Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.566452] ==================================================================
[   20.566507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.566747] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.566864] 
[   20.566925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.567011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.567039] Hardware name: linux,dummy-virt (DT)
[   20.567099] Call trace:
[   20.567124]  show_stack+0x20/0x38 (C)
[   20.567181]  dump_stack_lvl+0x8c/0xd0
[   20.567231]  print_report+0x118/0x608
[   20.567280]  kasan_report+0xdc/0x128
[   20.567325]  kasan_check_range+0x100/0x1a8
[   20.567386]  __kasan_check_write+0x20/0x30
[   20.567442]  kasan_atomics_helper+0x16d0/0x4858
[   20.567491]  kasan_atomics+0x198/0x2e0
[   20.567537]  kunit_try_run_case+0x170/0x3f0
[   20.567587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.567643]  kthread+0x328/0x630
[   20.567692]  ret_from_fork+0x10/0x20
[   20.567741] 
[   20.567763] Allocated by task 267:
[   20.567802]  kasan_save_stack+0x3c/0x68
[   20.567854]  kasan_save_track+0x20/0x40
[   20.567893]  kasan_save_alloc_info+0x40/0x58
[   20.567935]  __kasan_kmalloc+0xd4/0xd8
[   20.567972]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.568014]  kasan_atomics+0xb8/0x2e0
[   20.568051]  kunit_try_run_case+0x170/0x3f0
[   20.568093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568149]  kthread+0x328/0x630
[   20.568198]  ret_from_fork+0x10/0x20
[   20.568643] 
[   20.568745] The buggy address belongs to the object at fff00000c6e72400
[   20.568745]  which belongs to the cache kmalloc-64 of size 64
[   20.569120] The buggy address is located 0 bytes to the right of
[   20.569120]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.569234] 
[   20.569312] The buggy address belongs to the physical page:
[   20.569388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.569535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.569588] page_type: f5(slab)
[   20.569659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.569714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.569758] page dumped because: kasan: bad access detected
[   20.569923] 
[   20.569998] Memory state around the buggy address:
[   20.570065]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.570118]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.570181] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.570256]                                      ^
[   20.570537]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.570621]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.570707] ==================================================================
[   20.456762] ==================================================================
[   20.456813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.456909] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.457088] 
[   20.457144] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.457257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.457305] Hardware name: linux,dummy-virt (DT)
[   20.457350] Call trace:
[   20.457374]  show_stack+0x20/0x38 (C)
[   20.457427]  dump_stack_lvl+0x8c/0xd0
[   20.457496]  print_report+0x118/0x608
[   20.457563]  kasan_report+0xdc/0x128
[   20.457628]  __asan_report_store8_noabort+0x20/0x30
[   20.457719]  kasan_atomics_helper+0x3e5c/0x4858
[   20.457768]  kasan_atomics+0x198/0x2e0
[   20.457814]  kunit_try_run_case+0x170/0x3f0
[   20.457864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.457919]  kthread+0x328/0x630
[   20.458082]  ret_from_fork+0x10/0x20
[   20.458142] 
[   20.458181] Allocated by task 267:
[   20.458229]  kasan_save_stack+0x3c/0x68
[   20.458272]  kasan_save_track+0x20/0x40
[   20.460638]  kasan_save_alloc_info+0x40/0x58
[   20.460702]  __kasan_kmalloc+0xd4/0xd8
[   20.460741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.460785]  kasan_atomics+0xb8/0x2e0
[   20.460821]  kunit_try_run_case+0x170/0x3f0
[   20.460864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.460911]  kthread+0x328/0x630
[   20.460950]  ret_from_fork+0x10/0x20
[   20.460988] 
[   20.461010] The buggy address belongs to the object at fff00000c6e72400
[   20.461010]  which belongs to the cache kmalloc-64 of size 64
[   20.461071] The buggy address is located 0 bytes to the right of
[   20.461071]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.461137] 
[   20.461158] The buggy address belongs to the physical page:
[   20.461191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.461247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.461297] page_type: f5(slab)
[   20.461350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.461431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.461507] page dumped because: kasan: bad access detected
[   20.461617] 
[   20.461685] Memory state around the buggy address:
[   20.461738]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.461804]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.461901] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.461942]                                      ^
[   20.461975]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462019]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462060] ==================================================================
[   20.467414] ==================================================================
[   20.467702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.467768] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.467820] 
[   20.467851] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.467952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.468029] Hardware name: linux,dummy-virt (DT)
[   20.468064] Call trace:
[   20.468104]  show_stack+0x20/0x38 (C)
[   20.468175]  dump_stack_lvl+0x8c/0xd0
[   20.468236]  print_report+0x118/0x608
[   20.468314]  kasan_report+0xdc/0x128
[   20.468424]  kasan_check_range+0x100/0x1a8
[   20.468507]  __kasan_check_write+0x20/0x30
[   20.468581]  kasan_atomics_helper+0xf20/0x4858
[   20.468632]  kasan_atomics+0x198/0x2e0
[   20.468677]  kunit_try_run_case+0x170/0x3f0
[   20.468727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.468783]  kthread+0x328/0x630
[   20.468948]  ret_from_fork+0x10/0x20
[   20.469094] 
[   20.469152] Allocated by task 267:
[   20.469234]  kasan_save_stack+0x3c/0x68
[   20.469540]  kasan_save_track+0x20/0x40
[   20.469645]  kasan_save_alloc_info+0x40/0x58
[   20.469714]  __kasan_kmalloc+0xd4/0xd8
[   20.469818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.469895]  kasan_atomics+0xb8/0x2e0
[   20.469963]  kunit_try_run_case+0x170/0x3f0
[   20.470050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.470134]  kthread+0x328/0x630
[   20.470228]  ret_from_fork+0x10/0x20
[   20.470306] 
[   20.470358] The buggy address belongs to the object at fff00000c6e72400
[   20.470358]  which belongs to the cache kmalloc-64 of size 64
[   20.470420] The buggy address is located 0 bytes to the right of
[   20.470420]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.470698] 
[   20.470933] The buggy address belongs to the physical page:
[   20.471184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.471606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.471679] page_type: f5(slab)
[   20.471794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.471894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.471938] page dumped because: kasan: bad access detected
[   20.471972] 
[   20.471993] Memory state around the buggy address:
[   20.472036]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.472296]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.472362] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.472404]                                      ^
[   20.472464]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472527]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.472571] ==================================================================
[   20.487009] ==================================================================
[   20.487063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.487142] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.487223] 
[   20.487255] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.487351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.487380] Hardware name: linux,dummy-virt (DT)
[   20.487413] Call trace:
[   20.487473]  show_stack+0x20/0x38 (C)
[   20.487616]  dump_stack_lvl+0x8c/0xd0
[   20.487692]  print_report+0x118/0x608
[   20.487749]  kasan_report+0xdc/0x128
[   20.487814]  kasan_check_range+0x100/0x1a8
[   20.487866]  __kasan_check_write+0x20/0x30
[   20.487991]  kasan_atomics_helper+0x10c0/0x4858
[   20.488118]  kasan_atomics+0x198/0x2e0
[   20.488194]  kunit_try_run_case+0x170/0x3f0
[   20.488296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488396]  kthread+0x328/0x630
[   20.488474]  ret_from_fork+0x10/0x20
[   20.488581] 
[   20.488677] Allocated by task 267:
[   20.488738]  kasan_save_stack+0x3c/0x68
[   20.488782]  kasan_save_track+0x20/0x40
[   20.488969]  kasan_save_alloc_info+0x40/0x58
[   20.489015]  __kasan_kmalloc+0xd4/0xd8
[   20.489052]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.489205]  kasan_atomics+0xb8/0x2e0
[   20.489290]  kunit_try_run_case+0x170/0x3f0
[   20.489378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.489501]  kthread+0x328/0x630
[   20.489587]  ret_from_fork+0x10/0x20
[   20.489863] 
[   20.489947] The buggy address belongs to the object at fff00000c6e72400
[   20.489947]  which belongs to the cache kmalloc-64 of size 64
[   20.490043] The buggy address is located 0 bytes to the right of
[   20.490043]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.490160] 
[   20.490229] The buggy address belongs to the physical page:
[   20.490296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.490369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.490499] page_type: f5(slab)
[   20.490577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.490663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.490707] page dumped because: kasan: bad access detected
[   20.490741] 
[   20.490761] Memory state around the buggy address:
[   20.490796]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490845]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490890] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.491092]                                      ^
[   20.491172]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491279]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.491352] ==================================================================
[   20.441922] ==================================================================
[   20.442173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.442295] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.442362] 
[   20.442394] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.442487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.442515] Hardware name: linux,dummy-virt (DT)
[   20.442595] Call trace:
[   20.442620]  show_stack+0x20/0x38 (C)
[   20.442688]  dump_stack_lvl+0x8c/0xd0
[   20.442758]  print_report+0x118/0x608
[   20.442824]  kasan_report+0xdc/0x128
[   20.442881]  kasan_check_range+0x100/0x1a8
[   20.442929]  __kasan_check_read+0x20/0x30
[   20.442980]  kasan_atomics_helper+0xdd4/0x4858
[   20.443066]  kasan_atomics+0x198/0x2e0
[   20.443113]  kunit_try_run_case+0x170/0x3f0
[   20.443250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.443314]  kthread+0x328/0x630
[   20.443433]  ret_from_fork+0x10/0x20
[   20.443499] 
[   20.443528] Allocated by task 267:
[   20.443575]  kasan_save_stack+0x3c/0x68
[   20.443847]  kasan_save_track+0x20/0x40
[   20.443919]  kasan_save_alloc_info+0x40/0x58
[   20.443970]  __kasan_kmalloc+0xd4/0xd8
[   20.444008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.444051]  kasan_atomics+0xb8/0x2e0
[   20.444088]  kunit_try_run_case+0x170/0x3f0
[   20.444130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.444177]  kthread+0x328/0x630
[   20.444220]  ret_from_fork+0x10/0x20
[   20.444260] 
[   20.444283] The buggy address belongs to the object at fff00000c6e72400
[   20.444283]  which belongs to the cache kmalloc-64 of size 64
[   20.444354] The buggy address is located 0 bytes to the right of
[   20.444354]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.444420] 
[   20.444442] The buggy address belongs to the physical page:
[   20.444589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.444647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.444729] page_type: f5(slab)
[   20.444771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.444823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.445104] page dumped because: kasan: bad access detected
[   20.445172] 
[   20.445452] Memory state around the buggy address:
[   20.445550]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.445627]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.445719] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.445797]                                      ^
[   20.445845]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.445890]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.446108] ==================================================================
[   20.537552] ==================================================================
[   20.537607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.537695] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.537974] 
[   20.538019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.538104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.538134] Hardware name: linux,dummy-virt (DT)
[   20.538185] Call trace:
[   20.538210]  show_stack+0x20/0x38 (C)
[   20.538303]  dump_stack_lvl+0x8c/0xd0
[   20.538365]  print_report+0x118/0x608
[   20.538432]  kasan_report+0xdc/0x128
[   20.538485]  kasan_check_range+0x100/0x1a8
[   20.538535]  __kasan_check_write+0x20/0x30
[   20.538585]  kasan_atomics_helper+0x14e4/0x4858
[   20.538632]  kasan_atomics+0x198/0x2e0
[   20.538678]  kunit_try_run_case+0x170/0x3f0
[   20.538728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.538846]  kthread+0x328/0x630
[   20.538987]  ret_from_fork+0x10/0x20
[   20.539062] 
[   20.539091] Allocated by task 267:
[   20.539121]  kasan_save_stack+0x3c/0x68
[   20.539354]  kasan_save_track+0x20/0x40
[   20.539411]  kasan_save_alloc_info+0x40/0x58
[   20.539492]  __kasan_kmalloc+0xd4/0xd8
[   20.539566]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.539611]  kasan_atomics+0xb8/0x2e0
[   20.539648]  kunit_try_run_case+0x170/0x3f0
[   20.539691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.539736]  kthread+0x328/0x630
[   20.539793]  ret_from_fork+0x10/0x20
[   20.539849] 
[   20.539883] The buggy address belongs to the object at fff00000c6e72400
[   20.539883]  which belongs to the cache kmalloc-64 of size 64
[   20.539945] The buggy address is located 0 bytes to the right of
[   20.539945]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.540052] 
[   20.540074] The buggy address belongs to the physical page:
[   20.540241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.540312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.540442] page_type: f5(slab)
[   20.540509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.540580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.540857] page dumped because: kasan: bad access detected
[   20.540920] 
[   20.540989] Memory state around the buggy address:
[   20.541081]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541157]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541220] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.541260]                                      ^
[   20.541678]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.541730]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.541771] ==================================================================
[   20.544451] ==================================================================
[   20.544492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.544550] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.544958] 
[   20.544991] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.545076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.545104] Hardware name: linux,dummy-virt (DT)
[   20.545136] Call trace:
[   20.545159]  show_stack+0x20/0x38 (C)
[   20.545239]  dump_stack_lvl+0x8c/0xd0
[   20.545288]  print_report+0x118/0x608
[   20.545347]  kasan_report+0xdc/0x128
[   20.545498]  kasan_check_range+0x100/0x1a8
[   20.545628]  __kasan_check_write+0x20/0x30
[   20.545726]  kasan_atomics_helper+0x15b4/0x4858
[   20.545847]  kasan_atomics+0x198/0x2e0
[   20.546129]  kunit_try_run_case+0x170/0x3f0
[   20.546283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.546387]  kthread+0x328/0x630
[   20.546471]  ret_from_fork+0x10/0x20
[   20.546585] 
[   20.546609] Allocated by task 267:
[   20.546676]  kasan_save_stack+0x3c/0x68
[   20.546776]  kasan_save_track+0x20/0x40
[   20.546859]  kasan_save_alloc_info+0x40/0x58
[   20.546936]  __kasan_kmalloc+0xd4/0xd8
[   20.547029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.547071]  kasan_atomics+0xb8/0x2e0
[   20.547123]  kunit_try_run_case+0x170/0x3f0
[   20.547452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.547569]  kthread+0x328/0x630
[   20.547689]  ret_from_fork+0x10/0x20
[   20.547775] 
[   20.547843] The buggy address belongs to the object at fff00000c6e72400
[   20.547843]  which belongs to the cache kmalloc-64 of size 64
[   20.548046] The buggy address is located 0 bytes to the right of
[   20.548046]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.548112] 
[   20.548134] The buggy address belongs to the physical page:
[   20.548167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.548395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.548529] page_type: f5(slab)
[   20.548600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.548876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.548964] page dumped because: kasan: bad access detected
[   20.549038] 
[   20.549112] Memory state around the buggy address:
[   20.549189]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549261]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549306] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.549373]                                      ^
[   20.549410]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549452]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549764] ==================================================================
[   20.550646] ==================================================================
[   20.550696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.550764] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.550817] 
[   20.550891] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.550991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.551045] Hardware name: linux,dummy-virt (DT)
[   20.551079] Call trace:
[   20.551120]  show_stack+0x20/0x38 (C)
[   20.551346]  dump_stack_lvl+0x8c/0xd0
[   20.551502]  print_report+0x118/0x608
[   20.551577]  kasan_report+0xdc/0x128
[   20.551680]  __asan_report_load8_noabort+0x20/0x30
[   20.551734]  kasan_atomics_helper+0x3db0/0x4858
[   20.551812]  kasan_atomics+0x198/0x2e0
[   20.551865]  kunit_try_run_case+0x170/0x3f0
[   20.551931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.551995]  kthread+0x328/0x630
[   20.552060]  ret_from_fork+0x10/0x20
[   20.552111] 
[   20.552131] Allocated by task 267:
[   20.552162]  kasan_save_stack+0x3c/0x68
[   20.552351]  kasan_save_track+0x20/0x40
[   20.552497]  kasan_save_alloc_info+0x40/0x58
[   20.552572]  __kasan_kmalloc+0xd4/0xd8
[   20.552697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.552783]  kasan_atomics+0xb8/0x2e0
[   20.553070]  kunit_try_run_case+0x170/0x3f0
[   20.553162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.553248]  kthread+0x328/0x630
[   20.553369]  ret_from_fork+0x10/0x20
[   20.553455] 
[   20.553523] The buggy address belongs to the object at fff00000c6e72400
[   20.553523]  which belongs to the cache kmalloc-64 of size 64
[   20.553670] The buggy address is located 0 bytes to the right of
[   20.553670]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.553760] 
[   20.553883] The buggy address belongs to the physical page:
[   20.553942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.553998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554170] page_type: f5(slab)
[   20.554211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.554264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.554422] page dumped because: kasan: bad access detected
[   20.554494] 
[   20.554527] Memory state around the buggy address:
[   20.554561]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554608]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554793] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.555120]                                      ^
[   20.555429]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555549]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555703] ==================================================================
[   20.577443] ==================================================================
[   20.577517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.577569] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.577731] 
[   20.577790] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.577877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.577907] Hardware name: linux,dummy-virt (DT)
[   20.577953] Call trace:
[   20.577979]  show_stack+0x20/0x38 (C)
[   20.578046]  dump_stack_lvl+0x8c/0xd0
[   20.578310]  print_report+0x118/0x608
[   20.578383]  kasan_report+0xdc/0x128
[   20.578448]  kasan_check_range+0x100/0x1a8
[   20.578504]  __kasan_check_write+0x20/0x30
[   20.578553]  kasan_atomics_helper+0x175c/0x4858
[   20.578602]  kasan_atomics+0x198/0x2e0
[   20.578655]  kunit_try_run_case+0x170/0x3f0
[   20.578723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.578808]  kthread+0x328/0x630
[   20.578862]  ret_from_fork+0x10/0x20
[   20.578912] 
[   20.578932] Allocated by task 267:
[   20.578962]  kasan_save_stack+0x3c/0x68
[   20.579003]  kasan_save_track+0x20/0x40
[   20.579042]  kasan_save_alloc_info+0x40/0x58
[   20.579174]  __kasan_kmalloc+0xd4/0xd8
[   20.579223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.579289]  kasan_atomics+0xb8/0x2e0
[   20.579374]  kunit_try_run_case+0x170/0x3f0
[   20.579422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.579475]  kthread+0x328/0x630
[   20.579644]  ret_from_fork+0x10/0x20
[   20.579686] 
[   20.579805] The buggy address belongs to the object at fff00000c6e72400
[   20.579805]  which belongs to the cache kmalloc-64 of size 64
[   20.579880] The buggy address is located 0 bytes to the right of
[   20.579880]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.579965] 
[   20.579995] The buggy address belongs to the physical page:
[   20.580031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.580106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.580155] page_type: f5(slab)
[   20.580233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.580326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.580401] page dumped because: kasan: bad access detected
[   20.580436] 
[   20.580458] Memory state around the buggy address:
[   20.580491]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.580537]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.580597] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.580637]                                      ^
[   20.580672]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.580923]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.581113] ==================================================================
[   20.451898] ==================================================================
[   20.451968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.452030] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.452083] 
[   20.452300] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.452412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.452515] Hardware name: linux,dummy-virt (DT)
[   20.452589] Call trace:
[   20.452622]  show_stack+0x20/0x38 (C)
[   20.452845]  dump_stack_lvl+0x8c/0xd0
[   20.452940]  print_report+0x118/0x608
[   20.453028]  kasan_report+0xdc/0x128
[   20.453124]  kasan_check_range+0x100/0x1a8
[   20.453222]  __kasan_check_write+0x20/0x30
[   20.453319]  kasan_atomics_helper+0xe44/0x4858
[   20.453417]  kasan_atomics+0x198/0x2e0
[   20.453462]  kunit_try_run_case+0x170/0x3f0
[   20.453541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.453597]  kthread+0x328/0x630
[   20.453643]  ret_from_fork+0x10/0x20
[   20.453692] 
[   20.453713] Allocated by task 267:
[   20.453876]  kasan_save_stack+0x3c/0x68
[   20.453963]  kasan_save_track+0x20/0x40
[   20.454024]  kasan_save_alloc_info+0x40/0x58
[   20.454089]  __kasan_kmalloc+0xd4/0xd8
[   20.454317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.454414]  kasan_atomics+0xb8/0x2e0
[   20.454538]  kunit_try_run_case+0x170/0x3f0
[   20.454603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.454710]  kthread+0x328/0x630
[   20.454788]  ret_from_fork+0x10/0x20
[   20.454890] 
[   20.454939] The buggy address belongs to the object at fff00000c6e72400
[   20.454939]  which belongs to the cache kmalloc-64 of size 64
[   20.455011] The buggy address is located 0 bytes to the right of
[   20.455011]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.455076] 
[   20.455099] The buggy address belongs to the physical page:
[   20.455133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.455194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.455254] page_type: f5(slab)
[   20.455294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.455365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.455407] page dumped because: kasan: bad access detected
[   20.455442] 
[   20.455472] Memory state around the buggy address:
[   20.455507]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.455553]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.455598] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.455653]                                      ^
[   20.455696]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455749]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455791] ==================================================================
[   20.561326] ==================================================================
[   20.561746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.561962] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.562043] 
[   20.562077] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.562173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.562218] Hardware name: linux,dummy-virt (DT)
[   20.562251] Call trace:
[   20.562277]  show_stack+0x20/0x38 (C)
[   20.562328]  dump_stack_lvl+0x8c/0xd0
[   20.562516]  print_report+0x118/0x608
[   20.562585]  kasan_report+0xdc/0x128
[   20.562652]  __asan_report_load8_noabort+0x20/0x30
[   20.562706]  kasan_atomics_helper+0x3df4/0x4858
[   20.562764]  kasan_atomics+0x198/0x2e0
[   20.562821]  kunit_try_run_case+0x170/0x3f0
[   20.562879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.562964]  kthread+0x328/0x630
[   20.563031]  ret_from_fork+0x10/0x20
[   20.563098] 
[   20.563122] Allocated by task 267:
[   20.563165]  kasan_save_stack+0x3c/0x68
[   20.563224]  kasan_save_track+0x20/0x40
[   20.563281]  kasan_save_alloc_info+0x40/0x58
[   20.563375]  __kasan_kmalloc+0xd4/0xd8
[   20.563431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.563475]  kasan_atomics+0xb8/0x2e0
[   20.563511]  kunit_try_run_case+0x170/0x3f0
[   20.563667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.563816]  kthread+0x328/0x630
[   20.563871]  ret_from_fork+0x10/0x20
[   20.563936] 
[   20.563958] The buggy address belongs to the object at fff00000c6e72400
[   20.563958]  which belongs to the cache kmalloc-64 of size 64
[   20.564034] The buggy address is located 0 bytes to the right of
[   20.564034]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.564103] 
[   20.564142] The buggy address belongs to the physical page:
[   20.564187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.564494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.564597] page_type: f5(slab)
[   20.564698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.564774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.564924] page dumped because: kasan: bad access detected
[   20.564992] 
[   20.565049] Memory state around the buggy address:
[   20.565136]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.565206]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.565253] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.565457]                                      ^
[   20.565498]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.565544]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.565584] ==================================================================
[   20.429090] ==================================================================
[   20.429166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.429235] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.429287] 
[   20.429353] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.429591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.429649] Hardware name: linux,dummy-virt (DT)
[   20.429683] Call trace:
[   20.429723]  show_stack+0x20/0x38 (C)
[   20.429777]  dump_stack_lvl+0x8c/0xd0
[   20.429844]  print_report+0x118/0x608
[   20.429947]  kasan_report+0xdc/0x128
[   20.430013]  __asan_report_load4_noabort+0x20/0x30
[   20.430065]  kasan_atomics_helper+0x3dd8/0x4858
[   20.430129]  kasan_atomics+0x198/0x2e0
[   20.430174]  kunit_try_run_case+0x170/0x3f0
[   20.430242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.430312]  kthread+0x328/0x630
[   20.430398]  ret_from_fork+0x10/0x20
[   20.430449] 
[   20.430469] Allocated by task 267:
[   20.430498]  kasan_save_stack+0x3c/0x68
[   20.430540]  kasan_save_track+0x20/0x40
[   20.430612]  kasan_save_alloc_info+0x40/0x58
[   20.430652]  __kasan_kmalloc+0xd4/0xd8
[   20.430775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.430844]  kasan_atomics+0xb8/0x2e0
[   20.430893]  kunit_try_run_case+0x170/0x3f0
[   20.430937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.431004]  kthread+0x328/0x630
[   20.431059]  ret_from_fork+0x10/0x20
[   20.431187] 
[   20.431283] The buggy address belongs to the object at fff00000c6e72400
[   20.431283]  which belongs to the cache kmalloc-64 of size 64
[   20.431389] The buggy address is located 0 bytes to the right of
[   20.431389]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.431474] 
[   20.431547] The buggy address belongs to the physical page:
[   20.431582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.431656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.431728] page_type: f5(slab)
[   20.431776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.431829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.431872] page dumped because: kasan: bad access detected
[   20.431905] 
[   20.431926] Memory state around the buggy address:
[   20.431959]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.432115]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.432229] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.432307]                                      ^
[   20.432435]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.432520]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.432616] ==================================================================
[   20.491965] ==================================================================
[   20.492018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.492385] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.492480] 
[   20.492531] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.492645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.492726] Hardware name: linux,dummy-virt (DT)
[   20.492902] Call trace:
[   20.493066]  show_stack+0x20/0x38 (C)
[   20.493173]  dump_stack_lvl+0x8c/0xd0
[   20.493258]  print_report+0x118/0x608
[   20.493397]  kasan_report+0xdc/0x128
[   20.493494]  kasan_check_range+0x100/0x1a8
[   20.493613]  __kasan_check_write+0x20/0x30
[   20.493665]  kasan_atomics_helper+0x1128/0x4858
[   20.493729]  kasan_atomics+0x198/0x2e0
[   20.493777]  kunit_try_run_case+0x170/0x3f0
[   20.494100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.494228]  kthread+0x328/0x630
[   20.494354]  ret_from_fork+0x10/0x20
[   20.494616] 
[   20.494681] Allocated by task 267:
[   20.494723]  kasan_save_stack+0x3c/0x68
[   20.494830]  kasan_save_track+0x20/0x40
[   20.494920]  kasan_save_alloc_info+0x40/0x58
[   20.495031]  __kasan_kmalloc+0xd4/0xd8
[   20.495110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.495220]  kasan_atomics+0xb8/0x2e0
[   20.495315]  kunit_try_run_case+0x170/0x3f0
[   20.495419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.495468]  kthread+0x328/0x630
[   20.495505]  ret_from_fork+0x10/0x20
[   20.495587] 
[   20.495777] The buggy address belongs to the object at fff00000c6e72400
[   20.495777]  which belongs to the cache kmalloc-64 of size 64
[   20.495952] The buggy address is located 0 bytes to the right of
[   20.495952]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.496237] 
[   20.496312] The buggy address belongs to the physical page:
[   20.496385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.496577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.496633] page_type: f5(slab)
[   20.496674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.496875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.496971] page dumped because: kasan: bad access detected
[   20.497078] 
[   20.497136] Memory state around the buggy address:
[   20.497202]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.497488]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.497559] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.497636]                                      ^
[   20.497722]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497812]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497926] ==================================================================
[   20.477737] ==================================================================
[   20.477793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.477843] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.477992] 
[   20.478080] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.478189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.478243] Hardware name: linux,dummy-virt (DT)
[   20.478436] Call trace:
[   20.478472]  show_stack+0x20/0x38 (C)
[   20.478525]  dump_stack_lvl+0x8c/0xd0
[   20.478637]  print_report+0x118/0x608
[   20.478702]  kasan_report+0xdc/0x128
[   20.478808]  kasan_check_range+0x100/0x1a8
[   20.478865]  __kasan_check_write+0x20/0x30
[   20.478931]  kasan_atomics_helper+0xff0/0x4858
[   20.479000]  kasan_atomics+0x198/0x2e0
[   20.479066]  kunit_try_run_case+0x170/0x3f0
[   20.479121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.479178]  kthread+0x328/0x630
[   20.479243]  ret_from_fork+0x10/0x20
[   20.479293] 
[   20.479313] Allocated by task 267:
[   20.479356]  kasan_save_stack+0x3c/0x68
[   20.479471]  kasan_save_track+0x20/0x40
[   20.479628]  kasan_save_alloc_info+0x40/0x58
[   20.479686]  __kasan_kmalloc+0xd4/0xd8
[   20.479734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.479791]  kasan_atomics+0xb8/0x2e0
[   20.479852]  kunit_try_run_case+0x170/0x3f0
[   20.480051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.480154]  kthread+0x328/0x630
[   20.480218]  ret_from_fork+0x10/0x20
[   20.480297] 
[   20.480379] The buggy address belongs to the object at fff00000c6e72400
[   20.480379]  which belongs to the cache kmalloc-64 of size 64
[   20.480478] The buggy address is located 0 bytes to the right of
[   20.480478]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.480603] 
[   20.480668] The buggy address belongs to the physical page:
[   20.480725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.480807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.480910] page_type: f5(slab)
[   20.480969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.481024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.481249] page dumped because: kasan: bad access detected
[   20.481288] 
[   20.481309] Memory state around the buggy address:
[   20.481844]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.481939]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.482035] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.482112]                                      ^
[   20.482160]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482213]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482262] ==================================================================
[   20.524177] ==================================================================
[   20.524237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.524287] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.524509] 
[   20.524545] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.524630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.524691] Hardware name: linux,dummy-virt (DT)
[   20.524770] Call trace:
[   20.524805]  show_stack+0x20/0x38 (C)
[   20.525028]  dump_stack_lvl+0x8c/0xd0
[   20.525143]  print_report+0x118/0x608
[   20.525221]  kasan_report+0xdc/0x128
[   20.525288]  __asan_report_load8_noabort+0x20/0x30
[   20.525352]  kasan_atomics_helper+0x3f04/0x4858
[   20.525402]  kasan_atomics+0x198/0x2e0
[   20.525447]  kunit_try_run_case+0x170/0x3f0
[   20.525602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.525659]  kthread+0x328/0x630
[   20.525705]  ret_from_fork+0x10/0x20
[   20.525755] 
[   20.525775] Allocated by task 267:
[   20.525931]  kasan_save_stack+0x3c/0x68
[   20.526027]  kasan_save_track+0x20/0x40
[   20.526115]  kasan_save_alloc_info+0x40/0x58
[   20.526165]  __kasan_kmalloc+0xd4/0xd8
[   20.526224]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.526292]  kasan_atomics+0xb8/0x2e0
[   20.526555]  kunit_try_run_case+0x170/0x3f0
[   20.526682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.526778]  kthread+0x328/0x630
[   20.526866]  ret_from_fork+0x10/0x20
[   20.526943] 
[   20.526992] The buggy address belongs to the object at fff00000c6e72400
[   20.526992]  which belongs to the cache kmalloc-64 of size 64
[   20.527097] The buggy address is located 0 bytes to the right of
[   20.527097]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.527190] 
[   20.527211] The buggy address belongs to the physical page:
[   20.527244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.527301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.527377] page_type: f5(slab)
[   20.527418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.527471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.527531] page dumped because: kasan: bad access detected
[   20.527575] 
[   20.527598] Memory state around the buggy address:
[   20.527632]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527678]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.527731] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.527772]                                      ^
[   20.527808]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.527851]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.527901] ==================================================================
[   20.503806] ==================================================================
[   20.503857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.503905] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.503967] 
[   20.503999] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.504082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.504119] Hardware name: linux,dummy-virt (DT)
[   20.504151] Call trace:
[   20.504176]  show_stack+0x20/0x38 (C)
[   20.504224]  dump_stack_lvl+0x8c/0xd0
[   20.504274]  print_report+0x118/0x608
[   20.504319]  kasan_report+0xdc/0x128
[   20.504378]  kasan_check_range+0x100/0x1a8
[   20.504427]  __kasan_check_write+0x20/0x30
[   20.504474]  kasan_atomics_helper+0x11f8/0x4858
[   20.505107]  kasan_atomics+0x198/0x2e0
[   20.505195]  kunit_try_run_case+0x170/0x3f0
[   20.505278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.505394]  kthread+0x328/0x630
[   20.505452]  ret_from_fork+0x10/0x20
[   20.505555] 
[   20.505605] Allocated by task 267:
[   20.505635]  kasan_save_stack+0x3c/0x68
[   20.505701]  kasan_save_track+0x20/0x40
[   20.505788]  kasan_save_alloc_info+0x40/0x58
[   20.505913]  __kasan_kmalloc+0xd4/0xd8
[   20.505956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.505998]  kasan_atomics+0xb8/0x2e0
[   20.506037]  kunit_try_run_case+0x170/0x3f0
[   20.506077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.506250]  kthread+0x328/0x630
[   20.506386]  ret_from_fork+0x10/0x20
[   20.506473] 
[   20.506574] The buggy address belongs to the object at fff00000c6e72400
[   20.506574]  which belongs to the cache kmalloc-64 of size 64
[   20.506686] The buggy address is located 0 bytes to the right of
[   20.506686]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.506791] 
[   20.506847] The buggy address belongs to the physical page:
[   20.506943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.507229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.507352] page_type: f5(slab)
[   20.507477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.507529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.507728] page dumped because: kasan: bad access detected
[   20.507878] 
[   20.507928] Memory state around the buggy address:
[   20.507984]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.508106]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.508219] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.508420]                                      ^
[   20.508556]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.508609]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.508649] ==================================================================
[   20.595012] ==================================================================
[   20.595083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.595136] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.595188] 
[   20.595240] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.595345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.595384] Hardware name: linux,dummy-virt (DT)
[   20.595418] Call trace:
[   20.595468]  show_stack+0x20/0x38 (C)
[   20.595649]  dump_stack_lvl+0x8c/0xd0
[   20.595769]  print_report+0x118/0x608
[   20.595846]  kasan_report+0xdc/0x128
[   20.595911]  kasan_check_range+0x100/0x1a8
[   20.595988]  __kasan_check_write+0x20/0x30
[   20.596054]  kasan_atomics_helper+0x17ec/0x4858
[   20.596128]  kasan_atomics+0x198/0x2e0
[   20.596195]  kunit_try_run_case+0x170/0x3f0
[   20.596273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.596413]  kthread+0x328/0x630
[   20.596524]  ret_from_fork+0x10/0x20
[   20.596901] 
[   20.596937] Allocated by task 267:
[   20.597053]  kasan_save_stack+0x3c/0x68
[   20.597119]  kasan_save_track+0x20/0x40
[   20.597222]  kasan_save_alloc_info+0x40/0x58
[   20.597311]  __kasan_kmalloc+0xd4/0xd8
[   20.597383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.597425]  kasan_atomics+0xb8/0x2e0
[   20.597462]  kunit_try_run_case+0x170/0x3f0
[   20.597504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.597575]  kthread+0x328/0x630
[   20.597613]  ret_from_fork+0x10/0x20
[   20.597651] 
[   20.597674] The buggy address belongs to the object at fff00000c6e72400
[   20.597674]  which belongs to the cache kmalloc-64 of size 64
[   20.597732] The buggy address is located 0 bytes to the right of
[   20.597732]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.597797] 
[   20.597819] The buggy address belongs to the physical page:
[   20.597854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.597907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.597957] page_type: f5(slab)
[   20.597995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.598124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.598205] page dumped because: kasan: bad access detected
[   20.598269] 
[   20.598291] Memory state around the buggy address:
[   20.598355]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.598418]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.598534] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.598621]                                      ^
[   20.599005]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.599091]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.599219] ==================================================================
[   20.514072] ==================================================================
[   20.514307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.514383] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.514434] 
[   20.514553] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.514654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.514708] Hardware name: linux,dummy-virt (DT)
[   20.514756] Call trace:
[   20.514809]  show_stack+0x20/0x38 (C)
[   20.514881]  dump_stack_lvl+0x8c/0xd0
[   20.514933]  print_report+0x118/0x608
[   20.515005]  kasan_report+0xdc/0x128
[   20.515143]  kasan_check_range+0x100/0x1a8
[   20.515282]  __kasan_check_write+0x20/0x30
[   20.515351]  kasan_atomics_helper+0x12d8/0x4858
[   20.515427]  kasan_atomics+0x198/0x2e0
[   20.515486]  kunit_try_run_case+0x170/0x3f0
[   20.515563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.515643]  kthread+0x328/0x630
[   20.515743]  ret_from_fork+0x10/0x20
[   20.515809] 
[   20.515848] Allocated by task 267:
[   20.515886]  kasan_save_stack+0x3c/0x68
[   20.515927]  kasan_save_track+0x20/0x40
[   20.515966]  kasan_save_alloc_info+0x40/0x58
[   20.516006]  __kasan_kmalloc+0xd4/0xd8
[   20.516044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.516247]  kasan_atomics+0xb8/0x2e0
[   20.516393]  kunit_try_run_case+0x170/0x3f0
[   20.516464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.516514]  kthread+0x328/0x630
[   20.516599]  ret_from_fork+0x10/0x20
[   20.516675] 
[   20.516917] The buggy address belongs to the object at fff00000c6e72400
[   20.516917]  which belongs to the cache kmalloc-64 of size 64
[   20.517029] The buggy address is located 0 bytes to the right of
[   20.517029]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.517135] 
[   20.517166] The buggy address belongs to the physical page:
[   20.517209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.517278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.517354] page_type: f5(slab)
[   20.517395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.517614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.517659] page dumped because: kasan: bad access detected
[   20.517695] 
[   20.517717] Memory state around the buggy address:
[   20.517751]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.517796]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.517841] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.517881]                                      ^
[   20.517917]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.518224]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.518299] ==================================================================
[   20.541972] ==================================================================
[   20.542021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.542071] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.542123] 
[   20.542152] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.542236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.542263] Hardware name: linux,dummy-virt (DT)
[   20.542296] Call trace:
[   20.542319]  show_stack+0x20/0x38 (C)
[   20.542429]  dump_stack_lvl+0x8c/0xd0
[   20.542505]  print_report+0x118/0x608
[   20.542582]  kasan_report+0xdc/0x128
[   20.542634]  kasan_check_range+0x100/0x1a8
[   20.542685]  __kasan_check_write+0x20/0x30
[   20.542734]  kasan_atomics_helper+0x154c/0x4858
[   20.542782]  kasan_atomics+0x198/0x2e0
[   20.542828]  kunit_try_run_case+0x170/0x3f0
[   20.542884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.542947]  kthread+0x328/0x630
[   20.542995]  ret_from_fork+0x10/0x20
[   20.543042] 
[   20.543072] Allocated by task 267:
[   20.543101]  kasan_save_stack+0x3c/0x68
[   20.543143]  kasan_save_track+0x20/0x40
[   20.543181]  kasan_save_alloc_info+0x40/0x58
[   20.543222]  __kasan_kmalloc+0xd4/0xd8
[   20.543260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.543307]  kasan_atomics+0xb8/0x2e0
[   20.543363]  kunit_try_run_case+0x170/0x3f0
[   20.543408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.543454]  kthread+0x328/0x630
[   20.543491]  ret_from_fork+0x10/0x20
[   20.543539] 
[   20.543569] The buggy address belongs to the object at fff00000c6e72400
[   20.543569]  which belongs to the cache kmalloc-64 of size 64
[   20.543630] The buggy address is located 0 bytes to the right of
[   20.543630]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.543701] 
[   20.543723] The buggy address belongs to the physical page:
[   20.543756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.543809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.543864] page_type: f5(slab)
[   20.543902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.543955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.543998] page dumped because: kasan: bad access detected
[   20.544031] 
[   20.544052] Memory state around the buggy address:
[   20.544087]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.544133]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.544178] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.544219]                                      ^
[   20.544254]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.544297]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.544347] ==================================================================
[   20.498466] ==================================================================
[   20.498518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.498885] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.498951] 
[   20.499202] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.499315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.499374] Hardware name: linux,dummy-virt (DT)
[   20.499408] Call trace:
[   20.499456]  show_stack+0x20/0x38 (C)
[   20.499684]  dump_stack_lvl+0x8c/0xd0
[   20.499769]  print_report+0x118/0x608
[   20.499846]  kasan_report+0xdc/0x128
[   20.499901]  kasan_check_range+0x100/0x1a8
[   20.499956]  __kasan_check_write+0x20/0x30
[   20.500007]  kasan_atomics_helper+0x1190/0x4858
[   20.500054]  kasan_atomics+0x198/0x2e0
[   20.500272]  kunit_try_run_case+0x170/0x3f0
[   20.500389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.500510]  kthread+0x328/0x630
[   20.500625]  ret_from_fork+0x10/0x20
[   20.500880] 
[   20.500942] Allocated by task 267:
[   20.501002]  kasan_save_stack+0x3c/0x68
[   20.501123]  kasan_save_track+0x20/0x40
[   20.501224]  kasan_save_alloc_info+0x40/0x58
[   20.501365]  __kasan_kmalloc+0xd4/0xd8
[   20.501434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.501517]  kasan_atomics+0xb8/0x2e0
[   20.501627]  kunit_try_run_case+0x170/0x3f0
[   20.501685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.501737]  kthread+0x328/0x630
[   20.501802]  ret_from_fork+0x10/0x20
[   20.501840] 
[   20.501862] The buggy address belongs to the object at fff00000c6e72400
[   20.501862]  which belongs to the cache kmalloc-64 of size 64
[   20.502169] The buggy address is located 0 bytes to the right of
[   20.502169]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.502273] 
[   20.502342] The buggy address belongs to the physical page:
[   20.502414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.502698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.502795] page_type: f5(slab)
[   20.502918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.503021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.503135] page dumped because: kasan: bad access detected
[   20.503171] 
[   20.503193] Memory state around the buggy address:
[   20.503227]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.503284]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.503330] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.503381]                                      ^
[   20.503418]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.503463]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.503514] ==================================================================
[   20.473249] ==================================================================
[   20.473300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.473366] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.473418] 
[   20.473494] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.473597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.473628] Hardware name: linux,dummy-virt (DT)
[   20.473942] Call trace:
[   20.473984]  show_stack+0x20/0x38 (C)
[   20.474055]  dump_stack_lvl+0x8c/0xd0
[   20.474106]  print_report+0x118/0x608
[   20.474152]  kasan_report+0xdc/0x128
[   20.474223]  kasan_check_range+0x100/0x1a8
[   20.474274]  __kasan_check_write+0x20/0x30
[   20.474351]  kasan_atomics_helper+0xf88/0x4858
[   20.474419]  kasan_atomics+0x198/0x2e0
[   20.474493]  kunit_try_run_case+0x170/0x3f0
[   20.474572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.474647]  kthread+0x328/0x630
[   20.474703]  ret_from_fork+0x10/0x20
[   20.474774] 
[   20.474795] Allocated by task 267:
[   20.474827]  kasan_save_stack+0x3c/0x68
[   20.474874]  kasan_save_track+0x20/0x40
[   20.474913]  kasan_save_alloc_info+0x40/0x58
[   20.475055]  __kasan_kmalloc+0xd4/0xd8
[   20.475098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.475142]  kasan_atomics+0xb8/0x2e0
[   20.475180]  kunit_try_run_case+0x170/0x3f0
[   20.475222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.475380]  kthread+0x328/0x630
[   20.475564]  ret_from_fork+0x10/0x20
[   20.475616] 
[   20.475638] The buggy address belongs to the object at fff00000c6e72400
[   20.475638]  which belongs to the cache kmalloc-64 of size 64
[   20.475699] The buggy address is located 0 bytes to the right of
[   20.475699]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.475764] 
[   20.475798] The buggy address belongs to the physical page:
[   20.475831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.475886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.475938] page_type: f5(slab)
[   20.475977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.476030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.476074] page dumped because: kasan: bad access detected
[   20.476108] 
[   20.476128] Memory state around the buggy address:
[   20.476163]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476207]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476252] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.476293]                                      ^
[   20.476698]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.476910]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.477018] ==================================================================
[   20.433151] ==================================================================
[   20.433200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.433369] Write of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.433426] 
[   20.433547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.433676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.433723] Hardware name: linux,dummy-virt (DT)
[   20.433758] Call trace:
[   20.433809]  show_stack+0x20/0x38 (C)
[   20.433860]  dump_stack_lvl+0x8c/0xd0
[   20.434036]  print_report+0x118/0x608
[   20.434114]  kasan_report+0xdc/0x128
[   20.434190]  kasan_check_range+0x100/0x1a8
[   20.434280]  __kasan_check_write+0x20/0x30
[   20.434353]  kasan_atomics_helper+0xd3c/0x4858
[   20.434421]  kasan_atomics+0x198/0x2e0
[   20.434485]  kunit_try_run_case+0x170/0x3f0
[   20.434536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.434592]  kthread+0x328/0x630
[   20.434638]  ret_from_fork+0x10/0x20
[   20.434686] 
[   20.434706] Allocated by task 267:
[   20.434737]  kasan_save_stack+0x3c/0x68
[   20.434778]  kasan_save_track+0x20/0x40
[   20.434914]  kasan_save_alloc_info+0x40/0x58
[   20.434960]  __kasan_kmalloc+0xd4/0xd8
[   20.435116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.435170]  kasan_atomics+0xb8/0x2e0
[   20.435237]  kunit_try_run_case+0x170/0x3f0
[   20.435403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.435525]  kthread+0x328/0x630
[   20.435571]  ret_from_fork+0x10/0x20
[   20.435649] 
[   20.435710] The buggy address belongs to the object at fff00000c6e72400
[   20.435710]  which belongs to the cache kmalloc-64 of size 64
[   20.435771] The buggy address is located 0 bytes to the right of
[   20.435771]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.435835] 
[   20.435858] The buggy address belongs to the physical page:
[   20.435939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.436013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.436065] page_type: f5(slab)
[   20.436121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.436191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.436240] page dumped because: kasan: bad access detected
[   20.436319] 
[   20.436707] Memory state around the buggy address:
[   20.436774]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436819]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.436930] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.437005]                                      ^
[   20.437043]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437227]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.437274] ==================================================================
[   20.482744] ==================================================================
[   20.482797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.482854] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.482905] 
[   20.482936] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.483027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.483055] Hardware name: linux,dummy-virt (DT)
[   20.483088] Call trace:
[   20.483111]  show_stack+0x20/0x38 (C)
[   20.483161]  dump_stack_lvl+0x8c/0xd0
[   20.483209]  print_report+0x118/0x608
[   20.483256]  kasan_report+0xdc/0x128
[   20.483302]  kasan_check_range+0x100/0x1a8
[   20.483364]  __kasan_check_write+0x20/0x30
[   20.483422]  kasan_atomics_helper+0x1058/0x4858
[   20.483470]  kasan_atomics+0x198/0x2e0
[   20.483516]  kunit_try_run_case+0x170/0x3f0
[   20.483567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.483632]  kthread+0x328/0x630
[   20.483680]  ret_from_fork+0x10/0x20
[   20.483738] 
[   20.483759] Allocated by task 267:
[   20.483788]  kasan_save_stack+0x3c/0x68
[   20.483829]  kasan_save_track+0x20/0x40
[   20.483867]  kasan_save_alloc_info+0x40/0x58
[   20.483908]  __kasan_kmalloc+0xd4/0xd8
[   20.483945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.483995]  kasan_atomics+0xb8/0x2e0
[   20.484032]  kunit_try_run_case+0x170/0x3f0
[   20.484075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.484128]  kthread+0x328/0x630
[   20.484166]  ret_from_fork+0x10/0x20
[   20.484803] 
[   20.484875] The buggy address belongs to the object at fff00000c6e72400
[   20.484875]  which belongs to the cache kmalloc-64 of size 64
[   20.485023] The buggy address is located 0 bytes to the right of
[   20.485023]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.485224] 
[   20.485363] The buggy address belongs to the physical page:
[   20.485443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.485518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.485606] page_type: f5(slab)
[   20.485691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.485755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.485817] page dumped because: kasan: bad access detected
[   20.485851] 
[   20.485872] Memory state around the buggy address:
[   20.486017]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.486137]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.486216] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.486326]                                      ^
[   20.486460]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.486547]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.486605] ==================================================================
[   20.582072] ==================================================================
[   20.582120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.582257] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.582420] 
[   20.582476] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.582562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.582608] Hardware name: linux,dummy-virt (DT)
[   20.582658] Call trace:
[   20.582769]  show_stack+0x20/0x38 (C)
[   20.582938]  dump_stack_lvl+0x8c/0xd0
[   20.583001]  print_report+0x118/0x608
[   20.584712]  kasan_report+0xdc/0x128
[   20.584799]  __asan_report_load8_noabort+0x20/0x30
[   20.584854]  kasan_atomics_helper+0x3e20/0x4858
[   20.585372]  kasan_atomics+0x198/0x2e0
[   20.585430]  kunit_try_run_case+0x170/0x3f0
[   20.586167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.587159]  kthread+0x328/0x630
[   20.587231]  ret_from_fork+0x10/0x20
[   20.587283] 
[   20.587326] Allocated by task 267:
[   20.587802]  kasan_save_stack+0x3c/0x68
[   20.587858]  kasan_save_track+0x20/0x40
[   20.589074]  kasan_save_alloc_info+0x40/0x58
[   20.589189]  __kasan_kmalloc+0xd4/0xd8
[   20.589874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.589930]  kasan_atomics+0xb8/0x2e0
[   20.589967]  kunit_try_run_case+0x170/0x3f0
[   20.590008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.590057]  kthread+0x328/0x630
[   20.590096]  ret_from_fork+0x10/0x20
[   20.590133] 
[   20.590157] The buggy address belongs to the object at fff00000c6e72400
[   20.590157]  which belongs to the cache kmalloc-64 of size 64
[   20.590217] The buggy address is located 0 bytes to the right of
[   20.590217]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.591538] 
[   20.591567] The buggy address belongs to the physical page:
[   20.591605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.593027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.593093] page_type: f5(slab)
[   20.593147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.593202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.593564] page dumped because: kasan: bad access detected
[   20.593681] 
[   20.593759] Memory state around the buggy address:
[   20.593898]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.593993]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.594046] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.594099]                                      ^
[   20.594135]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594188]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594231] ==================================================================
[   20.509847] ==================================================================
[   20.509941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.509995] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.510047] 
[   20.510122] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.510224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.510278] Hardware name: linux,dummy-virt (DT)
[   20.510326] Call trace:
[   20.510386]  show_stack+0x20/0x38 (C)
[   20.510442]  dump_stack_lvl+0x8c/0xd0
[   20.510494]  print_report+0x118/0x608
[   20.510540]  kasan_report+0xdc/0x128
[   20.510716]  kasan_check_range+0x100/0x1a8
[   20.510771]  __kasan_check_write+0x20/0x30
[   20.510819]  kasan_atomics_helper+0x126c/0x4858
[   20.510982]  kasan_atomics+0x198/0x2e0
[   20.511047]  kunit_try_run_case+0x170/0x3f0
[   20.511120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.511200]  kthread+0x328/0x630
[   20.511444]  ret_from_fork+0x10/0x20
[   20.511511] 
[   20.511563] Allocated by task 267:
[   20.511600]  kasan_save_stack+0x3c/0x68
[   20.511658]  kasan_save_track+0x20/0x40
[   20.511713]  kasan_save_alloc_info+0x40/0x58
[   20.511781]  __kasan_kmalloc+0xd4/0xd8
[   20.511847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.511910]  kasan_atomics+0xb8/0x2e0
[   20.511962]  kunit_try_run_case+0x170/0x3f0
[   20.512009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.512074]  kthread+0x328/0x630
[   20.512136]  ret_from_fork+0x10/0x20
[   20.512175] 
[   20.512198] The buggy address belongs to the object at fff00000c6e72400
[   20.512198]  which belongs to the cache kmalloc-64 of size 64
[   20.512268] The buggy address is located 0 bytes to the right of
[   20.512268]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.512481] 
[   20.512574] The buggy address belongs to the physical page:
[   20.512642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.512710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.512768] page_type: f5(slab)
[   20.512809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.512862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.512905] page dumped because: kasan: bad access detected
[   20.512939] 
[   20.512982] Memory state around the buggy address:
[   20.513016]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.513062]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.513293] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.513349]                                      ^
[   20.513386]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.513429]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.513468] ==================================================================
[   20.446721] ==================================================================
[   20.446789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.446847] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.446898] 
[   20.447089] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.447200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.447242] Hardware name: linux,dummy-virt (DT)
[   20.447281] Call trace:
[   20.447306]  show_stack+0x20/0x38 (C)
[   20.447394]  dump_stack_lvl+0x8c/0xd0
[   20.447471]  print_report+0x118/0x608
[   20.447521]  kasan_report+0xdc/0x128
[   20.447586]  __asan_report_load8_noabort+0x20/0x30
[   20.447641]  kasan_atomics_helper+0x3f58/0x4858
[   20.447689]  kasan_atomics+0x198/0x2e0
[   20.447756]  kunit_try_run_case+0x170/0x3f0
[   20.447813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.447871]  kthread+0x328/0x630
[   20.447917]  ret_from_fork+0x10/0x20
[   20.448098] 
[   20.448139] Allocated by task 267:
[   20.448187]  kasan_save_stack+0x3c/0x68
[   20.448329]  kasan_save_track+0x20/0x40
[   20.448409]  kasan_save_alloc_info+0x40/0x58
[   20.448452]  __kasan_kmalloc+0xd4/0xd8
[   20.448488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.448661]  kasan_atomics+0xb8/0x2e0
[   20.448734]  kunit_try_run_case+0x170/0x3f0
[   20.448812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.448876]  kthread+0x328/0x630
[   20.448916]  ret_from_fork+0x10/0x20
[   20.448954] 
[   20.448975] The buggy address belongs to the object at fff00000c6e72400
[   20.448975]  which belongs to the cache kmalloc-64 of size 64
[   20.449035] The buggy address is located 0 bytes to the right of
[   20.449035]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.449101] 
[   20.449145] The buggy address belongs to the physical page:
[   20.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.449249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.449620] page_type: f5(slab)
[   20.449669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.449723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.449766] page dumped because: kasan: bad access detected
[   20.449800] 
[   20.449820] Memory state around the buggy address:
[   20.449854]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.449900]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.450188] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.450273]                                      ^
[   20.450371]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450451]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.450727] ==================================================================
[   20.437838] ==================================================================
[   20.437919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.438205] Read of size 4 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.438289] 
[   20.438323] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.438456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.438505] Hardware name: linux,dummy-virt (DT)
[   20.438538] Call trace:
[   20.438562]  show_stack+0x20/0x38 (C)
[   20.438629]  dump_stack_lvl+0x8c/0xd0
[   20.438680]  print_report+0x118/0x608
[   20.438748]  kasan_report+0xdc/0x128
[   20.438824]  __asan_report_load4_noabort+0x20/0x30
[   20.438893]  kasan_atomics_helper+0x3e04/0x4858
[   20.438960]  kasan_atomics+0x198/0x2e0
[   20.439007]  kunit_try_run_case+0x170/0x3f0
[   20.439058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.439112]  kthread+0x328/0x630
[   20.439162]  ret_from_fork+0x10/0x20
[   20.439383] 
[   20.439444] Allocated by task 267:
[   20.439479]  kasan_save_stack+0x3c/0x68
[   20.439557]  kasan_save_track+0x20/0x40
[   20.439614]  kasan_save_alloc_info+0x40/0x58
[   20.439655]  __kasan_kmalloc+0xd4/0xd8
[   20.439692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.439885]  kasan_atomics+0xb8/0x2e0
[   20.439994]  kunit_try_run_case+0x170/0x3f0
[   20.440060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.440125]  kthread+0x328/0x630
[   20.440183]  ret_from_fork+0x10/0x20
[   20.440259] 
[   20.440379] The buggy address belongs to the object at fff00000c6e72400
[   20.440379]  which belongs to the cache kmalloc-64 of size 64
[   20.440485] The buggy address is located 0 bytes to the right of
[   20.440485]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.440574] 
[   20.440643] The buggy address belongs to the physical page:
[   20.440713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.440775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.440864] page_type: f5(slab)
[   20.440969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.441021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.441064] page dumped because: kasan: bad access detected
[   20.441105] 
[   20.441125] Memory state around the buggy address:
[   20.441159]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.441206]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.441250] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.441291]                                      ^
[   20.441325]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.441380]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.441609] ==================================================================
[   20.556962] ==================================================================
[   20.557015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.557090] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.557227] 
[   20.557383] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.557512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.557561] Hardware name: linux,dummy-virt (DT)
[   20.557609] Call trace:
[   20.557635]  show_stack+0x20/0x38 (C)
[   20.557692]  dump_stack_lvl+0x8c/0xd0
[   20.557763]  print_report+0x118/0x608
[   20.557828]  kasan_report+0xdc/0x128
[   20.557894]  kasan_check_range+0x100/0x1a8
[   20.557954]  __kasan_check_write+0x20/0x30
[   20.558020]  kasan_atomics_helper+0x1644/0x4858
[   20.558095]  kasan_atomics+0x198/0x2e0
[   20.558142]  kunit_try_run_case+0x170/0x3f0
[   20.558195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.558252]  kthread+0x328/0x630
[   20.558300]  ret_from_fork+0x10/0x20
[   20.558362] 
[   20.558383] Allocated by task 267:
[   20.558414]  kasan_save_stack+0x3c/0x68
[   20.558663]  kasan_save_track+0x20/0x40
[   20.558758]  kasan_save_alloc_info+0x40/0x58
[   20.558878]  __kasan_kmalloc+0xd4/0xd8
[   20.558954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.559201]  kasan_atomics+0xb8/0x2e0
[   20.559267]  kunit_try_run_case+0x170/0x3f0
[   20.559357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.559409]  kthread+0x328/0x630
[   20.559447]  ret_from_fork+0x10/0x20
[   20.559503] 
[   20.559573] The buggy address belongs to the object at fff00000c6e72400
[   20.559573]  which belongs to the cache kmalloc-64 of size 64
[   20.559645] The buggy address is located 0 bytes to the right of
[   20.559645]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.559758] 
[   20.559843] The buggy address belongs to the physical page:
[   20.559931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.559987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.560036] page_type: f5(slab)
[   20.560293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.560377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.560472] page dumped because: kasan: bad access detected
[   20.560541] 
[   20.560620] Memory state around the buggy address:
[   20.560656]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.560702]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.560747] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.560797]                                      ^
[   20.560834]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.560888]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.560936] ==================================================================
[   20.528807] ==================================================================
[   20.528861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.528917] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.528969] 
[   20.529019] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.529121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.529167] Hardware name: linux,dummy-virt (DT)
[   20.529205] Call trace:
[   20.529232]  show_stack+0x20/0x38 (C)
[   20.529371]  dump_stack_lvl+0x8c/0xd0
[   20.529430]  print_report+0x118/0x608
[   20.529476]  kasan_report+0xdc/0x128
[   20.529655]  kasan_check_range+0x100/0x1a8
[   20.529752]  __kasan_check_write+0x20/0x30
[   20.529819]  kasan_atomics_helper+0x1414/0x4858
[   20.529875]  kasan_atomics+0x198/0x2e0
[   20.529939]  kunit_try_run_case+0x170/0x3f0
[   20.530007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.530064]  kthread+0x328/0x630
[   20.530110]  ret_from_fork+0x10/0x20
[   20.530160] 
[   20.530180] Allocated by task 267:
[   20.530211]  kasan_save_stack+0x3c/0x68
[   20.530294]  kasan_save_track+0x20/0x40
[   20.530347]  kasan_save_alloc_info+0x40/0x58
[   20.530387]  __kasan_kmalloc+0xd4/0xd8
[   20.530427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.530469]  kasan_atomics+0xb8/0x2e0
[   20.530601]  kunit_try_run_case+0x170/0x3f0
[   20.530657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.530706]  kthread+0x328/0x630
[   20.530743]  ret_from_fork+0x10/0x20
[   20.530799] 
[   20.530823] The buggy address belongs to the object at fff00000c6e72400
[   20.530823]  which belongs to the cache kmalloc-64 of size 64
[   20.530904] The buggy address is located 0 bytes to the right of
[   20.530904]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.530987] 
[   20.531196] The buggy address belongs to the physical page:
[   20.531265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.531377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.531434] page_type: f5(slab)
[   20.531490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.531585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.531630] page dumped because: kasan: bad access detected
[   20.531664] 
[   20.531685] Memory state around the buggy address:
[   20.531719]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.531796]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.531840] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.531887]                                      ^
[   20.531931]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.531974]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.532013] ==================================================================
[   20.571463] ==================================================================
[   20.571675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.571741] Read of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.571795] 
[   20.572052] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.572159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.572222] Hardware name: linux,dummy-virt (DT)
[   20.572429] Call trace:
[   20.572508]  show_stack+0x20/0x38 (C)
[   20.572603]  dump_stack_lvl+0x8c/0xd0
[   20.572694]  print_report+0x118/0x608
[   20.572780]  kasan_report+0xdc/0x128
[   20.572870]  __asan_report_load8_noabort+0x20/0x30
[   20.572970]  kasan_atomics_helper+0x3e10/0x4858
[   20.573058]  kasan_atomics+0x198/0x2e0
[   20.573165]  kunit_try_run_case+0x170/0x3f0
[   20.573218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.573275]  kthread+0x328/0x630
[   20.573322]  ret_from_fork+0x10/0x20
[   20.573384] 
[   20.573713] Allocated by task 267:
[   20.573800]  kasan_save_stack+0x3c/0x68
[   20.573888]  kasan_save_track+0x20/0x40
[   20.573964]  kasan_save_alloc_info+0x40/0x58
[   20.574045]  __kasan_kmalloc+0xd4/0xd8
[   20.574287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.574418]  kasan_atomics+0xb8/0x2e0
[   20.574486]  kunit_try_run_case+0x170/0x3f0
[   20.574563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574642]  kthread+0x328/0x630
[   20.574728]  ret_from_fork+0x10/0x20
[   20.574818] 
[   20.574871] The buggy address belongs to the object at fff00000c6e72400
[   20.574871]  which belongs to the cache kmalloc-64 of size 64
[   20.574961] The buggy address is located 0 bytes to the right of
[   20.574961]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.575028] 
[   20.575235] The buggy address belongs to the physical page:
[   20.575279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.575408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.575506] page_type: f5(slab)
[   20.575581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.575662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.575866] page dumped because: kasan: bad access detected
[   20.575965] 
[   20.576047] Memory state around the buggy address:
[   20.576113]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576160]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576213] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.576481]                                      ^
[   20.576550]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576615]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.576697] ==================================================================
[   20.519234] ==================================================================
[   20.519288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.519454] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.519549] 
[   20.519595] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.519709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.519801] Hardware name: linux,dummy-virt (DT)
[   20.519833] Call trace:
[   20.519859]  show_stack+0x20/0x38 (C)
[   20.519908]  dump_stack_lvl+0x8c/0xd0
[   20.519959]  print_report+0x118/0x608
[   20.520005]  kasan_report+0xdc/0x128
[   20.520285]  kasan_check_range+0x100/0x1a8
[   20.520443]  __kasan_check_write+0x20/0x30
[   20.520539]  kasan_atomics_helper+0x1384/0x4858
[   20.520784]  kasan_atomics+0x198/0x2e0
[   20.520851]  kunit_try_run_case+0x170/0x3f0
[   20.520924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.520980]  kthread+0x328/0x630
[   20.521028]  ret_from_fork+0x10/0x20
[   20.521078] 
[   20.521099] Allocated by task 267:
[   20.521130]  kasan_save_stack+0x3c/0x68
[   20.521308]  kasan_save_track+0x20/0x40
[   20.521363]  kasan_save_alloc_info+0x40/0x58
[   20.521403]  __kasan_kmalloc+0xd4/0xd8
[   20.521568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.521675]  kasan_atomics+0xb8/0x2e0
[   20.521752]  kunit_try_run_case+0x170/0x3f0
[   20.521840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.521941]  kthread+0x328/0x630
[   20.521980]  ret_from_fork+0x10/0x20
[   20.522149] 
[   20.522223] The buggy address belongs to the object at fff00000c6e72400
[   20.522223]  which belongs to the cache kmalloc-64 of size 64
[   20.522319] The buggy address is located 0 bytes to the right of
[   20.522319]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.522424] 
[   20.522492] The buggy address belongs to the physical page:
[   20.522556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.522640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.522761] page_type: f5(slab)
[   20.522842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.522897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.522941] page dumped because: kasan: bad access detected
[   20.522974] 
[   20.522995] Memory state around the buggy address:
[   20.523253]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.523311]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.523388] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.523466]                                      ^
[   20.523616]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.523837]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.523919] ==================================================================
[   20.532306] ==================================================================
[   20.532377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.532482] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.532571] 
[   20.532638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.532869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.532963] Hardware name: linux,dummy-virt (DT)
[   20.533028] Call trace:
[   20.533083]  show_stack+0x20/0x38 (C)
[   20.533165]  dump_stack_lvl+0x8c/0xd0
[   20.533250]  print_report+0x118/0x608
[   20.533364]  kasan_report+0xdc/0x128
[   20.533461]  kasan_check_range+0x100/0x1a8
[   20.533523]  __kasan_check_write+0x20/0x30
[   20.533573]  kasan_atomics_helper+0x147c/0x4858
[   20.533620]  kasan_atomics+0x198/0x2e0
[   20.533909]  kunit_try_run_case+0x170/0x3f0
[   20.534051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.534156]  kthread+0x328/0x630
[   20.534496]  ret_from_fork+0x10/0x20
[   20.534605] 
[   20.534681] Allocated by task 267:
[   20.534758]  kasan_save_stack+0x3c/0x68
[   20.534831]  kasan_save_track+0x20/0x40
[   20.534948]  kasan_save_alloc_info+0x40/0x58
[   20.535001]  __kasan_kmalloc+0xd4/0xd8
[   20.535038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.535291]  kasan_atomics+0xb8/0x2e0
[   20.535386]  kunit_try_run_case+0x170/0x3f0
[   20.535442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.535488]  kthread+0x328/0x630
[   20.535526]  ret_from_fork+0x10/0x20
[   20.535574] 
[   20.535605] The buggy address belongs to the object at fff00000c6e72400
[   20.535605]  which belongs to the cache kmalloc-64 of size 64
[   20.535681] The buggy address is located 0 bytes to the right of
[   20.535681]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.535747] 
[   20.535784] The buggy address belongs to the physical page:
[   20.535816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.535878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.535926] page_type: f5(slab)
[   20.535964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.536017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.536061] page dumped because: kasan: bad access detected
[   20.536094] 
[   20.536137] Memory state around the buggy address:
[   20.536181]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.536629]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.536717] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.536801]                                      ^
[   20.536858]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.536901]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.536941] ==================================================================
[   20.462558] ==================================================================
[   20.462608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.462675] Write of size 8 at addr fff00000c6e72430 by task kunit_try_catch/267
[   20.462729] 
[   20.462759] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   20.462865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.462893] Hardware name: linux,dummy-virt (DT)
[   20.462926] Call trace:
[   20.462949]  show_stack+0x20/0x38 (C)
[   20.462999]  dump_stack_lvl+0x8c/0xd0
[   20.463047]  print_report+0x118/0x608
[   20.463094]  kasan_report+0xdc/0x128
[   20.463149]  kasan_check_range+0x100/0x1a8
[   20.463208]  __kasan_check_write+0x20/0x30
[   20.463261]  kasan_atomics_helper+0xeb8/0x4858
[   20.463317]  kasan_atomics+0x198/0x2e0
[   20.463672]  kunit_try_run_case+0x170/0x3f0
[   20.463744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.463868]  kthread+0x328/0x630
[   20.463934]  ret_from_fork+0x10/0x20
[   20.464000] 
[   20.464035] Allocated by task 267:
[   20.464070]  kasan_save_stack+0x3c/0x68
[   20.464113]  kasan_save_track+0x20/0x40
[   20.464151]  kasan_save_alloc_info+0x40/0x58
[   20.464382]  __kasan_kmalloc+0xd4/0xd8
[   20.464501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.464567]  kasan_atomics+0xb8/0x2e0
[   20.464662]  kunit_try_run_case+0x170/0x3f0
[   20.464725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.464995]  kthread+0x328/0x630
[   20.465065]  ret_from_fork+0x10/0x20
[   20.465144] 
[   20.465235] The buggy address belongs to the object at fff00000c6e72400
[   20.465235]  which belongs to the cache kmalloc-64 of size 64
[   20.465330] The buggy address is located 0 bytes to the right of
[   20.465330]  allocated 48-byte region [fff00000c6e72400, fff00000c6e72430)
[   20.465473] 
[   20.465581] The buggy address belongs to the physical page:
[   20.465650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e72
[   20.465733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.465784] page_type: f5(slab)
[   20.465824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.465877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.465919] page dumped because: kasan: bad access detected
[   20.465954] 
[   20.465974] Memory state around the buggy address:
[   20.466007]  fff00000c6e72300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.466053]  fff00000c6e72380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.466098] >fff00000c6e72400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.466377]                                      ^
[   20.466474]  fff00000c6e72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.466632]  fff00000c6e72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.466701] ==================================================================

[   14.365354] ==================================================================
[   14.365663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.366340] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.367178] 
[   14.367409] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.367460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.367475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.367498] Call Trace:
[   14.367516]  <TASK>
[   14.367532]  dump_stack_lvl+0x73/0xb0
[   14.367561]  print_report+0xd1/0x650
[   14.367597]  ? __virt_addr_valid+0x1db/0x2d0
[   14.367621]  ? kasan_atomics_helper+0xf10/0x5450
[   14.367646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.367673]  ? kasan_atomics_helper+0xf10/0x5450
[   14.367698]  kasan_report+0x141/0x180
[   14.367724]  ? kasan_atomics_helper+0xf10/0x5450
[   14.367754]  kasan_check_range+0x10c/0x1c0
[   14.367777]  __kasan_check_write+0x18/0x20
[   14.367800]  kasan_atomics_helper+0xf10/0x5450
[   14.367827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.367852]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.367904]  ? kasan_atomics+0x152/0x310
[   14.367931]  kasan_atomics+0x1dc/0x310
[   14.367953]  ? __pfx_kasan_atomics+0x10/0x10
[   14.367977]  ? __pfx_read_tsc+0x10/0x10
[   14.368000]  ? ktime_get_ts64+0x86/0x230
[   14.368028]  kunit_try_run_case+0x1a5/0x480
[   14.368053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.368075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.368102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.368130]  ? __kthread_parkme+0x82/0x180
[   14.368154]  ? preempt_count_sub+0x50/0x80
[   14.368182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.368206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.368232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.368259]  kthread+0x337/0x6f0
[   14.368279]  ? trace_preempt_on+0x20/0xc0
[   14.368304]  ? __pfx_kthread+0x10/0x10
[   14.368325]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.368351]  ? calculate_sigpending+0x7b/0xa0
[   14.368375]  ? __pfx_kthread+0x10/0x10
[   14.368395]  ret_from_fork+0x41/0x80
[   14.368419]  ? __pfx_kthread+0x10/0x10
[   14.368439]  ret_from_fork_asm+0x1a/0x30
[   14.368471]  </TASK>
[   14.368484] 
[   14.379140] Allocated by task 285:
[   14.379307]  kasan_save_stack+0x45/0x70
[   14.379523]  kasan_save_track+0x18/0x40
[   14.379704]  kasan_save_alloc_info+0x3b/0x50
[   14.379857]  __kasan_kmalloc+0xb7/0xc0
[   14.380007]  __kmalloc_cache_noprof+0x189/0x420
[   14.380217]  kasan_atomics+0x95/0x310
[   14.380409]  kunit_try_run_case+0x1a5/0x480
[   14.380661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.381144]  kthread+0x337/0x6f0
[   14.381333]  ret_from_fork+0x41/0x80
[   14.381480]  ret_from_fork_asm+0x1a/0x30
[   14.381702] 
[   14.381804] The buggy address belongs to the object at ffff8881029e6b00
[   14.381804]  which belongs to the cache kmalloc-64 of size 64
[   14.382337] The buggy address is located 0 bytes to the right of
[   14.382337]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.383072] 
[   14.383154] The buggy address belongs to the physical page:
[   14.383332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.383693] flags: 0x200000000000000(node=0|zone=2)
[   14.383947] page_type: f5(slab)
[   14.384244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.384729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.385108] page dumped because: kasan: bad access detected
[   14.385364] 
[   14.385441] Memory state around the buggy address:
[   14.385603]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.385945]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.386270] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.386745]                                      ^
[   14.387030]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387335]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387605] ==================================================================
[   15.091732] ==================================================================
[   15.092440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.093027] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.093742] 
[   15.093865] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.093959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.093974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.093998] Call Trace:
[   15.094015]  <TASK>
[   15.094033]  dump_stack_lvl+0x73/0xb0
[   15.094061]  print_report+0xd1/0x650
[   15.094087]  ? __virt_addr_valid+0x1db/0x2d0
[   15.094111]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.094135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.094160]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.094185]  kasan_report+0x141/0x180
[   15.094210]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.094240]  kasan_check_range+0x10c/0x1c0
[   15.094262]  __kasan_check_write+0x18/0x20
[   15.094285]  kasan_atomics_helper+0x1f43/0x5450
[   15.094310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.094336]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.094360]  ? kasan_atomics+0x152/0x310
[   15.094385]  kasan_atomics+0x1dc/0x310
[   15.094407]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094431]  ? __pfx_read_tsc+0x10/0x10
[   15.094453]  ? ktime_get_ts64+0x86/0x230
[   15.094480]  kunit_try_run_case+0x1a5/0x480
[   15.094525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.094574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.094602]  ? __kthread_parkme+0x82/0x180
[   15.094627]  ? preempt_count_sub+0x50/0x80
[   15.094655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.094704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.094730]  kthread+0x337/0x6f0
[   15.094749]  ? trace_preempt_on+0x20/0xc0
[   15.094775]  ? __pfx_kthread+0x10/0x10
[   15.094796]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.094822]  ? calculate_sigpending+0x7b/0xa0
[   15.094846]  ? __pfx_kthread+0x10/0x10
[   15.094867]  ret_from_fork+0x41/0x80
[   15.094903]  ? __pfx_kthread+0x10/0x10
[   15.094924]  ret_from_fork_asm+0x1a/0x30
[   15.094957]  </TASK>
[   15.094969] 
[   15.104028] Allocated by task 285:
[   15.104166]  kasan_save_stack+0x45/0x70
[   15.104404]  kasan_save_track+0x18/0x40
[   15.104713]  kasan_save_alloc_info+0x3b/0x50
[   15.104951]  __kasan_kmalloc+0xb7/0xc0
[   15.105136]  __kmalloc_cache_noprof+0x189/0x420
[   15.105333]  kasan_atomics+0x95/0x310
[   15.105545]  kunit_try_run_case+0x1a5/0x480
[   15.105757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106000]  kthread+0x337/0x6f0
[   15.106194]  ret_from_fork+0x41/0x80
[   15.106400]  ret_from_fork_asm+0x1a/0x30
[   15.106631] 
[   15.106707] The buggy address belongs to the object at ffff8881029e6b00
[   15.106707]  which belongs to the cache kmalloc-64 of size 64
[   15.107211] The buggy address is located 0 bytes to the right of
[   15.107211]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.107762] 
[   15.107852] The buggy address belongs to the physical page:
[   15.108138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.108552] flags: 0x200000000000000(node=0|zone=2)
[   15.108747] page_type: f5(slab)
[   15.108869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.109223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.109546] page dumped because: kasan: bad access detected
[   15.109881] 
[   15.110000] Memory state around the buggy address:
[   15.110198]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.110495]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.110849] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.111206]                                      ^
[   15.111433]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111854]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112114] ==================================================================
[   15.112500] ==================================================================
[   15.112862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.113463] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.113857] 
[   15.113985] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.114033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114069] Call Trace:
[   15.114086]  <TASK>
[   15.114102]  dump_stack_lvl+0x73/0xb0
[   15.114129]  print_report+0xd1/0x650
[   15.114155]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114179]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.114204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114230]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.114255]  kasan_report+0x141/0x180
[   15.114279]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.114331]  __asan_report_load8_noabort+0x18/0x20
[   15.114356]  kasan_atomics_helper+0x4f71/0x5450
[   15.114383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114424]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.114448]  ? kasan_atomics+0x152/0x310
[   15.114487]  kasan_atomics+0x1dc/0x310
[   15.114519]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114542]  ? __pfx_read_tsc+0x10/0x10
[   15.114565]  ? ktime_get_ts64+0x86/0x230
[   15.114611]  kunit_try_run_case+0x1a5/0x480
[   15.114635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.114700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114744]  ? __kthread_parkme+0x82/0x180
[   15.114768]  ? preempt_count_sub+0x50/0x80
[   15.114796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.114846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.114885]  kthread+0x337/0x6f0
[   15.114905]  ? trace_preempt_on+0x20/0xc0
[   15.114930]  ? __pfx_kthread+0x10/0x10
[   15.114950]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.114975]  ? calculate_sigpending+0x7b/0xa0
[   15.114999]  ? __pfx_kthread+0x10/0x10
[   15.115020]  ret_from_fork+0x41/0x80
[   15.115043]  ? __pfx_kthread+0x10/0x10
[   15.115064]  ret_from_fork_asm+0x1a/0x30
[   15.115096]  </TASK>
[   15.115126] 
[   15.123187] Allocated by task 285:
[   15.123323]  kasan_save_stack+0x45/0x70
[   15.123476]  kasan_save_track+0x18/0x40
[   15.123713]  kasan_save_alloc_info+0x3b/0x50
[   15.123966]  __kasan_kmalloc+0xb7/0xc0
[   15.124183]  __kmalloc_cache_noprof+0x189/0x420
[   15.124412]  kasan_atomics+0x95/0x310
[   15.124642]  kunit_try_run_case+0x1a5/0x480
[   15.124866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.125142]  kthread+0x337/0x6f0
[   15.125317]  ret_from_fork+0x41/0x80
[   15.125505]  ret_from_fork_asm+0x1a/0x30
[   15.125717] 
[   15.125816] The buggy address belongs to the object at ffff8881029e6b00
[   15.125816]  which belongs to the cache kmalloc-64 of size 64
[   15.126338] The buggy address is located 0 bytes to the right of
[   15.126338]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.126970] 
[   15.127072] The buggy address belongs to the physical page:
[   15.127349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.127807] flags: 0x200000000000000(node=0|zone=2)
[   15.127991] page_type: f5(slab)
[   15.128118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.128356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.128813] page dumped because: kasan: bad access detected
[   15.129091] 
[   15.129219] Memory state around the buggy address:
[   15.129480]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.129869]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.130373] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.130787]                                      ^
[   15.131017]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131378]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131738] ==================================================================
[   14.066063] ==================================================================
[   14.066350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.066617] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.067253] 
[   14.067374] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.067425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.067440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.067464] Call Trace:
[   14.067483]  <TASK>
[   14.067501]  dump_stack_lvl+0x73/0xb0
[   14.067531]  print_report+0xd1/0x650
[   14.067576]  ? __virt_addr_valid+0x1db/0x2d0
[   14.067601]  ? kasan_atomics_helper+0x860/0x5450
[   14.067626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.067652]  ? kasan_atomics_helper+0x860/0x5450
[   14.067676]  kasan_report+0x141/0x180
[   14.067702]  ? kasan_atomics_helper+0x860/0x5450
[   14.067731]  kasan_check_range+0x10c/0x1c0
[   14.067754]  __kasan_check_write+0x18/0x20
[   14.067777]  kasan_atomics_helper+0x860/0x5450
[   14.067803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.067828]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.067950]  ? kasan_atomics+0x152/0x310
[   14.067978]  kasan_atomics+0x1dc/0x310
[   14.068001]  ? __pfx_kasan_atomics+0x10/0x10
[   14.068025]  ? __pfx_read_tsc+0x10/0x10
[   14.068048]  ? ktime_get_ts64+0x86/0x230
[   14.068077]  kunit_try_run_case+0x1a5/0x480
[   14.068103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.068125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.068152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.068179]  ? __kthread_parkme+0x82/0x180
[   14.068203]  ? preempt_count_sub+0x50/0x80
[   14.068231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.068253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.068280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.068306]  kthread+0x337/0x6f0
[   14.068326]  ? trace_preempt_on+0x20/0xc0
[   14.068351]  ? __pfx_kthread+0x10/0x10
[   14.068374]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.068398]  ? calculate_sigpending+0x7b/0xa0
[   14.068422]  ? __pfx_kthread+0x10/0x10
[   14.068443]  ret_from_fork+0x41/0x80
[   14.068467]  ? __pfx_kthread+0x10/0x10
[   14.068487]  ret_from_fork_asm+0x1a/0x30
[   14.068531]  </TASK>
[   14.068546] 
[   14.076748] Allocated by task 285:
[   14.076954]  kasan_save_stack+0x45/0x70
[   14.077328]  kasan_save_track+0x18/0x40
[   14.077710]  kasan_save_alloc_info+0x3b/0x50
[   14.077977]  __kasan_kmalloc+0xb7/0xc0
[   14.078215]  __kmalloc_cache_noprof+0x189/0x420
[   14.078475]  kasan_atomics+0x95/0x310
[   14.078616]  kunit_try_run_case+0x1a5/0x480
[   14.078767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.079000]  kthread+0x337/0x6f0
[   14.079176]  ret_from_fork+0x41/0x80
[   14.079417]  ret_from_fork_asm+0x1a/0x30
[   14.079710] 
[   14.079790] The buggy address belongs to the object at ffff8881029e6b00
[   14.079790]  which belongs to the cache kmalloc-64 of size 64
[   14.080300] The buggy address is located 0 bytes to the right of
[   14.080300]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.081346] 
[   14.081466] The buggy address belongs to the physical page:
[   14.081800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.082180] flags: 0x200000000000000(node=0|zone=2)
[   14.082439] page_type: f5(slab)
[   14.082627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.083049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.083341] page dumped because: kasan: bad access detected
[   14.083645] 
[   14.083744] Memory state around the buggy address:
[   14.084044]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.084345]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.084649] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.085171]                                      ^
[   14.085347]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.085570]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.085870] ==================================================================
[   15.132229] ==================================================================
[   15.132472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.132885] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.133228] 
[   15.133340] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.133414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.133428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.133450] Call Trace:
[   15.133482]  <TASK>
[   15.133498]  dump_stack_lvl+0x73/0xb0
[   15.133524]  print_report+0xd1/0x650
[   15.133577]  ? __virt_addr_valid+0x1db/0x2d0
[   15.133615]  ? kasan_atomics_helper+0x2006/0x5450
[   15.133653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.133692]  ? kasan_atomics_helper+0x2006/0x5450
[   15.133730]  kasan_report+0x141/0x180
[   15.133756]  ? kasan_atomics_helper+0x2006/0x5450
[   15.133785]  kasan_check_range+0x10c/0x1c0
[   15.133808]  __kasan_check_write+0x18/0x20
[   15.133831]  kasan_atomics_helper+0x2006/0x5450
[   15.133857]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.133892]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.133917]  ? kasan_atomics+0x152/0x310
[   15.133942]  kasan_atomics+0x1dc/0x310
[   15.133964]  ? __pfx_kasan_atomics+0x10/0x10
[   15.133988]  ? __pfx_read_tsc+0x10/0x10
[   15.134010]  ? ktime_get_ts64+0x86/0x230
[   15.134037]  kunit_try_run_case+0x1a5/0x480
[   15.134061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.134109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.134136]  ? __kthread_parkme+0x82/0x180
[   15.134160]  ? preempt_count_sub+0x50/0x80
[   15.134187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.134210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.134236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.134263]  kthread+0x337/0x6f0
[   15.134283]  ? trace_preempt_on+0x20/0xc0
[   15.134309]  ? __pfx_kthread+0x10/0x10
[   15.134329]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.134354]  ? calculate_sigpending+0x7b/0xa0
[   15.134378]  ? __pfx_kthread+0x10/0x10
[   15.134399]  ret_from_fork+0x41/0x80
[   15.134422]  ? __pfx_kthread+0x10/0x10
[   15.134443]  ret_from_fork_asm+0x1a/0x30
[   15.134475]  </TASK>
[   15.134487] 
[   15.142921] Allocated by task 285:
[   15.143142]  kasan_save_stack+0x45/0x70
[   15.143374]  kasan_save_track+0x18/0x40
[   15.143586]  kasan_save_alloc_info+0x3b/0x50
[   15.143763]  __kasan_kmalloc+0xb7/0xc0
[   15.143914]  __kmalloc_cache_noprof+0x189/0x420
[   15.144171]  kasan_atomics+0x95/0x310
[   15.144365]  kunit_try_run_case+0x1a5/0x480
[   15.144570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.144890]  kthread+0x337/0x6f0
[   15.145105]  ret_from_fork+0x41/0x80
[   15.145305]  ret_from_fork_asm+0x1a/0x30
[   15.145504] 
[   15.145603] The buggy address belongs to the object at ffff8881029e6b00
[   15.145603]  which belongs to the cache kmalloc-64 of size 64
[   15.146369] The buggy address is located 0 bytes to the right of
[   15.146369]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.146737] 
[   15.146813] The buggy address belongs to the physical page:
[   15.147227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.147633] flags: 0x200000000000000(node=0|zone=2)
[   15.147972] page_type: f5(slab)
[   15.148366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.148809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.149169] page dumped because: kasan: bad access detected
[   15.149388] 
[   15.149460] Memory state around the buggy address:
[   15.149855]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.150284]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.150647] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.150867]                                      ^
[   15.151032]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151286]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.151808] ==================================================================
[   14.732677] ==================================================================
[   14.732966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.733691] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.734247] 
[   14.734387] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.734503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.734528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.734551] Call Trace:
[   14.734569]  <TASK>
[   14.734587]  dump_stack_lvl+0x73/0xb0
[   14.734617]  print_report+0xd1/0x650
[   14.734643]  ? __virt_addr_valid+0x1db/0x2d0
[   14.734667]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.734691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.734717]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.734742]  kasan_report+0x141/0x180
[   14.734768]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.734797]  kasan_check_range+0x10c/0x1c0
[   14.734821]  __kasan_check_write+0x18/0x20
[   14.734844]  kasan_atomics_helper+0x15b6/0x5450
[   14.734869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.734908]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.734933]  ? kasan_atomics+0x152/0x310
[   14.734959]  kasan_atomics+0x1dc/0x310
[   14.734981]  ? __pfx_kasan_atomics+0x10/0x10
[   14.735180]  ? __pfx_read_tsc+0x10/0x10
[   14.735209]  ? ktime_get_ts64+0x86/0x230
[   14.735240]  kunit_try_run_case+0x1a5/0x480
[   14.735265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.735315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.735342]  ? __kthread_parkme+0x82/0x180
[   14.735366]  ? preempt_count_sub+0x50/0x80
[   14.735395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.735446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.735472]  kthread+0x337/0x6f0
[   14.735491]  ? trace_preempt_on+0x20/0xc0
[   14.735530]  ? __pfx_kthread+0x10/0x10
[   14.735551]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.735581]  ? calculate_sigpending+0x7b/0xa0
[   14.735607]  ? __pfx_kthread+0x10/0x10
[   14.735628]  ret_from_fork+0x41/0x80
[   14.735651]  ? __pfx_kthread+0x10/0x10
[   14.735672]  ret_from_fork_asm+0x1a/0x30
[   14.735705]  </TASK>
[   14.735718] 
[   14.746174] Allocated by task 285:
[   14.746556]  kasan_save_stack+0x45/0x70
[   14.746774]  kasan_save_track+0x18/0x40
[   14.747011]  kasan_save_alloc_info+0x3b/0x50
[   14.747384]  __kasan_kmalloc+0xb7/0xc0
[   14.747584]  __kmalloc_cache_noprof+0x189/0x420
[   14.747783]  kasan_atomics+0x95/0x310
[   14.748025]  kunit_try_run_case+0x1a5/0x480
[   14.748195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748438]  kthread+0x337/0x6f0
[   14.748677]  ret_from_fork+0x41/0x80
[   14.748816]  ret_from_fork_asm+0x1a/0x30
[   14.749043] 
[   14.749149] The buggy address belongs to the object at ffff8881029e6b00
[   14.749149]  which belongs to the cache kmalloc-64 of size 64
[   14.749584] The buggy address is located 0 bytes to the right of
[   14.749584]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.750250] 
[   14.750327] The buggy address belongs to the physical page:
[   14.750558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.750855] flags: 0x200000000000000(node=0|zone=2)
[   14.751174] page_type: f5(slab)
[   14.751345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.751819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.752125] page dumped because: kasan: bad access detected
[   14.752368] 
[   14.752456] Memory state around the buggy address:
[   14.752753]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.752977]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.753281] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.753698]                                      ^
[   14.753850]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754427]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754696] ==================================================================
[   13.752608] ==================================================================
[   13.753421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.753829] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.754258] 
[   13.754384] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.754457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.754470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.754494] Call Trace:
[   13.754509]  <TASK>
[   13.754540]  dump_stack_lvl+0x73/0xb0
[   13.754571]  print_report+0xd1/0x650
[   13.754598]  ? __virt_addr_valid+0x1db/0x2d0
[   13.754623]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.754647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.754672]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.754716]  kasan_report+0x141/0x180
[   13.754742]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.754771]  __asan_report_load4_noabort+0x18/0x20
[   13.754794]  kasan_atomics_helper+0x4bbc/0x5450
[   13.754820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.754913]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.754943]  ? kasan_atomics+0x152/0x310
[   13.754992]  kasan_atomics+0x1dc/0x310
[   13.755014]  ? __pfx_kasan_atomics+0x10/0x10
[   13.755038]  ? __pfx_read_tsc+0x10/0x10
[   13.755060]  ? ktime_get_ts64+0x86/0x230
[   13.755089]  kunit_try_run_case+0x1a5/0x480
[   13.755113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.755151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.755179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.755205]  ? __kthread_parkme+0x82/0x180
[   13.755230]  ? preempt_count_sub+0x50/0x80
[   13.755258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.755280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.755306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.755331]  kthread+0x337/0x6f0
[   13.755349]  ? trace_preempt_on+0x20/0xc0
[   13.755375]  ? __pfx_kthread+0x10/0x10
[   13.755394]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.755418]  ? calculate_sigpending+0x7b/0xa0
[   13.755442]  ? __pfx_kthread+0x10/0x10
[   13.755463]  ret_from_fork+0x41/0x80
[   13.755485]  ? __pfx_kthread+0x10/0x10
[   13.755504]  ret_from_fork_asm+0x1a/0x30
[   13.755538]  </TASK>
[   13.755552] 
[   13.765461] Allocated by task 285:
[   13.765769]  kasan_save_stack+0x45/0x70
[   13.766044]  kasan_save_track+0x18/0x40
[   13.766195]  kasan_save_alloc_info+0x3b/0x50
[   13.766435]  __kasan_kmalloc+0xb7/0xc0
[   13.766733]  __kmalloc_cache_noprof+0x189/0x420
[   13.767069]  kasan_atomics+0x95/0x310
[   13.767291]  kunit_try_run_case+0x1a5/0x480
[   13.767440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.767791]  kthread+0x337/0x6f0
[   13.767977]  ret_from_fork+0x41/0x80
[   13.768253]  ret_from_fork_asm+0x1a/0x30
[   13.768456] 
[   13.768548] The buggy address belongs to the object at ffff8881029e6b00
[   13.768548]  which belongs to the cache kmalloc-64 of size 64
[   13.769220] The buggy address is located 0 bytes to the right of
[   13.769220]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.769736] 
[   13.769854] The buggy address belongs to the physical page:
[   13.770224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.770615] flags: 0x200000000000000(node=0|zone=2)
[   13.770845] page_type: f5(slab)
[   13.771069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.771407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.771737] page dumped because: kasan: bad access detected
[   13.772133] 
[   13.772239] Memory state around the buggy address:
[   13.772495]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.772916]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.773260] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.773482]                                      ^
[   13.774017]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.774351]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.774649] ==================================================================
[   15.193396] ==================================================================
[   15.193733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.194138] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.194475] 
[   15.194693] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.194743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.194771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.194795] Call Trace:
[   15.194813]  <TASK>
[   15.194832]  dump_stack_lvl+0x73/0xb0
[   15.194866]  print_report+0xd1/0x650
[   15.194905]  ? __virt_addr_valid+0x1db/0x2d0
[   15.194929]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.194955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.194981]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.195006]  kasan_report+0x141/0x180
[   15.195031]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.195060]  __asan_report_load8_noabort+0x18/0x20
[   15.195084]  kasan_atomics_helper+0x4fb2/0x5450
[   15.195110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.195136]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.195161]  ? kasan_atomics+0x152/0x310
[   15.195186]  kasan_atomics+0x1dc/0x310
[   15.195208]  ? __pfx_kasan_atomics+0x10/0x10
[   15.195232]  ? __pfx_read_tsc+0x10/0x10
[   15.195254]  ? ktime_get_ts64+0x86/0x230
[   15.195284]  kunit_try_run_case+0x1a5/0x480
[   15.195308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.195330]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.195358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.195384]  ? __kthread_parkme+0x82/0x180
[   15.195409]  ? preempt_count_sub+0x50/0x80
[   15.195438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.195462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.195488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.195514]  kthread+0x337/0x6f0
[   15.195534]  ? trace_preempt_on+0x20/0xc0
[   15.195560]  ? __pfx_kthread+0x10/0x10
[   15.195587]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.195650]  ? calculate_sigpending+0x7b/0xa0
[   15.195677]  ? __pfx_kthread+0x10/0x10
[   15.195698]  ret_from_fork+0x41/0x80
[   15.195722]  ? __pfx_kthread+0x10/0x10
[   15.195743]  ret_from_fork_asm+0x1a/0x30
[   15.195776]  </TASK>
[   15.195789] 
[   15.211327] Allocated by task 285:
[   15.211640]  kasan_save_stack+0x45/0x70
[   15.211844]  kasan_save_track+0x18/0x40
[   15.212053]  kasan_save_alloc_info+0x3b/0x50
[   15.212246]  __kasan_kmalloc+0xb7/0xc0
[   15.212433]  __kmalloc_cache_noprof+0x189/0x420
[   15.212914]  kasan_atomics+0x95/0x310
[   15.213166]  kunit_try_run_case+0x1a5/0x480
[   15.213479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213847]  kthread+0x337/0x6f0
[   15.214110]  ret_from_fork+0x41/0x80
[   15.214303]  ret_from_fork_asm+0x1a/0x30
[   15.214617] 
[   15.214721] The buggy address belongs to the object at ffff8881029e6b00
[   15.214721]  which belongs to the cache kmalloc-64 of size 64
[   15.215282] The buggy address is located 0 bytes to the right of
[   15.215282]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.216046] 
[   15.216219] The buggy address belongs to the physical page:
[   15.216526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.216991] flags: 0x200000000000000(node=0|zone=2)
[   15.217280] page_type: f5(slab)
[   15.217474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.218034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.218472] page dumped because: kasan: bad access detected
[   15.218846] 
[   15.218941] Memory state around the buggy address:
[   15.219163]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219634]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.219927] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.220250]                                      ^
[   15.220474]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221012]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221393] ==================================================================
[   13.888785] ==================================================================
[   13.889167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.889514] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.889832] 
[   13.890015] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.890064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.890078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.890102] Call Trace:
[   13.890119]  <TASK>
[   13.890135]  dump_stack_lvl+0x73/0xb0
[   13.890164]  print_report+0xd1/0x650
[   13.890189]  ? __virt_addr_valid+0x1db/0x2d0
[   13.890212]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.890414]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890447]  kasan_report+0x141/0x180
[   13.890474]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.890504]  kasan_check_range+0x10c/0x1c0
[   13.890543]  __kasan_check_write+0x18/0x20
[   13.890567]  kasan_atomics_helper+0x4a0/0x5450
[   13.890594]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.890620]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.890644]  ? kasan_atomics+0x152/0x310
[   13.890670]  kasan_atomics+0x1dc/0x310
[   13.890693]  ? __pfx_kasan_atomics+0x10/0x10
[   13.890717]  ? __pfx_read_tsc+0x10/0x10
[   13.890739]  ? ktime_get_ts64+0x86/0x230
[   13.890768]  kunit_try_run_case+0x1a5/0x480
[   13.890794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.890844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.890870]  ? __kthread_parkme+0x82/0x180
[   13.890981]  ? preempt_count_sub+0x50/0x80
[   13.891009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.891033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.891060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.891087]  kthread+0x337/0x6f0
[   13.891106]  ? trace_preempt_on+0x20/0xc0
[   13.891134]  ? __pfx_kthread+0x10/0x10
[   13.891156]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.891181]  ? calculate_sigpending+0x7b/0xa0
[   13.891206]  ? __pfx_kthread+0x10/0x10
[   13.891229]  ret_from_fork+0x41/0x80
[   13.891251]  ? __pfx_kthread+0x10/0x10
[   13.891273]  ret_from_fork_asm+0x1a/0x30
[   13.891306]  </TASK>
[   13.891319] 
[   13.904915] Allocated by task 285:
[   13.905262]  kasan_save_stack+0x45/0x70
[   13.905448]  kasan_save_track+0x18/0x40
[   13.905653]  kasan_save_alloc_info+0x3b/0x50
[   13.905997]  __kasan_kmalloc+0xb7/0xc0
[   13.906253]  __kmalloc_cache_noprof+0x189/0x420
[   13.906485]  kasan_atomics+0x95/0x310
[   13.906696]  kunit_try_run_case+0x1a5/0x480
[   13.907064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.907299]  kthread+0x337/0x6f0
[   13.907475]  ret_from_fork+0x41/0x80
[   13.907643]  ret_from_fork_asm+0x1a/0x30
[   13.908165] 
[   13.908346] The buggy address belongs to the object at ffff8881029e6b00
[   13.908346]  which belongs to the cache kmalloc-64 of size 64
[   13.908888] The buggy address is located 0 bytes to the right of
[   13.908888]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.909642] 
[   13.909813] The buggy address belongs to the physical page:
[   13.910174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.910549] flags: 0x200000000000000(node=0|zone=2)
[   13.911037] page_type: f5(slab)
[   13.911220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.911836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.912138] page dumped because: kasan: bad access detected
[   13.912385] 
[   13.912481] Memory state around the buggy address:
[   13.913199]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.913564]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.914328] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.914772]                                      ^
[   13.915372]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.916081]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.916397] ==================================================================
[   14.388132] ==================================================================
[   14.388679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.389138] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.389381] 
[   14.389470] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.389532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.389547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.389570] Call Trace:
[   14.389587]  <TASK>
[   14.389604]  dump_stack_lvl+0x73/0xb0
[   14.389633]  print_report+0xd1/0x650
[   14.389659]  ? __virt_addr_valid+0x1db/0x2d0
[   14.389683]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.389707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.389733]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.389758]  kasan_report+0x141/0x180
[   14.389783]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.389813]  kasan_check_range+0x10c/0x1c0
[   14.389836]  __kasan_check_write+0x18/0x20
[   14.389859]  kasan_atomics_helper+0xfa9/0x5450
[   14.389897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.389923]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.389948]  ? kasan_atomics+0x152/0x310
[   14.389973]  kasan_atomics+0x1dc/0x310
[   14.389995]  ? __pfx_kasan_atomics+0x10/0x10
[   14.390019]  ? __pfx_read_tsc+0x10/0x10
[   14.390041]  ? ktime_get_ts64+0x86/0x230
[   14.390069]  kunit_try_run_case+0x1a5/0x480
[   14.390094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.390144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.390171]  ? __kthread_parkme+0x82/0x180
[   14.390196]  ? preempt_count_sub+0x50/0x80
[   14.390224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.390273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.390300]  kthread+0x337/0x6f0
[   14.390319]  ? trace_preempt_on+0x20/0xc0
[   14.390345]  ? __pfx_kthread+0x10/0x10
[   14.390366]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.390391]  ? calculate_sigpending+0x7b/0xa0
[   14.390415]  ? __pfx_kthread+0x10/0x10
[   14.390436]  ret_from_fork+0x41/0x80
[   14.390460]  ? __pfx_kthread+0x10/0x10
[   14.390482]  ret_from_fork_asm+0x1a/0x30
[   14.390668]  </TASK>
[   14.390687] 
[   14.399431] Allocated by task 285:
[   14.399682]  kasan_save_stack+0x45/0x70
[   14.400074]  kasan_save_track+0x18/0x40
[   14.400246]  kasan_save_alloc_info+0x3b/0x50
[   14.400399]  __kasan_kmalloc+0xb7/0xc0
[   14.400539]  __kmalloc_cache_noprof+0x189/0x420
[   14.400768]  kasan_atomics+0x95/0x310
[   14.401090]  kunit_try_run_case+0x1a5/0x480
[   14.401319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.401503]  kthread+0x337/0x6f0
[   14.401631]  ret_from_fork+0x41/0x80
[   14.401812]  ret_from_fork_asm+0x1a/0x30
[   14.402182] 
[   14.402292] The buggy address belongs to the object at ffff8881029e6b00
[   14.402292]  which belongs to the cache kmalloc-64 of size 64
[   14.402951] The buggy address is located 0 bytes to the right of
[   14.402951]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.403370] 
[   14.403447] The buggy address belongs to the physical page:
[   14.403803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.404271] flags: 0x200000000000000(node=0|zone=2)
[   14.404526] page_type: f5(slab)
[   14.404705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.405113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.405570] page dumped because: kasan: bad access detected
[   14.405793] 
[   14.405956] Memory state around the buggy address:
[   14.406164]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.406464]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.407063] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.407356]                                      ^
[   14.407524]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.407964]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.408185] ==================================================================
[   15.222168] ==================================================================
[   15.222818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.223177] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.223708] 
[   15.223943] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.224250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.224269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.224296] Call Trace:
[   15.224317]  <TASK>
[   15.224341]  dump_stack_lvl+0x73/0xb0
[   15.224375]  print_report+0xd1/0x650
[   15.224401]  ? __virt_addr_valid+0x1db/0x2d0
[   15.224427]  ? kasan_atomics_helper+0x218a/0x5450
[   15.224451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.224477]  ? kasan_atomics_helper+0x218a/0x5450
[   15.224502]  kasan_report+0x141/0x180
[   15.224527]  ? kasan_atomics_helper+0x218a/0x5450
[   15.224556]  kasan_check_range+0x10c/0x1c0
[   15.224579]  __kasan_check_write+0x18/0x20
[   15.224602]  kasan_atomics_helper+0x218a/0x5450
[   15.224628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.224653]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.224678]  ? kasan_atomics+0x152/0x310
[   15.224704]  kasan_atomics+0x1dc/0x310
[   15.224726]  ? __pfx_kasan_atomics+0x10/0x10
[   15.224750]  ? __pfx_read_tsc+0x10/0x10
[   15.224772]  ? ktime_get_ts64+0x86/0x230
[   15.224800]  kunit_try_run_case+0x1a5/0x480
[   15.224825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224848]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.224889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.224916]  ? __kthread_parkme+0x82/0x180
[   15.224941]  ? preempt_count_sub+0x50/0x80
[   15.224970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.224993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.225019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.225046]  kthread+0x337/0x6f0
[   15.225064]  ? trace_preempt_on+0x20/0xc0
[   15.225091]  ? __pfx_kthread+0x10/0x10
[   15.225111]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.225136]  ? calculate_sigpending+0x7b/0xa0
[   15.225161]  ? __pfx_kthread+0x10/0x10
[   15.225182]  ret_from_fork+0x41/0x80
[   15.225204]  ? __pfx_kthread+0x10/0x10
[   15.225225]  ret_from_fork_asm+0x1a/0x30
[   15.225257]  </TASK>
[   15.225271] 
[   15.235965] Allocated by task 285:
[   15.236240]  kasan_save_stack+0x45/0x70
[   15.236528]  kasan_save_track+0x18/0x40
[   15.236708]  kasan_save_alloc_info+0x3b/0x50
[   15.236930]  __kasan_kmalloc+0xb7/0xc0
[   15.237134]  __kmalloc_cache_noprof+0x189/0x420
[   15.237352]  kasan_atomics+0x95/0x310
[   15.237527]  kunit_try_run_case+0x1a5/0x480
[   15.238118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.238453]  kthread+0x337/0x6f0
[   15.238635]  ret_from_fork+0x41/0x80
[   15.238978]  ret_from_fork_asm+0x1a/0x30
[   15.239285] 
[   15.239372] The buggy address belongs to the object at ffff8881029e6b00
[   15.239372]  which belongs to the cache kmalloc-64 of size 64
[   15.240235] The buggy address is located 0 bytes to the right of
[   15.240235]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.240987] 
[   15.241157] The buggy address belongs to the physical page:
[   15.241416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.241895] flags: 0x200000000000000(node=0|zone=2)
[   15.242114] page_type: f5(slab)
[   15.242293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.242804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.243199] page dumped because: kasan: bad access detected
[   15.243409] 
[   15.243602] Memory state around the buggy address:
[   15.243893]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.244340]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.244755] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.245034]                                      ^
[   15.245393]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245845]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246158] ==================================================================
[   13.776003] ==================================================================
[   13.776533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.777178] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.777507] 
[   13.777608] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.777678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.777691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.777715] Call Trace:
[   13.777728]  <TASK>
[   13.777757]  dump_stack_lvl+0x73/0xb0
[   13.777788]  print_report+0xd1/0x650
[   13.777813]  ? __virt_addr_valid+0x1db/0x2d0
[   13.777920]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.777951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.777998]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.778023]  kasan_report+0x141/0x180
[   13.778048]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.778077]  __asan_report_store4_noabort+0x1b/0x30
[   13.778100]  kasan_atomics_helper+0x4ba2/0x5450
[   13.778125]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.778150]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.778174]  ? kasan_atomics+0x152/0x310
[   13.778200]  kasan_atomics+0x1dc/0x310
[   13.778221]  ? __pfx_kasan_atomics+0x10/0x10
[   13.778245]  ? __pfx_read_tsc+0x10/0x10
[   13.778268]  ? ktime_get_ts64+0x86/0x230
[   13.778296]  kunit_try_run_case+0x1a5/0x480
[   13.778321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.778388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.778414]  ? __kthread_parkme+0x82/0x180
[   13.778437]  ? preempt_count_sub+0x50/0x80
[   13.778465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.778487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.778529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.778555]  kthread+0x337/0x6f0
[   13.778573]  ? trace_preempt_on+0x20/0xc0
[   13.778598]  ? __pfx_kthread+0x10/0x10
[   13.778618]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.778641]  ? calculate_sigpending+0x7b/0xa0
[   13.778665]  ? __pfx_kthread+0x10/0x10
[   13.778685]  ret_from_fork+0x41/0x80
[   13.778707]  ? __pfx_kthread+0x10/0x10
[   13.778727]  ret_from_fork_asm+0x1a/0x30
[   13.778759]  </TASK>
[   13.778770] 
[   13.787395] Allocated by task 285:
[   13.787529]  kasan_save_stack+0x45/0x70
[   13.788086]  kasan_save_track+0x18/0x40
[   13.788411]  kasan_save_alloc_info+0x3b/0x50
[   13.788628]  __kasan_kmalloc+0xb7/0xc0
[   13.788932]  __kmalloc_cache_noprof+0x189/0x420
[   13.789182]  kasan_atomics+0x95/0x310
[   13.789354]  kunit_try_run_case+0x1a5/0x480
[   13.789500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.789792]  kthread+0x337/0x6f0
[   13.790170]  ret_from_fork+0x41/0x80
[   13.790354]  ret_from_fork_asm+0x1a/0x30
[   13.790563] 
[   13.790693] The buggy address belongs to the object at ffff8881029e6b00
[   13.790693]  which belongs to the cache kmalloc-64 of size 64
[   13.791409] The buggy address is located 0 bytes to the right of
[   13.791409]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.791835] 
[   13.792084] The buggy address belongs to the physical page:
[   13.792361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.792966] flags: 0x200000000000000(node=0|zone=2)
[   13.793238] page_type: f5(slab)
[   13.793385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.793701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.794130] page dumped because: kasan: bad access detected
[   13.794398] 
[   13.794499] Memory state around the buggy address:
[   13.794675]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.794906]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.795244] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.795587]                                      ^
[   13.795856]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.796494]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.796759] ==================================================================
[   14.825007] ==================================================================
[   14.825321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.825708] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.826143] 
[   14.826249] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.826298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.826312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.826334] Call Trace:
[   14.826348]  <TASK>
[   14.826363]  dump_stack_lvl+0x73/0xb0
[   14.826388]  print_report+0xd1/0x650
[   14.826414]  ? __virt_addr_valid+0x1db/0x2d0
[   14.826437]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.826487]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826521]  kasan_report+0x141/0x180
[   14.826546]  ? kasan_atomics_helper+0x1818/0x5450
[   14.826575]  kasan_check_range+0x10c/0x1c0
[   14.826598]  __kasan_check_write+0x18/0x20
[   14.826621]  kasan_atomics_helper+0x1818/0x5450
[   14.826646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.826671]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.826696]  ? kasan_atomics+0x152/0x310
[   14.826721]  kasan_atomics+0x1dc/0x310
[   14.826743]  ? __pfx_kasan_atomics+0x10/0x10
[   14.826767]  ? __pfx_read_tsc+0x10/0x10
[   14.826788]  ? ktime_get_ts64+0x86/0x230
[   14.826815]  kunit_try_run_case+0x1a5/0x480
[   14.826848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.826870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.826907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.826935]  ? __kthread_parkme+0x82/0x180
[   14.826959]  ? preempt_count_sub+0x50/0x80
[   14.826987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.827009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.827036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.827062]  kthread+0x337/0x6f0
[   14.827082]  ? trace_preempt_on+0x20/0xc0
[   14.827107]  ? __pfx_kthread+0x10/0x10
[   14.827127]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.827152]  ? calculate_sigpending+0x7b/0xa0
[   14.827175]  ? __pfx_kthread+0x10/0x10
[   14.827196]  ret_from_fork+0x41/0x80
[   14.827219]  ? __pfx_kthread+0x10/0x10
[   14.827239]  ret_from_fork_asm+0x1a/0x30
[   14.827272]  </TASK>
[   14.827284] 
[   14.835558] Allocated by task 285:
[   14.835799]  kasan_save_stack+0x45/0x70
[   14.836005]  kasan_save_track+0x18/0x40
[   14.836192]  kasan_save_alloc_info+0x3b/0x50
[   14.836393]  __kasan_kmalloc+0xb7/0xc0
[   14.836530]  __kmalloc_cache_noprof+0x189/0x420
[   14.836683]  kasan_atomics+0x95/0x310
[   14.836817]  kunit_try_run_case+0x1a5/0x480
[   14.836971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.837148]  kthread+0x337/0x6f0
[   14.837270]  ret_from_fork+0x41/0x80
[   14.837401]  ret_from_fork_asm+0x1a/0x30
[   14.837739] 
[   14.837945] The buggy address belongs to the object at ffff8881029e6b00
[   14.837945]  which belongs to the cache kmalloc-64 of size 64
[   14.838526] The buggy address is located 0 bytes to the right of
[   14.838526]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.839083] 
[   14.839182] The buggy address belongs to the physical page:
[   14.839434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.839908] flags: 0x200000000000000(node=0|zone=2)
[   14.840072] page_type: f5(slab)
[   14.840195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.840424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.841068] page dumped because: kasan: bad access detected
[   14.841336] 
[   14.841435] Memory state around the buggy address:
[   14.841764]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.842138]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.842354] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.842650]                                      ^
[   14.842892]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.843244]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.843682] ==================================================================
[   14.869589] ==================================================================
[   14.870023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.870265] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.870597] 
[   14.870711] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.870762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.870776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.870799] Call Trace:
[   14.870814]  <TASK>
[   14.870831]  dump_stack_lvl+0x73/0xb0
[   14.870856]  print_report+0xd1/0x650
[   14.870895]  ? __virt_addr_valid+0x1db/0x2d0
[   14.870919]  ? kasan_atomics_helper+0x194a/0x5450
[   14.870943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.870968]  ? kasan_atomics_helper+0x194a/0x5450
[   14.870993]  kasan_report+0x141/0x180
[   14.871018]  ? kasan_atomics_helper+0x194a/0x5450
[   14.871047]  kasan_check_range+0x10c/0x1c0
[   14.871069]  __kasan_check_write+0x18/0x20
[   14.871092]  kasan_atomics_helper+0x194a/0x5450
[   14.871117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.871143]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.871167]  ? kasan_atomics+0x152/0x310
[   14.871193]  kasan_atomics+0x1dc/0x310
[   14.871215]  ? __pfx_kasan_atomics+0x10/0x10
[   14.871238]  ? __pfx_read_tsc+0x10/0x10
[   14.871260]  ? ktime_get_ts64+0x86/0x230
[   14.871288]  kunit_try_run_case+0x1a5/0x480
[   14.871312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.871333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.871359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.871386]  ? __kthread_parkme+0x82/0x180
[   14.871409]  ? preempt_count_sub+0x50/0x80
[   14.871436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.871459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.871484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.871511]  kthread+0x337/0x6f0
[   14.871623]  ? trace_preempt_on+0x20/0xc0
[   14.871649]  ? __pfx_kthread+0x10/0x10
[   14.871670]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.871696]  ? calculate_sigpending+0x7b/0xa0
[   14.871719]  ? __pfx_kthread+0x10/0x10
[   14.871740]  ret_from_fork+0x41/0x80
[   14.871763]  ? __pfx_kthread+0x10/0x10
[   14.871783]  ret_from_fork_asm+0x1a/0x30
[   14.871816]  </TASK>
[   14.871828] 
[   14.880573] Allocated by task 285:
[   14.880737]  kasan_save_stack+0x45/0x70
[   14.881082]  kasan_save_track+0x18/0x40
[   14.881254]  kasan_save_alloc_info+0x3b/0x50
[   14.881441]  __kasan_kmalloc+0xb7/0xc0
[   14.881732]  __kmalloc_cache_noprof+0x189/0x420
[   14.882015]  kasan_atomics+0x95/0x310
[   14.882214]  kunit_try_run_case+0x1a5/0x480
[   14.882399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882633]  kthread+0x337/0x6f0
[   14.882914]  ret_from_fork+0x41/0x80
[   14.883091]  ret_from_fork_asm+0x1a/0x30
[   14.883280] 
[   14.883366] The buggy address belongs to the object at ffff8881029e6b00
[   14.883366]  which belongs to the cache kmalloc-64 of size 64
[   14.884030] The buggy address is located 0 bytes to the right of
[   14.884030]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.884485] 
[   14.884562] The buggy address belongs to the physical page:
[   14.884738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.885071] flags: 0x200000000000000(node=0|zone=2)
[   14.885528] page_type: f5(slab)
[   14.885741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.886278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.886675] page dumped because: kasan: bad access detected
[   14.886854] 
[   14.886941] Memory state around the buggy address:
[   14.887101]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.887624]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.888007] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.888548]                                      ^
[   14.888968]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.889259]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.889480] ==================================================================
[   15.172558] ==================================================================
[   15.172919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.173290] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.173616] 
[   15.173740] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.173822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.173836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.173860] Call Trace:
[   15.173887]  <TASK>
[   15.173932]  dump_stack_lvl+0x73/0xb0
[   15.173962]  print_report+0xd1/0x650
[   15.173987]  ? __virt_addr_valid+0x1db/0x2d0
[   15.174010]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.174034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.174060]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.174084]  kasan_report+0x141/0x180
[   15.174110]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.174139]  kasan_check_range+0x10c/0x1c0
[   15.174162]  __kasan_check_write+0x18/0x20
[   15.174186]  kasan_atomics_helper+0x20c8/0x5450
[   15.174243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.174269]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.174294]  ? kasan_atomics+0x152/0x310
[   15.174320]  kasan_atomics+0x1dc/0x310
[   15.174372]  ? __pfx_kasan_atomics+0x10/0x10
[   15.174397]  ? __pfx_read_tsc+0x10/0x10
[   15.174419]  ? ktime_get_ts64+0x86/0x230
[   15.174447]  kunit_try_run_case+0x1a5/0x480
[   15.174472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.174536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.174563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.174590]  ? __kthread_parkme+0x82/0x180
[   15.174614]  ? preempt_count_sub+0x50/0x80
[   15.174669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.174694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.174720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.174746]  kthread+0x337/0x6f0
[   15.174765]  ? trace_preempt_on+0x20/0xc0
[   15.174821]  ? __pfx_kthread+0x10/0x10
[   15.174900]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.174925]  ? calculate_sigpending+0x7b/0xa0
[   15.174949]  ? __pfx_kthread+0x10/0x10
[   15.174970]  ret_from_fork+0x41/0x80
[   15.174993]  ? __pfx_kthread+0x10/0x10
[   15.175014]  ret_from_fork_asm+0x1a/0x30
[   15.175047]  </TASK>
[   15.175060] 
[   15.183716] Allocated by task 285:
[   15.183926]  kasan_save_stack+0x45/0x70
[   15.184157]  kasan_save_track+0x18/0x40
[   15.184372]  kasan_save_alloc_info+0x3b/0x50
[   15.184640]  __kasan_kmalloc+0xb7/0xc0
[   15.184851]  __kmalloc_cache_noprof+0x189/0x420
[   15.185163]  kasan_atomics+0x95/0x310
[   15.185352]  kunit_try_run_case+0x1a5/0x480
[   15.185557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185813]  kthread+0x337/0x6f0
[   15.185989]  ret_from_fork+0x41/0x80
[   15.186262]  ret_from_fork_asm+0x1a/0x30
[   15.186407] 
[   15.186518] The buggy address belongs to the object at ffff8881029e6b00
[   15.186518]  which belongs to the cache kmalloc-64 of size 64
[   15.187363] The buggy address is located 0 bytes to the right of
[   15.187363]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.187940] 
[   15.188042] The buggy address belongs to the physical page:
[   15.188297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.188783] flags: 0x200000000000000(node=0|zone=2)
[   15.189145] page_type: f5(slab)
[   15.189330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.189674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.189917] page dumped because: kasan: bad access detected
[   15.190141] 
[   15.190278] Memory state around the buggy address:
[   15.190602]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.190950]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.191317] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.191786]                                      ^
[   15.191992]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.192369]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.192717] ==================================================================
[   13.797695] ==================================================================
[   13.798008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.798622] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.799063] 
[   13.799166] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.799251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.799265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.799288] Call Trace:
[   13.799316]  <TASK>
[   13.799449]  dump_stack_lvl+0x73/0xb0
[   13.799482]  print_report+0xd1/0x650
[   13.799528]  ? __virt_addr_valid+0x1db/0x2d0
[   13.799553]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.799586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.799612]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.799638]  kasan_report+0x141/0x180
[   13.799663]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.799693]  __asan_report_load4_noabort+0x18/0x20
[   13.799717]  kasan_atomics_helper+0x4b88/0x5450
[   13.799768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.799794]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.799818]  ? kasan_atomics+0x152/0x310
[   13.800024]  kasan_atomics+0x1dc/0x310
[   13.800061]  ? __pfx_kasan_atomics+0x10/0x10
[   13.800086]  ? __pfx_read_tsc+0x10/0x10
[   13.800109]  ? ktime_get_ts64+0x86/0x230
[   13.800138]  kunit_try_run_case+0x1a5/0x480
[   13.800163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.800185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.800213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.800240]  ? __kthread_parkme+0x82/0x180
[   13.800264]  ? preempt_count_sub+0x50/0x80
[   13.800293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.800318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.800345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.800371]  kthread+0x337/0x6f0
[   13.800390]  ? trace_preempt_on+0x20/0xc0
[   13.800416]  ? __pfx_kthread+0x10/0x10
[   13.800436]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.800461]  ? calculate_sigpending+0x7b/0xa0
[   13.800485]  ? __pfx_kthread+0x10/0x10
[   13.800506]  ret_from_fork+0x41/0x80
[   13.800529]  ? __pfx_kthread+0x10/0x10
[   13.800550]  ret_from_fork_asm+0x1a/0x30
[   13.800582]  </TASK>
[   13.800595] 
[   13.809800] Allocated by task 285:
[   13.810124]  kasan_save_stack+0x45/0x70
[   13.810311]  kasan_save_track+0x18/0x40
[   13.810462]  kasan_save_alloc_info+0x3b/0x50
[   13.810802]  __kasan_kmalloc+0xb7/0xc0
[   13.811083]  __kmalloc_cache_noprof+0x189/0x420
[   13.811409]  kasan_atomics+0x95/0x310
[   13.811727]  kunit_try_run_case+0x1a5/0x480
[   13.812214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.812525]  kthread+0x337/0x6f0
[   13.812714]  ret_from_fork+0x41/0x80
[   13.812985]  ret_from_fork_asm+0x1a/0x30
[   13.813176] 
[   13.813306] The buggy address belongs to the object at ffff8881029e6b00
[   13.813306]  which belongs to the cache kmalloc-64 of size 64
[   13.813772] The buggy address is located 0 bytes to the right of
[   13.813772]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.814428] 
[   13.814555] The buggy address belongs to the physical page:
[   13.814994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.815369] flags: 0x200000000000000(node=0|zone=2)
[   13.815602] page_type: f5(slab)
[   13.815804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.816204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.816456] page dumped because: kasan: bad access detected
[   13.817044] 
[   13.817179] Memory state around the buggy address:
[   13.817384]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.817727]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.818120] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.818444]                                      ^
[   13.818701]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.819110]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.819438] ==================================================================
[   14.543026] ==================================================================
[   14.543433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.543848] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.544258] 
[   14.544378] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.544427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.544441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.544464] Call Trace:
[   14.544478]  <TASK>
[   14.544493]  dump_stack_lvl+0x73/0xb0
[   14.544523]  print_report+0xd1/0x650
[   14.544547]  ? __virt_addr_valid+0x1db/0x2d0
[   14.544596]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.544622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.544647]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.544673]  kasan_report+0x141/0x180
[   14.544698]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.544745]  __asan_report_load4_noabort+0x18/0x20
[   14.544769]  kasan_atomics_helper+0x49e8/0x5450
[   14.544795]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.544821]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.544845]  ? kasan_atomics+0x152/0x310
[   14.544870]  kasan_atomics+0x1dc/0x310
[   14.545096]  ? __pfx_kasan_atomics+0x10/0x10
[   14.545157]  ? __pfx_read_tsc+0x10/0x10
[   14.545195]  ? ktime_get_ts64+0x86/0x230
[   14.545223]  kunit_try_run_case+0x1a5/0x480
[   14.545248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.545269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.545296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.545324]  ? __kthread_parkme+0x82/0x180
[   14.545348]  ? preempt_count_sub+0x50/0x80
[   14.545376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.545399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.545453]  kthread+0x337/0x6f0
[   14.545473]  ? trace_preempt_on+0x20/0xc0
[   14.545499]  ? __pfx_kthread+0x10/0x10
[   14.545521]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.545546]  ? calculate_sigpending+0x7b/0xa0
[   14.545570]  ? __pfx_kthread+0x10/0x10
[   14.545591]  ret_from_fork+0x41/0x80
[   14.545614]  ? __pfx_kthread+0x10/0x10
[   14.545635]  ret_from_fork_asm+0x1a/0x30
[   14.545667]  </TASK>
[   14.545680] 
[   14.555029] Allocated by task 285:
[   14.555350]  kasan_save_stack+0x45/0x70
[   14.555555]  kasan_save_track+0x18/0x40
[   14.555818]  kasan_save_alloc_info+0x3b/0x50
[   14.556070]  __kasan_kmalloc+0xb7/0xc0
[   14.556273]  __kmalloc_cache_noprof+0x189/0x420
[   14.556514]  kasan_atomics+0x95/0x310
[   14.556673]  kunit_try_run_case+0x1a5/0x480
[   14.556898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.557109]  kthread+0x337/0x6f0
[   14.557236]  ret_from_fork+0x41/0x80
[   14.557373]  ret_from_fork_asm+0x1a/0x30
[   14.557925] 
[   14.558039] The buggy address belongs to the object at ffff8881029e6b00
[   14.558039]  which belongs to the cache kmalloc-64 of size 64
[   14.558567] The buggy address is located 0 bytes to the right of
[   14.558567]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.558950] 
[   14.559028] The buggy address belongs to the physical page:
[   14.559266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.559968] flags: 0x200000000000000(node=0|zone=2)
[   14.560222] page_type: f5(slab)
[   14.560397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.560709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.561240] page dumped because: kasan: bad access detected
[   14.561488] 
[   14.561590] Memory state around the buggy address:
[   14.561818]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.562189]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.562415] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.562632]                                      ^
[   14.562824]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.563171]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.563496] ==================================================================
[   13.820117] ==================================================================
[   13.820421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.821216] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.821543] 
[   13.821661] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.821709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.821723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.821747] Call Trace:
[   13.821762]  <TASK>
[   13.821779]  dump_stack_lvl+0x73/0xb0
[   13.821809]  print_report+0xd1/0x650
[   13.821834]  ? __virt_addr_valid+0x1db/0x2d0
[   13.821983]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.822029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.822056]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.822082]  kasan_report+0x141/0x180
[   13.822108]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.822138]  __asan_report_store4_noabort+0x1b/0x30
[   13.822162]  kasan_atomics_helper+0x4b6e/0x5450
[   13.822189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.822216]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.822241]  ? kasan_atomics+0x152/0x310
[   13.822286]  kasan_atomics+0x1dc/0x310
[   13.822310]  ? __pfx_kasan_atomics+0x10/0x10
[   13.822334]  ? __pfx_read_tsc+0x10/0x10
[   13.822357]  ? ktime_get_ts64+0x86/0x230
[   13.822386]  kunit_try_run_case+0x1a5/0x480
[   13.822410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.822448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.822476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.822504]  ? __kthread_parkme+0x82/0x180
[   13.822537]  ? preempt_count_sub+0x50/0x80
[   13.822566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.822590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.822616]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.822643]  kthread+0x337/0x6f0
[   13.822663]  ? trace_preempt_on+0x20/0xc0
[   13.822689]  ? __pfx_kthread+0x10/0x10
[   13.822710]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.822735]  ? calculate_sigpending+0x7b/0xa0
[   13.822760]  ? __pfx_kthread+0x10/0x10
[   13.822783]  ret_from_fork+0x41/0x80
[   13.822805]  ? __pfx_kthread+0x10/0x10
[   13.822825]  ret_from_fork_asm+0x1a/0x30
[   13.822917]  </TASK>
[   13.822932] 
[   13.832385] Allocated by task 285:
[   13.832610]  kasan_save_stack+0x45/0x70
[   13.832801]  kasan_save_track+0x18/0x40
[   13.832991]  kasan_save_alloc_info+0x3b/0x50
[   13.833452]  __kasan_kmalloc+0xb7/0xc0
[   13.833734]  __kmalloc_cache_noprof+0x189/0x420
[   13.834052]  kasan_atomics+0x95/0x310
[   13.834291]  kunit_try_run_case+0x1a5/0x480
[   13.834483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.834665]  kthread+0x337/0x6f0
[   13.834844]  ret_from_fork+0x41/0x80
[   13.835153]  ret_from_fork_asm+0x1a/0x30
[   13.835371] 
[   13.835473] The buggy address belongs to the object at ffff8881029e6b00
[   13.835473]  which belongs to the cache kmalloc-64 of size 64
[   13.836012] The buggy address is located 0 bytes to the right of
[   13.836012]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.836662] 
[   13.836773] The buggy address belongs to the physical page:
[   13.837129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.837429] flags: 0x200000000000000(node=0|zone=2)
[   13.838082] page_type: f5(slab)
[   13.838255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.838564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.839051] page dumped because: kasan: bad access detected
[   13.839283] 
[   13.839411] Memory state around the buggy address:
[   13.839773]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.840188]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.840488] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.840820]                                      ^
[   13.841159]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.841467]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.842045] ==================================================================
[   14.451663] ==================================================================
[   14.451935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.452412] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.452981] 
[   14.453076] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.453125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.453138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.453160] Call Trace:
[   14.453176]  <TASK>
[   14.453192]  dump_stack_lvl+0x73/0xb0
[   14.453221]  print_report+0xd1/0x650
[   14.453247]  ? __virt_addr_valid+0x1db/0x2d0
[   14.453272]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.453296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.453323]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.453348]  kasan_report+0x141/0x180
[   14.453373]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.453404]  __asan_report_load4_noabort+0x18/0x20
[   14.453427]  kasan_atomics_helper+0x4a1c/0x5450
[   14.453454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.453479]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.453504]  ? kasan_atomics+0x152/0x310
[   14.453530]  kasan_atomics+0x1dc/0x310
[   14.453551]  ? __pfx_kasan_atomics+0x10/0x10
[   14.453575]  ? __pfx_read_tsc+0x10/0x10
[   14.453597]  ? ktime_get_ts64+0x86/0x230
[   14.453625]  kunit_try_run_case+0x1a5/0x480
[   14.453649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453671]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.453698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.453726]  ? __kthread_parkme+0x82/0x180
[   14.453750]  ? preempt_count_sub+0x50/0x80
[   14.453778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.453801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.453828]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.453867]  kthread+0x337/0x6f0
[   14.453898]  ? trace_preempt_on+0x20/0xc0
[   14.453924]  ? __pfx_kthread+0x10/0x10
[   14.453944]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.453969]  ? calculate_sigpending+0x7b/0xa0
[   14.453993]  ? __pfx_kthread+0x10/0x10
[   14.454014]  ret_from_fork+0x41/0x80
[   14.454037]  ? __pfx_kthread+0x10/0x10
[   14.454058]  ret_from_fork_asm+0x1a/0x30
[   14.454090]  </TASK>
[   14.454102] 
[   14.461991] Allocated by task 285:
[   14.462128]  kasan_save_stack+0x45/0x70
[   14.462282]  kasan_save_track+0x18/0x40
[   14.462473]  kasan_save_alloc_info+0x3b/0x50
[   14.462692]  __kasan_kmalloc+0xb7/0xc0
[   14.462906]  __kmalloc_cache_noprof+0x189/0x420
[   14.463239]  kasan_atomics+0x95/0x310
[   14.463438]  kunit_try_run_case+0x1a5/0x480
[   14.463787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.464262]  kthread+0x337/0x6f0
[   14.464419]  ret_from_fork+0x41/0x80
[   14.464636]  ret_from_fork_asm+0x1a/0x30
[   14.464781] 
[   14.464858] The buggy address belongs to the object at ffff8881029e6b00
[   14.464858]  which belongs to the cache kmalloc-64 of size 64
[   14.465436] The buggy address is located 0 bytes to the right of
[   14.465436]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.466015] 
[   14.466114] The buggy address belongs to the physical page:
[   14.466544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.466970] flags: 0x200000000000000(node=0|zone=2)
[   14.467197] page_type: f5(slab)
[   14.467371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.468733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.469280] page dumped because: kasan: bad access detected
[   14.469620] 
[   14.469707] Memory state around the buggy address:
[   14.470097]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.470397]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.471025] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.471334]                                      ^
[   14.471727]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472235]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472505] ==================================================================
[   14.928640] ==================================================================
[   14.929050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.929436] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.930054] 
[   14.930175] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.930223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.930236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930267] Call Trace:
[   14.930282]  <TASK>
[   14.930299]  dump_stack_lvl+0x73/0xb0
[   14.930325]  print_report+0xd1/0x650
[   14.930350]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930374]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.930398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930424]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.930448]  kasan_report+0x141/0x180
[   14.930473]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.930503]  kasan_check_range+0x10c/0x1c0
[   14.930525]  __kasan_check_write+0x18/0x20
[   14.930549]  kasan_atomics_helper+0x1b22/0x5450
[   14.930574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.930600]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.930623]  ? kasan_atomics+0x152/0x310
[   14.930649]  kasan_atomics+0x1dc/0x310
[   14.930671]  ? __pfx_kasan_atomics+0x10/0x10
[   14.930695]  ? __pfx_read_tsc+0x10/0x10
[   14.930717]  ? ktime_get_ts64+0x86/0x230
[   14.930744]  kunit_try_run_case+0x1a5/0x480
[   14.930769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.930817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.930844]  ? __kthread_parkme+0x82/0x180
[   14.930868]  ? preempt_count_sub+0x50/0x80
[   14.930906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.930928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.930955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.930981]  kthread+0x337/0x6f0
[   14.931000]  ? trace_preempt_on+0x20/0xc0
[   14.931025]  ? __pfx_kthread+0x10/0x10
[   14.931045]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.931070]  ? calculate_sigpending+0x7b/0xa0
[   14.931094]  ? __pfx_kthread+0x10/0x10
[   14.931115]  ret_from_fork+0x41/0x80
[   14.931137]  ? __pfx_kthread+0x10/0x10
[   14.931157]  ret_from_fork_asm+0x1a/0x30
[   14.931190]  </TASK>
[   14.931204] 
[   14.941092] Allocated by task 285:
[   14.941289]  kasan_save_stack+0x45/0x70
[   14.941506]  kasan_save_track+0x18/0x40
[   14.941714]  kasan_save_alloc_info+0x3b/0x50
[   14.943259]  __kasan_kmalloc+0xb7/0xc0
[   14.943486]  __kmalloc_cache_noprof+0x189/0x420
[   14.944558]  kasan_atomics+0x95/0x310
[   14.945347]  kunit_try_run_case+0x1a5/0x480
[   14.945947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.946810]  kthread+0x337/0x6f0
[   14.947567]  ret_from_fork+0x41/0x80
[   14.947725]  ret_from_fork_asm+0x1a/0x30
[   14.948018] 
[   14.948140] The buggy address belongs to the object at ffff8881029e6b00
[   14.948140]  which belongs to the cache kmalloc-64 of size 64
[   14.948635] The buggy address is located 0 bytes to the right of
[   14.948635]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.949217] 
[   14.949320] The buggy address belongs to the physical page:
[   14.949497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.949866] flags: 0x200000000000000(node=0|zone=2)
[   14.950526] page_type: f5(slab)
[   14.950677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.951309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.951961] page dumped because: kasan: bad access detected
[   14.952342] 
[   14.952439] Memory state around the buggy address:
[   14.952868]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.953332]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.953636] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.954337]                                      ^
[   14.954860]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.955595]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.956207] ==================================================================
[   14.631739] ==================================================================
[   14.632210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.632588] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.632993] 
[   14.633087] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.633135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.633149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.633171] Call Trace:
[   14.633186]  <TASK>
[   14.633202]  dump_stack_lvl+0x73/0xb0
[   14.633229]  print_report+0xd1/0x650
[   14.633255]  ? __virt_addr_valid+0x1db/0x2d0
[   14.633279]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.633304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.633330]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.633355]  kasan_report+0x141/0x180
[   14.633380]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.633410]  __asan_report_load8_noabort+0x18/0x20
[   14.633434]  kasan_atomics_helper+0x4eae/0x5450
[   14.633460]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.633486]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.633521]  ? kasan_atomics+0x152/0x310
[   14.633547]  kasan_atomics+0x1dc/0x310
[   14.633569]  ? __pfx_kasan_atomics+0x10/0x10
[   14.633592]  ? __pfx_read_tsc+0x10/0x10
[   14.633614]  ? ktime_get_ts64+0x86/0x230
[   14.633642]  kunit_try_run_case+0x1a5/0x480
[   14.633667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.633689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.633715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.633743]  ? __kthread_parkme+0x82/0x180
[   14.633766]  ? preempt_count_sub+0x50/0x80
[   14.633794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.633817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.633941]  kthread+0x337/0x6f0
[   14.633961]  ? trace_preempt_on+0x20/0xc0
[   14.633987]  ? __pfx_kthread+0x10/0x10
[   14.634008]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.634033]  ? calculate_sigpending+0x7b/0xa0
[   14.634056]  ? __pfx_kthread+0x10/0x10
[   14.634078]  ret_from_fork+0x41/0x80
[   14.634101]  ? __pfx_kthread+0x10/0x10
[   14.634122]  ret_from_fork_asm+0x1a/0x30
[   14.634154]  </TASK>
[   14.634168] 
[   14.642457] Allocated by task 285:
[   14.642687]  kasan_save_stack+0x45/0x70
[   14.643128]  kasan_save_track+0x18/0x40
[   14.643304]  kasan_save_alloc_info+0x3b/0x50
[   14.643531]  __kasan_kmalloc+0xb7/0xc0
[   14.643727]  __kmalloc_cache_noprof+0x189/0x420
[   14.643900]  kasan_atomics+0x95/0x310
[   14.644036]  kunit_try_run_case+0x1a5/0x480
[   14.644248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.644716]  kthread+0x337/0x6f0
[   14.645070]  ret_from_fork+0x41/0x80
[   14.645226]  ret_from_fork_asm+0x1a/0x30
[   14.645430] 
[   14.645507] The buggy address belongs to the object at ffff8881029e6b00
[   14.645507]  which belongs to the cache kmalloc-64 of size 64
[   14.646161] The buggy address is located 0 bytes to the right of
[   14.646161]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.646648] 
[   14.646761] The buggy address belongs to the physical page:
[   14.646956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.647324] flags: 0x200000000000000(node=0|zone=2)
[   14.647695] page_type: f5(slab)
[   14.648066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.648402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.648636] page dumped because: kasan: bad access detected
[   14.648813] 
[   14.649035] Memory state around the buggy address:
[   14.649279]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.649609]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.649926] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.650263]                                      ^
[   14.650492]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.650769]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.651003] ==================================================================
[   14.844211] ==================================================================
[   14.844513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.844766] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.845097] 
[   14.845316] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.845365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.845379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.845403] Call Trace:
[   14.845418]  <TASK>
[   14.845435]  dump_stack_lvl+0x73/0xb0
[   14.845461]  print_report+0xd1/0x650
[   14.845486]  ? __virt_addr_valid+0x1db/0x2d0
[   14.845510]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.845559]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845584]  kasan_report+0x141/0x180
[   14.845608]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.845638]  kasan_check_range+0x10c/0x1c0
[   14.845661]  __kasan_check_write+0x18/0x20
[   14.845683]  kasan_atomics_helper+0x18b1/0x5450
[   14.845708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.845733]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.845757]  ? kasan_atomics+0x152/0x310
[   14.845782]  kasan_atomics+0x1dc/0x310
[   14.845804]  ? __pfx_kasan_atomics+0x10/0x10
[   14.845827]  ? __pfx_read_tsc+0x10/0x10
[   14.845849]  ? ktime_get_ts64+0x86/0x230
[   14.845888]  kunit_try_run_case+0x1a5/0x480
[   14.845913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.845934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.846000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.846028]  ? __kthread_parkme+0x82/0x180
[   14.846053]  ? preempt_count_sub+0x50/0x80
[   14.846081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.846106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.846160]  kthread+0x337/0x6f0
[   14.846180]  ? trace_preempt_on+0x20/0xc0
[   14.846206]  ? __pfx_kthread+0x10/0x10
[   14.846226]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.846251]  ? calculate_sigpending+0x7b/0xa0
[   14.846274]  ? __pfx_kthread+0x10/0x10
[   14.846295]  ret_from_fork+0x41/0x80
[   14.846318]  ? __pfx_kthread+0x10/0x10
[   14.846338]  ret_from_fork_asm+0x1a/0x30
[   14.846371]  </TASK>
[   14.846383] 
[   14.858384] Allocated by task 285:
[   14.858736]  kasan_save_stack+0x45/0x70
[   14.859178]  kasan_save_track+0x18/0x40
[   14.859592]  kasan_save_alloc_info+0x3b/0x50
[   14.860028]  __kasan_kmalloc+0xb7/0xc0
[   14.860409]  __kmalloc_cache_noprof+0x189/0x420
[   14.860701]  kasan_atomics+0x95/0x310
[   14.861087]  kunit_try_run_case+0x1a5/0x480
[   14.861779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.862196]  kthread+0x337/0x6f0
[   14.862333]  ret_from_fork+0x41/0x80
[   14.862472]  ret_from_fork_asm+0x1a/0x30
[   14.862664] 
[   14.862742] The buggy address belongs to the object at ffff8881029e6b00
[   14.862742]  which belongs to the cache kmalloc-64 of size 64
[   14.863455] The buggy address is located 0 bytes to the right of
[   14.863455]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.864227] 
[   14.864339] The buggy address belongs to the physical page:
[   14.864744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.865026] flags: 0x200000000000000(node=0|zone=2)
[   14.865269] page_type: f5(slab)
[   14.865672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.866114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.866440] page dumped because: kasan: bad access detected
[   14.866684] 
[   14.866786] Memory state around the buggy address:
[   14.867088]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.867376]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.867774] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.868079]                                      ^
[   14.868302]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868687]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869059] ==================================================================
[   13.948113] ==================================================================
[   13.948375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.948771] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.949153] 
[   13.949271] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.949323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.949336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.949361] Call Trace:
[   13.949383]  <TASK>
[   13.949405]  dump_stack_lvl+0x73/0xb0
[   13.949435]  print_report+0xd1/0x650
[   13.949460]  ? __virt_addr_valid+0x1db/0x2d0
[   13.949486]  ? kasan_atomics_helper+0x565/0x5450
[   13.949510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.949705]  ? kasan_atomics_helper+0x565/0x5450
[   13.949732]  kasan_report+0x141/0x180
[   13.949759]  ? kasan_atomics_helper+0x565/0x5450
[   13.949797]  kasan_check_range+0x10c/0x1c0
[   13.949821]  __kasan_check_write+0x18/0x20
[   13.949930]  kasan_atomics_helper+0x565/0x5450
[   13.949964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.949990]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.950016]  ? kasan_atomics+0x152/0x310
[   13.950042]  kasan_atomics+0x1dc/0x310
[   13.950065]  ? __pfx_kasan_atomics+0x10/0x10
[   13.950088]  ? __pfx_read_tsc+0x10/0x10
[   13.950111]  ? ktime_get_ts64+0x86/0x230
[   13.950139]  kunit_try_run_case+0x1a5/0x480
[   13.950165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.950187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.950215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.950242]  ? __kthread_parkme+0x82/0x180
[   13.950266]  ? preempt_count_sub+0x50/0x80
[   13.950295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.950319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.950346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.950372]  kthread+0x337/0x6f0
[   13.950393]  ? trace_preempt_on+0x20/0xc0
[   13.950418]  ? __pfx_kthread+0x10/0x10
[   13.950439]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.950464]  ? calculate_sigpending+0x7b/0xa0
[   13.950489]  ? __pfx_kthread+0x10/0x10
[   13.950510]  ret_from_fork+0x41/0x80
[   13.950533]  ? __pfx_kthread+0x10/0x10
[   13.950553]  ret_from_fork_asm+0x1a/0x30
[   13.950587]  </TASK>
[   13.950600] 
[   13.959199] Allocated by task 285:
[   13.959342]  kasan_save_stack+0x45/0x70
[   13.959502]  kasan_save_track+0x18/0x40
[   13.959799]  kasan_save_alloc_info+0x3b/0x50
[   13.960108]  __kasan_kmalloc+0xb7/0xc0
[   13.960317]  __kmalloc_cache_noprof+0x189/0x420
[   13.960582]  kasan_atomics+0x95/0x310
[   13.960785]  kunit_try_run_case+0x1a5/0x480
[   13.961044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.961225]  kthread+0x337/0x6f0
[   13.961351]  ret_from_fork+0x41/0x80
[   13.961605]  ret_from_fork_asm+0x1a/0x30
[   13.962164] 
[   13.962280] The buggy address belongs to the object at ffff8881029e6b00
[   13.962280]  which belongs to the cache kmalloc-64 of size 64
[   13.962960] The buggy address is located 0 bytes to the right of
[   13.962960]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.963342] 
[   13.963442] The buggy address belongs to the physical page:
[   13.963712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.964105] flags: 0x200000000000000(node=0|zone=2)
[   13.964443] page_type: f5(slab)
[   13.964698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.964957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.965365] page dumped because: kasan: bad access detected
[   13.965968] 
[   13.966076] Memory state around the buggy address:
[   13.966263]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.966578]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.966951] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.967248]                                      ^
[   13.967411]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.967703]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.968044] ==================================================================
[   14.563978] ==================================================================
[   14.564279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.564728] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.565186] 
[   14.565281] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.565330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.565344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.565367] Call Trace:
[   14.565383]  <TASK>
[   14.565398]  dump_stack_lvl+0x73/0xb0
[   14.565427]  print_report+0xd1/0x650
[   14.565452]  ? __virt_addr_valid+0x1db/0x2d0
[   14.565476]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.565500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.565535]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.565561]  kasan_report+0x141/0x180
[   14.565586]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.565615]  kasan_check_range+0x10c/0x1c0
[   14.565638]  __kasan_check_write+0x18/0x20
[   14.565661]  kasan_atomics_helper+0x12e6/0x5450
[   14.565687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.565713]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.565739]  ? kasan_atomics+0x152/0x310
[   14.565765]  kasan_atomics+0x1dc/0x310
[   14.565789]  ? __pfx_kasan_atomics+0x10/0x10
[   14.565812]  ? __pfx_read_tsc+0x10/0x10
[   14.565834]  ? ktime_get_ts64+0x86/0x230
[   14.565862]  kunit_try_run_case+0x1a5/0x480
[   14.565903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.565925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.565952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.565979]  ? __kthread_parkme+0x82/0x180
[   14.566002]  ? preempt_count_sub+0x50/0x80
[   14.566030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.566053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.566079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.566106]  kthread+0x337/0x6f0
[   14.566126]  ? trace_preempt_on+0x20/0xc0
[   14.566151]  ? __pfx_kthread+0x10/0x10
[   14.566172]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.566197]  ? calculate_sigpending+0x7b/0xa0
[   14.566220]  ? __pfx_kthread+0x10/0x10
[   14.566241]  ret_from_fork+0x41/0x80
[   14.566264]  ? __pfx_kthread+0x10/0x10
[   14.566286]  ret_from_fork_asm+0x1a/0x30
[   14.566319]  </TASK>
[   14.566332] 
[   14.574328] Allocated by task 285:
[   14.574531]  kasan_save_stack+0x45/0x70
[   14.574747]  kasan_save_track+0x18/0x40
[   14.575008]  kasan_save_alloc_info+0x3b/0x50
[   14.575185]  __kasan_kmalloc+0xb7/0xc0
[   14.575392]  __kmalloc_cache_noprof+0x189/0x420
[   14.575665]  kasan_atomics+0x95/0x310
[   14.575815]  kunit_try_run_case+0x1a5/0x480
[   14.576122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.576362]  kthread+0x337/0x6f0
[   14.576524]  ret_from_fork+0x41/0x80
[   14.576703]  ret_from_fork_asm+0x1a/0x30
[   14.577042] 
[   14.577124] The buggy address belongs to the object at ffff8881029e6b00
[   14.577124]  which belongs to the cache kmalloc-64 of size 64
[   14.577484] The buggy address is located 0 bytes to the right of
[   14.577484]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.577858] 
[   14.577947] The buggy address belongs to the physical page:
[   14.578141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.578389] flags: 0x200000000000000(node=0|zone=2)
[   14.578555] page_type: f5(slab)
[   14.578680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.579246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.580172] page dumped because: kasan: bad access detected
[   14.580655] 
[   14.580828] Memory state around the buggy address:
[   14.581344]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.582126]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.582769] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.583555]                                      ^
[   14.584074]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.584715]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.585540] ==================================================================
[   14.975648] ==================================================================
[   14.976494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.976944] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.977260] 
[   14.977349] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.977397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.977412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.977434] Call Trace:
[   14.977450]  <TASK>
[   14.977466]  dump_stack_lvl+0x73/0xb0
[   14.977493]  print_report+0xd1/0x650
[   14.977529]  ? __virt_addr_valid+0x1db/0x2d0
[   14.977553]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.977578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.977604]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.977630]  kasan_report+0x141/0x180
[   14.977655]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.977685]  __asan_report_load8_noabort+0x18/0x20
[   14.977708]  kasan_atomics_helper+0x4f30/0x5450
[   14.977734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.977759]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.977783]  ? kasan_atomics+0x152/0x310
[   14.977809]  kasan_atomics+0x1dc/0x310
[   14.977831]  ? __pfx_kasan_atomics+0x10/0x10
[   14.977855]  ? __pfx_read_tsc+0x10/0x10
[   14.977889]  ? ktime_get_ts64+0x86/0x230
[   14.977917]  kunit_try_run_case+0x1a5/0x480
[   14.977941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.977963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.977989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.978016]  ? __kthread_parkme+0x82/0x180
[   14.978040]  ? preempt_count_sub+0x50/0x80
[   14.978066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.978089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.978141]  kthread+0x337/0x6f0
[   14.978160]  ? trace_preempt_on+0x20/0xc0
[   14.978186]  ? __pfx_kthread+0x10/0x10
[   14.978207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.978231]  ? calculate_sigpending+0x7b/0xa0
[   14.978255]  ? __pfx_kthread+0x10/0x10
[   14.978277]  ret_from_fork+0x41/0x80
[   14.978299]  ? __pfx_kthread+0x10/0x10
[   14.978320]  ret_from_fork_asm+0x1a/0x30
[   14.978352]  </TASK>
[   14.978364] 
[   14.986038] Allocated by task 285:
[   14.986170]  kasan_save_stack+0x45/0x70
[   14.986361]  kasan_save_track+0x18/0x40
[   14.986607]  kasan_save_alloc_info+0x3b/0x50
[   14.986824]  __kasan_kmalloc+0xb7/0xc0
[   14.987040]  __kmalloc_cache_noprof+0x189/0x420
[   14.987280]  kasan_atomics+0x95/0x310
[   14.987486]  kunit_try_run_case+0x1a5/0x480
[   14.987711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.987931]  kthread+0x337/0x6f0
[   14.988057]  ret_from_fork+0x41/0x80
[   14.988241]  ret_from_fork_asm+0x1a/0x30
[   14.988446] 
[   14.988556] The buggy address belongs to the object at ffff8881029e6b00
[   14.988556]  which belongs to the cache kmalloc-64 of size 64
[   14.989029] The buggy address is located 0 bytes to the right of
[   14.989029]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.989582] 
[   14.989670] The buggy address belongs to the physical page:
[   14.989903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.990198] flags: 0x200000000000000(node=0|zone=2)
[   14.990365] page_type: f5(slab)
[   14.990491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.990729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.991063] page dumped because: kasan: bad access detected
[   14.991580] 
[   14.991678] Memory state around the buggy address:
[   14.991915]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.992236]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.992457] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.993096]                                      ^
[   14.993258]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.993482]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.993817] ==================================================================
[   13.917247] ==================================================================
[   13.918045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.918389] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.919345] 
[   13.919628] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.919689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.919822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.919847] Call Trace:
[   13.919864]  <TASK>
[   13.919971]  dump_stack_lvl+0x73/0xb0
[   13.920007]  print_report+0xd1/0x650
[   13.920034]  ? __virt_addr_valid+0x1db/0x2d0
[   13.920057]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.920085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.920111]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.920175]  kasan_report+0x141/0x180
[   13.920202]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.920231]  __asan_report_store4_noabort+0x1b/0x30
[   13.920256]  kasan_atomics_helper+0x4b3a/0x5450
[   13.920282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.920307]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.920332]  ? kasan_atomics+0x152/0x310
[   13.920358]  kasan_atomics+0x1dc/0x310
[   13.920381]  ? __pfx_kasan_atomics+0x10/0x10
[   13.920405]  ? __pfx_read_tsc+0x10/0x10
[   13.920426]  ? ktime_get_ts64+0x86/0x230
[   13.920456]  kunit_try_run_case+0x1a5/0x480
[   13.920483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.920505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.920532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.920559]  ? __kthread_parkme+0x82/0x180
[   13.920584]  ? preempt_count_sub+0x50/0x80
[   13.920612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.920635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.920661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.920688]  kthread+0x337/0x6f0
[   13.920707]  ? trace_preempt_on+0x20/0xc0
[   13.920733]  ? __pfx_kthread+0x10/0x10
[   13.920754]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.920780]  ? calculate_sigpending+0x7b/0xa0
[   13.920804]  ? __pfx_kthread+0x10/0x10
[   13.920825]  ret_from_fork+0x41/0x80
[   13.920947]  ? __pfx_kthread+0x10/0x10
[   13.920970]  ret_from_fork_asm+0x1a/0x30
[   13.921003]  </TASK>
[   13.921017] 
[   13.933383] Allocated by task 285:
[   13.933794]  kasan_save_stack+0x45/0x70
[   13.934234]  kasan_save_track+0x18/0x40
[   13.934437]  kasan_save_alloc_info+0x3b/0x50
[   13.935005]  __kasan_kmalloc+0xb7/0xc0
[   13.935495]  __kmalloc_cache_noprof+0x189/0x420
[   13.936059]  kasan_atomics+0x95/0x310
[   13.936268]  kunit_try_run_case+0x1a5/0x480
[   13.936467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.937222]  kthread+0x337/0x6f0
[   13.937447]  ret_from_fork+0x41/0x80
[   13.937773]  ret_from_fork_asm+0x1a/0x30
[   13.938204] 
[   13.938308] The buggy address belongs to the object at ffff8881029e6b00
[   13.938308]  which belongs to the cache kmalloc-64 of size 64
[   13.939446] The buggy address is located 0 bytes to the right of
[   13.939446]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.940308] 
[   13.940417] The buggy address belongs to the physical page:
[   13.940851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.941457] flags: 0x200000000000000(node=0|zone=2)
[   13.941824] page_type: f5(slab)
[   13.942075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.942400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.943166] page dumped because: kasan: bad access detected
[   13.943860] 
[   13.944092] Memory state around the buggy address:
[   13.944324]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.945092]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.945587] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.946004]                                      ^
[   13.946234]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.946770]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.947558] ==================================================================
[   15.152325] ==================================================================
[   15.152707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.153128] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.153461] 
[   15.153649] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.153698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.153712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.153735] Call Trace:
[   15.153751]  <TASK>
[   15.153799]  dump_stack_lvl+0x73/0xb0
[   15.153827]  print_report+0xd1/0x650
[   15.153852]  ? __virt_addr_valid+0x1db/0x2d0
[   15.153888]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.153948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.153975]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.154000]  kasan_report+0x141/0x180
[   15.154025]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.154055]  __asan_report_load8_noabort+0x18/0x20
[   15.154107]  kasan_atomics_helper+0x4f98/0x5450
[   15.154133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.154159]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.154183]  ? kasan_atomics+0x152/0x310
[   15.154235]  kasan_atomics+0x1dc/0x310
[   15.154258]  ? __pfx_kasan_atomics+0x10/0x10
[   15.154281]  ? __pfx_read_tsc+0x10/0x10
[   15.154304]  ? ktime_get_ts64+0x86/0x230
[   15.154331]  kunit_try_run_case+0x1a5/0x480
[   15.154356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.154404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.154431]  ? __kthread_parkme+0x82/0x180
[   15.154454]  ? preempt_count_sub+0x50/0x80
[   15.154482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.154587]  kthread+0x337/0x6f0
[   15.154606]  ? trace_preempt_on+0x20/0xc0
[   15.154632]  ? __pfx_kthread+0x10/0x10
[   15.154652]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.154677]  ? calculate_sigpending+0x7b/0xa0
[   15.154700]  ? __pfx_kthread+0x10/0x10
[   15.154721]  ret_from_fork+0x41/0x80
[   15.154745]  ? __pfx_kthread+0x10/0x10
[   15.154765]  ret_from_fork_asm+0x1a/0x30
[   15.154798]  </TASK>
[   15.154811] 
[   15.163055] Allocated by task 285:
[   15.163251]  kasan_save_stack+0x45/0x70
[   15.163488]  kasan_save_track+0x18/0x40
[   15.163714]  kasan_save_alloc_info+0x3b/0x50
[   15.163957]  __kasan_kmalloc+0xb7/0xc0
[   15.164164]  __kmalloc_cache_noprof+0x189/0x420
[   15.164396]  kasan_atomics+0x95/0x310
[   15.164618]  kunit_try_run_case+0x1a5/0x480
[   15.164855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165139]  kthread+0x337/0x6f0
[   15.165270]  ret_from_fork+0x41/0x80
[   15.165448]  ret_from_fork_asm+0x1a/0x30
[   15.165769] 
[   15.165867] The buggy address belongs to the object at ffff8881029e6b00
[   15.165867]  which belongs to the cache kmalloc-64 of size 64
[   15.166726] The buggy address is located 0 bytes to the right of
[   15.166726]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.167288] 
[   15.167387] The buggy address belongs to the physical page:
[   15.167630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.167868] flags: 0x200000000000000(node=0|zone=2)
[   15.168041] page_type: f5(slab)
[   15.168164] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.168641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.169046] page dumped because: kasan: bad access detected
[   15.169339] 
[   15.169442] Memory state around the buggy address:
[   15.169914]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.170279]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.170617] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.170905]                                      ^
[   15.171060]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.171410]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.172030] ==================================================================
[   14.957615] ==================================================================
[   14.957883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.958336] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.958760] 
[   14.959100] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.959154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.959168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.959192] Call Trace:
[   14.959206]  <TASK>
[   14.959222]  dump_stack_lvl+0x73/0xb0
[   14.959252]  print_report+0xd1/0x650
[   14.959278]  ? __virt_addr_valid+0x1db/0x2d0
[   14.959304]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.959330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.959355]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.959381]  kasan_report+0x141/0x180
[   14.959406]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.959436]  kasan_check_range+0x10c/0x1c0
[   14.959459]  __kasan_check_write+0x18/0x20
[   14.959481]  kasan_atomics_helper+0x1c18/0x5450
[   14.959507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.959532]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.959558]  ? kasan_atomics+0x152/0x310
[   14.959588]  kasan_atomics+0x1dc/0x310
[   14.959610]  ? __pfx_kasan_atomics+0x10/0x10
[   14.959633]  ? __pfx_read_tsc+0x10/0x10
[   14.959655]  ? ktime_get_ts64+0x86/0x230
[   14.959683]  kunit_try_run_case+0x1a5/0x480
[   14.959708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.959730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.959756]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.959783]  ? __kthread_parkme+0x82/0x180
[   14.959807]  ? preempt_count_sub+0x50/0x80
[   14.959835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.959858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.959895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.959922]  kthread+0x337/0x6f0
[   14.959941]  ? trace_preempt_on+0x20/0xc0
[   14.959967]  ? __pfx_kthread+0x10/0x10
[   14.959987]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.960012]  ? calculate_sigpending+0x7b/0xa0
[   14.960036]  ? __pfx_kthread+0x10/0x10
[   14.960056]  ret_from_fork+0x41/0x80
[   14.960079]  ? __pfx_kthread+0x10/0x10
[   14.960100]  ret_from_fork_asm+0x1a/0x30
[   14.960132]  </TASK>
[   14.960146] 
[   14.967610] Allocated by task 285:
[   14.967796]  kasan_save_stack+0x45/0x70
[   14.968020]  kasan_save_track+0x18/0x40
[   14.968187]  kasan_save_alloc_info+0x3b/0x50
[   14.968400]  __kasan_kmalloc+0xb7/0xc0
[   14.968623]  __kmalloc_cache_noprof+0x189/0x420
[   14.968819]  kasan_atomics+0x95/0x310
[   14.969000]  kunit_try_run_case+0x1a5/0x480
[   14.969152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.969373]  kthread+0x337/0x6f0
[   14.969578]  ret_from_fork+0x41/0x80
[   14.969778]  ret_from_fork_asm+0x1a/0x30
[   14.969999] 
[   14.970102] The buggy address belongs to the object at ffff8881029e6b00
[   14.970102]  which belongs to the cache kmalloc-64 of size 64
[   14.970613] The buggy address is located 0 bytes to the right of
[   14.970613]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.971105] 
[   14.971208] The buggy address belongs to the physical page:
[   14.971424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.971770] flags: 0x200000000000000(node=0|zone=2)
[   14.972030] page_type: f5(slab)
[   14.972208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.972530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.972854] page dumped because: kasan: bad access detected
[   14.973090] 
[   14.973185] Memory state around the buggy address:
[   14.973381]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973648]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973869] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.974098]                                      ^
[   14.974285]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974732]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.975064] ==================================================================
[   15.246733] ==================================================================
[   15.246999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.247819] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.248283] 
[   15.248475] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.248589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.248608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.248633] Call Trace:
[   15.248654]  <TASK>
[   15.248675]  dump_stack_lvl+0x73/0xb0
[   15.248707]  print_report+0xd1/0x650
[   15.248735]  ? __virt_addr_valid+0x1db/0x2d0
[   15.248759]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.248783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.248809]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.248833]  kasan_report+0x141/0x180
[   15.248859]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.248901]  __asan_report_load8_noabort+0x18/0x20
[   15.248925]  kasan_atomics_helper+0x4fa5/0x5450
[   15.248951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.248976]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249001]  ? kasan_atomics+0x152/0x310
[   15.249027]  kasan_atomics+0x1dc/0x310
[   15.249049]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249073]  ? __pfx_read_tsc+0x10/0x10
[   15.249094]  ? ktime_get_ts64+0x86/0x230
[   15.249123]  kunit_try_run_case+0x1a5/0x480
[   15.249149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.249198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249225]  ? __kthread_parkme+0x82/0x180
[   15.249250]  ? preempt_count_sub+0x50/0x80
[   15.249278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.249355]  kthread+0x337/0x6f0
[   15.249373]  ? trace_preempt_on+0x20/0xc0
[   15.249400]  ? __pfx_kthread+0x10/0x10
[   15.249420]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.249446]  ? calculate_sigpending+0x7b/0xa0
[   15.249470]  ? __pfx_kthread+0x10/0x10
[   15.249492]  ret_from_fork+0x41/0x80
[   15.249514]  ? __pfx_kthread+0x10/0x10
[   15.249535]  ret_from_fork_asm+0x1a/0x30
[   15.249568]  </TASK>
[   15.249582] 
[   15.260461] Allocated by task 285:
[   15.260694]  kasan_save_stack+0x45/0x70
[   15.261037]  kasan_save_track+0x18/0x40
[   15.261334]  kasan_save_alloc_info+0x3b/0x50
[   15.261677]  __kasan_kmalloc+0xb7/0xc0
[   15.261979]  __kmalloc_cache_noprof+0x189/0x420
[   15.262295]  kasan_atomics+0x95/0x310
[   15.262582]  kunit_try_run_case+0x1a5/0x480
[   15.262902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.263176]  kthread+0x337/0x6f0
[   15.263335]  ret_from_fork+0x41/0x80
[   15.263480]  ret_from_fork_asm+0x1a/0x30
[   15.263950] 
[   15.264035] The buggy address belongs to the object at ffff8881029e6b00
[   15.264035]  which belongs to the cache kmalloc-64 of size 64
[   15.264959] The buggy address is located 0 bytes to the right of
[   15.264959]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.265656] 
[   15.265952] The buggy address belongs to the physical page:
[   15.266218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.266667] flags: 0x200000000000000(node=0|zone=2)
[   15.267050] page_type: f5(slab)
[   15.267321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.267863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.268303] page dumped because: kasan: bad access detected
[   15.268704] 
[   15.268919] Memory state around the buggy address:
[   15.269254]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.269560]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.269899] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.270163]                                      ^
[   15.270340]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.270700]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.271074] ==================================================================
[   14.519969] ==================================================================
[   14.520321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.520834] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.521266] 
[   14.521362] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.521410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.521425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.521447] Call Trace:
[   14.521462]  <TASK>
[   14.521479]  dump_stack_lvl+0x73/0xb0
[   14.521507]  print_report+0xd1/0x650
[   14.521533]  ? __virt_addr_valid+0x1db/0x2d0
[   14.521557]  ? kasan_atomics_helper+0x1217/0x5450
[   14.521582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.521607]  ? kasan_atomics_helper+0x1217/0x5450
[   14.521633]  kasan_report+0x141/0x180
[   14.521658]  ? kasan_atomics_helper+0x1217/0x5450
[   14.521687]  kasan_check_range+0x10c/0x1c0
[   14.521710]  __kasan_check_write+0x18/0x20
[   14.521733]  kasan_atomics_helper+0x1217/0x5450
[   14.521759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.521784]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.521809]  ? kasan_atomics+0x152/0x310
[   14.521907]  kasan_atomics+0x1dc/0x310
[   14.521936]  ? __pfx_kasan_atomics+0x10/0x10
[   14.521961]  ? __pfx_read_tsc+0x10/0x10
[   14.521984]  ? ktime_get_ts64+0x86/0x230
[   14.522012]  kunit_try_run_case+0x1a5/0x480
[   14.522036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.522059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.522085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.522112]  ? __kthread_parkme+0x82/0x180
[   14.522136]  ? preempt_count_sub+0x50/0x80
[   14.522163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.522187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.522214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.522241]  kthread+0x337/0x6f0
[   14.522260]  ? trace_preempt_on+0x20/0xc0
[   14.522285]  ? __pfx_kthread+0x10/0x10
[   14.522306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.522331]  ? calculate_sigpending+0x7b/0xa0
[   14.522355]  ? __pfx_kthread+0x10/0x10
[   14.522377]  ret_from_fork+0x41/0x80
[   14.522399]  ? __pfx_kthread+0x10/0x10
[   14.522420]  ret_from_fork_asm+0x1a/0x30
[   14.522453]  </TASK>
[   14.522465] 
[   14.532024] Allocated by task 285:
[   14.532231]  kasan_save_stack+0x45/0x70
[   14.533035]  kasan_save_track+0x18/0x40
[   14.533313]  kasan_save_alloc_info+0x3b/0x50
[   14.533494]  __kasan_kmalloc+0xb7/0xc0
[   14.533737]  __kmalloc_cache_noprof+0x189/0x420
[   14.534165]  kasan_atomics+0x95/0x310
[   14.534370]  kunit_try_run_case+0x1a5/0x480
[   14.534992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.535255]  kthread+0x337/0x6f0
[   14.535413]  ret_from_fork+0x41/0x80
[   14.535642]  ret_from_fork_asm+0x1a/0x30
[   14.535828] 
[   14.536044] The buggy address belongs to the object at ffff8881029e6b00
[   14.536044]  which belongs to the cache kmalloc-64 of size 64
[   14.536622] The buggy address is located 0 bytes to the right of
[   14.536622]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.537086] 
[   14.537373] The buggy address belongs to the physical page:
[   14.537925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.538266] flags: 0x200000000000000(node=0|zone=2)
[   14.538508] page_type: f5(slab)
[   14.538657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.539151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.539496] page dumped because: kasan: bad access detected
[   14.539773] 
[   14.539848] Memory state around the buggy address:
[   14.540228]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540540]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540823] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.541341]                                      ^
[   14.541562]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542078]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542402] ==================================================================
[   14.299258] ==================================================================
[   14.299998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.300489] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.301173] 
[   14.301274] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.301324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.301339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.301362] Call Trace:
[   14.301379]  <TASK>
[   14.301396]  dump_stack_lvl+0x73/0xb0
[   14.301425]  print_report+0xd1/0x650
[   14.301452]  ? __virt_addr_valid+0x1db/0x2d0
[   14.301477]  ? kasan_atomics_helper+0xde0/0x5450
[   14.301501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.301528]  ? kasan_atomics_helper+0xde0/0x5450
[   14.301553]  kasan_report+0x141/0x180
[   14.301580]  ? kasan_atomics_helper+0xde0/0x5450
[   14.301609]  kasan_check_range+0x10c/0x1c0
[   14.301633]  __kasan_check_write+0x18/0x20
[   14.301656]  kasan_atomics_helper+0xde0/0x5450
[   14.301681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.301707]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.301731]  ? kasan_atomics+0x152/0x310
[   14.301757]  kasan_atomics+0x1dc/0x310
[   14.301779]  ? __pfx_kasan_atomics+0x10/0x10
[   14.301803]  ? __pfx_read_tsc+0x10/0x10
[   14.301825]  ? ktime_get_ts64+0x86/0x230
[   14.301864]  kunit_try_run_case+0x1a5/0x480
[   14.301904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.302007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.302053]  ? __kthread_parkme+0x82/0x180
[   14.302080]  ? preempt_count_sub+0x50/0x80
[   14.302118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.302142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.302168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.302195]  kthread+0x337/0x6f0
[   14.302214]  ? trace_preempt_on+0x20/0xc0
[   14.302240]  ? __pfx_kthread+0x10/0x10
[   14.302261]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.302285]  ? calculate_sigpending+0x7b/0xa0
[   14.302309]  ? __pfx_kthread+0x10/0x10
[   14.302330]  ret_from_fork+0x41/0x80
[   14.302353]  ? __pfx_kthread+0x10/0x10
[   14.302374]  ret_from_fork_asm+0x1a/0x30
[   14.302407]  </TASK>
[   14.302419] 
[   14.317349] Allocated by task 285:
[   14.317489]  kasan_save_stack+0x45/0x70
[   14.317643]  kasan_save_track+0x18/0x40
[   14.317786]  kasan_save_alloc_info+0x3b/0x50
[   14.318110]  __kasan_kmalloc+0xb7/0xc0
[   14.319208]  __kmalloc_cache_noprof+0x189/0x420
[   14.319382]  kasan_atomics+0x95/0x310
[   14.319530]  kunit_try_run_case+0x1a5/0x480
[   14.320092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.320596]  kthread+0x337/0x6f0
[   14.320980]  ret_from_fork+0x41/0x80
[   14.321327]  ret_from_fork_asm+0x1a/0x30
[   14.321763] 
[   14.322026] The buggy address belongs to the object at ffff8881029e6b00
[   14.322026]  which belongs to the cache kmalloc-64 of size 64
[   14.322500] The buggy address is located 0 bytes to the right of
[   14.322500]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.322986] 
[   14.323153] The buggy address belongs to the physical page:
[   14.323637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.324578] flags: 0x200000000000000(node=0|zone=2)
[   14.325120] page_type: f5(slab)
[   14.325483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.326315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.327076] page dumped because: kasan: bad access detected
[   14.327376] 
[   14.327454] Memory state around the buggy address:
[   14.327725]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.328600]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.329363] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.329842]                                      ^
[   14.330061]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.330749]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.331482] ==================================================================
[   14.755249] ==================================================================
[   14.755524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.755764] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.756290] 
[   14.757061] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.757116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.757131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.757154] Call Trace:
[   14.757171]  <TASK>
[   14.757189]  dump_stack_lvl+0x73/0xb0
[   14.757218]  print_report+0xd1/0x650
[   14.757243]  ? __virt_addr_valid+0x1db/0x2d0
[   14.757267]  ? kasan_atomics_helper+0x164f/0x5450
[   14.757293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.757319]  ? kasan_atomics_helper+0x164f/0x5450
[   14.757344]  kasan_report+0x141/0x180
[   14.757369]  ? kasan_atomics_helper+0x164f/0x5450
[   14.757399]  kasan_check_range+0x10c/0x1c0
[   14.757422]  __kasan_check_write+0x18/0x20
[   14.757445]  kasan_atomics_helper+0x164f/0x5450
[   14.757471]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.757496]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.757535]  ? kasan_atomics+0x152/0x310
[   14.757561]  kasan_atomics+0x1dc/0x310
[   14.757583]  ? __pfx_kasan_atomics+0x10/0x10
[   14.757607]  ? __pfx_read_tsc+0x10/0x10
[   14.757629]  ? ktime_get_ts64+0x86/0x230
[   14.757657]  kunit_try_run_case+0x1a5/0x480
[   14.757681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.757730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.757757]  ? __kthread_parkme+0x82/0x180
[   14.757781]  ? preempt_count_sub+0x50/0x80
[   14.757809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.758130]  kthread+0x337/0x6f0
[   14.758151]  ? trace_preempt_on+0x20/0xc0
[   14.758178]  ? __pfx_kthread+0x10/0x10
[   14.758199]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.758224]  ? calculate_sigpending+0x7b/0xa0
[   14.758248]  ? __pfx_kthread+0x10/0x10
[   14.758523]  ret_from_fork+0x41/0x80
[   14.758549]  ? __pfx_kthread+0x10/0x10
[   14.758570]  ret_from_fork_asm+0x1a/0x30
[   14.758603]  </TASK>
[   14.758616] 
[   14.769299] Allocated by task 285:
[   14.769439]  kasan_save_stack+0x45/0x70
[   14.769724]  kasan_save_track+0x18/0x40
[   14.770169]  kasan_save_alloc_info+0x3b/0x50
[   14.770533]  __kasan_kmalloc+0xb7/0xc0
[   14.770816]  __kmalloc_cache_noprof+0x189/0x420
[   14.771076]  kasan_atomics+0x95/0x310
[   14.771245]  kunit_try_run_case+0x1a5/0x480
[   14.771462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771962]  kthread+0x337/0x6f0
[   14.772134]  ret_from_fork+0x41/0x80
[   14.772397]  ret_from_fork_asm+0x1a/0x30
[   14.772734] 
[   14.772830] The buggy address belongs to the object at ffff8881029e6b00
[   14.772830]  which belongs to the cache kmalloc-64 of size 64
[   14.773499] The buggy address is located 0 bytes to the right of
[   14.773499]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.774221] 
[   14.774322] The buggy address belongs to the physical page:
[   14.774676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.775173] flags: 0x200000000000000(node=0|zone=2)
[   14.775355] page_type: f5(slab)
[   14.775537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.776116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.776424] page dumped because: kasan: bad access detected
[   14.776891] 
[   14.777064] Memory state around the buggy address:
[   14.777313]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.777693]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.778259] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.778666]                                      ^
[   14.778833]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779317]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779691] ==================================================================
[   14.408697] ==================================================================
[   14.409091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.409370] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.409829] 
[   14.409953] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.410002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.410015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.410039] Call Trace:
[   14.410054]  <TASK>
[   14.410069]  dump_stack_lvl+0x73/0xb0
[   14.410096]  print_report+0xd1/0x650
[   14.410121]  ? __virt_addr_valid+0x1db/0x2d0
[   14.410145]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.410170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.410195]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.410221]  kasan_report+0x141/0x180
[   14.410246]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.410276]  __asan_report_load4_noabort+0x18/0x20
[   14.410300]  kasan_atomics_helper+0x4a36/0x5450
[   14.410326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.410351]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.410375]  ? kasan_atomics+0x152/0x310
[   14.410402]  kasan_atomics+0x1dc/0x310
[   14.410424]  ? __pfx_kasan_atomics+0x10/0x10
[   14.410447]  ? __pfx_read_tsc+0x10/0x10
[   14.410470]  ? ktime_get_ts64+0x86/0x230
[   14.410498]  kunit_try_run_case+0x1a5/0x480
[   14.410715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410746]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.410773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.410800]  ? __kthread_parkme+0x82/0x180
[   14.410824]  ? preempt_count_sub+0x50/0x80
[   14.410852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.410916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.410944]  kthread+0x337/0x6f0
[   14.410964]  ? trace_preempt_on+0x20/0xc0
[   14.410989]  ? __pfx_kthread+0x10/0x10
[   14.411010]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.411035]  ? calculate_sigpending+0x7b/0xa0
[   14.411062]  ? __pfx_kthread+0x10/0x10
[   14.411084]  ret_from_fork+0x41/0x80
[   14.411107]  ? __pfx_kthread+0x10/0x10
[   14.411128]  ret_from_fork_asm+0x1a/0x30
[   14.411214]  </TASK>
[   14.411228] 
[   14.421089] Allocated by task 285:
[   14.421243]  kasan_save_stack+0x45/0x70
[   14.421403]  kasan_save_track+0x18/0x40
[   14.421564]  kasan_save_alloc_info+0x3b/0x50
[   14.421720]  __kasan_kmalloc+0xb7/0xc0
[   14.421946]  __kmalloc_cache_noprof+0x189/0x420
[   14.422250]  kasan_atomics+0x95/0x310
[   14.422432]  kunit_try_run_case+0x1a5/0x480
[   14.422607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.422791]  kthread+0x337/0x6f0
[   14.422981]  ret_from_fork+0x41/0x80
[   14.423173]  ret_from_fork_asm+0x1a/0x30
[   14.423377] 
[   14.423479] The buggy address belongs to the object at ffff8881029e6b00
[   14.423479]  which belongs to the cache kmalloc-64 of size 64
[   14.424062] The buggy address is located 0 bytes to the right of
[   14.424062]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.425376] 
[   14.425477] The buggy address belongs to the physical page:
[   14.425685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.426017] flags: 0x200000000000000(node=0|zone=2)
[   14.426264] page_type: f5(slab)
[   14.426441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.427188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.427429] page dumped because: kasan: bad access detected
[   14.427609] 
[   14.427684] Memory state around the buggy address:
[   14.428355]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.429081]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.429314] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.429914]                                      ^
[   14.430123]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430415]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.430820] ==================================================================
[   14.586422] ==================================================================
[   14.587157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.588030] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.588849] 
[   14.589102] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.589153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.589167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.589190] Call Trace:
[   14.589206]  <TASK>
[   14.589223]  dump_stack_lvl+0x73/0xb0
[   14.589251]  print_report+0xd1/0x650
[   14.589277]  ? __virt_addr_valid+0x1db/0x2d0
[   14.589300]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.589325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.589351]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.589375]  kasan_report+0x141/0x180
[   14.589402]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.589431]  __asan_report_load4_noabort+0x18/0x20
[   14.589455]  kasan_atomics_helper+0x49ce/0x5450
[   14.589481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.589507]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.589531]  ? kasan_atomics+0x152/0x310
[   14.589559]  kasan_atomics+0x1dc/0x310
[   14.589582]  ? __pfx_kasan_atomics+0x10/0x10
[   14.589606]  ? __pfx_read_tsc+0x10/0x10
[   14.589628]  ? ktime_get_ts64+0x86/0x230
[   14.589656]  kunit_try_run_case+0x1a5/0x480
[   14.589680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.589728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.589755]  ? __kthread_parkme+0x82/0x180
[   14.589779]  ? preempt_count_sub+0x50/0x80
[   14.589807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.589830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.589947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.589975]  kthread+0x337/0x6f0
[   14.589995]  ? trace_preempt_on+0x20/0xc0
[   14.590022]  ? __pfx_kthread+0x10/0x10
[   14.590042]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.590067]  ? calculate_sigpending+0x7b/0xa0
[   14.590091]  ? __pfx_kthread+0x10/0x10
[   14.590113]  ret_from_fork+0x41/0x80
[   14.590136]  ? __pfx_kthread+0x10/0x10
[   14.590157]  ret_from_fork_asm+0x1a/0x30
[   14.590190]  </TASK>
[   14.590202] 
[   14.603153] Allocated by task 285:
[   14.603342]  kasan_save_stack+0x45/0x70
[   14.603497]  kasan_save_track+0x18/0x40
[   14.603699]  kasan_save_alloc_info+0x3b/0x50
[   14.604091]  __kasan_kmalloc+0xb7/0xc0
[   14.604293]  __kmalloc_cache_noprof+0x189/0x420
[   14.604491]  kasan_atomics+0x95/0x310
[   14.604690]  kunit_try_run_case+0x1a5/0x480
[   14.604986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.605188]  kthread+0x337/0x6f0
[   14.605363]  ret_from_fork+0x41/0x80
[   14.605593]  ret_from_fork_asm+0x1a/0x30
[   14.605775] 
[   14.605856] The buggy address belongs to the object at ffff8881029e6b00
[   14.605856]  which belongs to the cache kmalloc-64 of size 64
[   14.606375] The buggy address is located 0 bytes to the right of
[   14.606375]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.606911] 
[   14.607064] The buggy address belongs to the physical page:
[   14.607552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.607946] flags: 0x200000000000000(node=0|zone=2)
[   14.608156] page_type: f5(slab)
[   14.608317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.608661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.608971] page dumped because: kasan: bad access detected
[   14.609192] 
[   14.609291] Memory state around the buggy address:
[   14.609542]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609826]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.610111] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.610410]                                      ^
[   14.610640]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610861]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.611122] ==================================================================
[   14.224741] ==================================================================
[   14.226034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.227357] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.228472] 
[   14.228977] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.229064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.229082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.229107] Call Trace:
[   14.229123]  <TASK>
[   14.229141]  dump_stack_lvl+0x73/0xb0
[   14.229172]  print_report+0xd1/0x650
[   14.229199]  ? __virt_addr_valid+0x1db/0x2d0
[   14.229231]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.229255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.229281]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.229305]  kasan_report+0x141/0x180
[   14.229330]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.229360]  __asan_report_load4_noabort+0x18/0x20
[   14.229383]  kasan_atomics_helper+0x4a84/0x5450
[   14.229409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.229434]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.229458]  ? kasan_atomics+0x152/0x310
[   14.229483]  kasan_atomics+0x1dc/0x310
[   14.229505]  ? __pfx_kasan_atomics+0x10/0x10
[   14.229530]  ? __pfx_read_tsc+0x10/0x10
[   14.229552]  ? ktime_get_ts64+0x86/0x230
[   14.229581]  kunit_try_run_case+0x1a5/0x480
[   14.229607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.229628]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.229655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.229681]  ? __kthread_parkme+0x82/0x180
[   14.229704]  ? preempt_count_sub+0x50/0x80
[   14.229732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.229754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.229780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.229807]  kthread+0x337/0x6f0
[   14.229826]  ? trace_preempt_on+0x20/0xc0
[   14.229894]  ? __pfx_kthread+0x10/0x10
[   14.229916]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.229941]  ? calculate_sigpending+0x7b/0xa0
[   14.229965]  ? __pfx_kthread+0x10/0x10
[   14.229986]  ret_from_fork+0x41/0x80
[   14.230009]  ? __pfx_kthread+0x10/0x10
[   14.230028]  ret_from_fork_asm+0x1a/0x30
[   14.230061]  </TASK>
[   14.230075] 
[   14.248137] Allocated by task 285:
[   14.248982]  kasan_save_stack+0x45/0x70
[   14.249599]  kasan_save_track+0x18/0x40
[   14.250331]  kasan_save_alloc_info+0x3b/0x50
[   14.251077]  __kasan_kmalloc+0xb7/0xc0
[   14.251626]  __kmalloc_cache_noprof+0x189/0x420
[   14.252331]  kasan_atomics+0x95/0x310
[   14.252482]  kunit_try_run_case+0x1a5/0x480
[   14.253317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.254016]  kthread+0x337/0x6f0
[   14.254175]  ret_from_fork+0x41/0x80
[   14.254314]  ret_from_fork_asm+0x1a/0x30
[   14.254470] 
[   14.254547] The buggy address belongs to the object at ffff8881029e6b00
[   14.254547]  which belongs to the cache kmalloc-64 of size 64
[   14.255772] The buggy address is located 0 bytes to the right of
[   14.255772]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.257188] 
[   14.257357] The buggy address belongs to the physical page:
[   14.257702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.258368] flags: 0x200000000000000(node=0|zone=2)
[   14.258892] page_type: f5(slab)
[   14.259232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.259660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.260156] page dumped because: kasan: bad access detected
[   14.260584] 
[   14.260761] Memory state around the buggy address:
[   14.261312]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.261850]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.262294] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.263025]                                      ^
[   14.263242]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.263800]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.264608] ==================================================================
[   14.611631] ==================================================================
[   14.612081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.612399] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.612749] 
[   14.612857] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.612915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.612929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.612951] Call Trace:
[   14.612968]  <TASK>
[   14.612984]  dump_stack_lvl+0x73/0xb0
[   14.613010]  print_report+0xd1/0x650
[   14.613037]  ? __virt_addr_valid+0x1db/0x2d0
[   14.613061]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.613085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.613111]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.613136]  kasan_report+0x141/0x180
[   14.613162]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.613191]  kasan_check_range+0x10c/0x1c0
[   14.613214]  __kasan_check_read+0x15/0x20
[   14.613237]  kasan_atomics_helper+0x13b5/0x5450
[   14.613262]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.613288]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.613312]  ? kasan_atomics+0x152/0x310
[   14.613338]  kasan_atomics+0x1dc/0x310
[   14.613360]  ? __pfx_kasan_atomics+0x10/0x10
[   14.613383]  ? __pfx_read_tsc+0x10/0x10
[   14.613406]  ? ktime_get_ts64+0x86/0x230
[   14.613434]  kunit_try_run_case+0x1a5/0x480
[   14.613458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.613479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.613521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.613549]  ? __kthread_parkme+0x82/0x180
[   14.613572]  ? preempt_count_sub+0x50/0x80
[   14.613601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.613628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.613656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.613682]  kthread+0x337/0x6f0
[   14.613702]  ? trace_preempt_on+0x20/0xc0
[   14.613728]  ? __pfx_kthread+0x10/0x10
[   14.613748]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.613773]  ? calculate_sigpending+0x7b/0xa0
[   14.613797]  ? __pfx_kthread+0x10/0x10
[   14.613818]  ret_from_fork+0x41/0x80
[   14.613841]  ? __pfx_kthread+0x10/0x10
[   14.613861]  ret_from_fork_asm+0x1a/0x30
[   14.613904]  </TASK>
[   14.613916] 
[   14.622130] Allocated by task 285:
[   14.622318]  kasan_save_stack+0x45/0x70
[   14.622568]  kasan_save_track+0x18/0x40
[   14.622775]  kasan_save_alloc_info+0x3b/0x50
[   14.623180]  __kasan_kmalloc+0xb7/0xc0
[   14.623350]  __kmalloc_cache_noprof+0x189/0x420
[   14.623509]  kasan_atomics+0x95/0x310
[   14.623652]  kunit_try_run_case+0x1a5/0x480
[   14.623801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.624057]  kthread+0x337/0x6f0
[   14.624236]  ret_from_fork+0x41/0x80
[   14.624458]  ret_from_fork_asm+0x1a/0x30
[   14.624913] 
[   14.625031] The buggy address belongs to the object at ffff8881029e6b00
[   14.625031]  which belongs to the cache kmalloc-64 of size 64
[   14.625667] The buggy address is located 0 bytes to the right of
[   14.625667]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.626197] 
[   14.626278] The buggy address belongs to the physical page:
[   14.626454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.627166] flags: 0x200000000000000(node=0|zone=2)
[   14.627435] page_type: f5(slab)
[   14.627617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.627902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.628133] page dumped because: kasan: bad access detected
[   14.628728] 
[   14.628835] Memory state around the buggy address:
[   14.629179]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.629494]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.629795] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.630165]                                      ^
[   14.630350]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.630572]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.630790] ==================================================================
[   14.909632] ==================================================================
[   14.909990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.910298] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.910738] 
[   14.910921] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.910969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.910982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911005] Call Trace:
[   14.911019]  <TASK>
[   14.911034]  dump_stack_lvl+0x73/0xb0
[   14.911059]  print_report+0xd1/0x650
[   14.911085]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911107]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.911132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911157]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.911182]  kasan_report+0x141/0x180
[   14.911207]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.911237]  kasan_check_range+0x10c/0x1c0
[   14.911260]  __kasan_check_write+0x18/0x20
[   14.911283]  kasan_atomics_helper+0x1a7f/0x5450
[   14.911309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.911335]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.911360]  ? kasan_atomics+0x152/0x310
[   14.911386]  kasan_atomics+0x1dc/0x310
[   14.911409]  ? __pfx_kasan_atomics+0x10/0x10
[   14.911433]  ? __pfx_read_tsc+0x10/0x10
[   14.911454]  ? ktime_get_ts64+0x86/0x230
[   14.911482]  kunit_try_run_case+0x1a5/0x480
[   14.911507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.911554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.911596]  ? __kthread_parkme+0x82/0x180
[   14.911619]  ? preempt_count_sub+0x50/0x80
[   14.911648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.911697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.911723]  kthread+0x337/0x6f0
[   14.911742]  ? trace_preempt_on+0x20/0xc0
[   14.911768]  ? __pfx_kthread+0x10/0x10
[   14.911789]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.911813]  ? calculate_sigpending+0x7b/0xa0
[   14.911849]  ? __pfx_kthread+0x10/0x10
[   14.911871]  ret_from_fork+0x41/0x80
[   14.911903]  ? __pfx_kthread+0x10/0x10
[   14.911924]  ret_from_fork_asm+0x1a/0x30
[   14.911957]  </TASK>
[   14.911969] 
[   14.920060] Allocated by task 285:
[   14.920195]  kasan_save_stack+0x45/0x70
[   14.920407]  kasan_save_track+0x18/0x40
[   14.920714]  kasan_save_alloc_info+0x3b/0x50
[   14.921074]  __kasan_kmalloc+0xb7/0xc0
[   14.921294]  __kmalloc_cache_noprof+0x189/0x420
[   14.921547]  kasan_atomics+0x95/0x310
[   14.921716]  kunit_try_run_case+0x1a5/0x480
[   14.921865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.922055]  kthread+0x337/0x6f0
[   14.922179]  ret_from_fork+0x41/0x80
[   14.922315]  ret_from_fork_asm+0x1a/0x30
[   14.922656] 
[   14.922848] The buggy address belongs to the object at ffff8881029e6b00
[   14.922848]  which belongs to the cache kmalloc-64 of size 64
[   14.923387] The buggy address is located 0 bytes to the right of
[   14.923387]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.923939] 
[   14.924017] The buggy address belongs to the physical page:
[   14.924194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.924440] flags: 0x200000000000000(node=0|zone=2)
[   14.924674] page_type: f5(slab)
[   14.924849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.925274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.925648] page dumped because: kasan: bad access detected
[   14.925871] 
[   14.925954] Memory state around the buggy address:
[   14.926114]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.926335]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.926744] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.927176]                                      ^
[   14.927463]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.927843]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928194] ==================================================================
[   14.199304] ==================================================================
[   14.199690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.200030] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.200363] 
[   14.200474] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.200521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.200533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.200571] Call Trace:
[   14.200587]  <TASK>
[   14.200604]  dump_stack_lvl+0x73/0xb0
[   14.200633]  print_report+0xd1/0x650
[   14.200774]  ? __virt_addr_valid+0x1db/0x2d0
[   14.200821]  ? kasan_atomics_helper+0xc70/0x5450
[   14.200933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.200969]  ? kasan_atomics_helper+0xc70/0x5450
[   14.200994]  kasan_report+0x141/0x180
[   14.201020]  ? kasan_atomics_helper+0xc70/0x5450
[   14.201050]  kasan_check_range+0x10c/0x1c0
[   14.201074]  __kasan_check_write+0x18/0x20
[   14.201097]  kasan_atomics_helper+0xc70/0x5450
[   14.201123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.201149]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.201173]  ? kasan_atomics+0x152/0x310
[   14.201199]  kasan_atomics+0x1dc/0x310
[   14.201221]  ? __pfx_kasan_atomics+0x10/0x10
[   14.201245]  ? __pfx_read_tsc+0x10/0x10
[   14.201268]  ? ktime_get_ts64+0x86/0x230
[   14.201296]  kunit_try_run_case+0x1a5/0x480
[   14.201320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.201342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.201370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.201396]  ? __kthread_parkme+0x82/0x180
[   14.201422]  ? preempt_count_sub+0x50/0x80
[   14.201450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.201474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.201501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.201528]  kthread+0x337/0x6f0
[   14.201548]  ? trace_preempt_on+0x20/0xc0
[   14.201573]  ? __pfx_kthread+0x10/0x10
[   14.201594]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.201619]  ? calculate_sigpending+0x7b/0xa0
[   14.201643]  ? __pfx_kthread+0x10/0x10
[   14.201665]  ret_from_fork+0x41/0x80
[   14.201688]  ? __pfx_kthread+0x10/0x10
[   14.201709]  ret_from_fork_asm+0x1a/0x30
[   14.201742]  </TASK>
[   14.201755] 
[   14.210405] Allocated by task 285:
[   14.210630]  kasan_save_stack+0x45/0x70
[   14.210820]  kasan_save_track+0x18/0x40
[   14.211058]  kasan_save_alloc_info+0x3b/0x50
[   14.211216]  __kasan_kmalloc+0xb7/0xc0
[   14.211398]  __kmalloc_cache_noprof+0x189/0x420
[   14.211628]  kasan_atomics+0x95/0x310
[   14.211830]  kunit_try_run_case+0x1a5/0x480
[   14.212062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.212262]  kthread+0x337/0x6f0
[   14.212390]  ret_from_fork+0x41/0x80
[   14.212725]  ret_from_fork_asm+0x1a/0x30
[   14.213174] 
[   14.213288] The buggy address belongs to the object at ffff8881029e6b00
[   14.213288]  which belongs to the cache kmalloc-64 of size 64
[   14.213649] The buggy address is located 0 bytes to the right of
[   14.213649]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.215222] 
[   14.215472] The buggy address belongs to the physical page:
[   14.216063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.216320] flags: 0x200000000000000(node=0|zone=2)
[   14.216493] page_type: f5(slab)
[   14.216630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.216870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.217115] page dumped because: kasan: bad access detected
[   14.217292] 
[   14.217367] Memory state around the buggy address:
[   14.217527]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.217749]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.218806] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.220111]                                      ^
[   14.221127]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222271]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223444] ==================================================================
[   15.066368] ==================================================================
[   15.066785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.067360] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.067990] 
[   15.068223] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.068377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.068394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.068418] Call Trace:
[   15.068434]  <TASK>
[   15.068451]  dump_stack_lvl+0x73/0xb0
[   15.068480]  print_report+0xd1/0x650
[   15.068516]  ? __virt_addr_valid+0x1db/0x2d0
[   15.068540]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.068565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.068591]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.068616]  kasan_report+0x141/0x180
[   15.068641]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.068671]  kasan_check_range+0x10c/0x1c0
[   15.068694]  __kasan_check_write+0x18/0x20
[   15.068716]  kasan_atomics_helper+0x1eaa/0x5450
[   15.068742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.068768]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.068792]  ? kasan_atomics+0x152/0x310
[   15.068818]  kasan_atomics+0x1dc/0x310
[   15.068840]  ? __pfx_kasan_atomics+0x10/0x10
[   15.068864]  ? __pfx_read_tsc+0x10/0x10
[   15.068899]  ? ktime_get_ts64+0x86/0x230
[   15.068927]  kunit_try_run_case+0x1a5/0x480
[   15.068951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.068975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.069001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.069028]  ? __kthread_parkme+0x82/0x180
[   15.069052]  ? preempt_count_sub+0x50/0x80
[   15.069080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.069104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.069129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.069156]  kthread+0x337/0x6f0
[   15.069174]  ? trace_preempt_on+0x20/0xc0
[   15.069199]  ? __pfx_kthread+0x10/0x10
[   15.069220]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.069246]  ? calculate_sigpending+0x7b/0xa0
[   15.069269]  ? __pfx_kthread+0x10/0x10
[   15.069291]  ret_from_fork+0x41/0x80
[   15.069313]  ? __pfx_kthread+0x10/0x10
[   15.069333]  ret_from_fork_asm+0x1a/0x30
[   15.069366]  </TASK>
[   15.069378] 
[   15.080108] Allocated by task 285:
[   15.080439]  kasan_save_stack+0x45/0x70
[   15.080840]  kasan_save_track+0x18/0x40
[   15.081163]  kasan_save_alloc_info+0x3b/0x50
[   15.081459]  __kasan_kmalloc+0xb7/0xc0
[   15.081772]  __kmalloc_cache_noprof+0x189/0x420
[   15.082102]  kasan_atomics+0x95/0x310
[   15.082381]  kunit_try_run_case+0x1a5/0x480
[   15.082693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.082938]  kthread+0x337/0x6f0
[   15.083116]  ret_from_fork+0x41/0x80
[   15.083288]  ret_from_fork_asm+0x1a/0x30
[   15.083458] 
[   15.083917] The buggy address belongs to the object at ffff8881029e6b00
[   15.083917]  which belongs to the cache kmalloc-64 of size 64
[   15.084534] The buggy address is located 0 bytes to the right of
[   15.084534]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.085247] 
[   15.085356] The buggy address belongs to the physical page:
[   15.085792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.086246] flags: 0x200000000000000(node=0|zone=2)
[   15.086591] page_type: f5(slab)
[   15.086776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.087090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.087383] page dumped because: kasan: bad access detected
[   15.087900] 
[   15.088005] Memory state around the buggy address:
[   15.088371]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.088947]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089359] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.089785]                                      ^
[   15.090106]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.090491]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.090944] ==================================================================
[   13.868603] ==================================================================
[   13.868853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.869428] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.869730] 
[   13.870037] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.870093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.870108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.870133] Call Trace:
[   13.870150]  <TASK>
[   13.870168]  dump_stack_lvl+0x73/0xb0
[   13.870198]  print_report+0xd1/0x650
[   13.870224]  ? __virt_addr_valid+0x1db/0x2d0
[   13.870249]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.870274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.870301]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.870326]  kasan_report+0x141/0x180
[   13.870352]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.870383]  __asan_report_load4_noabort+0x18/0x20
[   13.870408]  kasan_atomics_helper+0x4b54/0x5450
[   13.870433]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.870460]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.870485]  ? kasan_atomics+0x152/0x310
[   13.870511]  kasan_atomics+0x1dc/0x310
[   13.870542]  ? __pfx_kasan_atomics+0x10/0x10
[   13.870566]  ? __pfx_read_tsc+0x10/0x10
[   13.870589]  ? ktime_get_ts64+0x86/0x230
[   13.870616]  kunit_try_run_case+0x1a5/0x480
[   13.870641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.870692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.870719]  ? __kthread_parkme+0x82/0x180
[   13.870744]  ? preempt_count_sub+0x50/0x80
[   13.870773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.870824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.870852]  kthread+0x337/0x6f0
[   13.870871]  ? trace_preempt_on+0x20/0xc0
[   13.870913]  ? __pfx_kthread+0x10/0x10
[   13.870935]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.870960]  ? calculate_sigpending+0x7b/0xa0
[   13.870986]  ? __pfx_kthread+0x10/0x10
[   13.871007]  ret_from_fork+0x41/0x80
[   13.871031]  ? __pfx_kthread+0x10/0x10
[   13.871051]  ret_from_fork_asm+0x1a/0x30
[   13.871086]  </TASK>
[   13.871100] 
[   13.879689] Allocated by task 285:
[   13.880127]  kasan_save_stack+0x45/0x70
[   13.880326]  kasan_save_track+0x18/0x40
[   13.880506]  kasan_save_alloc_info+0x3b/0x50
[   13.880701]  __kasan_kmalloc+0xb7/0xc0
[   13.880843]  __kmalloc_cache_noprof+0x189/0x420
[   13.881137]  kasan_atomics+0x95/0x310
[   13.881338]  kunit_try_run_case+0x1a5/0x480
[   13.881555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.882078]  kthread+0x337/0x6f0
[   13.882260]  ret_from_fork+0x41/0x80
[   13.882447]  ret_from_fork_asm+0x1a/0x30
[   13.882632] 
[   13.882796] The buggy address belongs to the object at ffff8881029e6b00
[   13.882796]  which belongs to the cache kmalloc-64 of size 64
[   13.883297] The buggy address is located 0 bytes to the right of
[   13.883297]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.883785] 
[   13.883929] The buggy address belongs to the physical page:
[   13.884189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.884576] flags: 0x200000000000000(node=0|zone=2)
[   13.884799] page_type: f5(slab)
[   13.885121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.885383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.885615] page dumped because: kasan: bad access detected
[   13.885894] 
[   13.886000] Memory state around the buggy address:
[   13.886234]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886864]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.887293] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.887597]                                      ^
[   13.887768]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.888039]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.888385] ==================================================================
[   13.988791] ==================================================================
[   13.989390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.989993] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.990300] 
[   13.990397] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.990448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.990461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.990486] Call Trace:
[   13.990504]  <TASK>
[   13.990523]  dump_stack_lvl+0x73/0xb0
[   13.990566]  print_report+0xd1/0x650
[   13.990593]  ? __virt_addr_valid+0x1db/0x2d0
[   13.990617]  ? kasan_atomics_helper+0x697/0x5450
[   13.990642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.990667]  ? kasan_atomics_helper+0x697/0x5450
[   13.990692]  kasan_report+0x141/0x180
[   13.990717]  ? kasan_atomics_helper+0x697/0x5450
[   13.990746]  kasan_check_range+0x10c/0x1c0
[   13.990770]  __kasan_check_write+0x18/0x20
[   13.990792]  kasan_atomics_helper+0x697/0x5450
[   13.990818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.990861]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.990897]  ? kasan_atomics+0x152/0x310
[   13.990923]  kasan_atomics+0x1dc/0x310
[   13.990945]  ? __pfx_kasan_atomics+0x10/0x10
[   13.990970]  ? __pfx_read_tsc+0x10/0x10
[   13.990992]  ? ktime_get_ts64+0x86/0x230
[   13.991020]  kunit_try_run_case+0x1a5/0x480
[   13.991045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.991094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.991122]  ? __kthread_parkme+0x82/0x180
[   13.991147]  ? preempt_count_sub+0x50/0x80
[   13.991176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.991227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.991253]  kthread+0x337/0x6f0
[   13.991273]  ? trace_preempt_on+0x20/0xc0
[   13.991299]  ? __pfx_kthread+0x10/0x10
[   13.991319]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.991344]  ? calculate_sigpending+0x7b/0xa0
[   13.991369]  ? __pfx_kthread+0x10/0x10
[   13.991390]  ret_from_fork+0x41/0x80
[   13.991413]  ? __pfx_kthread+0x10/0x10
[   13.991434]  ret_from_fork_asm+0x1a/0x30
[   13.991467]  </TASK>
[   13.991481] 
[   14.003185] Allocated by task 285:
[   14.003395]  kasan_save_stack+0x45/0x70
[   14.003847]  kasan_save_track+0x18/0x40
[   14.004271]  kasan_save_alloc_info+0x3b/0x50
[   14.004484]  __kasan_kmalloc+0xb7/0xc0
[   14.005123]  __kmalloc_cache_noprof+0x189/0x420
[   14.005384]  kasan_atomics+0x95/0x310
[   14.005776]  kunit_try_run_case+0x1a5/0x480
[   14.006402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.006765]  kthread+0x337/0x6f0
[   14.007267]  ret_from_fork+0x41/0x80
[   14.007469]  ret_from_fork_asm+0x1a/0x30
[   14.007957] 
[   14.008204] The buggy address belongs to the object at ffff8881029e6b00
[   14.008204]  which belongs to the cache kmalloc-64 of size 64
[   14.009236] The buggy address is located 0 bytes to the right of
[   14.009236]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.010095] 
[   14.010345] The buggy address belongs to the physical page:
[   14.010790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.011329] flags: 0x200000000000000(node=0|zone=2)
[   14.011998] page_type: f5(slab)
[   14.012323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.012996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.013431] page dumped because: kasan: bad access detected
[   14.013941] 
[   14.014056] Memory state around the buggy address:
[   14.014283]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.014771]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.015518] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.016293]                                      ^
[   14.016777]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.017391]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.018023] ==================================================================
[   14.332314] ==================================================================
[   14.332744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.333350] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.334118] 
[   14.334290] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.334342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.334356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.334380] Call Trace:
[   14.334396]  <TASK>
[   14.334413]  dump_stack_lvl+0x73/0xb0
[   14.334442]  print_report+0xd1/0x650
[   14.334468]  ? __virt_addr_valid+0x1db/0x2d0
[   14.334491]  ? kasan_atomics_helper+0xe78/0x5450
[   14.334527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.334554]  ? kasan_atomics_helper+0xe78/0x5450
[   14.334578]  kasan_report+0x141/0x180
[   14.334604]  ? kasan_atomics_helper+0xe78/0x5450
[   14.334635]  kasan_check_range+0x10c/0x1c0
[   14.334657]  __kasan_check_write+0x18/0x20
[   14.334681]  kasan_atomics_helper+0xe78/0x5450
[   14.334706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.334732]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.334757]  ? kasan_atomics+0x152/0x310
[   14.334783]  kasan_atomics+0x1dc/0x310
[   14.334805]  ? __pfx_kasan_atomics+0x10/0x10
[   14.334829]  ? __pfx_read_tsc+0x10/0x10
[   14.334852]  ? ktime_get_ts64+0x86/0x230
[   14.334894]  kunit_try_run_case+0x1a5/0x480
[   14.334919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.334941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.334968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.334995]  ? __kthread_parkme+0x82/0x180
[   14.335019]  ? preempt_count_sub+0x50/0x80
[   14.335047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.335070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.335123]  kthread+0x337/0x6f0
[   14.335142]  ? trace_preempt_on+0x20/0xc0
[   14.335168]  ? __pfx_kthread+0x10/0x10
[   14.335188]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.335214]  ? calculate_sigpending+0x7b/0xa0
[   14.335237]  ? __pfx_kthread+0x10/0x10
[   14.335257]  ret_from_fork+0x41/0x80
[   14.335280]  ? __pfx_kthread+0x10/0x10
[   14.335300]  ret_from_fork_asm+0x1a/0x30
[   14.335332]  </TASK>
[   14.335345] 
[   14.350382] Allocated by task 285:
[   14.350526]  kasan_save_stack+0x45/0x70
[   14.350684]  kasan_save_track+0x18/0x40
[   14.350829]  kasan_save_alloc_info+0x3b/0x50
[   14.351303]  __kasan_kmalloc+0xb7/0xc0
[   14.351677]  __kmalloc_cache_noprof+0x189/0x420
[   14.352315]  kasan_atomics+0x95/0x310
[   14.352704]  kunit_try_run_case+0x1a5/0x480
[   14.353172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353675]  kthread+0x337/0x6f0
[   14.354103]  ret_from_fork+0x41/0x80
[   14.354454]  ret_from_fork_asm+0x1a/0x30
[   14.354830] 
[   14.355068] The buggy address belongs to the object at ffff8881029e6b00
[   14.355068]  which belongs to the cache kmalloc-64 of size 64
[   14.355460] The buggy address is located 0 bytes to the right of
[   14.355460]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.356725] 
[   14.356909] The buggy address belongs to the physical page:
[   14.357460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.358160] flags: 0x200000000000000(node=0|zone=2)
[   14.358337] page_type: f5(slab)
[   14.358464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.359208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.360162] page dumped because: kasan: bad access detected
[   14.360672] 
[   14.360866] Memory state around the buggy address:
[   14.361345]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361660]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361980] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.362590]                                      ^
[   14.363085]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.364095]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.364526] ==================================================================
[   15.271793] ==================================================================
[   15.272115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.272484] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.272730] 
[   15.272825] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.272889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.272903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.272928] Call Trace:
[   15.272950]  <TASK>
[   15.272972]  dump_stack_lvl+0x73/0xb0
[   15.273003]  print_report+0xd1/0x650
[   15.273053]  ? __virt_addr_valid+0x1db/0x2d0
[   15.273077]  ? kasan_atomics_helper+0x224c/0x5450
[   15.273102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.273128]  ? kasan_atomics_helper+0x224c/0x5450
[   15.273152]  kasan_report+0x141/0x180
[   15.273179]  ? kasan_atomics_helper+0x224c/0x5450
[   15.273227]  kasan_check_range+0x10c/0x1c0
[   15.273252]  __kasan_check_write+0x18/0x20
[   15.273276]  kasan_atomics_helper+0x224c/0x5450
[   15.273302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.273327]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.273352]  ? kasan_atomics+0x152/0x310
[   15.273396]  kasan_atomics+0x1dc/0x310
[   15.273418]  ? __pfx_kasan_atomics+0x10/0x10
[   15.273442]  ? __pfx_read_tsc+0x10/0x10
[   15.273466]  ? ktime_get_ts64+0x86/0x230
[   15.273495]  kunit_try_run_case+0x1a5/0x480
[   15.273531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273554]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.273584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.273611]  ? __kthread_parkme+0x82/0x180
[   15.273636]  ? preempt_count_sub+0x50/0x80
[   15.273664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.273688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.273714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.273757]  kthread+0x337/0x6f0
[   15.273777]  ? trace_preempt_on+0x20/0xc0
[   15.273805]  ? __pfx_kthread+0x10/0x10
[   15.273826]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.273851]  ? calculate_sigpending+0x7b/0xa0
[   15.273886]  ? __pfx_kthread+0x10/0x10
[   15.273906]  ret_from_fork+0x41/0x80
[   15.273930]  ? __pfx_kthread+0x10/0x10
[   15.273950]  ret_from_fork_asm+0x1a/0x30
[   15.274003]  </TASK>
[   15.274016] 
[   15.281879] Allocated by task 285:
[   15.282077]  kasan_save_stack+0x45/0x70
[   15.282319]  kasan_save_track+0x18/0x40
[   15.282464]  kasan_save_alloc_info+0x3b/0x50
[   15.282907]  __kasan_kmalloc+0xb7/0xc0
[   15.283115]  __kmalloc_cache_noprof+0x189/0x420
[   15.283342]  kasan_atomics+0x95/0x310
[   15.283524]  kunit_try_run_case+0x1a5/0x480
[   15.283712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.284012]  kthread+0x337/0x6f0
[   15.284188]  ret_from_fork+0x41/0x80
[   15.284376]  ret_from_fork_asm+0x1a/0x30
[   15.284615] 
[   15.284704] The buggy address belongs to the object at ffff8881029e6b00
[   15.284704]  which belongs to the cache kmalloc-64 of size 64
[   15.285199] The buggy address is located 0 bytes to the right of
[   15.285199]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.285787] 
[   15.285868] The buggy address belongs to the physical page:
[   15.286064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.286336] flags: 0x200000000000000(node=0|zone=2)
[   15.286625] page_type: f5(slab)
[   15.286805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.287180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.287533] page dumped because: kasan: bad access detected
[   15.287809] 
[   15.287899] Memory state around the buggy address:
[   15.288137]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.288360]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.288579] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.288797]                                      ^
[   15.289051]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289410]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289763] ==================================================================
[   14.176291] ==================================================================
[   14.176633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.177449] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.178048] 
[   14.178146] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.178196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.178211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.178236] Call Trace:
[   14.178250]  <TASK>
[   14.178267]  dump_stack_lvl+0x73/0xb0
[   14.178298]  print_report+0xd1/0x650
[   14.178323]  ? __virt_addr_valid+0x1db/0x2d0
[   14.178347]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.178373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.178399]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.178423]  kasan_report+0x141/0x180
[   14.178448]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.178477]  kasan_check_range+0x10c/0x1c0
[   14.178501]  __kasan_check_write+0x18/0x20
[   14.178524]  kasan_atomics_helper+0xb6a/0x5450
[   14.178550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.178576]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.178601]  ? kasan_atomics+0x152/0x310
[   14.178655]  kasan_atomics+0x1dc/0x310
[   14.178678]  ? __pfx_kasan_atomics+0x10/0x10
[   14.178718]  ? __pfx_read_tsc+0x10/0x10
[   14.178741]  ? ktime_get_ts64+0x86/0x230
[   14.178770]  kunit_try_run_case+0x1a5/0x480
[   14.178796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.178817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.178845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.178886]  ? __kthread_parkme+0x82/0x180
[   14.178988]  ? preempt_count_sub+0x50/0x80
[   14.179023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.179046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.179074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.179101]  kthread+0x337/0x6f0
[   14.179121]  ? trace_preempt_on+0x20/0xc0
[   14.179148]  ? __pfx_kthread+0x10/0x10
[   14.179169]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.179194]  ? calculate_sigpending+0x7b/0xa0
[   14.179219]  ? __pfx_kthread+0x10/0x10
[   14.179240]  ret_from_fork+0x41/0x80
[   14.179263]  ? __pfx_kthread+0x10/0x10
[   14.179283]  ret_from_fork_asm+0x1a/0x30
[   14.179317]  </TASK>
[   14.179331] 
[   14.189099] Allocated by task 285:
[   14.189324]  kasan_save_stack+0x45/0x70
[   14.189564]  kasan_save_track+0x18/0x40
[   14.189803]  kasan_save_alloc_info+0x3b/0x50
[   14.190049]  __kasan_kmalloc+0xb7/0xc0
[   14.190363]  __kmalloc_cache_noprof+0x189/0x420
[   14.190604]  kasan_atomics+0x95/0x310
[   14.190797]  kunit_try_run_case+0x1a5/0x480
[   14.191071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.191352]  kthread+0x337/0x6f0
[   14.191522]  ret_from_fork+0x41/0x80
[   14.191719]  ret_from_fork_asm+0x1a/0x30
[   14.192078] 
[   14.192193] The buggy address belongs to the object at ffff8881029e6b00
[   14.192193]  which belongs to the cache kmalloc-64 of size 64
[   14.192721] The buggy address is located 0 bytes to the right of
[   14.192721]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.193310] 
[   14.193605] The buggy address belongs to the physical page:
[   14.193783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.194472] flags: 0x200000000000000(node=0|zone=2)
[   14.194769] page_type: f5(slab)
[   14.195038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.195399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.195756] page dumped because: kasan: bad access detected
[   14.195946] 
[   14.196022] Memory state around the buggy address:
[   14.196471]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.196751]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.197318] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.197675]                                      ^
[   14.198011]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.198238]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.198603] ==================================================================
[   14.473154] ==================================================================
[   14.473500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.473819] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.474295] 
[   14.474418] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.474467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474505] Call Trace:
[   14.474521]  <TASK>
[   14.474539]  dump_stack_lvl+0x73/0xb0
[   14.474567]  print_report+0xd1/0x650
[   14.474593]  ? __virt_addr_valid+0x1db/0x2d0
[   14.474616]  ? kasan_atomics_helper+0x1148/0x5450
[   14.474641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.474667]  ? kasan_atomics_helper+0x1148/0x5450
[   14.474692]  kasan_report+0x141/0x180
[   14.474718]  ? kasan_atomics_helper+0x1148/0x5450
[   14.474747]  kasan_check_range+0x10c/0x1c0
[   14.474786]  __kasan_check_write+0x18/0x20
[   14.474809]  kasan_atomics_helper+0x1148/0x5450
[   14.474835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.474871]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.474907]  ? kasan_atomics+0x152/0x310
[   14.474933]  kasan_atomics+0x1dc/0x310
[   14.474955]  ? __pfx_kasan_atomics+0x10/0x10
[   14.474979]  ? __pfx_read_tsc+0x10/0x10
[   14.475000]  ? ktime_get_ts64+0x86/0x230
[   14.475029]  kunit_try_run_case+0x1a5/0x480
[   14.475053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.475102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475129]  ? __kthread_parkme+0x82/0x180
[   14.475153]  ? preempt_count_sub+0x50/0x80
[   14.475180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.475256]  kthread+0x337/0x6f0
[   14.475275]  ? trace_preempt_on+0x20/0xc0
[   14.475301]  ? __pfx_kthread+0x10/0x10
[   14.475322]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475347]  ? calculate_sigpending+0x7b/0xa0
[   14.475372]  ? __pfx_kthread+0x10/0x10
[   14.475392]  ret_from_fork+0x41/0x80
[   14.475415]  ? __pfx_kthread+0x10/0x10
[   14.475436]  ret_from_fork_asm+0x1a/0x30
[   14.475469]  </TASK>
[   14.475481] 
[   14.487806] Allocated by task 285:
[   14.488322]  kasan_save_stack+0x45/0x70
[   14.488535]  kasan_save_track+0x18/0x40
[   14.488773]  kasan_save_alloc_info+0x3b/0x50
[   14.489423]  __kasan_kmalloc+0xb7/0xc0
[   14.489827]  __kmalloc_cache_noprof+0x189/0x420
[   14.490220]  kasan_atomics+0x95/0x310
[   14.490415]  kunit_try_run_case+0x1a5/0x480
[   14.490682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.491277]  kthread+0x337/0x6f0
[   14.491420]  ret_from_fork+0x41/0x80
[   14.491917]  ret_from_fork_asm+0x1a/0x30
[   14.492235] 
[   14.492423] The buggy address belongs to the object at ffff8881029e6b00
[   14.492423]  which belongs to the cache kmalloc-64 of size 64
[   14.493337] The buggy address is located 0 bytes to the right of
[   14.493337]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.494187] 
[   14.494293] The buggy address belongs to the physical page:
[   14.494700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.495304] flags: 0x200000000000000(node=0|zone=2)
[   14.495733] page_type: f5(slab)
[   14.495985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.496344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.496829] page dumped because: kasan: bad access detected
[   14.497116] 
[   14.497568] Memory state around the buggy address:
[   14.497808]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.498283]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.498669] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.499068]                                      ^
[   14.499298]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.499578]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.500027] ==================================================================
[   14.805480] ==================================================================
[   14.805895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.806167] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.806595] 
[   14.806758] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.806807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.806821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.806844] Call Trace:
[   14.806860]  <TASK>
[   14.806887]  dump_stack_lvl+0x73/0xb0
[   14.806926]  print_report+0xd1/0x650
[   14.806953]  ? __virt_addr_valid+0x1db/0x2d0
[   14.806976]  ? kasan_atomics_helper+0x177f/0x5450
[   14.807001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.807027]  ? kasan_atomics_helper+0x177f/0x5450
[   14.807051]  kasan_report+0x141/0x180
[   14.807076]  ? kasan_atomics_helper+0x177f/0x5450
[   14.807105]  kasan_check_range+0x10c/0x1c0
[   14.807128]  __kasan_check_write+0x18/0x20
[   14.807150]  kasan_atomics_helper+0x177f/0x5450
[   14.807176]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.807202]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.807226]  ? kasan_atomics+0x152/0x310
[   14.807252]  kasan_atomics+0x1dc/0x310
[   14.807275]  ? __pfx_kasan_atomics+0x10/0x10
[   14.807299]  ? __pfx_read_tsc+0x10/0x10
[   14.807322]  ? ktime_get_ts64+0x86/0x230
[   14.807351]  kunit_try_run_case+0x1a5/0x480
[   14.807375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.807397]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.807431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.807458]  ? __kthread_parkme+0x82/0x180
[   14.807485]  ? preempt_count_sub+0x50/0x80
[   14.807523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.807546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.807579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.807606]  kthread+0x337/0x6f0
[   14.807626]  ? trace_preempt_on+0x20/0xc0
[   14.807651]  ? __pfx_kthread+0x10/0x10
[   14.807672]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.807697]  ? calculate_sigpending+0x7b/0xa0
[   14.807720]  ? __pfx_kthread+0x10/0x10
[   14.807741]  ret_from_fork+0x41/0x80
[   14.807764]  ? __pfx_kthread+0x10/0x10
[   14.807785]  ret_from_fork_asm+0x1a/0x30
[   14.807817]  </TASK>
[   14.807829] 
[   14.815991] Allocated by task 285:
[   14.816169]  kasan_save_stack+0x45/0x70
[   14.816350]  kasan_save_track+0x18/0x40
[   14.816493]  kasan_save_alloc_info+0x3b/0x50
[   14.816720]  __kasan_kmalloc+0xb7/0xc0
[   14.817018]  __kmalloc_cache_noprof+0x189/0x420
[   14.817209]  kasan_atomics+0x95/0x310
[   14.817361]  kunit_try_run_case+0x1a5/0x480
[   14.817582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817817]  kthread+0x337/0x6f0
[   14.817992]  ret_from_fork+0x41/0x80
[   14.818129]  ret_from_fork_asm+0x1a/0x30
[   14.818272] 
[   14.818347] The buggy address belongs to the object at ffff8881029e6b00
[   14.818347]  which belongs to the cache kmalloc-64 of size 64
[   14.819284] The buggy address is located 0 bytes to the right of
[   14.819284]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.819825] 
[   14.819910] The buggy address belongs to the physical page:
[   14.820083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.820326] flags: 0x200000000000000(node=0|zone=2)
[   14.820689] page_type: f5(slab)
[   14.820911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.821589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.822004] page dumped because: kasan: bad access detected
[   14.822182] 
[   14.822255] Memory state around the buggy address:
[   14.822414]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.822970]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.823308] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.823657]                                      ^
[   14.823917]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824236]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824563] ==================================================================
[   14.431420] ==================================================================
[   14.431767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.432167] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.432431] 
[   14.432541] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.432590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.432604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.432627] Call Trace:
[   14.432641]  <TASK>
[   14.432716]  dump_stack_lvl+0x73/0xb0
[   14.432748]  print_report+0xd1/0x650
[   14.432776]  ? __virt_addr_valid+0x1db/0x2d0
[   14.432801]  ? kasan_atomics_helper+0x1079/0x5450
[   14.432825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.432851]  ? kasan_atomics_helper+0x1079/0x5450
[   14.433080]  kasan_report+0x141/0x180
[   14.433109]  ? kasan_atomics_helper+0x1079/0x5450
[   14.433139]  kasan_check_range+0x10c/0x1c0
[   14.433163]  __kasan_check_write+0x18/0x20
[   14.433186]  kasan_atomics_helper+0x1079/0x5450
[   14.433213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.433238]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.433262]  ? kasan_atomics+0x152/0x310
[   14.433288]  kasan_atomics+0x1dc/0x310
[   14.433310]  ? __pfx_kasan_atomics+0x10/0x10
[   14.433334]  ? __pfx_read_tsc+0x10/0x10
[   14.433356]  ? ktime_get_ts64+0x86/0x230
[   14.433384]  kunit_try_run_case+0x1a5/0x480
[   14.433409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.433431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.433457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.433484]  ? __kthread_parkme+0x82/0x180
[   14.433508]  ? preempt_count_sub+0x50/0x80
[   14.433536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.433560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.433613]  kthread+0x337/0x6f0
[   14.433632]  ? trace_preempt_on+0x20/0xc0
[   14.433658]  ? __pfx_kthread+0x10/0x10
[   14.433679]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.433703]  ? calculate_sigpending+0x7b/0xa0
[   14.433727]  ? __pfx_kthread+0x10/0x10
[   14.433748]  ret_from_fork+0x41/0x80
[   14.433770]  ? __pfx_kthread+0x10/0x10
[   14.433791]  ret_from_fork_asm+0x1a/0x30
[   14.433824]  </TASK>
[   14.433896] 
[   14.441944] Allocated by task 285:
[   14.442138]  kasan_save_stack+0x45/0x70
[   14.442297]  kasan_save_track+0x18/0x40
[   14.442440]  kasan_save_alloc_info+0x3b/0x50
[   14.443034]  __kasan_kmalloc+0xb7/0xc0
[   14.443260]  __kmalloc_cache_noprof+0x189/0x420
[   14.443495]  kasan_atomics+0x95/0x310
[   14.443694]  kunit_try_run_case+0x1a5/0x480
[   14.444013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444245]  kthread+0x337/0x6f0
[   14.444398]  ret_from_fork+0x41/0x80
[   14.444604]  ret_from_fork_asm+0x1a/0x30
[   14.444750] 
[   14.445070] The buggy address belongs to the object at ffff8881029e6b00
[   14.445070]  which belongs to the cache kmalloc-64 of size 64
[   14.445544] The buggy address is located 0 bytes to the right of
[   14.445544]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.445979] 
[   14.446082] The buggy address belongs to the physical page:
[   14.446342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.447067] flags: 0x200000000000000(node=0|zone=2)
[   14.447245] page_type: f5(slab)
[   14.447373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.448008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.448359] page dumped because: kasan: bad access detected
[   14.448652] 
[   14.448738] Memory state around the buggy address:
[   14.449067]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.449308]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.449531] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.449863]                                      ^
[   14.450119]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.450568]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.450790] ==================================================================
[   14.708806] ==================================================================
[   14.709161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.709483] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.709980] 
[   14.710119] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.710181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.710195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.710220] Call Trace:
[   14.710249]  <TASK>
[   14.710268]  dump_stack_lvl+0x73/0xb0
[   14.710299]  print_report+0xd1/0x650
[   14.710325]  ? __virt_addr_valid+0x1db/0x2d0
[   14.710350]  ? kasan_atomics_helper+0x151d/0x5450
[   14.710376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.710401]  ? kasan_atomics_helper+0x151d/0x5450
[   14.710427]  kasan_report+0x141/0x180
[   14.710452]  ? kasan_atomics_helper+0x151d/0x5450
[   14.710492]  kasan_check_range+0x10c/0x1c0
[   14.710516]  __kasan_check_write+0x18/0x20
[   14.710550]  kasan_atomics_helper+0x151d/0x5450
[   14.710577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.710603]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.710627]  ? kasan_atomics+0x152/0x310
[   14.710656]  kasan_atomics+0x1dc/0x310
[   14.710678]  ? __pfx_kasan_atomics+0x10/0x10
[   14.710710]  ? __pfx_read_tsc+0x10/0x10
[   14.710732]  ? ktime_get_ts64+0x86/0x230
[   14.710761]  kunit_try_run_case+0x1a5/0x480
[   14.710786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.710815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.710897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.710926]  ? __kthread_parkme+0x82/0x180
[   14.710952]  ? preempt_count_sub+0x50/0x80
[   14.711075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.711156]  kthread+0x337/0x6f0
[   14.711176]  ? trace_preempt_on+0x20/0xc0
[   14.711202]  ? __pfx_kthread+0x10/0x10
[   14.711223]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.711248]  ? calculate_sigpending+0x7b/0xa0
[   14.711272]  ? __pfx_kthread+0x10/0x10
[   14.711292]  ret_from_fork+0x41/0x80
[   14.711316]  ? __pfx_kthread+0x10/0x10
[   14.711337]  ret_from_fork_asm+0x1a/0x30
[   14.711371]  </TASK>
[   14.711385] 
[   14.720626] Allocated by task 285:
[   14.720913]  kasan_save_stack+0x45/0x70
[   14.721161]  kasan_save_track+0x18/0x40
[   14.721352]  kasan_save_alloc_info+0x3b/0x50
[   14.721594]  __kasan_kmalloc+0xb7/0xc0
[   14.721801]  __kmalloc_cache_noprof+0x189/0x420
[   14.722028]  kasan_atomics+0x95/0x310
[   14.722305]  kunit_try_run_case+0x1a5/0x480
[   14.722466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.722650]  kthread+0x337/0x6f0
[   14.722920]  ret_from_fork+0x41/0x80
[   14.723115]  ret_from_fork_asm+0x1a/0x30
[   14.723317] 
[   14.723424] The buggy address belongs to the object at ffff8881029e6b00
[   14.723424]  which belongs to the cache kmalloc-64 of size 64
[   14.724314] The buggy address is located 0 bytes to the right of
[   14.724314]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.725373] 
[   14.725487] The buggy address belongs to the physical page:
[   14.726358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.726735] flags: 0x200000000000000(node=0|zone=2)
[   14.727100] page_type: f5(slab)
[   14.727320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.727885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.728288] page dumped because: kasan: bad access detected
[   14.728535] 
[   14.728793] Memory state around the buggy address:
[   14.729279]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.729793]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.730325] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.730787]                                      ^
[   14.731146]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.731557]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732102] ==================================================================
[   15.018535] ==================================================================
[   15.018945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.019295] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.019687] 
[   15.019904] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.019956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.019970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.019994] Call Trace:
[   15.020009]  <TASK>
[   15.020062]  dump_stack_lvl+0x73/0xb0
[   15.020091]  print_report+0xd1/0x650
[   15.020118]  ? __virt_addr_valid+0x1db/0x2d0
[   15.020142]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.020167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.020223]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.020249]  kasan_report+0x141/0x180
[   15.020275]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.020305]  kasan_check_range+0x10c/0x1c0
[   15.020330]  __kasan_check_write+0x18/0x20
[   15.020353]  kasan_atomics_helper+0x1d7a/0x5450
[   15.020379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.020406]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.020430]  ? kasan_atomics+0x152/0x310
[   15.020456]  kasan_atomics+0x1dc/0x310
[   15.020517]  ? __pfx_kasan_atomics+0x10/0x10
[   15.020541]  ? __pfx_read_tsc+0x10/0x10
[   15.020562]  ? ktime_get_ts64+0x86/0x230
[   15.020589]  kunit_try_run_case+0x1a5/0x480
[   15.020614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.020690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.020763]  ? __kthread_parkme+0x82/0x180
[   15.020787]  ? preempt_count_sub+0x50/0x80
[   15.020839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.020951]  kthread+0x337/0x6f0
[   15.020970]  ? trace_preempt_on+0x20/0xc0
[   15.020996]  ? __pfx_kthread+0x10/0x10
[   15.021016]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.021041]  ? calculate_sigpending+0x7b/0xa0
[   15.021065]  ? __pfx_kthread+0x10/0x10
[   15.021085]  ret_from_fork+0x41/0x80
[   15.021108]  ? __pfx_kthread+0x10/0x10
[   15.021128]  ret_from_fork_asm+0x1a/0x30
[   15.021162]  </TASK>
[   15.021174] 
[   15.032000] Allocated by task 285:
[   15.032142]  kasan_save_stack+0x45/0x70
[   15.032297]  kasan_save_track+0x18/0x40
[   15.032441]  kasan_save_alloc_info+0x3b/0x50
[   15.032600]  __kasan_kmalloc+0xb7/0xc0
[   15.032795]  __kmalloc_cache_noprof+0x189/0x420
[   15.033019]  kasan_atomics+0x95/0x310
[   15.033156]  kunit_try_run_case+0x1a5/0x480
[   15.033355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.033765]  kthread+0x337/0x6f0
[   15.033956]  ret_from_fork+0x41/0x80
[   15.034134]  ret_from_fork_asm+0x1a/0x30
[   15.034298] 
[   15.034400] The buggy address belongs to the object at ffff8881029e6b00
[   15.034400]  which belongs to the cache kmalloc-64 of size 64
[   15.034869] The buggy address is located 0 bytes to the right of
[   15.034869]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.035375] 
[   15.035470] The buggy address belongs to the physical page:
[   15.035800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.036063] flags: 0x200000000000000(node=0|zone=2)
[   15.036297] page_type: f5(slab)
[   15.036474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.036732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.037226] page dumped because: kasan: bad access detected
[   15.037605] 
[   15.037707] Memory state around the buggy address:
[   15.037929]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.038149]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.038475] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.038762]                                      ^
[   15.038933]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039318]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039654] ==================================================================
[   14.018656] ==================================================================
[   14.018932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.019482] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.019804] 
[   14.020009] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.020063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.020076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.020100] Call Trace:
[   14.020119]  <TASK>
[   14.020139]  dump_stack_lvl+0x73/0xb0
[   14.020170]  print_report+0xd1/0x650
[   14.020196]  ? __virt_addr_valid+0x1db/0x2d0
[   14.020221]  ? kasan_atomics_helper+0x72f/0x5450
[   14.020301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.020330]  ? kasan_atomics_helper+0x72f/0x5450
[   14.020355]  kasan_report+0x141/0x180
[   14.020380]  ? kasan_atomics_helper+0x72f/0x5450
[   14.020410]  kasan_check_range+0x10c/0x1c0
[   14.020433]  __kasan_check_write+0x18/0x20
[   14.020455]  kasan_atomics_helper+0x72f/0x5450
[   14.020481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.020506]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.020545]  ? kasan_atomics+0x152/0x310
[   14.020571]  kasan_atomics+0x1dc/0x310
[   14.020593]  ? __pfx_kasan_atomics+0x10/0x10
[   14.020616]  ? __pfx_read_tsc+0x10/0x10
[   14.020638]  ? ktime_get_ts64+0x86/0x230
[   14.020667]  kunit_try_run_case+0x1a5/0x480
[   14.020693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.020715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.020743]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.020770]  ? __kthread_parkme+0x82/0x180
[   14.020794]  ? preempt_count_sub+0x50/0x80
[   14.020823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.020884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.020982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.021013]  kthread+0x337/0x6f0
[   14.021034]  ? trace_preempt_on+0x20/0xc0
[   14.021060]  ? __pfx_kthread+0x10/0x10
[   14.021082]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.021106]  ? calculate_sigpending+0x7b/0xa0
[   14.021131]  ? __pfx_kthread+0x10/0x10
[   14.021152]  ret_from_fork+0x41/0x80
[   14.021176]  ? __pfx_kthread+0x10/0x10
[   14.021196]  ret_from_fork_asm+0x1a/0x30
[   14.021230]  </TASK>
[   14.021244] 
[   14.030461] Allocated by task 285:
[   14.030736]  kasan_save_stack+0x45/0x70
[   14.030913]  kasan_save_track+0x18/0x40
[   14.031119]  kasan_save_alloc_info+0x3b/0x50
[   14.031502]  __kasan_kmalloc+0xb7/0xc0
[   14.031749]  __kmalloc_cache_noprof+0x189/0x420
[   14.032119]  kasan_atomics+0x95/0x310
[   14.032306]  kunit_try_run_case+0x1a5/0x480
[   14.032543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.032739]  kthread+0x337/0x6f0
[   14.032943]  ret_from_fork+0x41/0x80
[   14.033263]  ret_from_fork_asm+0x1a/0x30
[   14.033437] 
[   14.033568] The buggy address belongs to the object at ffff8881029e6b00
[   14.033568]  which belongs to the cache kmalloc-64 of size 64
[   14.033982] The buggy address is located 0 bytes to the right of
[   14.033982]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.034841] 
[   14.034964] The buggy address belongs to the physical page:
[   14.035452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.035829] flags: 0x200000000000000(node=0|zone=2)
[   14.036058] page_type: f5(slab)
[   14.036188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.036479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.037353] page dumped because: kasan: bad access detected
[   14.037643] 
[   14.037748] Memory state around the buggy address:
[   14.037927]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.038323]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.038733] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.039331]                                      ^
[   14.039594]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.039966]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.040267] ==================================================================
[   14.678558] ==================================================================
[   14.678823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.679918] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.681265] 
[   14.681622] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.681679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.681695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.681718] Call Trace:
[   14.681735]  <TASK>
[   14.681760]  dump_stack_lvl+0x73/0xb0
[   14.681791]  print_report+0xd1/0x650
[   14.681818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.681848]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.681884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.681910]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.681935]  kasan_report+0x141/0x180
[   14.681960]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.681991]  __asan_report_store8_noabort+0x1b/0x30
[   14.682015]  kasan_atomics_helper+0x50d4/0x5450
[   14.682040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.682066]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.682090]  ? kasan_atomics+0x152/0x310
[   14.682116]  kasan_atomics+0x1dc/0x310
[   14.682138]  ? __pfx_kasan_atomics+0x10/0x10
[   14.682163]  ? __pfx_read_tsc+0x10/0x10
[   14.682185]  ? ktime_get_ts64+0x86/0x230
[   14.682213]  kunit_try_run_case+0x1a5/0x480
[   14.682237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.682260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.682286]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.682314]  ? __kthread_parkme+0x82/0x180
[   14.682337]  ? preempt_count_sub+0x50/0x80
[   14.682365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.682388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.682414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.682440]  kthread+0x337/0x6f0
[   14.682459]  ? trace_preempt_on+0x20/0xc0
[   14.682485]  ? __pfx_kthread+0x10/0x10
[   14.682506]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.682531]  ? calculate_sigpending+0x7b/0xa0
[   14.682554]  ? __pfx_kthread+0x10/0x10
[   14.682574]  ret_from_fork+0x41/0x80
[   14.682597]  ? __pfx_kthread+0x10/0x10
[   14.682617]  ret_from_fork_asm+0x1a/0x30
[   14.682649]  </TASK>
[   14.682663] 
[   14.697446] Allocated by task 285:
[   14.697827]  kasan_save_stack+0x45/0x70
[   14.698298]  kasan_save_track+0x18/0x40
[   14.698521]  kasan_save_alloc_info+0x3b/0x50
[   14.698910]  __kasan_kmalloc+0xb7/0xc0
[   14.699215]  __kmalloc_cache_noprof+0x189/0x420
[   14.699449]  kasan_atomics+0x95/0x310
[   14.699676]  kunit_try_run_case+0x1a5/0x480
[   14.700232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.700566]  kthread+0x337/0x6f0
[   14.700756]  ret_from_fork+0x41/0x80
[   14.701098]  ret_from_fork_asm+0x1a/0x30
[   14.701330] 
[   14.701465] The buggy address belongs to the object at ffff8881029e6b00
[   14.701465]  which belongs to the cache kmalloc-64 of size 64
[   14.702109] The buggy address is located 0 bytes to the right of
[   14.702109]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.702721] 
[   14.703097] The buggy address belongs to the physical page:
[   14.703376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.703825] flags: 0x200000000000000(node=0|zone=2)
[   14.704106] page_type: f5(slab)
[   14.704342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.704688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.705166] page dumped because: kasan: bad access detected
[   14.705455] 
[   14.705574] Memory state around the buggy address:
[   14.705808]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.706271]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.706649] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.707048]                                      ^
[   14.707265]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.707775]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.708298] ==================================================================
[   14.127165] ==================================================================
[   14.127506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.127998] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.128432] 
[   14.128569] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.128620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.128634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.128660] Call Trace:
[   14.128680]  <TASK>
[   14.128699]  dump_stack_lvl+0x73/0xb0
[   14.128729]  print_report+0xd1/0x650
[   14.128754]  ? __virt_addr_valid+0x1db/0x2d0
[   14.128780]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.128805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.128831]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.128922]  kasan_report+0x141/0x180
[   14.128949]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.128978]  kasan_check_range+0x10c/0x1c0
[   14.129002]  __kasan_check_write+0x18/0x20
[   14.129025]  kasan_atomics_helper+0xa2b/0x5450
[   14.129051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.129077]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.129102]  ? kasan_atomics+0x152/0x310
[   14.129127]  kasan_atomics+0x1dc/0x310
[   14.129150]  ? __pfx_kasan_atomics+0x10/0x10
[   14.129174]  ? __pfx_read_tsc+0x10/0x10
[   14.129197]  ? ktime_get_ts64+0x86/0x230
[   14.129226]  kunit_try_run_case+0x1a5/0x480
[   14.129252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.129302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.129330]  ? __kthread_parkme+0x82/0x180
[   14.129355]  ? preempt_count_sub+0x50/0x80
[   14.129385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.129462]  kthread+0x337/0x6f0
[   14.129481]  ? trace_preempt_on+0x20/0xc0
[   14.129508]  ? __pfx_kthread+0x10/0x10
[   14.129528]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.129553]  ? calculate_sigpending+0x7b/0xa0
[   14.129579]  ? __pfx_kthread+0x10/0x10
[   14.129600]  ret_from_fork+0x41/0x80
[   14.129623]  ? __pfx_kthread+0x10/0x10
[   14.129644]  ret_from_fork_asm+0x1a/0x30
[   14.129678]  </TASK>
[   14.129691] 
[   14.138819] Allocated by task 285:
[   14.139093]  kasan_save_stack+0x45/0x70
[   14.139308]  kasan_save_track+0x18/0x40
[   14.139516]  kasan_save_alloc_info+0x3b/0x50
[   14.139740]  __kasan_kmalloc+0xb7/0xc0
[   14.139973]  __kmalloc_cache_noprof+0x189/0x420
[   14.140177]  kasan_atomics+0x95/0x310
[   14.140313]  kunit_try_run_case+0x1a5/0x480
[   14.140463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.140837]  kthread+0x337/0x6f0
[   14.141149]  ret_from_fork+0x41/0x80
[   14.141359]  ret_from_fork_asm+0x1a/0x30
[   14.141622] 
[   14.141724] The buggy address belongs to the object at ffff8881029e6b00
[   14.141724]  which belongs to the cache kmalloc-64 of size 64
[   14.142096] The buggy address is located 0 bytes to the right of
[   14.142096]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.142635] 
[   14.142739] The buggy address belongs to the physical page:
[   14.143072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.143478] flags: 0x200000000000000(node=0|zone=2)
[   14.143826] page_type: f5(slab)
[   14.143985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.144255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.144719] page dumped because: kasan: bad access detected
[   14.145098] 
[   14.145211] Memory state around the buggy address:
[   14.145450]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.145911]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.146134] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.146458]                                      ^
[   14.146650]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.147146]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.147456] ==================================================================
[   14.994664] ==================================================================
[   14.995007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.995340] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.995672] 
[   14.995786] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.995833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.995847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.995871] Call Trace:
[   14.995898]  <TASK>
[   14.995914]  dump_stack_lvl+0x73/0xb0
[   14.995941]  print_report+0xd1/0x650
[   14.995967]  ? __virt_addr_valid+0x1db/0x2d0
[   14.995991]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.996015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.996042]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.996067]  kasan_report+0x141/0x180
[   14.996092]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.996122]  kasan_check_range+0x10c/0x1c0
[   14.996145]  __kasan_check_write+0x18/0x20
[   14.996168]  kasan_atomics_helper+0x1ce1/0x5450
[   14.996195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.996220]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.996245]  ? kasan_atomics+0x152/0x310
[   14.996270]  kasan_atomics+0x1dc/0x310
[   14.996291]  ? __pfx_kasan_atomics+0x10/0x10
[   14.996315]  ? __pfx_read_tsc+0x10/0x10
[   14.996337]  ? ktime_get_ts64+0x86/0x230
[   14.996365]  kunit_try_run_case+0x1a5/0x480
[   14.996389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.996437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.996464]  ? __kthread_parkme+0x82/0x180
[   14.996488]  ? preempt_count_sub+0x50/0x80
[   14.996515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.996565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.996602]  kthread+0x337/0x6f0
[   14.996622]  ? trace_preempt_on+0x20/0xc0
[   14.996647]  ? __pfx_kthread+0x10/0x10
[   14.996667]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.996692]  ? calculate_sigpending+0x7b/0xa0
[   14.996716]  ? __pfx_kthread+0x10/0x10
[   14.996738]  ret_from_fork+0x41/0x80
[   14.996761]  ? __pfx_kthread+0x10/0x10
[   14.996781]  ret_from_fork_asm+0x1a/0x30
[   14.996814]  </TASK>
[   14.996826] 
[   15.007367] Allocated by task 285:
[   15.007728]  kasan_save_stack+0x45/0x70
[   15.008138]  kasan_save_track+0x18/0x40
[   15.008521]  kasan_save_alloc_info+0x3b/0x50
[   15.008961]  __kasan_kmalloc+0xb7/0xc0
[   15.009323]  __kmalloc_cache_noprof+0x189/0x420
[   15.009795]  kasan_atomics+0x95/0x310
[   15.009946]  kunit_try_run_case+0x1a5/0x480
[   15.010095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010278]  kthread+0x337/0x6f0
[   15.010402]  ret_from_fork+0x41/0x80
[   15.010553]  ret_from_fork_asm+0x1a/0x30
[   15.010758] 
[   15.010936] The buggy address belongs to the object at ffff8881029e6b00
[   15.010936]  which belongs to the cache kmalloc-64 of size 64
[   15.012129] The buggy address is located 0 bytes to the right of
[   15.012129]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.013375] 
[   15.013540] The buggy address belongs to the physical page:
[   15.013832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.014097] flags: 0x200000000000000(node=0|zone=2)
[   15.014266] page_type: f5(slab)
[   15.014392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.014689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.015330] page dumped because: kasan: bad access detected
[   15.015586] 
[   15.015694] Memory state around the buggy address:
[   15.016065]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.016365]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.016739] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.017094]                                      ^
[   15.017278]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017667]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017941] ==================================================================
[   13.842484] ==================================================================
[   13.842929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.843260] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.843623] 
[   13.843735] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.843803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.843831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.843855] Call Trace:
[   13.843882]  <TASK>
[   13.843899]  dump_stack_lvl+0x73/0xb0
[   13.843927]  print_report+0xd1/0x650
[   13.844002]  ? __virt_addr_valid+0x1db/0x2d0
[   13.844032]  ? kasan_atomics_helper+0x3df/0x5450
[   13.844057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.844082]  ? kasan_atomics_helper+0x3df/0x5450
[   13.844108]  kasan_report+0x141/0x180
[   13.844133]  ? kasan_atomics_helper+0x3df/0x5450
[   13.844164]  kasan_check_range+0x10c/0x1c0
[   13.844187]  __kasan_check_read+0x15/0x20
[   13.844233]  kasan_atomics_helper+0x3df/0x5450
[   13.844274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.844313]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.844352]  ? kasan_atomics+0x152/0x310
[   13.844378]  kasan_atomics+0x1dc/0x310
[   13.844400]  ? __pfx_kasan_atomics+0x10/0x10
[   13.844438]  ? __pfx_read_tsc+0x10/0x10
[   13.844474]  ? ktime_get_ts64+0x86/0x230
[   13.844502]  kunit_try_run_case+0x1a5/0x480
[   13.844528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844549]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.844577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.844604]  ? __kthread_parkme+0x82/0x180
[   13.844628]  ? preempt_count_sub+0x50/0x80
[   13.844656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.844707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.844735]  kthread+0x337/0x6f0
[   13.844754]  ? trace_preempt_on+0x20/0xc0
[   13.844780]  ? __pfx_kthread+0x10/0x10
[   13.844801]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.844826]  ? calculate_sigpending+0x7b/0xa0
[   13.845043]  ? __pfx_kthread+0x10/0x10
[   13.845067]  ret_from_fork+0x41/0x80
[   13.845091]  ? __pfx_kthread+0x10/0x10
[   13.845112]  ret_from_fork_asm+0x1a/0x30
[   13.845146]  </TASK>
[   13.845159] 
[   13.855317] Allocated by task 285:
[   13.855503]  kasan_save_stack+0x45/0x70
[   13.855713]  kasan_save_track+0x18/0x40
[   13.855916]  kasan_save_alloc_info+0x3b/0x50
[   13.856120]  __kasan_kmalloc+0xb7/0xc0
[   13.856308]  __kmalloc_cache_noprof+0x189/0x420
[   13.857046]  kasan_atomics+0x95/0x310
[   13.857323]  kunit_try_run_case+0x1a5/0x480
[   13.858106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.858558]  kthread+0x337/0x6f0
[   13.858748]  ret_from_fork+0x41/0x80
[   13.859039]  ret_from_fork_asm+0x1a/0x30
[   13.859240] 
[   13.859339] The buggy address belongs to the object at ffff8881029e6b00
[   13.859339]  which belongs to the cache kmalloc-64 of size 64
[   13.860152] The buggy address is located 0 bytes to the right of
[   13.860152]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.861084] 
[   13.861209] The buggy address belongs to the physical page:
[   13.861766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.862318] flags: 0x200000000000000(node=0|zone=2)
[   13.862576] page_type: f5(slab)
[   13.862746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.863259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.864039] page dumped because: kasan: bad access detected
[   13.864341] 
[   13.864605] Memory state around the buggy address:
[   13.865078]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.865393]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.866024] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.866556]                                      ^
[   13.867069]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867692]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.868168] ==================================================================
[   14.651781] ==================================================================
[   14.652165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.652818] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.653117] 
[   14.653208] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.653259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.653273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.653298] Call Trace:
[   14.653313]  <TASK>
[   14.653331]  dump_stack_lvl+0x73/0xb0
[   14.653359]  print_report+0xd1/0x650
[   14.653385]  ? __virt_addr_valid+0x1db/0x2d0
[   14.653408]  ? kasan_atomics_helper+0x1467/0x5450
[   14.653433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.653459]  ? kasan_atomics_helper+0x1467/0x5450
[   14.653484]  kasan_report+0x141/0x180
[   14.653510]  ? kasan_atomics_helper+0x1467/0x5450
[   14.653541]  kasan_check_range+0x10c/0x1c0
[   14.653564]  __kasan_check_write+0x18/0x20
[   14.653587]  kasan_atomics_helper+0x1467/0x5450
[   14.653613]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.653639]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.653663]  ? kasan_atomics+0x152/0x310
[   14.653689]  kasan_atomics+0x1dc/0x310
[   14.653711]  ? __pfx_kasan_atomics+0x10/0x10
[   14.653735]  ? __pfx_read_tsc+0x10/0x10
[   14.653757]  ? ktime_get_ts64+0x86/0x230
[   14.653785]  kunit_try_run_case+0x1a5/0x480
[   14.653809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.653857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.653895]  ? __kthread_parkme+0x82/0x180
[   14.653919]  ? preempt_count_sub+0x50/0x80
[   14.653946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.653996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.654023]  kthread+0x337/0x6f0
[   14.654043]  ? trace_preempt_on+0x20/0xc0
[   14.654068]  ? __pfx_kthread+0x10/0x10
[   14.654090]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.654115]  ? calculate_sigpending+0x7b/0xa0
[   14.654140]  ? __pfx_kthread+0x10/0x10
[   14.654161]  ret_from_fork+0x41/0x80
[   14.654185]  ? __pfx_kthread+0x10/0x10
[   14.654205]  ret_from_fork_asm+0x1a/0x30
[   14.654238]  </TASK>
[   14.654251] 
[   14.664166] Allocated by task 285:
[   14.664535]  kasan_save_stack+0x45/0x70
[   14.664712]  kasan_save_track+0x18/0x40
[   14.665167]  kasan_save_alloc_info+0x3b/0x50
[   14.665440]  __kasan_kmalloc+0xb7/0xc0
[   14.665864]  __kmalloc_cache_noprof+0x189/0x420
[   14.666326]  kasan_atomics+0x95/0x310
[   14.666674]  kunit_try_run_case+0x1a5/0x480
[   14.666890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.667304]  kthread+0x337/0x6f0
[   14.667668]  ret_from_fork+0x41/0x80
[   14.668024]  ret_from_fork_asm+0x1a/0x30
[   14.668285] 
[   14.668524] The buggy address belongs to the object at ffff8881029e6b00
[   14.668524]  which belongs to the cache kmalloc-64 of size 64
[   14.669271] The buggy address is located 0 bytes to the right of
[   14.669271]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.670388] 
[   14.670498] The buggy address belongs to the physical page:
[   14.670966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.671745] flags: 0x200000000000000(node=0|zone=2)
[   14.672116] page_type: f5(slab)
[   14.672497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.673130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.673658] page dumped because: kasan: bad access detected
[   14.674102] 
[   14.674187] Memory state around the buggy address:
[   14.674534]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.675012]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.675451] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.675791]                                      ^
[   14.676200]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676824]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.677368] ==================================================================
[   14.265427] ==================================================================
[   14.265747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.266122] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.266825] 
[   14.267021] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.267074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.267089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.267113] Call Trace:
[   14.267132]  <TASK>
[   14.267172]  dump_stack_lvl+0x73/0xb0
[   14.267202]  print_report+0xd1/0x650
[   14.267227]  ? __virt_addr_valid+0x1db/0x2d0
[   14.267251]  ? kasan_atomics_helper+0xd47/0x5450
[   14.267287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.267313]  ? kasan_atomics_helper+0xd47/0x5450
[   14.267349]  kasan_report+0x141/0x180
[   14.267375]  ? kasan_atomics_helper+0xd47/0x5450
[   14.267404]  kasan_check_range+0x10c/0x1c0
[   14.267427]  __kasan_check_write+0x18/0x20
[   14.267449]  kasan_atomics_helper+0xd47/0x5450
[   14.267475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.267500]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.267533]  ? kasan_atomics+0x152/0x310
[   14.267558]  kasan_atomics+0x1dc/0x310
[   14.267584]  ? __pfx_kasan_atomics+0x10/0x10
[   14.267607]  ? __pfx_read_tsc+0x10/0x10
[   14.267630]  ? ktime_get_ts64+0x86/0x230
[   14.267658]  kunit_try_run_case+0x1a5/0x480
[   14.267682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.267731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.267758]  ? __kthread_parkme+0x82/0x180
[   14.267782]  ? preempt_count_sub+0x50/0x80
[   14.267810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.267833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.267867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.267904]  kthread+0x337/0x6f0
[   14.267923]  ? trace_preempt_on+0x20/0xc0
[   14.267949]  ? __pfx_kthread+0x10/0x10
[   14.267969]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.267994]  ? calculate_sigpending+0x7b/0xa0
[   14.268018]  ? __pfx_kthread+0x10/0x10
[   14.268038]  ret_from_fork+0x41/0x80
[   14.268061]  ? __pfx_kthread+0x10/0x10
[   14.268081]  ret_from_fork_asm+0x1a/0x30
[   14.268114]  </TASK>
[   14.268126] 
[   14.284152] Allocated by task 285:
[   14.284297]  kasan_save_stack+0x45/0x70
[   14.284452]  kasan_save_track+0x18/0x40
[   14.284771]  kasan_save_alloc_info+0x3b/0x50
[   14.285332]  __kasan_kmalloc+0xb7/0xc0
[   14.285829]  __kmalloc_cache_noprof+0x189/0x420
[   14.286401]  kasan_atomics+0x95/0x310
[   14.286801]  kunit_try_run_case+0x1a5/0x480
[   14.287260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.287456]  kthread+0x337/0x6f0
[   14.287724]  ret_from_fork+0x41/0x80
[   14.288133]  ret_from_fork_asm+0x1a/0x30
[   14.288655] 
[   14.288819] The buggy address belongs to the object at ffff8881029e6b00
[   14.288819]  which belongs to the cache kmalloc-64 of size 64
[   14.290065] The buggy address is located 0 bytes to the right of
[   14.290065]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.290446] 
[   14.290532] The buggy address belongs to the physical page:
[   14.291026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.292118] flags: 0x200000000000000(node=0|zone=2)
[   14.292611] page_type: f5(slab)
[   14.293054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.293785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.294378] page dumped because: kasan: bad access detected
[   14.294582] 
[   14.294657] Memory state around the buggy address:
[   14.295320]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.295967]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.296357] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.296609]                                      ^
[   14.297171]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.297900]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.298527] ==================================================================
[   14.086539] ==================================================================
[   14.086944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.087231] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.087528] 
[   14.087648] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.087699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.087714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.087739] Call Trace:
[   14.087759]  <TASK>
[   14.087779]  dump_stack_lvl+0x73/0xb0
[   14.087808]  print_report+0xd1/0x650
[   14.087834]  ? __virt_addr_valid+0x1db/0x2d0
[   14.087859]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.087898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.087923]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.087948]  kasan_report+0x141/0x180
[   14.087975]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.088005]  kasan_check_range+0x10c/0x1c0
[   14.088028]  __kasan_check_write+0x18/0x20
[   14.088050]  kasan_atomics_helper+0x8f9/0x5450
[   14.088077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.088102]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.088127]  ? kasan_atomics+0x152/0x310
[   14.088153]  kasan_atomics+0x1dc/0x310
[   14.088177]  ? __pfx_kasan_atomics+0x10/0x10
[   14.088200]  ? __pfx_read_tsc+0x10/0x10
[   14.088225]  ? ktime_get_ts64+0x86/0x230
[   14.088255]  kunit_try_run_case+0x1a5/0x480
[   14.088282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.088332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.088358]  ? __kthread_parkme+0x82/0x180
[   14.088383]  ? preempt_count_sub+0x50/0x80
[   14.088411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.088434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.088461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.088487]  kthread+0x337/0x6f0
[   14.088506]  ? trace_preempt_on+0x20/0xc0
[   14.088532]  ? __pfx_kthread+0x10/0x10
[   14.088552]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.088578]  ? calculate_sigpending+0x7b/0xa0
[   14.088602]  ? __pfx_kthread+0x10/0x10
[   14.088724]  ret_from_fork+0x41/0x80
[   14.088748]  ? __pfx_kthread+0x10/0x10
[   14.088769]  ret_from_fork_asm+0x1a/0x30
[   14.088802]  </TASK>
[   14.088816] 
[   14.097379] Allocated by task 285:
[   14.097572]  kasan_save_stack+0x45/0x70
[   14.097786]  kasan_save_track+0x18/0x40
[   14.098250]  kasan_save_alloc_info+0x3b/0x50
[   14.098412]  __kasan_kmalloc+0xb7/0xc0
[   14.098641]  __kmalloc_cache_noprof+0x189/0x420
[   14.098909]  kasan_atomics+0x95/0x310
[   14.099107]  kunit_try_run_case+0x1a5/0x480
[   14.099317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.099500]  kthread+0x337/0x6f0
[   14.099862]  ret_from_fork+0x41/0x80
[   14.100099]  ret_from_fork_asm+0x1a/0x30
[   14.100314] 
[   14.100566] The buggy address belongs to the object at ffff8881029e6b00
[   14.100566]  which belongs to the cache kmalloc-64 of size 64
[   14.101230] The buggy address is located 0 bytes to the right of
[   14.101230]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.101628] 
[   14.101739] The buggy address belongs to the physical page:
[   14.102043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.102633] flags: 0x200000000000000(node=0|zone=2)
[   14.102820] page_type: f5(slab)
[   14.103012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.103518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.103767] page dumped because: kasan: bad access detected
[   14.103994] 
[   14.104095] Memory state around the buggy address:
[   14.104409]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.104789]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.105304] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.105536]                                      ^
[   14.105769]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106228]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106619] ==================================================================
[   15.040202] ==================================================================
[   15.040522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.040850] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.041369] 
[   15.041481] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.041526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.041540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.041561] Call Trace:
[   15.041577]  <TASK>
[   15.041592]  dump_stack_lvl+0x73/0xb0
[   15.041618]  print_report+0xd1/0x650
[   15.041644]  ? __virt_addr_valid+0x1db/0x2d0
[   15.041668]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.041692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.041717]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.043094]  kasan_report+0x141/0x180
[   15.043133]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.043184]  kasan_check_range+0x10c/0x1c0
[   15.043210]  __kasan_check_write+0x18/0x20
[   15.043233]  kasan_atomics_helper+0x1e12/0x5450
[   15.043260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.043285]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043310]  ? kasan_atomics+0x152/0x310
[   15.043336]  kasan_atomics+0x1dc/0x310
[   15.043358]  ? __pfx_kasan_atomics+0x10/0x10
[   15.043381]  ? __pfx_read_tsc+0x10/0x10
[   15.043405]  ? ktime_get_ts64+0x86/0x230
[   15.043433]  kunit_try_run_case+0x1a5/0x480
[   15.043458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043480]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.043532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043559]  ? __kthread_parkme+0x82/0x180
[   15.043611]  ? preempt_count_sub+0x50/0x80
[   15.043638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.043713]  kthread+0x337/0x6f0
[   15.043733]  ? trace_preempt_on+0x20/0xc0
[   15.043758]  ? __pfx_kthread+0x10/0x10
[   15.043779]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.043803]  ? calculate_sigpending+0x7b/0xa0
[   15.043827]  ? __pfx_kthread+0x10/0x10
[   15.043847]  ret_from_fork+0x41/0x80
[   15.043871]  ? __pfx_kthread+0x10/0x10
[   15.043900]  ret_from_fork_asm+0x1a/0x30
[   15.043933]  </TASK>
[   15.043946] 
[   15.055390] Allocated by task 285:
[   15.055602]  kasan_save_stack+0x45/0x70
[   15.055826]  kasan_save_track+0x18/0x40
[   15.056187]  kasan_save_alloc_info+0x3b/0x50
[   15.056485]  __kasan_kmalloc+0xb7/0xc0
[   15.056866]  __kmalloc_cache_noprof+0x189/0x420
[   15.057206]  kasan_atomics+0x95/0x310
[   15.057348]  kunit_try_run_case+0x1a5/0x480
[   15.057500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057688]  kthread+0x337/0x6f0
[   15.057921]  ret_from_fork+0x41/0x80
[   15.058151]  ret_from_fork_asm+0x1a/0x30
[   15.058633] 
[   15.058745] The buggy address belongs to the object at ffff8881029e6b00
[   15.058745]  which belongs to the cache kmalloc-64 of size 64
[   15.059253] The buggy address is located 0 bytes to the right of
[   15.059253]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.059705] 
[   15.059903] The buggy address belongs to the physical page:
[   15.060185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.060511] flags: 0x200000000000000(node=0|zone=2)
[   15.060681] page_type: f5(slab)
[   15.060924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.061439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.061958] page dumped because: kasan: bad access detected
[   15.062202] 
[   15.062306] Memory state around the buggy address:
[   15.062740]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.063039]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.063474] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.064003]                                      ^
[   15.064347]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.064826]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.065123] ==================================================================
[   13.968468] ==================================================================
[   13.969225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.969591] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   13.970005] 
[   13.970104] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.970156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.970171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.970195] Call Trace:
[   13.970216]  <TASK>
[   13.970235]  dump_stack_lvl+0x73/0xb0
[   13.970265]  print_report+0xd1/0x650
[   13.970291]  ? __virt_addr_valid+0x1db/0x2d0
[   13.970315]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.970340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.970365]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.970389]  kasan_report+0x141/0x180
[   13.970415]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.970444]  kasan_check_range+0x10c/0x1c0
[   13.970467]  __kasan_check_write+0x18/0x20
[   13.970490]  kasan_atomics_helper+0x5fe/0x5450
[   13.970529]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.970556]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.970581]  ? kasan_atomics+0x152/0x310
[   13.970606]  kasan_atomics+0x1dc/0x310
[   13.970628]  ? __pfx_kasan_atomics+0x10/0x10
[   13.970651]  ? __pfx_read_tsc+0x10/0x10
[   13.970676]  ? ktime_get_ts64+0x86/0x230
[   13.970704]  kunit_try_run_case+0x1a5/0x480
[   13.970730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.970752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.970779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.970806]  ? __kthread_parkme+0x82/0x180
[   13.970830]  ? preempt_count_sub+0x50/0x80
[   13.970870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.970907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.970935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.970962]  kthread+0x337/0x6f0
[   13.970981]  ? trace_preempt_on+0x20/0xc0
[   13.971008]  ? __pfx_kthread+0x10/0x10
[   13.971029]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.971054]  ? calculate_sigpending+0x7b/0xa0
[   13.971079]  ? __pfx_kthread+0x10/0x10
[   13.971100]  ret_from_fork+0x41/0x80
[   13.971123]  ? __pfx_kthread+0x10/0x10
[   13.971143]  ret_from_fork_asm+0x1a/0x30
[   13.971176]  </TASK>
[   13.971188] 
[   13.980088] Allocated by task 285:
[   13.980286]  kasan_save_stack+0x45/0x70
[   13.980502]  kasan_save_track+0x18/0x40
[   13.980707]  kasan_save_alloc_info+0x3b/0x50
[   13.980964]  __kasan_kmalloc+0xb7/0xc0
[   13.981117]  __kmalloc_cache_noprof+0x189/0x420
[   13.981278]  kasan_atomics+0x95/0x310
[   13.981415]  kunit_try_run_case+0x1a5/0x480
[   13.981949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.982236]  kthread+0x337/0x6f0
[   13.982423]  ret_from_fork+0x41/0x80
[   13.982733]  ret_from_fork_asm+0x1a/0x30
[   13.983037] 
[   13.983126] The buggy address belongs to the object at ffff8881029e6b00
[   13.983126]  which belongs to the cache kmalloc-64 of size 64
[   13.983637] The buggy address is located 0 bytes to the right of
[   13.983637]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   13.984195] 
[   13.984305] The buggy address belongs to the physical page:
[   13.984506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   13.985027] flags: 0x200000000000000(node=0|zone=2)
[   13.985268] page_type: f5(slab)
[   13.985428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.985725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.986075] page dumped because: kasan: bad access detected
[   13.986332] 
[   13.986432] Memory state around the buggy address:
[   13.986691]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.987020]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.987309] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.987663]                                      ^
[   13.987896]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988154]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988372] ==================================================================
[   14.780375] ==================================================================
[   14.780743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.781363] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.781706] 
[   14.781796] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.781928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.781944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.781968] Call Trace:
[   14.781996]  <TASK>
[   14.782012]  dump_stack_lvl+0x73/0xb0
[   14.782041]  print_report+0xd1/0x650
[   14.782067]  ? __virt_addr_valid+0x1db/0x2d0
[   14.782092]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.782117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.782142]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.782167]  kasan_report+0x141/0x180
[   14.782193]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.782222]  kasan_check_range+0x10c/0x1c0
[   14.782246]  __kasan_check_write+0x18/0x20
[   14.782268]  kasan_atomics_helper+0x16e7/0x5450
[   14.782294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.782319]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.782344]  ? kasan_atomics+0x152/0x310
[   14.782369]  kasan_atomics+0x1dc/0x310
[   14.782391]  ? __pfx_kasan_atomics+0x10/0x10
[   14.782415]  ? __pfx_read_tsc+0x10/0x10
[   14.782437]  ? ktime_get_ts64+0x86/0x230
[   14.782467]  kunit_try_run_case+0x1a5/0x480
[   14.782491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.782712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.782746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.782773]  ? __kthread_parkme+0x82/0x180
[   14.782797]  ? preempt_count_sub+0x50/0x80
[   14.782826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.782849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.782891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.782918]  kthread+0x337/0x6f0
[   14.782937]  ? trace_preempt_on+0x20/0xc0
[   14.782963]  ? __pfx_kthread+0x10/0x10
[   14.782984]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.783008]  ? calculate_sigpending+0x7b/0xa0
[   14.783032]  ? __pfx_kthread+0x10/0x10
[   14.783054]  ret_from_fork+0x41/0x80
[   14.783077]  ? __pfx_kthread+0x10/0x10
[   14.783097]  ret_from_fork_asm+0x1a/0x30
[   14.783130]  </TASK>
[   14.783143] 
[   14.793994] Allocated by task 285:
[   14.794141]  kasan_save_stack+0x45/0x70
[   14.794358]  kasan_save_track+0x18/0x40
[   14.794684]  kasan_save_alloc_info+0x3b/0x50
[   14.795045]  __kasan_kmalloc+0xb7/0xc0
[   14.795428]  __kmalloc_cache_noprof+0x189/0x420
[   14.795638]  kasan_atomics+0x95/0x310
[   14.795975]  kunit_try_run_case+0x1a5/0x480
[   14.796223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796555]  kthread+0x337/0x6f0
[   14.796865]  ret_from_fork+0x41/0x80
[   14.797096]  ret_from_fork_asm+0x1a/0x30
[   14.797415] 
[   14.797529] The buggy address belongs to the object at ffff8881029e6b00
[   14.797529]  which belongs to the cache kmalloc-64 of size 64
[   14.798131] The buggy address is located 0 bytes to the right of
[   14.798131]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.798800] 
[   14.798953] The buggy address belongs to the physical page:
[   14.799352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.799928] flags: 0x200000000000000(node=0|zone=2)
[   14.800183] page_type: f5(slab)
[   14.800344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.800885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.801315] page dumped because: kasan: bad access detected
[   14.801748] 
[   14.801835] Memory state around the buggy address:
[   14.802199]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.802717]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.803059] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.803627]                                      ^
[   14.803984]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.804439]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.804809] ==================================================================
[   14.040767] ==================================================================
[   14.041357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.041674] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.042116] 
[   14.042243] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.042293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.042307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.042331] Call Trace:
[   14.042350]  <TASK>
[   14.042369]  dump_stack_lvl+0x73/0xb0
[   14.042423]  print_report+0xd1/0x650
[   14.042450]  ? __virt_addr_valid+0x1db/0x2d0
[   14.042473]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.042498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.042523]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.042548]  kasan_report+0x141/0x180
[   14.042573]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.042602]  kasan_check_range+0x10c/0x1c0
[   14.042625]  __kasan_check_write+0x18/0x20
[   14.042647]  kasan_atomics_helper+0x7c7/0x5450
[   14.042680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.042727]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.042752]  ? kasan_atomics+0x152/0x310
[   14.042777]  kasan_atomics+0x1dc/0x310
[   14.042799]  ? __pfx_kasan_atomics+0x10/0x10
[   14.042823]  ? __pfx_read_tsc+0x10/0x10
[   14.042845]  ? ktime_get_ts64+0x86/0x230
[   14.042896]  kunit_try_run_case+0x1a5/0x480
[   14.043071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.043096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.043123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.043149]  ? __kthread_parkme+0x82/0x180
[   14.043174]  ? preempt_count_sub+0x50/0x80
[   14.043291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.043316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.043343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.043369]  kthread+0x337/0x6f0
[   14.043389]  ? trace_preempt_on+0x20/0xc0
[   14.043415]  ? __pfx_kthread+0x10/0x10
[   14.043435]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.043460]  ? calculate_sigpending+0x7b/0xa0
[   14.043484]  ? __pfx_kthread+0x10/0x10
[   14.043505]  ret_from_fork+0x41/0x80
[   14.043528]  ? __pfx_kthread+0x10/0x10
[   14.043549]  ret_from_fork_asm+0x1a/0x30
[   14.043589]  </TASK>
[   14.043602] 
[   14.052740] Allocated by task 285:
[   14.052954]  kasan_save_stack+0x45/0x70
[   14.053244]  kasan_save_track+0x18/0x40
[   14.053590]  kasan_save_alloc_info+0x3b/0x50
[   14.053818]  __kasan_kmalloc+0xb7/0xc0
[   14.054122]  __kmalloc_cache_noprof+0x189/0x420
[   14.054364]  kasan_atomics+0x95/0x310
[   14.054566]  kunit_try_run_case+0x1a5/0x480
[   14.054772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.055061]  kthread+0x337/0x6f0
[   14.055366]  ret_from_fork+0x41/0x80
[   14.055668]  ret_from_fork_asm+0x1a/0x30
[   14.055822] 
[   14.055914] The buggy address belongs to the object at ffff8881029e6b00
[   14.055914]  which belongs to the cache kmalloc-64 of size 64
[   14.056540] The buggy address is located 0 bytes to the right of
[   14.056540]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.057149] 
[   14.057252] The buggy address belongs to the physical page:
[   14.057495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.057834] flags: 0x200000000000000(node=0|zone=2)
[   14.058074] page_type: f5(slab)
[   14.058242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.059521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.060661] page dumped because: kasan: bad access detected
[   14.061075] 
[   14.061179] Memory state around the buggy address:
[   14.061399]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.062244]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.063046] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.063368]                                      ^
[   14.063741]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.064451]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.065087] ==================================================================
[   15.290442] ==================================================================
[   15.291109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.291548] Read of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   15.291805] 
[   15.291911] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   15.291961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.291975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.291999] Call Trace:
[   15.292019]  <TASK>
[   15.292039]  dump_stack_lvl+0x73/0xb0
[   15.292070]  print_report+0xd1/0x650
[   15.292096]  ? __virt_addr_valid+0x1db/0x2d0
[   15.292120]  ? kasan_atomics_helper+0x5115/0x5450
[   15.292145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.292171]  ? kasan_atomics_helper+0x5115/0x5450
[   15.292196]  kasan_report+0x141/0x180
[   15.292221]  ? kasan_atomics_helper+0x5115/0x5450
[   15.292252]  __asan_report_load8_noabort+0x18/0x20
[   15.292276]  kasan_atomics_helper+0x5115/0x5450
[   15.292327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.292353]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.292378]  ? kasan_atomics+0x152/0x310
[   15.292403]  kasan_atomics+0x1dc/0x310
[   15.292425]  ? __pfx_kasan_atomics+0x10/0x10
[   15.292448]  ? __pfx_read_tsc+0x10/0x10
[   15.292471]  ? ktime_get_ts64+0x86/0x230
[   15.292500]  kunit_try_run_case+0x1a5/0x480
[   15.292524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.292574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.292602]  ? __kthread_parkme+0x82/0x180
[   15.292646]  ? preempt_count_sub+0x50/0x80
[   15.292675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.292750]  kthread+0x337/0x6f0
[   15.292770]  ? trace_preempt_on+0x20/0xc0
[   15.292796]  ? __pfx_kthread+0x10/0x10
[   15.292817]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.292841]  ? calculate_sigpending+0x7b/0xa0
[   15.292865]  ? __pfx_kthread+0x10/0x10
[   15.292895]  ret_from_fork+0x41/0x80
[   15.292918]  ? __pfx_kthread+0x10/0x10
[   15.292938]  ret_from_fork_asm+0x1a/0x30
[   15.292971]  </TASK>
[   15.292985] 
[   15.300801] Allocated by task 285:
[   15.301014]  kasan_save_stack+0x45/0x70
[   15.301253]  kasan_save_track+0x18/0x40
[   15.301458]  kasan_save_alloc_info+0x3b/0x50
[   15.301692]  __kasan_kmalloc+0xb7/0xc0
[   15.301983]  __kmalloc_cache_noprof+0x189/0x420
[   15.302243]  kasan_atomics+0x95/0x310
[   15.302407]  kunit_try_run_case+0x1a5/0x480
[   15.302559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.302887]  kthread+0x337/0x6f0
[   15.303051]  ret_from_fork+0x41/0x80
[   15.303202]  ret_from_fork_asm+0x1a/0x30
[   15.303401] 
[   15.303506] The buggy address belongs to the object at ffff8881029e6b00
[   15.303506]  which belongs to the cache kmalloc-64 of size 64
[   15.303935] The buggy address is located 0 bytes to the right of
[   15.303935]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   15.304389] 
[   15.304490] The buggy address belongs to the physical page:
[   15.304746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   15.305107] flags: 0x200000000000000(node=0|zone=2)
[   15.305277] page_type: f5(slab)
[   15.305403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.305634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.305993] page dumped because: kasan: bad access detected
[   15.306276] 
[   15.306377] Memory state around the buggy address:
[   15.306631]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.307187]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.307400] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.307744]                                      ^
[   15.307985]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.308327]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.308537] ==================================================================
[   14.107253] ==================================================================
[   14.107603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.108025] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.108354] 
[   14.108472] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.108535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.108550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.108574] Call Trace:
[   14.108595]  <TASK>
[   14.108612]  dump_stack_lvl+0x73/0xb0
[   14.108641]  print_report+0xd1/0x650
[   14.108667]  ? __virt_addr_valid+0x1db/0x2d0
[   14.108692]  ? kasan_atomics_helper+0x992/0x5450
[   14.108716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.108742]  ? kasan_atomics_helper+0x992/0x5450
[   14.108769]  kasan_report+0x141/0x180
[   14.108794]  ? kasan_atomics_helper+0x992/0x5450
[   14.108824]  kasan_check_range+0x10c/0x1c0
[   14.108859]  __kasan_check_write+0x18/0x20
[   14.108894]  kasan_atomics_helper+0x992/0x5450
[   14.108922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.108948]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.108973]  ? kasan_atomics+0x152/0x310
[   14.108998]  kasan_atomics+0x1dc/0x310
[   14.109021]  ? __pfx_kasan_atomics+0x10/0x10
[   14.109045]  ? __pfx_read_tsc+0x10/0x10
[   14.109069]  ? ktime_get_ts64+0x86/0x230
[   14.109099]  kunit_try_run_case+0x1a5/0x480
[   14.109123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109200]  ? __kthread_parkme+0x82/0x180
[   14.109225]  ? preempt_count_sub+0x50/0x80
[   14.109254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.109304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.109330]  kthread+0x337/0x6f0
[   14.109350]  ? trace_preempt_on+0x20/0xc0
[   14.109376]  ? __pfx_kthread+0x10/0x10
[   14.109397]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.109422]  ? calculate_sigpending+0x7b/0xa0
[   14.109446]  ? __pfx_kthread+0x10/0x10
[   14.109467]  ret_from_fork+0x41/0x80
[   14.109490]  ? __pfx_kthread+0x10/0x10
[   14.109511]  ret_from_fork_asm+0x1a/0x30
[   14.109544]  </TASK>
[   14.109557] 
[   14.117398] Allocated by task 285:
[   14.117579]  kasan_save_stack+0x45/0x70
[   14.117987]  kasan_save_track+0x18/0x40
[   14.118214]  kasan_save_alloc_info+0x3b/0x50
[   14.118432]  __kasan_kmalloc+0xb7/0xc0
[   14.118770]  __kmalloc_cache_noprof+0x189/0x420
[   14.119055]  kasan_atomics+0x95/0x310
[   14.119209]  kunit_try_run_case+0x1a5/0x480
[   14.119359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.119647]  kthread+0x337/0x6f0
[   14.119835]  ret_from_fork+0x41/0x80
[   14.120129]  ret_from_fork_asm+0x1a/0x30
[   14.120345] 
[   14.120453] The buggy address belongs to the object at ffff8881029e6b00
[   14.120453]  which belongs to the cache kmalloc-64 of size 64
[   14.121178] The buggy address is located 0 bytes to the right of
[   14.121178]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.121794] 
[   14.122104] The buggy address belongs to the physical page:
[   14.122341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.122719] flags: 0x200000000000000(node=0|zone=2)
[   14.122934] page_type: f5(slab)
[   14.123230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.123531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.123993] page dumped because: kasan: bad access detected
[   14.124258] 
[   14.124341] Memory state around the buggy address:
[   14.124683]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.125059]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.125290] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.125612]                                      ^
[   14.125894]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.126396]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.126768] ==================================================================
[   14.147908] ==================================================================
[   14.148611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.149133] Write of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.149390] 
[   14.149512] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.149560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.149574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.149597] Call Trace:
[   14.149614]  <TASK>
[   14.149631]  dump_stack_lvl+0x73/0xb0
[   14.149659]  print_report+0xd1/0x650
[   14.149685]  ? __virt_addr_valid+0x1db/0x2d0
[   14.149710]  ? kasan_atomics_helper+0xac7/0x5450
[   14.149734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.149772]  ? kasan_atomics_helper+0xac7/0x5450
[   14.149798]  kasan_report+0x141/0x180
[   14.149824]  ? kasan_atomics_helper+0xac7/0x5450
[   14.149853]  kasan_check_range+0x10c/0x1c0
[   14.149898]  __kasan_check_write+0x18/0x20
[   14.149925]  kasan_atomics_helper+0xac7/0x5450
[   14.149951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.149978]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.150003]  ? kasan_atomics+0x152/0x310
[   14.150029]  kasan_atomics+0x1dc/0x310
[   14.150051]  ? __pfx_kasan_atomics+0x10/0x10
[   14.150075]  ? __pfx_read_tsc+0x10/0x10
[   14.150097]  ? ktime_get_ts64+0x86/0x230
[   14.150126]  kunit_try_run_case+0x1a5/0x480
[   14.150152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.150174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.150201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.150228]  ? __kthread_parkme+0x82/0x180
[   14.150252]  ? preempt_count_sub+0x50/0x80
[   14.150280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.150304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.150331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.150357]  kthread+0x337/0x6f0
[   14.150377]  ? trace_preempt_on+0x20/0xc0
[   14.150403]  ? __pfx_kthread+0x10/0x10
[   14.150424]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.150449]  ? calculate_sigpending+0x7b/0xa0
[   14.150473]  ? __pfx_kthread+0x10/0x10
[   14.150494]  ret_from_fork+0x41/0x80
[   14.150569]  ? __pfx_kthread+0x10/0x10
[   14.150593]  ret_from_fork_asm+0x1a/0x30
[   14.150625]  </TASK>
[   14.150638] 
[   14.164469] Allocated by task 285:
[   14.164900]  kasan_save_stack+0x45/0x70
[   14.165265]  kasan_save_track+0x18/0x40
[   14.165441]  kasan_save_alloc_info+0x3b/0x50
[   14.165775]  __kasan_kmalloc+0xb7/0xc0
[   14.166378]  __kmalloc_cache_noprof+0x189/0x420
[   14.166717]  kasan_atomics+0x95/0x310
[   14.167118]  kunit_try_run_case+0x1a5/0x480
[   14.167425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.167895]  kthread+0x337/0x6f0
[   14.168090]  ret_from_fork+0x41/0x80
[   14.168241]  ret_from_fork_asm+0x1a/0x30
[   14.168454] 
[   14.168599] The buggy address belongs to the object at ffff8881029e6b00
[   14.168599]  which belongs to the cache kmalloc-64 of size 64
[   14.169337] The buggy address is located 0 bytes to the right of
[   14.169337]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.170023] 
[   14.170124] The buggy address belongs to the physical page:
[   14.170398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.170783] flags: 0x200000000000000(node=0|zone=2)
[   14.171135] page_type: f5(slab)
[   14.171310] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.171654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.172132] page dumped because: kasan: bad access detected
[   14.172377] 
[   14.172482] Memory state around the buggy address:
[   14.172810]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.173198]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.173736] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.174145]                                      ^
[   14.174434]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.174902]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.175363] ==================================================================
[   14.500421] ==================================================================
[   14.500753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.501087] Read of size 4 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.501363] 
[   14.501476] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.501541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.501555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.501579] Call Trace:
[   14.501595]  <TASK>
[   14.501611]  dump_stack_lvl+0x73/0xb0
[   14.501639]  print_report+0xd1/0x650
[   14.501664]  ? __virt_addr_valid+0x1db/0x2d0
[   14.501687]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.501712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.501738]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.501762]  kasan_report+0x141/0x180
[   14.501787]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.501817]  __asan_report_load4_noabort+0x18/0x20
[   14.501840]  kasan_atomics_helper+0x4a02/0x5450
[   14.501867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.501905]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.501929]  ? kasan_atomics+0x152/0x310
[   14.501954]  kasan_atomics+0x1dc/0x310
[   14.501976]  ? __pfx_kasan_atomics+0x10/0x10
[   14.502000]  ? __pfx_read_tsc+0x10/0x10
[   14.502021]  ? ktime_get_ts64+0x86/0x230
[   14.502050]  kunit_try_run_case+0x1a5/0x480
[   14.502074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.502096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.502122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.502149]  ? __kthread_parkme+0x82/0x180
[   14.502172]  ? preempt_count_sub+0x50/0x80
[   14.502200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.502223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.502249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.502276]  kthread+0x337/0x6f0
[   14.502295]  ? trace_preempt_on+0x20/0xc0
[   14.502320]  ? __pfx_kthread+0x10/0x10
[   14.502341]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.502366]  ? calculate_sigpending+0x7b/0xa0
[   14.502390]  ? __pfx_kthread+0x10/0x10
[   14.502411]  ret_from_fork+0x41/0x80
[   14.502434]  ? __pfx_kthread+0x10/0x10
[   14.502455]  ret_from_fork_asm+0x1a/0x30
[   14.502488]  </TASK>
[   14.502500] 
[   14.510665] Allocated by task 285:
[   14.510854]  kasan_save_stack+0x45/0x70
[   14.511237]  kasan_save_track+0x18/0x40
[   14.511478]  kasan_save_alloc_info+0x3b/0x50
[   14.511783]  __kasan_kmalloc+0xb7/0xc0
[   14.512063]  __kmalloc_cache_noprof+0x189/0x420
[   14.512260]  kasan_atomics+0x95/0x310
[   14.512452]  kunit_try_run_case+0x1a5/0x480
[   14.512715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.513018]  kthread+0x337/0x6f0
[   14.513206]  ret_from_fork+0x41/0x80
[   14.513377]  ret_from_fork_asm+0x1a/0x30
[   14.513599] 
[   14.513693] The buggy address belongs to the object at ffff8881029e6b00
[   14.513693]  which belongs to the cache kmalloc-64 of size 64
[   14.514086] The buggy address is located 0 bytes to the right of
[   14.514086]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.514610] 
[   14.514687] The buggy address belongs to the physical page:
[   14.514914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.515299] flags: 0x200000000000000(node=0|zone=2)
[   14.515501] page_type: f5(slab)
[   14.515927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.516191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.516495] page dumped because: kasan: bad access detected
[   14.517014] 
[   14.517095] Memory state around the buggy address:
[   14.517302]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.517562]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.517785] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.518090]                                      ^
[   14.518329]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.519057]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.519356] ==================================================================
[   14.890106] ==================================================================
[   14.890446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.890973] Write of size 8 at addr ffff8881029e6b30 by task kunit_try_catch/285
[   14.891295] 
[   14.891393] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   14.891441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891477] Call Trace:
[   14.891494]  <TASK>
[   14.891511]  dump_stack_lvl+0x73/0xb0
[   14.891538]  print_report+0xd1/0x650
[   14.891564]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891595]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.891619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891646]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.891670]  kasan_report+0x141/0x180
[   14.891695]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.891726]  kasan_check_range+0x10c/0x1c0
[   14.891751]  __kasan_check_write+0x18/0x20
[   14.891775]  kasan_atomics_helper+0x19e3/0x5450
[   14.891803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.891828]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.891921]  ? kasan_atomics+0x152/0x310
[   14.891946]  kasan_atomics+0x1dc/0x310
[   14.891969]  ? __pfx_kasan_atomics+0x10/0x10
[   14.891992]  ? __pfx_read_tsc+0x10/0x10
[   14.892015]  ? ktime_get_ts64+0x86/0x230
[   14.892043]  kunit_try_run_case+0x1a5/0x480
[   14.892067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.892115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892141]  ? __kthread_parkme+0x82/0x180
[   14.892165]  ? preempt_count_sub+0x50/0x80
[   14.892192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892266]  kthread+0x337/0x6f0
[   14.892285]  ? trace_preempt_on+0x20/0xc0
[   14.892312]  ? __pfx_kthread+0x10/0x10
[   14.892332]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892357]  ? calculate_sigpending+0x7b/0xa0
[   14.892382]  ? __pfx_kthread+0x10/0x10
[   14.892403]  ret_from_fork+0x41/0x80
[   14.892427]  ? __pfx_kthread+0x10/0x10
[   14.892448]  ret_from_fork_asm+0x1a/0x30
[   14.892481]  </TASK>
[   14.892493] 
[   14.900827] Allocated by task 285:
[   14.900973]  kasan_save_stack+0x45/0x70
[   14.901198]  kasan_save_track+0x18/0x40
[   14.901401]  kasan_save_alloc_info+0x3b/0x50
[   14.901801]  __kasan_kmalloc+0xb7/0xc0
[   14.902227]  __kmalloc_cache_noprof+0x189/0x420
[   14.902448]  kasan_atomics+0x95/0x310
[   14.902646]  kunit_try_run_case+0x1a5/0x480
[   14.902854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.903096]  kthread+0x337/0x6f0
[   14.903258]  ret_from_fork+0x41/0x80
[   14.903410]  ret_from_fork_asm+0x1a/0x30
[   14.903643] 
[   14.903737] The buggy address belongs to the object at ffff8881029e6b00
[   14.903737]  which belongs to the cache kmalloc-64 of size 64
[   14.904235] The buggy address is located 0 bytes to the right of
[   14.904235]  allocated 48-byte region [ffff8881029e6b00, ffff8881029e6b30)
[   14.904783] 
[   14.904894] The buggy address belongs to the physical page:
[   14.905147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e6
[   14.905393] flags: 0x200000000000000(node=0|zone=2)
[   14.905563] page_type: f5(slab)
[   14.905689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.905979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.906335] page dumped because: kasan: bad access detected
[   14.906657] 
[   14.906755] Memory state around the buggy address:
[   14.907188]  ffff8881029e6a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.907487]  ffff8881029e6a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.907711] >ffff8881029e6b00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.907939]                                      ^
[   14.908098]  ffff8881029e6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908318]  ffff8881029e6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908947] ==================================================================