+0x10/0x20
[   18.391530] 
[   18.391964] The buggy address belongs to the object at fff00000c7948980
[   18.391964]  which belongs to the cache kmalloc-64 of size 64
[   18.392332] The buggy address is located 0 bytes to the right of
[   18.392332]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.392475] 
[   18.392869] The buggy address belongs to the physical page:
[   18.393034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.393216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.393310] page_type: f5(slab)
[   18.393699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.393823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.394067] page dumped because: kasan: bad access detected
[   18.394148] 
[   18.394236] Memory state around the buggy address:
[   18.394549]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.394694]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.394782] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.394822]                                      ^
[   18.395133]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.395210]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.395394] ==================================================================
[   18.339382] ==================================================================
[   18.339505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.339874] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.339937] 
[   18.340388] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.340540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.340607] Hardware name: linux,dummy-virt (DT)
[   18.340770] Call trace:
[   18.340850]  show_stack+0x20/0x38 (C)
[   18.341069]  dump_stack_lvl+0x8c/0xd0
[   18.341127]  print_report+0x118/0x608
[   18.341360]  kasan_report+0xdc/0x128
[   18.341541]  kasan_check_range+0x100/0x1a8
[   18.341937]  __kasan_check_write+0x20/0x30
[   18.342046]  kasan_atomics_helper+0xf88/0x4858
[   18.342176]  kasan_atomics+0x198/0x2e0
[   18.342288]  kunit_try_run_case+0x170/0x3f0
[   18.342369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.342424]  kthread+0x328/0x630
[   18.342472]  ret_from_fork+0x10/0x20
[   18.343169] 
[   18.343209] Allocated by task 270:
[   18.343326]  kasan_save_stack+0x3c/0x68
[   18.343405]  kasan_save_track+0x20/0x40
[   18.343775]  kasan_save_alloc_info+0x40/0x58
[   18.343980]  __kasan_kmalloc+0xd4/0xd8
[   18.344065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.344146]  kasan_atomics+0xb8/0x2e0
[   18.344224]  kunit_try_run_case+0x170/0x3f0
[   18.344625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.344791]  kthread+0x328/0x630
[   18.344836]  ret_from_fork+0x10/0x20
[   18.344876] 
[   18.345086] The buggy address belongs to the object at fff00000c7948980
[   18.345086]  which belongs to the cache kmalloc-64 of size 64
[   18.345280] The buggy address is located 0 bytes to the right of
[   18.345280]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.345668] 
[   18.345698] The buggy address belongs to the physical page:
[   18.345733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.345788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.345839] page_type: f5(slab)
[   18.345897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.345949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.345998] page dumped because: kasan: bad access detected
[   18.346041] 
[   18.346071] Memory state around the buggy address:
[   18.346108]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.346153]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.346199] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.346237]                                      ^
[   18.346288]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.346346]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.346397] ==================================================================
[   18.500557] ==================================================================
[   18.500609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.500680] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.500732] 
[   18.500774] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.501045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.501095] Hardware name: linux,dummy-virt (DT)
[   18.501156] Call trace:
[   18.501431]  show_stack+0x20/0x38 (C)
[   18.501594]  dump_stack_lvl+0x8c/0xd0
[   18.501839]  print_report+0x118/0x608
[   18.501910]  kasan_report+0xdc/0x128
[   18.502379]  __asan_report_load8_noabort+0x20/0x30
[   18.502525]  kasan_atomics_helper+0x3e10/0x4858
[   18.502900]  kasan_atomics+0x198/0x2e0
[   18.502970]  kunit_try_run_case+0x170/0x3f0
[   18.503021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.503094]  kthread+0x328/0x630
[   18.503190]  ret_from_fork+0x10/0x20
[   18.503280] 
[   18.503329] Allocated by task 270:
[   18.503397]  kasan_save_stack+0x3c/0x68
[   18.503677]  kasan_save_track+0x20/0x40
[   18.503757]  kasan_save_alloc_info+0x40/0x58
[   18.503838]  __kasan_kmalloc+0xd4/0xd8
[   18.503881]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.503920]  kasan_atomics+0xb8/0x2e0
[   18.503956]  kunit_try_run_case+0x170/0x3f0
[   18.504411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.504574]  kthread+0x328/0x630
[   18.504719]  ret_from_fork+0x10/0x20
[   18.504771] 
[   18.504798] The buggy address belongs to the object at fff00000c7948980
[   18.504798]  which belongs to the cache kmalloc-64 of size 64
[   18.504865] The buggy address is located 0 bytes to the right of
[   18.504865]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.504931] 
[   18.505256] The buggy address belongs to the physical page:
[   18.505364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.505720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.505788] page_type: f5(slab)
[   18.505829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.506107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.506499] page dumped because: kasan: bad access detected
[   18.506573] 
[   18.506623] Memory state around the buggy address:
[   18.506783]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.506833]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.507146] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.507229]                                      ^
[   18.507435]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507617]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.507738] ==================================================================
[   18.315101] ==================================================================
[   18.315449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.315526] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.315643] 
[   18.315679] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.315759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.315788] Hardware name: linux,dummy-virt (DT)
[   18.315945] Call trace:
[   18.316006]  show_stack+0x20/0x38 (C)
[   18.316318]  dump_stack_lvl+0x8c/0xd0
[   18.316487]  print_report+0x118/0x608
[   18.316660]  kasan_report+0xdc/0x128
[   18.316779]  __asan_report_store8_noabort+0x20/0x30
[   18.316968]  kasan_atomics_helper+0x3e5c/0x4858
[   18.317137]  kasan_atomics+0x198/0x2e0
[   18.317264]  kunit_try_run_case+0x170/0x3f0
[   18.317390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.317841]  kthread+0x328/0x630
[   18.317964]  ret_from_fork+0x10/0x20
[   18.318202] 
[   18.318521] Allocated by task 270:
[   18.318581]  kasan_save_stack+0x3c/0x68
[   18.318890]  kasan_save_track+0x20/0x40
[   18.318966]  kasan_save_alloc_info+0x40/0x58
[   18.319139]  __kasan_kmalloc+0xd4/0xd8
[   18.319435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.319622]  kasan_atomics+0xb8/0x2e0
[   18.319779]  kunit_try_run_case+0x170/0x3f0
[   18.319843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.320256]  kthread+0x328/0x630
[   18.320341]  ret_from_fork+0x10/0x20
[   18.320711] 
[   18.320738] The buggy address belongs to the object at fff00000c7948980
[   18.320738]  which belongs to the cache kmalloc-64 of size 64
[   18.320801] The buggy address is located 0 bytes to the right of
[   18.320801]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.321152] 
[   18.321213] The buggy address belongs to the physical page:
[   18.321516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.321579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.321694] page_type: f5(slab)
[   18.321765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.321828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.321880] page dumped because: kasan: bad access detected
[   18.321922] 
[   18.321951] Memory state around the buggy address:
[   18.321989]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.322034]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.322078] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.322116]                                      ^
[   18.322152]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.322205]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.322245] ==================================================================
[   18.373293] ==================================================================
[   18.373346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.373396] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.373449] 
[   18.373480] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.373590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.373640] Hardware name: linux,dummy-virt (DT)
[   18.373673] Call trace:
[   18.373699]  show_stack+0x20/0x38 (C)
[   18.373747]  dump_stack_lvl+0x8c/0xd0
[   18.373795]  print_report+0x118/0x608
[   18.373849]  kasan_report+0xdc/0x128
[   18.373896]  kasan_check_range+0x100/0x1a8
[   18.373942]  __kasan_check_write+0x20/0x30
[   18.373996]  kasan_atomics_helper+0x1128/0x4858
[   18.374053]  kasan_atomics+0x198/0x2e0
[   18.374106]  kunit_try_run_case+0x170/0x3f0
[   18.374155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.374209]  kthread+0x328/0x630
[   18.374259]  ret_from_fork+0x10/0x20
[   18.374308] 
[   18.374329] Allocated by task 270:
[   18.374366]  kasan_save_stack+0x3c/0x68
[   18.374408]  kasan_save_track+0x20/0x40
[   18.374476]  kasan_save_alloc_info+0x40/0x58
[   18.374515]  __kasan_kmalloc+0xd4/0xd8
[   18.374553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.374590]  kasan_atomics+0xb8/0x2e0
[   18.374637]  kunit_try_run_case+0x170/0x3f0
[   18.374677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.374723]  kthread+0x328/0x630
[   18.374940]  ret_from_fork+0x10/0x20
[   18.375088] 
[   18.375175] The buggy address belongs to the object at fff00000c7948980
[   18.375175]  which belongs to the cache kmalloc-64 of size 64
[   18.375883] The buggy address is located 0 bytes to the right of
[   18.375883]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.375999] 
[   18.376042] The buggy address belongs to the physical page:
[   18.376106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.376515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.376599] page_type: f5(slab)
[   18.376651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.376704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.377000] page dumped because: kasan: bad access detected
[   18.377165] 
[   18.377417] Memory state around the buggy address:
[   18.377488]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.377567]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.377613] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.377982]                                      ^
[   18.378050]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378119]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.378438] ==================================================================
[   18.197750] ==================================================================
[   18.197835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.197935] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.198015] 
[   18.198047] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.198372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.198428] Hardware name: linux,dummy-virt (DT)
[   18.198462] Call trace:
[   18.198486]  show_stack+0x20/0x38 (C)
[   18.198697]  dump_stack_lvl+0x8c/0xd0
[   18.198863]  print_report+0x118/0x608
[   18.199201]  kasan_report+0xdc/0x128
[   18.199270]  kasan_check_range+0x100/0x1a8
[   18.199319]  __kasan_check_write+0x20/0x30
[   18.199590]  kasan_atomics_helper+0xa6c/0x4858
[   18.199679]  kasan_atomics+0x198/0x2e0
[   18.199725]  kunit_try_run_case+0x170/0x3f0
[   18.200057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.200235]  kthread+0x328/0x630
[   18.200291]  ret_from_fork+0x10/0x20
[   18.200338] 
[   18.200479] Allocated by task 270:
[   18.200513]  kasan_save_stack+0x3c/0x68
[   18.200557]  kasan_save_track+0x20/0x40
[   18.200823]  kasan_save_alloc_info+0x40/0x58
[   18.200993]  __kasan_kmalloc+0xd4/0xd8
[   18.201070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.201435]  kasan_atomics+0xb8/0x2e0
[   18.201488]  kunit_try_run_case+0x170/0x3f0
[   18.201529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.201807]  kthread+0x328/0x630
[   18.202157]  ret_from_fork+0x10/0x20
[   18.202233] 
[   18.202289] The buggy address belongs to the object at fff00000c7948980
[   18.202289]  which belongs to the cache kmalloc-64 of size 64
[   18.202407] The buggy address is located 0 bytes to the right of
[   18.202407]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.202522] 
[   18.202707] The buggy address belongs to the physical page:
[   18.202889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.202950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.203075] page_type: f5(slab)
[   18.203126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.203178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.203226] page dumped because: kasan: bad access detected
[   18.203269] 
[   18.203297] Memory state around the buggy address:
[   18.203336]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203392]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203436] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.203485]                                      ^
[   18.203528]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203573]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203622] ==================================================================
[   18.189984] ==================================================================
[   18.190311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   18.190377] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.190429] 
[   18.190683] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.190826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.190884] Hardware name: linux,dummy-virt (DT)
[   18.190917] Call trace:
[   18.191227]  show_stack+0x20/0x38 (C)
[   18.191331]  dump_stack_lvl+0x8c/0xd0
[   18.191383]  print_report+0x118/0x608
[   18.191429]  kasan_report+0xdc/0x128
[   18.191473]  kasan_check_range+0x100/0x1a8
[   18.191855]  __kasan_check_write+0x20/0x30
[   18.191948]  kasan_atomics_helper+0xa04/0x4858
[   18.192150]  kasan_atomics+0x198/0x2e0
[   18.192238]  kunit_try_run_case+0x170/0x3f0
[   18.192549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.192700]  kthread+0x328/0x630
[   18.192754]  ret_from_fork+0x10/0x20
[   18.192810] 
[   18.192832] Allocated by task 270:
[   18.192895]  kasan_save_stack+0x3c/0x68
[   18.192959]  kasan_save_track+0x20/0x40
[   18.193014]  kasan_save_alloc_info+0x40/0x58
[   18.193061]  __kasan_kmalloc+0xd4/0xd8
[   18.193109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.193149]  kasan_atomics+0xb8/0x2e0
[   18.193184]  kunit_try_run_case+0x170/0x3f0
[   18.193233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193294]  kthread+0x328/0x630
[   18.193341]  ret_from_fork+0x10/0x20
[   18.193379] 
[   18.193399] The buggy address belongs to the object at fff00000c7948980
[   18.193399]  which belongs to the cache kmalloc-64 of size 64
[   18.193471] The buggy address is located 0 bytes to the right of
[   18.193471]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.193536] 
[   18.193559] The buggy address belongs to the physical page:
[   18.193599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.193943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.194310] page_type: f5(slab)
[   18.194385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.194462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.194548] page dumped because: kasan: bad access detected
[   18.194849] 
[   18.195126] Memory state around the buggy address:
[   18.195220]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.195369]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.195449] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.195776]                                      ^
[   18.195950]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196015]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196391] ==================================================================
[   18.404200] ==================================================================
[   18.404389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.404475] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.404528] 
[   18.404566] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.404976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.405283] Hardware name: linux,dummy-virt (DT)
[   18.405397] Call trace:
[   18.405429]  show_stack+0x20/0x38 (C)
[   18.405797]  dump_stack_lvl+0x8c/0xd0
[   18.406066]  print_report+0x118/0x608
[   18.406433]  kasan_report+0xdc/0x128
[   18.406728]  kasan_check_range+0x100/0x1a8
[   18.406819]  __kasan_check_write+0x20/0x30
[   18.407005]  kasan_atomics_helper+0x12d8/0x4858
[   18.407165]  kasan_atomics+0x198/0x2e0
[   18.407253]  kunit_try_run_case+0x170/0x3f0
[   18.407479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.407544]  kthread+0x328/0x630
[   18.407589]  ret_from_fork+0x10/0x20
[   18.407691] 
[   18.407722] Allocated by task 270:
[   18.407773]  kasan_save_stack+0x3c/0x68
[   18.407815]  kasan_save_track+0x20/0x40
[   18.407869]  kasan_save_alloc_info+0x40/0x58
[   18.407918]  __kasan_kmalloc+0xd4/0xd8
[   18.407969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.408016]  kasan_atomics+0xb8/0x2e0
[   18.408053]  kunit_try_run_case+0x170/0x3f0
[   18.408093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.408141]  kthread+0x328/0x630
[   18.408177]  ret_from_fork+0x10/0x20
[   18.408229] 
[   18.408258] The buggy address belongs to the object at fff00000c7948980
[   18.408258]  which belongs to the cache kmalloc-64 of size 64
[   18.408338] The buggy address is located 0 bytes to the right of
[   18.408338]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.408403] 
[   18.408424] The buggy address belongs to the physical page:
[   18.408472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.408534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.408582] page_type: f5(slab)
[   18.408918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.409330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.409400] page dumped because: kasan: bad access detected
[   18.409477] 
[   18.409549] Memory state around the buggy address:
[   18.409637]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.409941]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.410138] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.410491]                                      ^
[   18.410560]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.410904]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.411013] ==================================================================
[   18.356875] ==================================================================
[   18.356942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.357212] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.357293] 
[   18.357325] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.357615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.357706] Hardware name: linux,dummy-virt (DT)
[   18.357749] Call trace:
[   18.358093]  show_stack+0x20/0x38 (C)
[   18.358183]  dump_stack_lvl+0x8c/0xd0
[   18.358235]  print_report+0x118/0x608
[   18.358281]  kasan_report+0xdc/0x128
[   18.358326]  kasan_check_range+0x100/0x1a8
[   18.358453]  __kasan_check_write+0x20/0x30
[   18.358547]  kasan_atomics_helper+0x1058/0x4858
[   18.358595]  kasan_atomics+0x198/0x2e0
[   18.358781]  kunit_try_run_case+0x170/0x3f0
[   18.358936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.359004]  kthread+0x328/0x630
[   18.359364]  ret_from_fork+0x10/0x20
[   18.359434] 
[   18.359579] Allocated by task 270:
[   18.359615]  kasan_save_stack+0x3c/0x68
[   18.359769]  kasan_save_track+0x20/0x40
[   18.359859]  kasan_save_alloc_info+0x40/0x58
[   18.360359]  __kasan_kmalloc+0xd4/0xd8
[   18.360681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.360799]  kasan_atomics+0xb8/0x2e0
[   18.360898]  kunit_try_run_case+0x170/0x3f0
[   18.361059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.361401]  kthread+0x328/0x630
[   18.361482]  ret_from_fork+0x10/0x20
[   18.361663] 
[   18.361700] The buggy address belongs to the object at fff00000c7948980
[   18.361700]  which belongs to the cache kmalloc-64 of size 64
[   18.362004] The buggy address is located 0 bytes to the right of
[   18.362004]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.362181] 
[   18.362207] The buggy address belongs to the physical page:
[   18.362241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.362323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.362599] page_type: f5(slab)
[   18.362779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.362873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.362916] page dumped because: kasan: bad access detected
[   18.362956] 
[   18.362978] Memory state around the buggy address:
[   18.363022]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363084]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363143] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.363194]                                      ^
[   18.363236]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.363281]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.363330] ==================================================================
[   18.462057] ==================================================================
[   18.462112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.462519] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.462591] 
[   18.462624] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.462719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.462746] Hardware name: linux,dummy-virt (DT)
[   18.462992] Call trace:
[   18.463291]  show_stack+0x20/0x38 (C)
[   18.463420]  dump_stack_lvl+0x8c/0xd0
[   18.463469]  print_report+0x118/0x608
[   18.463534]  kasan_report+0xdc/0x128
[   18.463581]  kasan_check_range+0x100/0x1a8
[   18.463650]  __kasan_check_write+0x20/0x30
[   18.463699]  kasan_atomics_helper+0x15b4/0x4858
[   18.463745]  kasan_atomics+0x198/0x2e0
[   18.463790]  kunit_try_run_case+0x170/0x3f0
[   18.463848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.463902]  kthread+0x328/0x630
[   18.463948]  ret_from_fork+0x10/0x20
[   18.463994] 
[   18.464383] Allocated by task 270:
[   18.464456]  kasan_save_stack+0x3c/0x68
[   18.464656]  kasan_save_track+0x20/0x40
[   18.464698]  kasan_save_alloc_info+0x40/0x58
[   18.464752]  __kasan_kmalloc+0xd4/0xd8
[   18.464788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.465129]  kasan_atomics+0xb8/0x2e0
[   18.465500]  kunit_try_run_case+0x170/0x3f0
[   18.465579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.465790]  kthread+0x328/0x630
[   18.466064]  ret_from_fork+0x10/0x20
[   18.466109] 
[   18.466131] The buggy address belongs to the object at fff00000c7948980
[   18.466131]  which belongs to the cache kmalloc-64 of size 64
[   18.466477] The buggy address is located 0 bytes to the right of
[   18.466477]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.466782] 
[   18.466819] The buggy address belongs to the physical page:
[   18.466941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.467133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.467185] page_type: f5(slab)
[   18.467496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.467587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.468005] page dumped because: kasan: bad access detected
[   18.468156] 
[   18.468181] Memory state around the buggy address:
[   18.468218]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.468438]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.468491] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.468871]                                      ^
[   18.468944]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.469015]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.469056] ==================================================================
[   18.523304] ==================================================================
[   18.523657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.523789] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.523881] 
[   18.524062] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.524317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.524381] Hardware name: linux,dummy-virt (DT)
[   18.524486] Call trace:
[   18.524764]  show_stack+0x20/0x38 (C)
[   18.524832]  dump_stack_lvl+0x8c/0xd0
[   18.525014]  print_report+0x118/0x608
[   18.525186]  kasan_report+0xdc/0x128
[   18.525492]  kasan_check_range+0x100/0x1a8
[   18.525823]  __kasan_check_write+0x20/0x30
[   18.525890]  kasan_atomics_helper+0x17ec/0x4858
[   18.526318]  kasan_atomics+0x198/0x2e0
[   18.526556]  kunit_try_run_case+0x170/0x3f0
[   18.526639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.526858]  kthread+0x328/0x630
[   18.527102]  ret_from_fork+0x10/0x20
[   18.527348] 
[   18.527394] Allocated by task 270:
[   18.527647]  kasan_save_stack+0x3c/0x68
[   18.527720]  kasan_save_track+0x20/0x40
[   18.527777]  kasan_save_alloc_info+0x40/0x58
[   18.527818]  __kasan_kmalloc+0xd4/0xd8
[   18.527854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.527904]  kasan_atomics+0xb8/0x2e0
[   18.527938]  kunit_try_run_case+0x170/0x3f0
[   18.527979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.528182]  kthread+0x328/0x630
[   18.528422]  ret_from_fork+0x10/0x20
[   18.528667] 
[   18.529175] The buggy address belongs to the object at fff00000c7948980
[   18.529175]  which belongs to the cache kmalloc-64 of size 64
[   18.529264] The buggy address is located 0 bytes to the right of
[   18.529264]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.529332] 
[   18.529353] The buggy address belongs to the physical page:
[   18.530018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.530095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.530376] page_type: f5(slab)
[   18.530458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.530789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.531014] page dumped because: kasan: bad access detected
[   18.531067] 
[   18.531090] Memory state around the buggy address:
[   18.531127]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.531719]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.531850] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.532059]                                      ^
[   18.532261]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.532325]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.532549] ==================================================================
[   18.279275] ==================================================================
[   18.279331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.279388] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.279439] 
[   18.279481] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.279562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.279592] Hardware name: linux,dummy-virt (DT)
[   18.279624] Call trace:
[   18.280589]  show_stack+0x20/0x38 (C)
[   18.280677]  dump_stack_lvl+0x8c/0xd0
[   18.280760]  print_report+0x118/0x608
[   18.280834]  kasan_report+0xdc/0x128
[   18.280891]  __asan_report_load4_noabort+0x20/0x30
[   18.280940]  kasan_atomics_helper+0x3e04/0x4858
[   18.280990]  kasan_atomics+0x198/0x2e0
[   18.281034]  kunit_try_run_case+0x170/0x3f0
[   18.281638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.282315]  kthread+0x328/0x630
[   18.282473]  ret_from_fork+0x10/0x20
[   18.282563] 
[   18.282584] Allocated by task 270:
[   18.282933]  kasan_save_stack+0x3c/0x68
[   18.283008]  kasan_save_track+0x20/0x40
[   18.283198]  kasan_save_alloc_info+0x40/0x58
[   18.283245]  __kasan_kmalloc+0xd4/0xd8
[   18.284022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.284089]  kasan_atomics+0xb8/0x2e0
[   18.284127]  kunit_try_run_case+0x170/0x3f0
[   18.284502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284678]  kthread+0x328/0x630
[   18.285050]  ret_from_fork+0x10/0x20
[   18.285120] 
[   18.285294] The buggy address belongs to the object at fff00000c7948980
[   18.285294]  which belongs to the cache kmalloc-64 of size 64
[   18.285476] The buggy address is located 0 bytes to the right of
[   18.285476]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.285954] 
[   18.285999] The buggy address belongs to the physical page:
[   18.286032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.286444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.286758] page_type: f5(slab)
[   18.286920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.287007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.287052] page dumped because: kasan: bad access detected
[   18.287437] 
[   18.287493] Memory state around the buggy address:
[   18.287547]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.288050]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.288122] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.288193]                                      ^
[   18.288554]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288620]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288771] ==================================================================
[   18.363564] ==================================================================
[   18.363613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.363734] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.364341] 
[   18.364424] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.364658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.364710] Hardware name: linux,dummy-virt (DT)
[   18.364887] Call trace:
[   18.364941]  show_stack+0x20/0x38 (C)
[   18.365040]  dump_stack_lvl+0x8c/0xd0
[   18.365319]  print_report+0x118/0x608
[   18.365492]  kasan_report+0xdc/0x128
[   18.365783]  kasan_check_range+0x100/0x1a8
[   18.365885]  __kasan_check_write+0x20/0x30
[   18.365955]  kasan_atomics_helper+0x10c0/0x4858
[   18.366033]  kasan_atomics+0x198/0x2e0
[   18.366392]  kunit_try_run_case+0x170/0x3f0
[   18.366484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.366966]  kthread+0x328/0x630
[   18.367078]  ret_from_fork+0x10/0x20
[   18.367515] 
[   18.367611] Allocated by task 270:
[   18.367742]  kasan_save_stack+0x3c/0x68
[   18.367872]  kasan_save_track+0x20/0x40
[   18.367930]  kasan_save_alloc_info+0x40/0x58
[   18.367970]  __kasan_kmalloc+0xd4/0xd8
[   18.368196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.368366]  kasan_atomics+0xb8/0x2e0
[   18.368622]  kunit_try_run_case+0x170/0x3f0
[   18.368848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.368931]  kthread+0x328/0x630
[   18.369139]  ret_from_fork+0x10/0x20
[   18.369369] 
[   18.369560] The buggy address belongs to the object at fff00000c7948980
[   18.369560]  which belongs to the cache kmalloc-64 of size 64
[   18.369720] The buggy address is located 0 bytes to the right of
[   18.369720]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.369950] 
[   18.370126] The buggy address belongs to the physical page:
[   18.370166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.370465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.370564] page_type: f5(slab)
[   18.370640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.371014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.371121] page dumped because: kasan: bad access detected
[   18.371159] 
[   18.371179] Memory state around the buggy address:
[   18.371574]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.371984]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.372048] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.372175]                                      ^
[   18.372215]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.372270]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.372317] ==================================================================
[   18.330036] ==================================================================
[   18.330401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.330542] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.330648] 
[   18.330682] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.330863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.330969] Hardware name: linux,dummy-virt (DT)
[   18.331004] Call trace:
[   18.331191]  show_stack+0x20/0x38 (C)
[   18.331347]  dump_stack_lvl+0x8c/0xd0
[   18.331405]  print_report+0x118/0x608
[   18.331452]  kasan_report+0xdc/0x128
[   18.331496]  kasan_check_range+0x100/0x1a8
[   18.331824]  __kasan_check_write+0x20/0x30
[   18.331897]  kasan_atomics_helper+0xf20/0x4858
[   18.332073]  kasan_atomics+0x198/0x2e0
[   18.332509]  kunit_try_run_case+0x170/0x3f0
[   18.332588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.332756]  kthread+0x328/0x630
[   18.332861]  ret_from_fork+0x10/0x20
[   18.333352] 
[   18.333434] Allocated by task 270:
[   18.333558]  kasan_save_stack+0x3c/0x68
[   18.333606]  kasan_save_track+0x20/0x40
[   18.333655]  kasan_save_alloc_info+0x40/0x58
[   18.334000]  __kasan_kmalloc+0xd4/0xd8
[   18.334253]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.334350]  kasan_atomics+0xb8/0x2e0
[   18.334732]  kunit_try_run_case+0x170/0x3f0
[   18.334804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.335102]  kthread+0x328/0x630
[   18.335158]  ret_from_fork+0x10/0x20
[   18.335198] 
[   18.335938] The buggy address belongs to the object at fff00000c7948980
[   18.335938]  which belongs to the cache kmalloc-64 of size 64
[   18.336021] The buggy address is located 0 bytes to the right of
[   18.336021]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.336087] 
[   18.336208] The buggy address belongs to the physical page:
[   18.336362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.336540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.336664] page_type: f5(slab)
[   18.337083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.337176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.337243] page dumped because: kasan: bad access detected
[   18.337279] 
[   18.337299] Memory state around the buggy address:
[   18.337898]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.337973]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.338030] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.338159]                                      ^
[   18.338209]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.338340]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.338382] ==================================================================
[   18.411647] ==================================================================
[   18.411702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.412011] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.412503] 
[   18.412701] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.412884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.413042] Hardware name: linux,dummy-virt (DT)
[   18.413119] Call trace:
[   18.413152]  show_stack+0x20/0x38 (C)
[   18.413202]  dump_stack_lvl+0x8c/0xd0
[   18.413253]  print_report+0x118/0x608
[   18.413511]  kasan_report+0xdc/0x128
[   18.414039]  kasan_check_range+0x100/0x1a8
[   18.414174]  __kasan_check_write+0x20/0x30
[   18.414341]  kasan_atomics_helper+0x1384/0x4858
[   18.414477]  kasan_atomics+0x198/0x2e0
[   18.414545]  kunit_try_run_case+0x170/0x3f0
[   18.414620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.417355]  kthread+0x328/0x630
[   18.417812]  ret_from_fork+0x10/0x20
[   18.418216] 
[   18.418260] Allocated by task 270:
[   18.419428]  kasan_save_stack+0x3c/0x68
[   18.419516]  kasan_save_track+0x20/0x40
[   18.419579]  kasan_save_alloc_info+0x40/0x58
[   18.419690]  __kasan_kmalloc+0xd4/0xd8
[   18.419730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.420223]  kasan_atomics+0xb8/0x2e0
[   18.420301]  kunit_try_run_case+0x170/0x3f0
[   18.420376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.421445]  kthread+0x328/0x630
[   18.421891]  ret_from_fork+0x10/0x20
[   18.422726] 
[   18.422758] The buggy address belongs to the object at fff00000c7948980
[   18.422758]  which belongs to the cache kmalloc-64 of size 64
[   18.424116] The buggy address is located 0 bytes to the right of
[   18.424116]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.424185] 
[   18.424207] The buggy address belongs to the physical page:
[   18.424241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.424295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.424344] page_type: f5(slab)
[   18.424383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.424436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.424480] page dumped because: kasan: bad access detected
[   18.424514] 
[   18.424534] Memory state around the buggy address:
[   18.424568]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.424614]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.424677] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.424718]                                      ^
[   18.424753]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.424796]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.424835] ==================================================================
[   18.430987] ==================================================================
[   18.431041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.431099] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.431161] 
[   18.431193] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.431275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.431304] Hardware name: linux,dummy-virt (DT)
[   18.431335] Call trace:
[   18.431360]  show_stack+0x20/0x38 (C)
[   18.431406]  dump_stack_lvl+0x8c/0xd0
[   18.431456]  print_report+0x118/0x608
[   18.431501]  kasan_report+0xdc/0x128
[   18.431546]  kasan_check_range+0x100/0x1a8
[   18.431601]  __kasan_check_write+0x20/0x30
[   18.431663]  kasan_atomics_helper+0x1414/0x4858
[   18.431711]  kasan_atomics+0x198/0x2e0
[   18.431765]  kunit_try_run_case+0x170/0x3f0
[   18.431815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.431869]  kthread+0x328/0x630
[   18.431913]  ret_from_fork+0x10/0x20
[   18.431970] 
[   18.432248] Allocated by task 270:
[   18.432564]  kasan_save_stack+0x3c/0x68
[   18.432644]  kasan_save_track+0x20/0x40
[   18.432713]  kasan_save_alloc_info+0x40/0x58
[   18.432788]  __kasan_kmalloc+0xd4/0xd8
[   18.433102]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.433174]  kasan_atomics+0xb8/0x2e0
[   18.433307]  kunit_try_run_case+0x170/0x3f0
[   18.433352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.433401]  kthread+0x328/0x630
[   18.433446]  ret_from_fork+0x10/0x20
[   18.433949] 
[   18.434124] The buggy address belongs to the object at fff00000c7948980
[   18.434124]  which belongs to the cache kmalloc-64 of size 64
[   18.434302] The buggy address is located 0 bytes to the right of
[   18.434302]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.434619] 
[   18.434721] The buggy address belongs to the physical page:
[   18.434814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.434947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.435328] page_type: f5(slab)
[   18.435381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.435742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.435852] page dumped because: kasan: bad access detected
[   18.436116] 
[   18.436252] Memory state around the buggy address:
[   18.436398]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.436540]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.436770] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.437092]                                      ^
[   18.437234]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.437369]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.437478] ==================================================================
[   18.379093] ==================================================================
[   18.379244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.379305] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.379356] 
[   18.379387] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.379468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.379495] Hardware name: linux,dummy-virt (DT)
[   18.379815] Call trace:
[   18.379950]  show_stack+0x20/0x38 (C)
[   18.380253]  dump_stack_lvl+0x8c/0xd0
[   18.380302]  print_report+0x118/0x608
[   18.380492]  kasan_report+0xdc/0x128
[   18.380817]  kasan_check_range+0x100/0x1a8
[   18.381086]  __kasan_check_write+0x20/0x30
[   18.381323]  kasan_atomics_helper+0x1190/0x4858
[   18.381658]  kasan_atomics+0x198/0x2e0
[   18.381812]  kunit_try_run_case+0x170/0x3f0
[   18.381947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.382115]  kthread+0x328/0x630
[   18.382199]  ret_from_fork+0x10/0x20
[   18.382249] 
[   18.382273] Allocated by task 270:
[   18.382589]  kasan_save_stack+0x3c/0x68
[   18.382768]  kasan_save_track+0x20/0x40
[   18.382822]  kasan_save_alloc_info+0x40/0x58
[   18.383153]  __kasan_kmalloc+0xd4/0xd8
[   18.383243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.383353]  kasan_atomics+0xb8/0x2e0
[   18.383495]  kunit_try_run_case+0x170/0x3f0
[   18.383567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.383863]  kthread+0x328/0x630
[   18.383983]  ret_from_fork+0x10/0x20
[   18.384260] 
[   18.384311] The buggy address belongs to the object at fff00000c7948980
[   18.384311]  which belongs to the cache kmalloc-64 of size 64
[   18.384391] The buggy address is located 0 bytes to the right of
[   18.384391]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.384758] 
[   18.384807] The buggy address belongs to the physical page:
[   18.384865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.385070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.385223] page_type: f5(slab)
[   18.385491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.385588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.386009] page dumped because: kasan: bad access detected
[   18.386118] 
[   18.386185] Memory state around the buggy address:
[   18.386221]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.386288]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.386658] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.386739]                                      ^
[   18.387006]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387147]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387231] ==================================================================
[   18.514125] ==================================================================
[   18.514182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.514233] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.514554] 
[   18.514775] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.514877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.515215] Hardware name: linux,dummy-virt (DT)
[   18.515285] Call trace:
[   18.515312]  show_stack+0x20/0x38 (C)
[   18.515364]  dump_stack_lvl+0x8c/0xd0
[   18.515413]  print_report+0x118/0x608
[   18.515466]  kasan_report+0xdc/0x128
[   18.515513]  __asan_report_load8_noabort+0x20/0x30
[   18.515565]  kasan_atomics_helper+0x3e20/0x4858
[   18.515611]  kasan_atomics+0x198/0x2e0
[   18.515666]  kunit_try_run_case+0x170/0x3f0
[   18.516308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.516732]  kthread+0x328/0x630
[   18.516831]  ret_from_fork+0x10/0x20
[   18.516962] 
[   18.517185] Allocated by task 270:
[   18.517226]  kasan_save_stack+0x3c/0x68
[   18.517270]  kasan_save_track+0x20/0x40
[   18.517307]  kasan_save_alloc_info+0x40/0x58
[   18.517354]  __kasan_kmalloc+0xd4/0xd8
[   18.517736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.517947]  kasan_atomics+0xb8/0x2e0
[   18.518153]  kunit_try_run_case+0x170/0x3f0
[   18.518380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.518582]  kthread+0x328/0x630
[   18.518624]  ret_from_fork+0x10/0x20
[   18.518838] 
[   18.519052] The buggy address belongs to the object at fff00000c7948980
[   18.519052]  which belongs to the cache kmalloc-64 of size 64
[   18.519300] The buggy address is located 0 bytes to the right of
[   18.519300]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.519587] 
[   18.519793] The buggy address belongs to the physical page:
[   18.520001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.520118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.520313] page_type: f5(slab)
[   18.520567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.520726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.520963] page dumped because: kasan: bad access detected
[   18.521164] 
[   18.521193] Memory state around the buggy address:
[   18.521229]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.521279]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.521616] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.521887]                                      ^
[   18.522063]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.522253]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.522338] ==================================================================
[   18.469782] ==================================================================
[   18.469841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.470186] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.470265] 
[   18.470300] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.470381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.470408] Hardware name: linux,dummy-virt (DT)
[   18.470442] Call trace:
[   18.470464]  show_stack+0x20/0x38 (C)
[   18.470670]  dump_stack_lvl+0x8c/0xd0
[   18.470745]  print_report+0x118/0x608
[   18.470795]  kasan_report+0xdc/0x128
[   18.470841]  __asan_report_load8_noabort+0x20/0x30
[   18.470892]  kasan_atomics_helper+0x3db0/0x4858
[   18.470949]  kasan_atomics+0x198/0x2e0
[   18.471004]  kunit_try_run_case+0x170/0x3f0
[   18.471061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471118]  kthread+0x328/0x630
[   18.471164]  ret_from_fork+0x10/0x20
[   18.471213] 
[   18.471239] Allocated by task 270:
[   18.471271]  kasan_save_stack+0x3c/0x68
[   18.471312]  kasan_save_track+0x20/0x40
[   18.471361]  kasan_save_alloc_info+0x40/0x58
[   18.471400]  __kasan_kmalloc+0xd4/0xd8
[   18.471438]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.471474]  kasan_atomics+0xb8/0x2e0
[   18.471510]  kunit_try_run_case+0x170/0x3f0
[   18.471557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.471604]  kthread+0x328/0x630
[   18.471810]  ret_from_fork+0x10/0x20
[   18.471864] 
[   18.472079] The buggy address belongs to the object at fff00000c7948980
[   18.472079]  which belongs to the cache kmalloc-64 of size 64
[   18.472505] The buggy address is located 0 bytes to the right of
[   18.472505]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.473036] 
[   18.473096] The buggy address belongs to the physical page:
[   18.473149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.473371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.473461] page_type: f5(slab)
[   18.473902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.474004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.474501] page dumped because: kasan: bad access detected
[   18.474574] 
[   18.474910] Memory state around the buggy address:
[   18.474985]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.475068]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.475300] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.475397]                                      ^
[   18.475677]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.475741]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.475949] ==================================================================
[   18.322492] ==================================================================
[   18.322550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.322606] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.322670] 
[   18.322702] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.322784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.322823] Hardware name: linux,dummy-virt (DT)
[   18.322855] Call trace:
[   18.322888]  show_stack+0x20/0x38 (C)
[   18.322935]  dump_stack_lvl+0x8c/0xd0
[   18.322983]  print_report+0x118/0x608
[   18.323027]  kasan_report+0xdc/0x128
[   18.323072]  kasan_check_range+0x100/0x1a8
[   18.323118]  __kasan_check_write+0x20/0x30
[   18.323175]  kasan_atomics_helper+0xeb8/0x4858
[   18.323223]  kasan_atomics+0x198/0x2e0
[   18.323272]  kunit_try_run_case+0x170/0x3f0
[   18.323321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.323374]  kthread+0x328/0x630
[   18.323419]  ret_from_fork+0x10/0x20
[   18.323465] 
[   18.323485] Allocated by task 270:
[   18.323514]  kasan_save_stack+0x3c/0x68
[   18.323553]  kasan_save_track+0x20/0x40
[   18.323592]  kasan_save_alloc_info+0x40/0x58
[   18.324064]  __kasan_kmalloc+0xd4/0xd8
[   18.324585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.324645]  kasan_atomics+0xb8/0x2e0
[   18.324683]  kunit_try_run_case+0x170/0x3f0
[   18.324725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.324818]  kthread+0x328/0x630
[   18.325152]  ret_from_fork+0x10/0x20
[   18.325474] 
[   18.325661] The buggy address belongs to the object at fff00000c7948980
[   18.325661]  which belongs to the cache kmalloc-64 of size 64
[   18.325726] The buggy address is located 0 bytes to the right of
[   18.325726]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.326215] 
[   18.326360] The buggy address belongs to the physical page:
[   18.326440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.326608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.326675] page_type: f5(slab)
[   18.326715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.327103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.327558] page dumped because: kasan: bad access detected
[   18.327602] 
[   18.327860] Memory state around the buggy address:
[   18.328038]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.328113]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.328424] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.328504]                                      ^
[   18.328541]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.328973]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329079] ==================================================================
[   18.347238] ==================================================================
[   18.347396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.347546] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.347749] 
[   18.347792] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.347877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.348331] Hardware name: linux,dummy-virt (DT)
[   18.348619] Call trace:
[   18.348710]  show_stack+0x20/0x38 (C)
[   18.348887]  dump_stack_lvl+0x8c/0xd0
[   18.348944]  print_report+0x118/0x608
[   18.349254]  kasan_report+0xdc/0x128
[   18.349389]  kasan_check_range+0x100/0x1a8
[   18.349784]  __kasan_check_write+0x20/0x30
[   18.349902]  kasan_atomics_helper+0xff0/0x4858
[   18.350050]  kasan_atomics+0x198/0x2e0
[   18.350433]  kunit_try_run_case+0x170/0x3f0
[   18.350587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.351046]  kthread+0x328/0x630
[   18.351197]  ret_from_fork+0x10/0x20
[   18.351364] 
[   18.351460] Allocated by task 270:
[   18.351494]  kasan_save_stack+0x3c/0x68
[   18.352431]  kasan_save_track+0x20/0x40
[   18.352518]  kasan_save_alloc_info+0x40/0x58
[   18.352579]  __kasan_kmalloc+0xd4/0xd8
[   18.352651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.352713]  kasan_atomics+0xb8/0x2e0
[   18.352834]  kunit_try_run_case+0x170/0x3f0
[   18.352877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.353147]  kthread+0x328/0x630
[   18.353365]  ret_from_fork+0x10/0x20
[   18.353957] 
[   18.354013] The buggy address belongs to the object at fff00000c7948980
[   18.354013]  which belongs to the cache kmalloc-64 of size 64
[   18.354235] The buggy address is located 0 bytes to the right of
[   18.354235]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.354329] 
[   18.354452] The buggy address belongs to the physical page:
[   18.354512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.354704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.354902] page_type: f5(slab)
[   18.355068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.355422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.355484] page dumped because: kasan: bad access detected
[   18.355548] 
[   18.355569] Memory state around the buggy address:
[   18.355604]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.355690]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.355742] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.355783]                                      ^
[   18.355828]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.355873]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.355913] ==================================================================
[   18.494076] ==================================================================
[   18.494205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.494301] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.494369] 
[   18.494402] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.494486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.494513] Hardware name: linux,dummy-virt (DT)
[   18.494919] Call trace:
[   18.494980]  show_stack+0x20/0x38 (C)
[   18.495064]  dump_stack_lvl+0x8c/0xd0
[   18.495401]  print_report+0x118/0x608
[   18.495495]  kasan_report+0xdc/0x128
[   18.495605]  kasan_check_range+0x100/0x1a8
[   18.495687]  __kasan_check_write+0x20/0x30
[   18.495738]  kasan_atomics_helper+0x16d0/0x4858
[   18.495831]  kasan_atomics+0x198/0x2e0
[   18.496129]  kunit_try_run_case+0x170/0x3f0
[   18.496191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.496247]  kthread+0x328/0x630
[   18.496680]  ret_from_fork+0x10/0x20
[   18.496827] 
[   18.496897] Allocated by task 270:
[   18.496929]  kasan_save_stack+0x3c/0x68
[   18.496971]  kasan_save_track+0x20/0x40
[   18.497112]  kasan_save_alloc_info+0x40/0x58
[   18.497161]  __kasan_kmalloc+0xd4/0xd8
[   18.497315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.497439]  kasan_atomics+0xb8/0x2e0
[   18.497566]  kunit_try_run_case+0x170/0x3f0
[   18.497937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.498265]  kthread+0x328/0x630
[   18.498437]  ret_from_fork+0x10/0x20
[   18.498479] 
[   18.499141] The buggy address belongs to the object at fff00000c7948980
[   18.499141]  which belongs to the cache kmalloc-64 of size 64
[   18.499214] The buggy address is located 0 bytes to the right of
[   18.499214]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.499282] 
[   18.499373] The buggy address belongs to the physical page:
[   18.499428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.499499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.499548] page_type: f5(slab)
[   18.499588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.499653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.499706] page dumped because: kasan: bad access detected
[   18.499740] 
[   18.499762] Memory state around the buggy address:
[   18.499809]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.499856]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.499912] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.499965]                                      ^
[   18.500002]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.500047]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.500086] ==================================================================
[   18.299126] ==================================================================
[   18.299195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.299252] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.299642] 
[   18.299799] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.299960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.300108] Hardware name: linux,dummy-virt (DT)
[   18.300229] Call trace:
[   18.300410]  show_stack+0x20/0x38 (C)
[   18.300622]  dump_stack_lvl+0x8c/0xd0
[   18.300880]  print_report+0x118/0x608
[   18.300991]  kasan_report+0xdc/0x128
[   18.301329]  __asan_report_load8_noabort+0x20/0x30
[   18.301500]  kasan_atomics_helper+0x3f58/0x4858
[   18.301577]  kasan_atomics+0x198/0x2e0
[   18.301702]  kunit_try_run_case+0x170/0x3f0
[   18.301814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.301900]  kthread+0x328/0x630
[   18.301949]  ret_from_fork+0x10/0x20
[   18.302003] 
[   18.302035] Allocated by task 270:
[   18.302074]  kasan_save_stack+0x3c/0x68
[   18.302124]  kasan_save_track+0x20/0x40
[   18.302173]  kasan_save_alloc_info+0x40/0x58
[   18.302223]  __kasan_kmalloc+0xd4/0xd8
[   18.302261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.302300]  kasan_atomics+0xb8/0x2e0
[   18.302351]  kunit_try_run_case+0x170/0x3f0
[   18.302392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.302447]  kthread+0x328/0x630
[   18.302491]  ret_from_fork+0x10/0x20
[   18.302526] 
[   18.302549] The buggy address belongs to the object at fff00000c7948980
[   18.302549]  which belongs to the cache kmalloc-64 of size 64
[   18.302606] The buggy address is located 0 bytes to the right of
[   18.302606]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.302683] 
[   18.302714] The buggy address belongs to the physical page:
[   18.302761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.302821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.302869] page_type: f5(slab)
[   18.302925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.302990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.303051] page dumped because: kasan: bad access detected
[   18.303086] 
[   18.303112] Memory state around the buggy address:
[   18.303143]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.303189]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.303233] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.303274]                                      ^
[   18.303307]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.303351]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.303392] ==================================================================
[   18.264481] ==================================================================
[   18.264534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.265041] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.265153] 
[   18.265189] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.265376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.265441] Hardware name: linux,dummy-virt (DT)
[   18.265490] Call trace:
[   18.265566]  show_stack+0x20/0x38 (C)
[   18.265620]  dump_stack_lvl+0x8c/0xd0
[   18.265681]  print_report+0x118/0x608
[   18.265733]  kasan_report+0xdc/0x128
[   18.266033]  __asan_report_load4_noabort+0x20/0x30
[   18.266390]  kasan_atomics_helper+0x3dd8/0x4858
[   18.266468]  kasan_atomics+0x198/0x2e0
[   18.266687]  kunit_try_run_case+0x170/0x3f0
[   18.266847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.266909]  kthread+0x328/0x630
[   18.266974]  ret_from_fork+0x10/0x20
[   18.267026] 
[   18.267048] Allocated by task 270:
[   18.267322]  kasan_save_stack+0x3c/0x68
[   18.267384]  kasan_save_track+0x20/0x40
[   18.267726]  kasan_save_alloc_info+0x40/0x58
[   18.267789]  __kasan_kmalloc+0xd4/0xd8
[   18.267826]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.267864]  kasan_atomics+0xb8/0x2e0
[   18.268184]  kunit_try_run_case+0x170/0x3f0
[   18.268338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.268409]  kthread+0x328/0x630
[   18.268925]  ret_from_fork+0x10/0x20
[   18.269182] 
[   18.269293] The buggy address belongs to the object at fff00000c7948980
[   18.269293]  which belongs to the cache kmalloc-64 of size 64
[   18.269791] The buggy address is located 0 bytes to the right of
[   18.269791]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.269881] 
[   18.270221] The buggy address belongs to the physical page:
[   18.270275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.270647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.270781] page_type: f5(slab)
[   18.270825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.271185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.271258] page dumped because: kasan: bad access detected
[   18.271565] 
[   18.271681] Memory state around the buggy address:
[   18.271818]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272161]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272278] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.272344]                                      ^
[   18.272382]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272426]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272468] ==================================================================
[   18.166389] ==================================================================
[   18.166442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.166492] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.166542] 
[   18.166573] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.166669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.166700] Hardware name: linux,dummy-virt (DT)
[   18.166734] Call trace:
[   18.166756]  show_stack+0x20/0x38 (C)
[   18.166816]  dump_stack_lvl+0x8c/0xd0
[   18.166865]  print_report+0x118/0x608
[   18.166920]  kasan_report+0xdc/0x128
[   18.166977]  __asan_report_load4_noabort+0x20/0x30
[   18.167031]  kasan_atomics_helper+0x42d8/0x4858
[   18.167087]  kasan_atomics+0x198/0x2e0
[   18.167133]  kunit_try_run_case+0x170/0x3f0
[   18.167192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.167246]  kthread+0x328/0x630
[   18.167302]  ret_from_fork+0x10/0x20
[   18.167359] 
[   18.167495]  kasan_save_alloc_info+0x40/0x58
[   18.167542]  __kasan_kmalloc+0xd4/0xd8
[   18.167579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.167622]  kasan_atomics+0xb8/0x2e0
[   18.167680]  kunit_try_run_case+0x170/0x3f0
[   18.167719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.168365] 
[   18.169222] 
[   18.169910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.171555]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.173499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   18.174041] Call trace:
[   18.174240]  show_stack+0x20/0x38 (C)
[   18.174294]  dump_stack_lvl+0x8c/0xd0
[   18.174357]  print_report+0x118/0x608
[   18.174408]  kasan_report+0xdc/0x128
[   18.174454]  kasan_check_range+0x100/0x1a8
[   18.174500]  __kasan_check_write+0x20/0x30
[   18.174901]  kasan_atomics_helper+0x934/0x4858
[   18.175113]  kasan_atomics+0x198/0x2e0
[   18.175173]  kunit_try_run_case+0x170/0x3f0
[   18.175348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175456]  kthread+0x328/0x630
[   18.175654]  ret_from_fork+0x10/0x20
[   18.175894] 
[   18.175963] Allocated by task 270:
[   18.176036]  kasan_save_stack+0x3c/0x68
[   18.176088]  kasan_save_track+0x20/0x40
[   18.176213]  kasan_save_alloc_info+0x40/0x58
[   18.176313]  __kasan_kmalloc+0xd4/0xd8
[   18.176456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.176497]  kasan_atomics+0xb8/0x2e0
[   18.176539]  kunit_try_run_case+0x170/0x3f0
[   18.176579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.176956]  kthread+0x328/0x630
[   18.177119]  ret_from_fork+0x10/0x20
[   18.177298] 
[   18.177413] The buggy address belongs to the object at fff00000c7948980
[   18.177413]  which belongs to the cache kmalloc-64 of size 64
[   18.177495] The buggy address is located 0 bytes to the right of
[   18.177495]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.177906] 
[   18.178004] The buggy address belongs to the physical page:
[   18.178240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.178334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.178564] page_type: f5(slab)
[   18.178776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.178940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.179004] page dumped because: kasan: bad access detected
[   18.179358] 
[   18.179508] Memory state around the buggy address:
[   18.179716]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180215]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180354] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.180480]                                      ^
[   18.180602]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.180801]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.180876] ==================================================================
[   18.438101] ==================================================================
[   18.438157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.438534] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.438815] 
[   18.438887] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.439015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.439231] Hardware name: linux,dummy-virt (DT)
[   18.439372] Call trace:
[   18.439647]  show_stack+0x20/0x38 (C)
[   18.439718]  dump_stack_lvl+0x8c/0xd0
[   18.439846]  print_report+0x118/0x608
[   18.439901]  kasan_report+0xdc/0x128
[   18.439979]  kasan_check_range+0x100/0x1a8
[   18.440163]  __kasan_check_write+0x20/0x30
[   18.440251]  kasan_atomics_helper+0x147c/0x4858
[   18.440478]  kasan_atomics+0x198/0x2e0
[   18.440743]  kunit_try_run_case+0x170/0x3f0
[   18.440970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.441158]  kthread+0x328/0x630
[   18.441210]  ret_from_fork+0x10/0x20
[   18.441664] 
[   18.441708] Allocated by task 270:
[   18.441859]  kasan_save_stack+0x3c/0x68
[   18.441936]  kasan_save_track+0x20/0x40
[   18.441987]  kasan_save_alloc_info+0x40/0x58
[   18.442029]  __kasan_kmalloc+0xd4/0xd8
[   18.442066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.442115]  kasan_atomics+0xb8/0x2e0
[   18.442152]  kunit_try_run_case+0x170/0x3f0
[   18.442203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.442248]  kthread+0x328/0x630
[   18.442294]  ret_from_fork+0x10/0x20
[   18.442341] 
[   18.442371] The buggy address belongs to the object at fff00000c7948980
[   18.442371]  which belongs to the cache kmalloc-64 of size 64
[   18.442452] The buggy address is located 0 bytes to the right of
[   18.442452]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.442525] 
[   18.442561] The buggy address belongs to the physical page:
[   18.442601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.442677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.442726] page_type: f5(slab)
[   18.442764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.442839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.442891] page dumped because: kasan: bad access detected
[   18.442924] 
[   18.442943] Memory state around the buggy address:
[   18.442992]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.443043]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.443088] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.443128]                                      ^
[   18.443163]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.443213]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.443272] ==================================================================
[   18.483862] ==================================================================
[   18.483916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.484484] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.484565] 
[   18.484717] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.484922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.485082] Hardware name: linux,dummy-virt (DT)
[   18.485478] Call trace:
[   18.485545]  show_stack+0x20/0x38 (C)
[   18.485620]  dump_stack_lvl+0x8c/0xd0
[   18.485939]  print_report+0x118/0x608
[   18.486218]  kasan_report+0xdc/0x128
[   18.486366]  __asan_report_load8_noabort+0x20/0x30
[   18.486697]  kasan_atomics_helper+0x3df4/0x4858
[   18.487055]  kasan_atomics+0x198/0x2e0
[   18.487194]  kunit_try_run_case+0x170/0x3f0
[   18.487337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.487526]  kthread+0x328/0x630
[   18.487578]  ret_from_fork+0x10/0x20
[   18.488151] 
[   18.488276] Allocated by task 270:
[   18.488417]  kasan_save_stack+0x3c/0x68
[   18.488588]  kasan_save_track+0x20/0x40
[   18.488702]  kasan_save_alloc_info+0x40/0x58
[   18.488855]  __kasan_kmalloc+0xd4/0xd8
[   18.488894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.488956]  kasan_atomics+0xb8/0x2e0
[   18.488998]  kunit_try_run_case+0x170/0x3f0
[   18.489645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.489814]  kthread+0x328/0x630
[   18.489999]  ret_from_fork+0x10/0x20
[   18.490171] 
[   18.490284] The buggy address belongs to the object at fff00000c7948980
[   18.490284]  which belongs to the cache kmalloc-64 of size 64
[   18.490504] The buggy address is located 0 bytes to the right of
[   18.490504]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.490718] 
[   18.490761] The buggy address belongs to the physical page:
[   18.491055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.491140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.491398] page_type: f5(slab)
[   18.491557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.491653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.491700] page dumped because: kasan: bad access detected
[   18.491734] 
[   18.491755] Memory state around the buggy address:
[   18.491798]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.491860]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.491907] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.492237]                                      ^
[   18.492446]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.492497]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.492536] ==================================================================
[   18.508711] ==================================================================
[   18.508762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.509049] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.509245] 
[   18.509294] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.509379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.509576] Hardware name: linux,dummy-virt (DT)
[   18.509799] Call trace:
[   18.509858]  show_stack+0x20/0x38 (C)
[   18.510079]  dump_stack_lvl+0x8c/0xd0
[   18.510251]  print_report+0x118/0x608
[   18.510309]  kasan_report+0xdc/0x128
[   18.510359]  kasan_check_range+0x100/0x1a8
[   18.510407]  __kasan_check_write+0x20/0x30
[   18.510491]  kasan_atomics_helper+0x175c/0x4858
[   18.510544]  kasan_atomics+0x198/0x2e0
[   18.510588]  kunit_try_run_case+0x170/0x3f0
[   18.510656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.510712]  kthread+0x328/0x630
[   18.510766]  ret_from_fork+0x10/0x20
[   18.510815] 
[   18.510844] Allocated by task 270:
[   18.510875]  kasan_save_stack+0x3c/0x68
[   18.510922]  kasan_save_track+0x20/0x40
[   18.510969]  kasan_save_alloc_info+0x40/0x58
[   18.511016]  __kasan_kmalloc+0xd4/0xd8
[   18.511053]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.511091]  kasan_atomics+0xb8/0x2e0
[   18.511135]  kunit_try_run_case+0x170/0x3f0
[   18.511174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.511220]  kthread+0x328/0x630
[   18.511256]  ret_from_fork+0x10/0x20
[   18.511294] 
[   18.511320] The buggy address belongs to the object at fff00000c7948980
[   18.511320]  which belongs to the cache kmalloc-64 of size 64
[   18.511387] The buggy address is located 0 bytes to the right of
[   18.511387]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.511462] 
[   18.511488] The buggy address belongs to the physical page:
[   18.511522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.511583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.511643] page_type: f5(slab)
[   18.511683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.511744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.511787] page dumped because: kasan: bad access detected
[   18.511821] 
[   18.511843] Memory state around the buggy address:
[   18.511877]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.511921]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.512722] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.512806]                                      ^
[   18.512866]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.513089]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.513160] ==================================================================
[   18.303659] ==================================================================
[   18.304599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.304683] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.304758] 
[   18.304822] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.305149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.305270] Hardware name: linux,dummy-virt (DT)
[   18.305348] Call trace:
[   18.305757]  show_stack+0x20/0x38 (C)
[   18.306182]  dump_stack_lvl+0x8c/0xd0
[   18.306273]  print_report+0x118/0x608
[   18.306343]  kasan_report+0xdc/0x128
[   18.306427]  kasan_check_range+0x100/0x1a8
[   18.306528]  __kasan_check_write+0x20/0x30
[   18.306903]  kasan_atomics_helper+0xe44/0x4858
[   18.307213]  kasan_atomics+0x198/0x2e0
[   18.307318]  kunit_try_run_case+0x170/0x3f0
[   18.307691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.308103]  kthread+0x328/0x630
[   18.308251]  ret_from_fork+0x10/0x20
[   18.308432] 
[   18.308534] Allocated by task 270:
[   18.308683]  kasan_save_stack+0x3c/0x68
[   18.308761]  kasan_save_track+0x20/0x40
[   18.308800]  kasan_save_alloc_info+0x40/0x58
[   18.308847]  __kasan_kmalloc+0xd4/0xd8
[   18.309016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.309288]  kasan_atomics+0xb8/0x2e0
[   18.309925]  kunit_try_run_case+0x170/0x3f0
[   18.310296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.310393]  kthread+0x328/0x630
[   18.310664]  ret_from_fork+0x10/0x20
[   18.310817] 
[   18.310901] The buggy address belongs to the object at fff00000c7948980
[   18.310901]  which belongs to the cache kmalloc-64 of size 64
[   18.311019] The buggy address is located 0 bytes to the right of
[   18.311019]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.311378] 
[   18.311453] The buggy address belongs to the physical page:
[   18.311573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.311939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.312132] page_type: f5(slab)
[   18.312211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.312552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.312597] page dumped because: kasan: bad access detected
[   18.312646] 
[   18.312666] Memory state around the buggy address:
[   18.312699]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.313137]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.313441] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.313815]                                      ^
[   18.313907]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.314120]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.314298] ==================================================================
[   18.476677] ==================================================================
[   18.477068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.477181] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.477236] 
[   18.477270] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.477408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.477439] Hardware name: linux,dummy-virt (DT)
[   18.477470] Call trace:
[   18.477495]  show_stack+0x20/0x38 (C)
[   18.477549]  dump_stack_lvl+0x8c/0xd0
[   18.477598]  print_report+0x118/0x608
[   18.478023]  kasan_report+0xdc/0x128
[   18.478316]  kasan_check_range+0x100/0x1a8
[   18.478541]  __kasan_check_write+0x20/0x30
[   18.478649]  kasan_atomics_helper+0x1644/0x4858
[   18.478951]  kasan_atomics+0x198/0x2e0
[   18.479060]  kunit_try_run_case+0x170/0x3f0
[   18.479115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.479242]  kthread+0x328/0x630
[   18.479296]  ret_from_fork+0x10/0x20
[   18.479363] 
[   18.479448] Allocated by task 270:
[   18.479483]  kasan_save_stack+0x3c/0x68
[   18.479523]  kasan_save_track+0x20/0x40
[   18.479850]  kasan_save_alloc_info+0x40/0x58
[   18.479937]  __kasan_kmalloc+0xd4/0xd8
[   18.480190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.480279]  kasan_atomics+0xb8/0x2e0
[   18.480341]  kunit_try_run_case+0x170/0x3f0
[   18.480512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.480647]  kthread+0x328/0x630
[   18.480746]  ret_from_fork+0x10/0x20
[   18.480824] 
[   18.480849] The buggy address belongs to the object at fff00000c7948980
[   18.480849]  which belongs to the cache kmalloc-64 of size 64
[   18.480909] The buggy address is located 0 bytes to the right of
[   18.480909]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.480974] 
[   18.481522] The buggy address belongs to the physical page:
[   18.481849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.482063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.482221] page_type: f5(slab)
[   18.482349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.482415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.482677] page dumped because: kasan: bad access detected
[   18.482728] 
[   18.482750] Memory state around the buggy address:
[   18.482793]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.482840]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.482903] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.482952]                                      ^
[   18.482988]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.483032]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.483072] ==================================================================
[   18.054960] ==================================================================
[   18.055013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   18.055096] Read of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.055511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.055551] Hardware name: linux,dummy-virt (DT)
[   18.055592] Call trace:
[   18.055616]  show_stack+0x20/0x38 (C)
[   18.055823]  dump_stack_lvl+0x8c/0xd0
[   18.055954]  print_report+0x118/0x608
[   18.061386] Hardware name: linux,dummy-virt (DT)
[   18.062542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.064329] The buggy address is located 0 bytes to the right of
[   18.064329]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.064981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.066149]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.067259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.067900]  __asan_report_store4_noabort+0x20/0x30
[   18.069057] Allocated by task 270:
[   18.069611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.069936] The buggy address belongs to the physical page:
[   18.070168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.070527]                                      ^
[   18.070910] ==================================================================
[   18.181774] ==================================================================
[   18.181857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.182578] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.182865] 
[   18.182905] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.183012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.183051] Hardware name: linux,dummy-virt (DT)
[   18.183186] Call trace:
[   18.183222]  show_stack+0x20/0x38 (C)
[   18.183275]  dump_stack_lvl+0x8c/0xd0
[   18.183323]  print_report+0x118/0x608
[   18.183369]  kasan_report+0xdc/0x128
[   18.183436]  kasan_check_range+0x100/0x1a8
[   18.183488]  __kasan_check_write+0x20/0x30
[   18.183538]  kasan_atomics_helper+0x99c/0x4858
[   18.183584]  kasan_atomics+0x198/0x2e0
[   18.183640]  kunit_try_run_case+0x170/0x3f0
[   18.183757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.183820]  kthread+0x328/0x630
[   18.184140]  ret_from_fork+0x10/0x20
[   18.184260] 
[   18.184316] Allocated by task 270:
[   18.184576]  kasan_save_stack+0x3c/0x68
[   18.184819]  kasan_save_track+0x20/0x40
[   18.185117]  kasan_save_alloc_info+0x40/0x58
[   18.185449]  __kasan_kmalloc+0xd4/0xd8
[   18.185589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.185769]  kasan_atomics+0xb8/0x2e0
[   18.185810]  kunit_try_run_case+0x170/0x3f0
[   18.186122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186242]  kthread+0x328/0x630
[   18.186350]  ret_from_fork+0x10/0x20
[   18.186600] 
[   18.186669] The buggy address belongs to the object at fff00000c7948980
[   18.186669]  which belongs to the cache kmalloc-64 of size 64
[   18.186794] The buggy address is located 0 bytes to the right of
[   18.186794]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.186953] 
[   18.187245] The buggy address belongs to the physical page:
[   18.187311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.187380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.187674] page_type: f5(slab)
[   18.187804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.187918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.188186] page dumped because: kasan: bad access detected
[   18.188252] 
[   18.188304] Memory state around the buggy address:
[   18.188359]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.188407]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.188452] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.188502]                                      ^
[   18.188549]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.188593]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.188662] ==================================================================
[   18.396599] ==================================================================
[   18.396821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.396988] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.397063] 
[   18.397174] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.397263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.397292] Hardware name: linux,dummy-virt (DT)
[   18.397338] Call trace:
[   18.397365]  show_stack+0x20/0x38 (C)
[   18.397822]  dump_stack_lvl+0x8c/0xd0
[   18.397916]  print_report+0x118/0x608
[   18.397977]  kasan_report+0xdc/0x128
[   18.398066]  kasan_check_range+0x100/0x1a8
[   18.398120]  __kasan_check_write+0x20/0x30
[   18.398280]  kasan_atomics_helper+0x126c/0x4858
[   18.398335]  kasan_atomics+0x198/0x2e0
[   18.398378]  kunit_try_run_case+0x170/0x3f0
[   18.398679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.398767]  kthread+0x328/0x630
[   18.399026]  ret_from_fork+0x10/0x20
[   18.399228] 
[   18.399284] Allocated by task 270:
[   18.399318]  kasan_save_stack+0x3c/0x68
[   18.399360]  kasan_save_track+0x20/0x40
[   18.399435]  kasan_save_alloc_info+0x40/0x58
[   18.399477]  __kasan_kmalloc+0xd4/0xd8
[   18.399523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.399562]  kasan_atomics+0xb8/0x2e0
[   18.399598]  kunit_try_run_case+0x170/0x3f0
[   18.399656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.399703]  kthread+0x328/0x630
[   18.399740]  ret_from_fork+0x10/0x20
[   18.399776] 
[   18.399804] The buggy address belongs to the object at fff00000c7948980
[   18.399804]  which belongs to the cache kmalloc-64 of size 64
[   18.399864] The buggy address is located 0 bytes to the right of
[   18.399864]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.399929] 
[   18.399951] The buggy address belongs to the physical page:
[   18.399995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.400399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.400690] page_type: f5(slab)
[   18.400931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.401030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.401074] page dumped because: kasan: bad access detected
[   18.401753] 
[   18.401815] Memory state around the buggy address:
[   18.401876]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.401947]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.402166] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.402222]                                      ^
[   18.402592]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.402693]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.403041] ==================================================================
[   18.425621] ==================================================================
[   18.425698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.425748] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.425799] 
[   18.425831] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.425911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.425939] Hardware name: linux,dummy-virt (DT)
[   18.425980] Call trace:
[   18.426003]  show_stack+0x20/0x38 (C)
[   18.426053]  dump_stack_lvl+0x8c/0xd0
[   18.426101]  print_report+0x118/0x608
[   18.426148]  kasan_report+0xdc/0x128
[   18.426192]  __asan_report_load8_noabort+0x20/0x30
[   18.426243]  kasan_atomics_helper+0x3f04/0x4858
[   18.426291]  kasan_atomics+0x198/0x2e0
[   18.426335]  kunit_try_run_case+0x170/0x3f0
[   18.426384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.426439]  kthread+0x328/0x630
[   18.426485]  ret_from_fork+0x10/0x20
[   18.426534] 
[   18.426554] Allocated by task 270:
[   18.426584]  kasan_save_stack+0x3c/0x68
[   18.426622]  kasan_save_track+0x20/0x40
[   18.426726]  kasan_save_alloc_info+0x40/0x58
[   18.426770]  __kasan_kmalloc+0xd4/0xd8
[   18.426807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.426917]  kasan_atomics+0xb8/0x2e0
[   18.426964]  kunit_try_run_case+0x170/0x3f0
[   18.427006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.427172]  kthread+0x328/0x630
[   18.427213]  ret_from_fork+0x10/0x20
[   18.427249] 
[   18.427272] The buggy address belongs to the object at fff00000c7948980
[   18.427272]  which belongs to the cache kmalloc-64 of size 64
[   18.427561] The buggy address is located 0 bytes to the right of
[   18.427561]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.427718] 
[   18.427743] The buggy address belongs to the physical page:
[   18.428016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.428226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.428503] page_type: f5(slab)
[   18.428619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.428718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.428796] page dumped because: kasan: bad access detected
[   18.428904] 
[   18.429216] Memory state around the buggy address:
[   18.429281]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.429393]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.429487] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.429602]                                      ^
[   18.429654]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.429700]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.430206] ==================================================================
[   18.444414] ==================================================================
[   18.444528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.444609] Write of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.444702] 
[   18.444854] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.445232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.445267] Hardware name: linux,dummy-virt (DT)
[   18.445301] Call trace:
[   18.445324]  show_stack+0x20/0x38 (C)
[   18.445377]  dump_stack_lvl+0x8c/0xd0
[   18.445992]  print_report+0x118/0x608
[   18.446077]  kasan_report+0xdc/0x128
[   18.446487]  kasan_check_range+0x100/0x1a8
[   18.446662]  __kasan_check_write+0x20/0x30
[   18.446784]  kasan_atomics_helper+0x14e4/0x4858
[   18.446850]  kasan_atomics+0x198/0x2e0
[   18.447219]  kunit_try_run_case+0x170/0x3f0
[   18.447479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.447594]  kthread+0x328/0x630
[   18.447971]  ret_from_fork+0x10/0x20
[   18.448099] 
[   18.448143] Allocated by task 270:
[   18.448320]  kasan_save_stack+0x3c/0x68
[   18.448671]  kasan_save_track+0x20/0x40
[   18.448779]  kasan_save_alloc_info+0x40/0x58
[   18.448868]  __kasan_kmalloc+0xd4/0xd8
[   18.449003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.449110]  kasan_atomics+0xb8/0x2e0
[   18.449196]  kunit_try_run_case+0x170/0x3f0
[   18.449460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.449527]  kthread+0x328/0x630
[   18.449662]  ret_from_fork+0x10/0x20
[   18.449771] 
[   18.449842] The buggy address belongs to the object at fff00000c7948980
[   18.449842]  which belongs to the cache kmalloc-64 of size 64
[   18.450190] The buggy address is located 0 bytes to the right of
[   18.450190]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.450398] 
[   18.450465] The buggy address belongs to the physical page:
[   18.450500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.450812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.450915] page_type: f5(slab)
[   18.451233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.451350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.451418] page dumped because: kasan: bad access detected
[   18.451453] 
[   18.451473] Memory state around the buggy address:
[   18.451795]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.451858]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452181] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.452305]                                      ^
[   18.452380]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.452423]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.452463] ==================================================================
[   18.289322] ==================================================================
[   18.289375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.289731] Read of size 8 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.289806] 
[   18.290203] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.290311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.290645] Hardware name: linux,dummy-virt (DT)
[   18.290723] Call trace:
[   18.290764]  show_stack+0x20/0x38 (C)
[   18.290815]  dump_stack_lvl+0x8c/0xd0
[   18.290972]  print_report+0x118/0x608
[   18.291022]  kasan_report+0xdc/0x128
[   18.291068]  kasan_check_range+0x100/0x1a8
[   18.291566]  __kasan_check_read+0x20/0x30
[   18.291745]  kasan_atomics_helper+0xdd4/0x4858
[   18.291838]  kasan_atomics+0x198/0x2e0
[   18.291892]  kunit_try_run_case+0x170/0x3f0
[   18.291978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.292283]  kthread+0x328/0x630
[   18.292491]  ret_from_fork+0x10/0x20
[   18.292547] 
[   18.292599] Allocated by task 270:
[   18.292681]  kasan_save_stack+0x3c/0x68
[   18.292981]  kasan_save_track+0x20/0x40
[   18.293298]  kasan_save_alloc_info+0x40/0x58
[   18.293471]  __kasan_kmalloc+0xd4/0xd8
[   18.293513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.293815]  kasan_atomics+0xb8/0x2e0
[   18.293952]  kunit_try_run_case+0x170/0x3f0
[   18.294249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.294716]  kthread+0x328/0x630
[   18.295152]  ret_from_fork+0x10/0x20
[   18.295298] 
[   18.295324] The buggy address belongs to the object at fff00000c7948980
[   18.295324]  which belongs to the cache kmalloc-64 of size 64
[   18.295811] The buggy address is located 0 bytes to the right of
[   18.295811]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.296049] 
[   18.296079] The buggy address belongs to the physical page:
[   18.296113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.296341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.296413] page_type: f5(slab)
[   18.296485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.296860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.296943] page dumped because: kasan: bad access detected
[   18.296978] 
[   18.297000] Memory state around the buggy address:
[   18.297035]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.297485]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.297654] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.297725]                                      ^
[   18.297810]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.297871]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.297919] ==================================================================
[   18.272824] ==================================================================
[   18.272874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.273324] Write of size 4 at addr fff00000c79489b0 by task kunit_try_catch/270
[   18.273395] 
[   18.273605] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.274062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274129] Hardware name: linux,dummy-virt (DT)
[   18.274164] Call trace:
[   18.274458]  show_stack+0x20/0x38 (C)
[   18.274643]  dump_stack_lvl+0x8c/0xd0
[   18.274718]  print_report+0x118/0x608
[   18.274846]  kasan_report+0xdc/0x128
[   18.274909]  kasan_check_range+0x100/0x1a8
[   18.274997]  __kasan_check_write+0x20/0x30
[   18.275046]  kasan_atomics_helper+0xd3c/0x4858
[   18.275414]  kasan_atomics+0x198/0x2e0
[   18.275474]  kunit_try_run_case+0x170/0x3f0
[   18.275816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.275964]  kthread+0x328/0x630
[   18.276520]  ret_from_fork+0x10/0x20
[   18.276583] 
[   18.276647] Allocated by task 270:
[   18.276680]  kasan_save_stack+0x3c/0x68
[   18.276915]  kasan_save_track+0x20/0x40
[   18.277003]  kasan_save_alloc_info+0x40/0x58
[   18.277354]  __kasan_kmalloc+0xd4/0xd8
[   18.277429]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.277860]  kasan_atomics+0xb8/0x2e0
[   18.277910]  kunit_try_run_case+0x170/0x3f0
[   18.277960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.278010]  kthread+0x328/0x630
[   18.278106]  ret_from_fork+0x10/0x20
[   18.278146] 
[   18.278168] The buggy address belongs to the object at fff00000c7948980
[   18.278168]  which belongs to the cache kmalloc-64 of size 64
[   18.278240] The buggy address is located 0 bytes to the right of
[   18.278240]  allocated 48-byte region [fff00000c7948980, fff00000c79489b0)
[   18.278324] 
[   18.278346] The buggy address belongs to the physical page:
[   18.278389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107948
[   18.278451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.278507] page_type: f5(slab)
[   18.278554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.278607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.278660] page dumped because: kasan: bad access detected
[   18.278701] 
[   18.278731] Memory state around the buggy address:
[   18.278775]  fff00000c7948880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.278829]  fff00000c7948900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.278873] >fff00000c7948980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.278922]                                      ^
[   18.278958]  fff00000c7948a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.279011]  fff00000c7948a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.279060] ==================================================================

[   18.166543] ==================================================================
[   18.166997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   18.167358] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.168031] 
[   18.168586] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.168699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.168718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.168746] Call Trace:
[   18.168774]  <TASK>
[   18.168804]  dump_stack_lvl+0x73/0xb0
[   18.168844]  print_report+0xd1/0x650
[   18.168872]  ? __virt_addr_valid+0x1db/0x2d0
[   18.168901]  ? kasan_atomics_helper+0xd47/0x5450
[   18.168927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.168955]  ? kasan_atomics_helper+0xd47/0x5450
[   18.168981]  kasan_report+0x141/0x180
[   18.169007]  ? kasan_atomics_helper+0xd47/0x5450
[   18.169054]  kasan_check_range+0x10c/0x1c0
[   18.169122]  __kasan_check_write+0x18/0x20
[   18.169181]  kasan_atomics_helper+0xd47/0x5450
[   18.169236]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.169316]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.169390]  ? kasan_atomics+0x152/0x310
[   18.169461]  kasan_atomics+0x1dc/0x310
[   18.169505]  ? __pfx_kasan_atomics+0x10/0x10
[   18.169534]  ? __pfx_read_tsc+0x10/0x10
[   18.169558]  ? ktime_get_ts64+0x86/0x230
[   18.169591]  kunit_try_run_case+0x1a5/0x480
[   18.169620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.169647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.169677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.169706]  ? __kthread_parkme+0x82/0x180
[   18.169733]  ? preempt_count_sub+0x50/0x80
[   18.169762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.169791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.169819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.169848]  kthread+0x337/0x6f0
[   18.169871]  ? trace_preempt_on+0x20/0xc0
[   18.169899]  ? __pfx_kthread+0x10/0x10
[   18.169921]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.169948]  ? calculate_sigpending+0x7b/0xa0
[   18.169975]  ? __pfx_kthread+0x10/0x10
[   18.169997]  ret_from_fork+0x41/0x80
[   18.170021]  ? __pfx_kthread+0x10/0x10
[   18.170043]  ret_from_fork_asm+0x1a/0x30
[   18.170106]  </TASK>
[   18.170121] 
[   18.183591] Allocated by task 286:
[   18.185444]  kasan_save_stack+0x45/0x70
[   18.185836]  kasan_save_track+0x18/0x40
[   18.186254]  kasan_save_alloc_info+0x3b/0x50
[   18.186994]  __kasan_kmalloc+0xb7/0xc0
[   18.187421]  __kmalloc_cache_noprof+0x189/0x420
[   18.187693]  kasan_atomics+0x95/0x310
[   18.188002]  kunit_try_run_case+0x1a5/0x480
[   18.188373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.189062]  kthread+0x337/0x6f0
[   18.189422]  ret_from_fork+0x41/0x80
[   18.189647]  ret_from_fork_asm+0x1a/0x30
[   18.189891] 
[   18.190068] The buggy address belongs to the object at ffff888102b21f80
[   18.190068]  which belongs to the cache kmalloc-64 of size 64
[   18.190933] The buggy address is located 0 bytes to the right of
[   18.190933]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.191770] 
[   18.192046] The buggy address belongs to the physical page:
[   18.192322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.192898] flags: 0x200000000000000(node=0|zone=2)
[   18.193315] page_type: f5(slab)
[   18.193585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.193977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.194312] page dumped because: kasan: bad access detected
[   18.195172] 
[   18.195257] Memory state around the buggy address:
[   18.195421]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.196391]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.196874] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.197556]                                      ^
[   18.197820]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.198429]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198716] ==================================================================
[   18.200657] ==================================================================
[   18.201241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   18.201515] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.202701] 
[   18.203196] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.203273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.203298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.203359] Call Trace:
[   18.203406]  <TASK>
[   18.203590]  dump_stack_lvl+0x73/0xb0
[   18.203644]  print_report+0xd1/0x650
[   18.203675]  ? __virt_addr_valid+0x1db/0x2d0
[   18.203704]  ? kasan_atomics_helper+0xde0/0x5450
[   18.203730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.203759]  ? kasan_atomics_helper+0xde0/0x5450
[   18.203786]  kasan_report+0x141/0x180
[   18.203812]  ? kasan_atomics_helper+0xde0/0x5450
[   18.203843]  kasan_check_range+0x10c/0x1c0
[   18.203868]  __kasan_check_write+0x18/0x20
[   18.203892]  kasan_atomics_helper+0xde0/0x5450
[   18.203920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.203947]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.203974]  ? kasan_atomics+0x152/0x310
[   18.204001]  kasan_atomics+0x1dc/0x310
[   18.204024]  ? __pfx_kasan_atomics+0x10/0x10
[   18.204049]  ? __pfx_read_tsc+0x10/0x10
[   18.204098]  ? ktime_get_ts64+0x86/0x230
[   18.204129]  kunit_try_run_case+0x1a5/0x480
[   18.204159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.204185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.204214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.204242]  ? __kthread_parkme+0x82/0x180
[   18.204269]  ? preempt_count_sub+0x50/0x80
[   18.204299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.204328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.204377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.204407]  kthread+0x337/0x6f0
[   18.204429]  ? trace_preempt_on+0x20/0xc0
[   18.204457]  ? __pfx_kthread+0x10/0x10
[   18.204479]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.204505]  ? calculate_sigpending+0x7b/0xa0
[   18.204531]  ? __pfx_kthread+0x10/0x10
[   18.204554]  ret_from_fork+0x41/0x80
[   18.204578]  ? __pfx_kthread+0x10/0x10
[   18.204600]  ret_from_fork_asm+0x1a/0x30
[   18.204636]  </TASK>
[   18.204651] 
[   18.215819] Allocated by task 286:
[   18.216067]  kasan_save_stack+0x45/0x70
[   18.216378]  kasan_save_track+0x18/0x40
[   18.216580]  kasan_save_alloc_info+0x3b/0x50
[   18.216789]  __kasan_kmalloc+0xb7/0xc0
[   18.217005]  __kmalloc_cache_noprof+0x189/0x420
[   18.217448]  kasan_atomics+0x95/0x310
[   18.217796]  kunit_try_run_case+0x1a5/0x480
[   18.218213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.218685]  kthread+0x337/0x6f0
[   18.218996]  ret_from_fork+0x41/0x80
[   18.219455]  ret_from_fork_asm+0x1a/0x30
[   18.219729] 
[   18.219853] The buggy address belongs to the object at ffff888102b21f80
[   18.219853]  which belongs to the cache kmalloc-64 of size 64
[   18.220723] The buggy address is located 0 bytes to the right of
[   18.220723]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.221321] 
[   18.221538] The buggy address belongs to the physical page:
[   18.221902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.222328] flags: 0x200000000000000(node=0|zone=2)
[   18.222767] page_type: f5(slab)
[   18.223059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.223492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.223773] page dumped because: kasan: bad access detected
[   18.223991] 
[   18.224100] Memory state around the buggy address:
[   18.224539]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.225117]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.225716] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.226396]                                      ^
[   18.226641]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.227026]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227600] ==================================================================
[   18.230138] ==================================================================
[   18.230813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   18.231370] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.232059] 
[   18.232237] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.232352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.232382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.232433] Call Trace:
[   18.232477]  <TASK>
[   18.232522]  dump_stack_lvl+0x73/0xb0
[   18.232593]  print_report+0xd1/0x650
[   18.232651]  ? __virt_addr_valid+0x1db/0x2d0
[   18.232706]  ? kasan_atomics_helper+0xe78/0x5450
[   18.232759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.232807]  ? kasan_atomics_helper+0xe78/0x5450
[   18.232856]  kasan_report+0x141/0x180
[   18.232904]  ? kasan_atomics_helper+0xe78/0x5450
[   18.232961]  kasan_check_range+0x10c/0x1c0
[   18.233007]  __kasan_check_write+0x18/0x20
[   18.233068]  kasan_atomics_helper+0xe78/0x5450
[   18.233120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.233176]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.233232]  ? kasan_atomics+0x152/0x310
[   18.233292]  kasan_atomics+0x1dc/0x310
[   18.233346]  ? __pfx_kasan_atomics+0x10/0x10
[   18.233393]  ? __pfx_read_tsc+0x10/0x10
[   18.233434]  ? ktime_get_ts64+0x86/0x230
[   18.233488]  kunit_try_run_case+0x1a5/0x480
[   18.233544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.233596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.233655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.233712]  ? __kthread_parkme+0x82/0x180
[   18.233761]  ? preempt_count_sub+0x50/0x80
[   18.233815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.233868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.233929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.233992]  kthread+0x337/0x6f0
[   18.234037]  ? trace_preempt_on+0x20/0xc0
[   18.234102]  ? __pfx_kthread+0x10/0x10
[   18.234150]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.234207]  ? calculate_sigpending+0x7b/0xa0
[   18.234262]  ? __pfx_kthread+0x10/0x10
[   18.234312]  ret_from_fork+0x41/0x80
[   18.234382]  ? __pfx_kthread+0x10/0x10
[   18.234430]  ret_from_fork_asm+0x1a/0x30
[   18.234511]  </TASK>
[   18.234542] 
[   18.244571] Allocated by task 286:
[   18.244908]  kasan_save_stack+0x45/0x70
[   18.245383]  kasan_save_track+0x18/0x40
[   18.245749]  kasan_save_alloc_info+0x3b/0x50
[   18.246177]  __kasan_kmalloc+0xb7/0xc0
[   18.246611]  __kmalloc_cache_noprof+0x189/0x420
[   18.247065]  kasan_atomics+0x95/0x310
[   18.247455]  kunit_try_run_case+0x1a5/0x480
[   18.247883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.248269]  kthread+0x337/0x6f0
[   18.248613]  ret_from_fork+0x41/0x80
[   18.248952]  ret_from_fork_asm+0x1a/0x30
[   18.249457] 
[   18.249661] The buggy address belongs to the object at ffff888102b21f80
[   18.249661]  which belongs to the cache kmalloc-64 of size 64
[   18.250100] The buggy address is located 0 bytes to the right of
[   18.250100]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.250807] 
[   18.251071] The buggy address belongs to the physical page:
[   18.251692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.252509] flags: 0x200000000000000(node=0|zone=2)
[   18.252983] page_type: f5(slab)
[   18.253353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.253865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.254488] page dumped because: kasan: bad access detected
[   18.254763] 
[   18.254884] Memory state around the buggy address:
[   18.255101]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255391]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255657] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.256245]                                      ^
[   18.256666]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.257428]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.258059] ==================================================================
[   18.595447] ==================================================================
[   18.596038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   18.596466] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.597212] 
[   18.597558] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.597676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.597709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.597762] Call Trace:
[   18.597811]  <TASK>
[   18.597862]  dump_stack_lvl+0x73/0xb0
[   18.597923]  print_report+0xd1/0x650
[   18.597965]  ? __virt_addr_valid+0x1db/0x2d0
[   18.598009]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.598046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.598089]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.598128]  kasan_report+0x141/0x180
[   18.598166]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.598213]  kasan_check_range+0x10c/0x1c0
[   18.598251]  __kasan_check_read+0x15/0x20
[   18.598285]  kasan_atomics_helper+0x13b5/0x5450
[   18.598327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.598396]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.598439]  ? kasan_atomics+0x152/0x310
[   18.598480]  kasan_atomics+0x1dc/0x310
[   18.598515]  ? __pfx_kasan_atomics+0x10/0x10
[   18.598650]  ? __pfx_read_tsc+0x10/0x10
[   18.598709]  ? ktime_get_ts64+0x86/0x230
[   18.598768]  kunit_try_run_case+0x1a5/0x480
[   18.598833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.598887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.598946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.599007]  ? __kthread_parkme+0x82/0x180
[   18.599061]  ? preempt_count_sub+0x50/0x80
[   18.599114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.599146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.599176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.599205]  kthread+0x337/0x6f0
[   18.599227]  ? trace_preempt_on+0x20/0xc0
[   18.599254]  ? __pfx_kthread+0x10/0x10
[   18.599276]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.599303]  ? calculate_sigpending+0x7b/0xa0
[   18.599329]  ? __pfx_kthread+0x10/0x10
[   18.599374]  ret_from_fork+0x41/0x80
[   18.599399]  ? __pfx_kthread+0x10/0x10
[   18.599421]  ret_from_fork_asm+0x1a/0x30
[   18.599463]  </TASK>
[   18.599477] 
[   18.610478] Allocated by task 286:
[   18.610688]  kasan_save_stack+0x45/0x70
[   18.610895]  kasan_save_track+0x18/0x40
[   18.611107]  kasan_save_alloc_info+0x3b/0x50
[   18.611531]  __kasan_kmalloc+0xb7/0xc0
[   18.611841]  __kmalloc_cache_noprof+0x189/0x420
[   18.612472]  kasan_atomics+0x95/0x310
[   18.613217]  kunit_try_run_case+0x1a5/0x480
[   18.613668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.614178]  kthread+0x337/0x6f0
[   18.614501]  ret_from_fork+0x41/0x80
[   18.614824]  ret_from_fork_asm+0x1a/0x30
[   18.615195] 
[   18.615394] The buggy address belongs to the object at ffff888102b21f80
[   18.615394]  which belongs to the cache kmalloc-64 of size 64
[   18.616405] The buggy address is located 0 bytes to the right of
[   18.616405]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.617384] 
[   18.617595] The buggy address belongs to the physical page:
[   18.617959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.618680] flags: 0x200000000000000(node=0|zone=2)
[   18.619484] page_type: f5(slab)
[   18.619879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.620226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.620526] page dumped because: kasan: bad access detected
[   18.620748] 
[   18.620867] Memory state around the buggy address:
[   18.621090]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.621716]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.622413] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.623144]                                      ^
[   18.623577]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.624127]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.624713] ==================================================================
[   18.048427] ==================================================================
[   18.048998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   18.049378] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.049689] 
[   18.049859] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.049970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.050001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.050053] Call Trace:
[   18.050097]  <TASK>
[   18.050139]  dump_stack_lvl+0x73/0xb0
[   18.050205]  print_report+0xd1/0x650
[   18.050255]  ? __virt_addr_valid+0x1db/0x2d0
[   18.050317]  ? kasan_atomics_helper+0xac7/0x5450
[   18.050386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.050435]  ? kasan_atomics_helper+0xac7/0x5450
[   18.050483]  kasan_report+0x141/0x180
[   18.050533]  ? kasan_atomics_helper+0xac7/0x5450
[   18.050599]  kasan_check_range+0x10c/0x1c0
[   18.050651]  __kasan_check_write+0x18/0x20
[   18.050704]  kasan_atomics_helper+0xac7/0x5450
[   18.050765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.050827]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.050883]  ? kasan_atomics+0x152/0x310
[   18.050944]  kasan_atomics+0x1dc/0x310
[   18.050994]  ? __pfx_kasan_atomics+0x10/0x10
[   18.051050]  ? __pfx_read_tsc+0x10/0x10
[   18.051097]  ? ktime_get_ts64+0x86/0x230
[   18.051160]  kunit_try_run_case+0x1a5/0x480
[   18.051224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.051399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.051461]  ? __kthread_parkme+0x82/0x180
[   18.051516]  ? preempt_count_sub+0x50/0x80
[   18.051580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.051642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.051705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.051768]  kthread+0x337/0x6f0
[   18.051812]  ? trace_preempt_on+0x20/0xc0
[   18.051870]  ? __pfx_kthread+0x10/0x10
[   18.051918]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.051976]  ? calculate_sigpending+0x7b/0xa0
[   18.052030]  ? __pfx_kthread+0x10/0x10
[   18.052073]  ret_from_fork+0x41/0x80
[   18.052115]  ? __pfx_kthread+0x10/0x10
[   18.052155]  ret_from_fork_asm+0x1a/0x30
[   18.052219]  </TASK>
[   18.052244] 
[   18.067303] Allocated by task 286:
[   18.067649]  kasan_save_stack+0x45/0x70
[   18.068026]  kasan_save_track+0x18/0x40
[   18.068285]  kasan_save_alloc_info+0x3b/0x50
[   18.068560]  __kasan_kmalloc+0xb7/0xc0
[   18.068873]  __kmalloc_cache_noprof+0x189/0x420
[   18.069145]  kasan_atomics+0x95/0x310
[   18.069354]  kunit_try_run_case+0x1a5/0x480
[   18.069706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.070150]  kthread+0x337/0x6f0
[   18.070470]  ret_from_fork+0x41/0x80
[   18.070790]  ret_from_fork_asm+0x1a/0x30
[   18.071181] 
[   18.071409] The buggy address belongs to the object at ffff888102b21f80
[   18.071409]  which belongs to the cache kmalloc-64 of size 64
[   18.071893] The buggy address is located 0 bytes to the right of
[   18.071893]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.072370] 
[   18.072560] The buggy address belongs to the physical page:
[   18.072979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.073660] flags: 0x200000000000000(node=0|zone=2)
[   18.074056] page_type: f5(slab)
[   18.074418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.074806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.075126] page dumped because: kasan: bad access detected
[   18.075421] 
[   18.075592] Memory state around the buggy address:
[   18.076036]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.076488]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.076888] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.077437]                                      ^
[   18.077660]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.077934]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078503] ==================================================================
[   17.814625] ==================================================================
[   17.815705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   17.816265] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.816947] 
[   17.817350] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.817562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.817592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.817620] Call Trace:
[   17.817648]  <TASK>
[   17.817678]  dump_stack_lvl+0x73/0xb0
[   17.817719]  print_report+0xd1/0x650
[   17.817749]  ? __virt_addr_valid+0x1db/0x2d0
[   17.817778]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.817806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.817834]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.817861]  kasan_report+0x141/0x180
[   17.817888]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.817952]  kasan_check_range+0x10c/0x1c0
[   17.817978]  __kasan_check_write+0x18/0x20
[   17.818003]  kasan_atomics_helper+0x5fe/0x5450
[   17.818031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.818061]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.818101]  ? kasan_atomics+0x152/0x310
[   17.818130]  kasan_atomics+0x1dc/0x310
[   17.818153]  ? __pfx_kasan_atomics+0x10/0x10
[   17.818180]  ? __pfx_read_tsc+0x10/0x10
[   17.818205]  ? ktime_get_ts64+0x86/0x230
[   17.818236]  kunit_try_run_case+0x1a5/0x480
[   17.818267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.818294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.818323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.818373]  ? __kthread_parkme+0x82/0x180
[   17.818401]  ? preempt_count_sub+0x50/0x80
[   17.818432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.818461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.818490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.818519]  kthread+0x337/0x6f0
[   17.818542]  ? trace_preempt_on+0x20/0xc0
[   17.818569]  ? __pfx_kthread+0x10/0x10
[   17.818591]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.818617]  ? calculate_sigpending+0x7b/0xa0
[   17.818642]  ? __pfx_kthread+0x10/0x10
[   17.818665]  ret_from_fork+0x41/0x80
[   17.818688]  ? __pfx_kthread+0x10/0x10
[   17.818709]  ret_from_fork_asm+0x1a/0x30
[   17.818744]  </TASK>
[   17.818758] 
[   17.831440] Allocated by task 286:
[   17.831739]  kasan_save_stack+0x45/0x70
[   17.832109]  kasan_save_track+0x18/0x40
[   17.832471]  kasan_save_alloc_info+0x3b/0x50
[   17.832783]  __kasan_kmalloc+0xb7/0xc0
[   17.832985]  __kmalloc_cache_noprof+0x189/0x420
[   17.833216]  kasan_atomics+0x95/0x310
[   17.833587]  kunit_try_run_case+0x1a5/0x480
[   17.834127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.834777]  kthread+0x337/0x6f0
[   17.835155]  ret_from_fork+0x41/0x80
[   17.835485]  ret_from_fork_asm+0x1a/0x30
[   17.835851] 
[   17.836093] The buggy address belongs to the object at ffff888102b21f80
[   17.836093]  which belongs to the cache kmalloc-64 of size 64
[   17.836756] The buggy address is located 0 bytes to the right of
[   17.836756]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.837211] 
[   17.837346] The buggy address belongs to the physical page:
[   17.837580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.838257] flags: 0x200000000000000(node=0|zone=2)
[   17.838704] page_type: f5(slab)
[   17.839022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.840306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.840806] page dumped because: kasan: bad access detected
[   17.841107] 
[   17.841365] Memory state around the buggy address:
[   17.841741]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.842469]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.843025] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.843713]                                      ^
[   17.844073]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.844727]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.845208] ==================================================================
[   18.878934] ==================================================================
[   18.879382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   18.879972] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.880429] 
[   18.880583] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.880682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.880710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.880768] Call Trace:
[   18.880831]  <TASK>
[   18.880889]  dump_stack_lvl+0x73/0xb0
[   18.880978]  print_report+0xd1/0x650
[   18.881048]  ? __virt_addr_valid+0x1db/0x2d0
[   18.881136]  ? kasan_atomics_helper+0x1818/0x5450
[   18.881189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.881244]  ? kasan_atomics_helper+0x1818/0x5450
[   18.881369]  kasan_report+0x141/0x180
[   18.881433]  ? kasan_atomics_helper+0x1818/0x5450
[   18.881513]  kasan_check_range+0x10c/0x1c0
[   18.881573]  __kasan_check_write+0x18/0x20
[   18.881628]  kasan_atomics_helper+0x1818/0x5450
[   18.881688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.881745]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.881810]  ? kasan_atomics+0x152/0x310
[   18.881883]  kasan_atomics+0x1dc/0x310
[   18.881935]  ? __pfx_kasan_atomics+0x10/0x10
[   18.881978]  ? __pfx_read_tsc+0x10/0x10
[   18.882013]  ? ktime_get_ts64+0x86/0x230
[   18.882046]  kunit_try_run_case+0x1a5/0x480
[   18.882102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.882131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.882162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.882190]  ? __kthread_parkme+0x82/0x180
[   18.882218]  ? preempt_count_sub+0x50/0x80
[   18.882248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.882276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.882305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.882353]  kthread+0x337/0x6f0
[   18.882378]  ? trace_preempt_on+0x20/0xc0
[   18.882409]  ? __pfx_kthread+0x10/0x10
[   18.882431]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.882458]  ? calculate_sigpending+0x7b/0xa0
[   18.882485]  ? __pfx_kthread+0x10/0x10
[   18.882508]  ret_from_fork+0x41/0x80
[   18.882531]  ? __pfx_kthread+0x10/0x10
[   18.882554]  ret_from_fork_asm+0x1a/0x30
[   18.882591]  </TASK>
[   18.882605] 
[   18.892330] Allocated by task 286:
[   18.892713]  kasan_save_stack+0x45/0x70
[   18.893134]  kasan_save_track+0x18/0x40
[   18.893536]  kasan_save_alloc_info+0x3b/0x50
[   18.893928]  __kasan_kmalloc+0xb7/0xc0
[   18.894350]  __kmalloc_cache_noprof+0x189/0x420
[   18.894748]  kasan_atomics+0x95/0x310
[   18.895098]  kunit_try_run_case+0x1a5/0x480
[   18.895484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.895928]  kthread+0x337/0x6f0
[   18.896256]  ret_from_fork+0x41/0x80
[   18.896514]  ret_from_fork_asm+0x1a/0x30
[   18.896723] 
[   18.896843] The buggy address belongs to the object at ffff888102b21f80
[   18.896843]  which belongs to the cache kmalloc-64 of size 64
[   18.898046] The buggy address is located 0 bytes to the right of
[   18.898046]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.898787] 
[   18.898951] The buggy address belongs to the physical page:
[   18.899291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.899840] flags: 0x200000000000000(node=0|zone=2)
[   18.900270] page_type: f5(slab)
[   18.900486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.900780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.901069] page dumped because: kasan: bad access detected
[   18.901579] 
[   18.901777] Memory state around the buggy address:
[   18.902219]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.902800]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.903503] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.904043]                                      ^
[   18.904394]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.904672]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.904938] ==================================================================
[   19.290049] ==================================================================
[   19.290469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   19.291864] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.292535] 
[   19.292780] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.292890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.292920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.292971] Call Trace:
[   19.293031]  <TASK>
[   19.293082]  dump_stack_lvl+0x73/0xb0
[   19.293161]  print_report+0xd1/0x650
[   19.293193]  ? __virt_addr_valid+0x1db/0x2d0
[   19.293224]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.293251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.293281]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.293308]  kasan_report+0x141/0x180
[   19.293354]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.293392]  __asan_report_load8_noabort+0x18/0x20
[   19.293421]  kasan_atomics_helper+0x4f71/0x5450
[   19.293450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.293478]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.293506]  ? kasan_atomics+0x152/0x310
[   19.293534]  kasan_atomics+0x1dc/0x310
[   19.293559]  ? __pfx_kasan_atomics+0x10/0x10
[   19.293585]  ? __pfx_read_tsc+0x10/0x10
[   19.293610]  ? ktime_get_ts64+0x86/0x230
[   19.293643]  kunit_try_run_case+0x1a5/0x480
[   19.293675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.293702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.293732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.293761]  ? __kthread_parkme+0x82/0x180
[   19.293789]  ? preempt_count_sub+0x50/0x80
[   19.293820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.293849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.293879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.293909]  kthread+0x337/0x6f0
[   19.293931]  ? trace_preempt_on+0x20/0xc0
[   19.293960]  ? __pfx_kthread+0x10/0x10
[   19.293983]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.294010]  ? calculate_sigpending+0x7b/0xa0
[   19.294038]  ? __pfx_kthread+0x10/0x10
[   19.294062]  ret_from_fork+0x41/0x80
[   19.294096]  ? __pfx_kthread+0x10/0x10
[   19.294119]  ret_from_fork_asm+0x1a/0x30
[   19.294156]  </TASK>
[   19.294170] 
[   19.305161] Allocated by task 286:
[   19.305516]  kasan_save_stack+0x45/0x70
[   19.305901]  kasan_save_track+0x18/0x40
[   19.306222]  kasan_save_alloc_info+0x3b/0x50
[   19.306656]  __kasan_kmalloc+0xb7/0xc0
[   19.306894]  __kmalloc_cache_noprof+0x189/0x420
[   19.307151]  kasan_atomics+0x95/0x310
[   19.307369]  kunit_try_run_case+0x1a5/0x480
[   19.307747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.308175]  kthread+0x337/0x6f0
[   19.308523]  ret_from_fork+0x41/0x80
[   19.308880]  ret_from_fork_asm+0x1a/0x30
[   19.309292] 
[   19.309508] The buggy address belongs to the object at ffff888102b21f80
[   19.309508]  which belongs to the cache kmalloc-64 of size 64
[   19.310327] The buggy address is located 0 bytes to the right of
[   19.310327]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.310801] 
[   19.311000] The buggy address belongs to the physical page:
[   19.311573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.312130] flags: 0x200000000000000(node=0|zone=2)
[   19.312382] page_type: f5(slab)
[   19.312625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.312956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.313546] page dumped because: kasan: bad access detected
[   19.314003] 
[   19.314187] Memory state around the buggy address:
[   19.314641]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.315234]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.315601] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.315884]                                      ^
[   19.316372]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.316935]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.317657] ==================================================================
[   19.437897] ==================================================================
[   19.438609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   19.439192] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.439700] 
[   19.439926] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.440061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.440109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.440160] Call Trace:
[   19.440210]  <TASK>
[   19.440258]  dump_stack_lvl+0x73/0xb0
[   19.440329]  print_report+0xd1/0x650
[   19.440401]  ? __virt_addr_valid+0x1db/0x2d0
[   19.440478]  ? kasan_atomics_helper+0x218a/0x5450
[   19.440531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.440600]  ? kasan_atomics_helper+0x218a/0x5450
[   19.440658]  kasan_report+0x141/0x180
[   19.440724]  ? kasan_atomics_helper+0x218a/0x5450
[   19.440801]  kasan_check_range+0x10c/0x1c0
[   19.440869]  __kasan_check_write+0x18/0x20
[   19.440928]  kasan_atomics_helper+0x218a/0x5450
[   19.440988]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.441068]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.441121]  ? kasan_atomics+0x152/0x310
[   19.441171]  kasan_atomics+0x1dc/0x310
[   19.441216]  ? __pfx_kasan_atomics+0x10/0x10
[   19.441273]  ? __pfx_read_tsc+0x10/0x10
[   19.441378]  ? ktime_get_ts64+0x86/0x230
[   19.441445]  kunit_try_run_case+0x1a5/0x480
[   19.441510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.441567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.441621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.441681]  ? __kthread_parkme+0x82/0x180
[   19.441738]  ? preempt_count_sub+0x50/0x80
[   19.441802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.441862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.441926]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.441988]  kthread+0x337/0x6f0
[   19.442036]  ? trace_preempt_on+0x20/0xc0
[   19.442103]  ? __pfx_kthread+0x10/0x10
[   19.442168]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.442218]  ? calculate_sigpending+0x7b/0xa0
[   19.442271]  ? __pfx_kthread+0x10/0x10
[   19.442318]  ret_from_fork+0x41/0x80
[   19.442386]  ? __pfx_kthread+0x10/0x10
[   19.442425]  ret_from_fork_asm+0x1a/0x30
[   19.442488]  </TASK>
[   19.442516] 
[   19.455187] Allocated by task 286:
[   19.455609]  kasan_save_stack+0x45/0x70
[   19.456157]  kasan_save_track+0x18/0x40
[   19.456526]  kasan_save_alloc_info+0x3b/0x50
[   19.456908]  __kasan_kmalloc+0xb7/0xc0
[   19.457794]  __kmalloc_cache_noprof+0x189/0x420
[   19.458615]  kasan_atomics+0x95/0x310
[   19.458803]  kunit_try_run_case+0x1a5/0x480
[   19.459245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.459692]  kthread+0x337/0x6f0
[   19.460051]  ret_from_fork+0x41/0x80
[   19.460310]  ret_from_fork_asm+0x1a/0x30
[   19.460781] 
[   19.461027] The buggy address belongs to the object at ffff888102b21f80
[   19.461027]  which belongs to the cache kmalloc-64 of size 64
[   19.462052] The buggy address is located 0 bytes to the right of
[   19.462052]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.462989] 
[   19.463449] The buggy address belongs to the physical page:
[   19.463776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.464478] flags: 0x200000000000000(node=0|zone=2)
[   19.464873] page_type: f5(slab)
[   19.465398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.465970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.466583] page dumped because: kasan: bad access detected
[   19.466947] 
[   19.467103] Memory state around the buggy address:
[   19.467855]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.468417]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469035] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.469735]                                      ^
[   19.470015]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.470798]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.471253] ==================================================================
[   18.535157] ==================================================================
[   18.535492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   18.535895] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.536673] 
[   18.536908] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.537052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.537097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.537146] Call Trace:
[   18.537194]  <TASK>
[   18.537250]  dump_stack_lvl+0x73/0xb0
[   18.537350]  print_report+0xd1/0x650
[   18.537412]  ? __virt_addr_valid+0x1db/0x2d0
[   18.537471]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.537522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.537578]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.537632]  kasan_report+0x141/0x180
[   18.537698]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.537781]  kasan_check_range+0x10c/0x1c0
[   18.537836]  __kasan_check_write+0x18/0x20
[   18.537894]  kasan_atomics_helper+0x12e6/0x5450
[   18.537954]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.538028]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.538104]  ? kasan_atomics+0x152/0x310
[   18.538159]  kasan_atomics+0x1dc/0x310
[   18.538221]  ? __pfx_kasan_atomics+0x10/0x10
[   18.538290]  ? __pfx_read_tsc+0x10/0x10
[   18.538328]  ? ktime_get_ts64+0x86/0x230
[   18.538389]  kunit_try_run_case+0x1a5/0x480
[   18.538429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.538461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.538512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.538559]  ? __kthread_parkme+0x82/0x180
[   18.538604]  ? preempt_count_sub+0x50/0x80
[   18.538661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.538723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.538794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.538854]  kthread+0x337/0x6f0
[   18.538893]  ? trace_preempt_on+0x20/0xc0
[   18.538947]  ? __pfx_kthread+0x10/0x10
[   18.539000]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.539064]  ? calculate_sigpending+0x7b/0xa0
[   18.539114]  ? __pfx_kthread+0x10/0x10
[   18.539160]  ret_from_fork+0x41/0x80
[   18.539203]  ? __pfx_kthread+0x10/0x10
[   18.539245]  ret_from_fork_asm+0x1a/0x30
[   18.539317]  </TASK>
[   18.539367] 
[   18.550015] Allocated by task 286:
[   18.550380]  kasan_save_stack+0x45/0x70
[   18.550631]  kasan_save_track+0x18/0x40
[   18.550841]  kasan_save_alloc_info+0x3b/0x50
[   18.551298]  __kasan_kmalloc+0xb7/0xc0
[   18.551664]  __kmalloc_cache_noprof+0x189/0x420
[   18.552021]  kasan_atomics+0x95/0x310
[   18.552387]  kunit_try_run_case+0x1a5/0x480
[   18.552686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.553095]  kthread+0x337/0x6f0
[   18.553392]  ret_from_fork+0x41/0x80
[   18.553657]  ret_from_fork_asm+0x1a/0x30
[   18.554012] 
[   18.554271] The buggy address belongs to the object at ffff888102b21f80
[   18.554271]  which belongs to the cache kmalloc-64 of size 64
[   18.554935] The buggy address is located 0 bytes to the right of
[   18.554935]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.555570] 
[   18.555779] The buggy address belongs to the physical page:
[   18.556216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.556702] flags: 0x200000000000000(node=0|zone=2)
[   18.557035] page_type: f5(slab)
[   18.557396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.557868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.558530] page dumped because: kasan: bad access detected
[   18.558849] 
[   18.559032] Memory state around the buggy address:
[   18.559368]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559828]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.560144] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.560709]                                      ^
[   18.560932]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.561219]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.561496] ==================================================================
[   17.618457] ==================================================================
[   17.618749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   17.619621] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.620923] 
[   17.621436] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.621573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.621602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.621651] Call Trace:
[   17.621953]  <TASK>
[   17.622037]  dump_stack_lvl+0x73/0xb0
[   17.622263]  print_report+0xd1/0x650
[   17.622328]  ? __virt_addr_valid+0x1db/0x2d0
[   17.622403]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.622456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.622543]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.622610]  kasan_report+0x141/0x180
[   17.622693]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.622776]  __asan_report_store4_noabort+0x1b/0x30
[   17.622838]  kasan_atomics_helper+0x4b6e/0x5450
[   17.622898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.622940]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.622968]  ? kasan_atomics+0x152/0x310
[   17.622997]  kasan_atomics+0x1dc/0x310
[   17.623021]  ? __pfx_kasan_atomics+0x10/0x10
[   17.623047]  ? __pfx_read_tsc+0x10/0x10
[   17.623119]  ? ktime_get_ts64+0x86/0x230
[   17.623155]  kunit_try_run_case+0x1a5/0x480
[   17.623185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.623212]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.623242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.623270]  ? __kthread_parkme+0x82/0x180
[   17.623297]  ? preempt_count_sub+0x50/0x80
[   17.623327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.623377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.623408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.623438]  kthread+0x337/0x6f0
[   17.623459]  ? trace_preempt_on+0x20/0xc0
[   17.623488]  ? __pfx_kthread+0x10/0x10
[   17.623512]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.623539]  ? calculate_sigpending+0x7b/0xa0
[   17.623567]  ? __pfx_kthread+0x10/0x10
[   17.623590]  ret_from_fork+0x41/0x80
[   17.623615]  ? __pfx_kthread+0x10/0x10
[   17.623637]  ret_from_fork_asm+0x1a/0x30
[   17.623674]  </TASK>
[   17.623690] 
[   17.637101] Allocated by task 286:
[   17.637480]  kasan_save_stack+0x45/0x70
[   17.637827]  kasan_save_track+0x18/0x40
[   17.638232]  kasan_save_alloc_info+0x3b/0x50
[   17.638477]  __kasan_kmalloc+0xb7/0xc0
[   17.638677]  __kmalloc_cache_noprof+0x189/0x420
[   17.638892]  kasan_atomics+0x95/0x310
[   17.639327]  kunit_try_run_case+0x1a5/0x480
[   17.640186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.640691]  kthread+0x337/0x6f0
[   17.641019]  ret_from_fork+0x41/0x80
[   17.641824]  ret_from_fork_asm+0x1a/0x30
[   17.642039] 
[   17.643667] The buggy address belongs to the object at ffff888102b21f80
[   17.643667]  which belongs to the cache kmalloc-64 of size 64
[   17.645681] The buggy address is located 0 bytes to the right of
[   17.645681]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.646637] 
[   17.646765] The buggy address belongs to the physical page:
[   17.646970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.649359] flags: 0x200000000000000(node=0|zone=2)
[   17.650195] page_type: f5(slab)
[   17.650800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.652404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.652911] page dumped because: kasan: bad access detected
[   17.653665] 
[   17.653794] Memory state around the buggy address:
[   17.654294]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.654981]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.655359] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.656106]                                      ^
[   17.656465]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.656943]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.657392] ==================================================================
[   18.354022] ==================================================================
[   18.354734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   18.356040] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.356390] 
[   18.356562] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.356672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.356702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.356752] Call Trace:
[   18.356801]  <TASK>
[   18.356850]  dump_stack_lvl+0x73/0xb0
[   18.356921]  print_report+0xd1/0x650
[   18.356979]  ? __virt_addr_valid+0x1db/0x2d0
[   18.357044]  ? kasan_atomics_helper+0x1079/0x5450
[   18.357096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.357150]  ? kasan_atomics_helper+0x1079/0x5450
[   18.357197]  kasan_report+0x141/0x180
[   18.357252]  ? kasan_atomics_helper+0x1079/0x5450
[   18.357312]  kasan_check_range+0x10c/0x1c0
[   18.357380]  __kasan_check_write+0x18/0x20
[   18.357432]  kasan_atomics_helper+0x1079/0x5450
[   18.357494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.357554]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.357669]  ? kasan_atomics+0x152/0x310
[   18.357728]  kasan_atomics+0x1dc/0x310
[   18.357771]  ? __pfx_kasan_atomics+0x10/0x10
[   18.357820]  ? __pfx_read_tsc+0x10/0x10
[   18.357871]  ? ktime_get_ts64+0x86/0x230
[   18.357939]  kunit_try_run_case+0x1a5/0x480
[   18.358003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.358058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.358116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.358176]  ? __kthread_parkme+0x82/0x180
[   18.358233]  ? preempt_count_sub+0x50/0x80
[   18.358296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.358375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.358441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.358504]  kthread+0x337/0x6f0
[   18.358549]  ? trace_preempt_on+0x20/0xc0
[   18.358605]  ? __pfx_kthread+0x10/0x10
[   18.358633]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.358660]  ? calculate_sigpending+0x7b/0xa0
[   18.358685]  ? __pfx_kthread+0x10/0x10
[   18.358707]  ret_from_fork+0x41/0x80
[   18.358733]  ? __pfx_kthread+0x10/0x10
[   18.358755]  ret_from_fork_asm+0x1a/0x30
[   18.358792]  </TASK>
[   18.358807] 
[   18.369796] Allocated by task 286:
[   18.370172]  kasan_save_stack+0x45/0x70
[   18.370601]  kasan_save_track+0x18/0x40
[   18.370929]  kasan_save_alloc_info+0x3b/0x50
[   18.371218]  __kasan_kmalloc+0xb7/0xc0
[   18.371515]  __kmalloc_cache_noprof+0x189/0x420
[   18.371734]  kasan_atomics+0x95/0x310
[   18.371920]  kunit_try_run_case+0x1a5/0x480
[   18.372204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.372670]  kthread+0x337/0x6f0
[   18.372970]  ret_from_fork+0x41/0x80
[   18.373413]  ret_from_fork_asm+0x1a/0x30
[   18.373771] 
[   18.373973] The buggy address belongs to the object at ffff888102b21f80
[   18.373973]  which belongs to the cache kmalloc-64 of size 64
[   18.374508] The buggy address is located 0 bytes to the right of
[   18.374508]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.374941] 
[   18.375065] The buggy address belongs to the physical page:
[   18.375294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.375971] flags: 0x200000000000000(node=0|zone=2)
[   18.376474] page_type: f5(slab)
[   18.376837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.377600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.378196] page dumped because: kasan: bad access detected
[   18.378616] 
[   18.378767] Memory state around the buggy address:
[   18.378986]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.379257]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.379818] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.380358]                                      ^
[   18.380753]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.381043]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.381310] ==================================================================
[   18.847436] ==================================================================
[   18.848025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   18.848463] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.849117] 
[   18.849413] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.849527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.849559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.849610] Call Trace:
[   18.849658]  <TASK>
[   18.849709]  dump_stack_lvl+0x73/0xb0
[   18.849773]  print_report+0xd1/0x650
[   18.849868]  ? __virt_addr_valid+0x1db/0x2d0
[   18.849974]  ? kasan_atomics_helper+0x177f/0x5450
[   18.850020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.850118]  ? kasan_atomics_helper+0x177f/0x5450
[   18.850170]  kasan_report+0x141/0x180
[   18.850214]  ? kasan_atomics_helper+0x177f/0x5450
[   18.850264]  kasan_check_range+0x10c/0x1c0
[   18.850307]  __kasan_check_write+0x18/0x20
[   18.850363]  kasan_atomics_helper+0x177f/0x5450
[   18.850408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.850455]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.850506]  ? kasan_atomics+0x152/0x310
[   18.850589]  kasan_atomics+0x1dc/0x310
[   18.850651]  ? __pfx_kasan_atomics+0x10/0x10
[   18.850704]  ? __pfx_read_tsc+0x10/0x10
[   18.850754]  ? ktime_get_ts64+0x86/0x230
[   18.850819]  kunit_try_run_case+0x1a5/0x480
[   18.850880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.850928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.850960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.850990]  ? __kthread_parkme+0x82/0x180
[   18.851017]  ? preempt_count_sub+0x50/0x80
[   18.851047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.851115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.851171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.851253]  kthread+0x337/0x6f0
[   18.851384]  ? trace_preempt_on+0x20/0xc0
[   18.851457]  ? __pfx_kthread+0x10/0x10
[   18.851506]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.851561]  ? calculate_sigpending+0x7b/0xa0
[   18.851609]  ? __pfx_kthread+0x10/0x10
[   18.851643]  ret_from_fork+0x41/0x80
[   18.851670]  ? __pfx_kthread+0x10/0x10
[   18.851693]  ret_from_fork_asm+0x1a/0x30
[   18.851732]  </TASK>
[   18.851747] 
[   18.863520] Allocated by task 286:
[   18.863826]  kasan_save_stack+0x45/0x70
[   18.864272]  kasan_save_track+0x18/0x40
[   18.864760]  kasan_save_alloc_info+0x3b/0x50
[   18.865040]  __kasan_kmalloc+0xb7/0xc0
[   18.866325]  __kmalloc_cache_noprof+0x189/0x420
[   18.866781]  kasan_atomics+0x95/0x310
[   18.867004]  kunit_try_run_case+0x1a5/0x480
[   18.867252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.867538]  kthread+0x337/0x6f0
[   18.867734]  ret_from_fork+0x41/0x80
[   18.867940]  ret_from_fork_asm+0x1a/0x30
[   18.868398] 
[   18.868663] The buggy address belongs to the object at ffff888102b21f80
[   18.868663]  which belongs to the cache kmalloc-64 of size 64
[   18.869023] The buggy address is located 0 bytes to the right of
[   18.869023]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.870676] 
[   18.870820] The buggy address belongs to the physical page:
[   18.871104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.872179] flags: 0x200000000000000(node=0|zone=2)
[   18.872641] page_type: f5(slab)
[   18.872975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.873464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.873955] page dumped because: kasan: bad access detected
[   18.874362] 
[   18.874556] Memory state around the buggy address:
[   18.874891]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.875354]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.875793] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.876275]                                      ^
[   18.876622]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.877109]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.877548] ==================================================================
[   17.783135] ==================================================================
[   17.783620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   17.784430] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.784853] 
[   17.785109] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.785226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.785258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.785355] Call Trace:
[   17.785405]  <TASK>
[   17.785482]  dump_stack_lvl+0x73/0xb0
[   17.785574]  print_report+0xd1/0x650
[   17.785637]  ? __virt_addr_valid+0x1db/0x2d0
[   17.785692]  ? kasan_atomics_helper+0x565/0x5450
[   17.785746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.785840]  ? kasan_atomics_helper+0x565/0x5450
[   17.785937]  kasan_report+0x141/0x180
[   17.786013]  ? kasan_atomics_helper+0x565/0x5450
[   17.786095]  kasan_check_range+0x10c/0x1c0
[   17.786146]  __kasan_check_write+0x18/0x20
[   17.786196]  kasan_atomics_helper+0x565/0x5450
[   17.786253]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.786312]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.786382]  ? kasan_atomics+0x152/0x310
[   17.786453]  kasan_atomics+0x1dc/0x310
[   17.786499]  ? __pfx_kasan_atomics+0x10/0x10
[   17.786560]  ? __pfx_read_tsc+0x10/0x10
[   17.786609]  ? ktime_get_ts64+0x86/0x230
[   17.786690]  kunit_try_run_case+0x1a5/0x480
[   17.786752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.786780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.786812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.786840]  ? __kthread_parkme+0x82/0x180
[   17.786867]  ? preempt_count_sub+0x50/0x80
[   17.786897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.786925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.786953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.786982]  kthread+0x337/0x6f0
[   17.787002]  ? trace_preempt_on+0x20/0xc0
[   17.787030]  ? __pfx_kthread+0x10/0x10
[   17.787052]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.787100]  ? calculate_sigpending+0x7b/0xa0
[   17.787127]  ? __pfx_kthread+0x10/0x10
[   17.787149]  ret_from_fork+0x41/0x80
[   17.787173]  ? __pfx_kthread+0x10/0x10
[   17.787194]  ret_from_fork_asm+0x1a/0x30
[   17.787231]  </TASK>
[   17.787246] 
[   17.797918] Allocated by task 286:
[   17.798695]  kasan_save_stack+0x45/0x70
[   17.799799]  kasan_save_track+0x18/0x40
[   17.800258]  kasan_save_alloc_info+0x3b/0x50
[   17.800695]  __kasan_kmalloc+0xb7/0xc0
[   17.801039]  __kmalloc_cache_noprof+0x189/0x420
[   17.801525]  kasan_atomics+0x95/0x310
[   17.801754]  kunit_try_run_case+0x1a5/0x480
[   17.801975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.802635]  kthread+0x337/0x6f0
[   17.802964]  ret_from_fork+0x41/0x80
[   17.803379]  ret_from_fork_asm+0x1a/0x30
[   17.803783] 
[   17.803993] The buggy address belongs to the object at ffff888102b21f80
[   17.803993]  which belongs to the cache kmalloc-64 of size 64
[   17.804511] The buggy address is located 0 bytes to the right of
[   17.804511]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.805365] 
[   17.805642] The buggy address belongs to the physical page:
[   17.806163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.806668] flags: 0x200000000000000(node=0|zone=2)
[   17.806903] page_type: f5(slab)
[   17.807266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.807914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.808452] page dumped because: kasan: bad access detected
[   17.808948] 
[   17.809142] Memory state around the buggy address:
[   17.809413]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.809997]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.810806] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.811362]                                      ^
[   17.811669]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.812131]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.812749] ==================================================================
[   17.965103] ==================================================================
[   17.965753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   17.966542] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.967063] 
[   17.967282] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.967397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.967430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.967478] Call Trace:
[   17.967526]  <TASK>
[   17.967570]  dump_stack_lvl+0x73/0xb0
[   17.967634]  print_report+0xd1/0x650
[   17.967690]  ? __virt_addr_valid+0x1db/0x2d0
[   17.967748]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.967806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.967866]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.967923]  kasan_report+0x141/0x180
[   17.967980]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.968047]  kasan_check_range+0x10c/0x1c0
[   17.968107]  __kasan_check_write+0x18/0x20
[   17.968154]  kasan_atomics_helper+0x8f9/0x5450
[   17.968212]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.968269]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.968326]  ? kasan_atomics+0x152/0x310
[   17.968404]  kasan_atomics+0x1dc/0x310
[   17.968456]  ? __pfx_kasan_atomics+0x10/0x10
[   17.968512]  ? __pfx_read_tsc+0x10/0x10
[   17.968566]  ? ktime_get_ts64+0x86/0x230
[   17.968625]  kunit_try_run_case+0x1a5/0x480
[   17.968688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.968744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.968806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.968859]  ? __kthread_parkme+0x82/0x180
[   17.968916]  ? preempt_count_sub+0x50/0x80
[   17.968981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.969050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.969112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.969176]  kthread+0x337/0x6f0
[   17.969225]  ? trace_preempt_on+0x20/0xc0
[   17.969284]  ? __pfx_kthread+0x10/0x10
[   17.969348]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.969409]  ? calculate_sigpending+0x7b/0xa0
[   17.969470]  ? __pfx_kthread+0x10/0x10
[   17.969520]  ret_from_fork+0x41/0x80
[   17.969570]  ? __pfx_kthread+0x10/0x10
[   17.969611]  ret_from_fork_asm+0x1a/0x30
[   17.969671]  </TASK>
[   17.969696] 
[   17.979667] Allocated by task 286:
[   17.979878]  kasan_save_stack+0x45/0x70
[   17.980107]  kasan_save_track+0x18/0x40
[   17.980466]  kasan_save_alloc_info+0x3b/0x50
[   17.980814]  __kasan_kmalloc+0xb7/0xc0
[   17.981156]  __kmalloc_cache_noprof+0x189/0x420
[   17.981588]  kasan_atomics+0x95/0x310
[   17.981838]  kunit_try_run_case+0x1a5/0x480
[   17.982100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.982386]  kthread+0x337/0x6f0
[   17.982573]  ret_from_fork+0x41/0x80
[   17.982766]  ret_from_fork_asm+0x1a/0x30
[   17.982962] 
[   17.983083] The buggy address belongs to the object at ffff888102b21f80
[   17.983083]  which belongs to the cache kmalloc-64 of size 64
[   17.984309] The buggy address is located 0 bytes to the right of
[   17.984309]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.985278] 
[   17.985432] The buggy address belongs to the physical page:
[   17.985674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.985982] flags: 0x200000000000000(node=0|zone=2)
[   17.986528] page_type: f5(slab)
[   17.986814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.987441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.987979] page dumped because: kasan: bad access detected
[   17.988418] 
[   17.988537] Memory state around the buggy address:
[   17.988757]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.989039]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.989600] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.990301]                                      ^
[   17.990706]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.991108]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.991466] ==================================================================
[   19.156984] ==================================================================
[   19.158025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   19.158587] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.159458] 
[   19.159631] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.159735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.159766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.159799] Call Trace:
[   19.159832]  <TASK>
[   19.159863]  dump_stack_lvl+0x73/0xb0
[   19.159902]  print_report+0xd1/0x650
[   19.159931]  ? __virt_addr_valid+0x1db/0x2d0
[   19.159960]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.159987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.160014]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.160042]  kasan_report+0x141/0x180
[   19.160371]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.160481]  kasan_check_range+0x10c/0x1c0
[   19.160534]  __kasan_check_write+0x18/0x20
[   19.160585]  kasan_atomics_helper+0x1d7a/0x5450
[   19.160674]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.160732]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.160782]  ? kasan_atomics+0x152/0x310
[   19.160835]  kasan_atomics+0x1dc/0x310
[   19.160885]  ? __pfx_kasan_atomics+0x10/0x10
[   19.160935]  ? __pfx_read_tsc+0x10/0x10
[   19.160979]  ? ktime_get_ts64+0x86/0x230
[   19.161055]  kunit_try_run_case+0x1a5/0x480
[   19.161123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.161153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.161186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.161214]  ? __kthread_parkme+0x82/0x180
[   19.161243]  ? preempt_count_sub+0x50/0x80
[   19.161307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.161359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.161391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.161422]  kthread+0x337/0x6f0
[   19.161444]  ? trace_preempt_on+0x20/0xc0
[   19.161472]  ? __pfx_kthread+0x10/0x10
[   19.161496]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.161522]  ? calculate_sigpending+0x7b/0xa0
[   19.161550]  ? __pfx_kthread+0x10/0x10
[   19.161573]  ret_from_fork+0x41/0x80
[   19.161599]  ? __pfx_kthread+0x10/0x10
[   19.161622]  ret_from_fork_asm+0x1a/0x30
[   19.161660]  </TASK>
[   19.161676] 
[   19.175577] Allocated by task 286:
[   19.175982]  kasan_save_stack+0x45/0x70
[   19.176434]  kasan_save_track+0x18/0x40
[   19.176846]  kasan_save_alloc_info+0x3b/0x50
[   19.177287]  __kasan_kmalloc+0xb7/0xc0
[   19.177679]  __kmalloc_cache_noprof+0x189/0x420
[   19.178105]  kasan_atomics+0x95/0x310
[   19.178365]  kunit_try_run_case+0x1a5/0x480
[   19.178898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.179146]  kthread+0x337/0x6f0
[   19.179581]  ret_from_fork+0x41/0x80
[   19.179916]  ret_from_fork_asm+0x1a/0x30
[   19.180385] 
[   19.180584] The buggy address belongs to the object at ffff888102b21f80
[   19.180584]  which belongs to the cache kmalloc-64 of size 64
[   19.181562] The buggy address is located 0 bytes to the right of
[   19.181562]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.182432] 
[   19.182582] The buggy address belongs to the physical page:
[   19.182825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.183731] flags: 0x200000000000000(node=0|zone=2)
[   19.184022] page_type: f5(slab)
[   19.184468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.185053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.185520] page dumped because: kasan: bad access detected
[   19.186068] 
[   19.186280] Memory state around the buggy address:
[   19.186854]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.187659]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.188010] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.188846]                                      ^
[   19.189165]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.189651]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.190372] ==================================================================
[   18.259487] ==================================================================
[   18.259857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   18.260876] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.261595] 
[   18.261839] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.262033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.262081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.262130] Call Trace:
[   18.262180]  <TASK>
[   18.262228]  dump_stack_lvl+0x73/0xb0
[   18.262303]  print_report+0xd1/0x650
[   18.262375]  ? __virt_addr_valid+0x1db/0x2d0
[   18.262431]  ? kasan_atomics_helper+0xf10/0x5450
[   18.262513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.262591]  ? kasan_atomics_helper+0xf10/0x5450
[   18.262647]  kasan_report+0x141/0x180
[   18.262694]  ? kasan_atomics_helper+0xf10/0x5450
[   18.262757]  kasan_check_range+0x10c/0x1c0
[   18.262842]  __kasan_check_write+0x18/0x20
[   18.262909]  kasan_atomics_helper+0xf10/0x5450
[   18.262969]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.263031]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.263094]  ? kasan_atomics+0x152/0x310
[   18.263145]  kasan_atomics+0x1dc/0x310
[   18.263194]  ? __pfx_kasan_atomics+0x10/0x10
[   18.263273]  ? __pfx_read_tsc+0x10/0x10
[   18.263347]  ? ktime_get_ts64+0x86/0x230
[   18.263413]  kunit_try_run_case+0x1a5/0x480
[   18.263475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.263528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.263589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.263649]  ? __kthread_parkme+0x82/0x180
[   18.263705]  ? preempt_count_sub+0x50/0x80
[   18.263768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.263827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.263887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.263949]  kthread+0x337/0x6f0
[   18.263980]  ? trace_preempt_on+0x20/0xc0
[   18.264017]  ? __pfx_kthread+0x10/0x10
[   18.264041]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.264073]  ? calculate_sigpending+0x7b/0xa0
[   18.264107]  ? __pfx_kthread+0x10/0x10
[   18.264129]  ret_from_fork+0x41/0x80
[   18.264154]  ? __pfx_kthread+0x10/0x10
[   18.264176]  ret_from_fork_asm+0x1a/0x30
[   18.264213]  </TASK>
[   18.264228] 
[   18.276769] Allocated by task 286:
[   18.277161]  kasan_save_stack+0x45/0x70
[   18.277639]  kasan_save_track+0x18/0x40
[   18.277974]  kasan_save_alloc_info+0x3b/0x50
[   18.278281]  __kasan_kmalloc+0xb7/0xc0
[   18.278672]  __kmalloc_cache_noprof+0x189/0x420
[   18.278981]  kasan_atomics+0x95/0x310
[   18.279401]  kunit_try_run_case+0x1a5/0x480
[   18.279732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.280198]  kthread+0x337/0x6f0
[   18.280516]  ret_from_fork+0x41/0x80
[   18.280854]  ret_from_fork_asm+0x1a/0x30
[   18.281261] 
[   18.281543] The buggy address belongs to the object at ffff888102b21f80
[   18.281543]  which belongs to the cache kmalloc-64 of size 64
[   18.282412] The buggy address is located 0 bytes to the right of
[   18.282412]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.283261] 
[   18.283513] The buggy address belongs to the physical page:
[   18.283850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.284382] flags: 0x200000000000000(node=0|zone=2)
[   18.284842] page_type: f5(slab)
[   18.285263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.285818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.286353] page dumped because: kasan: bad access detected
[   18.286795] 
[   18.287018] Memory state around the buggy address:
[   18.287445]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.287968]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.288637] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.289234]                                      ^
[   18.289678]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.290178]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.290857] ==================================================================
[   18.659453] ==================================================================
[   18.659867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   18.660377] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.661038] 
[   18.661330] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.661477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.661512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.661561] Call Trace:
[   18.661612]  <TASK>
[   18.661659]  dump_stack_lvl+0x73/0xb0
[   18.661727]  print_report+0xd1/0x650
[   18.661849]  ? __virt_addr_valid+0x1db/0x2d0
[   18.661896]  ? kasan_atomics_helper+0x1467/0x5450
[   18.661940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.661988]  ? kasan_atomics_helper+0x1467/0x5450
[   18.662037]  kasan_report+0x141/0x180
[   18.662112]  ? kasan_atomics_helper+0x1467/0x5450
[   18.662177]  kasan_check_range+0x10c/0x1c0
[   18.662256]  __kasan_check_write+0x18/0x20
[   18.662306]  kasan_atomics_helper+0x1467/0x5450
[   18.662374]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.662425]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.662472]  ? kasan_atomics+0x152/0x310
[   18.662522]  kasan_atomics+0x1dc/0x310
[   18.662563]  ? __pfx_kasan_atomics+0x10/0x10
[   18.662608]  ? __pfx_read_tsc+0x10/0x10
[   18.662650]  ? ktime_get_ts64+0x86/0x230
[   18.662706]  kunit_try_run_case+0x1a5/0x480
[   18.662756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.662800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.662852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.662903]  ? __kthread_parkme+0x82/0x180
[   18.662948]  ? preempt_count_sub+0x50/0x80
[   18.663004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.663056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.663104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.663151]  kthread+0x337/0x6f0
[   18.663185]  ? trace_preempt_on+0x20/0xc0
[   18.663239]  ? __pfx_kthread+0x10/0x10
[   18.663289]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.663358]  ? calculate_sigpending+0x7b/0xa0
[   18.663412]  ? __pfx_kthread+0x10/0x10
[   18.663455]  ret_from_fork+0x41/0x80
[   18.664194]  ? __pfx_kthread+0x10/0x10
[   18.664250]  ret_from_fork_asm+0x1a/0x30
[   18.664319]  </TASK>
[   18.664364] 
[   18.674228] Allocated by task 286:
[   18.674465]  kasan_save_stack+0x45/0x70
[   18.674703]  kasan_save_track+0x18/0x40
[   18.674897]  kasan_save_alloc_info+0x3b/0x50
[   18.675217]  __kasan_kmalloc+0xb7/0xc0
[   18.675565]  __kmalloc_cache_noprof+0x189/0x420
[   18.675965]  kasan_atomics+0x95/0x310
[   18.676365]  kunit_try_run_case+0x1a5/0x480
[   18.676764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.676993]  kthread+0x337/0x6f0
[   18.677205]  ret_from_fork+0x41/0x80
[   18.677401]  ret_from_fork_asm+0x1a/0x30
[   18.677589] 
[   18.677698] The buggy address belongs to the object at ffff888102b21f80
[   18.677698]  which belongs to the cache kmalloc-64 of size 64
[   18.678117] The buggy address is located 0 bytes to the right of
[   18.678117]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.678564] 
[   18.678706] The buggy address belongs to the physical page:
[   18.678942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.679493] flags: 0x200000000000000(node=0|zone=2)
[   18.679961] page_type: f5(slab)
[   18.680362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.680893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.681443] page dumped because: kasan: bad access detected
[   18.681937] 
[   18.682194] Memory state around the buggy address:
[   18.682414]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.682781]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.683094] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.683375]                                      ^
[   18.683565]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.683818]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.684091] ==================================================================
[   19.319495] ==================================================================
[   19.320164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   19.320721] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.321033] 
[   19.321268] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.321440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.321473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.321524] Call Trace:
[   19.321574]  <TASK>
[   19.321624]  dump_stack_lvl+0x73/0xb0
[   19.321695]  print_report+0xd1/0x650
[   19.321756]  ? __virt_addr_valid+0x1db/0x2d0
[   19.321815]  ? kasan_atomics_helper+0x2006/0x5450
[   19.321872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.321931]  ? kasan_atomics_helper+0x2006/0x5450
[   19.321989]  kasan_report+0x141/0x180
[   19.322045]  ? kasan_atomics_helper+0x2006/0x5450
[   19.322112]  kasan_check_range+0x10c/0x1c0
[   19.322167]  __kasan_check_write+0x18/0x20
[   19.322221]  kasan_atomics_helper+0x2006/0x5450
[   19.322282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.322354]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.322404]  ? kasan_atomics+0x152/0x310
[   19.322456]  kasan_atomics+0x1dc/0x310
[   19.322493]  ? __pfx_kasan_atomics+0x10/0x10
[   19.322535]  ? __pfx_read_tsc+0x10/0x10
[   19.322580]  ? ktime_get_ts64+0x86/0x230
[   19.322638]  kunit_try_run_case+0x1a5/0x480
[   19.322728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.322799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.322861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.322940]  ? __kthread_parkme+0x82/0x180
[   19.323006]  ? preempt_count_sub+0x50/0x80
[   19.323095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.323152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.323210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.323269]  kthread+0x337/0x6f0
[   19.323312]  ? trace_preempt_on+0x20/0xc0
[   19.323390]  ? __pfx_kthread+0x10/0x10
[   19.323440]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.323496]  ? calculate_sigpending+0x7b/0xa0
[   19.323545]  ? __pfx_kthread+0x10/0x10
[   19.323594]  ret_from_fork+0x41/0x80
[   19.323647]  ? __pfx_kthread+0x10/0x10
[   19.323695]  ret_from_fork_asm+0x1a/0x30
[   19.323770]  </TASK>
[   19.323798] 
[   19.337710] Allocated by task 286:
[   19.338081]  kasan_save_stack+0x45/0x70
[   19.338547]  kasan_save_track+0x18/0x40
[   19.338861]  kasan_save_alloc_info+0x3b/0x50
[   19.339103]  __kasan_kmalloc+0xb7/0xc0
[   19.339538]  __kmalloc_cache_noprof+0x189/0x420
[   19.340617]  kasan_atomics+0x95/0x310
[   19.340967]  kunit_try_run_case+0x1a5/0x480
[   19.341498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.341846]  kthread+0x337/0x6f0
[   19.342069]  ret_from_fork+0x41/0x80
[   19.342316]  ret_from_fork_asm+0x1a/0x30
[   19.342547] 
[   19.342700] The buggy address belongs to the object at ffff888102b21f80
[   19.342700]  which belongs to the cache kmalloc-64 of size 64
[   19.343298] The buggy address is located 0 bytes to the right of
[   19.343298]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.343818] 
[   19.343948] The buggy address belongs to the physical page:
[   19.344179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.344818] flags: 0x200000000000000(node=0|zone=2)
[   19.345267] page_type: f5(slab)
[   19.345714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.346300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.346909] page dumped because: kasan: bad access detected
[   19.347283] 
[   19.347424] Memory state around the buggy address:
[   19.347643]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.347910]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.348445] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.349213]                                      ^
[   19.350055]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.350912]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.351510] ==================================================================
[   19.380876] ==================================================================
[   19.382024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   19.382473] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.382969] 
[   19.383214] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.383311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.383355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.383419] Call Trace:
[   19.383481]  <TASK>
[   19.383531]  dump_stack_lvl+0x73/0xb0
[   19.383621]  print_report+0xd1/0x650
[   19.383690]  ? __virt_addr_valid+0x1db/0x2d0
[   19.383757]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.383813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.383879]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.383943]  kasan_report+0x141/0x180
[   19.383994]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.384053]  kasan_check_range+0x10c/0x1c0
[   19.384109]  __kasan_check_write+0x18/0x20
[   19.384156]  kasan_atomics_helper+0x20c8/0x5450
[   19.384214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.384270]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.384325]  ? kasan_atomics+0x152/0x310
[   19.384405]  kasan_atomics+0x1dc/0x310
[   19.384459]  ? __pfx_kasan_atomics+0x10/0x10
[   19.384517]  ? __pfx_read_tsc+0x10/0x10
[   19.384569]  ? ktime_get_ts64+0x86/0x230
[   19.384634]  kunit_try_run_case+0x1a5/0x480
[   19.384695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.384752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.384813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.384874]  ? __kthread_parkme+0x82/0x180
[   19.384930]  ? preempt_count_sub+0x50/0x80
[   19.384993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.385068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.385121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.385174]  kthread+0x337/0x6f0
[   19.385210]  ? trace_preempt_on+0x20/0xc0
[   19.385259]  ? __pfx_kthread+0x10/0x10
[   19.385302]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.385392]  ? calculate_sigpending+0x7b/0xa0
[   19.385450]  ? __pfx_kthread+0x10/0x10
[   19.385508]  ret_from_fork+0x41/0x80
[   19.385569]  ? __pfx_kthread+0x10/0x10
[   19.385619]  ret_from_fork_asm+0x1a/0x30
[   19.385701]  </TASK>
[   19.385729] 
[   19.396621] Allocated by task 286:
[   19.396927]  kasan_save_stack+0x45/0x70
[   19.397391]  kasan_save_track+0x18/0x40
[   19.397742]  kasan_save_alloc_info+0x3b/0x50
[   19.398048]  __kasan_kmalloc+0xb7/0xc0
[   19.398293]  __kmalloc_cache_noprof+0x189/0x420
[   19.398720]  kasan_atomics+0x95/0x310
[   19.398966]  kunit_try_run_case+0x1a5/0x480
[   19.399424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.399694]  kthread+0x337/0x6f0
[   19.399883]  ret_from_fork+0x41/0x80
[   19.400077]  ret_from_fork_asm+0x1a/0x30
[   19.400565] 
[   19.400742] The buggy address belongs to the object at ffff888102b21f80
[   19.400742]  which belongs to the cache kmalloc-64 of size 64
[   19.401746] The buggy address is located 0 bytes to the right of
[   19.401746]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.402272] 
[   19.402437] The buggy address belongs to the physical page:
[   19.402707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.403060] flags: 0x200000000000000(node=0|zone=2)
[   19.403320] page_type: f5(slab)
[   19.403646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.404237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.405038] page dumped because: kasan: bad access detected
[   19.405657] 
[   19.405844] Memory state around the buggy address:
[   19.406227]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406521]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406798] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.407053]                                      ^
[   19.407466]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.408024]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.408511] ==================================================================
[   19.000731] ==================================================================
[   19.001097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   19.001686] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.003009] 
[   19.003210] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.003298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.003326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.003394] Call Trace:
[   19.003441]  <TASK>
[   19.003632]  dump_stack_lvl+0x73/0xb0
[   19.003682]  print_report+0xd1/0x650
[   19.003714]  ? __virt_addr_valid+0x1db/0x2d0
[   19.003743]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.003769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.003797]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.003824]  kasan_report+0x141/0x180
[   19.003850]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.003881]  kasan_check_range+0x10c/0x1c0
[   19.003906]  __kasan_check_write+0x18/0x20
[   19.003930]  kasan_atomics_helper+0x1a7f/0x5450
[   19.003958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.003985]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.004012]  ? kasan_atomics+0x152/0x310
[   19.004039]  kasan_atomics+0x1dc/0x310
[   19.004062]  ? __pfx_kasan_atomics+0x10/0x10
[   19.004100]  ? __pfx_read_tsc+0x10/0x10
[   19.004125]  ? ktime_get_ts64+0x86/0x230
[   19.004155]  kunit_try_run_case+0x1a5/0x480
[   19.004185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.004211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.004240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.004269]  ? __kthread_parkme+0x82/0x180
[   19.004295]  ? preempt_count_sub+0x50/0x80
[   19.004325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.004374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.004404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.004433]  kthread+0x337/0x6f0
[   19.004454]  ? trace_preempt_on+0x20/0xc0
[   19.004481]  ? __pfx_kthread+0x10/0x10
[   19.004503]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.004530]  ? calculate_sigpending+0x7b/0xa0
[   19.004555]  ? __pfx_kthread+0x10/0x10
[   19.004578]  ret_from_fork+0x41/0x80
[   19.004602]  ? __pfx_kthread+0x10/0x10
[   19.004623]  ret_from_fork_asm+0x1a/0x30
[   19.004658]  </TASK>
[   19.004672] 
[   19.017331] Allocated by task 286:
[   19.017726]  kasan_save_stack+0x45/0x70
[   19.018183]  kasan_save_track+0x18/0x40
[   19.018522]  kasan_save_alloc_info+0x3b/0x50
[   19.018913]  __kasan_kmalloc+0xb7/0xc0
[   19.019177]  __kmalloc_cache_noprof+0x189/0x420
[   19.019605]  kasan_atomics+0x95/0x310
[   19.019937]  kunit_try_run_case+0x1a5/0x480
[   19.020349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.020772]  kthread+0x337/0x6f0
[   19.021134]  ret_from_fork+0x41/0x80
[   19.021452]  ret_from_fork_asm+0x1a/0x30
[   19.021807] 
[   19.021938] The buggy address belongs to the object at ffff888102b21f80
[   19.021938]  which belongs to the cache kmalloc-64 of size 64
[   19.022412] The buggy address is located 0 bytes to the right of
[   19.022412]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.023407] 
[   19.023601] The buggy address belongs to the physical page:
[   19.024038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.024616] flags: 0x200000000000000(node=0|zone=2)
[   19.024901] page_type: f5(slab)
[   19.025281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.025885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.026361] page dumped because: kasan: bad access detected
[   19.026743] 
[   19.026948] Memory state around the buggy address:
[   19.027246]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.027732]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.028225] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.028732]                                      ^
[   19.028954]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.029281]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.029862] ==================================================================
[   19.353400] ==================================================================
[   19.353795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   19.354802] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.355169] 
[   19.355465] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.355594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.355625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.355690] Call Trace:
[   19.355737]  <TASK>
[   19.355782]  dump_stack_lvl+0x73/0xb0
[   19.355851]  print_report+0xd1/0x650
[   19.355909]  ? __virt_addr_valid+0x1db/0x2d0
[   19.355967]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.356019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.356093]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.356147]  kasan_report+0x141/0x180
[   19.356206]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.356284]  __asan_report_load8_noabort+0x18/0x20
[   19.356349]  kasan_atomics_helper+0x4f98/0x5450
[   19.356408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.356464]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.356523]  ? kasan_atomics+0x152/0x310
[   19.356574]  kasan_atomics+0x1dc/0x310
[   19.356607]  ? __pfx_kasan_atomics+0x10/0x10
[   19.356642]  ? __pfx_read_tsc+0x10/0x10
[   19.356673]  ? ktime_get_ts64+0x86/0x230
[   19.356712]  kunit_try_run_case+0x1a5/0x480
[   19.356743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.356768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.356799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.356827]  ? __kthread_parkme+0x82/0x180
[   19.356854]  ? preempt_count_sub+0x50/0x80
[   19.356896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.356941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.356971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.357000]  kthread+0x337/0x6f0
[   19.357034]  ? trace_preempt_on+0x20/0xc0
[   19.357069]  ? __pfx_kthread+0x10/0x10
[   19.357101]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.357129]  ? calculate_sigpending+0x7b/0xa0
[   19.357156]  ? __pfx_kthread+0x10/0x10
[   19.357179]  ret_from_fork+0x41/0x80
[   19.357204]  ? __pfx_kthread+0x10/0x10
[   19.357227]  ret_from_fork_asm+0x1a/0x30
[   19.357265]  </TASK>
[   19.357282] 
[   19.367417] Allocated by task 286:
[   19.367775]  kasan_save_stack+0x45/0x70
[   19.368134]  kasan_save_track+0x18/0x40
[   19.368547]  kasan_save_alloc_info+0x3b/0x50
[   19.368901]  __kasan_kmalloc+0xb7/0xc0
[   19.369215]  __kmalloc_cache_noprof+0x189/0x420
[   19.369555]  kasan_atomics+0x95/0x310
[   19.369904]  kunit_try_run_case+0x1a5/0x480
[   19.370136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.370594]  kthread+0x337/0x6f0
[   19.370852]  ret_from_fork+0x41/0x80
[   19.371194]  ret_from_fork_asm+0x1a/0x30
[   19.371562] 
[   19.371710] The buggy address belongs to the object at ffff888102b21f80
[   19.371710]  which belongs to the cache kmalloc-64 of size 64
[   19.372428] The buggy address is located 0 bytes to the right of
[   19.372428]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.373145] 
[   19.373386] The buggy address belongs to the physical page:
[   19.373725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.374076] flags: 0x200000000000000(node=0|zone=2)
[   19.374362] page_type: f5(slab)
[   19.374588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.374923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.375235] page dumped because: kasan: bad access detected
[   19.375784] 
[   19.375966] Memory state around the buggy address:
[   19.376382]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.376936]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377620] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.378196]                                      ^
[   19.378623]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.379173]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.379717] ==================================================================
[   17.512967] ==================================================================
[   17.514506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   17.514956] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.515224] 
[   17.516048] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.516133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.516149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.516176] Call Trace:
[   17.516194]  <TASK>
[   17.516228]  dump_stack_lvl+0x73/0xb0
[   17.516282]  print_report+0xd1/0x650
[   17.516313]  ? __virt_addr_valid+0x1db/0x2d0
[   17.516363]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.516394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.516420]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.516445]  kasan_report+0x141/0x180
[   17.516470]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.516499]  __asan_report_load4_noabort+0x18/0x20
[   17.516525]  kasan_atomics_helper+0x4bbc/0x5450
[   17.516552]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.516578]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.516605]  ? kasan_atomics+0x152/0x310
[   17.516632]  kasan_atomics+0x1dc/0x310
[   17.516653]  ? __pfx_kasan_atomics+0x10/0x10
[   17.516677]  ? __pfx_read_tsc+0x10/0x10
[   17.516701]  ? ktime_get_ts64+0x86/0x230
[   17.516732]  kunit_try_run_case+0x1a5/0x480
[   17.516762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.516814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.516841]  ? __kthread_parkme+0x82/0x180
[   17.516867]  ? preempt_count_sub+0x50/0x80
[   17.516896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.516976]  kthread+0x337/0x6f0
[   17.516996]  ? trace_preempt_on+0x20/0xc0
[   17.517039]  ? __pfx_kthread+0x10/0x10
[   17.517065]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.517106]  ? calculate_sigpending+0x7b/0xa0
[   17.517149]  ? __pfx_kthread+0x10/0x10
[   17.517189]  ret_from_fork+0x41/0x80
[   17.517231]  ? __pfx_kthread+0x10/0x10
[   17.517272]  ret_from_fork_asm+0x1a/0x30
[   17.517346]  </TASK>
[   17.517368] 
[   17.531961] Allocated by task 286:
[   17.532406]  kasan_save_stack+0x45/0x70
[   17.532983]  kasan_save_track+0x18/0x40
[   17.533448]  kasan_save_alloc_info+0x3b/0x50
[   17.533901]  __kasan_kmalloc+0xb7/0xc0
[   17.534391]  __kmalloc_cache_noprof+0x189/0x420
[   17.534915]  kasan_atomics+0x95/0x310
[   17.535259]  kunit_try_run_case+0x1a5/0x480
[   17.535589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.535786]  kthread+0x337/0x6f0
[   17.535932]  ret_from_fork+0x41/0x80
[   17.536324]  ret_from_fork_asm+0x1a/0x30
[   17.536734] 
[   17.536912] The buggy address belongs to the object at ffff888102b21f80
[   17.536912]  which belongs to the cache kmalloc-64 of size 64
[   17.538073] The buggy address is located 0 bytes to the right of
[   17.538073]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.538946] 
[   17.539247] The buggy address belongs to the physical page:
[   17.539792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.540980] flags: 0x200000000000000(node=0|zone=2)
[   17.541594] page_type: f5(slab)
[   17.541770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.542581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.543794] page dumped because: kasan: bad access detected
[   17.544095] 
[   17.544414] Memory state around the buggy address:
[   17.544649]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.544998]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.546028] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.546970]                                      ^
[   17.547447]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.547758]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.548059] ==================================================================
[   17.877393] ==================================================================
[   17.877883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   17.878262] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.878976] 
[   17.879815] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.879947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.879997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.880048] Call Trace:
[   17.880129]  <TASK>
[   17.880179]  dump_stack_lvl+0x73/0xb0
[   17.880249]  print_report+0xd1/0x650
[   17.880304]  ? __virt_addr_valid+0x1db/0x2d0
[   17.880384]  ? kasan_atomics_helper+0x72f/0x5450
[   17.880455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.880513]  ? kasan_atomics_helper+0x72f/0x5450
[   17.880567]  kasan_report+0x141/0x180
[   17.880619]  ? kasan_atomics_helper+0x72f/0x5450
[   17.880678]  kasan_check_range+0x10c/0x1c0
[   17.880740]  __kasan_check_write+0x18/0x20
[   17.880810]  kasan_atomics_helper+0x72f/0x5450
[   17.880853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.880882]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.880909]  ? kasan_atomics+0x152/0x310
[   17.880937]  kasan_atomics+0x1dc/0x310
[   17.880961]  ? __pfx_kasan_atomics+0x10/0x10
[   17.880986]  ? __pfx_read_tsc+0x10/0x10
[   17.881020]  ? ktime_get_ts64+0x86/0x230
[   17.881059]  kunit_try_run_case+0x1a5/0x480
[   17.881112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.881141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.881172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.881201]  ? __kthread_parkme+0x82/0x180
[   17.881229]  ? preempt_count_sub+0x50/0x80
[   17.881291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.881324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.881375]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.881405]  kthread+0x337/0x6f0
[   17.881427]  ? trace_preempt_on+0x20/0xc0
[   17.881456]  ? __pfx_kthread+0x10/0x10
[   17.881479]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.881507]  ? calculate_sigpending+0x7b/0xa0
[   17.881534]  ? __pfx_kthread+0x10/0x10
[   17.881557]  ret_from_fork+0x41/0x80
[   17.881583]  ? __pfx_kthread+0x10/0x10
[   17.881605]  ret_from_fork_asm+0x1a/0x30
[   17.881643]  </TASK>
[   17.881658] 
[   17.891828] Allocated by task 286:
[   17.892036]  kasan_save_stack+0x45/0x70
[   17.892430]  kasan_save_track+0x18/0x40
[   17.892789]  kasan_save_alloc_info+0x3b/0x50
[   17.893310]  __kasan_kmalloc+0xb7/0xc0
[   17.893675]  __kmalloc_cache_noprof+0x189/0x420
[   17.894089]  kasan_atomics+0x95/0x310
[   17.894423]  kunit_try_run_case+0x1a5/0x480
[   17.894764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.895234]  kthread+0x337/0x6f0
[   17.895470]  ret_from_fork+0x41/0x80
[   17.895673]  ret_from_fork_asm+0x1a/0x30
[   17.895917] 
[   17.896046] The buggy address belongs to the object at ffff888102b21f80
[   17.896046]  which belongs to the cache kmalloc-64 of size 64
[   17.896634] The buggy address is located 0 bytes to the right of
[   17.896634]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.897075] 
[   17.897205] The buggy address belongs to the physical page:
[   17.897457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.897765] flags: 0x200000000000000(node=0|zone=2)
[   17.898057] page_type: f5(slab)
[   17.898400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.898997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.899666] page dumped because: kasan: bad access detected
[   17.900107] 
[   17.900291] Memory state around the buggy address:
[   17.900710]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.900991]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.901812] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.902262]                                      ^
[   17.902623]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.903005]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.903235] ==================================================================
[   18.382989] ==================================================================
[   18.383806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   18.384589] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.384876] 
[   18.385050] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.385157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.385185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.385234] Call Trace:
[   18.385281]  <TASK>
[   18.385331]  dump_stack_lvl+0x73/0xb0
[   18.385416]  print_report+0xd1/0x650
[   18.385471]  ? __virt_addr_valid+0x1db/0x2d0
[   18.385530]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.385585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.385643]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.385691]  kasan_report+0x141/0x180
[   18.385748]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.385816]  __asan_report_load4_noabort+0x18/0x20
[   18.385871]  kasan_atomics_helper+0x4a1c/0x5450
[   18.385946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.386027]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.386075]  ? kasan_atomics+0x152/0x310
[   18.386126]  kasan_atomics+0x1dc/0x310
[   18.386172]  ? __pfx_kasan_atomics+0x10/0x10
[   18.386243]  ? __pfx_read_tsc+0x10/0x10
[   18.386292]  ? ktime_get_ts64+0x86/0x230
[   18.386379]  kunit_try_run_case+0x1a5/0x480
[   18.386437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.386485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.386544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.386604]  ? __kthread_parkme+0x82/0x180
[   18.386655]  ? preempt_count_sub+0x50/0x80
[   18.386708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.386757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.386814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.386872]  kthread+0x337/0x6f0
[   18.386915]  ? trace_preempt_on+0x20/0xc0
[   18.386972]  ? __pfx_kthread+0x10/0x10
[   18.387021]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.387075]  ? calculate_sigpending+0x7b/0xa0
[   18.387124]  ? __pfx_kthread+0x10/0x10
[   18.387173]  ret_from_fork+0x41/0x80
[   18.387222]  ? __pfx_kthread+0x10/0x10
[   18.387272]  ret_from_fork_asm+0x1a/0x30
[   18.387367]  </TASK>
[   18.387399] 
[   18.398049] Allocated by task 286:
[   18.398414]  kasan_save_stack+0x45/0x70
[   18.398827]  kasan_save_track+0x18/0x40
[   18.399109]  kasan_save_alloc_info+0x3b/0x50
[   18.399386]  __kasan_kmalloc+0xb7/0xc0
[   18.399584]  __kmalloc_cache_noprof+0x189/0x420
[   18.399976]  kasan_atomics+0x95/0x310
[   18.400465]  kunit_try_run_case+0x1a5/0x480
[   18.400841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.401086]  kthread+0x337/0x6f0
[   18.401274]  ret_from_fork+0x41/0x80
[   18.401584]  ret_from_fork_asm+0x1a/0x30
[   18.401966] 
[   18.402173] The buggy address belongs to the object at ffff888102b21f80
[   18.402173]  which belongs to the cache kmalloc-64 of size 64
[   18.402961] The buggy address is located 0 bytes to the right of
[   18.402961]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.403915] 
[   18.404041] The buggy address belongs to the physical page:
[   18.404510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.404990] flags: 0x200000000000000(node=0|zone=2)
[   18.405234] page_type: f5(slab)
[   18.405625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.406220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.406661] page dumped because: kasan: bad access detected
[   18.406887] 
[   18.407000] Memory state around the buggy address:
[   18.407214]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.407805]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.408480] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.409043]                                      ^
[   18.409417]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.409693]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.409961] ==================================================================
[   18.411759] ==================================================================
[   18.412548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   18.413195] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.413696] 
[   18.413916] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.414031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.414064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.414108] Call Trace:
[   18.414153]  <TASK>
[   18.414200]  dump_stack_lvl+0x73/0xb0
[   18.414269]  print_report+0xd1/0x650
[   18.414320]  ? __virt_addr_valid+0x1db/0x2d0
[   18.414413]  ? kasan_atomics_helper+0x1148/0x5450
[   18.414463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.414512]  ? kasan_atomics_helper+0x1148/0x5450
[   18.414556]  kasan_report+0x141/0x180
[   18.414606]  ? kasan_atomics_helper+0x1148/0x5450
[   18.414669]  kasan_check_range+0x10c/0x1c0
[   18.414721]  __kasan_check_write+0x18/0x20
[   18.414768]  kasan_atomics_helper+0x1148/0x5450
[   18.414828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.414883]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.414932]  ? kasan_atomics+0x152/0x310
[   18.414990]  kasan_atomics+0x1dc/0x310
[   18.415039]  ? __pfx_kasan_atomics+0x10/0x10
[   18.415102]  ? __pfx_read_tsc+0x10/0x10
[   18.415146]  ? ktime_get_ts64+0x86/0x230
[   18.415207]  kunit_try_run_case+0x1a5/0x480
[   18.415266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.415321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.415463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.415520]  ? __kthread_parkme+0x82/0x180
[   18.415576]  ? preempt_count_sub+0x50/0x80
[   18.415639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.415696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.415758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.415819]  kthread+0x337/0x6f0
[   18.415866]  ? trace_preempt_on+0x20/0xc0
[   18.415922]  ? __pfx_kthread+0x10/0x10
[   18.415971]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.416025]  ? calculate_sigpending+0x7b/0xa0
[   18.416240]  ? __pfx_kthread+0x10/0x10
[   18.416302]  ret_from_fork+0x41/0x80
[   18.416367]  ? __pfx_kthread+0x10/0x10
[   18.416418]  ret_from_fork_asm+0x1a/0x30
[   18.416495]  </TASK>
[   18.416526] 
[   18.428688] Allocated by task 286:
[   18.428903]  kasan_save_stack+0x45/0x70
[   18.429141]  kasan_save_track+0x18/0x40
[   18.429387]  kasan_save_alloc_info+0x3b/0x50
[   18.429624]  __kasan_kmalloc+0xb7/0xc0
[   18.430305]  __kmalloc_cache_noprof+0x189/0x420
[   18.430746]  kasan_atomics+0x95/0x310
[   18.431048]  kunit_try_run_case+0x1a5/0x480
[   18.431427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.431885]  kthread+0x337/0x6f0
[   18.432444]  ret_from_fork+0x41/0x80
[   18.432943]  ret_from_fork_asm+0x1a/0x30
[   18.433237] 
[   18.433454] The buggy address belongs to the object at ffff888102b21f80
[   18.433454]  which belongs to the cache kmalloc-64 of size 64
[   18.434323] The buggy address is located 0 bytes to the right of
[   18.434323]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.435792] 
[   18.435964] The buggy address belongs to the physical page:
[   18.436651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.436963] flags: 0x200000000000000(node=0|zone=2)
[   18.437226] page_type: f5(slab)
[   18.437427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.437711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.437964] page dumped because: kasan: bad access detected
[   18.438526] 
[   18.438662] Memory state around the buggy address:
[   18.438885]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.439924]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.440713] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.440991]                                      ^
[   18.441284]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.441611]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.441861] ==================================================================
[   18.443860] ==================================================================
[   18.444758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   18.445096] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.445785] 
[   18.446045] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.446481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.446512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.446560] Call Trace:
[   18.446605]  <TASK>
[   18.446649]  dump_stack_lvl+0x73/0xb0
[   18.446712]  print_report+0xd1/0x650
[   18.446760]  ? __virt_addr_valid+0x1db/0x2d0
[   18.446808]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.446856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.446905]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.446955]  kasan_report+0x141/0x180
[   18.447005]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.447077]  __asan_report_load4_noabort+0x18/0x20
[   18.447121]  kasan_atomics_helper+0x4a02/0x5450
[   18.447166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.447216]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.447266]  ? kasan_atomics+0x152/0x310
[   18.447324]  kasan_atomics+0x1dc/0x310
[   18.448107]  ? __pfx_kasan_atomics+0x10/0x10
[   18.448193]  ? __pfx_read_tsc+0x10/0x10
[   18.448237]  ? ktime_get_ts64+0x86/0x230
[   18.448293]  kunit_try_run_case+0x1a5/0x480
[   18.448362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.448410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.448464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.448517]  ? __kthread_parkme+0x82/0x180
[   18.448563]  ? preempt_count_sub+0x50/0x80
[   18.448619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.448670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.448722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.448772]  kthread+0x337/0x6f0
[   18.448808]  ? trace_preempt_on+0x20/0xc0
[   18.448859]  ? __pfx_kthread+0x10/0x10
[   18.448900]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.448949]  ? calculate_sigpending+0x7b/0xa0
[   18.449000]  ? __pfx_kthread+0x10/0x10
[   18.449056]  ret_from_fork+0x41/0x80
[   18.449137]  ? __pfx_kthread+0x10/0x10
[   18.449182]  ret_from_fork_asm+0x1a/0x30
[   18.449253]  </TASK>
[   18.449281] 
[   18.462892] Allocated by task 286:
[   18.463856]  kasan_save_stack+0x45/0x70
[   18.464506]  kasan_save_track+0x18/0x40
[   18.464833]  kasan_save_alloc_info+0x3b/0x50
[   18.465247]  __kasan_kmalloc+0xb7/0xc0
[   18.465671]  __kmalloc_cache_noprof+0x189/0x420
[   18.465906]  kasan_atomics+0x95/0x310
[   18.466539]  kunit_try_run_case+0x1a5/0x480
[   18.466930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.467572]  kthread+0x337/0x6f0
[   18.467925]  ret_from_fork+0x41/0x80
[   18.468240]  ret_from_fork_asm+0x1a/0x30
[   18.468623] 
[   18.468866] The buggy address belongs to the object at ffff888102b21f80
[   18.468866]  which belongs to the cache kmalloc-64 of size 64
[   18.469697] The buggy address is located 0 bytes to the right of
[   18.469697]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.470320] 
[   18.470745] The buggy address belongs to the physical page:
[   18.471456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.471929] flags: 0x200000000000000(node=0|zone=2)
[   18.472575] page_type: f5(slab)
[   18.472857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.473720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.474312] page dumped because: kasan: bad access detected
[   18.474552] 
[   18.474749] Memory state around the buggy address:
[   18.475069]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.475442]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.476030] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.476407]                                      ^
[   18.476655]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.476989]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.478026] ==================================================================
[   19.537923] ==================================================================
[   19.538305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   19.538866] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.539263] 
[   19.540021] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.540180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.540213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.540258] Call Trace:
[   19.540306]  <TASK>
[   19.540365]  dump_stack_lvl+0x73/0xb0
[   19.540565]  print_report+0xd1/0x650
[   19.540612]  ? __virt_addr_valid+0x1db/0x2d0
[   19.540660]  ? kasan_atomics_helper+0x5115/0x5450
[   19.540714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.540983]  ? kasan_atomics_helper+0x5115/0x5450
[   19.541031]  kasan_report+0x141/0x180
[   19.541101]  ? kasan_atomics_helper+0x5115/0x5450
[   19.541138]  __asan_report_load8_noabort+0x18/0x20
[   19.541166]  kasan_atomics_helper+0x5115/0x5450
[   19.541194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.541223]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.541251]  ? kasan_atomics+0x152/0x310
[   19.541279]  kasan_atomics+0x1dc/0x310
[   19.541314]  ? __pfx_kasan_atomics+0x10/0x10
[   19.541368]  ? __pfx_read_tsc+0x10/0x10
[   19.541396]  ? ktime_get_ts64+0x86/0x230
[   19.541429]  kunit_try_run_case+0x1a5/0x480
[   19.541460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.541487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.541518]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.541547]  ? __kthread_parkme+0x82/0x180
[   19.541574]  ? preempt_count_sub+0x50/0x80
[   19.541605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.541634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.541664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.541693]  kthread+0x337/0x6f0
[   19.541714]  ? trace_preempt_on+0x20/0xc0
[   19.541743]  ? __pfx_kthread+0x10/0x10
[   19.541767]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.541794]  ? calculate_sigpending+0x7b/0xa0
[   19.541820]  ? __pfx_kthread+0x10/0x10
[   19.541843]  ret_from_fork+0x41/0x80
[   19.541867]  ? __pfx_kthread+0x10/0x10
[   19.541888]  ret_from_fork_asm+0x1a/0x30
[   19.541925]  </TASK>
[   19.541940] 
[   19.555493] Allocated by task 286:
[   19.555767]  kasan_save_stack+0x45/0x70
[   19.556382]  kasan_save_track+0x18/0x40
[   19.556735]  kasan_save_alloc_info+0x3b/0x50
[   19.557176]  __kasan_kmalloc+0xb7/0xc0
[   19.557583]  __kmalloc_cache_noprof+0x189/0x420
[   19.558007]  kasan_atomics+0x95/0x310
[   19.558400]  kunit_try_run_case+0x1a5/0x480
[   19.558743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.559036]  kthread+0x337/0x6f0
[   19.559746]  ret_from_fork+0x41/0x80
[   19.559994]  ret_from_fork_asm+0x1a/0x30
[   19.560174] 
[   19.560562] The buggy address belongs to the object at ffff888102b21f80
[   19.560562]  which belongs to the cache kmalloc-64 of size 64
[   19.561359] The buggy address is located 0 bytes to the right of
[   19.561359]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.562110] 
[   19.562313] The buggy address belongs to the physical page:
[   19.562625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.563041] flags: 0x200000000000000(node=0|zone=2)
[   19.563773] page_type: f5(slab)
[   19.563935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.564133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.564417] page dumped because: kasan: bad access detected
[   19.564850] 
[   19.565046] Memory state around the buggy address:
[   19.565952]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.566266]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.566845] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.567157]                                      ^
[   19.567571]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.567883]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.568920] ==================================================================
[   17.906245] ==================================================================
[   17.906607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   17.906902] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.907167] 
[   17.907321] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.907733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.907783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.907835] Call Trace:
[   17.907886]  <TASK>
[   17.907932]  dump_stack_lvl+0x73/0xb0
[   17.907998]  print_report+0xd1/0x650
[   17.908047]  ? __virt_addr_valid+0x1db/0x2d0
[   17.908115]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.908159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.908211]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.908260]  kasan_report+0x141/0x180
[   17.908302]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.908468]  kasan_check_range+0x10c/0x1c0
[   17.908939]  __kasan_check_write+0x18/0x20
[   17.909006]  kasan_atomics_helper+0x7c7/0x5450
[   17.909071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.909117]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.909175]  ? kasan_atomics+0x152/0x310
[   17.909227]  kasan_atomics+0x1dc/0x310
[   17.910064]  ? __pfx_kasan_atomics+0x10/0x10
[   17.910157]  ? __pfx_read_tsc+0x10/0x10
[   17.910210]  ? ktime_get_ts64+0x86/0x230
[   17.910277]  kunit_try_run_case+0x1a5/0x480
[   17.910357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.910415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.910477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.910534]  ? __kthread_parkme+0x82/0x180
[   17.910588]  ? preempt_count_sub+0x50/0x80
[   17.910648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.912707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.912821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.912876]  kthread+0x337/0x6f0
[   17.912917]  ? trace_preempt_on+0x20/0xc0
[   17.912967]  ? __pfx_kthread+0x10/0x10
[   17.913007]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.913069]  ? calculate_sigpending+0x7b/0xa0
[   17.913120]  ? __pfx_kthread+0x10/0x10
[   17.913164]  ret_from_fork+0x41/0x80
[   17.913209]  ? __pfx_kthread+0x10/0x10
[   17.913249]  ret_from_fork_asm+0x1a/0x30
[   17.913318]  </TASK>
[   17.913364] 
[   17.925490] Allocated by task 286:
[   17.925740]  kasan_save_stack+0x45/0x70
[   17.926071]  kasan_save_track+0x18/0x40
[   17.926432]  kasan_save_alloc_info+0x3b/0x50
[   17.926776]  __kasan_kmalloc+0xb7/0xc0
[   17.927104]  __kmalloc_cache_noprof+0x189/0x420
[   17.927504]  kasan_atomics+0x95/0x310
[   17.927836]  kunit_try_run_case+0x1a5/0x480
[   17.928225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.928546]  kthread+0x337/0x6f0
[   17.928779]  ret_from_fork+0x41/0x80
[   17.929069]  ret_from_fork_asm+0x1a/0x30
[   17.929381] 
[   17.929514] The buggy address belongs to the object at ffff888102b21f80
[   17.929514]  which belongs to the cache kmalloc-64 of size 64
[   17.930154] The buggy address is located 0 bytes to the right of
[   17.930154]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.930685] 
[   17.930820] The buggy address belongs to the physical page:
[   17.931054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.931652] flags: 0x200000000000000(node=0|zone=2)
[   17.932038] page_type: f5(slab)
[   17.932367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.932708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.933110] page dumped because: kasan: bad access detected
[   17.933557] 
[   17.933744] Memory state around the buggy address:
[   17.934053]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.934460]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.934742] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.935228]                                      ^
[   17.935527]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.935985]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.936461] ==================================================================
[   18.934515] ==================================================================
[   18.935195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   18.935459] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.935996] 
[   18.936228] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.936354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.936386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.936437] Call Trace:
[   18.936487]  <TASK>
[   18.936537]  dump_stack_lvl+0x73/0xb0
[   18.936603]  print_report+0xd1/0x650
[   18.936662]  ? __virt_addr_valid+0x1db/0x2d0
[   18.936719]  ? kasan_atomics_helper+0x194a/0x5450
[   18.936773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.936838]  ? kasan_atomics_helper+0x194a/0x5450
[   18.936895]  kasan_report+0x141/0x180
[   18.936953]  ? kasan_atomics_helper+0x194a/0x5450
[   18.937029]  kasan_check_range+0x10c/0x1c0
[   18.937082]  __kasan_check_write+0x18/0x20
[   18.937136]  kasan_atomics_helper+0x194a/0x5450
[   18.937196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.937258]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.937318]  ? kasan_atomics+0x152/0x310
[   18.937388]  kasan_atomics+0x1dc/0x310
[   18.937435]  ? __pfx_kasan_atomics+0x10/0x10
[   18.937487]  ? __pfx_read_tsc+0x10/0x10
[   18.937538]  ? ktime_get_ts64+0x86/0x230
[   18.937603]  kunit_try_run_case+0x1a5/0x480
[   18.937666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.937724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.937786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.937847]  ? __kthread_parkme+0x82/0x180
[   18.937933]  ? preempt_count_sub+0x50/0x80
[   18.938035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.938117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.938198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.938276]  kthread+0x337/0x6f0
[   18.938319]  ? trace_preempt_on+0x20/0xc0
[   18.938405]  ? __pfx_kthread+0x10/0x10
[   18.938455]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.938512]  ? calculate_sigpending+0x7b/0xa0
[   18.938567]  ? __pfx_kthread+0x10/0x10
[   18.938613]  ret_from_fork+0x41/0x80
[   18.938654]  ? __pfx_kthread+0x10/0x10
[   18.938700]  ret_from_fork_asm+0x1a/0x30
[   18.938777]  </TASK>
[   18.938810] 
[   18.949591] Allocated by task 286:
[   18.949867]  kasan_save_stack+0x45/0x70
[   18.950118]  kasan_save_track+0x18/0x40
[   18.950320]  kasan_save_alloc_info+0x3b/0x50
[   18.950554]  __kasan_kmalloc+0xb7/0xc0
[   18.950751]  __kmalloc_cache_noprof+0x189/0x420
[   18.950955]  kasan_atomics+0x95/0x310
[   18.951345]  kunit_try_run_case+0x1a5/0x480
[   18.951863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.952492]  kthread+0x337/0x6f0
[   18.952849]  ret_from_fork+0x41/0x80
[   18.953256]  ret_from_fork_asm+0x1a/0x30
[   18.953637] 
[   18.953832] The buggy address belongs to the object at ffff888102b21f80
[   18.953832]  which belongs to the cache kmalloc-64 of size 64
[   18.954791] The buggy address is located 0 bytes to the right of
[   18.954791]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.955773] 
[   18.955993] The buggy address belongs to the physical page:
[   18.956423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.956927] flags: 0x200000000000000(node=0|zone=2)
[   18.957497] page_type: f5(slab)
[   18.957735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.958312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.960951] page dumped because: kasan: bad access detected
[   18.961650] 
[   18.961804] Memory state around the buggy address:
[   18.962114]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.962530]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.962947] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.964648]                                      ^
[   18.964831]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.964979]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.965793] ==================================================================
[   17.690213] ==================================================================
[   17.690690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   17.690948] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.691154] 
[   17.691275] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.691369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.691392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.691429] Call Trace:
[   17.691468]  <TASK>
[   17.691508]  dump_stack_lvl+0x73/0xb0
[   17.691933]  print_report+0xd1/0x650
[   17.692048]  ? __virt_addr_valid+0x1db/0x2d0
[   17.692121]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.692185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.692314]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.692398]  kasan_report+0x141/0x180
[   17.692466]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.692540]  __asan_report_load4_noabort+0x18/0x20
[   17.692598]  kasan_atomics_helper+0x4b54/0x5450
[   17.692659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.692719]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.692773]  ? kasan_atomics+0x152/0x310
[   17.692823]  kasan_atomics+0x1dc/0x310
[   17.692868]  ? __pfx_kasan_atomics+0x10/0x10
[   17.692961]  ? __pfx_read_tsc+0x10/0x10
[   17.693021]  ? ktime_get_ts64+0x86/0x230
[   17.693120]  kunit_try_run_case+0x1a5/0x480
[   17.693220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.693279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.693352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.693406]  ? __kthread_parkme+0x82/0x180
[   17.693437]  ? preempt_count_sub+0x50/0x80
[   17.693469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.693498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.693530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.693560]  kthread+0x337/0x6f0
[   17.693581]  ? trace_preempt_on+0x20/0xc0
[   17.693610]  ? __pfx_kthread+0x10/0x10
[   17.693632]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.693659]  ? calculate_sigpending+0x7b/0xa0
[   17.693686]  ? __pfx_kthread+0x10/0x10
[   17.693709]  ret_from_fork+0x41/0x80
[   17.693734]  ? __pfx_kthread+0x10/0x10
[   17.693756]  ret_from_fork_asm+0x1a/0x30
[   17.693793]  </TASK>
[   17.693808] 
[   17.705206] Allocated by task 286:
[   17.705495]  kasan_save_stack+0x45/0x70
[   17.705924]  kasan_save_track+0x18/0x40
[   17.706250]  kasan_save_alloc_info+0x3b/0x50
[   17.706622]  __kasan_kmalloc+0xb7/0xc0
[   17.706960]  __kmalloc_cache_noprof+0x189/0x420
[   17.707406]  kasan_atomics+0x95/0x310
[   17.707751]  kunit_try_run_case+0x1a5/0x480
[   17.708093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.708657]  kthread+0x337/0x6f0
[   17.708907]  ret_from_fork+0x41/0x80
[   17.709125]  ret_from_fork_asm+0x1a/0x30
[   17.709423] 
[   17.709621] The buggy address belongs to the object at ffff888102b21f80
[   17.709621]  which belongs to the cache kmalloc-64 of size 64
[   17.710602] The buggy address is located 0 bytes to the right of
[   17.710602]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.711677] 
[   17.711867] The buggy address belongs to the physical page:
[   17.712144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.712471] flags: 0x200000000000000(node=0|zone=2)
[   17.712700] page_type: f5(slab)
[   17.713121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.713810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.714517] page dumped because: kasan: bad access detected
[   17.714993] 
[   17.715189] Memory state around the buggy address:
[   17.715522]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.715804]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.716113] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.716721]                                      ^
[   17.717257]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.717855]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.718444] ==================================================================
[   17.549689] ==================================================================
[   17.550128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   17.550841] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.551621] 
[   17.551897] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.552013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.552043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.552119] Call Trace:
[   17.552150]  <TASK>
[   17.552192]  dump_stack_lvl+0x73/0xb0
[   17.552647]  print_report+0xd1/0x650
[   17.552679]  ? __virt_addr_valid+0x1db/0x2d0
[   17.552709]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.552736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.552763]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.552788]  kasan_report+0x141/0x180
[   17.552812]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.552842]  __asan_report_store4_noabort+0x1b/0x30
[   17.552867]  kasan_atomics_helper+0x4ba2/0x5450
[   17.552894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.552920]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.552945]  ? kasan_atomics+0x152/0x310
[   17.552972]  kasan_atomics+0x1dc/0x310
[   17.552995]  ? __pfx_kasan_atomics+0x10/0x10
[   17.553034]  ? __pfx_read_tsc+0x10/0x10
[   17.553061]  ? ktime_get_ts64+0x86/0x230
[   17.553103]  kunit_try_run_case+0x1a5/0x480
[   17.553134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.553161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.553190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.553238]  ? __kthread_parkme+0x82/0x180
[   17.553278]  ? preempt_count_sub+0x50/0x80
[   17.553327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.553376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.553405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.553434]  kthread+0x337/0x6f0
[   17.553454]  ? trace_preempt_on+0x20/0xc0
[   17.553482]  ? __pfx_kthread+0x10/0x10
[   17.553504]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.553530]  ? calculate_sigpending+0x7b/0xa0
[   17.553556]  ? __pfx_kthread+0x10/0x10
[   17.553577]  ret_from_fork+0x41/0x80
[   17.553601]  ? __pfx_kthread+0x10/0x10
[   17.553623]  ret_from_fork_asm+0x1a/0x30
[   17.553660]  </TASK>
[   17.553673] 
[   17.570128] Allocated by task 286:
[   17.570444]  kasan_save_stack+0x45/0x70
[   17.570910]  kasan_save_track+0x18/0x40
[   17.571437]  kasan_save_alloc_info+0x3b/0x50
[   17.571911]  __kasan_kmalloc+0xb7/0xc0
[   17.572035]  __kmalloc_cache_noprof+0x189/0x420
[   17.572245]  kasan_atomics+0x95/0x310
[   17.572607]  kunit_try_run_case+0x1a5/0x480
[   17.572840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.573132]  kthread+0x337/0x6f0
[   17.573478]  ret_from_fork+0x41/0x80
[   17.573826]  ret_from_fork_asm+0x1a/0x30
[   17.574051] 
[   17.574172] The buggy address belongs to the object at ffff888102b21f80
[   17.574172]  which belongs to the cache kmalloc-64 of size 64
[   17.574783] The buggy address is located 0 bytes to the right of
[   17.574783]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.576566] 
[   17.576690] The buggy address belongs to the physical page:
[   17.577759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.577944] flags: 0x200000000000000(node=0|zone=2)
[   17.578066] page_type: f5(slab)
[   17.578248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.578829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.579706] page dumped because: kasan: bad access detected
[   17.580177] 
[   17.580429] Memory state around the buggy address:
[   17.580643]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.581132]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.581951] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.582801]                                      ^
[   17.583014]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.583308]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.583558] ==================================================================
[   19.097570] ==================================================================
[   19.097931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   19.099049] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.099422] 
[   19.099556] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.099640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.099661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.099697] Call Trace:
[   19.099739]  <TASK>
[   19.099778]  dump_stack_lvl+0x73/0xb0
[   19.099832]  print_report+0xd1/0x650
[   19.099872]  ? __virt_addr_valid+0x1db/0x2d0
[   19.099910]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.099948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.099986]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.100024]  kasan_report+0x141/0x180
[   19.100063]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.100111]  __asan_report_load8_noabort+0x18/0x20
[   19.100154]  kasan_atomics_helper+0x4f30/0x5450
[   19.100204]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.100256]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.100312]  ? kasan_atomics+0x152/0x310
[   19.100381]  kasan_atomics+0x1dc/0x310
[   19.100420]  ? __pfx_kasan_atomics+0x10/0x10
[   19.100464]  ? __pfx_read_tsc+0x10/0x10
[   19.100508]  ? ktime_get_ts64+0x86/0x230
[   19.100565]  kunit_try_run_case+0x1a5/0x480
[   19.100627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.100683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.100742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.100793]  ? __kthread_parkme+0x82/0x180
[   19.100870]  ? preempt_count_sub+0x50/0x80
[   19.100936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.100983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.101035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.101093]  kthread+0x337/0x6f0
[   19.101119]  ? trace_preempt_on+0x20/0xc0
[   19.101150]  ? __pfx_kthread+0x10/0x10
[   19.101172]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.101201]  ? calculate_sigpending+0x7b/0xa0
[   19.101228]  ? __pfx_kthread+0x10/0x10
[   19.101251]  ret_from_fork+0x41/0x80
[   19.101313]  ? __pfx_kthread+0x10/0x10
[   19.101358]  ret_from_fork_asm+0x1a/0x30
[   19.101398]  </TASK>
[   19.101414] 
[   19.112934] Allocated by task 286:
[   19.113256]  kasan_save_stack+0x45/0x70
[   19.113518]  kasan_save_track+0x18/0x40
[   19.113715]  kasan_save_alloc_info+0x3b/0x50
[   19.114059]  __kasan_kmalloc+0xb7/0xc0
[   19.114456]  __kmalloc_cache_noprof+0x189/0x420
[   19.114849]  kasan_atomics+0x95/0x310
[   19.115204]  kunit_try_run_case+0x1a5/0x480
[   19.115455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.115778]  kthread+0x337/0x6f0
[   19.116094]  ret_from_fork+0x41/0x80
[   19.116381]  ret_from_fork_asm+0x1a/0x30
[   19.116681] 
[   19.116824] The buggy address belongs to the object at ffff888102b21f80
[   19.116824]  which belongs to the cache kmalloc-64 of size 64
[   19.117442] The buggy address is located 0 bytes to the right of
[   19.117442]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.118145] 
[   19.118345] The buggy address belongs to the physical page:
[   19.118773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.119398] flags: 0x200000000000000(node=0|zone=2)
[   19.119799] page_type: f5(slab)
[   19.120049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.120481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.120926] page dumped because: kasan: bad access detected
[   19.121192] 
[   19.121302] Memory state around the buggy address:
[   19.121705]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.122289]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.122812] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.123131]                                      ^
[   19.123436]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.123948]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.124512] ==================================================================
[   19.256193] ==================================================================
[   19.256878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   19.257535] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.258130] 
[   19.258356] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.258455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.258481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.258522] Call Trace:
[   19.258564]  <TASK>
[   19.260308]  dump_stack_lvl+0x73/0xb0
[   19.260424]  print_report+0xd1/0x650
[   19.260481]  ? __virt_addr_valid+0x1db/0x2d0
[   19.260539]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.260594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.260653]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.260711]  kasan_report+0x141/0x180
[   19.260766]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.260830]  kasan_check_range+0x10c/0x1c0
[   19.260884]  __kasan_check_write+0x18/0x20
[   19.260936]  kasan_atomics_helper+0x1f43/0x5450
[   19.260996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.261068]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.261128]  ? kasan_atomics+0x152/0x310
[   19.261191]  kasan_atomics+0x1dc/0x310
[   19.261243]  ? __pfx_kasan_atomics+0x10/0x10
[   19.261295]  ? __pfx_read_tsc+0x10/0x10
[   19.261360]  ? ktime_get_ts64+0x86/0x230
[   19.261427]  kunit_try_run_case+0x1a5/0x480
[   19.261492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.261540]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.261592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.261646]  ? __kthread_parkme+0x82/0x180
[   19.261697]  ? preempt_count_sub+0x50/0x80
[   19.261760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.261813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.261862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.261950]  kthread+0x337/0x6f0
[   19.262020]  ? trace_preempt_on+0x20/0xc0
[   19.262093]  ? __pfx_kthread+0x10/0x10
[   19.262147]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.262207]  ? calculate_sigpending+0x7b/0xa0
[   19.262274]  ? __pfx_kthread+0x10/0x10
[   19.262301]  ret_from_fork+0x41/0x80
[   19.262328]  ? __pfx_kthread+0x10/0x10
[   19.262375]  ret_from_fork_asm+0x1a/0x30
[   19.262416]  </TASK>
[   19.262431] 
[   19.273306] Allocated by task 286:
[   19.273726]  kasan_save_stack+0x45/0x70
[   19.274184]  kasan_save_track+0x18/0x40
[   19.274575]  kasan_save_alloc_info+0x3b/0x50
[   19.275007]  __kasan_kmalloc+0xb7/0xc0
[   19.275519]  __kmalloc_cache_noprof+0x189/0x420
[   19.275993]  kasan_atomics+0x95/0x310
[   19.276307]  kunit_try_run_case+0x1a5/0x480
[   19.276886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.277435]  kthread+0x337/0x6f0
[   19.277666]  ret_from_fork+0x41/0x80
[   19.277837]  ret_from_fork_asm+0x1a/0x30
[   19.278428] 
[   19.278577] The buggy address belongs to the object at ffff888102b21f80
[   19.278577]  which belongs to the cache kmalloc-64 of size 64
[   19.279643] The buggy address is located 0 bytes to the right of
[   19.279643]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.280577] 
[   19.280967] The buggy address belongs to the physical page:
[   19.281208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.282112] flags: 0x200000000000000(node=0|zone=2)
[   19.282615] page_type: f5(slab)
[   19.282834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.283615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.284000] page dumped because: kasan: bad access detected
[   19.284563] 
[   19.284756] Memory state around the buggy address:
[   19.285510]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.285868]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.286374] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.287098]                                      ^
[   19.287677]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.288217]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.288550] ==================================================================
[   19.409819] ==================================================================
[   19.410552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   19.411439] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.411831] 
[   19.412002] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.412107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.412179] Call Trace:
[   19.412227]  <TASK>
[   19.412298]  dump_stack_lvl+0x73/0xb0
[   19.412400]  print_report+0xd1/0x650
[   19.412470]  ? __virt_addr_valid+0x1db/0x2d0
[   19.412541]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.412607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.412678]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.412746]  kasan_report+0x141/0x180
[   19.412812]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.412889]  __asan_report_load8_noabort+0x18/0x20
[   19.412946]  kasan_atomics_helper+0x4fb2/0x5450
[   19.413019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.413074]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.413124]  ? kasan_atomics+0x152/0x310
[   19.413173]  kasan_atomics+0x1dc/0x310
[   19.413214]  ? __pfx_kasan_atomics+0x10/0x10
[   19.413264]  ? __pfx_read_tsc+0x10/0x10
[   19.413313]  ? ktime_get_ts64+0x86/0x230
[   19.413412]  kunit_try_run_case+0x1a5/0x480
[   19.413470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.413523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.413583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.413642]  ? __kthread_parkme+0x82/0x180
[   19.413701]  ? preempt_count_sub+0x50/0x80
[   19.413767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.413828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.413892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.413955]  kthread+0x337/0x6f0
[   19.414000]  ? trace_preempt_on+0x20/0xc0
[   19.414060]  ? __pfx_kthread+0x10/0x10
[   19.414099]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.414168]  ? calculate_sigpending+0x7b/0xa0
[   19.414220]  ? __pfx_kthread+0x10/0x10
[   19.414279]  ret_from_fork+0x41/0x80
[   19.414329]  ? __pfx_kthread+0x10/0x10
[   19.414404]  ret_from_fork_asm+0x1a/0x30
[   19.414478]  </TASK>
[   19.414519] 
[   19.423203] Allocated by task 286:
[   19.423449]  kasan_save_stack+0x45/0x70
[   19.423835]  kasan_save_track+0x18/0x40
[   19.424118]  kasan_save_alloc_info+0x3b/0x50
[   19.424409]  __kasan_kmalloc+0xb7/0xc0
[   19.424639]  __kmalloc_cache_noprof+0x189/0x420
[   19.424895]  kasan_atomics+0x95/0x310
[   19.425098]  kunit_try_run_case+0x1a5/0x480
[   19.425608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.426058]  kthread+0x337/0x6f0
[   19.426387]  ret_from_fork+0x41/0x80
[   19.426731]  ret_from_fork_asm+0x1a/0x30
[   19.427099] 
[   19.427269] The buggy address belongs to the object at ffff888102b21f80
[   19.427269]  which belongs to the cache kmalloc-64 of size 64
[   19.427825] The buggy address is located 0 bytes to the right of
[   19.427825]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.428621] 
[   19.428855] The buggy address belongs to the physical page:
[   19.429418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.429797] flags: 0x200000000000000(node=0|zone=2)
[   19.430040] page_type: f5(slab)
[   19.430485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.431009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431575] page dumped because: kasan: bad access detected
[   19.431839] 
[   19.431977] Memory state around the buggy address:
[   19.432217]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432545]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432864] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.434430]                                      ^
[   19.434834]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.435483]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.436033] ==================================================================
[   19.472858] ==================================================================
[   19.473709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   19.474259] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.474676] 
[   19.474879] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.475173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.475204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.475243] Call Trace:
[   19.475284]  <TASK>
[   19.475324]  dump_stack_lvl+0x73/0xb0
[   19.475400]  print_report+0xd1/0x650
[   19.475443]  ? __virt_addr_valid+0x1db/0x2d0
[   19.475481]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.475519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.475562]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.475603]  kasan_report+0x141/0x180
[   19.475649]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.475917]  __asan_report_load8_noabort+0x18/0x20
[   19.476017]  kasan_atomics_helper+0x4fa5/0x5450
[   19.476110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.476145]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.476188]  ? kasan_atomics+0x152/0x310
[   19.476219]  kasan_atomics+0x1dc/0x310
[   19.476244]  ? __pfx_kasan_atomics+0x10/0x10
[   19.476277]  ? __pfx_read_tsc+0x10/0x10
[   19.476300]  ? ktime_get_ts64+0x86/0x230
[   19.476360]  kunit_try_run_case+0x1a5/0x480
[   19.476415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.476509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.476538]  ? __kthread_parkme+0x82/0x180
[   19.476565]  ? preempt_count_sub+0x50/0x80
[   19.476594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.476650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.476679]  kthread+0x337/0x6f0
[   19.476699]  ? trace_preempt_on+0x20/0xc0
[   19.476726]  ? __pfx_kthread+0x10/0x10
[   19.476749]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.476776]  ? calculate_sigpending+0x7b/0xa0
[   19.476803]  ? __pfx_kthread+0x10/0x10
[   19.476825]  ret_from_fork+0x41/0x80
[   19.476849]  ? __pfx_kthread+0x10/0x10
[   19.476872]  ret_from_fork_asm+0x1a/0x30
[   19.476908]  </TASK>
[   19.476923] 
[   19.491147] Allocated by task 286:
[   19.491692]  kasan_save_stack+0x45/0x70
[   19.492118]  kasan_save_track+0x18/0x40
[   19.492489]  kasan_save_alloc_info+0x3b/0x50
[   19.492763]  __kasan_kmalloc+0xb7/0xc0
[   19.493085]  __kmalloc_cache_noprof+0x189/0x420
[   19.493882]  kasan_atomics+0x95/0x310
[   19.494065]  kunit_try_run_case+0x1a5/0x480
[   19.494439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.495147]  kthread+0x337/0x6f0
[   19.495474]  ret_from_fork+0x41/0x80
[   19.495611]  ret_from_fork_asm+0x1a/0x30
[   19.495718] 
[   19.495781] The buggy address belongs to the object at ffff888102b21f80
[   19.495781]  which belongs to the cache kmalloc-64 of size 64
[   19.496001] The buggy address is located 0 bytes to the right of
[   19.496001]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.496559] 
[   19.496754] The buggy address belongs to the physical page:
[   19.497050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.497732] flags: 0x200000000000000(node=0|zone=2)
[   19.497977] page_type: f5(slab)
[   19.498281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.498962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.499560] page dumped because: kasan: bad access detected
[   19.499785] 
[   19.499930] Memory state around the buggy address:
[   19.500349]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.500920]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.501498] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.502065]                                      ^
[   19.502520]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.503047]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.503492] ==================================================================
[   18.326624] ==================================================================
[   18.327019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   18.327919] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.328204] 
[   18.328380] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.328509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.328540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.328586] Call Trace:
[   18.328633]  <TASK>
[   18.328684]  dump_stack_lvl+0x73/0xb0
[   18.328754]  print_report+0xd1/0x650
[   18.328811]  ? __virt_addr_valid+0x1db/0x2d0
[   18.328860]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.328911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.328982]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.329045]  kasan_report+0x141/0x180
[   18.329147]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.329207]  __asan_report_load4_noabort+0x18/0x20
[   18.329258]  kasan_atomics_helper+0x4a36/0x5450
[   18.329316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.329392]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.329433]  ? kasan_atomics+0x152/0x310
[   18.329463]  kasan_atomics+0x1dc/0x310
[   18.329489]  ? __pfx_kasan_atomics+0x10/0x10
[   18.329514]  ? __pfx_read_tsc+0x10/0x10
[   18.329539]  ? ktime_get_ts64+0x86/0x230
[   18.329572]  kunit_try_run_case+0x1a5/0x480
[   18.329604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.329631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.329662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.329691]  ? __kthread_parkme+0x82/0x180
[   18.329718]  ? preempt_count_sub+0x50/0x80
[   18.329749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.329778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.329807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.329836]  kthread+0x337/0x6f0
[   18.329859]  ? trace_preempt_on+0x20/0xc0
[   18.329887]  ? __pfx_kthread+0x10/0x10
[   18.329910]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.329937]  ? calculate_sigpending+0x7b/0xa0
[   18.329964]  ? __pfx_kthread+0x10/0x10
[   18.329986]  ret_from_fork+0x41/0x80
[   18.330011]  ? __pfx_kthread+0x10/0x10
[   18.330033]  ret_from_fork_asm+0x1a/0x30
[   18.330101]  </TASK>
[   18.330120] 
[   18.340150] Allocated by task 286:
[   18.340372]  kasan_save_stack+0x45/0x70
[   18.340593]  kasan_save_track+0x18/0x40
[   18.340787]  kasan_save_alloc_info+0x3b/0x50
[   18.341222]  __kasan_kmalloc+0xb7/0xc0
[   18.341594]  __kmalloc_cache_noprof+0x189/0x420
[   18.342003]  kasan_atomics+0x95/0x310
[   18.342453]  kunit_try_run_case+0x1a5/0x480
[   18.342835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.343325]  kthread+0x337/0x6f0
[   18.343532]  ret_from_fork+0x41/0x80
[   18.343730]  ret_from_fork_asm+0x1a/0x30
[   18.343929] 
[   18.344131] The buggy address belongs to the object at ffff888102b21f80
[   18.344131]  which belongs to the cache kmalloc-64 of size 64
[   18.345066] The buggy address is located 0 bytes to the right of
[   18.345066]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.345605] 
[   18.345736] The buggy address belongs to the physical page:
[   18.345967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.346578] flags: 0x200000000000000(node=0|zone=2)
[   18.347041] page_type: f5(slab)
[   18.347479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.348081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.348666] page dumped because: kasan: bad access detected
[   18.349009] 
[   18.349261] Memory state around the buggy address:
[   18.349640]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.349922]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.350198] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.350484]                                      ^
[   18.350885]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.351493]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.352064] ==================================================================
[   17.846650] ==================================================================
[   17.847083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   17.847942] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.848361] 
[   17.848599] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.848703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.848736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.848786] Call Trace:
[   17.848834]  <TASK>
[   17.848899]  dump_stack_lvl+0x73/0xb0
[   17.848955]  print_report+0xd1/0x650
[   17.848997]  ? __virt_addr_valid+0x1db/0x2d0
[   17.849040]  ? kasan_atomics_helper+0x697/0x5450
[   17.849074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.849112]  ? kasan_atomics_helper+0x697/0x5450
[   17.849139]  kasan_report+0x141/0x180
[   17.849167]  ? kasan_atomics_helper+0x697/0x5450
[   17.849199]  kasan_check_range+0x10c/0x1c0
[   17.849224]  __kasan_check_write+0x18/0x20
[   17.849249]  kasan_atomics_helper+0x697/0x5450
[   17.849277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.849305]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.849348]  ? kasan_atomics+0x152/0x310
[   17.849397]  kasan_atomics+0x1dc/0x310
[   17.849441]  ? __pfx_kasan_atomics+0x10/0x10
[   17.849490]  ? __pfx_read_tsc+0x10/0x10
[   17.849540]  ? ktime_get_ts64+0x86/0x230
[   17.849604]  kunit_try_run_case+0x1a5/0x480
[   17.849664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.849721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.849783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.849828]  ? __kthread_parkme+0x82/0x180
[   17.849857]  ? preempt_count_sub+0x50/0x80
[   17.849888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.849918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.849947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.849977]  kthread+0x337/0x6f0
[   17.849997]  ? trace_preempt_on+0x20/0xc0
[   17.850026]  ? __pfx_kthread+0x10/0x10
[   17.850050]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.850088]  ? calculate_sigpending+0x7b/0xa0
[   17.850117]  ? __pfx_kthread+0x10/0x10
[   17.850142]  ret_from_fork+0x41/0x80
[   17.850166]  ? __pfx_kthread+0x10/0x10
[   17.850189]  ret_from_fork_asm+0x1a/0x30
[   17.850226]  </TASK>
[   17.850241] 
[   17.863525] Allocated by task 286:
[   17.863859]  kasan_save_stack+0x45/0x70
[   17.864352]  kasan_save_track+0x18/0x40
[   17.864602]  kasan_save_alloc_info+0x3b/0x50
[   17.864839]  __kasan_kmalloc+0xb7/0xc0
[   17.865056]  __kmalloc_cache_noprof+0x189/0x420
[   17.865320]  kasan_atomics+0x95/0x310
[   17.865570]  kunit_try_run_case+0x1a5/0x480
[   17.865810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.866419]  kthread+0x337/0x6f0
[   17.866607]  ret_from_fork+0x41/0x80
[   17.866781]  ret_from_fork_asm+0x1a/0x30
[   17.866972] 
[   17.867104] The buggy address belongs to the object at ffff888102b21f80
[   17.867104]  which belongs to the cache kmalloc-64 of size 64
[   17.867973] The buggy address is located 0 bytes to the right of
[   17.867973]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.868950] 
[   17.869192] The buggy address belongs to the physical page:
[   17.869511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.870107] flags: 0x200000000000000(node=0|zone=2)
[   17.870509] page_type: f5(slab)
[   17.870711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.871165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.871836] page dumped because: kasan: bad access detected
[   17.872332] 
[   17.872499] Memory state around the buggy address:
[   17.872723]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.873362]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.873843] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.874158]                                      ^
[   17.874606]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.875199]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.875560] ==================================================================
[   18.967098] ==================================================================
[   18.968574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   18.969128] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.969645] 
[   18.969911] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.970029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.970097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.970165] Call Trace:
[   18.970216]  <TASK>
[   18.970270]  dump_stack_lvl+0x73/0xb0
[   18.970354]  print_report+0xd1/0x650
[   18.970417]  ? __virt_addr_valid+0x1db/0x2d0
[   18.970470]  ? kasan_atomics_helper+0x19e3/0x5450
[   18.970527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.970578]  ? kasan_atomics_helper+0x19e3/0x5450
[   18.970636]  kasan_report+0x141/0x180
[   18.970705]  ? kasan_atomics_helper+0x19e3/0x5450
[   18.970775]  kasan_check_range+0x10c/0x1c0
[   18.970832]  __kasan_check_write+0x18/0x20
[   18.970875]  kasan_atomics_helper+0x19e3/0x5450
[   18.970903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.970932]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.970958]  ? kasan_atomics+0x152/0x310
[   18.970987]  kasan_atomics+0x1dc/0x310
[   18.971011]  ? __pfx_kasan_atomics+0x10/0x10
[   18.971036]  ? __pfx_read_tsc+0x10/0x10
[   18.971073]  ? ktime_get_ts64+0x86/0x230
[   18.971116]  kunit_try_run_case+0x1a5/0x480
[   18.971148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.971174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.971203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.971231]  ? __kthread_parkme+0x82/0x180
[   18.971259]  ? preempt_count_sub+0x50/0x80
[   18.971328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.971380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.971410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.971439]  kthread+0x337/0x6f0
[   18.971460]  ? trace_preempt_on+0x20/0xc0
[   18.971489]  ? __pfx_kthread+0x10/0x10
[   18.971511]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.971538]  ? calculate_sigpending+0x7b/0xa0
[   18.971565]  ? __pfx_kthread+0x10/0x10
[   18.971587]  ret_from_fork+0x41/0x80
[   18.971611]  ? __pfx_kthread+0x10/0x10
[   18.971633]  ret_from_fork_asm+0x1a/0x30
[   18.971669]  </TASK>
[   18.971684] 
[   18.982753] Allocated by task 286:
[   18.982959]  kasan_save_stack+0x45/0x70
[   18.985045]  kasan_save_track+0x18/0x40
[   18.985456]  kasan_save_alloc_info+0x3b/0x50
[   18.985769]  __kasan_kmalloc+0xb7/0xc0
[   18.985966]  __kmalloc_cache_noprof+0x189/0x420
[   18.986188]  kasan_atomics+0x95/0x310
[   18.986391]  kunit_try_run_case+0x1a5/0x480
[   18.986587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.986807]  kthread+0x337/0x6f0
[   18.986963]  ret_from_fork+0x41/0x80
[   18.987118]  ret_from_fork_asm+0x1a/0x30
[   18.987467] 
[   18.987632] The buggy address belongs to the object at ffff888102b21f80
[   18.987632]  which belongs to the cache kmalloc-64 of size 64
[   18.988059] The buggy address is located 0 bytes to the right of
[   18.988059]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.988501] 
[   18.988666] The buggy address belongs to the physical page:
[   18.989108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.990772] flags: 0x200000000000000(node=0|zone=2)
[   18.991013] page_type: f5(slab)
[   18.991768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.992585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.993620] page dumped because: kasan: bad access detected
[   18.994452] 
[   18.994687] Memory state around the buggy address:
[   18.994979]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.995657]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.996321] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.996868]                                      ^
[   18.997461]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.998063]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.998703] ==================================================================
[   18.906022] ==================================================================
[   18.906836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   18.907553] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.908017] 
[   18.908291] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.908410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.908441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.908488] Call Trace:
[   18.908536]  <TASK>
[   18.908585]  dump_stack_lvl+0x73/0xb0
[   18.908659]  print_report+0xd1/0x650
[   18.908716]  ? __virt_addr_valid+0x1db/0x2d0
[   18.908775]  ? kasan_atomics_helper+0x18b1/0x5450
[   18.908831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.908892]  ? kasan_atomics_helper+0x18b1/0x5450
[   18.908947]  kasan_report+0x141/0x180
[   18.909006]  ? kasan_atomics_helper+0x18b1/0x5450
[   18.909087]  kasan_check_range+0x10c/0x1c0
[   18.909143]  __kasan_check_write+0x18/0x20
[   18.909200]  kasan_atomics_helper+0x18b1/0x5450
[   18.909260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.909320]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.909388]  ? kasan_atomics+0x152/0x310
[   18.909433]  kasan_atomics+0x1dc/0x310
[   18.909478]  ? __pfx_kasan_atomics+0x10/0x10
[   18.909526]  ? __pfx_read_tsc+0x10/0x10
[   18.909570]  ? ktime_get_ts64+0x86/0x230
[   18.909620]  kunit_try_run_case+0x1a5/0x480
[   18.909675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.909727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.909780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.909829]  ? __kthread_parkme+0x82/0x180
[   18.909877]  ? preempt_count_sub+0x50/0x80
[   18.909934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.909990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.910053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.910105]  kthread+0x337/0x6f0
[   18.910147]  ? trace_preempt_on+0x20/0xc0
[   18.910202]  ? __pfx_kthread+0x10/0x10
[   18.910245]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.910298]  ? calculate_sigpending+0x7b/0xa0
[   18.910382]  ? __pfx_kthread+0x10/0x10
[   18.910450]  ret_from_fork+0x41/0x80
[   18.910508]  ? __pfx_kthread+0x10/0x10
[   18.910556]  ret_from_fork_asm+0x1a/0x30
[   18.910635]  </TASK>
[   18.910662] 
[   18.921236] Allocated by task 286:
[   18.921711]  kasan_save_stack+0x45/0x70
[   18.921971]  kasan_save_track+0x18/0x40
[   18.922324]  kasan_save_alloc_info+0x3b/0x50
[   18.922729]  __kasan_kmalloc+0xb7/0xc0
[   18.923166]  __kmalloc_cache_noprof+0x189/0x420
[   18.923488]  kasan_atomics+0x95/0x310
[   18.923787]  kunit_try_run_case+0x1a5/0x480
[   18.924058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.924562]  kthread+0x337/0x6f0
[   18.924893]  ret_from_fork+0x41/0x80
[   18.925117]  ret_from_fork_asm+0x1a/0x30
[   18.925485] 
[   18.925663] The buggy address belongs to the object at ffff888102b21f80
[   18.925663]  which belongs to the cache kmalloc-64 of size 64
[   18.926376] The buggy address is located 0 bytes to the right of
[   18.926376]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.926920] 
[   18.927054] The buggy address belongs to the physical page:
[   18.927280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.927602] flags: 0x200000000000000(node=0|zone=2)
[   18.927831] page_type: f5(slab)
[   18.928024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.928315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.928964] page dumped because: kasan: bad access detected
[   18.929568] 
[   18.929763] Memory state around the buggy address:
[   18.930173]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.930803]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.931503] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.931961]                                      ^
[   18.932409]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.932814]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.933118] ==================================================================
[   18.080436] ==================================================================
[   18.081054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   18.081480] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.082044] 
[   18.082305] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.082426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.082458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.082508] Call Trace:
[   18.082555]  <TASK>
[   18.082600]  dump_stack_lvl+0x73/0xb0
[   18.082663]  print_report+0xd1/0x650
[   18.082715]  ? __virt_addr_valid+0x1db/0x2d0
[   18.082771]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.082823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.082878]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.082923]  kasan_report+0x141/0x180
[   18.082974]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.083030]  kasan_check_range+0x10c/0x1c0
[   18.083122]  __kasan_check_write+0x18/0x20
[   18.083174]  kasan_atomics_helper+0xb6a/0x5450
[   18.083227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.083284]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.083356]  ? kasan_atomics+0x152/0x310
[   18.083417]  kasan_atomics+0x1dc/0x310
[   18.083467]  ? __pfx_kasan_atomics+0x10/0x10
[   18.083523]  ? __pfx_read_tsc+0x10/0x10
[   18.083573]  ? ktime_get_ts64+0x86/0x230
[   18.083637]  kunit_try_run_case+0x1a5/0x480
[   18.083700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.083755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.083815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.083875]  ? __kthread_parkme+0x82/0x180
[   18.083929]  ? preempt_count_sub+0x50/0x80
[   18.083991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.084051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.084144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.084206]  kthread+0x337/0x6f0
[   18.084245]  ? trace_preempt_on+0x20/0xc0
[   18.084278]  ? __pfx_kthread+0x10/0x10
[   18.084301]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.084328]  ? calculate_sigpending+0x7b/0xa0
[   18.084374]  ? __pfx_kthread+0x10/0x10
[   18.084398]  ret_from_fork+0x41/0x80
[   18.084422]  ? __pfx_kthread+0x10/0x10
[   18.084444]  ret_from_fork_asm+0x1a/0x30
[   18.084480]  </TASK>
[   18.084495] 
[   18.095788] Allocated by task 286:
[   18.096124]  kasan_save_stack+0x45/0x70
[   18.096437]  kasan_save_track+0x18/0x40
[   18.096690]  kasan_save_alloc_info+0x3b/0x50
[   18.096922]  __kasan_kmalloc+0xb7/0xc0
[   18.097200]  __kmalloc_cache_noprof+0x189/0x420
[   18.097610]  kasan_atomics+0x95/0x310
[   18.097943]  kunit_try_run_case+0x1a5/0x480
[   18.098282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.098585]  kthread+0x337/0x6f0
[   18.098771]  ret_from_fork+0x41/0x80
[   18.099108]  ret_from_fork_asm+0x1a/0x30
[   18.099466] 
[   18.099634] The buggy address belongs to the object at ffff888102b21f80
[   18.099634]  which belongs to the cache kmalloc-64 of size 64
[   18.100497] The buggy address is located 0 bytes to the right of
[   18.100497]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.100942] 
[   18.101079] The buggy address belongs to the physical page:
[   18.101463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.102271] flags: 0x200000000000000(node=0|zone=2)
[   18.102620] page_type: f5(slab)
[   18.102805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.103108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.103672] page dumped because: kasan: bad access detected
[   18.104099] 
[   18.104267] Memory state around the buggy address:
[   18.104647]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.104982]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.105419] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.105888]                                      ^
[   18.106248]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.106533]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.106802] ==================================================================
[   18.480160] ==================================================================
[   18.480594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   18.480879] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.481150] 
[   18.481367] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.481474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.481495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.481522] Call Trace:
[   18.481550]  <TASK>
[   18.481581]  dump_stack_lvl+0x73/0xb0
[   18.481626]  print_report+0xd1/0x650
[   18.481676]  ? __virt_addr_valid+0x1db/0x2d0
[   18.481733]  ? kasan_atomics_helper+0x1217/0x5450
[   18.481786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.481844]  ? kasan_atomics_helper+0x1217/0x5450
[   18.481888]  kasan_report+0x141/0x180
[   18.481917]  ? kasan_atomics_helper+0x1217/0x5450
[   18.481952]  kasan_check_range+0x10c/0x1c0
[   18.481978]  __kasan_check_write+0x18/0x20
[   18.482003]  kasan_atomics_helper+0x1217/0x5450
[   18.482031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.482060]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.482088]  ? kasan_atomics+0x152/0x310
[   18.482117]  kasan_atomics+0x1dc/0x310
[   18.482140]  ? __pfx_kasan_atomics+0x10/0x10
[   18.482165]  ? __pfx_read_tsc+0x10/0x10
[   18.482191]  ? ktime_get_ts64+0x86/0x230
[   18.482222]  kunit_try_run_case+0x1a5/0x480
[   18.482252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.482278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.482309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.482381]  ? __kthread_parkme+0x82/0x180
[   18.482448]  ? preempt_count_sub+0x50/0x80
[   18.482521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.482574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.482635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.482696]  kthread+0x337/0x6f0
[   18.482740]  ? trace_preempt_on+0x20/0xc0
[   18.482790]  ? __pfx_kthread+0x10/0x10
[   18.482837]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.482891]  ? calculate_sigpending+0x7b/0xa0
[   18.482947]  ? __pfx_kthread+0x10/0x10
[   18.482996]  ret_from_fork+0x41/0x80
[   18.483045]  ? __pfx_kthread+0x10/0x10
[   18.483103]  ret_from_fork_asm+0x1a/0x30
[   18.483157]  </TASK>
[   18.483175] 
[   18.493824] Allocated by task 286:
[   18.494239]  kasan_save_stack+0x45/0x70
[   18.494519]  kasan_save_track+0x18/0x40
[   18.494871]  kasan_save_alloc_info+0x3b/0x50
[   18.495353]  __kasan_kmalloc+0xb7/0xc0
[   18.495569]  __kmalloc_cache_noprof+0x189/0x420
[   18.495787]  kasan_atomics+0x95/0x310
[   18.495975]  kunit_try_run_case+0x1a5/0x480
[   18.496408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.497034]  kthread+0x337/0x6f0
[   18.497378]  ret_from_fork+0x41/0x80
[   18.497702]  ret_from_fork_asm+0x1a/0x30
[   18.497926] 
[   18.498050] The buggy address belongs to the object at ffff888102b21f80
[   18.498050]  which belongs to the cache kmalloc-64 of size 64
[   18.498939] The buggy address is located 0 bytes to the right of
[   18.498939]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.499545] 
[   18.499763] The buggy address belongs to the physical page:
[   18.500255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.500801] flags: 0x200000000000000(node=0|zone=2)
[   18.501313] page_type: f5(slab)
[   18.501528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.502082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.502389] page dumped because: kasan: bad access detected
[   18.502614] 
[   18.502722] Memory state around the buggy address:
[   18.502938]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.503210]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.503653] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.504262]                                      ^
[   18.504687]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.505299]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.505863] ==================================================================
[   17.584315] ==================================================================
[   17.584853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   17.585183] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.585856] 
[   17.586122] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.586351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.586381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.586426] Call Trace:
[   17.586471]  <TASK>
[   17.586514]  dump_stack_lvl+0x73/0xb0
[   17.586578]  print_report+0xd1/0x650
[   17.586630]  ? __virt_addr_valid+0x1db/0x2d0
[   17.586674]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.586723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.586774]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.586821]  kasan_report+0x141/0x180
[   17.586871]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.586930]  __asan_report_load4_noabort+0x18/0x20
[   17.586978]  kasan_atomics_helper+0x4b88/0x5450
[   17.587032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.587119]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.587171]  ? kasan_atomics+0x152/0x310
[   17.587363]  kasan_atomics+0x1dc/0x310
[   17.587408]  ? __pfx_kasan_atomics+0x10/0x10
[   17.587439]  ? __pfx_read_tsc+0x10/0x10
[   17.587478]  ? ktime_get_ts64+0x86/0x230
[   17.587527]  kunit_try_run_case+0x1a5/0x480
[   17.587581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.587623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.587668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.587716]  ? __kthread_parkme+0x82/0x180
[   17.587762]  ? preempt_count_sub+0x50/0x80
[   17.587816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.587864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.587914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.587969]  kthread+0x337/0x6f0
[   17.588002]  ? trace_preempt_on+0x20/0xc0
[   17.588053]  ? __pfx_kthread+0x10/0x10
[   17.588131]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.588162]  ? calculate_sigpending+0x7b/0xa0
[   17.588190]  ? __pfx_kthread+0x10/0x10
[   17.588263]  ret_from_fork+0x41/0x80
[   17.588314]  ? __pfx_kthread+0x10/0x10
[   17.588364]  ret_from_fork_asm+0x1a/0x30
[   17.588403]  </TASK>
[   17.588417] 
[   17.602493] Allocated by task 286:
[   17.602776]  kasan_save_stack+0x45/0x70
[   17.603068]  kasan_save_track+0x18/0x40
[   17.603764]  kasan_save_alloc_info+0x3b/0x50
[   17.604266]  __kasan_kmalloc+0xb7/0xc0
[   17.604491]  __kmalloc_cache_noprof+0x189/0x420
[   17.604887]  kasan_atomics+0x95/0x310
[   17.605411]  kunit_try_run_case+0x1a5/0x480
[   17.605964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.606300]  kthread+0x337/0x6f0
[   17.606585]  ret_from_fork+0x41/0x80
[   17.606843]  ret_from_fork_asm+0x1a/0x30
[   17.607294] 
[   17.607687] The buggy address belongs to the object at ffff888102b21f80
[   17.607687]  which belongs to the cache kmalloc-64 of size 64
[   17.608845] The buggy address is located 0 bytes to the right of
[   17.608845]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.609765] 
[   17.610354] The buggy address belongs to the physical page:
[   17.610828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.611328] flags: 0x200000000000000(node=0|zone=2)
[   17.611905] page_type: f5(slab)
[   17.612433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.612756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.613179] page dumped because: kasan: bad access detected
[   17.613882] 
[   17.614101] Memory state around the buggy address:
[   17.614635]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.615007]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.615731] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.616472]                                      ^
[   17.616831]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.617484]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.617643] ==================================================================
[   17.719686] ==================================================================
[   17.720457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   17.721135] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.721777] 
[   17.722007] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.722151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.722185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.722271] Call Trace:
[   17.722322]  <TASK>
[   17.722383]  dump_stack_lvl+0x73/0xb0
[   17.722456]  print_report+0xd1/0x650
[   17.722549]  ? __virt_addr_valid+0x1db/0x2d0
[   17.722605]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.722657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.722714]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.722802]  kasan_report+0x141/0x180
[   17.722860]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.722925]  kasan_check_range+0x10c/0x1c0
[   17.723011]  __kasan_check_write+0x18/0x20
[   17.723096]  kasan_atomics_helper+0x4a0/0x5450
[   17.723151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.723208]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.723299]  ? kasan_atomics+0x152/0x310
[   17.723374]  kasan_atomics+0x1dc/0x310
[   17.723422]  ? __pfx_kasan_atomics+0x10/0x10
[   17.723499]  ? __pfx_read_tsc+0x10/0x10
[   17.723546]  ? ktime_get_ts64+0x86/0x230
[   17.723630]  kunit_try_run_case+0x1a5/0x480
[   17.723689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.723736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.723790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.723849]  ? __kthread_parkme+0x82/0x180
[   17.723904]  ? preempt_count_sub+0x50/0x80
[   17.723955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.723988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.724020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.724050]  kthread+0x337/0x6f0
[   17.724108]  ? trace_preempt_on+0x20/0xc0
[   17.724142]  ? __pfx_kthread+0x10/0x10
[   17.724164]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.724190]  ? calculate_sigpending+0x7b/0xa0
[   17.724217]  ? __pfx_kthread+0x10/0x10
[   17.724241]  ret_from_fork+0x41/0x80
[   17.724267]  ? __pfx_kthread+0x10/0x10
[   17.724290]  ret_from_fork_asm+0x1a/0x30
[   17.724327]  </TASK>
[   17.724362] 
[   17.739158] Allocated by task 286:
[   17.739414]  kasan_save_stack+0x45/0x70
[   17.739654]  kasan_save_track+0x18/0x40
[   17.740138]  kasan_save_alloc_info+0x3b/0x50
[   17.740512]  __kasan_kmalloc+0xb7/0xc0
[   17.740783]  __kmalloc_cache_noprof+0x189/0x420
[   17.741505]  kasan_atomics+0x95/0x310
[   17.741734]  kunit_try_run_case+0x1a5/0x480
[   17.742402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.742700]  kthread+0x337/0x6f0
[   17.743247]  ret_from_fork+0x41/0x80
[   17.743446]  ret_from_fork_asm+0x1a/0x30
[   17.744087] 
[   17.744377] The buggy address belongs to the object at ffff888102b21f80
[   17.744377]  which belongs to the cache kmalloc-64 of size 64
[   17.745393] The buggy address is located 0 bytes to the right of
[   17.745393]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.746434] 
[   17.746669] The buggy address belongs to the physical page:
[   17.747180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.747585] flags: 0x200000000000000(node=0|zone=2)
[   17.747719] page_type: f5(slab)
[   17.747820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.747971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.748189] page dumped because: kasan: bad access detected
[   17.748619] 
[   17.748831] Memory state around the buggy address:
[   17.749278]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.749802]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.750441] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.750736]                                      ^
[   17.751035]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.751500]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.752039] ==================================================================
[   19.063677] ==================================================================
[   19.063942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   19.064205] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.065872] 
[   19.066478] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.066606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.066639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.066692] Call Trace:
[   19.066737]  <TASK>
[   19.066786]  dump_stack_lvl+0x73/0xb0
[   19.066859]  print_report+0xd1/0x650
[   19.066919]  ? __virt_addr_valid+0x1db/0x2d0
[   19.066979]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.067035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.067096]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.067153]  kasan_report+0x141/0x180
[   19.067209]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.067280]  kasan_check_range+0x10c/0x1c0
[   19.067353]  __kasan_check_write+0x18/0x20
[   19.067408]  kasan_atomics_helper+0x1c18/0x5450
[   19.067469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.067530]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.067578]  ? kasan_atomics+0x152/0x310
[   19.067624]  kasan_atomics+0x1dc/0x310
[   19.067699]  ? __pfx_kasan_atomics+0x10/0x10
[   19.067754]  ? __pfx_read_tsc+0x10/0x10
[   19.067803]  ? ktime_get_ts64+0x86/0x230
[   19.067867]  kunit_try_run_case+0x1a5/0x480
[   19.067931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.067986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.068046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.068107]  ? __kthread_parkme+0x82/0x180
[   19.068138]  ? preempt_count_sub+0x50/0x80
[   19.068167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.068195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.068225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.068253]  kthread+0x337/0x6f0
[   19.068274]  ? trace_preempt_on+0x20/0xc0
[   19.068301]  ? __pfx_kthread+0x10/0x10
[   19.068323]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.068370]  ? calculate_sigpending+0x7b/0xa0
[   19.068397]  ? __pfx_kthread+0x10/0x10
[   19.068419]  ret_from_fork+0x41/0x80
[   19.068443]  ? __pfx_kthread+0x10/0x10
[   19.068465]  ret_from_fork_asm+0x1a/0x30
[   19.068500]  </TASK>
[   19.068515] 
[   19.082508] Allocated by task 286:
[   19.082756]  kasan_save_stack+0x45/0x70
[   19.083009]  kasan_save_track+0x18/0x40
[   19.083772]  kasan_save_alloc_info+0x3b/0x50
[   19.084217]  __kasan_kmalloc+0xb7/0xc0
[   19.084486]  __kmalloc_cache_noprof+0x189/0x420
[   19.084847]  kasan_atomics+0x95/0x310
[   19.085434]  kunit_try_run_case+0x1a5/0x480
[   19.085740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.086328]  kthread+0x337/0x6f0
[   19.086705]  ret_from_fork+0x41/0x80
[   19.086922]  ret_from_fork_asm+0x1a/0x30
[   19.087349] 
[   19.087749] The buggy address belongs to the object at ffff888102b21f80
[   19.087749]  which belongs to the cache kmalloc-64 of size 64
[   19.088817] The buggy address is located 0 bytes to the right of
[   19.088817]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.090010] 
[   19.090390] The buggy address belongs to the physical page:
[   19.090793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.091360] flags: 0x200000000000000(node=0|zone=2)
[   19.091822] page_type: f5(slab)
[   19.092039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.092422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.092768] page dumped because: kasan: bad access detected
[   19.093051] 
[   19.093179] Memory state around the buggy address:
[   19.093447]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.093723]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.094178] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.094777]                                      ^
[   19.095274]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.095819]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.096407] ==================================================================
[   18.816702] ==================================================================
[   18.817122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   18.817477] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.818029] 
[   18.818315] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.818438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.818469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.818521] Call Trace:
[   18.818571]  <TASK>
[   18.818619]  dump_stack_lvl+0x73/0xb0
[   18.818686]  print_report+0xd1/0x650
[   18.818745]  ? __virt_addr_valid+0x1db/0x2d0
[   18.818803]  ? kasan_atomics_helper+0x16e7/0x5450
[   18.818860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.818917]  ? kasan_atomics_helper+0x16e7/0x5450
[   18.818975]  kasan_report+0x141/0x180
[   18.819032]  ? kasan_atomics_helper+0x16e7/0x5450
[   18.819102]  kasan_check_range+0x10c/0x1c0
[   18.819150]  __kasan_check_write+0x18/0x20
[   18.819189]  kasan_atomics_helper+0x16e7/0x5450
[   18.819233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.819282]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.819351]  ? kasan_atomics+0x152/0x310
[   18.819405]  kasan_atomics+0x1dc/0x310
[   18.819454]  ? __pfx_kasan_atomics+0x10/0x10
[   18.819506]  ? __pfx_read_tsc+0x10/0x10
[   18.819559]  ? ktime_get_ts64+0x86/0x230
[   18.819621]  kunit_try_run_case+0x1a5/0x480
[   18.819685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.819738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.819822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.819876]  ? __kthread_parkme+0x82/0x180
[   18.819926]  ? preempt_count_sub+0x50/0x80
[   18.819976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.820027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.820096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.820171]  kthread+0x337/0x6f0
[   18.820216]  ? trace_preempt_on+0x20/0xc0
[   18.820265]  ? __pfx_kthread+0x10/0x10
[   18.820309]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.820378]  ? calculate_sigpending+0x7b/0xa0
[   18.820432]  ? __pfx_kthread+0x10/0x10
[   18.820480]  ret_from_fork+0x41/0x80
[   18.820533]  ? __pfx_kthread+0x10/0x10
[   18.820581]  ret_from_fork_asm+0x1a/0x30
[   18.820660]  </TASK>
[   18.820691] 
[   18.831650] Allocated by task 286:
[   18.832663]  kasan_save_stack+0x45/0x70
[   18.832943]  kasan_save_track+0x18/0x40
[   18.833554]  kasan_save_alloc_info+0x3b/0x50
[   18.834329]  __kasan_kmalloc+0xb7/0xc0
[   18.834784]  __kmalloc_cache_noprof+0x189/0x420
[   18.835165]  kasan_atomics+0x95/0x310
[   18.835414]  kunit_try_run_case+0x1a5/0x480
[   18.835763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.836105]  kthread+0x337/0x6f0
[   18.836471]  ret_from_fork+0x41/0x80
[   18.836728]  ret_from_fork_asm+0x1a/0x30
[   18.837127] 
[   18.837390] The buggy address belongs to the object at ffff888102b21f80
[   18.837390]  which belongs to the cache kmalloc-64 of size 64
[   18.838140] The buggy address is located 0 bytes to the right of
[   18.838140]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.839092] 
[   18.839250] The buggy address belongs to the physical page:
[   18.839720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.840358] flags: 0x200000000000000(node=0|zone=2)
[   18.840735] page_type: f5(slab)
[   18.841137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.841756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.842259] page dumped because: kasan: bad access detected
[   18.842600] 
[   18.842811] Memory state around the buggy address:
[   18.843218]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.843722]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.844272] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.844648]                                      ^
[   18.844847]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.845541]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.845831] ==================================================================
[   19.125666] ==================================================================
[   19.126743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   19.127394] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.127861] 
[   19.128116] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.128222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.128254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.128297] Call Trace:
[   19.128354]  <TASK>
[   19.128402]  dump_stack_lvl+0x73/0xb0
[   19.128465]  print_report+0xd1/0x650
[   19.128519]  ? __virt_addr_valid+0x1db/0x2d0
[   19.128574]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.128622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.128676]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.128726]  kasan_report+0x141/0x180
[   19.128776]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.128840]  kasan_check_range+0x10c/0x1c0
[   19.128889]  __kasan_check_write+0x18/0x20
[   19.128940]  kasan_atomics_helper+0x1ce1/0x5450
[   19.128993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.129099]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.129155]  ? kasan_atomics+0x152/0x310
[   19.129189]  kasan_atomics+0x1dc/0x310
[   19.129215]  ? __pfx_kasan_atomics+0x10/0x10
[   19.129242]  ? __pfx_read_tsc+0x10/0x10
[   19.129268]  ? ktime_get_ts64+0x86/0x230
[   19.129306]  kunit_try_run_case+0x1a5/0x480
[   19.129373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.129419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.129469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.129525]  ? __kthread_parkme+0x82/0x180
[   19.129573]  ? preempt_count_sub+0x50/0x80
[   19.129625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.129673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.129729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.129786]  kthread+0x337/0x6f0
[   19.129829]  ? trace_preempt_on+0x20/0xc0
[   19.129884]  ? __pfx_kthread+0x10/0x10
[   19.129926]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.129978]  ? calculate_sigpending+0x7b/0xa0
[   19.130030]  ? __pfx_kthread+0x10/0x10
[   19.130110]  ret_from_fork+0x41/0x80
[   19.130163]  ? __pfx_kthread+0x10/0x10
[   19.130206]  ret_from_fork_asm+0x1a/0x30
[   19.130277]  </TASK>
[   19.130305] 
[   19.141319] Allocated by task 286:
[   19.141748]  kasan_save_stack+0x45/0x70
[   19.142225]  kasan_save_track+0x18/0x40
[   19.142461]  kasan_save_alloc_info+0x3b/0x50
[   19.142676]  __kasan_kmalloc+0xb7/0xc0
[   19.142864]  __kmalloc_cache_noprof+0x189/0x420
[   19.143203]  kasan_atomics+0x95/0x310
[   19.143395]  kunit_try_run_case+0x1a5/0x480
[   19.143693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.144005]  kthread+0x337/0x6f0
[   19.144241]  ret_from_fork+0x41/0x80
[   19.144510]  ret_from_fork_asm+0x1a/0x30
[   19.144872] 
[   19.145077] The buggy address belongs to the object at ffff888102b21f80
[   19.145077]  which belongs to the cache kmalloc-64 of size 64
[   19.146347] The buggy address is located 0 bytes to the right of
[   19.146347]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.148258] 
[   19.148502] The buggy address belongs to the physical page:
[   19.148955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.150238] flags: 0x200000000000000(node=0|zone=2)
[   19.150729] page_type: f5(slab)
[   19.151073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.151440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.151851] page dumped because: kasan: bad access detected
[   19.152272] 
[   19.152462] Memory state around the buggy address:
[   19.152770]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.153513]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.154030] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.154717]                                      ^
[   19.155082]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.155487]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.155861] ==================================================================
[   17.754183] ==================================================================
[   17.755009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   17.755413] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.755632] 
[   17.755749] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.755823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.755842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.755875] Call Trace:
[   17.755910]  <TASK>
[   17.755942]  dump_stack_lvl+0x73/0xb0
[   17.755978]  print_report+0xd1/0x650
[   17.756006]  ? __virt_addr_valid+0x1db/0x2d0
[   17.756035]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.756061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.756104]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.756147]  kasan_report+0x141/0x180
[   17.756195]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.756255]  __asan_report_store4_noabort+0x1b/0x30
[   17.756307]  kasan_atomics_helper+0x4b3a/0x5450
[   17.756381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.756437]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.756485]  ? kasan_atomics+0x152/0x310
[   17.756527]  kasan_atomics+0x1dc/0x310
[   17.756567]  ? __pfx_kasan_atomics+0x10/0x10
[   17.756615]  ? __pfx_read_tsc+0x10/0x10
[   17.756660]  ? ktime_get_ts64+0x86/0x230
[   17.756721]  kunit_try_run_case+0x1a5/0x480
[   17.756782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.756837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.756896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.756958]  ? __kthread_parkme+0x82/0x180
[   17.757003]  ? preempt_count_sub+0x50/0x80
[   17.757069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.757124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.757175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.757232]  kthread+0x337/0x6f0
[   17.757275]  ? trace_preempt_on+0x20/0xc0
[   17.757324]  ? __pfx_kthread+0x10/0x10
[   17.757384]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.757430]  ? calculate_sigpending+0x7b/0xa0
[   17.757481]  ? __pfx_kthread+0x10/0x10
[   17.757531]  ret_from_fork+0x41/0x80
[   17.757581]  ? __pfx_kthread+0x10/0x10
[   17.757628]  ret_from_fork_asm+0x1a/0x30
[   17.757668]  </TASK>
[   17.757683] 
[   17.769125] Allocated by task 286:
[   17.769538]  kasan_save_stack+0x45/0x70
[   17.769888]  kasan_save_track+0x18/0x40
[   17.770365]  kasan_save_alloc_info+0x3b/0x50
[   17.770680]  __kasan_kmalloc+0xb7/0xc0
[   17.771051]  __kmalloc_cache_noprof+0x189/0x420
[   17.771364]  kasan_atomics+0x95/0x310
[   17.771564]  kunit_try_run_case+0x1a5/0x480
[   17.771773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.772295]  kthread+0x337/0x6f0
[   17.772629]  ret_from_fork+0x41/0x80
[   17.772974]  ret_from_fork_asm+0x1a/0x30
[   17.773373] 
[   17.773565] The buggy address belongs to the object at ffff888102b21f80
[   17.773565]  which belongs to the cache kmalloc-64 of size 64
[   17.774418] The buggy address is located 0 bytes to the right of
[   17.774418]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.775181] 
[   17.775452] The buggy address belongs to the physical page:
[   17.775863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.776436] flags: 0x200000000000000(node=0|zone=2)
[   17.776813] page_type: f5(slab)
[   17.777200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.777522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.777820] page dumped because: kasan: bad access detected
[   17.778357] 
[   17.778554] Memory state around the buggy address:
[   17.778971]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.779591]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.780172] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.780649]                                      ^
[   17.780985]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.781517]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.782023] ==================================================================
[   18.108180] ==================================================================
[   18.109660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   18.110548] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.111133] 
[   18.111400] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.111505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.111537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.111587] Call Trace:
[   18.111636]  <TASK>
[   18.111681]  dump_stack_lvl+0x73/0xb0
[   18.111750]  print_report+0xd1/0x650
[   18.111808]  ? __virt_addr_valid+0x1db/0x2d0
[   18.111869]  ? kasan_atomics_helper+0xc70/0x5450
[   18.111925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.111982]  ? kasan_atomics_helper+0xc70/0x5450
[   18.112028]  kasan_report+0x141/0x180
[   18.112075]  ? kasan_atomics_helper+0xc70/0x5450
[   18.112129]  kasan_check_range+0x10c/0x1c0
[   18.112174]  __kasan_check_write+0x18/0x20
[   18.112224]  kasan_atomics_helper+0xc70/0x5450
[   18.112286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.112359]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.112415]  ? kasan_atomics+0x152/0x310
[   18.112475]  kasan_atomics+0x1dc/0x310
[   18.112526]  ? __pfx_kasan_atomics+0x10/0x10
[   18.112580]  ? __pfx_read_tsc+0x10/0x10
[   18.112633]  ? ktime_get_ts64+0x86/0x230
[   18.112695]  kunit_try_run_case+0x1a5/0x480
[   18.112757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.112812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.112873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.112934]  ? __kthread_parkme+0x82/0x180
[   18.112988]  ? preempt_count_sub+0x50/0x80
[   18.113065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.113115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.113168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.113227]  kthread+0x337/0x6f0
[   18.113269]  ? trace_preempt_on+0x20/0xc0
[   18.113325]  ? __pfx_kthread+0x10/0x10
[   18.113385]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.113432]  ? calculate_sigpending+0x7b/0xa0
[   18.113477]  ? __pfx_kthread+0x10/0x10
[   18.113519]  ret_from_fork+0x41/0x80
[   18.113569]  ? __pfx_kthread+0x10/0x10
[   18.113616]  ret_from_fork_asm+0x1a/0x30
[   18.113696]  </TASK>
[   18.113725] 
[   18.123753] Allocated by task 286:
[   18.124066]  kasan_save_stack+0x45/0x70
[   18.124432]  kasan_save_track+0x18/0x40
[   18.124702]  kasan_save_alloc_info+0x3b/0x50
[   18.124916]  __kasan_kmalloc+0xb7/0xc0
[   18.125315]  __kmalloc_cache_noprof+0x189/0x420
[   18.125695]  kasan_atomics+0x95/0x310
[   18.125937]  kunit_try_run_case+0x1a5/0x480
[   18.126268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.126611]  kthread+0x337/0x6f0
[   18.126822]  ret_from_fork+0x41/0x80
[   18.127109]  ret_from_fork_asm+0x1a/0x30
[   18.127377] 
[   18.127523] The buggy address belongs to the object at ffff888102b21f80
[   18.127523]  which belongs to the cache kmalloc-64 of size 64
[   18.128102] The buggy address is located 0 bytes to the right of
[   18.128102]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.129062] 
[   18.129191] The buggy address belongs to the physical page:
[   18.129443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.129759] flags: 0x200000000000000(node=0|zone=2)
[   18.129995] page_type: f5(slab)
[   18.130191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.130667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.131569] page dumped because: kasan: bad access detected
[   18.132018] 
[   18.132212] Memory state around the buggy address:
[   18.132632]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.133219]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.133780] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.134316]                                      ^
[   18.134560]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.134837]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.135396] ==================================================================
[   18.789362] ==================================================================
[   18.789746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   18.790287] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.790799] 
[   18.790983] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.791076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.791104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.791150] Call Trace:
[   18.791195]  <TASK>
[   18.791244]  dump_stack_lvl+0x73/0xb0
[   18.791306]  print_report+0xd1/0x650
[   18.791374]  ? __virt_addr_valid+0x1db/0x2d0
[   18.791429]  ? kasan_atomics_helper+0x164f/0x5450
[   18.791837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.791877]  ? kasan_atomics_helper+0x164f/0x5450
[   18.791906]  kasan_report+0x141/0x180
[   18.791934]  ? kasan_atomics_helper+0x164f/0x5450
[   18.791966]  kasan_check_range+0x10c/0x1c0
[   18.791991]  __kasan_check_write+0x18/0x20
[   18.792014]  kasan_atomics_helper+0x164f/0x5450
[   18.792043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.792107]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.792141]  ? kasan_atomics+0x152/0x310
[   18.792170]  kasan_atomics+0x1dc/0x310
[   18.792193]  ? __pfx_kasan_atomics+0x10/0x10
[   18.792219]  ? __pfx_read_tsc+0x10/0x10
[   18.792244]  ? ktime_get_ts64+0x86/0x230
[   18.792275]  kunit_try_run_case+0x1a5/0x480
[   18.792305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.792351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.792384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.792412]  ? __kthread_parkme+0x82/0x180
[   18.792440]  ? preempt_count_sub+0x50/0x80
[   18.792470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.792498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.792528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.792557]  kthread+0x337/0x6f0
[   18.792578]  ? trace_preempt_on+0x20/0xc0
[   18.792607]  ? __pfx_kthread+0x10/0x10
[   18.792629]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.792655]  ? calculate_sigpending+0x7b/0xa0
[   18.792682]  ? __pfx_kthread+0x10/0x10
[   18.792705]  ret_from_fork+0x41/0x80
[   18.792729]  ? __pfx_kthread+0x10/0x10
[   18.792752]  ret_from_fork_asm+0x1a/0x30
[   18.792789]  </TASK>
[   18.792804] 
[   18.803470] Allocated by task 286:
[   18.803697]  kasan_save_stack+0x45/0x70
[   18.803929]  kasan_save_track+0x18/0x40
[   18.804119]  kasan_save_alloc_info+0x3b/0x50
[   18.804501]  __kasan_kmalloc+0xb7/0xc0
[   18.804848]  __kmalloc_cache_noprof+0x189/0x420
[   18.805263]  kasan_atomics+0x95/0x310
[   18.805628]  kunit_try_run_case+0x1a5/0x480
[   18.806144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.806608]  kthread+0x337/0x6f0
[   18.806925]  ret_from_fork+0x41/0x80
[   18.807254]  ret_from_fork_asm+0x1a/0x30
[   18.807518] 
[   18.807702] The buggy address belongs to the object at ffff888102b21f80
[   18.807702]  which belongs to the cache kmalloc-64 of size 64
[   18.808350] The buggy address is located 0 bytes to the right of
[   18.808350]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.809043] 
[   18.809245] The buggy address belongs to the physical page:
[   18.809894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.810285] flags: 0x200000000000000(node=0|zone=2)
[   18.810541] page_type: f5(slab)
[   18.810854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.811596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.812007] page dumped because: kasan: bad access detected
[   18.812513] 
[   18.812632] Memory state around the buggy address:
[   18.812845]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.813138]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.813749] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.814420]                                      ^
[   18.814712]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.815192]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.815508] ==================================================================
[   18.626475] ==================================================================
[   18.627203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   18.627735] Read of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.628428] 
[   18.628712] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.628825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.628857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.628941] Call Trace:
[   18.628990]  <TASK>
[   18.629066]  dump_stack_lvl+0x73/0xb0
[   18.629150]  print_report+0xd1/0x650
[   18.629182]  ? __virt_addr_valid+0x1db/0x2d0
[   18.629212]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.629238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.629266]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.629293]  kasan_report+0x141/0x180
[   18.629320]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.629373]  __asan_report_load8_noabort+0x18/0x20
[   18.629401]  kasan_atomics_helper+0x4eae/0x5450
[   18.629430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.629458]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.629486]  ? kasan_atomics+0x152/0x310
[   18.629515]  kasan_atomics+0x1dc/0x310
[   18.629538]  ? __pfx_kasan_atomics+0x10/0x10
[   18.629565]  ? __pfx_read_tsc+0x10/0x10
[   18.629590]  ? ktime_get_ts64+0x86/0x230
[   18.629621]  kunit_try_run_case+0x1a5/0x480
[   18.629653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.629678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.629707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.629735]  ? __kthread_parkme+0x82/0x180
[   18.629762]  ? preempt_count_sub+0x50/0x80
[   18.629791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.629819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.629847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.629875]  kthread+0x337/0x6f0
[   18.629895]  ? trace_preempt_on+0x20/0xc0
[   18.629922]  ? __pfx_kthread+0x10/0x10
[   18.629943]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.629969]  ? calculate_sigpending+0x7b/0xa0
[   18.629995]  ? __pfx_kthread+0x10/0x10
[   18.630018]  ret_from_fork+0x41/0x80
[   18.630043]  ? __pfx_kthread+0x10/0x10
[   18.630073]  ret_from_fork_asm+0x1a/0x30
[   18.630115]  </TASK>
[   18.630130] 
[   18.642886] Allocated by task 286:
[   18.643776]  kasan_save_stack+0x45/0x70
[   18.644358]  kasan_save_track+0x18/0x40
[   18.644559]  kasan_save_alloc_info+0x3b/0x50
[   18.644832]  __kasan_kmalloc+0xb7/0xc0
[   18.645247]  __kmalloc_cache_noprof+0x189/0x420
[   18.645488]  kasan_atomics+0x95/0x310
[   18.645815]  kunit_try_run_case+0x1a5/0x480
[   18.646582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.646862]  kthread+0x337/0x6f0
[   18.647155]  ret_from_fork+0x41/0x80
[   18.647399]  ret_from_fork_asm+0x1a/0x30
[   18.648061] 
[   18.648181] The buggy address belongs to the object at ffff888102b21f80
[   18.648181]  which belongs to the cache kmalloc-64 of size 64
[   18.649518] The buggy address is located 0 bytes to the right of
[   18.649518]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.650267] 
[   18.650491] The buggy address belongs to the physical page:
[   18.650941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.651394] flags: 0x200000000000000(node=0|zone=2)
[   18.651938] page_type: f5(slab)
[   18.652267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.653009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.653467] page dumped because: kasan: bad access detected
[   18.653759] 
[   18.653948] Memory state around the buggy address:
[   18.654309]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.654641]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.654975] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.655932]                                      ^
[   18.656294]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.656793]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.657298] ==================================================================
[   18.562577] ==================================================================
[   18.563437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   18.564229] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.565243] 
[   18.565529] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.565645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.565679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.565732] Call Trace:
[   18.565783]  <TASK>
[   18.565833]  dump_stack_lvl+0x73/0xb0
[   18.565906]  print_report+0xd1/0x650
[   18.565967]  ? __virt_addr_valid+0x1db/0x2d0
[   18.566026]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.566102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.566151]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.566204]  kasan_report+0x141/0x180
[   18.566266]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.566366]  __asan_report_load4_noabort+0x18/0x20
[   18.566428]  kasan_atomics_helper+0x49ce/0x5450
[   18.566491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.566545]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.566601]  ? kasan_atomics+0x152/0x310
[   18.566662]  kasan_atomics+0x1dc/0x310
[   18.566712]  ? __pfx_kasan_atomics+0x10/0x10
[   18.566768]  ? __pfx_read_tsc+0x10/0x10
[   18.566820]  ? ktime_get_ts64+0x86/0x230
[   18.566882]  kunit_try_run_case+0x1a5/0x480
[   18.566940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.566996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.567052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.567100]  ? __kthread_parkme+0x82/0x180
[   18.567144]  ? preempt_count_sub+0x50/0x80
[   18.567197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.567251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.567311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.567386]  kthread+0x337/0x6f0
[   18.567431]  ? trace_preempt_on+0x20/0xc0
[   18.567489]  ? __pfx_kthread+0x10/0x10
[   18.567536]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.567590]  ? calculate_sigpending+0x7b/0xa0
[   18.567643]  ? __pfx_kthread+0x10/0x10
[   18.567692]  ret_from_fork+0x41/0x80
[   18.567744]  ? __pfx_kthread+0x10/0x10
[   18.567791]  ret_from_fork_asm+0x1a/0x30
[   18.567868]  </TASK>
[   18.567897] 
[   18.578274] Allocated by task 286:
[   18.578669]  kasan_save_stack+0x45/0x70
[   18.579051]  kasan_save_track+0x18/0x40
[   18.579422]  kasan_save_alloc_info+0x3b/0x50
[   18.579802]  __kasan_kmalloc+0xb7/0xc0
[   18.582452]  __kmalloc_cache_noprof+0x189/0x420
[   18.582823]  kasan_atomics+0x95/0x310
[   18.583141]  kunit_try_run_case+0x1a5/0x480
[   18.583428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.584560]  kthread+0x337/0x6f0
[   18.584779]  ret_from_fork+0x41/0x80
[   18.584973]  ret_from_fork_asm+0x1a/0x30
[   18.585196] 
[   18.585328] The buggy address belongs to the object at ffff888102b21f80
[   18.585328]  which belongs to the cache kmalloc-64 of size 64
[   18.585886] The buggy address is located 0 bytes to the right of
[   18.585886]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.586901] 
[   18.587191] The buggy address belongs to the physical page:
[   18.587764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.588456] flags: 0x200000000000000(node=0|zone=2)
[   18.588754] page_type: f5(slab)
[   18.589146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.589558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.590092] page dumped because: kasan: bad access detected
[   18.590544] 
[   18.590733] Memory state around the buggy address:
[   18.590991]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.591455]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.592018] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.592525]                                      ^
[   18.592877]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.593392]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.593863] ==================================================================
[   19.031607] ==================================================================
[   19.032328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   19.032821] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.033285] 
[   19.033548] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.033691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.033734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.033784] Call Trace:
[   19.033850]  <TASK>
[   19.033896]  dump_stack_lvl+0x73/0xb0
[   19.033971]  print_report+0xd1/0x650
[   19.034032]  ? __virt_addr_valid+0x1db/0x2d0
[   19.034125]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.034172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.034220]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.034272]  kasan_report+0x141/0x180
[   19.034325]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.034416]  kasan_check_range+0x10c/0x1c0
[   19.034487]  __kasan_check_write+0x18/0x20
[   19.034533]  kasan_atomics_helper+0x1b22/0x5450
[   19.034591]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.034657]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.034731]  ? kasan_atomics+0x152/0x310
[   19.034786]  kasan_atomics+0x1dc/0x310
[   19.034834]  ? __pfx_kasan_atomics+0x10/0x10
[   19.034895]  ? __pfx_read_tsc+0x10/0x10
[   19.034964]  ? ktime_get_ts64+0x86/0x230
[   19.035025]  kunit_try_run_case+0x1a5/0x480
[   19.035111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.035166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.035226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.035283]  ? __kthread_parkme+0x82/0x180
[   19.035331]  ? preempt_count_sub+0x50/0x80
[   19.035424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.035496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.035559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.035620]  kthread+0x337/0x6f0
[   19.035665]  ? trace_preempt_on+0x20/0xc0
[   19.035711]  ? __pfx_kthread+0x10/0x10
[   19.035734]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.035761]  ? calculate_sigpending+0x7b/0xa0
[   19.035789]  ? __pfx_kthread+0x10/0x10
[   19.035811]  ret_from_fork+0x41/0x80
[   19.035837]  ? __pfx_kthread+0x10/0x10
[   19.035858]  ret_from_fork_asm+0x1a/0x30
[   19.035896]  </TASK>
[   19.035912] 
[   19.049154] Allocated by task 286:
[   19.049356]  kasan_save_stack+0x45/0x70
[   19.049644]  kasan_save_track+0x18/0x40
[   19.049915]  kasan_save_alloc_info+0x3b/0x50
[   19.050231]  __kasan_kmalloc+0xb7/0xc0
[   19.050681]  __kmalloc_cache_noprof+0x189/0x420
[   19.050920]  kasan_atomics+0x95/0x310
[   19.051223]  kunit_try_run_case+0x1a5/0x480
[   19.051662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.052145]  kthread+0x337/0x6f0
[   19.052406]  ret_from_fork+0x41/0x80
[   19.052615]  ret_from_fork_asm+0x1a/0x30
[   19.052835] 
[   19.052959] The buggy address belongs to the object at ffff888102b21f80
[   19.052959]  which belongs to the cache kmalloc-64 of size 64
[   19.054564] The buggy address is located 0 bytes to the right of
[   19.054564]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.055113] 
[   19.055231] The buggy address belongs to the physical page:
[   19.055443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.055701] flags: 0x200000000000000(node=0|zone=2)
[   19.057191] page_type: f5(slab)
[   19.057561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.058502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.058978] page dumped because: kasan: bad access detected
[   19.059193] 
[   19.059703] Memory state around the buggy address:
[   19.060158]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.060822]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.061599] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.061887]                                      ^
[   19.062110]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.062492]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.062716] ==================================================================
[   19.226267] ==================================================================
[   19.226717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   19.227019] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.227792] 
[   19.228056] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.228386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.228429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.228483] Call Trace:
[   19.228533]  <TASK>
[   19.228581]  dump_stack_lvl+0x73/0xb0
[   19.228658]  print_report+0xd1/0x650
[   19.228717]  ? __virt_addr_valid+0x1db/0x2d0
[   19.228766]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.228813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.228868]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.228918]  kasan_report+0x141/0x180
[   19.228962]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.229053]  kasan_check_range+0x10c/0x1c0
[   19.229143]  __kasan_check_write+0x18/0x20
[   19.229185]  kasan_atomics_helper+0x1eaa/0x5450
[   19.229231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.229273]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.229315]  ? kasan_atomics+0x152/0x310
[   19.229377]  kasan_atomics+0x1dc/0x310
[   19.229416]  ? __pfx_kasan_atomics+0x10/0x10
[   19.229457]  ? __pfx_read_tsc+0x10/0x10
[   19.229494]  ? ktime_get_ts64+0x86/0x230
[   19.229544]  kunit_try_run_case+0x1a5/0x480
[   19.229595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.229638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.229687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.229733]  ? __kthread_parkme+0x82/0x180
[   19.229778]  ? preempt_count_sub+0x50/0x80
[   19.229835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.229895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.229936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.229976]  kthread+0x337/0x6f0
[   19.230004]  ? trace_preempt_on+0x20/0xc0
[   19.230042]  ? __pfx_kthread+0x10/0x10
[   19.230105]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.230136]  ? calculate_sigpending+0x7b/0xa0
[   19.230164]  ? __pfx_kthread+0x10/0x10
[   19.230186]  ret_from_fork+0x41/0x80
[   19.230212]  ? __pfx_kthread+0x10/0x10
[   19.230235]  ret_from_fork_asm+0x1a/0x30
[   19.230272]  </TASK>
[   19.230287] 
[   19.242055] Allocated by task 286:
[   19.242312]  kasan_save_stack+0x45/0x70
[   19.242545]  kasan_save_track+0x18/0x40
[   19.242944]  kasan_save_alloc_info+0x3b/0x50
[   19.243222]  __kasan_kmalloc+0xb7/0xc0
[   19.243454]  __kmalloc_cache_noprof+0x189/0x420
[   19.243804]  kasan_atomics+0x95/0x310
[   19.244168]  kunit_try_run_case+0x1a5/0x480
[   19.244521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.244929]  kthread+0x337/0x6f0
[   19.245317]  ret_from_fork+0x41/0x80
[   19.245520]  ret_from_fork_asm+0x1a/0x30
[   19.245700] 
[   19.245806] The buggy address belongs to the object at ffff888102b21f80
[   19.245806]  which belongs to the cache kmalloc-64 of size 64
[   19.246212] The buggy address is located 0 bytes to the right of
[   19.246212]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.246698] 
[   19.246829] The buggy address belongs to the physical page:
[   19.247096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.247513] flags: 0x200000000000000(node=0|zone=2)
[   19.247696] page_type: f5(slab)
[   19.247941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.249685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.251639] page dumped because: kasan: bad access detected
[   19.252066] 
[   19.252178] Memory state around the buggy address:
[   19.252376]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.252624]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.252863] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.253114]                                      ^
[   19.253304]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.253992]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.254598] ==================================================================
[   18.507064] ==================================================================
[   18.507463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   18.507789] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.508389] 
[   18.508630] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.508742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.508773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.508825] Call Trace:
[   18.508875]  <TASK>
[   18.508923]  dump_stack_lvl+0x73/0xb0
[   18.508994]  print_report+0xd1/0x650
[   18.509094]  ? __virt_addr_valid+0x1db/0x2d0
[   18.509139]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.509179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.509218]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.509256]  kasan_report+0x141/0x180
[   18.509293]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.509353]  __asan_report_load4_noabort+0x18/0x20
[   18.509395]  kasan_atomics_helper+0x49e8/0x5450
[   18.509434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.509472]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.509510]  ? kasan_atomics+0x152/0x310
[   18.509557]  kasan_atomics+0x1dc/0x310
[   18.509599]  ? __pfx_kasan_atomics+0x10/0x10
[   18.509637]  ? __pfx_read_tsc+0x10/0x10
[   18.509676]  ? ktime_get_ts64+0x86/0x230
[   18.509732]  kunit_try_run_case+0x1a5/0x480
[   18.509789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.509847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.509916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.509970]  ? __kthread_parkme+0x82/0x180
[   18.510023]  ? preempt_count_sub+0x50/0x80
[   18.510076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.510126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.510184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.510249]  kthread+0x337/0x6f0
[   18.510309]  ? trace_preempt_on+0x20/0xc0
[   18.510379]  ? __pfx_kthread+0x10/0x10
[   18.510424]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.510475]  ? calculate_sigpending+0x7b/0xa0
[   18.510530]  ? __pfx_kthread+0x10/0x10
[   18.510576]  ret_from_fork+0x41/0x80
[   18.510630]  ? __pfx_kthread+0x10/0x10
[   18.510677]  ret_from_fork_asm+0x1a/0x30
[   18.510754]  </TASK>
[   18.510783] 
[   18.521277] Allocated by task 286:
[   18.521671]  kasan_save_stack+0x45/0x70
[   18.522071]  kasan_save_track+0x18/0x40
[   18.522382]  kasan_save_alloc_info+0x3b/0x50
[   18.522566]  __kasan_kmalloc+0xb7/0xc0
[   18.522929]  __kmalloc_cache_noprof+0x189/0x420
[   18.523398]  kasan_atomics+0x95/0x310
[   18.523658]  kunit_try_run_case+0x1a5/0x480
[   18.523973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.524537]  kthread+0x337/0x6f0
[   18.524712]  ret_from_fork+0x41/0x80
[   18.524894]  ret_from_fork_asm+0x1a/0x30
[   18.525104] 
[   18.525228] The buggy address belongs to the object at ffff888102b21f80
[   18.525228]  which belongs to the cache kmalloc-64 of size 64
[   18.526238] The buggy address is located 0 bytes to the right of
[   18.526238]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.527533] 
[   18.527657] The buggy address belongs to the physical page:
[   18.528011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.528492] flags: 0x200000000000000(node=0|zone=2)
[   18.528905] page_type: f5(slab)
[   18.529112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.529426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.529717] page dumped because: kasan: bad access detected
[   18.529946] 
[   18.530068] Memory state around the buggy address:
[   18.530281]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.530860]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.531530] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.532093]                                      ^
[   18.532523]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.533290]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.533884] ==================================================================
[   17.659528] ==================================================================
[   17.659945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   17.660665] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.661605] 
[   17.661858] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.661988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.662018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.662064] Call Trace:
[   17.662111]  <TASK>
[   17.662182]  dump_stack_lvl+0x73/0xb0
[   17.662274]  print_report+0xd1/0x650
[   17.662318]  ? __virt_addr_valid+0x1db/0x2d0
[   17.662372]  ? kasan_atomics_helper+0x3df/0x5450
[   17.662400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.662429]  ? kasan_atomics_helper+0x3df/0x5450
[   17.662467]  kasan_report+0x141/0x180
[   17.662502]  ? kasan_atomics_helper+0x3df/0x5450
[   17.662535]  kasan_check_range+0x10c/0x1c0
[   17.662560]  __kasan_check_read+0x15/0x20
[   17.662583]  kasan_atomics_helper+0x3df/0x5450
[   17.662611]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.662638]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.662666]  ? kasan_atomics+0x152/0x310
[   17.662694]  kasan_atomics+0x1dc/0x310
[   17.662717]  ? __pfx_kasan_atomics+0x10/0x10
[   17.662742]  ? __pfx_read_tsc+0x10/0x10
[   17.662767]  ? ktime_get_ts64+0x86/0x230
[   17.662797]  kunit_try_run_case+0x1a5/0x480
[   17.662827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.662852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.662881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.662909]  ? __kthread_parkme+0x82/0x180
[   17.662936]  ? preempt_count_sub+0x50/0x80
[   17.662965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.662994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.663022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.663052]  kthread+0x337/0x6f0
[   17.663095]  ? trace_preempt_on+0x20/0xc0
[   17.663123]  ? __pfx_kthread+0x10/0x10
[   17.663145]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.663171]  ? calculate_sigpending+0x7b/0xa0
[   17.663197]  ? __pfx_kthread+0x10/0x10
[   17.663220]  ret_from_fork+0x41/0x80
[   17.663244]  ? __pfx_kthread+0x10/0x10
[   17.663265]  ret_from_fork_asm+0x1a/0x30
[   17.663300]  </TASK>
[   17.663315] 
[   17.674862] Allocated by task 286:
[   17.675264]  kasan_save_stack+0x45/0x70
[   17.675693]  kasan_save_track+0x18/0x40
[   17.676092]  kasan_save_alloc_info+0x3b/0x50
[   17.676509]  __kasan_kmalloc+0xb7/0xc0
[   17.676866]  __kmalloc_cache_noprof+0x189/0x420
[   17.677421]  kasan_atomics+0x95/0x310
[   17.677828]  kunit_try_run_case+0x1a5/0x480
[   17.678282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.678792]  kthread+0x337/0x6f0
[   17.679164]  ret_from_fork+0x41/0x80
[   17.679547]  ret_from_fork_asm+0x1a/0x30
[   17.679937] 
[   17.680190] The buggy address belongs to the object at ffff888102b21f80
[   17.680190]  which belongs to the cache kmalloc-64 of size 64
[   17.681101] The buggy address is located 0 bytes to the right of
[   17.681101]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.681807] 
[   17.682050] The buggy address belongs to the physical page:
[   17.682623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.683179] flags: 0x200000000000000(node=0|zone=2)
[   17.683506] page_type: f5(slab)
[   17.683884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.684685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.685100] page dumped because: kasan: bad access detected
[   17.685537] 
[   17.685730] Memory state around the buggy address:
[   17.686106]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.686617]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.686935] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.687199]                                      ^
[   17.687592]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.688204]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.688925] ==================================================================
[   17.937733] ==================================================================
[   17.938494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   17.938822] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.939458] 
[   17.939628] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.939738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.939770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.939822] Call Trace:
[   17.939873]  <TASK>
[   17.939924]  dump_stack_lvl+0x73/0xb0
[   17.939992]  print_report+0xd1/0x650
[   17.940052]  ? __virt_addr_valid+0x1db/0x2d0
[   17.940103]  ? kasan_atomics_helper+0x860/0x5450
[   17.940155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.940209]  ? kasan_atomics_helper+0x860/0x5450
[   17.940269]  kasan_report+0x141/0x180
[   17.940324]  ? kasan_atomics_helper+0x860/0x5450
[   17.940411]  kasan_check_range+0x10c/0x1c0
[   17.940463]  __kasan_check_write+0x18/0x20
[   17.940505]  kasan_atomics_helper+0x860/0x5450
[   17.940554]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.940609]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.940666]  ? kasan_atomics+0x152/0x310
[   17.940724]  kasan_atomics+0x1dc/0x310
[   17.940775]  ? __pfx_kasan_atomics+0x10/0x10
[   17.940831]  ? __pfx_read_tsc+0x10/0x10
[   17.940883]  ? ktime_get_ts64+0x86/0x230
[   17.940945]  kunit_try_run_case+0x1a5/0x480
[   17.941009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.941091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.941147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.941200]  ? __kthread_parkme+0x82/0x180
[   17.941250]  ? preempt_count_sub+0x50/0x80
[   17.941365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.941423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.941487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.941545]  kthread+0x337/0x6f0
[   17.941584]  ? trace_preempt_on+0x20/0xc0
[   17.941630]  ? __pfx_kthread+0x10/0x10
[   17.941670]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.941722]  ? calculate_sigpending+0x7b/0xa0
[   17.941773]  ? __pfx_kthread+0x10/0x10
[   17.941823]  ret_from_fork+0x41/0x80
[   17.941874]  ? __pfx_kthread+0x10/0x10
[   17.941922]  ret_from_fork_asm+0x1a/0x30
[   17.941999]  </TASK>
[   17.942031] 
[   17.952330] Allocated by task 286:
[   17.952564]  kasan_save_stack+0x45/0x70
[   17.952797]  kasan_save_track+0x18/0x40
[   17.952995]  kasan_save_alloc_info+0x3b/0x50
[   17.953373]  __kasan_kmalloc+0xb7/0xc0
[   17.953693]  __kmalloc_cache_noprof+0x189/0x420
[   17.954027]  kasan_atomics+0x95/0x310
[   17.954331]  kunit_try_run_case+0x1a5/0x480
[   17.954683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.955105]  kthread+0x337/0x6f0
[   17.955418]  ret_from_fork+0x41/0x80
[   17.955743]  ret_from_fork_asm+0x1a/0x30
[   17.955961] 
[   17.956129] The buggy address belongs to the object at ffff888102b21f80
[   17.956129]  which belongs to the cache kmalloc-64 of size 64
[   17.956734] The buggy address is located 0 bytes to the right of
[   17.956734]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   17.957421] 
[   17.957623] The buggy address belongs to the physical page:
[   17.958094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   17.958505] flags: 0x200000000000000(node=0|zone=2)
[   17.958740] page_type: f5(slab)
[   17.958935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.959221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.959514] page dumped because: kasan: bad access detected
[   17.959738] 
[   17.959849] Memory state around the buggy address:
[   17.960062]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.960367]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.960890] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.961486]                                      ^
[   17.961908]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.962486]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.963227] ==================================================================
[   18.020881] ==================================================================
[   18.021959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   18.022621] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.023088] 
[   18.023316] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.023453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.023483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.023535] Call Trace:
[   18.023582]  <TASK>
[   18.023629]  dump_stack_lvl+0x73/0xb0
[   18.023696]  print_report+0xd1/0x650
[   18.023735]  ? __virt_addr_valid+0x1db/0x2d0
[   18.023773]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.023817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.023870]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.023925]  kasan_report+0x141/0x180
[   18.023980]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.024047]  kasan_check_range+0x10c/0x1c0
[   18.024108]  __kasan_check_write+0x18/0x20
[   18.024155]  kasan_atomics_helper+0xa2b/0x5450
[   18.024198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.024248]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.024302]  ? kasan_atomics+0x152/0x310
[   18.024369]  kasan_atomics+0x1dc/0x310
[   18.024417]  ? __pfx_kasan_atomics+0x10/0x10
[   18.024464]  ? __pfx_read_tsc+0x10/0x10
[   18.024512]  ? ktime_get_ts64+0x86/0x230
[   18.024573]  kunit_try_run_case+0x1a5/0x480
[   18.024634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.024692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.024754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.024814]  ? __kthread_parkme+0x82/0x180
[   18.024872]  ? preempt_count_sub+0x50/0x80
[   18.024936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.024999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.025077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.025130]  kthread+0x337/0x6f0
[   18.025172]  ? trace_preempt_on+0x20/0xc0
[   18.025226]  ? __pfx_kthread+0x10/0x10
[   18.025274]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.025331]  ? calculate_sigpending+0x7b/0xa0
[   18.025407]  ? __pfx_kthread+0x10/0x10
[   18.025459]  ret_from_fork+0x41/0x80
[   18.025513]  ? __pfx_kthread+0x10/0x10
[   18.025564]  ret_from_fork_asm+0x1a/0x30
[   18.025643]  </TASK>
[   18.025674] 
[   18.035607] Allocated by task 286:
[   18.035807]  kasan_save_stack+0x45/0x70
[   18.036030]  kasan_save_track+0x18/0x40
[   18.036360]  kasan_save_alloc_info+0x3b/0x50
[   18.036731]  __kasan_kmalloc+0xb7/0xc0
[   18.037054]  __kmalloc_cache_noprof+0x189/0x420
[   18.037451]  kasan_atomics+0x95/0x310
[   18.037786]  kunit_try_run_case+0x1a5/0x480
[   18.038174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.038628]  kthread+0x337/0x6f0
[   18.038918]  ret_from_fork+0x41/0x80
[   18.039190]  ret_from_fork_asm+0x1a/0x30
[   18.039443] 
[   18.039570] The buggy address belongs to the object at ffff888102b21f80
[   18.039570]  which belongs to the cache kmalloc-64 of size 64
[   18.039994] The buggy address is located 0 bytes to the right of
[   18.039994]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.040942] 
[   18.041148] The buggy address belongs to the physical page:
[   18.041657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.042145] flags: 0x200000000000000(node=0|zone=2)
[   18.042384] page_type: f5(slab)
[   18.042658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.042949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.043230] page dumped because: kasan: bad access detected
[   18.043605] 
[   18.043784] Memory state around the buggy address:
[   18.044328]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.044883]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.045561] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.045902]                                      ^
[   18.046314]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.046664]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.047048] ==================================================================
[   19.504784] ==================================================================
[   19.505720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   19.506331] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.506900] 
[   19.507148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.507275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.507310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.507370] Call Trace:
[   19.507418]  <TASK>
[   19.507465]  dump_stack_lvl+0x73/0xb0
[   19.507560]  print_report+0xd1/0x650
[   19.507616]  ? __virt_addr_valid+0x1db/0x2d0
[   19.507668]  ? kasan_atomics_helper+0x224c/0x5450
[   19.507720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.507785]  ? kasan_atomics_helper+0x224c/0x5450
[   19.507856]  kasan_report+0x141/0x180
[   19.507904]  ? kasan_atomics_helper+0x224c/0x5450
[   19.507971]  kasan_check_range+0x10c/0x1c0
[   19.508030]  __kasan_check_write+0x18/0x20
[   19.508105]  kasan_atomics_helper+0x224c/0x5450
[   19.508164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.508215]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.508268]  ? kasan_atomics+0x152/0x310
[   19.508325]  kasan_atomics+0x1dc/0x310
[   19.508399]  ? __pfx_kasan_atomics+0x10/0x10
[   19.508453]  ? __pfx_read_tsc+0x10/0x10
[   19.508497]  ? ktime_get_ts64+0x86/0x230
[   19.508536]  kunit_try_run_case+0x1a5/0x480
[   19.508567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.508593]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.508624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.508652]  ? __kthread_parkme+0x82/0x180
[   19.508680]  ? preempt_count_sub+0x50/0x80
[   19.508709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.508738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.508766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.508795]  kthread+0x337/0x6f0
[   19.508816]  ? trace_preempt_on+0x20/0xc0
[   19.508845]  ? __pfx_kthread+0x10/0x10
[   19.508868]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.508895]  ? calculate_sigpending+0x7b/0xa0
[   19.508922]  ? __pfx_kthread+0x10/0x10
[   19.508945]  ret_from_fork+0x41/0x80
[   19.508970]  ? __pfx_kthread+0x10/0x10
[   19.508992]  ret_from_fork_asm+0x1a/0x30
[   19.509043]  </TASK>
[   19.509067] 
[   19.522651] Allocated by task 286:
[   19.522847]  kasan_save_stack+0x45/0x70
[   19.523042]  kasan_save_track+0x18/0x40
[   19.523457]  kasan_save_alloc_info+0x3b/0x50
[   19.523845]  __kasan_kmalloc+0xb7/0xc0
[   19.524237]  __kmalloc_cache_noprof+0x189/0x420
[   19.524795]  kasan_atomics+0x95/0x310
[   19.525201]  kunit_try_run_case+0x1a5/0x480
[   19.525618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.526153]  kthread+0x337/0x6f0
[   19.526622]  ret_from_fork+0x41/0x80
[   19.527214]  ret_from_fork_asm+0x1a/0x30
[   19.527459] 
[   19.527582] The buggy address belongs to the object at ffff888102b21f80
[   19.527582]  which belongs to the cache kmalloc-64 of size 64
[   19.528420] The buggy address is located 0 bytes to the right of
[   19.528420]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.529510] 
[   19.529757] The buggy address belongs to the physical page:
[   19.530295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.530984] flags: 0x200000000000000(node=0|zone=2)
[   19.531492] page_type: f5(slab)
[   19.531826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.532300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.532889] page dumped because: kasan: bad access detected
[   19.533426] 
[   19.533609] Memory state around the buggy address:
[   19.533928]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.534651]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535019] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.535610]                                      ^
[   19.535990]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.536548]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.536781] ==================================================================
[   18.724318] ==================================================================
[   18.724833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   18.725803] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.726360] 
[   18.726545] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.726657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.726688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.726739] Call Trace:
[   18.726789]  <TASK>
[   18.726841]  dump_stack_lvl+0x73/0xb0
[   18.726914]  print_report+0xd1/0x650
[   18.726973]  ? __virt_addr_valid+0x1db/0x2d0
[   18.727034]  ? kasan_atomics_helper+0x151d/0x5450
[   18.727123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.727186]  ? kasan_atomics_helper+0x151d/0x5450
[   18.727244]  kasan_report+0x141/0x180
[   18.727294]  ? kasan_atomics_helper+0x151d/0x5450
[   18.727371]  kasan_check_range+0x10c/0x1c0
[   18.727464]  __kasan_check_write+0x18/0x20
[   18.727529]  kasan_atomics_helper+0x151d/0x5450
[   18.727587]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.727644]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.727700]  ? kasan_atomics+0x152/0x310
[   18.727786]  kasan_atomics+0x1dc/0x310
[   18.727854]  ? __pfx_kasan_atomics+0x10/0x10
[   18.727901]  ? __pfx_read_tsc+0x10/0x10
[   18.727951]  ? ktime_get_ts64+0x86/0x230
[   18.728014]  kunit_try_run_case+0x1a5/0x480
[   18.728106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.728163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.728214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.728245]  ? __kthread_parkme+0x82/0x180
[   18.728275]  ? preempt_count_sub+0x50/0x80
[   18.728305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.728353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.728395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.728425]  kthread+0x337/0x6f0
[   18.728447]  ? trace_preempt_on+0x20/0xc0
[   18.728476]  ? __pfx_kthread+0x10/0x10
[   18.728499]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.728527]  ? calculate_sigpending+0x7b/0xa0
[   18.728554]  ? __pfx_kthread+0x10/0x10
[   18.728577]  ret_from_fork+0x41/0x80
[   18.728603]  ? __pfx_kthread+0x10/0x10
[   18.728626]  ret_from_fork_asm+0x1a/0x30
[   18.728663]  </TASK>
[   18.728678] 
[   18.739997] Allocated by task 286:
[   18.740255]  kasan_save_stack+0x45/0x70
[   18.740650]  kasan_save_track+0x18/0x40
[   18.741112]  kasan_save_alloc_info+0x3b/0x50
[   18.741446]  __kasan_kmalloc+0xb7/0xc0
[   18.741845]  __kmalloc_cache_noprof+0x189/0x420
[   18.742347]  kasan_atomics+0x95/0x310
[   18.742747]  kunit_try_run_case+0x1a5/0x480
[   18.743239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.743762]  kthread+0x337/0x6f0
[   18.744183]  ret_from_fork+0x41/0x80
[   18.744519]  ret_from_fork_asm+0x1a/0x30
[   18.744846] 
[   18.745113] The buggy address belongs to the object at ffff888102b21f80
[   18.745113]  which belongs to the cache kmalloc-64 of size 64
[   18.745792] The buggy address is located 0 bytes to the right of
[   18.745792]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.746522] 
[   18.746660] The buggy address belongs to the physical page:
[   18.746893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.747576] flags: 0x200000000000000(node=0|zone=2)
[   18.747994] page_type: f5(slab)
[   18.748449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.748990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.749594] page dumped because: kasan: bad access detected
[   18.749880] 
[   18.750119] Memory state around the buggy address:
[   18.750553]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.750840]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.751196] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.751599]                                      ^
[   18.752046]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.752659]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.753321] ==================================================================
[   17.992801] ==================================================================
[   17.993170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   17.994664] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   17.995276] 
[   17.995555] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.995668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.995758] Call Trace:
[   17.995812]  <TASK>
[   17.995860]  dump_stack_lvl+0x73/0xb0
[   17.995936]  print_report+0xd1/0x650
[   17.995997]  ? __virt_addr_valid+0x1db/0x2d0
[   17.996057]  ? kasan_atomics_helper+0x992/0x5450
[   17.996104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.996155]  ? kasan_atomics_helper+0x992/0x5450
[   17.996204]  kasan_report+0x141/0x180
[   17.996250]  ? kasan_atomics_helper+0x992/0x5450
[   17.996306]  kasan_check_range+0x10c/0x1c0
[   17.996371]  __kasan_check_write+0x18/0x20
[   17.996417]  kasan_atomics_helper+0x992/0x5450
[   17.996467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.996517]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.996572]  ? kasan_atomics+0x152/0x310
[   17.996620]  kasan_atomics+0x1dc/0x310
[   17.996663]  ? __pfx_kasan_atomics+0x10/0x10
[   17.996714]  ? __pfx_read_tsc+0x10/0x10
[   17.996760]  ? ktime_get_ts64+0x86/0x230
[   17.996820]  kunit_try_run_case+0x1a5/0x480
[   17.996872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.996923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.996976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.997041]  ? __kthread_parkme+0x82/0x180
[   17.997107]  ? preempt_count_sub+0x50/0x80
[   17.997171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.997233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.997297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.997379]  kthread+0x337/0x6f0
[   17.997427]  ? trace_preempt_on+0x20/0xc0
[   17.997489]  ? __pfx_kthread+0x10/0x10
[   17.997540]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.997600]  ? calculate_sigpending+0x7b/0xa0
[   17.997659]  ? __pfx_kthread+0x10/0x10
[   17.997709]  ret_from_fork+0x41/0x80
[   17.997764]  ? __pfx_kthread+0x10/0x10
[   17.997816]  ret_from_fork_asm+0x1a/0x30
[   17.997898]  </TASK>
[   17.997928] 
[   18.008715] Allocated by task 286:
[   18.009061]  kasan_save_stack+0x45/0x70
[   18.009454]  kasan_save_track+0x18/0x40
[   18.009666]  kasan_save_alloc_info+0x3b/0x50
[   18.009885]  __kasan_kmalloc+0xb7/0xc0
[   18.010096]  __kmalloc_cache_noprof+0x189/0x420
[   18.010511]  kasan_atomics+0x95/0x310
[   18.010816]  kunit_try_run_case+0x1a5/0x480
[   18.011214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.011700]  kthread+0x337/0x6f0
[   18.011872]  ret_from_fork+0x41/0x80
[   18.012219]  ret_from_fork_asm+0x1a/0x30
[   18.012559] 
[   18.012684] The buggy address belongs to the object at ffff888102b21f80
[   18.012684]  which belongs to the cache kmalloc-64 of size 64
[   18.013113] The buggy address is located 0 bytes to the right of
[   18.013113]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.014026] 
[   18.014239] The buggy address belongs to the physical page:
[   18.014569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.014968] flags: 0x200000000000000(node=0|zone=2)
[   18.015400] page_type: f5(slab)
[   18.015598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.015906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.016433] page dumped because: kasan: bad access detected
[   18.016874] 
[   18.017065] Memory state around the buggy address:
[   18.017450]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.017916]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.018440] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.018787]                                      ^
[   18.019048]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.019498]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.019772] ==================================================================
[   18.685511] ==================================================================
[   18.685837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   18.686194] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.686495] 
[   18.686723] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.686834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.686867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.686916] Call Trace:
[   18.686964]  <TASK>
[   18.687013]  dump_stack_lvl+0x73/0xb0
[   18.687113]  print_report+0xd1/0x650
[   18.687171]  ? __virt_addr_valid+0x1db/0x2d0
[   18.687230]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.687284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.687357]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.687415]  kasan_report+0x141/0x180
[   18.687471]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.687539]  __asan_report_store8_noabort+0x1b/0x30
[   18.687599]  kasan_atomics_helper+0x50d4/0x5450
[   18.687660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.687721]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.687779]  ? kasan_atomics+0x152/0x310
[   18.687837]  kasan_atomics+0x1dc/0x310
[   18.687888]  ? __pfx_kasan_atomics+0x10/0x10
[   18.687941]  ? __pfx_read_tsc+0x10/0x10
[   18.687982]  ? ktime_get_ts64+0x86/0x230
[   18.688034]  kunit_try_run_case+0x1a5/0x480
[   18.688099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.688147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.688200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.688251]  ? __kthread_parkme+0x82/0x180
[   18.688388]  ? preempt_count_sub+0x50/0x80
[   18.688441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.688486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.688534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.688578]  kthread+0x337/0x6f0
[   18.688961]  ? trace_preempt_on+0x20/0xc0
[   18.689110]  ? __pfx_kthread+0x10/0x10
[   18.689167]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.689216]  ? calculate_sigpending+0x7b/0xa0
[   18.689269]  ? __pfx_kthread+0x10/0x10
[   18.689319]  ret_from_fork+0x41/0x80
[   18.689392]  ? __pfx_kthread+0x10/0x10
[   18.689442]  ret_from_fork_asm+0x1a/0x30
[   18.689523]  </TASK>
[   18.689552] 
[   18.705831] Allocated by task 286:
[   18.706277]  kasan_save_stack+0x45/0x70
[   18.706690]  kasan_save_track+0x18/0x40
[   18.707029]  kasan_save_alloc_info+0x3b/0x50
[   18.707477]  __kasan_kmalloc+0xb7/0xc0
[   18.707805]  __kmalloc_cache_noprof+0x189/0x420
[   18.708004]  kasan_atomics+0x95/0x310
[   18.708206]  kunit_try_run_case+0x1a5/0x480
[   18.708436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.708787]  kthread+0x337/0x6f0
[   18.709008]  ret_from_fork+0x41/0x80
[   18.709246]  ret_from_fork_asm+0x1a/0x30
[   18.709465] 
[   18.709588] The buggy address belongs to the object at ffff888102b21f80
[   18.709588]  which belongs to the cache kmalloc-64 of size 64
[   18.710011] The buggy address is located 0 bytes to the right of
[   18.710011]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.710830] 
[   18.711031] The buggy address belongs to the physical page:
[   18.711395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.711987] flags: 0x200000000000000(node=0|zone=2)
[   18.712447] page_type: f5(slab)
[   18.712758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.713448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.714109] page dumped because: kasan: bad access detected
[   18.714332] 
[   18.714555] Memory state around the buggy address:
[   18.714853]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.715276]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.715783] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.716145]                                      ^
[   18.718598]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.718887]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.719166] ==================================================================
[   18.292454] ==================================================================
[   18.293137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   18.294387] Write of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.294943] 
[   18.295114] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.295222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.295255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.295306] Call Trace:
[   18.295864]  <TASK>
[   18.295917]  dump_stack_lvl+0x73/0xb0
[   18.295966]  print_report+0xd1/0x650
[   18.295996]  ? __virt_addr_valid+0x1db/0x2d0
[   18.296025]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.296050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.296100]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.296128]  kasan_report+0x141/0x180
[   18.296155]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.296186]  kasan_check_range+0x10c/0x1c0
[   18.296211]  __kasan_check_write+0x18/0x20
[   18.296235]  kasan_atomics_helper+0xfa9/0x5450
[   18.296261]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.296288]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.296318]  ? kasan_atomics+0x152/0x310
[   18.296363]  kasan_atomics+0x1dc/0x310
[   18.296389]  ? __pfx_kasan_atomics+0x10/0x10
[   18.296414]  ? __pfx_read_tsc+0x10/0x10
[   18.296438]  ? ktime_get_ts64+0x86/0x230
[   18.296468]  kunit_try_run_case+0x1a5/0x480
[   18.296498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.296523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.296553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.296581]  ? __kthread_parkme+0x82/0x180
[   18.296607]  ? preempt_count_sub+0x50/0x80
[   18.296637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.296665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.296693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.296721]  kthread+0x337/0x6f0
[   18.296741]  ? trace_preempt_on+0x20/0xc0
[   18.296769]  ? __pfx_kthread+0x10/0x10
[   18.296791]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.296817]  ? calculate_sigpending+0x7b/0xa0
[   18.296843]  ? __pfx_kthread+0x10/0x10
[   18.296865]  ret_from_fork+0x41/0x80
[   18.296889]  ? __pfx_kthread+0x10/0x10
[   18.296910]  ret_from_fork_asm+0x1a/0x30
[   18.296945]  </TASK>
[   18.296960] 
[   18.311643] Allocated by task 286:
[   18.311795]  kasan_save_stack+0x45/0x70
[   18.311927]  kasan_save_track+0x18/0x40
[   18.312022]  kasan_save_alloc_info+0x3b/0x50
[   18.312384]  __kasan_kmalloc+0xb7/0xc0
[   18.312726]  __kmalloc_cache_noprof+0x189/0x420
[   18.313383]  kasan_atomics+0x95/0x310
[   18.313642]  kunit_try_run_case+0x1a5/0x480
[   18.313906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.314202]  kthread+0x337/0x6f0
[   18.315150]  ret_from_fork+0x41/0x80
[   18.315373]  ret_from_fork_asm+0x1a/0x30
[   18.315910] 
[   18.316411] The buggy address belongs to the object at ffff888102b21f80
[   18.316411]  which belongs to the cache kmalloc-64 of size 64
[   18.317045] The buggy address is located 0 bytes to the right of
[   18.317045]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.318010] 
[   18.318422] The buggy address belongs to the physical page:
[   18.318720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.319672] flags: 0x200000000000000(node=0|zone=2)
[   18.319899] page_type: f5(slab)
[   18.320203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.320891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.321722] page dumped because: kasan: bad access detected
[   18.322291] 
[   18.322454] Memory state around the buggy address:
[   18.322769]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.323218]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.323777] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.324015]                                      ^
[   18.324466]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.324913]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.325356] ==================================================================
[   18.755154] ==================================================================
[   18.755649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   18.756531] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.757059] 
[   18.757321] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.757444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.757476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.757547] Call Trace:
[   18.757599]  <TASK>
[   18.757646]  dump_stack_lvl+0x73/0xb0
[   18.757732]  print_report+0xd1/0x650
[   18.757788]  ? __virt_addr_valid+0x1db/0x2d0
[   18.757842]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.757907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.757959]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.758010]  kasan_report+0x141/0x180
[   18.758062]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.758127]  kasan_check_range+0x10c/0x1c0
[   18.758181]  __kasan_check_write+0x18/0x20
[   18.758228]  kasan_atomics_helper+0x15b6/0x5450
[   18.758280]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.758350]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.758426]  ? kasan_atomics+0x152/0x310
[   18.758484]  kasan_atomics+0x1dc/0x310
[   18.758536]  ? __pfx_kasan_atomics+0x10/0x10
[   18.758586]  ? __pfx_read_tsc+0x10/0x10
[   18.758632]  ? ktime_get_ts64+0x86/0x230
[   18.758711]  kunit_try_run_case+0x1a5/0x480
[   18.758771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.758820]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.758877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.758933]  ? __kthread_parkme+0x82/0x180
[   18.758987]  ? preempt_count_sub+0x50/0x80
[   18.759041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.759116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.759172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.759232]  kthread+0x337/0x6f0
[   18.759276]  ? trace_preempt_on+0x20/0xc0
[   18.759321]  ? __pfx_kthread+0x10/0x10
[   18.759366]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.759397]  ? calculate_sigpending+0x7b/0xa0
[   18.759425]  ? __pfx_kthread+0x10/0x10
[   18.759449]  ret_from_fork+0x41/0x80
[   18.759475]  ? __pfx_kthread+0x10/0x10
[   18.759497]  ret_from_fork_asm+0x1a/0x30
[   18.759536]  </TASK>
[   18.759551] 
[   18.773537] Allocated by task 286:
[   18.773761]  kasan_save_stack+0x45/0x70
[   18.774196]  kasan_save_track+0x18/0x40
[   18.774594]  kasan_save_alloc_info+0x3b/0x50
[   18.775032]  __kasan_kmalloc+0xb7/0xc0
[   18.775467]  __kmalloc_cache_noprof+0x189/0x420
[   18.775893]  kasan_atomics+0x95/0x310
[   18.776308]  kunit_try_run_case+0x1a5/0x480
[   18.776587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.776818]  kthread+0x337/0x6f0
[   18.777588]  ret_from_fork+0x41/0x80
[   18.777798]  ret_from_fork_asm+0x1a/0x30
[   18.777969] 
[   18.778081] The buggy address belongs to the object at ffff888102b21f80
[   18.778081]  which belongs to the cache kmalloc-64 of size 64
[   18.779519] The buggy address is located 0 bytes to the right of
[   18.779519]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.780715] 
[   18.780845] The buggy address belongs to the physical page:
[   18.781081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.781834] flags: 0x200000000000000(node=0|zone=2)
[   18.782381] page_type: f5(slab)
[   18.782685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.783382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.783840] page dumped because: kasan: bad access detected
[   18.784292] 
[   18.784499] Memory state around the buggy address:
[   18.784767]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.785424]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.786070] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.786439]                                      ^
[   18.786702]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.787075]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.787821] ==================================================================
[   19.192506] ==================================================================
[   19.192841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   19.193346] Write of size 8 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   19.193662] 
[   19.193874] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   19.193984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.194017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.194068] Call Trace:
[   19.194541]  <TASK>
[   19.194581]  dump_stack_lvl+0x73/0xb0
[   19.194626]  print_report+0xd1/0x650
[   19.194655]  ? __virt_addr_valid+0x1db/0x2d0
[   19.194683]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.194710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.194738]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.194765]  kasan_report+0x141/0x180
[   19.194790]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.194822]  kasan_check_range+0x10c/0x1c0
[   19.194846]  __kasan_check_write+0x18/0x20
[   19.194870]  kasan_atomics_helper+0x1e12/0x5450
[   19.194899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.194926]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.194953]  ? kasan_atomics+0x152/0x310
[   19.194980]  kasan_atomics+0x1dc/0x310
[   19.195004]  ? __pfx_kasan_atomics+0x10/0x10
[   19.195029]  ? __pfx_read_tsc+0x10/0x10
[   19.195053]  ? ktime_get_ts64+0x86/0x230
[   19.195096]  kunit_try_run_case+0x1a5/0x480
[   19.195127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.195153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.195183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.195210]  ? __kthread_parkme+0x82/0x180
[   19.195237]  ? preempt_count_sub+0x50/0x80
[   19.195267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.195295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.195324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.195373]  kthread+0x337/0x6f0
[   19.195395]  ? trace_preempt_on+0x20/0xc0
[   19.195422]  ? __pfx_kthread+0x10/0x10
[   19.195444]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.195470]  ? calculate_sigpending+0x7b/0xa0
[   19.195495]  ? __pfx_kthread+0x10/0x10
[   19.195517]  ret_from_fork+0x41/0x80
[   19.195541]  ? __pfx_kthread+0x10/0x10
[   19.195562]  ret_from_fork_asm+0x1a/0x30
[   19.195598]  </TASK>
[   19.195612] 
[   19.209950] Allocated by task 286:
[   19.210772]  kasan_save_stack+0x45/0x70
[   19.211028]  kasan_save_track+0x18/0x40
[   19.211212]  kasan_save_alloc_info+0x3b/0x50
[   19.211755]  __kasan_kmalloc+0xb7/0xc0
[   19.212367]  __kmalloc_cache_noprof+0x189/0x420
[   19.212664]  kasan_atomics+0x95/0x310
[   19.212998]  kunit_try_run_case+0x1a5/0x480
[   19.213525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.213758]  kthread+0x337/0x6f0
[   19.214100]  ret_from_fork+0x41/0x80
[   19.214392]  ret_from_fork_asm+0x1a/0x30
[   19.214734] 
[   19.214860] The buggy address belongs to the object at ffff888102b21f80
[   19.214860]  which belongs to the cache kmalloc-64 of size 64
[   19.215673] The buggy address is located 0 bytes to the right of
[   19.215673]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   19.216704] 
[   19.217309] The buggy address belongs to the physical page:
[   19.217602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   19.217970] flags: 0x200000000000000(node=0|zone=2)
[   19.218704] page_type: f5(slab)
[   19.219130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.219570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.220002] page dumped because: kasan: bad access detected
[   19.220551] 
[   19.220698] Memory state around the buggy address:
[   19.220967]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.221418]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.221962] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.222276]                                      ^
[   19.222681]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.223121]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.223533] ==================================================================
[   18.136936] ==================================================================
[   18.137797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   18.138370] Read of size 4 at addr ffff888102b21fb0 by task kunit_try_catch/286
[   18.138757] 
[   18.138978] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   18.139079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.139109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.139166] Call Trace:
[   18.139212]  <TASK>
[   18.139260]  dump_stack_lvl+0x73/0xb0
[   18.139324]  print_report+0xd1/0x650
[   18.139396]  ? __virt_addr_valid+0x1db/0x2d0
[   18.139451]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.139507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.139566]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.139623]  kasan_report+0x141/0x180
[   18.139680]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.139743]  __asan_report_load4_noabort+0x18/0x20
[   18.139792]  kasan_atomics_helper+0x4a84/0x5450
[   18.139843]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.139896]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.139953]  ? kasan_atomics+0x152/0x310
[   18.140013]  kasan_atomics+0x1dc/0x310
[   18.140065]  ? __pfx_kasan_atomics+0x10/0x10
[   18.140118]  ? __pfx_read_tsc+0x10/0x10
[   18.140166]  ? ktime_get_ts64+0x86/0x230
[   18.140230]  kunit_try_run_case+0x1a5/0x480
[   18.140291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.140359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.140415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.140468]  ? __kthread_parkme+0x82/0x180
[   18.140510]  ? preempt_count_sub+0x50/0x80
[   18.140564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.140619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.140679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.140738]  kthread+0x337/0x6f0
[   18.140782]  ? trace_preempt_on+0x20/0xc0
[   18.140840]  ? __pfx_kthread+0x10/0x10
[   18.140889]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.140944]  ? calculate_sigpending+0x7b/0xa0
[   18.141000]  ? __pfx_kthread+0x10/0x10
[   18.141059]  ret_from_fork+0x41/0x80
[   18.141109]  ? __pfx_kthread+0x10/0x10
[   18.141157]  ret_from_fork_asm+0x1a/0x30
[   18.141239]  </TASK>
[   18.141304] 
[   18.151043] Allocated by task 286:
[   18.151455]  kasan_save_stack+0x45/0x70
[   18.151794]  kasan_save_track+0x18/0x40
[   18.151979]  kasan_save_alloc_info+0x3b/0x50
[   18.152399]  __kasan_kmalloc+0xb7/0xc0
[   18.152730]  __kmalloc_cache_noprof+0x189/0x420
[   18.152947]  kasan_atomics+0x95/0x310
[   18.154835]  kunit_try_run_case+0x1a5/0x480
[   18.155213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.155592]  kthread+0x337/0x6f0
[   18.155824]  ret_from_fork+0x41/0x80
[   18.156055]  ret_from_fork_asm+0x1a/0x30
[   18.156315] 
[   18.156511] The buggy address belongs to the object at ffff888102b21f80
[   18.156511]  which belongs to the cache kmalloc-64 of size 64
[   18.157188] The buggy address is located 0 bytes to the right of
[   18.157188]  allocated 48-byte region [ffff888102b21f80, ffff888102b21fb0)
[   18.158505] 
[   18.158651] The buggy address belongs to the physical page:
[   18.158887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b21
[   18.159189] flags: 0x200000000000000(node=0|zone=2)
[   18.159312] page_type: f5(slab)
[   18.159629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.160479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.161206] page dumped because: kasan: bad access detected
[   18.161605] 
[   18.161726] Memory state around the buggy address:
[   18.162459]  ffff888102b21e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.162852]  ffff888102b21f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.163190] >ffff888102b21f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.163614]                                      ^
[   18.163866]  ffff888102b22000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.164497]  ffff888102b22080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.164774] ==================================================================