Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   27.070534] ==================================================================
[   27.070697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   27.070814] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.070959] 
[   27.071031] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.071576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.072077] Hardware name: linux,dummy-virt (DT)
[   27.072192] Call trace:
[   27.072457]  show_stack+0x20/0x38 (C)
[   27.072788]  dump_stack_lvl+0x8c/0xd0
[   27.072941]  print_report+0x118/0x608
[   27.073068]  kasan_report+0xdc/0x128
[   27.073182]  kasan_check_range+0x100/0x1a8
[   27.073298]  __kasan_check_write+0x20/0x30
[   27.073419]  kasan_atomics_helper+0x99c/0x4858
[   27.073538]  kasan_atomics+0x198/0x2e0
[   27.073646]  kunit_try_run_case+0x170/0x3f0
[   27.074668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.075236]  kthread+0x328/0x630
[   27.075509]  ret_from_fork+0x10/0x20
[   27.075705] 
[   27.075823] Allocated by task 267:
[   27.075905]  kasan_save_stack+0x3c/0x68
[   27.076031]  kasan_save_track+0x20/0x40
[   27.076139]  kasan_save_alloc_info+0x40/0x58
[   27.076242]  __kasan_kmalloc+0xd4/0xd8
[   27.076355]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.076675]  kasan_atomics+0xb8/0x2e0
[   27.079029]  kunit_try_run_case+0x170/0x3f0
[   27.079150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.079309]  kthread+0x328/0x630
[   27.079421]  ret_from_fork+0x10/0x20
[   27.079534] 
[   27.079593] The buggy address belongs to the object at fff00000c7615800
[   27.079593]  which belongs to the cache kmalloc-64 of size 64
[   27.079759] The buggy address is located 0 bytes to the right of
[   27.079759]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.079954] 
[   27.080014] The buggy address belongs to the physical page:
[   27.080095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.081486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.088713] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.091514]  ret_from_fork+0x10/0x20
[   27.092003] 
[   27.092284] Allocated by task 267:
[   27.092379]  kasan_save_stack+0x3c/0x68
[   27.092490]  kasan_save_track+0x20/0x40
[   27.093116]  kasan_save_alloc_info+0x40/0x58
[   27.093608]  __kasan_kmalloc+0xd4/0xd8
[   27.093722]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.093984]  kasan_atomics+0xb8/0x2e0
[   27.094345]  kunit_try_run_case+0x170/0x3f0
[   27.094452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.094563]  kthread+0x328/0x630
[   27.094655]  ret_from_fork+0x10/0x20
[   27.096529] 
[   27.096816] The buggy address belongs to the object at fff00000c7615800
[   27.096816]  which belongs to the cache kmalloc-64 of size 64
[   27.097655] The buggy address is located 0 bytes to the right of
[   27.097655]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.098769] 
[   27.099480] The buggy address belongs to the physical page:
[   27.099564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.099707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.100458] page_type: f5(slab)
[   27.101537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.101867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.101989] page dumped because: kasan: bad access detected
[   27.103334] 
[   27.103469] Memory state around the buggy address:
[   27.103549]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.104689]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.105253] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.105361]                                      ^
[   27.106567]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.107199]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.108645] ==================================================================
[   27.290955] ==================================================================
[   27.291542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   27.291969] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.292117] 
[   27.292263] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.293271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.293615] Hardware name: linux,dummy-virt (DT)
[   27.293706] Call trace:
[   27.293768]  show_stack+0x20/0x38 (C)
[   27.294734]  dump_stack_lvl+0x8c/0xd0
[   27.294973]  print_report+0x118/0x608
[   27.295562]  kasan_report+0xdc/0x128
[   27.296072]  __asan_report_load8_noabort+0x20/0x30
[   27.296393]  kasan_atomics_helper+0x3f58/0x4858
[   27.296767]  kasan_atomics+0x198/0x2e0
[   27.297515]  kunit_try_run_case+0x170/0x3f0
[   27.297670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.297808]  kthread+0x328/0x630
[   27.297927]  ret_from_fork+0x10/0x20
[   27.298074] 
[   27.299341] Allocated by task 267:
[   27.299592]  kasan_save_stack+0x3c/0x68
[   27.299721]  kasan_save_track+0x20/0x40
[   27.299834]  kasan_save_alloc_info+0x40/0x58
[   27.300631]  __kasan_kmalloc+0xd4/0xd8
[   27.300999]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.301258]  kasan_atomics+0xb8/0x2e0
[   27.301353]  kunit_try_run_case+0x170/0x3f0
[   27.301453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.301560]  kthread+0x328/0x630
[   27.302453]  ret_from_fork+0x10/0x20
[   27.303199] 
[   27.303462] The buggy address belongs to the object at fff00000c7615800
[   27.303462]  which belongs to the cache kmalloc-64 of size 64
[   27.303793] The buggy address is located 0 bytes to the right of
[   27.303793]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.303983] 
[   27.304223] The buggy address belongs to the physical page:
[   27.304983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.305274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.305730] page_type: f5(slab)
[   27.305828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.305975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.306080] page dumped because: kasan: bad access detected
[   27.306913] 
[   27.307221] Memory state around the buggy address:
[   27.307482]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.307976]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.308341] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.308447]                                      ^
[   27.309142]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.309271]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.309373] ==================================================================
[   27.528070] ==================================================================
[   27.528189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   27.528308] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.529558] 
[   27.529749] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.530019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.530113] Hardware name: linux,dummy-virt (DT)
[   27.530201] Call trace:
[   27.530265]  show_stack+0x20/0x38 (C)
[   27.530392]  dump_stack_lvl+0x8c/0xd0
[   27.531099]  print_report+0x118/0x608
[   27.531390]  kasan_report+0xdc/0x128
[   27.531560]  kasan_check_range+0x100/0x1a8
[   27.531781]  __kasan_check_write+0x20/0x30
[   27.532207]  kasan_atomics_helper+0x154c/0x4858
[   27.532346]  kasan_atomics+0x198/0x2e0
[   27.532738]  kunit_try_run_case+0x170/0x3f0
[   27.533185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.533688]  kthread+0x328/0x630
[   27.533808]  ret_from_fork+0x10/0x20
[   27.534606] 
[   27.534900] Allocated by task 267:
[   27.535190]  kasan_save_stack+0x3c/0x68
[   27.535296]  kasan_save_track+0x20/0x40
[   27.535708]  kasan_save_alloc_info+0x40/0x58
[   27.536006]  __kasan_kmalloc+0xd4/0xd8
[   27.536119]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.536401]  kasan_atomics+0xb8/0x2e0
[   27.536518]  kunit_try_run_case+0x170/0x3f0
[   27.537797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.537923]  kthread+0x328/0x630
[   27.538039]  ret_from_fork+0x10/0x20
[   27.538133] 
[   27.538186] The buggy address belongs to the object at fff00000c7615800
[   27.538186]  which belongs to the cache kmalloc-64 of size 64
[   27.538487] The buggy address is located 0 bytes to the right of
[   27.538487]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.538670] 
[   27.538725] The buggy address belongs to the physical page:
[   27.538804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.539134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.540020] page_type: f5(slab)
[   27.540126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.540508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.540633] page dumped because: kasan: bad access detected
[   27.540723] 
[   27.540777] Memory state around the buggy address:
[   27.540855]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.541432]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.542123] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.542270]                                      ^
[   27.542370]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.542476]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.542576] ==================================================================
[   27.518747] ==================================================================
[   27.518859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   27.518987] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.519109] 
[   27.519180] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.519369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.519434] Hardware name: linux,dummy-virt (DT)
[   27.519510] Call trace:
[   27.519616]  show_stack+0x20/0x38 (C)
[   27.519825]  dump_stack_lvl+0x8c/0xd0
[   27.520038]  print_report+0x118/0x608
[   27.520454]  kasan_report+0xdc/0x128
[   27.520579]  kasan_check_range+0x100/0x1a8
[   27.520729]  __kasan_check_write+0x20/0x30
[   27.521223]  kasan_atomics_helper+0x14e4/0x4858
[   27.521375]  kasan_atomics+0x198/0x2e0
[   27.521504]  kunit_try_run_case+0x170/0x3f0
[   27.521633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.522214]  kthread+0x328/0x630
[   27.522793]  ret_from_fork+0x10/0x20
[   27.523041] 
[   27.523109] Allocated by task 267:
[   27.523203]  kasan_save_stack+0x3c/0x68
[   27.523407]  kasan_save_track+0x20/0x40
[   27.523723]  kasan_save_alloc_info+0x40/0x58
[   27.523897]  __kasan_kmalloc+0xd4/0xd8
[   27.524024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.524172]  kasan_atomics+0xb8/0x2e0
[   27.524316]  kunit_try_run_case+0x170/0x3f0
[   27.524428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.524589]  kthread+0x328/0x630
[   27.524818]  ret_from_fork+0x10/0x20
[   27.524970] 
[   27.525041] The buggy address belongs to the object at fff00000c7615800
[   27.525041]  which belongs to the cache kmalloc-64 of size 64
[   27.525205] The buggy address is located 0 bytes to the right of
[   27.525205]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.525405] 
[   27.525489] The buggy address belongs to the physical page:
[   27.525595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.525748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.525889] page_type: f5(slab)
[   27.526013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.526160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.526278] page dumped because: kasan: bad access detected
[   27.526371] 
[   27.526429] Memory state around the buggy address:
[   27.526508]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.526617]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.526794] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.526995]                                      ^
[   27.527102]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.527221]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.527329] ==================================================================
[   27.340493] ==================================================================
[   27.340629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   27.340749] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.340883] 
[   27.340963] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.341205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.341281] Hardware name: linux,dummy-virt (DT)
[   27.341357] Call trace:
[   27.341425]  show_stack+0x20/0x38 (C)
[   27.341645]  dump_stack_lvl+0x8c/0xd0
[   27.341786]  print_report+0x118/0x608
[   27.341905]  kasan_report+0xdc/0x128
[   27.342191]  kasan_check_range+0x100/0x1a8
[   27.342525]  __kasan_check_write+0x20/0x30
[   27.342860]  kasan_atomics_helper+0xf20/0x4858
[   27.343209]  kasan_atomics+0x198/0x2e0
[   27.343416]  kunit_try_run_case+0x170/0x3f0
[   27.343539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.343706]  kthread+0x328/0x630
[   27.343879]  ret_from_fork+0x10/0x20
[   27.344115] 
[   27.344197] Allocated by task 267:
[   27.344284]  kasan_save_stack+0x3c/0x68
[   27.344401]  kasan_save_track+0x20/0x40
[   27.344510]  kasan_save_alloc_info+0x40/0x58
[   27.344653]  __kasan_kmalloc+0xd4/0xd8
[   27.344754]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.344968]  kasan_atomics+0xb8/0x2e0
[   27.345056]  kunit_try_run_case+0x170/0x3f0
[   27.345242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.345357]  kthread+0x328/0x630
[   27.345469]  ret_from_fork+0x10/0x20
[   27.345654] 
[   27.345759] The buggy address belongs to the object at fff00000c7615800
[   27.345759]  which belongs to the cache kmalloc-64 of size 64
[   27.346006] The buggy address is located 0 bytes to the right of
[   27.346006]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.346433] 
[   27.346509] The buggy address belongs to the physical page:
[   27.346586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.346787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.347007] page_type: f5(slab)
[   27.347100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.347224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.347394] page dumped because: kasan: bad access detected
[   27.347513] 
[   27.347567] Memory state around the buggy address:
[   27.347641]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.347783]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.347904] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.348073]                                      ^
[   27.348218]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.348375]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.348486] ==================================================================
[   27.506330] ==================================================================
[   27.506442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   27.506647] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.506765] 
[   27.506967] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.507506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.507635] Hardware name: linux,dummy-virt (DT)
[   27.507748] Call trace:
[   27.507818]  show_stack+0x20/0x38 (C)
[   27.507983]  dump_stack_lvl+0x8c/0xd0
[   27.508448]  print_report+0x118/0x608
[   27.508946]  kasan_report+0xdc/0x128
[   27.509205]  kasan_check_range+0x100/0x1a8
[   27.509453]  __kasan_check_write+0x20/0x30
[   27.509631]  kasan_atomics_helper+0x147c/0x4858
[   27.509773]  kasan_atomics+0x198/0x2e0
[   27.510159]  kunit_try_run_case+0x170/0x3f0
[   27.510295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.510439]  kthread+0x328/0x630
[   27.510776]  ret_from_fork+0x10/0x20
[   27.511115] 
[   27.511223] Allocated by task 267:
[   27.511406]  kasan_save_stack+0x3c/0x68
[   27.511526]  kasan_save_track+0x20/0x40
[   27.511635]  kasan_save_alloc_info+0x40/0x58
[   27.511747]  __kasan_kmalloc+0xd4/0xd8
[   27.511870]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.512024]  kasan_atomics+0xb8/0x2e0
[   27.512133]  kunit_try_run_case+0x170/0x3f0
[   27.512833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.513096]  kthread+0x328/0x630
[   27.513566]  ret_from_fork+0x10/0x20
[   27.513865] 
[   27.513951] The buggy address belongs to the object at fff00000c7615800
[   27.513951]  which belongs to the cache kmalloc-64 of size 64
[   27.514213] The buggy address is located 0 bytes to the right of
[   27.514213]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.514413] 
[   27.514479] The buggy address belongs to the physical page:
[   27.514569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.514987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.515658] page_type: f5(slab)
[   27.516032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.516644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.516761] page dumped because: kasan: bad access detected
[   27.516844] 
[   27.516926] Memory state around the buggy address:
[   27.517031]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.517190]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.517563] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.517713]                                      ^
[   27.517899]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.518047]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.518158] ==================================================================
[   27.309959] ==================================================================
[   27.310079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   27.310357] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.310482] 
[   27.310621] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.311160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.311345] Hardware name: linux,dummy-virt (DT)
[   27.311605] Call trace:
[   27.311687]  show_stack+0x20/0x38 (C)
[   27.311834]  dump_stack_lvl+0x8c/0xd0
[   27.312501]  print_report+0x118/0x608
[   27.312728]  kasan_report+0xdc/0x128
[   27.312910]  kasan_check_range+0x100/0x1a8
[   27.313065]  __kasan_check_write+0x20/0x30
[   27.313218]  kasan_atomics_helper+0xe44/0x4858
[   27.313568]  kasan_atomics+0x198/0x2e0
[   27.313696]  kunit_try_run_case+0x170/0x3f0
[   27.313877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.314042]  kthread+0x328/0x630
[   27.314183]  ret_from_fork+0x10/0x20
[   27.314307] 
[   27.314352] Allocated by task 267:
[   27.314441]  kasan_save_stack+0x3c/0x68
[   27.314546]  kasan_save_track+0x20/0x40
[   27.314640]  kasan_save_alloc_info+0x40/0x58
[   27.314740]  __kasan_kmalloc+0xd4/0xd8
[   27.314830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.314952]  kasan_atomics+0xb8/0x2e0
[   27.315042]  kunit_try_run_case+0x170/0x3f0
[   27.315154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.315569]  kthread+0x328/0x630
[   27.315858]  ret_from_fork+0x10/0x20
[   27.316215] 
[   27.316583] The buggy address belongs to the object at fff00000c7615800
[   27.316583]  which belongs to the cache kmalloc-64 of size 64
[   27.316995] The buggy address is located 0 bytes to the right of
[   27.316995]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.317828] 
[   27.317915] The buggy address belongs to the physical page:
[   27.318013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.318540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.319134] page_type: f5(slab)
[   27.319273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.319416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.320079] page dumped because: kasan: bad access detected
[   27.320189] 
[   27.320307] Memory state around the buggy address:
[   27.320656]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.320768]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.321164] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.321638]                                      ^
[   27.321910]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.322296]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.322393] ==================================================================
[   27.585712] ==================================================================
[   27.585992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   27.586280] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.586507] 
[   27.586580] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.586824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.586903] Hardware name: linux,dummy-virt (DT)
[   27.587070] Call trace:
[   27.587143]  show_stack+0x20/0x38 (C)
[   27.587376]  dump_stack_lvl+0x8c/0xd0
[   27.587674]  print_report+0x118/0x608
[   27.587846]  kasan_report+0xdc/0x128
[   27.588017]  kasan_check_range+0x100/0x1a8
[   27.588195]  __kasan_check_write+0x20/0x30
[   27.588848]  kasan_atomics_helper+0x16d0/0x4858
[   27.589370]  kasan_atomics+0x198/0x2e0
[   27.589517]  kunit_try_run_case+0x170/0x3f0
[   27.589657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.589793]  kthread+0x328/0x630
[   27.590624]  ret_from_fork+0x10/0x20
[   27.590807] 
[   27.591002] Allocated by task 267:
[   27.591080]  kasan_save_stack+0x3c/0x68
[   27.591561]  kasan_save_track+0x20/0x40
[   27.591757]  kasan_save_alloc_info+0x40/0x58
[   27.592432]  __kasan_kmalloc+0xd4/0xd8
[   27.592539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.592711]  kasan_atomics+0xb8/0x2e0
[   27.592808]  kunit_try_run_case+0x170/0x3f0
[   27.592909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.593052]  kthread+0x328/0x630
[   27.593156]  ret_from_fork+0x10/0x20
[   27.593289] 
[   27.593340] The buggy address belongs to the object at fff00000c7615800
[   27.593340]  which belongs to the cache kmalloc-64 of size 64
[   27.593708] The buggy address is located 0 bytes to the right of
[   27.593708]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.593913] 
[   27.593995] The buggy address belongs to the physical page:
[   27.594073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.594322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.594464] page_type: f5(slab)
[   27.594571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.594719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.594960] page dumped because: kasan: bad access detected
[   27.595046] 
[   27.595436] Memory state around the buggy address:
[   27.595599]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.596367]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.596672] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.597194]                                      ^
[   27.597309]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597482]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.597620] ==================================================================
[   27.448807] ==================================================================
[   27.448914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   27.449140] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.449435] 
[   27.449511] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.450124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.450426] Hardware name: linux,dummy-virt (DT)
[   27.450673] Call trace:
[   27.451192]  show_stack+0x20/0x38 (C)
[   27.451313]  dump_stack_lvl+0x8c/0xd0
[   27.451433]  print_report+0x118/0x608
[   27.451561]  kasan_report+0xdc/0x128
[   27.451689]  kasan_check_range+0x100/0x1a8
[   27.451810]  __kasan_check_write+0x20/0x30
[   27.451924]  kasan_atomics_helper+0x12d8/0x4858
[   27.452062]  kasan_atomics+0x198/0x2e0
[   27.452173]  kunit_try_run_case+0x170/0x3f0
[   27.452296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.452429]  kthread+0x328/0x630
[   27.452540]  ret_from_fork+0x10/0x20
[   27.452658] 
[   27.452704] Allocated by task 267:
[   27.452774]  kasan_save_stack+0x3c/0x68
[   27.452867]  kasan_save_track+0x20/0x40
[   27.455224]  kasan_save_alloc_info+0x40/0x58
[   27.455429]  __kasan_kmalloc+0xd4/0xd8
[   27.455597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.455756]  kasan_atomics+0xb8/0x2e0
[   27.455862]  kunit_try_run_case+0x170/0x3f0
[   27.456173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.457123]  kthread+0x328/0x630
[   27.457261]  ret_from_fork+0x10/0x20
[   27.457413] 
[   27.457497] The buggy address belongs to the object at fff00000c7615800
[   27.457497]  which belongs to the cache kmalloc-64 of size 64
[   27.457747] The buggy address is located 0 bytes to the right of
[   27.457747]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.458008] 
[   27.458084] The buggy address belongs to the physical page:
[   27.459283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.459706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.459859] page_type: f5(slab)
[   27.460495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.460644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.461348] page dumped because: kasan: bad access detected
[   27.461449] 
[   27.461550] Memory state around the buggy address:
[   27.461631]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.462059]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.462337] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.462810]                                      ^
[   27.463070]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.463240]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.463337] ==================================================================
[   27.323088] ==================================================================
[   27.323191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   27.323299] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.323418] 
[   27.323483] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.323712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.323954] Hardware name: linux,dummy-virt (DT)
[   27.324038] Call trace:
[   27.324103]  show_stack+0x20/0x38 (C)
[   27.324283]  dump_stack_lvl+0x8c/0xd0
[   27.324412]  print_report+0x118/0x608
[   27.324534]  kasan_report+0xdc/0x128
[   27.324840]  __asan_report_store8_noabort+0x20/0x30
[   27.325024]  kasan_atomics_helper+0x3e5c/0x4858
[   27.325343]  kasan_atomics+0x198/0x2e0
[   27.325468]  kunit_try_run_case+0x170/0x3f0
[   27.325605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.325780]  kthread+0x328/0x630
[   27.326010]  ret_from_fork+0x10/0x20
[   27.326138] 
[   27.326235] Allocated by task 267:
[   27.326321]  kasan_save_stack+0x3c/0x68
[   27.326440]  kasan_save_track+0x20/0x40
[   27.326544]  kasan_save_alloc_info+0x40/0x58
[   27.326644]  __kasan_kmalloc+0xd4/0xd8
[   27.326947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.327061]  kasan_atomics+0xb8/0x2e0
[   27.327290]  kunit_try_run_case+0x170/0x3f0
[   27.327402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.327533]  kthread+0x328/0x630
[   27.327632]  ret_from_fork+0x10/0x20
[   27.327737] 
[   27.327799] The buggy address belongs to the object at fff00000c7615800
[   27.327799]  which belongs to the cache kmalloc-64 of size 64
[   27.328013] The buggy address is located 0 bytes to the right of
[   27.328013]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.328225] 
[   27.328408] The buggy address belongs to the physical page:
[   27.328630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.328763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.328880] page_type: f5(slab)
[   27.328993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.329312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.329453] page dumped because: kasan: bad access detected
[   27.329532] 
[   27.329582] Memory state around the buggy address:
[   27.329665]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.329765]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.329903] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.330034]                                      ^
[   27.330119]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330312]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.330474] ==================================================================
[   27.252421] ==================================================================
[   27.252821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   27.252956] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.253087] 
[   27.253156] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.253351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.253416] Hardware name: linux,dummy-virt (DT)
[   27.253503] Call trace:
[   27.253663]  show_stack+0x20/0x38 (C)
[   27.253787]  dump_stack_lvl+0x8c/0xd0
[   27.253944]  print_report+0x118/0x608
[   27.254076]  kasan_report+0xdc/0x128
[   27.254191]  kasan_check_range+0x100/0x1a8
[   27.254312]  __kasan_check_write+0x20/0x30
[   27.254429]  kasan_atomics_helper+0xd3c/0x4858
[   27.254547]  kasan_atomics+0x198/0x2e0
[   27.254660]  kunit_try_run_case+0x170/0x3f0
[   27.254780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.254913]  kthread+0x328/0x630
[   27.256473]  ret_from_fork+0x10/0x20
[   27.256618] 
[   27.256667] Allocated by task 267:
[   27.256754]  kasan_save_stack+0x3c/0x68
[   27.256911]  kasan_save_track+0x20/0x40
[   27.257029]  kasan_save_alloc_info+0x40/0x58
[   27.257190]  __kasan_kmalloc+0xd4/0xd8
[   27.257293]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.257452]  kasan_atomics+0xb8/0x2e0
[   27.257667]  kunit_try_run_case+0x170/0x3f0
[   27.257784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.257911]  kthread+0x328/0x630
[   27.258096]  ret_from_fork+0x10/0x20
[   27.258217] 
[   27.258313] The buggy address belongs to the object at fff00000c7615800
[   27.258313]  which belongs to the cache kmalloc-64 of size 64
[   27.258472] The buggy address is located 0 bytes to the right of
[   27.258472]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.258635] 
[   27.258742] The buggy address belongs to the physical page:
[   27.258892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.259081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.259204] page_type: f5(slab)
[   27.259290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.259445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.259873] page dumped because: kasan: bad access detected
[   27.260047] 
[   27.260173] Memory state around the buggy address:
[   27.260295]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.260412]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.260556] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.260686]                                      ^
[   27.260774]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.260881]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.261007] ==================================================================
[   27.436497] ==================================================================
[   27.436609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   27.436721] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.436850] 
[   27.436924] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.437141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.437225] Hardware name: linux,dummy-virt (DT)
[   27.437318] Call trace:
[   27.437823]  show_stack+0x20/0x38 (C)
[   27.438003]  dump_stack_lvl+0x8c/0xd0
[   27.438312]  print_report+0x118/0x608
[   27.438754]  kasan_report+0xdc/0x128
[   27.439675]  kasan_check_range+0x100/0x1a8
[   27.439844]  __kasan_check_write+0x20/0x30
[   27.439996]  kasan_atomics_helper+0x126c/0x4858
[   27.440240]  kasan_atomics+0x198/0x2e0
[   27.440405]  kunit_try_run_case+0x170/0x3f0
[   27.440638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.440876]  kthread+0x328/0x630
[   27.441104]  ret_from_fork+0x10/0x20
[   27.441549] 
[   27.441632] Allocated by task 267:
[   27.441815]  kasan_save_stack+0x3c/0x68
[   27.442122]  kasan_save_track+0x20/0x40
[   27.442236]  kasan_save_alloc_info+0x40/0x58
[   27.442712]  __kasan_kmalloc+0xd4/0xd8
[   27.443034]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.443283]  kasan_atomics+0xb8/0x2e0
[   27.443657]  kunit_try_run_case+0x170/0x3f0
[   27.443783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.443956]  kthread+0x328/0x630
[   27.444067]  ret_from_fork+0x10/0x20
[   27.444330] 
[   27.444408] The buggy address belongs to the object at fff00000c7615800
[   27.444408]  which belongs to the cache kmalloc-64 of size 64
[   27.444550] The buggy address is located 0 bytes to the right of
[   27.444550]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.444752] 
[   27.444908] The buggy address belongs to the physical page:
[   27.445022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.445231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.445540] page_type: f5(slab)
[   27.445638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.445826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.446022] page dumped because: kasan: bad access detected
[   27.446117] 
[   27.446180] Memory state around the buggy address:
[   27.446272]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.446400]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.446820] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.447454]                                      ^
[   27.447702]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.447951]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.448090] ==================================================================
[   27.348841] ==================================================================
[   27.348963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   27.349066] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.349351] 
[   27.349420] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.349896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.349983] Hardware name: linux,dummy-virt (DT)
[   27.350063] Call trace:
[   27.350118]  show_stack+0x20/0x38 (C)
[   27.350246]  dump_stack_lvl+0x8c/0xd0
[   27.350543]  print_report+0x118/0x608
[   27.350975]  kasan_report+0xdc/0x128
[   27.351129]  kasan_check_range+0x100/0x1a8
[   27.351275]  __kasan_check_write+0x20/0x30
[   27.351406]  kasan_atomics_helper+0xf88/0x4858
[   27.351520]  kasan_atomics+0x198/0x2e0
[   27.351701]  kunit_try_run_case+0x170/0x3f0
[   27.351840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.352192]  kthread+0x328/0x630
[   27.352534]  ret_from_fork+0x10/0x20
[   27.352699] 
[   27.352762] Allocated by task 267:
[   27.352968]  kasan_save_stack+0x3c/0x68
[   27.353203]  kasan_save_track+0x20/0x40
[   27.353397]  kasan_save_alloc_info+0x40/0x58
[   27.353516]  __kasan_kmalloc+0xd4/0xd8
[   27.354043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.354153]  kasan_atomics+0xb8/0x2e0
[   27.354263]  kunit_try_run_case+0x170/0x3f0
[   27.354386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.354518]  kthread+0x328/0x630
[   27.354608]  ret_from_fork+0x10/0x20
[   27.354792] 
[   27.354849] The buggy address belongs to the object at fff00000c7615800
[   27.354849]  which belongs to the cache kmalloc-64 of size 64
[   27.355004] The buggy address is located 0 bytes to the right of
[   27.355004]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.355192] 
[   27.355246] The buggy address belongs to the physical page:
[   27.355384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.355512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.355738] page_type: f5(slab)
[   27.355882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.356032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.356140] page dumped because: kasan: bad access detected
[   27.356235] 
[   27.356292] Memory state around the buggy address:
[   27.356372]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.356553]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.356826] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.357007]                                      ^
[   27.357095]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.357374]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.357528] ==================================================================
[   27.422190] ==================================================================
[   27.422689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   27.422814] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.423018] 
[   27.423228] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.423493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.423875] Hardware name: linux,dummy-virt (DT)
[   27.423980] Call trace:
[   27.424063]  show_stack+0x20/0x38 (C)
[   27.424282]  dump_stack_lvl+0x8c/0xd0
[   27.424507]  print_report+0x118/0x608
[   27.424649]  kasan_report+0xdc/0x128
[   27.425208]  kasan_check_range+0x100/0x1a8
[   27.425351]  __kasan_check_write+0x20/0x30
[   27.425499]  kasan_atomics_helper+0x11f8/0x4858
[   27.425722]  kasan_atomics+0x198/0x2e0
[   27.425927]  kunit_try_run_case+0x170/0x3f0
[   27.426092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.426243]  kthread+0x328/0x630
[   27.426595]  ret_from_fork+0x10/0x20
[   27.426848] 
[   27.426979] Allocated by task 267:
[   27.427091]  kasan_save_stack+0x3c/0x68
[   27.427265]  kasan_save_track+0x20/0x40
[   27.427371]  kasan_save_alloc_info+0x40/0x58
[   27.427487]  __kasan_kmalloc+0xd4/0xd8
[   27.427956]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.428158]  kasan_atomics+0xb8/0x2e0
[   27.428359]  kunit_try_run_case+0x170/0x3f0
[   27.428593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.428782]  kthread+0x328/0x630
[   27.428879]  ret_from_fork+0x10/0x20
[   27.429004] 
[   27.429111] The buggy address belongs to the object at fff00000c7615800
[   27.429111]  which belongs to the cache kmalloc-64 of size 64
[   27.429264] The buggy address is located 0 bytes to the right of
[   27.429264]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.429426] 
[   27.429482] The buggy address belongs to the physical page:
[   27.429877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.430164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.430299] page_type: f5(slab)
[   27.430812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.431160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.431565] page dumped because: kasan: bad access detected
[   27.431840] 
[   27.432016] Memory state around the buggy address:
[   27.432220]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.432627]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.432746] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.432843]                                      ^
[   27.433218]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.433519]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.434221] ==================================================================
[   27.475987] ==================================================================
[   27.476097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   27.476440] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.476505] 
[   27.476544] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.476640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.476673] Hardware name: linux,dummy-virt (DT)
[   27.476714] Call trace:
[   27.476742]  show_stack+0x20/0x38 (C)
[   27.476805]  dump_stack_lvl+0x8c/0xd0
[   27.476866]  print_report+0x118/0x608
[   27.476923]  kasan_report+0xdc/0x128
[   27.477061]  __asan_report_load8_noabort+0x20/0x30
[   27.477219]  kasan_atomics_helper+0x3f04/0x4858
[   27.477421]  kasan_atomics+0x198/0x2e0
[   27.477621]  kunit_try_run_case+0x170/0x3f0
[   27.477757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.477893]  kthread+0x328/0x630
[   27.478029]  ret_from_fork+0x10/0x20
[   27.478151] 
[   27.478197] Allocated by task 267:
[   27.478829]  kasan_save_stack+0x3c/0x68
[   27.479008]  kasan_save_track+0x20/0x40
[   27.479120]  kasan_save_alloc_info+0x40/0x58
[   27.479228]  __kasan_kmalloc+0xd4/0xd8
[   27.479325]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.479423]  kasan_atomics+0xb8/0x2e0
[   27.480759]  kunit_try_run_case+0x170/0x3f0
[   27.481089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.481496]  kthread+0x328/0x630
[   27.481921]  ret_from_fork+0x10/0x20
[   27.482670] 
[   27.483043] The buggy address belongs to the object at fff00000c7615800
[   27.483043]  which belongs to the cache kmalloc-64 of size 64
[   27.483830] The buggy address is located 0 bytes to the right of
[   27.483830]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.484036] 
[   27.484111] The buggy address belongs to the physical page:
[   27.484190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.484396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.484805] page_type: f5(slab)
[   27.485185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.485319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.485423] page dumped because: kasan: bad access detected
[   27.486198] 
[   27.486661] Memory state around the buggy address:
[   27.488016]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.488082]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.488140] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.488192]                                      ^
[   27.488236]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.488290]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.488338] ==================================================================
[   27.358407] ==================================================================
[   27.358514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   27.358619] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.358738] 
[   27.358804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.359016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.359088] Hardware name: linux,dummy-virt (DT)
[   27.359173] Call trace:
[   27.359340]  show_stack+0x20/0x38 (C)
[   27.359697]  dump_stack_lvl+0x8c/0xd0
[   27.359821]  print_report+0x118/0x608
[   27.360013]  kasan_report+0xdc/0x128
[   27.360157]  kasan_check_range+0x100/0x1a8
[   27.360297]  __kasan_check_write+0x20/0x30
[   27.360443]  kasan_atomics_helper+0xff0/0x4858
[   27.360581]  kasan_atomics+0x198/0x2e0
[   27.360689]  kunit_try_run_case+0x170/0x3f0
[   27.360888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.361062]  kthread+0x328/0x630
[   27.361181]  ret_from_fork+0x10/0x20
[   27.361389] 
[   27.361499] Allocated by task 267:
[   27.361570]  kasan_save_stack+0x3c/0x68
[   27.361777]  kasan_save_track+0x20/0x40
[   27.361924]  kasan_save_alloc_info+0x40/0x58
[   27.362230]  __kasan_kmalloc+0xd4/0xd8
[   27.362371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.362573]  kasan_atomics+0xb8/0x2e0
[   27.362692]  kunit_try_run_case+0x170/0x3f0
[   27.362799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.362976]  kthread+0x328/0x630
[   27.363084]  ret_from_fork+0x10/0x20
[   27.363236] 
[   27.363297] The buggy address belongs to the object at fff00000c7615800
[   27.363297]  which belongs to the cache kmalloc-64 of size 64
[   27.363446] The buggy address is located 0 bytes to the right of
[   27.363446]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.363863] 
[   27.364028] The buggy address belongs to the physical page:
[   27.364139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.364325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.364447] page_type: f5(slab)
[   27.364620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.364844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.364970] page dumped because: kasan: bad access detected
[   27.365098] 
[   27.365151] Memory state around the buggy address:
[   27.365227]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.365460]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.365737] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.365865]                                      ^
[   27.366262]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.366389]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.366499] ==================================================================
[   27.630248] ==================================================================
[   27.630347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   27.630458] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.630579] 
[   27.630645] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.630831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.630900] Hardware name: linux,dummy-virt (DT)
[   27.630997] Call trace:
[   27.631052]  show_stack+0x20/0x38 (C)
[   27.631170]  dump_stack_lvl+0x8c/0xd0
[   27.631287]  print_report+0x118/0x608
[   27.631400]  kasan_report+0xdc/0x128
[   27.631552]  __asan_report_load8_noabort+0x20/0x30
[   27.631720]  kasan_atomics_helper+0x3e20/0x4858
[   27.631919]  kasan_atomics+0x198/0x2e0
[   27.632091]  kunit_try_run_case+0x170/0x3f0
[   27.632233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.632597]  kthread+0x328/0x630
[   27.632947]  ret_from_fork+0x10/0x20
[   27.633117] 
[   27.633261] Allocated by task 267:
[   27.633547]  kasan_save_stack+0x3c/0x68
[   27.633654]  kasan_save_track+0x20/0x40
[   27.634106]  kasan_save_alloc_info+0x40/0x58
[   27.634563]  __kasan_kmalloc+0xd4/0xd8
[   27.634686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.635221]  kasan_atomics+0xb8/0x2e0
[   27.635323]  kunit_try_run_case+0x170/0x3f0
[   27.635423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.635919]  kthread+0x328/0x630
[   27.636321]  ret_from_fork+0x10/0x20
[   27.636441] 
[   27.636499] The buggy address belongs to the object at fff00000c7615800
[   27.636499]  which belongs to the cache kmalloc-64 of size 64
[   27.637360] The buggy address is located 0 bytes to the right of
[   27.637360]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.637912] 
[   27.638634] The buggy address belongs to the physical page:
[   27.638802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.638970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.639291] page_type: f5(slab)
[   27.639385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.639510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.639700] page dumped because: kasan: bad access detected
[   27.639797] 
[   27.639858] Memory state around the buggy address:
[   27.640129]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.640257]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.640385] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.640634]                                      ^
[   27.640822]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.640951]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.641127] ==================================================================
[   27.620186] ==================================================================
[   27.620299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   27.620504] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.620775] 
[   27.620972] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.621256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.621325] Hardware name: linux,dummy-virt (DT)
[   27.621403] Call trace:
[   27.621458]  show_stack+0x20/0x38 (C)
[   27.621584]  dump_stack_lvl+0x8c/0xd0
[   27.621709]  print_report+0x118/0x608
[   27.621823]  kasan_report+0xdc/0x128
[   27.622168]  kasan_check_range+0x100/0x1a8
[   27.622375]  __kasan_check_write+0x20/0x30
[   27.622512]  kasan_atomics_helper+0x175c/0x4858
[   27.622637]  kasan_atomics+0x198/0x2e0
[   27.622746]  kunit_try_run_case+0x170/0x3f0
[   27.622869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.623027]  kthread+0x328/0x630
[   27.623144]  ret_from_fork+0x10/0x20
[   27.623264] 
[   27.623312] Allocated by task 267:
[   27.623381]  kasan_save_stack+0x3c/0x68
[   27.623472]  kasan_save_track+0x20/0x40
[   27.623580]  kasan_save_alloc_info+0x40/0x58
[   27.623689]  __kasan_kmalloc+0xd4/0xd8
[   27.623785]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.623888]  kasan_atomics+0xb8/0x2e0
[   27.624070]  kunit_try_run_case+0x170/0x3f0
[   27.624190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.624321]  kthread+0x328/0x630
[   27.624436]  ret_from_fork+0x10/0x20
[   27.624554] 
[   27.624614] The buggy address belongs to the object at fff00000c7615800
[   27.624614]  which belongs to the cache kmalloc-64 of size 64
[   27.625556] The buggy address is located 0 bytes to the right of
[   27.625556]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.625735] 
[   27.625804] The buggy address belongs to the physical page:
[   27.625893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.626053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.626187] page_type: f5(slab)
[   27.626374] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.626973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.627470] page dumped because: kasan: bad access detected
[   27.627594] 
[   27.627736] Memory state around the buggy address:
[   27.627885]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.628076]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.628198] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.628296]                                      ^
[   27.628387]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.628504]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.628602] ==================================================================
[   27.048066] ==================================================================
[   27.048152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   27.048398] 
[   27.049610]  kasan_atomics+0x198/0x2e0
[   27.050682]  kasan_save_alloc_info+0x40/0x58
[   27.050903]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.052648] 
[   27.052842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.054742]                                      ^
[   27.059109] Call trace:
[   27.059471]  show_stack+0x20/0x38 (C)
[   27.059741]  dump_stack_lvl+0x8c/0xd0
[   27.060123]  print_report+0x118/0x608
[   27.060412]  kasan_report+0xdc/0x128
[   27.060541]  kasan_check_range+0x100/0x1a8
[   27.060792]  __kasan_check_write+0x20/0x30
[   27.060945]  kasan_atomics_helper+0x934/0x4858
[   27.061085]  kasan_atomics+0x198/0x2e0
[   27.061203]  kunit_try_run_case+0x170/0x3f0
[   27.061332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.061492]  kthread+0x328/0x630
[   27.061687]  ret_from_fork+0x10/0x20
[   27.062231] 
[   27.062330] Allocated by task 267:
[   27.062408]  kasan_save_stack+0x3c/0x68
[   27.062511]  kasan_save_track+0x20/0x40
[   27.062603]  kasan_save_alloc_info+0x40/0x58
[   27.062703]  __kasan_kmalloc+0xd4/0xd8
[   27.062793]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.062900]  kasan_atomics+0xb8/0x2e0
[   27.063022]  kunit_try_run_case+0x170/0x3f0
[   27.063170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.063436]  kthread+0x328/0x630
[   27.063664]  ret_from_fork+0x10/0x20
[   27.063825] 
[   27.063881] The buggy address belongs to the object at fff00000c7615800
[   27.063881]  which belongs to the cache kmalloc-64 of size 64
[   27.064873] The buggy address is located 0 bytes to the right of
[   27.064873]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.065248] 
[   27.065369] The buggy address belongs to the physical page:
[   27.065445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.065570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.065698] page_type: f5(slab)
[   27.065799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.065918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.066039] page dumped because: kasan: bad access detected
[   27.066124] 
[   27.066173] Memory state around the buggy address:
[   27.066770]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.067267]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.067646] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.067868]                                      ^
[   27.068117]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.068570]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.068674] ==================================================================
[   27.488653] ==================================================================
[   27.488757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   27.488994] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.489130] 
[   27.489579] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.490513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.490589] Hardware name: linux,dummy-virt (DT)
[   27.490666] Call trace:
[   27.490727]  show_stack+0x20/0x38 (C)
[   27.491745]  dump_stack_lvl+0x8c/0xd0
[   27.491922]  print_report+0x118/0x608
[   27.492413]  kasan_report+0xdc/0x128
[   27.492541]  kasan_check_range+0x100/0x1a8
[   27.492671]  __kasan_check_write+0x20/0x30
[   27.492792]  kasan_atomics_helper+0x1414/0x4858
[   27.493839]  kasan_atomics+0x198/0x2e0
[   27.494439]  kunit_try_run_case+0x170/0x3f0
[   27.494614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.494986]  kthread+0x328/0x630
[   27.495139]  ret_from_fork+0x10/0x20
[   27.495385] 
[   27.495440] Allocated by task 267:
[   27.495530]  kasan_save_stack+0x3c/0x68
[   27.495711]  kasan_save_track+0x20/0x40
[   27.495823]  kasan_save_alloc_info+0x40/0x58
[   27.496085]  __kasan_kmalloc+0xd4/0xd8
[   27.496200]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.496474]  kasan_atomics+0xb8/0x2e0
[   27.496676]  kunit_try_run_case+0x170/0x3f0
[   27.497410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.497810]  kthread+0x328/0x630
[   27.498172]  ret_from_fork+0x10/0x20
[   27.498432] 
[   27.498487] The buggy address belongs to the object at fff00000c7615800
[   27.498487]  which belongs to the cache kmalloc-64 of size 64
[   27.499020] The buggy address is located 0 bytes to the right of
[   27.499020]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.499763] 
[   27.499850] The buggy address belongs to the physical page:
[   27.500031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.500348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.500512] page_type: f5(slab)
[   27.501155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.503037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.503160] page dumped because: kasan: bad access detected
[   27.503246] 
[   27.503773] Memory state around the buggy address:
[   27.504974]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.505111]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.505237] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.505345]                                      ^
[   27.505449]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.505602]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.505766] ==================================================================
[   27.574005] ==================================================================
[   27.574117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   27.574241] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.574428] 
[   27.574508] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.574723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.574826] Hardware name: linux,dummy-virt (DT)
[   27.574908] Call trace:
[   27.574987]  show_stack+0x20/0x38 (C)
[   27.575110]  dump_stack_lvl+0x8c/0xd0
[   27.575244]  print_report+0x118/0x608
[   27.575651]  kasan_report+0xdc/0x128
[   27.575981]  __asan_report_load8_noabort+0x20/0x30
[   27.576243]  kasan_atomics_helper+0x3df4/0x4858
[   27.576404]  kasan_atomics+0x198/0x2e0
[   27.576728]  kunit_try_run_case+0x170/0x3f0
[   27.576912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.577115]  kthread+0x328/0x630
[   27.577234]  ret_from_fork+0x10/0x20
[   27.577418] 
[   27.577559] Allocated by task 267:
[   27.577720]  kasan_save_stack+0x3c/0x68
[   27.577957]  kasan_save_track+0x20/0x40
[   27.578056]  kasan_save_alloc_info+0x40/0x58
[   27.578174]  __kasan_kmalloc+0xd4/0xd8
[   27.578422]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.578580]  kasan_atomics+0xb8/0x2e0
[   27.579028]  kunit_try_run_case+0x170/0x3f0
[   27.579145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.579320]  kthread+0x328/0x630
[   27.579633]  ret_from_fork+0x10/0x20
[   27.579790] 
[   27.579845] The buggy address belongs to the object at fff00000c7615800
[   27.579845]  which belongs to the cache kmalloc-64 of size 64
[   27.580008] The buggy address is located 0 bytes to the right of
[   27.580008]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.580250] 
[   27.580305] The buggy address belongs to the physical page:
[   27.580390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.580527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.580645] page_type: f5(slab)
[   27.580738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.580861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.580985] page dumped because: kasan: bad access detected
[   27.581110] 
[   27.581173] Memory state around the buggy address:
[   27.581331]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.581452]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.581605] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.582426]                                      ^
[   27.582533]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.583253]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.584263] ==================================================================
[   27.598057] ==================================================================
[   27.598156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   27.598278] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.598420] 
[   27.598919] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.599458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.599789] Hardware name: linux,dummy-virt (DT)
[   27.599956] Call trace:
[   27.600025]  show_stack+0x20/0x38 (C)
[   27.601249]  dump_stack_lvl+0x8c/0xd0
[   27.601581]  print_report+0x118/0x608
[   27.602034]  kasan_report+0xdc/0x128
[   27.602155]  __asan_report_load8_noabort+0x20/0x30
[   27.602286]  kasan_atomics_helper+0x3e10/0x4858
[   27.602433]  kasan_atomics+0x198/0x2e0
[   27.602546]  kunit_try_run_case+0x170/0x3f0
[   27.602913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.603830]  kthread+0x328/0x630
[   27.604357]  ret_from_fork+0x10/0x20
[   27.604490] 
[   27.604538] Allocated by task 267:
[   27.604609]  kasan_save_stack+0x3c/0x68
[   27.604702]  kasan_save_track+0x20/0x40
[   27.604795]  kasan_save_alloc_info+0x40/0x58
[   27.606616]  __kasan_kmalloc+0xd4/0xd8
[   27.607584]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.608112]  kasan_atomics+0xb8/0x2e0
[   27.608859]  kunit_try_run_case+0x170/0x3f0
[   27.609445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.609954]  kthread+0x328/0x630
[   27.610099]  ret_from_fork+0x10/0x20
[   27.610509] 
[   27.610835] The buggy address belongs to the object at fff00000c7615800
[   27.610835]  which belongs to the cache kmalloc-64 of size 64
[   27.611842] The buggy address is located 0 bytes to the right of
[   27.611842]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.612032] 
[   27.612092] The buggy address belongs to the physical page:
[   27.612166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.613461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.614692] page_type: f5(slab)
[   27.614845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.615567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.616245] page dumped because: kasan: bad access detected
[   27.617043] 
[   27.617139] Memory state around the buggy address:
[   27.617308]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.617454]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.617648] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.617766]                                      ^
[   27.617967]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.618280]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.618951] ==================================================================
[   27.261596] ==================================================================
[   27.261697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   27.261802] Read of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.261920] 
[   27.262008] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.262246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.262363] Hardware name: linux,dummy-virt (DT)
[   27.262481] Call trace:
[   27.262554]  show_stack+0x20/0x38 (C)
[   27.262670]  dump_stack_lvl+0x8c/0xd0
[   27.262808]  print_report+0x118/0x608
[   27.262958]  kasan_report+0xdc/0x128
[   27.263113]  __asan_report_load4_noabort+0x20/0x30
[   27.263387]  kasan_atomics_helper+0x3e04/0x4858
[   27.263652]  kasan_atomics+0x198/0x2e0
[   27.263860]  kunit_try_run_case+0x170/0x3f0
[   27.264165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.264359]  kthread+0x328/0x630
[   27.264693]  ret_from_fork+0x10/0x20
[   27.264843] 
[   27.264891] Allocated by task 267:
[   27.264984]  kasan_save_stack+0x3c/0x68
[   27.265131]  kasan_save_track+0x20/0x40
[   27.265228]  kasan_save_alloc_info+0x40/0x58
[   27.265380]  __kasan_kmalloc+0xd4/0xd8
[   27.265526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.265653]  kasan_atomics+0xb8/0x2e0
[   27.265761]  kunit_try_run_case+0x170/0x3f0
[   27.265862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.265991]  kthread+0x328/0x630
[   27.266081]  ret_from_fork+0x10/0x20
[   27.266237] 
[   27.266330] The buggy address belongs to the object at fff00000c7615800
[   27.266330]  which belongs to the cache kmalloc-64 of size 64
[   27.266472] The buggy address is located 0 bytes to the right of
[   27.266472]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.266702] 
[   27.266760] The buggy address belongs to the physical page:
[   27.266896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.267044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.267156] page_type: f5(slab)
[   27.267276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.267729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.267912] page dumped because: kasan: bad access detected
[   27.268345] 
[   27.268424] Memory state around the buggy address:
[   27.268873]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269361]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269993] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.270479]                                      ^
[   27.271030]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271142]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.272215] ==================================================================
[   27.543951] ==================================================================
[   27.544067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   27.544298] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.544430] 
[   27.544503] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.544710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.544792] Hardware name: linux,dummy-virt (DT)
[   27.545023] Call trace:
[   27.545245]  show_stack+0x20/0x38 (C)
[   27.545378]  dump_stack_lvl+0x8c/0xd0
[   27.545494]  print_report+0x118/0x608
[   27.545613]  kasan_report+0xdc/0x128
[   27.545800]  kasan_check_range+0x100/0x1a8
[   27.545927]  __kasan_check_write+0x20/0x30
[   27.546095]  kasan_atomics_helper+0x15b4/0x4858
[   27.546237]  kasan_atomics+0x198/0x2e0
[   27.546367]  kunit_try_run_case+0x170/0x3f0
[   27.546658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.546877]  kthread+0x328/0x630
[   27.547102]  ret_from_fork+0x10/0x20
[   27.547318] 
[   27.547445] Allocated by task 267:
[   27.547612]  kasan_save_stack+0x3c/0x68
[   27.548101]  kasan_save_track+0x20/0x40
[   27.548296]  kasan_save_alloc_info+0x40/0x58
[   27.548458]  __kasan_kmalloc+0xd4/0xd8
[   27.548639]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.548883]  kasan_atomics+0xb8/0x2e0
[   27.549068]  kunit_try_run_case+0x170/0x3f0
[   27.549481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.549886]  kthread+0x328/0x630
[   27.550015]  ret_from_fork+0x10/0x20
[   27.550212] 
[   27.550510] The buggy address belongs to the object at fff00000c7615800
[   27.550510]  which belongs to the cache kmalloc-64 of size 64
[   27.550706] The buggy address is located 0 bytes to the right of
[   27.550706]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.551040] 
[   27.551098] The buggy address belongs to the physical page:
[   27.551189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.551324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.551477] page_type: f5(slab)
[   27.551579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.551724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.552589] page dumped because: kasan: bad access detected
[   27.552683] 
[   27.552833] Memory state around the buggy address:
[   27.553226]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.553349]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.553947] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.554186]                                      ^
[   27.554285]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.554390]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.554490] ==================================================================
[   27.555839] ==================================================================
[   27.556100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   27.556219] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.556534] 
[   27.556723] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.556981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.557050] Hardware name: linux,dummy-virt (DT)
[   27.557128] Call trace:
[   27.557182]  show_stack+0x20/0x38 (C)
[   27.557307]  dump_stack_lvl+0x8c/0xd0
[   27.557436]  print_report+0x118/0x608
[   27.558039]  kasan_report+0xdc/0x128
[   27.558196]  __asan_report_load8_noabort+0x20/0x30
[   27.558327]  kasan_atomics_helper+0x3db0/0x4858
[   27.558397]  kasan_atomics+0x198/0x2e0
[   27.558454]  kunit_try_run_case+0x170/0x3f0
[   27.558519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.558591]  kthread+0x328/0x630
[   27.558650]  ret_from_fork+0x10/0x20
[   27.558712] 
[   27.558737] Allocated by task 267:
[   27.558774]  kasan_save_stack+0x3c/0x68
[   27.558825]  kasan_save_track+0x20/0x40
[   27.558874]  kasan_save_alloc_info+0x40/0x58
[   27.558923]  __kasan_kmalloc+0xd4/0xd8
[   27.559043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.559143]  kasan_atomics+0xb8/0x2e0
[   27.559232]  kunit_try_run_case+0x170/0x3f0
[   27.559325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.559434]  kthread+0x328/0x630
[   27.559522]  ret_from_fork+0x10/0x20
[   27.559646] 
[   27.559721] The buggy address belongs to the object at fff00000c7615800
[   27.559721]  which belongs to the cache kmalloc-64 of size 64
[   27.560012] The buggy address is located 0 bytes to the right of
[   27.560012]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.560187] 
[   27.560302] The buggy address belongs to the physical page:
[   27.560384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.560514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.560652] page_type: f5(slab)
[   27.560839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.561052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.561170] page dumped because: kasan: bad access detected
[   27.561320] 
[   27.561376] Memory state around the buggy address:
[   27.561466]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.561588]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.561706] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.561801]                                      ^
[   27.561881]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.562054]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.562166] ==================================================================
[   27.562663] ==================================================================
[   27.562768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   27.562872] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.563008] 
[   27.563074] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.563265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.563334] Hardware name: linux,dummy-virt (DT)
[   27.563407] Call trace:
[   27.563475]  show_stack+0x20/0x38 (C)
[   27.563597]  dump_stack_lvl+0x8c/0xd0
[   27.563729]  print_report+0x118/0x608
[   27.563844]  kasan_report+0xdc/0x128
[   27.564004]  kasan_check_range+0x100/0x1a8
[   27.564132]  __kasan_check_write+0x20/0x30
[   27.564249]  kasan_atomics_helper+0x1644/0x4858
[   27.564367]  kasan_atomics+0x198/0x2e0
[   27.564474]  kunit_try_run_case+0x170/0x3f0
[   27.564594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.564725]  kthread+0x328/0x630
[   27.564834]  ret_from_fork+0x10/0x20
[   27.566945] 
[   27.567049] Allocated by task 267:
[   27.567168]  kasan_save_stack+0x3c/0x68
[   27.567283]  kasan_save_track+0x20/0x40
[   27.567395]  kasan_save_alloc_info+0x40/0x58
[   27.567507]  __kasan_kmalloc+0xd4/0xd8
[   27.567616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.567778]  kasan_atomics+0xb8/0x2e0
[   27.567912]  kunit_try_run_case+0x170/0x3f0
[   27.568532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.568734]  kthread+0x328/0x630
[   27.568887]  ret_from_fork+0x10/0x20
[   27.569972] 
[   27.570297] The buggy address belongs to the object at fff00000c7615800
[   27.570297]  which belongs to the cache kmalloc-64 of size 64
[   27.570655] The buggy address is located 0 bytes to the right of
[   27.570655]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.571014] 
[   27.571079] The buggy address belongs to the physical page:
[   27.571160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.571331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.571462] page_type: f5(slab)
[   27.571610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.571773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.571888] page dumped because: kasan: bad access detected
[   27.572104] 
[   27.572244] Memory state around the buggy address:
[   27.572426]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.572587]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.572748] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.572877]                                      ^
[   27.572984]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.573240]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.573513] ==================================================================
[   27.407280] ==================================================================
[   27.407386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   27.407497] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.408126] 
[   27.408207] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.409019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.409233] Hardware name: linux,dummy-virt (DT)
[   27.409329] Call trace:
[   27.409523]  show_stack+0x20/0x38 (C)
[   27.409740]  dump_stack_lvl+0x8c/0xd0
[   27.409956]  print_report+0x118/0x608
[   27.410099]  kasan_report+0xdc/0x128
[   27.410524]  kasan_check_range+0x100/0x1a8
[   27.410822]  __kasan_check_write+0x20/0x30
[   27.411384]  kasan_atomics_helper+0x1190/0x4858
[   27.411651]  kasan_atomics+0x198/0x2e0
[   27.411954]  kunit_try_run_case+0x170/0x3f0
[   27.412084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.412219]  kthread+0x328/0x630
[   27.412335]  ret_from_fork+0x10/0x20
[   27.412465] 
[   27.412521] Allocated by task 267:
[   27.412589]  kasan_save_stack+0x3c/0x68
[   27.414857]  kasan_save_track+0x20/0x40
[   27.415136]  kasan_save_alloc_info+0x40/0x58
[   27.415270]  __kasan_kmalloc+0xd4/0xd8
[   27.415406]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.415650]  kasan_atomics+0xb8/0x2e0
[   27.415768]  kunit_try_run_case+0x170/0x3f0
[   27.415887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.416044]  kthread+0x328/0x630
[   27.416156]  ret_from_fork+0x10/0x20
[   27.416537] 
[   27.416898] The buggy address belongs to the object at fff00000c7615800
[   27.416898]  which belongs to the cache kmalloc-64 of size 64
[   27.417112] The buggy address is located 0 bytes to the right of
[   27.417112]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.417690] 
[   27.417776] The buggy address belongs to the physical page:
[   27.417896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.418055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.418191] page_type: f5(slab)
[   27.418302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.419170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.419520] page dumped because: kasan: bad access detected
[   27.420201] 
[   27.420293] Memory state around the buggy address:
[   27.420375]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.420611]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.420907] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.421082]                                      ^
[   27.421271]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.421445]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.421607] ==================================================================
[   27.239917] ==================================================================
[   27.240050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   27.240333] Read of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.240624] 
[   27.240696] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.240890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.241088] Hardware name: linux,dummy-virt (DT)
[   27.241176] Call trace:
[   27.241230]  show_stack+0x20/0x38 (C)
[   27.241348]  dump_stack_lvl+0x8c/0xd0
[   27.241465]  print_report+0x118/0x608
[   27.241576]  kasan_report+0xdc/0x128
[   27.241692]  __asan_report_load4_noabort+0x20/0x30
[   27.241813]  kasan_atomics_helper+0x3dd8/0x4858
[   27.241947]  kasan_atomics+0x198/0x2e0
[   27.242059]  kunit_try_run_case+0x170/0x3f0
[   27.242206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.242445]  kthread+0x328/0x630
[   27.242587]  ret_from_fork+0x10/0x20
[   27.242714] 
[   27.242772] Allocated by task 267:
[   27.242855]  kasan_save_stack+0x3c/0x68
[   27.243091]  kasan_save_track+0x20/0x40
[   27.243262]  kasan_save_alloc_info+0x40/0x58
[   27.243375]  __kasan_kmalloc+0xd4/0xd8
[   27.243470]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.243593]  kasan_atomics+0xb8/0x2e0
[   27.243714]  kunit_try_run_case+0x170/0x3f0
[   27.243875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.244039]  kthread+0x328/0x630
[   27.244132]  ret_from_fork+0x10/0x20
[   27.244225] 
[   27.244300] The buggy address belongs to the object at fff00000c7615800
[   27.244300]  which belongs to the cache kmalloc-64 of size 64
[   27.244533] The buggy address is located 0 bytes to the right of
[   27.244533]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.244870] 
[   27.244951] The buggy address belongs to the physical page:
[   27.245439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.245579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.246587] page_type: f5(slab)
[   27.247415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.248170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.248560] page dumped because: kasan: bad access detected
[   27.248648] 
[   27.249340] Memory state around the buggy address:
[   27.249431]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.249544]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.249649] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.249743]                                      ^
[   27.250824]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.250977]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.251500] ==================================================================
[   27.389317] ==================================================================
[   27.389435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   27.389743] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.389878] 
[   27.390027] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.390295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.390751] Hardware name: linux,dummy-virt (DT)
[   27.390834] Call trace:
[   27.390896]  show_stack+0x20/0x38 (C)
[   27.391111]  dump_stack_lvl+0x8c/0xd0
[   27.391243]  print_report+0x118/0x608
[   27.392019]  kasan_report+0xdc/0x128
[   27.392243]  kasan_check_range+0x100/0x1a8
[   27.392463]  __kasan_check_write+0x20/0x30
[   27.392595]  kasan_atomics_helper+0x1128/0x4858
[   27.392731]  kasan_atomics+0x198/0x2e0
[   27.393319]  kunit_try_run_case+0x170/0x3f0
[   27.393878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.394128]  kthread+0x328/0x630
[   27.394382]  ret_from_fork+0x10/0x20
[   27.394644] 
[   27.394737] Allocated by task 267:
[   27.395012]  kasan_save_stack+0x3c/0x68
[   27.395118]  kasan_save_track+0x20/0x40
[   27.395736]  kasan_save_alloc_info+0x40/0x58
[   27.396441]  __kasan_kmalloc+0xd4/0xd8
[   27.396558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.397056]  kasan_atomics+0xb8/0x2e0
[   27.397178]  kunit_try_run_case+0x170/0x3f0
[   27.398370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.398869]  kthread+0x328/0x630
[   27.399737]  ret_from_fork+0x10/0x20
[   27.399861] 
[   27.400368] The buggy address belongs to the object at fff00000c7615800
[   27.400368]  which belongs to the cache kmalloc-64 of size 64
[   27.400676] The buggy address is located 0 bytes to the right of
[   27.400676]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.400834] 
[   27.401434] The buggy address belongs to the physical page:
[   27.401607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.401857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.402545] page_type: f5(slab)
[   27.402986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.403122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.403246] page dumped because: kasan: bad access detected
[   27.403439] 
[   27.403510] Memory state around the buggy address:
[   27.404230]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.404482]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.404619] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.405135]                                      ^
[   27.405426]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.405896]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.406189] ==================================================================
[   27.464311] ==================================================================
[   27.464418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   27.464558] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.464870] 
[   27.465139] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.465408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.465600] Hardware name: linux,dummy-virt (DT)
[   27.465803] Call trace:
[   27.466195]  show_stack+0x20/0x38 (C)
[   27.466342]  dump_stack_lvl+0x8c/0xd0
[   27.467145]  print_report+0x118/0x608
[   27.467316]  kasan_report+0xdc/0x128
[   27.467436]  kasan_check_range+0x100/0x1a8
[   27.467647]  __kasan_check_write+0x20/0x30
[   27.467847]  kasan_atomics_helper+0x1384/0x4858
[   27.468227]  kasan_atomics+0x198/0x2e0
[   27.468554]  kunit_try_run_case+0x170/0x3f0
[   27.468837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.468994]  kthread+0x328/0x630
[   27.469299]  ret_from_fork+0x10/0x20
[   27.469634] 
[   27.469696] Allocated by task 267:
[   27.469809]  kasan_save_stack+0x3c/0x68
[   27.470110]  kasan_save_track+0x20/0x40
[   27.470219]  kasan_save_alloc_info+0x40/0x58
[   27.470377]  __kasan_kmalloc+0xd4/0xd8
[   27.470479]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.470780]  kasan_atomics+0xb8/0x2e0
[   27.470913]  kunit_try_run_case+0x170/0x3f0
[   27.471181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.471302]  kthread+0x328/0x630
[   27.471394]  ret_from_fork+0x10/0x20
[   27.471516] 
[   27.471648] The buggy address belongs to the object at fff00000c7615800
[   27.471648]  which belongs to the cache kmalloc-64 of size 64
[   27.471818] The buggy address is located 0 bytes to the right of
[   27.471818]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.472068] 
[   27.472514] The buggy address belongs to the physical page:
[   27.472651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.473163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.473382] page_type: f5(slab)
[   27.473554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.473701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.473994] page dumped because: kasan: bad access detected
[   27.474110] 
[   27.474162] Memory state around the buggy address:
[   27.474295]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.474453]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.474569] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.474667]                                      ^
[   27.474774]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.474895]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.475098] ==================================================================
[   27.274362] ==================================================================
[   27.274695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   27.275053] Read of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.275195] 
[   27.275267] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.275969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.276073] Hardware name: linux,dummy-virt (DT)
[   27.276186] Call trace:
[   27.276856]  show_stack+0x20/0x38 (C)
[   27.277018]  dump_stack_lvl+0x8c/0xd0
[   27.277142]  print_report+0x118/0x608
[   27.277252]  kasan_report+0xdc/0x128
[   27.277372]  kasan_check_range+0x100/0x1a8
[   27.277503]  __kasan_check_read+0x20/0x30
[   27.278204]  kasan_atomics_helper+0xdd4/0x4858
[   27.278826]  kasan_atomics+0x198/0x2e0
[   27.279163]  kunit_try_run_case+0x170/0x3f0
[   27.279488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.279689]  kthread+0x328/0x630
[   27.280099]  ret_from_fork+0x10/0x20
[   27.280267] 
[   27.280320] Allocated by task 267:
[   27.280436]  kasan_save_stack+0x3c/0x68
[   27.280809]  kasan_save_track+0x20/0x40
[   27.281118]  kasan_save_alloc_info+0x40/0x58
[   27.281227]  __kasan_kmalloc+0xd4/0xd8
[   27.281321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.281427]  kasan_atomics+0xb8/0x2e0
[   27.282392]  kunit_try_run_case+0x170/0x3f0
[   27.282966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.283096]  kthread+0x328/0x630
[   27.283187]  ret_from_fork+0x10/0x20
[   27.283282] 
[   27.283648] The buggy address belongs to the object at fff00000c7615800
[   27.283648]  which belongs to the cache kmalloc-64 of size 64
[   27.284570] The buggy address is located 0 bytes to the right of
[   27.284570]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.285287] 
[   27.285379] The buggy address belongs to the physical page:
[   27.285464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.285914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.286381] page_type: f5(slab)
[   27.287069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.287330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.287561] page dumped because: kasan: bad access detected
[   27.288258] 
[   27.288346] Memory state around the buggy address:
[   27.288432]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288541]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.288647] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.288744]                                      ^
[   27.288823]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289715]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.289966] ==================================================================
[   27.115091] ==================================================================
[   27.115198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   27.115308] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.116994] 
[   27.117087] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.117284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.117356] Hardware name: linux,dummy-virt (DT)
[   27.119272] Call trace:
[   27.119652]  show_stack+0x20/0x38 (C)
[   27.119996]  dump_stack_lvl+0x8c/0xd0
[   27.121013]  print_report+0x118/0x608
[   27.121156]  kasan_report+0xdc/0x128
[   27.121298]  kasan_check_range+0x100/0x1a8
[   27.122084]  __kasan_check_write+0x20/0x30
[   27.122238]  kasan_atomics_helper+0xa6c/0x4858
[   27.122494]  kasan_atomics+0x198/0x2e0
[   27.122591]  kunit_try_run_case+0x170/0x3f0
[   27.122657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.122845]  kthread+0x328/0x630
[   27.123065]  ret_from_fork+0x10/0x20
[   27.123731]  kasan_save_track+0x20/0x40
[   27.123895]  kasan_save_alloc_info+0x40/0x58
[   27.124031]  __kasan_kmalloc+0xd4/0xd8
[   27.124128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.124242]  kasan_atomics+0xb8/0x2e0
[   27.124404]  kunit_try_run_case+0x170/0x3f0
[   27.124568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.124701]  kthread+0x328/0x630
[   27.125144] The buggy address belongs to the object at fff00000c7615800
[   27.125144]  which belongs to the cache kmalloc-64 of size 64
[   27.125621] 
[   27.125884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.126181] page_type: f5(slab)
[   27.126770] page dumped because: kasan: bad access detected
[   27.127419] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.129898] ==================================================================
[   27.367037] ==================================================================
[   27.367148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   27.367251] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.367581] 
[   27.367654] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.367915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.368001] Hardware name: linux,dummy-virt (DT)
[   27.368083] Call trace:
[   27.368144]  show_stack+0x20/0x38 (C)
[   27.368270]  dump_stack_lvl+0x8c/0xd0
[   27.368444]  print_report+0x118/0x608
[   27.368637]  kasan_report+0xdc/0x128
[   27.368790]  kasan_check_range+0x100/0x1a8
[   27.369132]  __kasan_check_write+0x20/0x30
[   27.369258]  kasan_atomics_helper+0x1058/0x4858
[   27.369388]  kasan_atomics+0x198/0x2e0
[   27.369691]  kunit_try_run_case+0x170/0x3f0
[   27.369821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.369977]  kthread+0x328/0x630
[   27.370157]  ret_from_fork+0x10/0x20
[   27.370371] 
[   27.370463] Allocated by task 267:
[   27.370538]  kasan_save_stack+0x3c/0x68
[   27.370638]  kasan_save_track+0x20/0x40
[   27.370750]  kasan_save_alloc_info+0x40/0x58
[   27.370861]  __kasan_kmalloc+0xd4/0xd8
[   27.370985]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.371125]  kasan_atomics+0xb8/0x2e0
[   27.371257]  kunit_try_run_case+0x170/0x3f0
[   27.371416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.371677]  kthread+0x328/0x630
[   27.371807]  ret_from_fork+0x10/0x20
[   27.371928] 
[   27.372397] The buggy address belongs to the object at fff00000c7615800
[   27.372397]  which belongs to the cache kmalloc-64 of size 64
[   27.372581] The buggy address is located 0 bytes to the right of
[   27.372581]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.372881] 
[   27.372968] The buggy address belongs to the physical page:
[   27.373158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.373496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.373618] page_type: f5(slab)
[   27.374280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.374765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.374876] page dumped because: kasan: bad access detected
[   27.375031] 
[   27.375109] Memory state around the buggy address:
[   27.375235]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.375491]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.375648] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.375760]                                      ^
[   27.375909]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.376068]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.376230] ==================================================================
[   27.376670] ==================================================================
[   27.376894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   27.377150] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.377271] 
[   27.377335] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.377536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.377718] Hardware name: linux,dummy-virt (DT)
[   27.377950] Call trace:
[   27.378086]  show_stack+0x20/0x38 (C)
[   27.378467]  dump_stack_lvl+0x8c/0xd0
[   27.378790]  print_report+0x118/0x608
[   27.379180]  kasan_report+0xdc/0x128
[   27.379428]  kasan_check_range+0x100/0x1a8
[   27.379665]  __kasan_check_write+0x20/0x30
[   27.379902]  kasan_atomics_helper+0x10c0/0x4858
[   27.380034]  kasan_atomics+0x198/0x2e0
[   27.380288]  kunit_try_run_case+0x170/0x3f0
[   27.380475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.380661]  kthread+0x328/0x630
[   27.380994]  ret_from_fork+0x10/0x20
[   27.381148] 
[   27.381204] Allocated by task 267:
[   27.381315]  kasan_save_stack+0x3c/0x68
[   27.381419]  kasan_save_track+0x20/0x40
[   27.381567]  kasan_save_alloc_info+0x40/0x58
[   27.381710]  __kasan_kmalloc+0xd4/0xd8
[   27.382130]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.382261]  kasan_atomics+0xb8/0x2e0
[   27.382395]  kunit_try_run_case+0x170/0x3f0
[   27.382510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.382615]  kthread+0x328/0x630
[   27.383001]  ret_from_fork+0x10/0x20
[   27.383227] 
[   27.383289] The buggy address belongs to the object at fff00000c7615800
[   27.383289]  which belongs to the cache kmalloc-64 of size 64
[   27.383441] The buggy address is located 0 bytes to the right of
[   27.383441]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.384186] 
[   27.384323] The buggy address belongs to the physical page:
[   27.384514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.384680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.385142] page_type: f5(slab)
[   27.385285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.385451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.385559] page dumped because: kasan: bad access detected
[   27.385699] 
[   27.385755] Memory state around the buggy address:
[   27.385886]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.386030]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.386163] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.386270]                                      ^
[   27.386368]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386475]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.386569] ==================================================================
[   27.332071] ==================================================================
[   27.332353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   27.332645] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.332773] 
[   27.332838] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.333046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.333113] Hardware name: linux,dummy-virt (DT)
[   27.333197] Call trace:
[   27.333257]  show_stack+0x20/0x38 (C)
[   27.333377]  dump_stack_lvl+0x8c/0xd0
[   27.333503]  print_report+0x118/0x608
[   27.333841]  kasan_report+0xdc/0x128
[   27.334075]  kasan_check_range+0x100/0x1a8
[   27.334224]  __kasan_check_write+0x20/0x30
[   27.334372]  kasan_atomics_helper+0xeb8/0x4858
[   27.334719]  kasan_atomics+0x198/0x2e0
[   27.334841]  kunit_try_run_case+0x170/0x3f0
[   27.334975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.335110]  kthread+0x328/0x630
[   27.335223]  ret_from_fork+0x10/0x20
[   27.335343] 
[   27.335393] Allocated by task 267:
[   27.335470]  kasan_save_stack+0x3c/0x68
[   27.335711]  kasan_save_track+0x20/0x40
[   27.335829]  kasan_save_alloc_info+0x40/0x58
[   27.336288]  __kasan_kmalloc+0xd4/0xd8
[   27.336408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.336534]  kasan_atomics+0xb8/0x2e0
[   27.336644]  kunit_try_run_case+0x170/0x3f0
[   27.336739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.336997]  kthread+0x328/0x630
[   27.337184]  ret_from_fork+0x10/0x20
[   27.337633] 
[   27.337699] The buggy address belongs to the object at fff00000c7615800
[   27.337699]  which belongs to the cache kmalloc-64 of size 64
[   27.337848] The buggy address is located 0 bytes to the right of
[   27.337848]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.338116] 
[   27.338181] The buggy address belongs to the physical page:
[   27.338256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.338461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.338582] page_type: f5(slab)
[   27.338676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.338800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.338899] page dumped because: kasan: bad access detected
[   27.338997] 
[   27.339049] Memory state around the buggy address:
[   27.339128]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.339231]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.339337] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.339430]                                      ^
[   27.339548]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.339891]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.340007] ==================================================================
[   26.991255] ==================================================================
[   26.991359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   26.991479] Write of size 4 at addr fff00000c7615830 by task kunit_try_catch/267
[   26.992348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.993641]  kasan_check_range+0x100/0x1a8
[   26.993916]  kasan_atomics_helper+0x6ec/0x4858
[   26.994359]  kunit_try_run_case+0x170/0x3f0
[   26.996267]  kasan_save_stack+0x3c/0x68
[   27.000873] The buggy address belongs to the object at fff00000c7615800
[   27.000873]  which belongs to the cache kmalloc-64 of size 64
[   27.003185] 
[   27.004312]                                      ^
[   27.007409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   27.012764] 
[   27.015148] The buggy address is located 0 bytes to the right of
[   27.015148]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.016887] 
[   27.018549] ==================================================================
[   27.641680] ==================================================================
[   27.641855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   27.642021] Write of size 8 at addr fff00000c7615830 by task kunit_try_catch/267
[   27.642177] 
[   27.642243] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.642616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.642743] Hardware name: linux,dummy-virt (DT)
[   27.642818] Call trace:
[   27.642881]  show_stack+0x20/0x38 (C)
[   27.643239]  dump_stack_lvl+0x8c/0xd0
[   27.643606]  print_report+0x118/0x608
[   27.643802]  kasan_report+0xdc/0x128
[   27.643985]  kasan_check_range+0x100/0x1a8
[   27.644130]  __kasan_check_write+0x20/0x30
[   27.644378]  kasan_atomics_helper+0x17ec/0x4858
[   27.644540]  kasan_atomics+0x198/0x2e0
[   27.644682]  kunit_try_run_case+0x170/0x3f0
[   27.644894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.645089]  kthread+0x328/0x630
[   27.645217]  ret_from_fork+0x10/0x20
[   27.645394] 
[   27.645451] Allocated by task 267:
[   27.645527]  kasan_save_stack+0x3c/0x68
[   27.645628]  kasan_save_track+0x20/0x40
[   27.645719]  kasan_save_alloc_info+0x40/0x58
[   27.645818]  __kasan_kmalloc+0xd4/0xd8
[   27.645926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.646123]  kasan_atomics+0xb8/0x2e0
[   27.646267]  kunit_try_run_case+0x170/0x3f0
[   27.646441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.646648]  kthread+0x328/0x630
[   27.646831]  ret_from_fork+0x10/0x20
[   27.646952] 
[   27.647014] The buggy address belongs to the object at fff00000c7615800
[   27.647014]  which belongs to the cache kmalloc-64 of size 64
[   27.647166] The buggy address is located 0 bytes to the right of
[   27.647166]  allocated 48-byte region [fff00000c7615800, fff00000c7615830)
[   27.647370] 
[   27.647437] The buggy address belongs to the physical page:
[   27.647525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107615
[   27.647794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.648005] page_type: f5(slab)
[   27.648115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.648299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.648477] page dumped because: kasan: bad access detected
[   27.648560] 
[   27.648611] Memory state around the buggy address:
[   27.648752]  fff00000c7615700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.649031]  fff00000c7615780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.649177] >fff00000c7615800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.649282]                                      ^
[   27.649453]  fff00000c7615880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.649765]  fff00000c7615900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.650258] ==================================================================

[   14.345304] ==================================================================
[   14.345756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.346311] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.346817] 
[   14.346944] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.346994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.347007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.347029] Call Trace:
[   14.347047]  <TASK>
[   14.347065]  dump_stack_lvl+0x73/0xb0
[   14.347092]  print_report+0xd1/0x650
[   14.347117]  ? __virt_addr_valid+0x1db/0x2d0
[   14.347140]  ? kasan_atomics_helper+0xc70/0x5450
[   14.347173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.347198]  ? kasan_atomics_helper+0xc70/0x5450
[   14.347221]  kasan_report+0x141/0x180
[   14.347246]  ? kasan_atomics_helper+0xc70/0x5450
[   14.347274]  kasan_check_range+0x10c/0x1c0
[   14.347301]  __kasan_check_write+0x18/0x20
[   14.347335]  kasan_atomics_helper+0xc70/0x5450
[   14.347360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.347383]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.347407]  ? kasan_atomics+0x152/0x310
[   14.347432]  kasan_atomics+0x1dc/0x310
[   14.347453]  ? __pfx_kasan_atomics+0x10/0x10
[   14.347475]  ? __pfx_read_tsc+0x10/0x10
[   14.347496]  ? ktime_get_ts64+0x86/0x230
[   14.347523]  kunit_try_run_case+0x1a5/0x480
[   14.347548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.347570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.347594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.347619]  ? __kthread_parkme+0x82/0x180
[   14.347641]  ? preempt_count_sub+0x50/0x80
[   14.347668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.347693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.347716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.347740]  kthread+0x337/0x6f0
[   14.347761]  ? trace_preempt_on+0x20/0xc0
[   14.347786]  ? __pfx_kthread+0x10/0x10
[   14.347809]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.347832]  ? calculate_sigpending+0x7b/0xa0
[   14.347854]  ? __pfx_kthread+0x10/0x10
[   14.347878]  ret_from_fork+0x41/0x80
[   14.347900]  ? __pfx_kthread+0x10/0x10
[   14.347923]  ret_from_fork_asm+0x1a/0x30
[   14.347957]  </TASK>
[   14.347968] 
[   14.355460] Allocated by task 285:
[   14.355639]  kasan_save_stack+0x45/0x70
[   14.355848]  kasan_save_track+0x18/0x40
[   14.356025]  kasan_save_alloc_info+0x3b/0x50
[   14.356249]  __kasan_kmalloc+0xb7/0xc0
[   14.356420]  __kmalloc_cache_noprof+0x189/0x420
[   14.356642]  kasan_atomics+0x95/0x310
[   14.356813]  kunit_try_run_case+0x1a5/0x480
[   14.356994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.357224]  kthread+0x337/0x6f0
[   14.357370]  ret_from_fork+0x41/0x80
[   14.357555]  ret_from_fork_asm+0x1a/0x30
[   14.357741] 
[   14.357816] The buggy address belongs to the object at ffff888102b4cd00
[   14.357816]  which belongs to the cache kmalloc-64 of size 64
[   14.358256] The buggy address is located 0 bytes to the right of
[   14.358256]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.358626] 
[   14.358699] The buggy address belongs to the physical page:
[   14.359224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.359584] flags: 0x200000000000000(node=0|zone=2)
[   14.359760] page_type: f5(slab)
[   14.359881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.360111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.360468] page dumped because: kasan: bad access detected
[   14.360724] 
[   14.360818] Memory state around the buggy address:
[   14.361053]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361428]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361647] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.361956]                                      ^
[   14.362222]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362546]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362835] ==================================================================
[   14.153954] ==================================================================
[   14.154540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.154858] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.155131] 
[   14.155295] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.155355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.155368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.155390] Call Trace:
[   14.155407]  <TASK>
[   14.155425]  dump_stack_lvl+0x73/0xb0
[   14.155450]  print_report+0xd1/0x650
[   14.155474]  ? __virt_addr_valid+0x1db/0x2d0
[   14.155497]  ? kasan_atomics_helper+0x697/0x5450
[   14.155542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.155567]  ? kasan_atomics_helper+0x697/0x5450
[   14.155590]  kasan_report+0x141/0x180
[   14.155614]  ? kasan_atomics_helper+0x697/0x5450
[   14.155642]  kasan_check_range+0x10c/0x1c0
[   14.155668]  __kasan_check_write+0x18/0x20
[   14.155689]  kasan_atomics_helper+0x697/0x5450
[   14.155713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.155737]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.155761]  ? kasan_atomics+0x152/0x310
[   14.155786]  kasan_atomics+0x1dc/0x310
[   14.155807]  ? __pfx_kasan_atomics+0x10/0x10
[   14.155829]  ? __pfx_read_tsc+0x10/0x10
[   14.155850]  ? ktime_get_ts64+0x86/0x230
[   14.155877]  kunit_try_run_case+0x1a5/0x480
[   14.155902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.155950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.155975]  ? __kthread_parkme+0x82/0x180
[   14.155998]  ? preempt_count_sub+0x50/0x80
[   14.156024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.156107]  kthread+0x337/0x6f0
[   14.156521]  ? trace_preempt_on+0x20/0xc0
[   14.156554]  ? __pfx_kthread+0x10/0x10
[   14.156578]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.156603]  ? calculate_sigpending+0x7b/0xa0
[   14.156625]  ? __pfx_kthread+0x10/0x10
[   14.156648]  ret_from_fork+0x41/0x80
[   14.156671]  ? __pfx_kthread+0x10/0x10
[   14.156694]  ret_from_fork_asm+0x1a/0x30
[   14.156727]  </TASK>
[   14.156739] 
[   14.171907] Allocated by task 285:
[   14.172050]  kasan_save_stack+0x45/0x70
[   14.172207]  kasan_save_track+0x18/0x40
[   14.172354]  kasan_save_alloc_info+0x3b/0x50
[   14.172500]  __kasan_kmalloc+0xb7/0xc0
[   14.172634]  __kmalloc_cache_noprof+0x189/0x420
[   14.172786]  kasan_atomics+0x95/0x310
[   14.172916]  kunit_try_run_case+0x1a5/0x480
[   14.173063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173244]  kthread+0x337/0x6f0
[   14.173425]  ret_from_fork+0x41/0x80
[   14.173611]  ret_from_fork_asm+0x1a/0x30
[   14.173823] 
[   14.173921] The buggy address belongs to the object at ffff888102b4cd00
[   14.173921]  which belongs to the cache kmalloc-64 of size 64
[   14.174486] The buggy address is located 0 bytes to the right of
[   14.174486]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.175039] 
[   14.175167] The buggy address belongs to the physical page:
[   14.175441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.175795] flags: 0x200000000000000(node=0|zone=2)
[   14.176035] page_type: f5(slab)
[   14.176234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.176590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.176927] page dumped because: kasan: bad access detected
[   14.177210] 
[   14.177304] Memory state around the buggy address:
[   14.177502]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.177716]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.177935] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.178173]                                      ^
[   14.178403]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.178734]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179053] ==================================================================
[   13.977350] ==================================================================
[   13.977983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.978494] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   13.979033] 
[   13.979305] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.979366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.979378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.979397] Call Trace:
[   13.979411]  <TASK>
[   13.979428]  dump_stack_lvl+0x73/0xb0
[   13.979453]  print_report+0xd1/0x650
[   13.979476]  ? __virt_addr_valid+0x1db/0x2d0
[   13.979496]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.979518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.979540]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.979563]  kasan_report+0x141/0x180
[   13.979585]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.979612]  __asan_report_load4_noabort+0x18/0x20
[   13.979633]  kasan_atomics_helper+0x4b88/0x5450
[   13.979656]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.979678]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.979700]  ? kasan_atomics+0x152/0x310
[   13.979723]  kasan_atomics+0x1dc/0x310
[   13.979742]  ? __pfx_kasan_atomics+0x10/0x10
[   13.979763]  ? __pfx_read_tsc+0x10/0x10
[   13.979781]  ? ktime_get_ts64+0x86/0x230
[   13.979806]  kunit_try_run_case+0x1a5/0x480
[   13.979830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.979852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.979875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.979899]  ? __kthread_parkme+0x82/0x180
[   13.979920]  ? preempt_count_sub+0x50/0x80
[   13.979945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.979968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.979992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.980015]  kthread+0x337/0x6f0
[   13.980036]  ? trace_preempt_on+0x20/0xc0
[   13.980188]  ? __pfx_kthread+0x10/0x10
[   13.980212]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.980252]  ? calculate_sigpending+0x7b/0xa0
[   13.980275]  ? __pfx_kthread+0x10/0x10
[   13.980299]  ret_from_fork+0x41/0x80
[   13.980333]  ? __pfx_kthread+0x10/0x10
[   13.980357]  ret_from_fork_asm+0x1a/0x30
[   13.980390]  </TASK>
[   13.980402] 
[   13.991033] Allocated by task 285:
[   13.991537]  kasan_save_stack+0x45/0x70
[   13.991728]  kasan_save_track+0x18/0x40
[   13.992070]  kasan_save_alloc_info+0x3b/0x50
[   13.992389]  __kasan_kmalloc+0xb7/0xc0
[   13.992671]  __kmalloc_cache_noprof+0x189/0x420
[   13.992881]  kasan_atomics+0x95/0x310
[   13.993046]  kunit_try_run_case+0x1a5/0x480
[   13.993431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.993777]  kthread+0x337/0x6f0
[   13.994053]  ret_from_fork+0x41/0x80
[   13.994336]  ret_from_fork_asm+0x1a/0x30
[   13.994525] 
[   13.994600] The buggy address belongs to the object at ffff888102b4cd00
[   13.994600]  which belongs to the cache kmalloc-64 of size 64
[   13.995116] The buggy address is located 0 bytes to the right of
[   13.995116]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   13.995950] 
[   13.996156] The buggy address belongs to the physical page:
[   13.996521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   13.996956] flags: 0x200000000000000(node=0|zone=2)
[   13.997389] page_type: f5(slab)
[   13.997642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.997981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.998469] page dumped because: kasan: bad access detected
[   13.998819] 
[   13.998896] Memory state around the buggy address:
[   13.999266]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.999719]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.000137] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.000541]                                      ^
[   14.000843]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.001298]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.001712] ==================================================================
[   14.363253] ==================================================================
[   14.363879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.364312] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.364618] 
[   14.364704] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.364748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.364761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.364782] Call Trace:
[   14.364798]  <TASK>
[   14.364813]  dump_stack_lvl+0x73/0xb0
[   14.364838]  print_report+0xd1/0x650
[   14.364862]  ? __virt_addr_valid+0x1db/0x2d0
[   14.364884]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.364907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.364930]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.364954]  kasan_report+0x141/0x180
[   14.364977]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.365006]  __asan_report_load4_noabort+0x18/0x20
[   14.365028]  kasan_atomics_helper+0x4a84/0x5450
[   14.365052]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.365076]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.365099]  ? kasan_atomics+0x152/0x310
[   14.365123]  kasan_atomics+0x1dc/0x310
[   14.365144]  ? __pfx_kasan_atomics+0x10/0x10
[   14.365166]  ? __pfx_read_tsc+0x10/0x10
[   14.365186]  ? ktime_get_ts64+0x86/0x230
[   14.365212]  kunit_try_run_case+0x1a5/0x480
[   14.365237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.365285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.365310]  ? __kthread_parkme+0x82/0x180
[   14.365343]  ? preempt_count_sub+0x50/0x80
[   14.365369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.365417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.365440]  kthread+0x337/0x6f0
[   14.365462]  ? trace_preempt_on+0x20/0xc0
[   14.365497]  ? __pfx_kthread+0x10/0x10
[   14.365520]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.365543]  ? calculate_sigpending+0x7b/0xa0
[   14.365565]  ? __pfx_kthread+0x10/0x10
[   14.365588]  ret_from_fork+0x41/0x80
[   14.365609]  ? __pfx_kthread+0x10/0x10
[   14.365632]  ret_from_fork_asm+0x1a/0x30
[   14.365665]  </TASK>
[   14.365677] 
[   14.372878] Allocated by task 285:
[   14.373057]  kasan_save_stack+0x45/0x70
[   14.373293]  kasan_save_track+0x18/0x40
[   14.373437]  kasan_save_alloc_info+0x3b/0x50
[   14.373583]  __kasan_kmalloc+0xb7/0xc0
[   14.373715]  __kmalloc_cache_noprof+0x189/0x420
[   14.373872]  kasan_atomics+0x95/0x310
[   14.374001]  kunit_try_run_case+0x1a5/0x480
[   14.374252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.374514]  kthread+0x337/0x6f0
[   14.374682]  ret_from_fork+0x41/0x80
[   14.374864]  ret_from_fork_asm+0x1a/0x30
[   14.375057] 
[   14.375169] The buggy address belongs to the object at ffff888102b4cd00
[   14.375169]  which belongs to the cache kmalloc-64 of size 64
[   14.375681] The buggy address is located 0 bytes to the right of
[   14.375681]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.376043] 
[   14.376115] The buggy address belongs to the physical page:
[   14.376384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.376737] flags: 0x200000000000000(node=0|zone=2)
[   14.376975] page_type: f5(slab)
[   14.377156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.377476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.377747] page dumped because: kasan: bad access detected
[   14.377920] 
[   14.377989] Memory state around the buggy address:
[   14.378299]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.378633]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.378961] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.379274]                                      ^
[   14.379489]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.379750]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.380068] ==================================================================
[   14.866341] ==================================================================
[   14.866717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.867291] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.867560] 
[   14.867646] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.867691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.867704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.867726] Call Trace:
[   14.867742]  <TASK>
[   14.867780]  dump_stack_lvl+0x73/0xb0
[   14.867806]  print_report+0xd1/0x650
[   14.867830]  ? __virt_addr_valid+0x1db/0x2d0
[   14.867869]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.867892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.867932]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.867956]  kasan_report+0x141/0x180
[   14.867980]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.868036]  kasan_check_range+0x10c/0x1c0
[   14.868075]  __kasan_check_write+0x18/0x20
[   14.868096]  kasan_atomics_helper+0x18b1/0x5450
[   14.868143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.868168]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.868191]  ? kasan_atomics+0x152/0x310
[   14.868216]  kasan_atomics+0x1dc/0x310
[   14.868236]  ? __pfx_kasan_atomics+0x10/0x10
[   14.868259]  ? __pfx_read_tsc+0x10/0x10
[   14.868280]  ? ktime_get_ts64+0x86/0x230
[   14.868306]  kunit_try_run_case+0x1a5/0x480
[   14.868339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.868361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.868386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.868412]  ? __kthread_parkme+0x82/0x180
[   14.868434]  ? preempt_count_sub+0x50/0x80
[   14.868460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.868484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.868507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.868531]  kthread+0x337/0x6f0
[   14.868573]  ? trace_preempt_on+0x20/0xc0
[   14.868597]  ? __pfx_kthread+0x10/0x10
[   14.868633]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.868669]  ? calculate_sigpending+0x7b/0xa0
[   14.868706]  ? __pfx_kthread+0x10/0x10
[   14.868730]  ret_from_fork+0x41/0x80
[   14.868763]  ? __pfx_kthread+0x10/0x10
[   14.868787]  ret_from_fork_asm+0x1a/0x30
[   14.868834]  </TASK>
[   14.868846] 
[   14.876575] Allocated by task 285:
[   14.876771]  kasan_save_stack+0x45/0x70
[   14.876990]  kasan_save_track+0x18/0x40
[   14.877201]  kasan_save_alloc_info+0x3b/0x50
[   14.877421]  __kasan_kmalloc+0xb7/0xc0
[   14.877664]  __kmalloc_cache_noprof+0x189/0x420
[   14.877933]  kasan_atomics+0x95/0x310
[   14.878138]  kunit_try_run_case+0x1a5/0x480
[   14.878353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.878603]  kthread+0x337/0x6f0
[   14.878752]  ret_from_fork+0x41/0x80
[   14.878883]  ret_from_fork_asm+0x1a/0x30
[   14.879022] 
[   14.879093] The buggy address belongs to the object at ffff888102b4cd00
[   14.879093]  which belongs to the cache kmalloc-64 of size 64
[   14.879630] The buggy address is located 0 bytes to the right of
[   14.879630]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.880239] 
[   14.880361] The buggy address belongs to the physical page:
[   14.880636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.880921] flags: 0x200000000000000(node=0|zone=2)
[   14.881167] page_type: f5(slab)
[   14.881359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.881702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.882026] page dumped because: kasan: bad access detected
[   14.882295] 
[   14.882403] Memory state around the buggy address:
[   14.882632]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.882969]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.883393] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.883709]                                      ^
[   14.883929]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884267]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.884532] ==================================================================
[   15.199528] ==================================================================
[   15.199869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.200124] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.201109] 
[   15.202577] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.202629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.202643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.202665] Call Trace:
[   15.202684]  <TASK>
[   15.202702]  dump_stack_lvl+0x73/0xb0
[   15.202731]  print_report+0xd1/0x650
[   15.202756]  ? __virt_addr_valid+0x1db/0x2d0
[   15.202778]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.202802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.202826]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.202850]  kasan_report+0x141/0x180
[   15.202874]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.202903]  __asan_report_load8_noabort+0x18/0x20
[   15.202924]  kasan_atomics_helper+0x4fb2/0x5450
[   15.202948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.202972]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.202995]  ? kasan_atomics+0x152/0x310
[   15.203019]  kasan_atomics+0x1dc/0x310
[   15.203039]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203060]  ? __pfx_read_tsc+0x10/0x10
[   15.203081]  ? ktime_get_ts64+0x86/0x230
[   15.203107]  kunit_try_run_case+0x1a5/0x480
[   15.203462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203549]  ? __kthread_parkme+0x82/0x180
[   15.203572]  ? preempt_count_sub+0x50/0x80
[   15.203599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203671]  kthread+0x337/0x6f0
[   15.203693]  ? trace_preempt_on+0x20/0xc0
[   15.203717]  ? __pfx_kthread+0x10/0x10
[   15.203740]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.203763]  ? calculate_sigpending+0x7b/0xa0
[   15.203786]  ? __pfx_kthread+0x10/0x10
[   15.203810]  ret_from_fork+0x41/0x80
[   15.203831]  ? __pfx_kthread+0x10/0x10
[   15.203855]  ret_from_fork_asm+0x1a/0x30
[   15.203887]  </TASK>
[   15.203900] 
[   15.220347] Allocated by task 285:
[   15.220517]  kasan_save_stack+0x45/0x70
[   15.220704]  kasan_save_track+0x18/0x40
[   15.220870]  kasan_save_alloc_info+0x3b/0x50
[   15.221053]  __kasan_kmalloc+0xb7/0xc0
[   15.221919]  __kmalloc_cache_noprof+0x189/0x420
[   15.222758]  kasan_atomics+0x95/0x310
[   15.222975]  kunit_try_run_case+0x1a5/0x480
[   15.223429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.223649]  kthread+0x337/0x6f0
[   15.223801]  ret_from_fork+0x41/0x80
[   15.223964]  ret_from_fork_asm+0x1a/0x30
[   15.224782] 
[   15.224910] The buggy address belongs to the object at ffff888102b4cd00
[   15.224910]  which belongs to the cache kmalloc-64 of size 64
[   15.226383] The buggy address is located 0 bytes to the right of
[   15.226383]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.226899] 
[   15.226990] The buggy address belongs to the physical page:
[   15.227457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.227952] flags: 0x200000000000000(node=0|zone=2)
[   15.228379] page_type: f5(slab)
[   15.228671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.228983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.229667] page dumped because: kasan: bad access detected
[   15.229943] 
[   15.230165] Memory state around the buggy address:
[   15.230653]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.231157]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.231464] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.231742]                                      ^
[   15.231952]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.232644]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233137] ==================================================================
[   15.261807] ==================================================================
[   15.262165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.262506] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.262788] 
[   15.263022] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.263145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.263161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.263440] Call Trace:
[   15.263472]  <TASK>
[   15.263489]  dump_stack_lvl+0x73/0xb0
[   15.263515]  print_report+0xd1/0x650
[   15.263540]  ? __virt_addr_valid+0x1db/0x2d0
[   15.263563]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.263585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.263609]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.263631]  kasan_report+0x141/0x180
[   15.263655]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.263684]  __asan_report_load8_noabort+0x18/0x20
[   15.263706]  kasan_atomics_helper+0x4fa5/0x5450
[   15.263731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.263754]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.263777]  ? kasan_atomics+0x152/0x310
[   15.263802]  kasan_atomics+0x1dc/0x310
[   15.263823]  ? __pfx_kasan_atomics+0x10/0x10
[   15.263845]  ? __pfx_read_tsc+0x10/0x10
[   15.263865]  ? ktime_get_ts64+0x86/0x230
[   15.263891]  kunit_try_run_case+0x1a5/0x480
[   15.263916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.263940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.263965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.263991]  ? __kthread_parkme+0x82/0x180
[   15.264013]  ? preempt_count_sub+0x50/0x80
[   15.264039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.264064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.264087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.264111]  kthread+0x337/0x6f0
[   15.264411]  ? trace_preempt_on+0x20/0xc0
[   15.264441]  ? __pfx_kthread+0x10/0x10
[   15.264465]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.264488]  ? calculate_sigpending+0x7b/0xa0
[   15.264511]  ? __pfx_kthread+0x10/0x10
[   15.264535]  ret_from_fork+0x41/0x80
[   15.264556]  ? __pfx_kthread+0x10/0x10
[   15.264579]  ret_from_fork_asm+0x1a/0x30
[   15.264611]  </TASK>
[   15.264623] 
[   15.275232] Allocated by task 285:
[   15.275497]  kasan_save_stack+0x45/0x70
[   15.275912]  kasan_save_track+0x18/0x40
[   15.276104]  kasan_save_alloc_info+0x3b/0x50
[   15.276284]  __kasan_kmalloc+0xb7/0xc0
[   15.276594]  __kmalloc_cache_noprof+0x189/0x420
[   15.277033]  kasan_atomics+0x95/0x310
[   15.277349]  kunit_try_run_case+0x1a5/0x480
[   15.277649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.277994]  kthread+0x337/0x6f0
[   15.278316]  ret_from_fork+0x41/0x80
[   15.278608]  ret_from_fork_asm+0x1a/0x30
[   15.278896] 
[   15.279026] The buggy address belongs to the object at ffff888102b4cd00
[   15.279026]  which belongs to the cache kmalloc-64 of size 64
[   15.279742] The buggy address is located 0 bytes to the right of
[   15.279742]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.280446] 
[   15.280541] The buggy address belongs to the physical page:
[   15.280862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.281458] flags: 0x200000000000000(node=0|zone=2)
[   15.281682] page_type: f5(slab)
[   15.281942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.282343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.282669] page dumped because: kasan: bad access detected
[   15.283030] 
[   15.283240] Memory state around the buggy address:
[   15.283547]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.283954]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.284317] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.284740]                                      ^
[   15.285042]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.285450]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.285854] ==================================================================
[   13.924366] ==================================================================
[   13.925667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.926050] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   13.926643] 
[   13.926819] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.926868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.926882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.926904] Call Trace:
[   13.926916]  <TASK>
[   13.926932]  dump_stack_lvl+0x73/0xb0
[   13.926960]  print_report+0xd1/0x650
[   13.926983]  ? __virt_addr_valid+0x1db/0x2d0
[   13.927007]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.927029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.927051]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.927074]  kasan_report+0x141/0x180
[   13.927100]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.927150]  __asan_report_load4_noabort+0x18/0x20
[   13.927171]  kasan_atomics_helper+0x4bbc/0x5450
[   13.927195]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.927216]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.927238]  ? kasan_atomics+0x152/0x310
[   13.927261]  kasan_atomics+0x1dc/0x310
[   13.927280]  ? __pfx_kasan_atomics+0x10/0x10
[   13.927301]  ? __pfx_read_tsc+0x10/0x10
[   13.927320]  ? ktime_get_ts64+0x86/0x230
[   13.927359]  kunit_try_run_case+0x1a5/0x480
[   13.927384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.927405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.927431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.927454]  ? __kthread_parkme+0x82/0x180
[   13.927477]  ? preempt_count_sub+0x50/0x80
[   13.927506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.927531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.927553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.927576]  kthread+0x337/0x6f0
[   13.927598]  ? trace_preempt_on+0x20/0xc0
[   13.927624]  ? __pfx_kthread+0x10/0x10
[   13.927646]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.927668]  ? calculate_sigpending+0x7b/0xa0
[   13.927691]  ? __pfx_kthread+0x10/0x10
[   13.927713]  ret_from_fork+0x41/0x80
[   13.927734]  ? __pfx_kthread+0x10/0x10
[   13.927755]  ret_from_fork_asm+0x1a/0x30
[   13.927789]  </TASK>
[   13.927800] 
[   13.938976] Allocated by task 285:
[   13.939307]  kasan_save_stack+0x45/0x70
[   13.939663]  kasan_save_track+0x18/0x40
[   13.940008]  kasan_save_alloc_info+0x3b/0x50
[   13.940424]  __kasan_kmalloc+0xb7/0xc0
[   13.940772]  __kmalloc_cache_noprof+0x189/0x420
[   13.941186]  kasan_atomics+0x95/0x310
[   13.941537]  kunit_try_run_case+0x1a5/0x480
[   13.941907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.942395]  kthread+0x337/0x6f0
[   13.942695]  ret_from_fork+0x41/0x80
[   13.942883]  ret_from_fork_asm+0x1a/0x30
[   13.943023] 
[   13.943094] The buggy address belongs to the object at ffff888102b4cd00
[   13.943094]  which belongs to the cache kmalloc-64 of size 64
[   13.944140] The buggy address is located 0 bytes to the right of
[   13.944140]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   13.944919] 
[   13.944992] The buggy address belongs to the physical page:
[   13.945279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   13.945944] flags: 0x200000000000000(node=0|zone=2)
[   13.946417] page_type: f5(slab)
[   13.946709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.947144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.947769] page dumped because: kasan: bad access detected
[   13.947937] 
[   13.948004] Memory state around the buggy address:
[   13.948242]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948839]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.949473] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.950064]                                      ^
[   13.950279]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950500]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950709] ==================================================================
[   15.123854] ==================================================================
[   15.124152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.124497] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.124851] 
[   15.124961] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.125003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.125016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.125037] Call Trace:
[   15.125051]  <TASK>
[   15.125065]  dump_stack_lvl+0x73/0xb0
[   15.125088]  print_report+0xd1/0x650
[   15.125110]  ? __virt_addr_valid+0x1db/0x2d0
[   15.125167]  ? kasan_atomics_helper+0x2006/0x5450
[   15.125191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.125215]  ? kasan_atomics_helper+0x2006/0x5450
[   15.125238]  kasan_report+0x141/0x180
[   15.125262]  ? kasan_atomics_helper+0x2006/0x5450
[   15.125291]  kasan_check_range+0x10c/0x1c0
[   15.125316]  __kasan_check_write+0x18/0x20
[   15.125349]  kasan_atomics_helper+0x2006/0x5450
[   15.125374]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.125398]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.125421]  ? kasan_atomics+0x152/0x310
[   15.125445]  kasan_atomics+0x1dc/0x310
[   15.125466]  ? __pfx_kasan_atomics+0x10/0x10
[   15.125489]  ? __pfx_read_tsc+0x10/0x10
[   15.125509]  ? ktime_get_ts64+0x86/0x230
[   15.125536]  kunit_try_run_case+0x1a5/0x480
[   15.125560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.125608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.125651]  ? __kthread_parkme+0x82/0x180
[   15.125674]  ? preempt_count_sub+0x50/0x80
[   15.125700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.125748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.125776]  kthread+0x337/0x6f0
[   15.125797]  ? trace_preempt_on+0x20/0xc0
[   15.125821]  ? __pfx_kthread+0x10/0x10
[   15.125845]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.125867]  ? calculate_sigpending+0x7b/0xa0
[   15.125890]  ? __pfx_kthread+0x10/0x10
[   15.125913]  ret_from_fork+0x41/0x80
[   15.125935]  ? __pfx_kthread+0x10/0x10
[   15.125960]  ret_from_fork_asm+0x1a/0x30
[   15.125992]  </TASK>
[   15.126004] 
[   15.133389] Allocated by task 285:
[   15.133516]  kasan_save_stack+0x45/0x70
[   15.133700]  kasan_save_track+0x18/0x40
[   15.133920]  kasan_save_alloc_info+0x3b/0x50
[   15.134136]  __kasan_kmalloc+0xb7/0xc0
[   15.134335]  __kmalloc_cache_noprof+0x189/0x420
[   15.134572]  kasan_atomics+0x95/0x310
[   15.134724]  kunit_try_run_case+0x1a5/0x480
[   15.134949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.135123]  kthread+0x337/0x6f0
[   15.135245]  ret_from_fork+0x41/0x80
[   15.135386]  ret_from_fork_asm+0x1a/0x30
[   15.135582] 
[   15.135703] The buggy address belongs to the object at ffff888102b4cd00
[   15.135703]  which belongs to the cache kmalloc-64 of size 64
[   15.136228] The buggy address is located 0 bytes to the right of
[   15.136228]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.136895] 
[   15.136967] The buggy address belongs to the physical page:
[   15.137335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.137682] flags: 0x200000000000000(node=0|zone=2)
[   15.137920] page_type: f5(slab)
[   15.138098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.138374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.138627] page dumped because: kasan: bad access detected
[   15.138876] 
[   15.138968] Memory state around the buggy address:
[   15.139204]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.139569]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.139783] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.140066]                                      ^
[   15.140489]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.140826]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141078] ==================================================================
[   14.197617] ==================================================================
[   14.197975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.198347] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.198693] 
[   14.198794] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.198839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.198852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.198874] Call Trace:
[   14.198889]  <TASK>
[   14.198904]  dump_stack_lvl+0x73/0xb0
[   14.198928]  print_report+0xd1/0x650
[   14.198952]  ? __virt_addr_valid+0x1db/0x2d0
[   14.198975]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.198997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.199021]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.199044]  kasan_report+0x141/0x180
[   14.199068]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.199096]  kasan_check_range+0x10c/0x1c0
[   14.199143]  __kasan_check_write+0x18/0x20
[   14.199165]  kasan_atomics_helper+0x7c7/0x5450
[   14.199190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.199214]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.199237]  ? kasan_atomics+0x152/0x310
[   14.199261]  kasan_atomics+0x1dc/0x310
[   14.199282]  ? __pfx_kasan_atomics+0x10/0x10
[   14.199304]  ? __pfx_read_tsc+0x10/0x10
[   14.199333]  ? ktime_get_ts64+0x86/0x230
[   14.199360]  kunit_try_run_case+0x1a5/0x480
[   14.199384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.199407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.199432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.199458]  ? __kthread_parkme+0x82/0x180
[   14.199481]  ? preempt_count_sub+0x50/0x80
[   14.199507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.199531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.199555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.199579]  kthread+0x337/0x6f0
[   14.199602]  ? trace_preempt_on+0x20/0xc0
[   14.199627]  ? __pfx_kthread+0x10/0x10
[   14.199650]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.199673]  ? calculate_sigpending+0x7b/0xa0
[   14.199695]  ? __pfx_kthread+0x10/0x10
[   14.199719]  ret_from_fork+0x41/0x80
[   14.199741]  ? __pfx_kthread+0x10/0x10
[   14.199764]  ret_from_fork_asm+0x1a/0x30
[   14.199796]  </TASK>
[   14.199808] 
[   14.206927] Allocated by task 285:
[   14.207054]  kasan_save_stack+0x45/0x70
[   14.207222]  kasan_save_track+0x18/0x40
[   14.207384]  kasan_save_alloc_info+0x3b/0x50
[   14.207589]  __kasan_kmalloc+0xb7/0xc0
[   14.207778]  __kmalloc_cache_noprof+0x189/0x420
[   14.207997]  kasan_atomics+0x95/0x310
[   14.208207]  kunit_try_run_case+0x1a5/0x480
[   14.208422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.208673]  kthread+0x337/0x6f0
[   14.208795]  ret_from_fork+0x41/0x80
[   14.208924]  ret_from_fork_asm+0x1a/0x30
[   14.209062] 
[   14.209166] The buggy address belongs to the object at ffff888102b4cd00
[   14.209166]  which belongs to the cache kmalloc-64 of size 64
[   14.209689] The buggy address is located 0 bytes to the right of
[   14.209689]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.210234] 
[   14.210306] The buggy address belongs to the physical page:
[   14.210520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.210871] flags: 0x200000000000000(node=0|zone=2)
[   14.211089] page_type: f5(slab)
[   14.211251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.211550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.211857] page dumped because: kasan: bad access detected
[   14.212077] 
[   14.212196] Memory state around the buggy address:
[   14.212361]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.212577]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.212792] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.213106]                                      ^
[   14.213354]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.213675]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214003] ==================================================================
[   14.966296] ==================================================================
[   14.966768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.967118] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.967815] 
[   14.968064] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.968244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.968260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.968281] Call Trace:
[   14.968298]  <TASK>
[   14.968313]  dump_stack_lvl+0x73/0xb0
[   14.968348]  print_report+0xd1/0x650
[   14.968372]  ? __virt_addr_valid+0x1db/0x2d0
[   14.968394]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.968417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.968441]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.968464]  kasan_report+0x141/0x180
[   14.968487]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.968515]  kasan_check_range+0x10c/0x1c0
[   14.968540]  __kasan_check_write+0x18/0x20
[   14.968561]  kasan_atomics_helper+0x1c18/0x5450
[   14.968586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.968609]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.968633]  ? kasan_atomics+0x152/0x310
[   14.968658]  kasan_atomics+0x1dc/0x310
[   14.968678]  ? __pfx_kasan_atomics+0x10/0x10
[   14.968700]  ? __pfx_read_tsc+0x10/0x10
[   14.968721]  ? ktime_get_ts64+0x86/0x230
[   14.968747]  kunit_try_run_case+0x1a5/0x480
[   14.968771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.968793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.968817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.968842]  ? __kthread_parkme+0x82/0x180
[   14.968864]  ? preempt_count_sub+0x50/0x80
[   14.968890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.968914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.968937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.968962]  kthread+0x337/0x6f0
[   14.968983]  ? trace_preempt_on+0x20/0xc0
[   14.969006]  ? __pfx_kthread+0x10/0x10
[   14.969029]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.969051]  ? calculate_sigpending+0x7b/0xa0
[   14.969073]  ? __pfx_kthread+0x10/0x10
[   14.969096]  ret_from_fork+0x41/0x80
[   14.969118]  ? __pfx_kthread+0x10/0x10
[   14.969149]  ret_from_fork_asm+0x1a/0x30
[   14.969181]  </TASK>
[   14.969193] 
[   14.978891] Allocated by task 285:
[   14.979097]  kasan_save_stack+0x45/0x70
[   14.979349]  kasan_save_track+0x18/0x40
[   14.979543]  kasan_save_alloc_info+0x3b/0x50
[   14.979753]  __kasan_kmalloc+0xb7/0xc0
[   14.979950]  __kmalloc_cache_noprof+0x189/0x420
[   14.980177]  kasan_atomics+0x95/0x310
[   14.980404]  kunit_try_run_case+0x1a5/0x480
[   14.980636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980903]  kthread+0x337/0x6f0
[   14.981063]  ret_from_fork+0x41/0x80
[   14.981390]  ret_from_fork_asm+0x1a/0x30
[   14.981595] 
[   14.981707] The buggy address belongs to the object at ffff888102b4cd00
[   14.981707]  which belongs to the cache kmalloc-64 of size 64
[   14.982291] The buggy address is located 0 bytes to the right of
[   14.982291]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.982826] 
[   14.982940] The buggy address belongs to the physical page:
[   14.983164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.983512] flags: 0x200000000000000(node=0|zone=2)
[   14.983773] page_type: f5(slab)
[   14.983977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.984351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.984735] page dumped because: kasan: bad access detected
[   14.984965] 
[   14.985072] Memory state around the buggy address:
[   14.985380]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.985706]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.986038] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.986404]                                      ^
[   14.986670]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987050]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987418] ==================================================================
[   15.088668] ==================================================================
[   15.089006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.089498] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.089792] 
[   15.089903] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.089947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.089960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.089981] Call Trace:
[   15.089996]  <TASK>
[   15.090011]  dump_stack_lvl+0x73/0xb0
[   15.090036]  print_report+0xd1/0x650
[   15.090060]  ? __virt_addr_valid+0x1db/0x2d0
[   15.090082]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.090105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.090128]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.090153]  kasan_report+0x141/0x180
[   15.090177]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.090205]  kasan_check_range+0x10c/0x1c0
[   15.090231]  __kasan_check_write+0x18/0x20
[   15.090252]  kasan_atomics_helper+0x1f43/0x5450
[   15.090279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.090305]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.090340]  ? kasan_atomics+0x152/0x310
[   15.090365]  kasan_atomics+0x1dc/0x310
[   15.090386]  ? __pfx_kasan_atomics+0x10/0x10
[   15.090409]  ? __pfx_read_tsc+0x10/0x10
[   15.090429]  ? ktime_get_ts64+0x86/0x230
[   15.090457]  kunit_try_run_case+0x1a5/0x480
[   15.090483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.090531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.090557]  ? __kthread_parkme+0x82/0x180
[   15.090581]  ? preempt_count_sub+0x50/0x80
[   15.090619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.090693]  kthread+0x337/0x6f0
[   15.090714]  ? trace_preempt_on+0x20/0xc0
[   15.090740]  ? __pfx_kthread+0x10/0x10
[   15.090763]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.090786]  ? calculate_sigpending+0x7b/0xa0
[   15.090809]  ? __pfx_kthread+0x10/0x10
[   15.090832]  ret_from_fork+0x41/0x80
[   15.090855]  ? __pfx_kthread+0x10/0x10
[   15.090878]  ret_from_fork_asm+0x1a/0x30
[   15.090910]  </TASK>
[   15.090922] 
[   15.098269] Allocated by task 285:
[   15.098446]  kasan_save_stack+0x45/0x70
[   15.098633]  kasan_save_track+0x18/0x40
[   15.098806]  kasan_save_alloc_info+0x3b/0x50
[   15.098950]  __kasan_kmalloc+0xb7/0xc0
[   15.099084]  __kmalloc_cache_noprof+0x189/0x420
[   15.099524]  kasan_atomics+0x95/0x310
[   15.099712]  kunit_try_run_case+0x1a5/0x480
[   15.099923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.100163]  kthread+0x337/0x6f0
[   15.100301]  ret_from_fork+0x41/0x80
[   15.100472]  ret_from_fork_asm+0x1a/0x30
[   15.100653] 
[   15.100751] The buggy address belongs to the object at ffff888102b4cd00
[   15.100751]  which belongs to the cache kmalloc-64 of size 64
[   15.101239] The buggy address is located 0 bytes to the right of
[   15.101239]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.101725] 
[   15.101828] The buggy address belongs to the physical page:
[   15.102065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.102409] flags: 0x200000000000000(node=0|zone=2)
[   15.102620] page_type: f5(slab)
[   15.102764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.103065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.103401] page dumped because: kasan: bad access detected
[   15.103566] 
[   15.103634] Memory state around the buggy address:
[   15.103780]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.103986]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.104225] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.104532]                                      ^
[   15.104798]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105106]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105406] ==================================================================
[   14.567592] ==================================================================
[   14.567930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.568290] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.568632] 
[   14.568742] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.568786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.568799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.568820] Call Trace:
[   14.568838]  <TASK>
[   14.568855]  dump_stack_lvl+0x73/0xb0
[   14.568880]  print_report+0xd1/0x650
[   14.568903]  ? __virt_addr_valid+0x1db/0x2d0
[   14.568926]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.568948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.568972]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.568996]  kasan_report+0x141/0x180
[   14.569020]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.569048]  __asan_report_load4_noabort+0x18/0x20
[   14.569072]  kasan_atomics_helper+0x4a02/0x5450
[   14.569098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.569143]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.569170]  ? kasan_atomics+0x152/0x310
[   14.569194]  kasan_atomics+0x1dc/0x310
[   14.569215]  ? __pfx_kasan_atomics+0x10/0x10
[   14.569236]  ? __pfx_read_tsc+0x10/0x10
[   14.569257]  ? ktime_get_ts64+0x86/0x230
[   14.569283]  kunit_try_run_case+0x1a5/0x480
[   14.569308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.569373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.569398]  ? __kthread_parkme+0x82/0x180
[   14.569433]  ? preempt_count_sub+0x50/0x80
[   14.569458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.569530]  kthread+0x337/0x6f0
[   14.569551]  ? trace_preempt_on+0x20/0xc0
[   14.569577]  ? __pfx_kthread+0x10/0x10
[   14.569600]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.569623]  ? calculate_sigpending+0x7b/0xa0
[   14.569645]  ? __pfx_kthread+0x10/0x10
[   14.569669]  ret_from_fork+0x41/0x80
[   14.569690]  ? __pfx_kthread+0x10/0x10
[   14.569713]  ret_from_fork_asm+0x1a/0x30
[   14.569746]  </TASK>
[   14.569757] 
[   14.576944] Allocated by task 285:
[   14.577137]  kasan_save_stack+0x45/0x70
[   14.577305]  kasan_save_track+0x18/0x40
[   14.577492]  kasan_save_alloc_info+0x3b/0x50
[   14.577723]  __kasan_kmalloc+0xb7/0xc0
[   14.577901]  __kmalloc_cache_noprof+0x189/0x420
[   14.578129]  kasan_atomics+0x95/0x310
[   14.578306]  kunit_try_run_case+0x1a5/0x480
[   14.578527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578702]  kthread+0x337/0x6f0
[   14.578831]  ret_from_fork+0x41/0x80
[   14.579034]  ret_from_fork_asm+0x1a/0x30
[   14.579252] 
[   14.579365] The buggy address belongs to the object at ffff888102b4cd00
[   14.579365]  which belongs to the cache kmalloc-64 of size 64
[   14.579826] The buggy address is located 0 bytes to the right of
[   14.579826]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.580389] 
[   14.580485] The buggy address belongs to the physical page:
[   14.580736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.581099] flags: 0x200000000000000(node=0|zone=2)
[   14.581397] page_type: f5(slab)
[   14.581619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.582016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.582424] page dumped because: kasan: bad access detected
[   14.582764] 
[   14.582889] Memory state around the buggy address:
[   14.583152]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583527]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583849] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.584194]                                      ^
[   14.584426]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.584736]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.585030] ==================================================================
[   14.987948] ==================================================================
[   14.988884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.989451] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.989691] 
[   14.989784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.989830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.989843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.989865] Call Trace:
[   14.989922]  <TASK>
[   14.989962]  dump_stack_lvl+0x73/0xb0
[   14.989990]  print_report+0xd1/0x650
[   14.990041]  ? __virt_addr_valid+0x1db/0x2d0
[   14.990065]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.990087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.990112]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.990146]  kasan_report+0x141/0x180
[   14.990170]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.990228]  __asan_report_load8_noabort+0x18/0x20
[   14.990250]  kasan_atomics_helper+0x4f30/0x5450
[   14.990275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.990299]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.990333]  ? kasan_atomics+0x152/0x310
[   14.990359]  kasan_atomics+0x1dc/0x310
[   14.990379]  ? __pfx_kasan_atomics+0x10/0x10
[   14.990401]  ? __pfx_read_tsc+0x10/0x10
[   14.990421]  ? ktime_get_ts64+0x86/0x230
[   14.990448]  kunit_try_run_case+0x1a5/0x480
[   14.990504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.990528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.990553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.990577]  ? __kthread_parkme+0x82/0x180
[   14.990600]  ? preempt_count_sub+0x50/0x80
[   14.990627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.990650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.990705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.990729]  kthread+0x337/0x6f0
[   14.990752]  ? trace_preempt_on+0x20/0xc0
[   14.990776]  ? __pfx_kthread+0x10/0x10
[   14.990828]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.990851]  ? calculate_sigpending+0x7b/0xa0
[   14.990873]  ? __pfx_kthread+0x10/0x10
[   14.990897]  ret_from_fork+0x41/0x80
[   14.990918]  ? __pfx_kthread+0x10/0x10
[   14.990969]  ret_from_fork_asm+0x1a/0x30
[   14.991004]  </TASK>
[   14.991016] 
[   14.999380] Allocated by task 285:
[   14.999569]  kasan_save_stack+0x45/0x70
[   14.999776]  kasan_save_track+0x18/0x40
[   14.999959]  kasan_save_alloc_info+0x3b/0x50
[   15.000207]  __kasan_kmalloc+0xb7/0xc0
[   15.000426]  __kmalloc_cache_noprof+0x189/0x420
[   15.000654]  kasan_atomics+0x95/0x310
[   15.000866]  kunit_try_run_case+0x1a5/0x480
[   15.001077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.001401]  kthread+0x337/0x6f0
[   15.001609]  ret_from_fork+0x41/0x80
[   15.001803]  ret_from_fork_asm+0x1a/0x30
[   15.001989] 
[   15.002075] The buggy address belongs to the object at ffff888102b4cd00
[   15.002075]  which belongs to the cache kmalloc-64 of size 64
[   15.002653] The buggy address is located 0 bytes to the right of
[   15.002653]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.003239] 
[   15.003314] The buggy address belongs to the physical page:
[   15.003496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.003842] flags: 0x200000000000000(node=0|zone=2)
[   15.004072] page_type: f5(slab)
[   15.004239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.004673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.004899] page dumped because: kasan: bad access detected
[   15.005068] 
[   15.005151] Memory state around the buggy address:
[   15.005387]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.005772]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.006210] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.006571]                                      ^
[   15.006832]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007158]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007451] ==================================================================
[   14.513077] ==================================================================
[   14.513707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.513976] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.514447] 
[   14.514545] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.514589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.514603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.514625] Call Trace:
[   14.514641]  <TASK>
[   14.514657]  dump_stack_lvl+0x73/0xb0
[   14.514683]  print_report+0xd1/0x650
[   14.514710]  ? __virt_addr_valid+0x1db/0x2d0
[   14.514735]  ? kasan_atomics_helper+0x1079/0x5450
[   14.514758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.514781]  ? kasan_atomics_helper+0x1079/0x5450
[   14.514806]  kasan_report+0x141/0x180
[   14.514832]  ? kasan_atomics_helper+0x1079/0x5450
[   14.514860]  kasan_check_range+0x10c/0x1c0
[   14.514886]  __kasan_check_write+0x18/0x20
[   14.514907]  kasan_atomics_helper+0x1079/0x5450
[   14.514932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.514954]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.514978]  ? kasan_atomics+0x152/0x310
[   14.515003]  kasan_atomics+0x1dc/0x310
[   14.515024]  ? __pfx_kasan_atomics+0x10/0x10
[   14.515046]  ? __pfx_read_tsc+0x10/0x10
[   14.515068]  ? ktime_get_ts64+0x86/0x230
[   14.515095]  kunit_try_run_case+0x1a5/0x480
[   14.515119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.515151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.515176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.515201]  ? __kthread_parkme+0x82/0x180
[   14.515222]  ? preempt_count_sub+0x50/0x80
[   14.515248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.515272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.515296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.515319]  kthread+0x337/0x6f0
[   14.515351]  ? trace_preempt_on+0x20/0xc0
[   14.515375]  ? __pfx_kthread+0x10/0x10
[   14.515399]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.515421]  ? calculate_sigpending+0x7b/0xa0
[   14.515444]  ? __pfx_kthread+0x10/0x10
[   14.515467]  ret_from_fork+0x41/0x80
[   14.515489]  ? __pfx_kthread+0x10/0x10
[   14.515511]  ret_from_fork_asm+0x1a/0x30
[   14.515545]  </TASK>
[   14.515557] 
[   14.522834] Allocated by task 285:
[   14.522963]  kasan_save_stack+0x45/0x70
[   14.523104]  kasan_save_track+0x18/0x40
[   14.523295]  kasan_save_alloc_info+0x3b/0x50
[   14.523692]  __kasan_kmalloc+0xb7/0xc0
[   14.523883]  __kmalloc_cache_noprof+0x189/0x420
[   14.524062]  kasan_atomics+0x95/0x310
[   14.524191]  kunit_try_run_case+0x1a5/0x480
[   14.524346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524522]  kthread+0x337/0x6f0
[   14.524643]  ret_from_fork+0x41/0x80
[   14.524835]  ret_from_fork_asm+0x1a/0x30
[   14.525034] 
[   14.525126] The buggy address belongs to the object at ffff888102b4cd00
[   14.525126]  which belongs to the cache kmalloc-64 of size 64
[   14.525867] The buggy address is located 0 bytes to the right of
[   14.525867]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.526459] 
[   14.526559] The buggy address belongs to the physical page:
[   14.526773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.527068] flags: 0x200000000000000(node=0|zone=2)
[   14.527427] page_type: f5(slab)
[   14.527549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.527777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.528107] page dumped because: kasan: bad access detected
[   14.528372] 
[   14.528467] Memory state around the buggy address:
[   14.528695]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.528977]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.529305] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.529590]                                      ^
[   14.529774]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.530039]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.530625] ==================================================================
[   15.286736] ==================================================================
[   15.287446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.287891] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.288344] 
[   15.288703] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.288753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.288767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.288788] Call Trace:
[   15.288912]  <TASK>
[   15.288933]  dump_stack_lvl+0x73/0xb0
[   15.288960]  print_report+0xd1/0x650
[   15.288985]  ? __virt_addr_valid+0x1db/0x2d0
[   15.289007]  ? kasan_atomics_helper+0x224c/0x5450
[   15.289029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.289053]  ? kasan_atomics_helper+0x224c/0x5450
[   15.289076]  kasan_report+0x141/0x180
[   15.289100]  ? kasan_atomics_helper+0x224c/0x5450
[   15.289138]  kasan_check_range+0x10c/0x1c0
[   15.289164]  __kasan_check_write+0x18/0x20
[   15.289185]  kasan_atomics_helper+0x224c/0x5450
[   15.289209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.289233]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.289256]  ? kasan_atomics+0x152/0x310
[   15.289282]  kasan_atomics+0x1dc/0x310
[   15.289302]  ? __pfx_kasan_atomics+0x10/0x10
[   15.289336]  ? __pfx_read_tsc+0x10/0x10
[   15.289357]  ? ktime_get_ts64+0x86/0x230
[   15.289383]  kunit_try_run_case+0x1a5/0x480
[   15.289407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.289430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.289455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.289480]  ? __kthread_parkme+0x82/0x180
[   15.289503]  ? preempt_count_sub+0x50/0x80
[   15.289528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.289552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.289576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.289600]  kthread+0x337/0x6f0
[   15.289621]  ? trace_preempt_on+0x20/0xc0
[   15.289646]  ? __pfx_kthread+0x10/0x10
[   15.289669]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.289692]  ? calculate_sigpending+0x7b/0xa0
[   15.289715]  ? __pfx_kthread+0x10/0x10
[   15.289738]  ret_from_fork+0x41/0x80
[   15.289759]  ? __pfx_kthread+0x10/0x10
[   15.289786]  ret_from_fork_asm+0x1a/0x30
[   15.289819]  </TASK>
[   15.289831] 
[   15.301278] Allocated by task 285:
[   15.301475]  kasan_save_stack+0x45/0x70
[   15.301772]  kasan_save_track+0x18/0x40
[   15.302050]  kasan_save_alloc_info+0x3b/0x50
[   15.302423]  __kasan_kmalloc+0xb7/0xc0
[   15.302700]  __kmalloc_cache_noprof+0x189/0x420
[   15.303014]  kasan_atomics+0x95/0x310
[   15.303292]  kunit_try_run_case+0x1a5/0x480
[   15.303647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304008]  kthread+0x337/0x6f0
[   15.304232]  ret_from_fork+0x41/0x80
[   15.304479]  ret_from_fork_asm+0x1a/0x30
[   15.304852] 
[   15.304984] The buggy address belongs to the object at ffff888102b4cd00
[   15.304984]  which belongs to the cache kmalloc-64 of size 64
[   15.305696] The buggy address is located 0 bytes to the right of
[   15.305696]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.306453] 
[   15.306555] The buggy address belongs to the physical page:
[   15.306767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.307340] flags: 0x200000000000000(node=0|zone=2)
[   15.307696] page_type: f5(slab)
[   15.307970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.308542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.308962] page dumped because: kasan: bad access detected
[   15.309306] 
[   15.309458] Memory state around the buggy address:
[   15.309844]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.310269]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.310691] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.311088]                                      ^
[   15.311471]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.311891]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312338] ==================================================================
[   14.750216] ==================================================================
[   14.750647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.750973] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.751356] 
[   14.751530] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.751574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.751588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.751609] Call Trace:
[   14.751625]  <TASK>
[   14.751640]  dump_stack_lvl+0x73/0xb0
[   14.751687]  print_report+0xd1/0x650
[   14.751725]  ? __virt_addr_valid+0x1db/0x2d0
[   14.751761]  ? kasan_atomics_helper+0x151d/0x5450
[   14.751798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.751836]  ? kasan_atomics_helper+0x151d/0x5450
[   14.751874]  kasan_report+0x141/0x180
[   14.751924]  ? kasan_atomics_helper+0x151d/0x5450
[   14.751967]  kasan_check_range+0x10c/0x1c0
[   14.751992]  __kasan_check_write+0x18/0x20
[   14.752012]  kasan_atomics_helper+0x151d/0x5450
[   14.752037]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.752061]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.752084]  ? kasan_atomics+0x152/0x310
[   14.752109]  kasan_atomics+0x1dc/0x310
[   14.752130]  ? __pfx_kasan_atomics+0x10/0x10
[   14.752152]  ? __pfx_read_tsc+0x10/0x10
[   14.752172]  ? ktime_get_ts64+0x86/0x230
[   14.752199]  kunit_try_run_case+0x1a5/0x480
[   14.752223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.752271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752296]  ? __kthread_parkme+0x82/0x180
[   14.752319]  ? preempt_count_sub+0x50/0x80
[   14.752357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752428]  kthread+0x337/0x6f0
[   14.752459]  ? trace_preempt_on+0x20/0xc0
[   14.752483]  ? __pfx_kthread+0x10/0x10
[   14.752506]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.752529]  ? calculate_sigpending+0x7b/0xa0
[   14.752552]  ? __pfx_kthread+0x10/0x10
[   14.752575]  ret_from_fork+0x41/0x80
[   14.752615]  ? __pfx_kthread+0x10/0x10
[   14.752639]  ret_from_fork_asm+0x1a/0x30
[   14.752672]  </TASK>
[   14.752699] 
[   14.760214] Allocated by task 285:
[   14.760429]  kasan_save_stack+0x45/0x70
[   14.760673]  kasan_save_track+0x18/0x40
[   14.760893]  kasan_save_alloc_info+0x3b/0x50
[   14.761134]  __kasan_kmalloc+0xb7/0xc0
[   14.761333]  __kmalloc_cache_noprof+0x189/0x420
[   14.761555]  kasan_atomics+0x95/0x310
[   14.761738]  kunit_try_run_case+0x1a5/0x480
[   14.761894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762202]  kthread+0x337/0x6f0
[   14.762383]  ret_from_fork+0x41/0x80
[   14.762585]  ret_from_fork_asm+0x1a/0x30
[   14.762731] 
[   14.762811] The buggy address belongs to the object at ffff888102b4cd00
[   14.762811]  which belongs to the cache kmalloc-64 of size 64
[   14.763383] The buggy address is located 0 bytes to the right of
[   14.763383]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.763916] 
[   14.763995] The buggy address belongs to the physical page:
[   14.764265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.764633] flags: 0x200000000000000(node=0|zone=2)
[   14.764851] page_type: f5(slab)
[   14.765031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.765535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.765836] page dumped because: kasan: bad access detected
[   14.766074] 
[   14.766250] Memory state around the buggy address:
[   14.766498]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.766815]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.767141] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.767463]                                      ^
[   14.767708]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768023]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768232] ==================================================================
[   14.090664] ==================================================================
[   14.091018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.091402] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.091900] 
[   14.092013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.092058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.092071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.092092] Call Trace:
[   14.092108]  <TASK>
[   14.092124]  dump_stack_lvl+0x73/0xb0
[   14.092149]  print_report+0xd1/0x650
[   14.092172]  ? __virt_addr_valid+0x1db/0x2d0
[   14.092195]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.092218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.092242]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.092266]  kasan_report+0x141/0x180
[   14.092289]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.092318]  __asan_report_store4_noabort+0x1b/0x30
[   14.092362]  kasan_atomics_helper+0x4b3a/0x5450
[   14.092387]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.092411]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.092434]  ? kasan_atomics+0x152/0x310
[   14.092459]  kasan_atomics+0x1dc/0x310
[   14.092480]  ? __pfx_kasan_atomics+0x10/0x10
[   14.092503]  ? __pfx_read_tsc+0x10/0x10
[   14.092524]  ? ktime_get_ts64+0x86/0x230
[   14.092551]  kunit_try_run_case+0x1a5/0x480
[   14.092575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.092621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.092646]  ? __kthread_parkme+0x82/0x180
[   14.092668]  ? preempt_count_sub+0x50/0x80
[   14.092694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.092741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.092765]  kthread+0x337/0x6f0
[   14.092786]  ? trace_preempt_on+0x20/0xc0
[   14.092810]  ? __pfx_kthread+0x10/0x10
[   14.092833]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.092856]  ? calculate_sigpending+0x7b/0xa0
[   14.092879]  ? __pfx_kthread+0x10/0x10
[   14.092902]  ret_from_fork+0x41/0x80
[   14.092924]  ? __pfx_kthread+0x10/0x10
[   14.092946]  ret_from_fork_asm+0x1a/0x30
[   14.092979]  </TASK>
[   14.092990] 
[   14.100430] Allocated by task 285:
[   14.100566]  kasan_save_stack+0x45/0x70
[   14.100712]  kasan_save_track+0x18/0x40
[   14.100847]  kasan_save_alloc_info+0x3b/0x50
[   14.101053]  __kasan_kmalloc+0xb7/0xc0
[   14.101244]  __kmalloc_cache_noprof+0x189/0x420
[   14.101604]  kasan_atomics+0x95/0x310
[   14.101793]  kunit_try_run_case+0x1a5/0x480
[   14.102002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.102415]  kthread+0x337/0x6f0
[   14.102553]  ret_from_fork+0x41/0x80
[   14.102683]  ret_from_fork_asm+0x1a/0x30
[   14.102825] 
[   14.102897] The buggy address belongs to the object at ffff888102b4cd00
[   14.102897]  which belongs to the cache kmalloc-64 of size 64
[   14.103414] The buggy address is located 0 bytes to the right of
[   14.103414]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.103961] 
[   14.104059] The buggy address belongs to the physical page:
[   14.104304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.104552] flags: 0x200000000000000(node=0|zone=2)
[   14.104712] page_type: f5(slab)
[   14.104893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.105367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.105710] page dumped because: kasan: bad access detected
[   14.105971] 
[   14.106083] Memory state around the buggy address:
[   14.106341]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.106587]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.106804] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.107015]                                      ^
[   14.107170]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107419]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107735] ==================================================================
[   15.141594] ==================================================================
[   15.141971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.142465] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.142782] 
[   15.142863] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.142904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.142916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.142936] Call Trace:
[   15.142950]  <TASK>
[   15.142965]  dump_stack_lvl+0x73/0xb0
[   15.142988]  print_report+0xd1/0x650
[   15.143012]  ? __virt_addr_valid+0x1db/0x2d0
[   15.143058]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.143080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.143104]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.143137]  kasan_report+0x141/0x180
[   15.143161]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.143190]  __asan_report_load8_noabort+0x18/0x20
[   15.143212]  kasan_atomics_helper+0x4f98/0x5450
[   15.143254]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.143278]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.143301]  ? kasan_atomics+0x152/0x310
[   15.143336]  kasan_atomics+0x1dc/0x310
[   15.143357]  ? __pfx_kasan_atomics+0x10/0x10
[   15.143379]  ? __pfx_read_tsc+0x10/0x10
[   15.143399]  ? ktime_get_ts64+0x86/0x230
[   15.143426]  kunit_try_run_case+0x1a5/0x480
[   15.143450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.143514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.143539]  ? __kthread_parkme+0x82/0x180
[   15.143561]  ? preempt_count_sub+0x50/0x80
[   15.143587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.143634]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.143658]  kthread+0x337/0x6f0
[   15.143680]  ? trace_preempt_on+0x20/0xc0
[   15.143703]  ? __pfx_kthread+0x10/0x10
[   15.143726]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.143749]  ? calculate_sigpending+0x7b/0xa0
[   15.143771]  ? __pfx_kthread+0x10/0x10
[   15.143795]  ret_from_fork+0x41/0x80
[   15.143816]  ? __pfx_kthread+0x10/0x10
[   15.143839]  ret_from_fork_asm+0x1a/0x30
[   15.143871]  </TASK>
[   15.143882] 
[   15.151255] Allocated by task 285:
[   15.151397]  kasan_save_stack+0x45/0x70
[   15.151551]  kasan_save_track+0x18/0x40
[   15.151751]  kasan_save_alloc_info+0x3b/0x50
[   15.151991]  __kasan_kmalloc+0xb7/0xc0
[   15.152254]  __kmalloc_cache_noprof+0x189/0x420
[   15.152468]  kasan_atomics+0x95/0x310
[   15.152644]  kunit_try_run_case+0x1a5/0x480
[   15.152854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153108]  kthread+0x337/0x6f0
[   15.153267]  ret_from_fork+0x41/0x80
[   15.153409]  ret_from_fork_asm+0x1a/0x30
[   15.153549] 
[   15.153621] The buggy address belongs to the object at ffff888102b4cd00
[   15.153621]  which belongs to the cache kmalloc-64 of size 64
[   15.154552] The buggy address is located 0 bytes to the right of
[   15.154552]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.154935] 
[   15.155009] The buggy address belongs to the physical page:
[   15.155313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.155699] flags: 0x200000000000000(node=0|zone=2)
[   15.155951] page_type: f5(slab)
[   15.156143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.156861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.157836] page dumped because: kasan: bad access detected
[   15.158218] 
[   15.158380] Memory state around the buggy address:
[   15.158540]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.158756]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.158972] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.159192]                                      ^
[   15.159361]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159576]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159788] ==================================================================
[   14.380894] ==================================================================
[   14.381389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.381723] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.382024] 
[   14.382119] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.382175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.382188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.382208] Call Trace:
[   14.382222]  <TASK>
[   14.382236]  dump_stack_lvl+0x73/0xb0
[   14.382259]  print_report+0xd1/0x650
[   14.382282]  ? __virt_addr_valid+0x1db/0x2d0
[   14.382304]  ? kasan_atomics_helper+0xd47/0x5450
[   14.382337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.382362]  ? kasan_atomics_helper+0xd47/0x5450
[   14.382385]  kasan_report+0x141/0x180
[   14.382408]  ? kasan_atomics_helper+0xd47/0x5450
[   14.382437]  kasan_check_range+0x10c/0x1c0
[   14.382462]  __kasan_check_write+0x18/0x20
[   14.382483]  kasan_atomics_helper+0xd47/0x5450
[   14.382507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.382531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.382554]  ? kasan_atomics+0x152/0x310
[   14.382578]  kasan_atomics+0x1dc/0x310
[   14.382599]  ? __pfx_kasan_atomics+0x10/0x10
[   14.382622]  ? __pfx_read_tsc+0x10/0x10
[   14.382642]  ? ktime_get_ts64+0x86/0x230
[   14.382668]  kunit_try_run_case+0x1a5/0x480
[   14.382692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.382739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.382764]  ? __kthread_parkme+0x82/0x180
[   14.382786]  ? preempt_count_sub+0x50/0x80
[   14.382811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.382859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.382883]  kthread+0x337/0x6f0
[   14.382905]  ? trace_preempt_on+0x20/0xc0
[   14.382929]  ? __pfx_kthread+0x10/0x10
[   14.382952]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.382975]  ? calculate_sigpending+0x7b/0xa0
[   14.382998]  ? __pfx_kthread+0x10/0x10
[   14.383022]  ret_from_fork+0x41/0x80
[   14.383043]  ? __pfx_kthread+0x10/0x10
[   14.383066]  ret_from_fork_asm+0x1a/0x30
[   14.383098]  </TASK>
[   14.383109] 
[   14.390350] Allocated by task 285:
[   14.390478]  kasan_save_stack+0x45/0x70
[   14.390619]  kasan_save_track+0x18/0x40
[   14.390755]  kasan_save_alloc_info+0x3b/0x50
[   14.390900]  __kasan_kmalloc+0xb7/0xc0
[   14.391092]  __kmalloc_cache_noprof+0x189/0x420
[   14.391557]  kasan_atomics+0x95/0x310
[   14.391749]  kunit_try_run_case+0x1a5/0x480
[   14.391957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.392246]  kthread+0x337/0x6f0
[   14.392409]  ret_from_fork+0x41/0x80
[   14.392572]  ret_from_fork_asm+0x1a/0x30
[   14.392731] 
[   14.392827] The buggy address belongs to the object at ffff888102b4cd00
[   14.392827]  which belongs to the cache kmalloc-64 of size 64
[   14.393282] The buggy address is located 0 bytes to the right of
[   14.393282]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.393789] 
[   14.393886] The buggy address belongs to the physical page:
[   14.394115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.394440] flags: 0x200000000000000(node=0|zone=2)
[   14.394637] page_type: f5(slab)
[   14.394788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.395090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.395448] page dumped because: kasan: bad access detected
[   14.395618] 
[   14.395690] Memory state around the buggy address:
[   14.395844]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.396059]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.396379] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.397016]                                      ^
[   14.397243]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397573]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397814] ==================================================================
[   14.631962] ==================================================================
[   14.632510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.632879] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.633214] 
[   14.633314] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.633370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.633383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.633442] Call Trace:
[   14.633458]  <TASK>
[   14.633473]  dump_stack_lvl+0x73/0xb0
[   14.633498]  print_report+0xd1/0x650
[   14.633523]  ? __virt_addr_valid+0x1db/0x2d0
[   14.633546]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.633568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.633592]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.633616]  kasan_report+0x141/0x180
[   14.633640]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.633668]  kasan_check_range+0x10c/0x1c0
[   14.633693]  __kasan_check_write+0x18/0x20
[   14.633714]  kasan_atomics_helper+0x12e6/0x5450
[   14.633739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.633762]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.633792]  ? kasan_atomics+0x152/0x310
[   14.633817]  kasan_atomics+0x1dc/0x310
[   14.633837]  ? __pfx_kasan_atomics+0x10/0x10
[   14.633860]  ? __pfx_read_tsc+0x10/0x10
[   14.633880]  ? ktime_get_ts64+0x86/0x230
[   14.633907]  kunit_try_run_case+0x1a5/0x480
[   14.633931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.633954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.633980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.634004]  ? __kthread_parkme+0x82/0x180
[   14.634026]  ? preempt_count_sub+0x50/0x80
[   14.634052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.634076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.634099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.634134]  kthread+0x337/0x6f0
[   14.634156]  ? trace_preempt_on+0x20/0xc0
[   14.634179]  ? __pfx_kthread+0x10/0x10
[   14.634203]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.634225]  ? calculate_sigpending+0x7b/0xa0
[   14.634248]  ? __pfx_kthread+0x10/0x10
[   14.634272]  ret_from_fork+0x41/0x80
[   14.634293]  ? __pfx_kthread+0x10/0x10
[   14.634316]  ret_from_fork_asm+0x1a/0x30
[   14.634360]  </TASK>
[   14.634371] 
[   14.642088] Allocated by task 285:
[   14.642286]  kasan_save_stack+0x45/0x70
[   14.642497]  kasan_save_track+0x18/0x40
[   14.642690]  kasan_save_alloc_info+0x3b/0x50
[   14.642882]  __kasan_kmalloc+0xb7/0xc0
[   14.643042]  __kmalloc_cache_noprof+0x189/0x420
[   14.643251]  kasan_atomics+0x95/0x310
[   14.643422]  kunit_try_run_case+0x1a5/0x480
[   14.643608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.643831]  kthread+0x337/0x6f0
[   14.643954]  ret_from_fork+0x41/0x80
[   14.644085]  ret_from_fork_asm+0x1a/0x30
[   14.644287] 
[   14.644392] The buggy address belongs to the object at ffff888102b4cd00
[   14.644392]  which belongs to the cache kmalloc-64 of size 64
[   14.645072] The buggy address is located 0 bytes to the right of
[   14.645072]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.645445] 
[   14.645546] The buggy address belongs to the physical page:
[   14.645914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.646249] flags: 0x200000000000000(node=0|zone=2)
[   14.646422] page_type: f5(slab)
[   14.646543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.646773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.647072] page dumped because: kasan: bad access detected
[   14.647577] 
[   14.647674] Memory state around the buggy address:
[   14.647904]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.648355]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.648685] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.648982]                                      ^
[   14.649210]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.649493]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.649783] ==================================================================
[   14.071841] ==================================================================
[   14.072232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.072829] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.073222] 
[   14.073341] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.073388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.073401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.073424] Call Trace:
[   14.073441]  <TASK>
[   14.073458]  dump_stack_lvl+0x73/0xb0
[   14.073484]  print_report+0xd1/0x650
[   14.073508]  ? __virt_addr_valid+0x1db/0x2d0
[   14.073531]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.073553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.073577]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.073600]  kasan_report+0x141/0x180
[   14.073623]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.073651]  kasan_check_range+0x10c/0x1c0
[   14.073676]  __kasan_check_write+0x18/0x20
[   14.073697]  kasan_atomics_helper+0x4a0/0x5450
[   14.073721]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.073745]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.073771]  ? kasan_atomics+0x152/0x310
[   14.073795]  kasan_atomics+0x1dc/0x310
[   14.073816]  ? __pfx_kasan_atomics+0x10/0x10
[   14.073837]  ? __pfx_read_tsc+0x10/0x10
[   14.073858]  ? ktime_get_ts64+0x86/0x230
[   14.073884]  kunit_try_run_case+0x1a5/0x480
[   14.073908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.073930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.073955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.073980]  ? __kthread_parkme+0x82/0x180
[   14.074002]  ? preempt_count_sub+0x50/0x80
[   14.074029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.074053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.074076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.074100]  kthread+0x337/0x6f0
[   14.074121]  ? trace_preempt_on+0x20/0xc0
[   14.074154]  ? __pfx_kthread+0x10/0x10
[   14.074176]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.074199]  ? calculate_sigpending+0x7b/0xa0
[   14.074222]  ? __pfx_kthread+0x10/0x10
[   14.074246]  ret_from_fork+0x41/0x80
[   14.074267]  ? __pfx_kthread+0x10/0x10
[   14.074290]  ret_from_fork_asm+0x1a/0x30
[   14.074333]  </TASK>
[   14.074344] 
[   14.081992] Allocated by task 285:
[   14.082186]  kasan_save_stack+0x45/0x70
[   14.082375]  kasan_save_track+0x18/0x40
[   14.082554]  kasan_save_alloc_info+0x3b/0x50
[   14.082732]  __kasan_kmalloc+0xb7/0xc0
[   14.082865]  __kmalloc_cache_noprof+0x189/0x420
[   14.083017]  kasan_atomics+0x95/0x310
[   14.083157]  kunit_try_run_case+0x1a5/0x480
[   14.083385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.083636]  kthread+0x337/0x6f0
[   14.083848]  ret_from_fork+0x41/0x80
[   14.084022]  ret_from_fork_asm+0x1a/0x30
[   14.084161] 
[   14.084233] The buggy address belongs to the object at ffff888102b4cd00
[   14.084233]  which belongs to the cache kmalloc-64 of size 64
[   14.084744] The buggy address is located 0 bytes to the right of
[   14.084744]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.085474] 
[   14.085559] The buggy address belongs to the physical page:
[   14.085786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.086100] flags: 0x200000000000000(node=0|zone=2)
[   14.086315] page_type: f5(slab)
[   14.086456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.086759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.087063] page dumped because: kasan: bad access detected
[   14.087374] 
[   14.087449] Memory state around the buggy address:
[   14.087639]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.087853]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.088065] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.088277]                                      ^
[   14.088491]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089105]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089448] ==================================================================
[   14.109352] ==================================================================
[   14.109717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.110059] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.110754] 
[   14.110894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.110940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.110953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.110974] Call Trace:
[   14.110990]  <TASK>
[   14.111006]  dump_stack_lvl+0x73/0xb0
[   14.111033]  print_report+0xd1/0x650
[   14.111056]  ? __virt_addr_valid+0x1db/0x2d0
[   14.111079]  ? kasan_atomics_helper+0x565/0x5450
[   14.111101]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.111126]  ? kasan_atomics_helper+0x565/0x5450
[   14.111150]  kasan_report+0x141/0x180
[   14.111194]  ? kasan_atomics_helper+0x565/0x5450
[   14.111222]  kasan_check_range+0x10c/0x1c0
[   14.111248]  __kasan_check_write+0x18/0x20
[   14.111285]  kasan_atomics_helper+0x565/0x5450
[   14.111310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.111343]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.111367]  ? kasan_atomics+0x152/0x310
[   14.111391]  kasan_atomics+0x1dc/0x310
[   14.111412]  ? __pfx_kasan_atomics+0x10/0x10
[   14.111434]  ? __pfx_read_tsc+0x10/0x10
[   14.111455]  ? ktime_get_ts64+0x86/0x230
[   14.111539]  kunit_try_run_case+0x1a5/0x480
[   14.111588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.111613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.111638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.111664]  ? __kthread_parkme+0x82/0x180
[   14.111686]  ? preempt_count_sub+0x50/0x80
[   14.111712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.111753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.111777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.111801]  kthread+0x337/0x6f0
[   14.111823]  ? trace_preempt_on+0x20/0xc0
[   14.111848]  ? __pfx_kthread+0x10/0x10
[   14.111870]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.111893]  ? calculate_sigpending+0x7b/0xa0
[   14.111917]  ? __pfx_kthread+0x10/0x10
[   14.111940]  ret_from_fork+0x41/0x80
[   14.111962]  ? __pfx_kthread+0x10/0x10
[   14.111984]  ret_from_fork_asm+0x1a/0x30
[   14.112017]  </TASK>
[   14.112029] 
[   14.119402] Allocated by task 285:
[   14.119576]  kasan_save_stack+0x45/0x70
[   14.119967]  kasan_save_track+0x18/0x40
[   14.120172]  kasan_save_alloc_info+0x3b/0x50
[   14.120331]  __kasan_kmalloc+0xb7/0xc0
[   14.120466]  __kmalloc_cache_noprof+0x189/0x420
[   14.120686]  kasan_atomics+0x95/0x310
[   14.120873]  kunit_try_run_case+0x1a5/0x480
[   14.121074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.121456]  kthread+0x337/0x6f0
[   14.121630]  ret_from_fork+0x41/0x80
[   14.121796]  ret_from_fork_asm+0x1a/0x30
[   14.121935] 
[   14.122006] The buggy address belongs to the object at ffff888102b4cd00
[   14.122006]  which belongs to the cache kmalloc-64 of size 64
[   14.122500] The buggy address is located 0 bytes to the right of
[   14.122500]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.123171] 
[   14.123255] The buggy address belongs to the physical page:
[   14.123437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.123714] flags: 0x200000000000000(node=0|zone=2)
[   14.123965] page_type: f5(slab)
[   14.124144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.124491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.124819] page dumped because: kasan: bad access detected
[   14.125035] 
[   14.125135] Memory state around the buggy address:
[   14.125312]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.125537]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.125817] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.126749]                                      ^
[   14.126996]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.127287]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.127565] ==================================================================
[   14.548694] ==================================================================
[   14.548992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.550364] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.550682] 
[   14.550787] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.550832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.550845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.550867] Call Trace:
[   14.550880]  <TASK>
[   14.550895]  dump_stack_lvl+0x73/0xb0
[   14.550921]  print_report+0xd1/0x650
[   14.550945]  ? __virt_addr_valid+0x1db/0x2d0
[   14.550966]  ? kasan_atomics_helper+0x1148/0x5450
[   14.550989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.551013]  ? kasan_atomics_helper+0x1148/0x5450
[   14.551036]  kasan_report+0x141/0x180
[   14.551060]  ? kasan_atomics_helper+0x1148/0x5450
[   14.551089]  kasan_check_range+0x10c/0x1c0
[   14.551122]  __kasan_check_write+0x18/0x20
[   14.551143]  kasan_atomics_helper+0x1148/0x5450
[   14.551168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.551193]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.551216]  ? kasan_atomics+0x152/0x310
[   14.551240]  kasan_atomics+0x1dc/0x310
[   14.551260]  ? __pfx_kasan_atomics+0x10/0x10
[   14.551282]  ? __pfx_read_tsc+0x10/0x10
[   14.551302]  ? ktime_get_ts64+0x86/0x230
[   14.551337]  kunit_try_run_case+0x1a5/0x480
[   14.551361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.551410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.551435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.551471]  ? __kthread_parkme+0x82/0x180
[   14.551493]  ? preempt_count_sub+0x50/0x80
[   14.551518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.551542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.551575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.551598]  kthread+0x337/0x6f0
[   14.551619]  ? trace_preempt_on+0x20/0xc0
[   14.551653]  ? __pfx_kthread+0x10/0x10
[   14.551676]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.551699]  ? calculate_sigpending+0x7b/0xa0
[   14.551729]  ? __pfx_kthread+0x10/0x10
[   14.551753]  ret_from_fork+0x41/0x80
[   14.551774]  ? __pfx_kthread+0x10/0x10
[   14.551807]  ret_from_fork_asm+0x1a/0x30
[   14.551839]  </TASK>
[   14.551851] 
[   14.559104] Allocated by task 285:
[   14.559250]  kasan_save_stack+0x45/0x70
[   14.559440]  kasan_save_track+0x18/0x40
[   14.559631]  kasan_save_alloc_info+0x3b/0x50
[   14.559860]  __kasan_kmalloc+0xb7/0xc0
[   14.560046]  __kmalloc_cache_noprof+0x189/0x420
[   14.560286]  kasan_atomics+0x95/0x310
[   14.560477]  kunit_try_run_case+0x1a5/0x480
[   14.560685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.560935]  kthread+0x337/0x6f0
[   14.561102]  ret_from_fork+0x41/0x80
[   14.561302]  ret_from_fork_asm+0x1a/0x30
[   14.561516] 
[   14.561612] The buggy address belongs to the object at ffff888102b4cd00
[   14.561612]  which belongs to the cache kmalloc-64 of size 64
[   14.562006] The buggy address is located 0 bytes to the right of
[   14.562006]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.562568] 
[   14.562681] The buggy address belongs to the physical page:
[   14.562937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.563342] flags: 0x200000000000000(node=0|zone=2)
[   14.563574] page_type: f5(slab)
[   14.563735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.564076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.564430] page dumped because: kasan: bad access detected
[   14.564682] 
[   14.564772] Memory state around the buggy address:
[   14.564928]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.565197]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.565532] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.565850]                                      ^
[   14.566069]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.566335]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.566635] ==================================================================
[   14.808582] ==================================================================
[   14.808931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.809467] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.809829] 
[   14.809938] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.810001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.810015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.810036] Call Trace:
[   14.810048]  <TASK>
[   14.810063]  dump_stack_lvl+0x73/0xb0
[   14.810087]  print_report+0xd1/0x650
[   14.810112]  ? __virt_addr_valid+0x1db/0x2d0
[   14.810145]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.810168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.810191]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.810215]  kasan_report+0x141/0x180
[   14.810239]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.810286]  kasan_check_range+0x10c/0x1c0
[   14.810312]  __kasan_check_write+0x18/0x20
[   14.810345]  kasan_atomics_helper+0x16e7/0x5450
[   14.810369]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.810393]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.810416]  ? kasan_atomics+0x152/0x310
[   14.810458]  kasan_atomics+0x1dc/0x310
[   14.810479]  ? __pfx_kasan_atomics+0x10/0x10
[   14.810501]  ? __pfx_read_tsc+0x10/0x10
[   14.810521]  ? ktime_get_ts64+0x86/0x230
[   14.810548]  kunit_try_run_case+0x1a5/0x480
[   14.810572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.810636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.810662]  ? __kthread_parkme+0x82/0x180
[   14.810684]  ? preempt_count_sub+0x50/0x80
[   14.810710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.810735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.810758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.810798]  kthread+0x337/0x6f0
[   14.810820]  ? trace_preempt_on+0x20/0xc0
[   14.810843]  ? __pfx_kthread+0x10/0x10
[   14.810866]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.810889]  ? calculate_sigpending+0x7b/0xa0
[   14.810911]  ? __pfx_kthread+0x10/0x10
[   14.810951]  ret_from_fork+0x41/0x80
[   14.810973]  ? __pfx_kthread+0x10/0x10
[   14.810996]  ret_from_fork_asm+0x1a/0x30
[   14.811029]  </TASK>
[   14.811040] 
[   14.818966] Allocated by task 285:
[   14.819103]  kasan_save_stack+0x45/0x70
[   14.819302]  kasan_save_track+0x18/0x40
[   14.819535]  kasan_save_alloc_info+0x3b/0x50
[   14.819745]  __kasan_kmalloc+0xb7/0xc0
[   14.819936]  __kmalloc_cache_noprof+0x189/0x420
[   14.820150]  kasan_atomics+0x95/0x310
[   14.820348]  kunit_try_run_case+0x1a5/0x480
[   14.820721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.820971]  kthread+0x337/0x6f0
[   14.821165]  ret_from_fork+0x41/0x80
[   14.821304]  ret_from_fork_asm+0x1a/0x30
[   14.821457] 
[   14.821527] The buggy address belongs to the object at ffff888102b4cd00
[   14.821527]  which belongs to the cache kmalloc-64 of size 64
[   14.822074] The buggy address is located 0 bytes to the right of
[   14.822074]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.822685] 
[   14.822799] The buggy address belongs to the physical page:
[   14.823102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.823484] flags: 0x200000000000000(node=0|zone=2)
[   14.823716] page_type: f5(slab)
[   14.823886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.824259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.824506] page dumped because: kasan: bad access detected
[   14.824677] 
[   14.824746] Memory state around the buggy address:
[   14.824928]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.825356]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.825962] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.826303]                                      ^
[   14.826529]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826856]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.827095] ==================================================================
[   14.712030] ==================================================================
[   14.712420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.712871] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.713190] 
[   14.713341] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.713387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.713401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.713422] Call Trace:
[   14.713436]  <TASK>
[   14.713471]  dump_stack_lvl+0x73/0xb0
[   14.713497]  print_report+0xd1/0x650
[   14.713522]  ? __virt_addr_valid+0x1db/0x2d0
[   14.713544]  ? kasan_atomics_helper+0x1467/0x5450
[   14.713567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.713591]  ? kasan_atomics_helper+0x1467/0x5450
[   14.713615]  kasan_report+0x141/0x180
[   14.713639]  ? kasan_atomics_helper+0x1467/0x5450
[   14.713684]  kasan_check_range+0x10c/0x1c0
[   14.713710]  __kasan_check_write+0x18/0x20
[   14.713731]  kasan_atomics_helper+0x1467/0x5450
[   14.713777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.713802]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.713825]  ? kasan_atomics+0x152/0x310
[   14.713849]  kasan_atomics+0x1dc/0x310
[   14.713871]  ? __pfx_kasan_atomics+0x10/0x10
[   14.713893]  ? __pfx_read_tsc+0x10/0x10
[   14.713913]  ? ktime_get_ts64+0x86/0x230
[   14.713955]  kunit_try_run_case+0x1a5/0x480
[   14.713979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.714025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.714051]  ? __kthread_parkme+0x82/0x180
[   14.714072]  ? preempt_count_sub+0x50/0x80
[   14.714098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.714155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.714179]  kthread+0x337/0x6f0
[   14.714200]  ? trace_preempt_on+0x20/0xc0
[   14.714224]  ? __pfx_kthread+0x10/0x10
[   14.714247]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.714269]  ? calculate_sigpending+0x7b/0xa0
[   14.714291]  ? __pfx_kthread+0x10/0x10
[   14.714315]  ret_from_fork+0x41/0x80
[   14.714347]  ? __pfx_kthread+0x10/0x10
[   14.714370]  ret_from_fork_asm+0x1a/0x30
[   14.714402]  </TASK>
[   14.714413] 
[   14.722081] Allocated by task 285:
[   14.722436]  kasan_save_stack+0x45/0x70
[   14.722628]  kasan_save_track+0x18/0x40
[   14.722766]  kasan_save_alloc_info+0x3b/0x50
[   14.722913]  __kasan_kmalloc+0xb7/0xc0
[   14.723102]  __kmalloc_cache_noprof+0x189/0x420
[   14.723339]  kasan_atomics+0x95/0x310
[   14.723544]  kunit_try_run_case+0x1a5/0x480
[   14.723774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.724046]  kthread+0x337/0x6f0
[   14.724255]  ret_from_fork+0x41/0x80
[   14.724476]  ret_from_fork_asm+0x1a/0x30
[   14.724674] 
[   14.724769] The buggy address belongs to the object at ffff888102b4cd00
[   14.724769]  which belongs to the cache kmalloc-64 of size 64
[   14.725417] The buggy address is located 0 bytes to the right of
[   14.725417]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.725785] 
[   14.725857] The buggy address belongs to the physical page:
[   14.726106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.726502] flags: 0x200000000000000(node=0|zone=2)
[   14.726771] page_type: f5(slab)
[   14.726957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.727340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.727686] page dumped because: kasan: bad access detected
[   14.727938] 
[   14.728049] Memory state around the buggy address:
[   14.728294]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.728640]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.728901] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.729113]                                      ^
[   14.729346]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729732]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.730033] ==================================================================
[   15.313045] ==================================================================
[   15.313700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.314150] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.314461] 
[   15.314570] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.314615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.314630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.314746] Call Trace:
[   15.314762]  <TASK>
[   15.314776]  dump_stack_lvl+0x73/0xb0
[   15.314804]  print_report+0xd1/0x650
[   15.314827]  ? __virt_addr_valid+0x1db/0x2d0
[   15.314849]  ? kasan_atomics_helper+0x5115/0x5450
[   15.314872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.314895]  ? kasan_atomics_helper+0x5115/0x5450
[   15.314919]  kasan_report+0x141/0x180
[   15.314943]  ? kasan_atomics_helper+0x5115/0x5450
[   15.314971]  __asan_report_load8_noabort+0x18/0x20
[   15.314993]  kasan_atomics_helper+0x5115/0x5450
[   15.315017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.315041]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.315063]  ? kasan_atomics+0x152/0x310
[   15.315088]  kasan_atomics+0x1dc/0x310
[   15.315108]  ? __pfx_kasan_atomics+0x10/0x10
[   15.315299]  ? __pfx_read_tsc+0x10/0x10
[   15.315331]  ? ktime_get_ts64+0x86/0x230
[   15.315358]  kunit_try_run_case+0x1a5/0x480
[   15.315383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.315429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.315454]  ? __kthread_parkme+0x82/0x180
[   15.315476]  ? preempt_count_sub+0x50/0x80
[   15.315503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.315550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.315574]  kthread+0x337/0x6f0
[   15.315595]  ? trace_preempt_on+0x20/0xc0
[   15.315618]  ? __pfx_kthread+0x10/0x10
[   15.315641]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.315664]  ? calculate_sigpending+0x7b/0xa0
[   15.315687]  ? __pfx_kthread+0x10/0x10
[   15.315709]  ret_from_fork+0x41/0x80
[   15.315731]  ? __pfx_kthread+0x10/0x10
[   15.315753]  ret_from_fork_asm+0x1a/0x30
[   15.315786]  </TASK>
[   15.315797] 
[   15.325800] Allocated by task 285:
[   15.325946]  kasan_save_stack+0x45/0x70
[   15.326347]  kasan_save_track+0x18/0x40
[   15.326623]  kasan_save_alloc_info+0x3b/0x50
[   15.326790]  __kasan_kmalloc+0xb7/0xc0
[   15.327092]  __kmalloc_cache_noprof+0x189/0x420
[   15.327373]  kasan_atomics+0x95/0x310
[   15.327693]  kunit_try_run_case+0x1a5/0x480
[   15.327909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.328341]  kthread+0x337/0x6f0
[   15.328595]  ret_from_fork+0x41/0x80
[   15.328745]  ret_from_fork_asm+0x1a/0x30
[   15.329052] 
[   15.329129] The buggy address belongs to the object at ffff888102b4cd00
[   15.329129]  which belongs to the cache kmalloc-64 of size 64
[   15.329784] The buggy address is located 0 bytes to the right of
[   15.329784]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.330566] 
[   15.330650] The buggy address belongs to the physical page:
[   15.331048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.331602] flags: 0x200000000000000(node=0|zone=2)
[   15.331817] page_type: f5(slab)
[   15.332129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.332611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.332980] page dumped because: kasan: bad access detected
[   15.333268] 
[   15.333376] Memory state around the buggy address:
[   15.333759]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334104]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.334557] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.334817]                                      ^
[   15.335042]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335496]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335889] ==================================================================
[   14.650244] ==================================================================
[   14.650759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.651075] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.651473] 
[   14.651585] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.651629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.651642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.651665] Call Trace:
[   14.651682]  <TASK>
[   14.651698]  dump_stack_lvl+0x73/0xb0
[   14.651724]  print_report+0xd1/0x650
[   14.651747]  ? __virt_addr_valid+0x1db/0x2d0
[   14.651769]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.651792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.651816]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.651839]  kasan_report+0x141/0x180
[   14.651863]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.651891]  __asan_report_load4_noabort+0x18/0x20
[   14.651913]  kasan_atomics_helper+0x49ce/0x5450
[   14.651938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.651962]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.651986]  ? kasan_atomics+0x152/0x310
[   14.652010]  kasan_atomics+0x1dc/0x310
[   14.652031]  ? __pfx_kasan_atomics+0x10/0x10
[   14.652053]  ? __pfx_read_tsc+0x10/0x10
[   14.652073]  ? ktime_get_ts64+0x86/0x230
[   14.652100]  kunit_try_run_case+0x1a5/0x480
[   14.652125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.652147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.652172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.652196]  ? __kthread_parkme+0x82/0x180
[   14.652219]  ? preempt_count_sub+0x50/0x80
[   14.652246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.652270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.652295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.652320]  kthread+0x337/0x6f0
[   14.652353]  ? trace_preempt_on+0x20/0xc0
[   14.652377]  ? __pfx_kthread+0x10/0x10
[   14.652399]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.652422]  ? calculate_sigpending+0x7b/0xa0
[   14.652445]  ? __pfx_kthread+0x10/0x10
[   14.652468]  ret_from_fork+0x41/0x80
[   14.652489]  ? __pfx_kthread+0x10/0x10
[   14.652512]  ret_from_fork_asm+0x1a/0x30
[   14.652544]  </TASK>
[   14.652556] 
[   14.659744] Allocated by task 285:
[   14.659897]  kasan_save_stack+0x45/0x70
[   14.660083]  kasan_save_track+0x18/0x40
[   14.660253]  kasan_save_alloc_info+0x3b/0x50
[   14.660410]  __kasan_kmalloc+0xb7/0xc0
[   14.660544]  __kmalloc_cache_noprof+0x189/0x420
[   14.660696]  kasan_atomics+0x95/0x310
[   14.660824]  kunit_try_run_case+0x1a5/0x480
[   14.660969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.661219]  kthread+0x337/0x6f0
[   14.661396]  ret_from_fork+0x41/0x80
[   14.661576]  ret_from_fork_asm+0x1a/0x30
[   14.661774] 
[   14.661867] The buggy address belongs to the object at ffff888102b4cd00
[   14.661867]  which belongs to the cache kmalloc-64 of size 64
[   14.662387] The buggy address is located 0 bytes to the right of
[   14.662387]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.662788] 
[   14.662858] The buggy address belongs to the physical page:
[   14.663029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.663480] flags: 0x200000000000000(node=0|zone=2)
[   14.663714] page_type: f5(slab)
[   14.663885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.664358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.664675] page dumped because: kasan: bad access detected
[   14.664848] 
[   14.664916] Memory state around the buggy address:
[   14.665084]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.665766]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.666084] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.666489]                                      ^
[   14.666644]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666858]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.667131] ==================================================================
[   14.495318] ==================================================================
[   14.495959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.496489] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.497010] 
[   14.497126] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.497172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.497187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.497209] Call Trace:
[   14.497226]  <TASK>
[   14.497243]  dump_stack_lvl+0x73/0xb0
[   14.497271]  print_report+0xd1/0x650
[   14.497296]  ? __virt_addr_valid+0x1db/0x2d0
[   14.497334]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.497357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.497380]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.497404]  kasan_report+0x141/0x180
[   14.497429]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.497457]  __asan_report_load4_noabort+0x18/0x20
[   14.497479]  kasan_atomics_helper+0x4a36/0x5450
[   14.497503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.497526]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.497548]  ? kasan_atomics+0x152/0x310
[   14.497573]  kasan_atomics+0x1dc/0x310
[   14.497595]  ? __pfx_kasan_atomics+0x10/0x10
[   14.497617]  ? __pfx_read_tsc+0x10/0x10
[   14.497637]  ? ktime_get_ts64+0x86/0x230
[   14.497663]  kunit_try_run_case+0x1a5/0x480
[   14.497688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.497735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.497760]  ? __kthread_parkme+0x82/0x180
[   14.497786]  ? preempt_count_sub+0x50/0x80
[   14.497812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.497860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.497884]  kthread+0x337/0x6f0
[   14.497906]  ? trace_preempt_on+0x20/0xc0
[   14.497929]  ? __pfx_kthread+0x10/0x10
[   14.497952]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.497975]  ? calculate_sigpending+0x7b/0xa0
[   14.497999]  ? __pfx_kthread+0x10/0x10
[   14.498022]  ret_from_fork+0x41/0x80
[   14.498043]  ? __pfx_kthread+0x10/0x10
[   14.498066]  ret_from_fork_asm+0x1a/0x30
[   14.498099]  </TASK>
[   14.498111] 
[   14.505294] Allocated by task 285:
[   14.505481]  kasan_save_stack+0x45/0x70
[   14.505663]  kasan_save_track+0x18/0x40
[   14.505849]  kasan_save_alloc_info+0x3b/0x50
[   14.506050]  __kasan_kmalloc+0xb7/0xc0
[   14.506228]  __kmalloc_cache_noprof+0x189/0x420
[   14.506391]  kasan_atomics+0x95/0x310
[   14.506575]  kunit_try_run_case+0x1a5/0x480
[   14.506784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.507042]  kthread+0x337/0x6f0
[   14.507221]  ret_from_fork+0x41/0x80
[   14.507391]  ret_from_fork_asm+0x1a/0x30
[   14.507571] 
[   14.507643] The buggy address belongs to the object at ffff888102b4cd00
[   14.507643]  which belongs to the cache kmalloc-64 of size 64
[   14.508115] The buggy address is located 0 bytes to the right of
[   14.508115]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.508604] 
[   14.508678] The buggy address belongs to the physical page:
[   14.508851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.509089] flags: 0x200000000000000(node=0|zone=2)
[   14.509284] page_type: f5(slab)
[   14.509459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.509986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.510241] page dumped because: kasan: bad access detected
[   14.510419] 
[   14.510488] Memory state around the buggy address:
[   14.510649]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.510862]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.511252] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.511583]                                      ^
[   14.511807]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.512127]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.512455] ==================================================================
[   14.789745] ==================================================================
[   14.790104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.790697] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.791029] 
[   14.791117] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.791170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.791183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.791224] Call Trace:
[   14.791239]  <TASK>
[   14.791255]  dump_stack_lvl+0x73/0xb0
[   14.791280]  print_report+0xd1/0x650
[   14.791304]  ? __virt_addr_valid+0x1db/0x2d0
[   14.791340]  ? kasan_atomics_helper+0x164f/0x5450
[   14.791363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.791406]  ? kasan_atomics_helper+0x164f/0x5450
[   14.791429]  kasan_report+0x141/0x180
[   14.791453]  ? kasan_atomics_helper+0x164f/0x5450
[   14.791481]  kasan_check_range+0x10c/0x1c0
[   14.791507]  __kasan_check_write+0x18/0x20
[   14.791528]  kasan_atomics_helper+0x164f/0x5450
[   14.791553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.791576]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.791615]  ? kasan_atomics+0x152/0x310
[   14.791652]  kasan_atomics+0x1dc/0x310
[   14.791686]  ? __pfx_kasan_atomics+0x10/0x10
[   14.791720]  ? __pfx_read_tsc+0x10/0x10
[   14.791740]  ? ktime_get_ts64+0x86/0x230
[   14.791767]  kunit_try_run_case+0x1a5/0x480
[   14.791790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.791837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.791861]  ? __kthread_parkme+0x82/0x180
[   14.791883]  ? preempt_count_sub+0x50/0x80
[   14.791908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.791955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.791980]  kthread+0x337/0x6f0
[   14.792001]  ? trace_preempt_on+0x20/0xc0
[   14.792024]  ? __pfx_kthread+0x10/0x10
[   14.792047]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.792070]  ? calculate_sigpending+0x7b/0xa0
[   14.792110]  ? __pfx_kthread+0x10/0x10
[   14.792143]  ret_from_fork+0x41/0x80
[   14.792165]  ? __pfx_kthread+0x10/0x10
[   14.792188]  ret_from_fork_asm+0x1a/0x30
[   14.792221]  </TASK>
[   14.792231] 
[   14.799996] Allocated by task 285:
[   14.800210]  kasan_save_stack+0x45/0x70
[   14.800406]  kasan_save_track+0x18/0x40
[   14.800555]  kasan_save_alloc_info+0x3b/0x50
[   14.800701]  __kasan_kmalloc+0xb7/0xc0
[   14.800863]  __kmalloc_cache_noprof+0x189/0x420
[   14.801107]  kasan_atomics+0x95/0x310
[   14.801307]  kunit_try_run_case+0x1a5/0x480
[   14.801543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.801800]  kthread+0x337/0x6f0
[   14.801970]  ret_from_fork+0x41/0x80
[   14.802154]  ret_from_fork_asm+0x1a/0x30
[   14.802337] 
[   14.802449] The buggy address belongs to the object at ffff888102b4cd00
[   14.802449]  which belongs to the cache kmalloc-64 of size 64
[   14.802893] The buggy address is located 0 bytes to the right of
[   14.802893]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.803698] 
[   14.803811] The buggy address belongs to the physical page:
[   14.803997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.804394] flags: 0x200000000000000(node=0|zone=2)
[   14.804651] page_type: f5(slab)
[   14.804833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.805167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.805573] page dumped because: kasan: bad access detected
[   14.805859] 
[   14.805944] Memory state around the buggy address:
[   14.806102]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.806451]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.806771] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.807096]                                      ^
[   14.807394]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807609]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807819] ==================================================================
[   14.884944] ==================================================================
[   14.885298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.885645] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.885954] 
[   14.886131] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.886175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.886188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.886209] Call Trace:
[   14.886223]  <TASK>
[   14.886236]  dump_stack_lvl+0x73/0xb0
[   14.886260]  print_report+0xd1/0x650
[   14.886284]  ? __virt_addr_valid+0x1db/0x2d0
[   14.886306]  ? kasan_atomics_helper+0x194a/0x5450
[   14.886339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.886364]  ? kasan_atomics_helper+0x194a/0x5450
[   14.886387]  kasan_report+0x141/0x180
[   14.886411]  ? kasan_atomics_helper+0x194a/0x5450
[   14.886440]  kasan_check_range+0x10c/0x1c0
[   14.886465]  __kasan_check_write+0x18/0x20
[   14.886487]  kasan_atomics_helper+0x194a/0x5450
[   14.886511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.886536]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.886560]  ? kasan_atomics+0x152/0x310
[   14.886585]  kasan_atomics+0x1dc/0x310
[   14.886605]  ? __pfx_kasan_atomics+0x10/0x10
[   14.886627]  ? __pfx_read_tsc+0x10/0x10
[   14.886648]  ? ktime_get_ts64+0x86/0x230
[   14.886673]  kunit_try_run_case+0x1a5/0x480
[   14.886697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.886744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.886770]  ? __kthread_parkme+0x82/0x180
[   14.886792]  ? preempt_count_sub+0x50/0x80
[   14.886819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.886842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.886866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.886889]  kthread+0x337/0x6f0
[   14.886910]  ? trace_preempt_on+0x20/0xc0
[   14.886935]  ? __pfx_kthread+0x10/0x10
[   14.886958]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.886980]  ? calculate_sigpending+0x7b/0xa0
[   14.887002]  ? __pfx_kthread+0x10/0x10
[   14.887025]  ret_from_fork+0x41/0x80
[   14.887048]  ? __pfx_kthread+0x10/0x10
[   14.887070]  ret_from_fork_asm+0x1a/0x30
[   14.887102]  </TASK>
[   14.887133] 
[   14.894178] Allocated by task 285:
[   14.894370]  kasan_save_stack+0x45/0x70
[   14.894564]  kasan_save_track+0x18/0x40
[   14.894760]  kasan_save_alloc_info+0x3b/0x50
[   14.894972]  __kasan_kmalloc+0xb7/0xc0
[   14.895185]  __kmalloc_cache_noprof+0x189/0x420
[   14.895368]  kasan_atomics+0x95/0x310
[   14.895550]  kunit_try_run_case+0x1a5/0x480
[   14.895733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.895958]  kthread+0x337/0x6f0
[   14.896107]  ret_from_fork+0x41/0x80
[   14.896285]  ret_from_fork_asm+0x1a/0x30
[   14.896455] 
[   14.896550] The buggy address belongs to the object at ffff888102b4cd00
[   14.896550]  which belongs to the cache kmalloc-64 of size 64
[   14.896995] The buggy address is located 0 bytes to the right of
[   14.896995]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.897501] 
[   14.897600] The buggy address belongs to the physical page:
[   14.897806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.898045] flags: 0x200000000000000(node=0|zone=2)
[   14.898232] page_type: f5(slab)
[   14.898362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.898671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.899007] page dumped because: kasan: bad access detected
[   14.899282] 
[   14.899385] Memory state around the buggy address:
[   14.899584]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.899801]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.900015] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.900253]                                      ^
[   14.900491]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.900823]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.901167] ==================================================================
[   14.398392] ==================================================================
[   14.398953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.399526] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.399867] 
[   14.399979] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.400023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.400036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.400056] Call Trace:
[   14.400073]  <TASK>
[   14.400090]  dump_stack_lvl+0x73/0xb0
[   14.400115]  print_report+0xd1/0x650
[   14.400152]  ? __virt_addr_valid+0x1db/0x2d0
[   14.400175]  ? kasan_atomics_helper+0xde0/0x5450
[   14.400197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.400221]  ? kasan_atomics_helper+0xde0/0x5450
[   14.400244]  kasan_report+0x141/0x180
[   14.400267]  ? kasan_atomics_helper+0xde0/0x5450
[   14.400296]  kasan_check_range+0x10c/0x1c0
[   14.400332]  __kasan_check_write+0x18/0x20
[   14.400353]  kasan_atomics_helper+0xde0/0x5450
[   14.400377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.400401]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.400424]  ? kasan_atomics+0x152/0x310
[   14.400449]  kasan_atomics+0x1dc/0x310
[   14.400469]  ? __pfx_kasan_atomics+0x10/0x10
[   14.400491]  ? __pfx_read_tsc+0x10/0x10
[   14.400511]  ? ktime_get_ts64+0x86/0x230
[   14.400537]  kunit_try_run_case+0x1a5/0x480
[   14.400563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.400585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.400609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.400635]  ? __kthread_parkme+0x82/0x180
[   14.400659]  ? preempt_count_sub+0x50/0x80
[   14.400685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.400709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.400733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.400757]  kthread+0x337/0x6f0
[   14.400779]  ? trace_preempt_on+0x20/0xc0
[   14.400804]  ? __pfx_kthread+0x10/0x10
[   14.400828]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.400851]  ? calculate_sigpending+0x7b/0xa0
[   14.400874]  ? __pfx_kthread+0x10/0x10
[   14.400898]  ret_from_fork+0x41/0x80
[   14.400919]  ? __pfx_kthread+0x10/0x10
[   14.400942]  ret_from_fork_asm+0x1a/0x30
[   14.400975]  </TASK>
[   14.400986] 
[   14.408329] Allocated by task 285:
[   14.408507]  kasan_save_stack+0x45/0x70
[   14.408709]  kasan_save_track+0x18/0x40
[   14.408898]  kasan_save_alloc_info+0x3b/0x50
[   14.409045]  __kasan_kmalloc+0xb7/0xc0
[   14.409204]  __kmalloc_cache_noprof+0x189/0x420
[   14.409380]  kasan_atomics+0x95/0x310
[   14.409566]  kunit_try_run_case+0x1a5/0x480
[   14.409782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.410061]  kthread+0x337/0x6f0
[   14.410288]  ret_from_fork+0x41/0x80
[   14.410438]  ret_from_fork_asm+0x1a/0x30
[   14.410578] 
[   14.410648] The buggy address belongs to the object at ffff888102b4cd00
[   14.410648]  which belongs to the cache kmalloc-64 of size 64
[   14.411031] The buggy address is located 0 bytes to the right of
[   14.411031]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.411599] 
[   14.411693] The buggy address belongs to the physical page:
[   14.411942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.412314] flags: 0x200000000000000(node=0|zone=2)
[   14.412556] page_type: f5(slab)
[   14.412702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.412932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.413206] page dumped because: kasan: bad access detected
[   14.413467] 
[   14.413565] Memory state around the buggy address:
[   14.413792]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.414159]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.414482] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.414766]                                      ^
[   14.414994]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.415236]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.415459] ==================================================================
[   14.472149] ==================================================================
[   14.472471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.472763] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.473078] 
[   14.473160] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.473218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.473231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.473251] Call Trace:
[   14.473265]  <TASK>
[   14.473281]  dump_stack_lvl+0x73/0xb0
[   14.473305]  print_report+0xd1/0x650
[   14.473339]  ? __virt_addr_valid+0x1db/0x2d0
[   14.473361]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.473383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.473406]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.473429]  kasan_report+0x141/0x180
[   14.473452]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.473480]  kasan_check_range+0x10c/0x1c0
[   14.473506]  __kasan_check_write+0x18/0x20
[   14.473526]  kasan_atomics_helper+0xfa9/0x5450
[   14.473550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.473573]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.473596]  ? kasan_atomics+0x152/0x310
[   14.473619]  kasan_atomics+0x1dc/0x310
[   14.473640]  ? __pfx_kasan_atomics+0x10/0x10
[   14.473661]  ? __pfx_read_tsc+0x10/0x10
[   14.473681]  ? ktime_get_ts64+0x86/0x230
[   14.473707]  kunit_try_run_case+0x1a5/0x480
[   14.473731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.473781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.473806]  ? __kthread_parkme+0x82/0x180
[   14.473828]  ? preempt_count_sub+0x50/0x80
[   14.473853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.473878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.473902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.473926]  kthread+0x337/0x6f0
[   14.473947]  ? trace_preempt_on+0x20/0xc0
[   14.473971]  ? __pfx_kthread+0x10/0x10
[   14.473993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.474016]  ? calculate_sigpending+0x7b/0xa0
[   14.474038]  ? __pfx_kthread+0x10/0x10
[   14.474061]  ret_from_fork+0x41/0x80
[   14.474083]  ? __pfx_kthread+0x10/0x10
[   14.474106]  ret_from_fork_asm+0x1a/0x30
[   14.474148]  </TASK>
[   14.474160] 
[   14.482788] Allocated by task 285:
[   14.482971]  kasan_save_stack+0x45/0x70
[   14.483464]  kasan_save_track+0x18/0x40
[   14.483788]  kasan_save_alloc_info+0x3b/0x50
[   14.484215]  __kasan_kmalloc+0xb7/0xc0
[   14.484531]  __kmalloc_cache_noprof+0x189/0x420
[   14.484874]  kasan_atomics+0x95/0x310
[   14.485051]  kunit_try_run_case+0x1a5/0x480
[   14.485519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.485944]  kthread+0x337/0x6f0
[   14.486245]  ret_from_fork+0x41/0x80
[   14.486544]  ret_from_fork_asm+0x1a/0x30
[   14.486750] 
[   14.486843] The buggy address belongs to the object at ffff888102b4cd00
[   14.486843]  which belongs to the cache kmalloc-64 of size 64
[   14.487685] The buggy address is located 0 bytes to the right of
[   14.487685]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.488582] 
[   14.488805] The buggy address belongs to the physical page:
[   14.489268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.489636] flags: 0x200000000000000(node=0|zone=2)
[   14.489860] page_type: f5(slab)
[   14.490017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.490603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.491044] page dumped because: kasan: bad access detected
[   14.491511] 
[   14.491603] Memory state around the buggy address:
[   14.491930]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492535]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.492953] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.493410]                                      ^
[   14.493628]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.493923]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.494537] ==================================================================
[   15.028231] ==================================================================
[   15.028663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.029131] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.029652] 
[   15.029766] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.029814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.029827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.029848] Call Trace:
[   15.029865]  <TASK>
[   15.029881]  dump_stack_lvl+0x73/0xb0
[   15.029907]  print_report+0xd1/0x650
[   15.029931]  ? __virt_addr_valid+0x1db/0x2d0
[   15.029953]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.029976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.030000]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.030063]  kasan_report+0x141/0x180
[   15.030115]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.030153]  kasan_check_range+0x10c/0x1c0
[   15.030207]  __kasan_check_write+0x18/0x20
[   15.030228]  kasan_atomics_helper+0x1d7a/0x5450
[   15.030252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.030276]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.030337]  ? kasan_atomics+0x152/0x310
[   15.030363]  kasan_atomics+0x1dc/0x310
[   15.030384]  ? __pfx_kasan_atomics+0x10/0x10
[   15.030406]  ? __pfx_read_tsc+0x10/0x10
[   15.030427]  ? ktime_get_ts64+0x86/0x230
[   15.030454]  kunit_try_run_case+0x1a5/0x480
[   15.030478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.030501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.030526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.030552]  ? __kthread_parkme+0x82/0x180
[   15.030575]  ? preempt_count_sub+0x50/0x80
[   15.030600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.030658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.030683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.030708]  kthread+0x337/0x6f0
[   15.030729]  ? trace_preempt_on+0x20/0xc0
[   15.030755]  ? __pfx_kthread+0x10/0x10
[   15.030805]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.030830]  ? calculate_sigpending+0x7b/0xa0
[   15.030853]  ? __pfx_kthread+0x10/0x10
[   15.030877]  ret_from_fork+0x41/0x80
[   15.030900]  ? __pfx_kthread+0x10/0x10
[   15.030922]  ret_from_fork_asm+0x1a/0x30
[   15.030982]  </TASK>
[   15.030993] 
[   15.039410] Allocated by task 285:
[   15.039593]  kasan_save_stack+0x45/0x70
[   15.039796]  kasan_save_track+0x18/0x40
[   15.039984]  kasan_save_alloc_info+0x3b/0x50
[   15.040154]  __kasan_kmalloc+0xb7/0xc0
[   15.040371]  __kmalloc_cache_noprof+0x189/0x420
[   15.040531]  kasan_atomics+0x95/0x310
[   15.040661]  kunit_try_run_case+0x1a5/0x480
[   15.040825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041075]  kthread+0x337/0x6f0
[   15.041372]  ret_from_fork+0x41/0x80
[   15.041578]  ret_from_fork_asm+0x1a/0x30
[   15.041774] 
[   15.041846] The buggy address belongs to the object at ffff888102b4cd00
[   15.041846]  which belongs to the cache kmalloc-64 of size 64
[   15.042196] The buggy address is located 0 bytes to the right of
[   15.042196]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.043014] 
[   15.043128] The buggy address belongs to the physical page:
[   15.043341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.043580] flags: 0x200000000000000(node=0|zone=2)
[   15.044044] page_type: f5(slab)
[   15.044213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.044628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.044855] page dumped because: kasan: bad access detected
[   15.045069] 
[   15.045195] Memory state around the buggy address:
[   15.045453]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.045750]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.046068] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.046289]                                      ^
[   15.046627]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.046960]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.047299] ==================================================================
[   14.531259] ==================================================================
[   14.531875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.532147] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.532471] 
[   14.532558] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.532604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.532617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.532639] Call Trace:
[   14.532654]  <TASK>
[   14.532669]  dump_stack_lvl+0x73/0xb0
[   14.532694]  print_report+0xd1/0x650
[   14.532718]  ? __virt_addr_valid+0x1db/0x2d0
[   14.532794]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.532818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.532842]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.532866]  kasan_report+0x141/0x180
[   14.532890]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.532919]  __asan_report_load4_noabort+0x18/0x20
[   14.532940]  kasan_atomics_helper+0x4a1c/0x5450
[   14.532965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.532989]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.533011]  ? kasan_atomics+0x152/0x310
[   14.533036]  kasan_atomics+0x1dc/0x310
[   14.533056]  ? __pfx_kasan_atomics+0x10/0x10
[   14.533078]  ? __pfx_read_tsc+0x10/0x10
[   14.533098]  ? ktime_get_ts64+0x86/0x230
[   14.533134]  kunit_try_run_case+0x1a5/0x480
[   14.533158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.533180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.533205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.533230]  ? __kthread_parkme+0x82/0x180
[   14.533253]  ? preempt_count_sub+0x50/0x80
[   14.533279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.533302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.533338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.533363]  kthread+0x337/0x6f0
[   14.533384]  ? trace_preempt_on+0x20/0xc0
[   14.533408]  ? __pfx_kthread+0x10/0x10
[   14.533430]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.533453]  ? calculate_sigpending+0x7b/0xa0
[   14.533475]  ? __pfx_kthread+0x10/0x10
[   14.533499]  ret_from_fork+0x41/0x80
[   14.533521]  ? __pfx_kthread+0x10/0x10
[   14.533543]  ret_from_fork_asm+0x1a/0x30
[   14.533577]  </TASK>
[   14.533588] 
[   14.541045] Allocated by task 285:
[   14.541231]  kasan_save_stack+0x45/0x70
[   14.541409]  kasan_save_track+0x18/0x40
[   14.541580]  kasan_save_alloc_info+0x3b/0x50
[   14.541765]  __kasan_kmalloc+0xb7/0xc0
[   14.541957]  __kmalloc_cache_noprof+0x189/0x420
[   14.542168]  kasan_atomics+0x95/0x310
[   14.542311]  kunit_try_run_case+0x1a5/0x480
[   14.542465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.542674]  kthread+0x337/0x6f0
[   14.542842]  ret_from_fork+0x41/0x80
[   14.543025]  ret_from_fork_asm+0x1a/0x30
[   14.543219] 
[   14.543392] The buggy address belongs to the object at ffff888102b4cd00
[   14.543392]  which belongs to the cache kmalloc-64 of size 64
[   14.543815] The buggy address is located 0 bytes to the right of
[   14.543815]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.544372] 
[   14.544454] The buggy address belongs to the physical page:
[   14.544665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.544951] flags: 0x200000000000000(node=0|zone=2)
[   14.545230] page_type: f5(slab)
[   14.545404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.545701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.545999] page dumped because: kasan: bad access detected
[   14.546253] 
[   14.546357] Memory state around the buggy address:
[   14.546515]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.546730]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.546943] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.547168]                                      ^
[   14.547567]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.547880]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.548132] ==================================================================
[   14.129220] ==================================================================
[   14.129776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.130125] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.130386] 
[   14.130494] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.130538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.130551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.130595] Call Trace:
[   14.130609]  <TASK>
[   14.130624]  dump_stack_lvl+0x73/0xb0
[   14.130648]  print_report+0xd1/0x650
[   14.130671]  ? __virt_addr_valid+0x1db/0x2d0
[   14.130693]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.130715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.130739]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.130762]  kasan_report+0x141/0x180
[   14.130785]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.130814]  kasan_check_range+0x10c/0x1c0
[   14.130856]  __kasan_check_write+0x18/0x20
[   14.130877]  kasan_atomics_helper+0x5fe/0x5450
[   14.130901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.130925]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.130949]  ? kasan_atomics+0x152/0x310
[   14.130973]  kasan_atomics+0x1dc/0x310
[   14.131011]  ? __pfx_kasan_atomics+0x10/0x10
[   14.131034]  ? __pfx_read_tsc+0x10/0x10
[   14.131055]  ? ktime_get_ts64+0x86/0x230
[   14.131081]  kunit_try_run_case+0x1a5/0x480
[   14.131105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.131138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.131162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.131188]  ? __kthread_parkme+0x82/0x180
[   14.131210]  ? preempt_count_sub+0x50/0x80
[   14.131235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.131259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.131283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.131308]  kthread+0x337/0x6f0
[   14.131339]  ? trace_preempt_on+0x20/0xc0
[   14.131364]  ? __pfx_kthread+0x10/0x10
[   14.131387]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.131409]  ? calculate_sigpending+0x7b/0xa0
[   14.131430]  ? __pfx_kthread+0x10/0x10
[   14.131473]  ret_from_fork+0x41/0x80
[   14.131495]  ? __pfx_kthread+0x10/0x10
[   14.131518]  ret_from_fork_asm+0x1a/0x30
[   14.131550]  </TASK>
[   14.131561] 
[   14.141723] Allocated by task 285:
[   14.141915]  kasan_save_stack+0x45/0x70
[   14.142121]  kasan_save_track+0x18/0x40
[   14.142597]  kasan_save_alloc_info+0x3b/0x50
[   14.142867]  __kasan_kmalloc+0xb7/0xc0
[   14.143119]  __kmalloc_cache_noprof+0x189/0x420
[   14.143438]  kasan_atomics+0x95/0x310
[   14.143739]  kunit_try_run_case+0x1a5/0x480
[   14.144044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.144432]  kthread+0x337/0x6f0
[   14.144699]  ret_from_fork+0x41/0x80
[   14.144989]  ret_from_fork_asm+0x1a/0x30
[   14.145293] 
[   14.145388] The buggy address belongs to the object at ffff888102b4cd00
[   14.145388]  which belongs to the cache kmalloc-64 of size 64
[   14.146141] The buggy address is located 0 bytes to the right of
[   14.146141]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.146859] 
[   14.147099] The buggy address belongs to the physical page:
[   14.147382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.147834] flags: 0x200000000000000(node=0|zone=2)
[   14.148182] page_type: f5(slab)
[   14.148371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.148695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.149026] page dumped because: kasan: bad access detected
[   14.149533] 
[   14.149629] Memory state around the buggy address:
[   14.149995]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.150475]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.150907] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.151411]                                      ^
[   14.151724]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152182]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152600] ==================================================================
[   15.161292] ==================================================================
[   15.162060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.163090] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.163925] 
[   15.164269] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.164320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.164447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.164471] Call Trace:
[   15.164489]  <TASK>
[   15.164517]  dump_stack_lvl+0x73/0xb0
[   15.164547]  print_report+0xd1/0x650
[   15.164601]  ? __virt_addr_valid+0x1db/0x2d0
[   15.164626]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.164649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.164673]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.164696]  kasan_report+0x141/0x180
[   15.164720]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.164748]  kasan_check_range+0x10c/0x1c0
[   15.164773]  __kasan_check_write+0x18/0x20
[   15.164794]  kasan_atomics_helper+0x20c8/0x5450
[   15.164819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.164843]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.164866]  ? kasan_atomics+0x152/0x310
[   15.164890]  kasan_atomics+0x1dc/0x310
[   15.164910]  ? __pfx_kasan_atomics+0x10/0x10
[   15.164932]  ? __pfx_read_tsc+0x10/0x10
[   15.164954]  ? ktime_get_ts64+0x86/0x230
[   15.164980]  kunit_try_run_case+0x1a5/0x480
[   15.165006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.165054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.165080]  ? __kthread_parkme+0x82/0x180
[   15.165103]  ? preempt_count_sub+0x50/0x80
[   15.165152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.165225]  kthread+0x337/0x6f0
[   15.165246]  ? trace_preempt_on+0x20/0xc0
[   15.165270]  ? __pfx_kthread+0x10/0x10
[   15.165293]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.165315]  ? calculate_sigpending+0x7b/0xa0
[   15.165346]  ? __pfx_kthread+0x10/0x10
[   15.165370]  ret_from_fork+0x41/0x80
[   15.165392]  ? __pfx_kthread+0x10/0x10
[   15.165414]  ret_from_fork_asm+0x1a/0x30
[   15.165447]  </TASK>
[   15.165458] 
[   15.181967] Allocated by task 285:
[   15.182525]  kasan_save_stack+0x45/0x70
[   15.182911]  kasan_save_track+0x18/0x40
[   15.183480]  kasan_save_alloc_info+0x3b/0x50
[   15.184011]  __kasan_kmalloc+0xb7/0xc0
[   15.184531]  __kmalloc_cache_noprof+0x189/0x420
[   15.185136]  kasan_atomics+0x95/0x310
[   15.185645]  kunit_try_run_case+0x1a5/0x480
[   15.186040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.186762]  kthread+0x337/0x6f0
[   15.187193]  ret_from_fork+0x41/0x80
[   15.187345]  ret_from_fork_asm+0x1a/0x30
[   15.187488] 
[   15.187561] The buggy address belongs to the object at ffff888102b4cd00
[   15.187561]  which belongs to the cache kmalloc-64 of size 64
[   15.187916] The buggy address is located 0 bytes to the right of
[   15.187916]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.189175] 
[   15.189559] The buggy address belongs to the physical page:
[   15.190262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.191208] flags: 0x200000000000000(node=0|zone=2)
[   15.191846] page_type: f5(slab)
[   15.192267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.193196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.193454] page dumped because: kasan: bad access detected
[   15.193626] 
[   15.193697] Memory state around the buggy address:
[   15.193861]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.194079]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.195827] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.196698]                                      ^
[   15.198018]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.198705]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199034] ==================================================================
[   14.918491] ==================================================================
[   14.918783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.919045] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.919431] 
[   14.919539] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.919582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.919594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.919615] Call Trace:
[   14.919630]  <TASK>
[   14.919645]  dump_stack_lvl+0x73/0xb0
[   14.919669]  print_report+0xd1/0x650
[   14.919693]  ? __virt_addr_valid+0x1db/0x2d0
[   14.919715]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.919737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.919761]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.919784]  kasan_report+0x141/0x180
[   14.919808]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.919837]  kasan_check_range+0x10c/0x1c0
[   14.919862]  __kasan_check_write+0x18/0x20
[   14.919883]  kasan_atomics_helper+0x1a7f/0x5450
[   14.919908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.919931]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.919955]  ? kasan_atomics+0x152/0x310
[   14.919980]  kasan_atomics+0x1dc/0x310
[   14.920001]  ? __pfx_kasan_atomics+0x10/0x10
[   14.920024]  ? __pfx_read_tsc+0x10/0x10
[   14.920044]  ? ktime_get_ts64+0x86/0x230
[   14.920071]  kunit_try_run_case+0x1a5/0x480
[   14.920095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.920163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.920189]  ? __kthread_parkme+0x82/0x180
[   14.920211]  ? preempt_count_sub+0x50/0x80
[   14.920237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.920261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.920308]  kthread+0x337/0x6f0
[   14.920339]  ? trace_preempt_on+0x20/0xc0
[   14.920362]  ? __pfx_kthread+0x10/0x10
[   14.920384]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.920408]  ? calculate_sigpending+0x7b/0xa0
[   14.920430]  ? __pfx_kthread+0x10/0x10
[   14.920453]  ret_from_fork+0x41/0x80
[   14.920475]  ? __pfx_kthread+0x10/0x10
[   14.920498]  ret_from_fork_asm+0x1a/0x30
[   14.920531]  </TASK>
[   14.920542] 
[   14.927675] Allocated by task 285:
[   14.927804]  kasan_save_stack+0x45/0x70
[   14.927948]  kasan_save_track+0x18/0x40
[   14.928082]  kasan_save_alloc_info+0x3b/0x50
[   14.928250]  __kasan_kmalloc+0xb7/0xc0
[   14.928393]  __kmalloc_cache_noprof+0x189/0x420
[   14.928570]  kasan_atomics+0x95/0x310
[   14.928753]  kunit_try_run_case+0x1a5/0x480
[   14.928959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.929227]  kthread+0x337/0x6f0
[   14.929405]  ret_from_fork+0x41/0x80
[   14.929591]  ret_from_fork_asm+0x1a/0x30
[   14.929787] 
[   14.929880] The buggy address belongs to the object at ffff888102b4cd00
[   14.929880]  which belongs to the cache kmalloc-64 of size 64
[   14.930433] The buggy address is located 0 bytes to the right of
[   14.930433]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.930971] 
[   14.931064] The buggy address belongs to the physical page:
[   14.931308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.931556] flags: 0x200000000000000(node=0|zone=2)
[   14.931715] page_type: f5(slab)
[   14.931874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.932242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.932589] page dumped because: kasan: bad access detected
[   14.932812] 
[   14.932895] Memory state around the buggy address:
[   14.933092]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.933385]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.933687] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.933985]                                      ^
[   14.934216]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934500]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934792] ==================================================================
[   14.935677] ==================================================================
[   14.937455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.937781] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.938007] 
[   14.939360] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.939419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.939434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.939456] Call Trace:
[   14.939474]  <TASK>
[   14.939492]  dump_stack_lvl+0x73/0xb0
[   14.939520]  print_report+0xd1/0x650
[   14.939546]  ? __virt_addr_valid+0x1db/0x2d0
[   14.939569]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.939592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.939616]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.939640]  kasan_report+0x141/0x180
[   14.939663]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.939692]  kasan_check_range+0x10c/0x1c0
[   14.939717]  __kasan_check_write+0x18/0x20
[   14.939738]  kasan_atomics_helper+0x1b22/0x5450
[   14.939763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.939787]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.939810]  ? kasan_atomics+0x152/0x310
[   14.939835]  kasan_atomics+0x1dc/0x310
[   14.939856]  ? __pfx_kasan_atomics+0x10/0x10
[   14.939879]  ? __pfx_read_tsc+0x10/0x10
[   14.939899]  ? ktime_get_ts64+0x86/0x230
[   14.939926]  kunit_try_run_case+0x1a5/0x480
[   14.939951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.939973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.939998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.940023]  ? __kthread_parkme+0x82/0x180
[   14.940045]  ? preempt_count_sub+0x50/0x80
[   14.940070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.940118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.940144]  kthread+0x337/0x6f0
[   14.940165]  ? trace_preempt_on+0x20/0xc0
[   14.940190]  ? __pfx_kthread+0x10/0x10
[   14.940213]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.940235]  ? calculate_sigpending+0x7b/0xa0
[   14.940258]  ? __pfx_kthread+0x10/0x10
[   14.940282]  ret_from_fork+0x41/0x80
[   14.940303]  ? __pfx_kthread+0x10/0x10
[   14.940335]  ret_from_fork_asm+0x1a/0x30
[   14.940369]  </TASK>
[   14.940380] 
[   14.955095] Allocated by task 285:
[   14.955410]  kasan_save_stack+0x45/0x70
[   14.955615]  kasan_save_track+0x18/0x40
[   14.955860]  kasan_save_alloc_info+0x3b/0x50
[   14.956061]  __kasan_kmalloc+0xb7/0xc0
[   14.956197]  __kmalloc_cache_noprof+0x189/0x420
[   14.956361]  kasan_atomics+0x95/0x310
[   14.956495]  kunit_try_run_case+0x1a5/0x480
[   14.956907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.957416]  kthread+0x337/0x6f0
[   14.957644]  ret_from_fork+0x41/0x80
[   14.957827]  ret_from_fork_asm+0x1a/0x30
[   14.958078] 
[   14.958317] The buggy address belongs to the object at ffff888102b4cd00
[   14.958317]  which belongs to the cache kmalloc-64 of size 64
[   14.958787] The buggy address is located 0 bytes to the right of
[   14.958787]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.959485] 
[   14.959808] The buggy address belongs to the physical page:
[   14.960528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.960847] flags: 0x200000000000000(node=0|zone=2)
[   14.961199] page_type: f5(slab)
[   14.961341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.961574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.961808] page dumped because: kasan: bad access detected
[   14.961979] 
[   14.962050] Memory state around the buggy address:
[   14.962223]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.962705]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.963344] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.963690]                                      ^
[   14.963924]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964479]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964865] ==================================================================
[   13.952813] ==================================================================
[   13.953204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.953479] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   13.954236] 
[   13.954524] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   13.954572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.954596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.954616] Call Trace:
[   13.954627]  <TASK>
[   13.954644]  dump_stack_lvl+0x73/0xb0
[   13.954668]  print_report+0xd1/0x650
[   13.954732]  ? __virt_addr_valid+0x1db/0x2d0
[   13.954753]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.954775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.954819]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.954842]  kasan_report+0x141/0x180
[   13.954864]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.954902]  __asan_report_store4_noabort+0x1b/0x30
[   13.954924]  kasan_atomics_helper+0x4ba2/0x5450
[   13.954946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.954969]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.954991]  ? kasan_atomics+0x152/0x310
[   13.955013]  kasan_atomics+0x1dc/0x310
[   13.955032]  ? __pfx_kasan_atomics+0x10/0x10
[   13.955053]  ? __pfx_read_tsc+0x10/0x10
[   13.955072]  ? ktime_get_ts64+0x86/0x230
[   13.955097]  kunit_try_run_case+0x1a5/0x480
[   13.955120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.955175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.955198]  ? __kthread_parkme+0x82/0x180
[   13.955219]  ? preempt_count_sub+0x50/0x80
[   13.955244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.955289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.955312]  kthread+0x337/0x6f0
[   13.955342]  ? trace_preempt_on+0x20/0xc0
[   13.955366]  ? __pfx_kthread+0x10/0x10
[   13.955387]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.955408]  ? calculate_sigpending+0x7b/0xa0
[   13.955430]  ? __pfx_kthread+0x10/0x10
[   13.955452]  ret_from_fork+0x41/0x80
[   13.955473]  ? __pfx_kthread+0x10/0x10
[   13.955494]  ret_from_fork_asm+0x1a/0x30
[   13.955526]  </TASK>
[   13.955537] 
[   13.964499] Allocated by task 285:
[   13.964861]  kasan_save_stack+0x45/0x70
[   13.965234]  kasan_save_track+0x18/0x40
[   13.965562]  kasan_save_alloc_info+0x3b/0x50
[   13.965899]  __kasan_kmalloc+0xb7/0xc0
[   13.966234]  __kmalloc_cache_noprof+0x189/0x420
[   13.966574]  kasan_atomics+0x95/0x310
[   13.966869]  kunit_try_run_case+0x1a5/0x480
[   13.967074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.967543]  kthread+0x337/0x6f0
[   13.967845]  ret_from_fork+0x41/0x80
[   13.968157]  ret_from_fork_asm+0x1a/0x30
[   13.968496] 
[   13.968723] The buggy address belongs to the object at ffff888102b4cd00
[   13.968723]  which belongs to the cache kmalloc-64 of size 64
[   13.969486] The buggy address is located 0 bytes to the right of
[   13.969486]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   13.970311] 
[   13.970438] The buggy address belongs to the physical page:
[   13.970795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   13.971303] flags: 0x200000000000000(node=0|zone=2)
[   13.971695] page_type: f5(slab)
[   13.971843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.972415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.972885] page dumped because: kasan: bad access detected
[   13.973304] 
[   13.973534] Memory state around the buggy address:
[   13.973734]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.974022]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.974581] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.975020]                                      ^
[   13.975415]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.975823]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.976280] ==================================================================
[   15.047921] ==================================================================
[   15.048271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.048633] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.048910] 
[   15.048992] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.049034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.049047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.049068] Call Trace:
[   15.049082]  <TASK>
[   15.049095]  dump_stack_lvl+0x73/0xb0
[   15.049119]  print_report+0xd1/0x650
[   15.049177]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049200]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.049223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049247]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.049271]  kasan_report+0x141/0x180
[   15.049294]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.049334]  kasan_check_range+0x10c/0x1c0
[   15.049360]  __kasan_check_write+0x18/0x20
[   15.049381]  kasan_atomics_helper+0x1e12/0x5450
[   15.049406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.049430]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.049453]  ? kasan_atomics+0x152/0x310
[   15.049477]  kasan_atomics+0x1dc/0x310
[   15.049498]  ? __pfx_kasan_atomics+0x10/0x10
[   15.049519]  ? __pfx_read_tsc+0x10/0x10
[   15.049540]  ? ktime_get_ts64+0x86/0x230
[   15.049566]  kunit_try_run_case+0x1a5/0x480
[   15.049590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.049637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.049662]  ? __kthread_parkme+0x82/0x180
[   15.049684]  ? preempt_count_sub+0x50/0x80
[   15.049710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049788]  kthread+0x337/0x6f0
[   15.049810]  ? trace_preempt_on+0x20/0xc0
[   15.049833]  ? __pfx_kthread+0x10/0x10
[   15.049856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049895]  ? calculate_sigpending+0x7b/0xa0
[   15.049918]  ? __pfx_kthread+0x10/0x10
[   15.049941]  ret_from_fork+0x41/0x80
[   15.049963]  ? __pfx_kthread+0x10/0x10
[   15.049986]  ret_from_fork_asm+0x1a/0x30
[   15.050019]  </TASK>
[   15.050030] 
[   15.057557] Allocated by task 285:
[   15.057849]  kasan_save_stack+0x45/0x70
[   15.058055]  kasan_save_track+0x18/0x40
[   15.058268]  kasan_save_alloc_info+0x3b/0x50
[   15.058547]  __kasan_kmalloc+0xb7/0xc0
[   15.058705]  __kmalloc_cache_noprof+0x189/0x420
[   15.058925]  kasan_atomics+0x95/0x310
[   15.059108]  kunit_try_run_case+0x1a5/0x480
[   15.059339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.059583]  kthread+0x337/0x6f0
[   15.059739]  ret_from_fork+0x41/0x80
[   15.059912]  ret_from_fork_asm+0x1a/0x30
[   15.060051] 
[   15.060122] The buggy address belongs to the object at ffff888102b4cd00
[   15.060122]  which belongs to the cache kmalloc-64 of size 64
[   15.060686] The buggy address is located 0 bytes to the right of
[   15.060686]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.061406] 
[   15.061479] The buggy address belongs to the physical page:
[   15.061645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.062109] flags: 0x200000000000000(node=0|zone=2)
[   15.062365] page_type: f5(slab)
[   15.062532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.062886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.063224] page dumped because: kasan: bad access detected
[   15.063898] 
[   15.064064] Memory state around the buggy address:
[   15.064634]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.064851]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.065060] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.065627]                                      ^
[   15.066057]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.066690]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067341] ==================================================================
[   15.106305] ==================================================================
[   15.106690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.107172] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.107507] 
[   15.107591] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.107633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.107645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.107666] Call Trace:
[   15.107681]  <TASK>
[   15.107696]  dump_stack_lvl+0x73/0xb0
[   15.107719]  print_report+0xd1/0x650
[   15.107742]  ? __virt_addr_valid+0x1db/0x2d0
[   15.107764]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.107786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.107809]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.107832]  kasan_report+0x141/0x180
[   15.107854]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.107880]  __asan_report_load8_noabort+0x18/0x20
[   15.107903]  kasan_atomics_helper+0x4f71/0x5450
[   15.107927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.107951]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.107973]  ? kasan_atomics+0x152/0x310
[   15.107996]  kasan_atomics+0x1dc/0x310
[   15.108015]  ? __pfx_kasan_atomics+0x10/0x10
[   15.108036]  ? __pfx_read_tsc+0x10/0x10
[   15.108056]  ? ktime_get_ts64+0x86/0x230
[   15.108082]  kunit_try_run_case+0x1a5/0x480
[   15.108107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.108166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.108191]  ? __kthread_parkme+0x82/0x180
[   15.108238]  ? preempt_count_sub+0x50/0x80
[   15.108264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.108313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.108348]  kthread+0x337/0x6f0
[   15.108370]  ? trace_preempt_on+0x20/0xc0
[   15.108395]  ? __pfx_kthread+0x10/0x10
[   15.108418]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.108441]  ? calculate_sigpending+0x7b/0xa0
[   15.108467]  ? __pfx_kthread+0x10/0x10
[   15.108492]  ret_from_fork+0x41/0x80
[   15.108514]  ? __pfx_kthread+0x10/0x10
[   15.108556]  ret_from_fork_asm+0x1a/0x30
[   15.108589]  </TASK>
[   15.108601] 
[   15.115817] Allocated by task 285:
[   15.116000]  kasan_save_stack+0x45/0x70
[   15.116203]  kasan_save_track+0x18/0x40
[   15.116374]  kasan_save_alloc_info+0x3b/0x50
[   15.116524]  __kasan_kmalloc+0xb7/0xc0
[   15.116741]  __kmalloc_cache_noprof+0x189/0x420
[   15.116965]  kasan_atomics+0x95/0x310
[   15.117147]  kunit_try_run_case+0x1a5/0x480
[   15.117309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.117499]  kthread+0x337/0x6f0
[   15.117671]  ret_from_fork+0x41/0x80
[   15.117882]  ret_from_fork_asm+0x1a/0x30
[   15.118117] 
[   15.118217] The buggy address belongs to the object at ffff888102b4cd00
[   15.118217]  which belongs to the cache kmalloc-64 of size 64
[   15.118610] The buggy address is located 0 bytes to the right of
[   15.118610]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.119036] 
[   15.119129] The buggy address belongs to the physical page:
[   15.119390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.119914] flags: 0x200000000000000(node=0|zone=2)
[   15.120185] page_type: f5(slab)
[   15.120305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.120542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.120935] page dumped because: kasan: bad access detected
[   15.121247] 
[   15.121371] Memory state around the buggy address:
[   15.121603]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.121934]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.122198] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.122486]                                      ^
[   15.122708]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122977]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123317] ==================================================================
[   14.053734] ==================================================================
[   14.054087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.054810] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.055035] 
[   14.055193] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.055239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.055252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.055273] Call Trace:
[   14.055287]  <TASK>
[   14.055302]  dump_stack_lvl+0x73/0xb0
[   14.055340]  print_report+0xd1/0x650
[   14.055363]  ? __virt_addr_valid+0x1db/0x2d0
[   14.055385]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.055407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.055431]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.055454]  kasan_report+0x141/0x180
[   14.055477]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.055527]  __asan_report_load4_noabort+0x18/0x20
[   14.055549]  kasan_atomics_helper+0x4b54/0x5450
[   14.055573]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.055596]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.055619]  ? kasan_atomics+0x152/0x310
[   14.055643]  kasan_atomics+0x1dc/0x310
[   14.055664]  ? __pfx_kasan_atomics+0x10/0x10
[   14.055704]  ? __pfx_read_tsc+0x10/0x10
[   14.055724]  ? ktime_get_ts64+0x86/0x230
[   14.055750]  kunit_try_run_case+0x1a5/0x480
[   14.055774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.055796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.055820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.055864]  ? __kthread_parkme+0x82/0x180
[   14.055886]  ? preempt_count_sub+0x50/0x80
[   14.055911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.055935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.055958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.055982]  kthread+0x337/0x6f0
[   14.056003]  ? trace_preempt_on+0x20/0xc0
[   14.056028]  ? __pfx_kthread+0x10/0x10
[   14.056050]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.056073]  ? calculate_sigpending+0x7b/0xa0
[   14.056095]  ? __pfx_kthread+0x10/0x10
[   14.056119]  ret_from_fork+0x41/0x80
[   14.056141]  ? __pfx_kthread+0x10/0x10
[   14.056173]  ret_from_fork_asm+0x1a/0x30
[   14.056225]  </TASK>
[   14.056237] 
[   14.063720] Allocated by task 285:
[   14.063862]  kasan_save_stack+0x45/0x70
[   14.064073]  kasan_save_track+0x18/0x40
[   14.064434]  kasan_save_alloc_info+0x3b/0x50
[   14.064636]  __kasan_kmalloc+0xb7/0xc0
[   14.064785]  __kmalloc_cache_noprof+0x189/0x420
[   14.065022]  kasan_atomics+0x95/0x310
[   14.065252]  kunit_try_run_case+0x1a5/0x480
[   14.065444]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.065683]  kthread+0x337/0x6f0
[   14.065863]  ret_from_fork+0x41/0x80
[   14.066005]  ret_from_fork_asm+0x1a/0x30
[   14.066145] 
[   14.066242] The buggy address belongs to the object at ffff888102b4cd00
[   14.066242]  which belongs to the cache kmalloc-64 of size 64
[   14.066789] The buggy address is located 0 bytes to the right of
[   14.066789]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.067231] 
[   14.067348] The buggy address belongs to the physical page:
[   14.067600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.067950] flags: 0x200000000000000(node=0|zone=2)
[   14.068190] page_type: f5(slab)
[   14.068332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.068645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.068943] page dumped because: kasan: bad access detected
[   14.069185] 
[   14.069259] Memory state around the buggy address:
[   14.069425]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.069692]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.070008] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.070467]                                      ^
[   14.070625]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.070841]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.071103] ==================================================================
[   14.260982] ==================================================================
[   14.261313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.261685] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.261951] 
[   14.262061] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.262104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.262116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.262487] Call Trace:
[   14.262512]  <TASK>
[   14.262529]  dump_stack_lvl+0x73/0xb0
[   14.262557]  print_report+0xd1/0x650
[   14.262581]  ? __virt_addr_valid+0x1db/0x2d0
[   14.262605]  ? kasan_atomics_helper+0x992/0x5450
[   14.262628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.262655]  ? kasan_atomics_helper+0x992/0x5450
[   14.262679]  kasan_report+0x141/0x180
[   14.262704]  ? kasan_atomics_helper+0x992/0x5450
[   14.262733]  kasan_check_range+0x10c/0x1c0
[   14.262758]  __kasan_check_write+0x18/0x20
[   14.262779]  kasan_atomics_helper+0x992/0x5450
[   14.262804]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.262827]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.262851]  ? kasan_atomics+0x152/0x310
[   14.262876]  kasan_atomics+0x1dc/0x310
[   14.262895]  ? __pfx_kasan_atomics+0x10/0x10
[   14.262917]  ? __pfx_read_tsc+0x10/0x10
[   14.262938]  ? ktime_get_ts64+0x86/0x230
[   14.262965]  kunit_try_run_case+0x1a5/0x480
[   14.262990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.263013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.263041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.263069]  ? __kthread_parkme+0x82/0x180
[   14.263091]  ? preempt_count_sub+0x50/0x80
[   14.263116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.263153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.263177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.263201]  kthread+0x337/0x6f0
[   14.263222]  ? trace_preempt_on+0x20/0xc0
[   14.263248]  ? __pfx_kthread+0x10/0x10
[   14.263270]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.263293]  ? calculate_sigpending+0x7b/0xa0
[   14.263315]  ? __pfx_kthread+0x10/0x10
[   14.263351]  ret_from_fork+0x41/0x80
[   14.263373]  ? __pfx_kthread+0x10/0x10
[   14.263396]  ret_from_fork_asm+0x1a/0x30
[   14.263429]  </TASK>
[   14.263441] 
[   14.273092] Allocated by task 285:
[   14.273687]  kasan_save_stack+0x45/0x70
[   14.273994]  kasan_save_track+0x18/0x40
[   14.274220]  kasan_save_alloc_info+0x3b/0x50
[   14.274514]  __kasan_kmalloc+0xb7/0xc0
[   14.274834]  __kmalloc_cache_noprof+0x189/0x420
[   14.275056]  kasan_atomics+0x95/0x310
[   14.275362]  kunit_try_run_case+0x1a5/0x480
[   14.275711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.275977]  kthread+0x337/0x6f0
[   14.276266]  ret_from_fork+0x41/0x80
[   14.276480]  ret_from_fork_asm+0x1a/0x30
[   14.276800] 
[   14.276901] The buggy address belongs to the object at ffff888102b4cd00
[   14.276901]  which belongs to the cache kmalloc-64 of size 64
[   14.277644] The buggy address is located 0 bytes to the right of
[   14.277644]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.278148] 
[   14.278404] The buggy address belongs to the physical page:
[   14.278701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.279089] flags: 0x200000000000000(node=0|zone=2)
[   14.279335] page_type: f5(slab)
[   14.279625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.280018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.280557] page dumped because: kasan: bad access detected
[   14.280874] 
[   14.280972] Memory state around the buggy address:
[   14.281349]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.281691]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.281966] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.282476]                                      ^
[   14.282826]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.283125]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.283598] ==================================================================
[   14.179935] ==================================================================
[   14.180334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.180677] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.180975] 
[   14.181061] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.181106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.181502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.181527] Call Trace:
[   14.181541]  <TASK>
[   14.181556]  dump_stack_lvl+0x73/0xb0
[   14.181584]  print_report+0xd1/0x650
[   14.181608]  ? __virt_addr_valid+0x1db/0x2d0
[   14.181631]  ? kasan_atomics_helper+0x72f/0x5450
[   14.181653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.181677]  ? kasan_atomics_helper+0x72f/0x5450
[   14.181700]  kasan_report+0x141/0x180
[   14.181723]  ? kasan_atomics_helper+0x72f/0x5450
[   14.181752]  kasan_check_range+0x10c/0x1c0
[   14.181781]  __kasan_check_write+0x18/0x20
[   14.181803]  kasan_atomics_helper+0x72f/0x5450
[   14.181827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.181851]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.181875]  ? kasan_atomics+0x152/0x310
[   14.181900]  kasan_atomics+0x1dc/0x310
[   14.181920]  ? __pfx_kasan_atomics+0x10/0x10
[   14.181942]  ? __pfx_read_tsc+0x10/0x10
[   14.181963]  ? ktime_get_ts64+0x86/0x230
[   14.181990]  kunit_try_run_case+0x1a5/0x480
[   14.182015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.182062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.182087]  ? __kthread_parkme+0x82/0x180
[   14.182131]  ? preempt_count_sub+0x50/0x80
[   14.182158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.182207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.182230]  kthread+0x337/0x6f0
[   14.182252]  ? trace_preempt_on+0x20/0xc0
[   14.182277]  ? __pfx_kthread+0x10/0x10
[   14.182299]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.182331]  ? calculate_sigpending+0x7b/0xa0
[   14.182353]  ? __pfx_kthread+0x10/0x10
[   14.182376]  ret_from_fork+0x41/0x80
[   14.182398]  ? __pfx_kthread+0x10/0x10
[   14.182421]  ret_from_fork_asm+0x1a/0x30
[   14.182454]  </TASK>
[   14.182465] 
[   14.189663] Allocated by task 285:
[   14.189851]  kasan_save_stack+0x45/0x70
[   14.190052]  kasan_save_track+0x18/0x40
[   14.190270]  kasan_save_alloc_info+0x3b/0x50
[   14.190485]  __kasan_kmalloc+0xb7/0xc0
[   14.190670]  __kmalloc_cache_noprof+0x189/0x420
[   14.190870]  kasan_atomics+0x95/0x310
[   14.191031]  kunit_try_run_case+0x1a5/0x480
[   14.191203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.191390]  kthread+0x337/0x6f0
[   14.191555]  ret_from_fork+0x41/0x80
[   14.191737]  ret_from_fork_asm+0x1a/0x30
[   14.191931] 
[   14.192027] The buggy address belongs to the object at ffff888102b4cd00
[   14.192027]  which belongs to the cache kmalloc-64 of size 64
[   14.192543] The buggy address is located 0 bytes to the right of
[   14.192543]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.192921] 
[   14.192993] The buggy address belongs to the physical page:
[   14.193213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.193577] flags: 0x200000000000000(node=0|zone=2)
[   14.193818] page_type: f5(slab)
[   14.193984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.194372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.194703] page dumped because: kasan: bad access detected
[   14.194912] 
[   14.194982] Memory state around the buggy address:
[   14.195190]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.195517]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.195814] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.196050]                                      ^
[   14.196304]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.196597]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.196876] ==================================================================
[   15.234644] ==================================================================
[   15.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.235826] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.236646] 
[   15.236933] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.236984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.236998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.237020] Call Trace:
[   15.237037]  <TASK>
[   15.237055]  dump_stack_lvl+0x73/0xb0
[   15.237082]  print_report+0xd1/0x650
[   15.237105]  ? __virt_addr_valid+0x1db/0x2d0
[   15.237140]  ? kasan_atomics_helper+0x218a/0x5450
[   15.237162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.237185]  ? kasan_atomics_helper+0x218a/0x5450
[   15.237241]  kasan_report+0x141/0x180
[   15.237264]  ? kasan_atomics_helper+0x218a/0x5450
[   15.237390]  kasan_check_range+0x10c/0x1c0
[   15.237423]  __kasan_check_write+0x18/0x20
[   15.237444]  kasan_atomics_helper+0x218a/0x5450
[   15.237469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.237493]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.237517]  ? kasan_atomics+0x152/0x310
[   15.237541]  kasan_atomics+0x1dc/0x310
[   15.237562]  ? __pfx_kasan_atomics+0x10/0x10
[   15.237584]  ? __pfx_read_tsc+0x10/0x10
[   15.237605]  ? ktime_get_ts64+0x86/0x230
[   15.237631]  kunit_try_run_case+0x1a5/0x480
[   15.237656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.237678]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.237702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.237727]  ? __kthread_parkme+0x82/0x180
[   15.237751]  ? preempt_count_sub+0x50/0x80
[   15.237784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.237808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.237832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.237856]  kthread+0x337/0x6f0
[   15.237877]  ? trace_preempt_on+0x20/0xc0
[   15.237901]  ? __pfx_kthread+0x10/0x10
[   15.237924]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.237948]  ? calculate_sigpending+0x7b/0xa0
[   15.237970]  ? __pfx_kthread+0x10/0x10
[   15.237994]  ret_from_fork+0x41/0x80
[   15.238014]  ? __pfx_kthread+0x10/0x10
[   15.238039]  ret_from_fork_asm+0x1a/0x30
[   15.238071]  </TASK>
[   15.238083] 
[   15.251237] Allocated by task 285:
[   15.251777]  kasan_save_stack+0x45/0x70
[   15.251959]  kasan_save_track+0x18/0x40
[   15.252450]  kasan_save_alloc_info+0x3b/0x50
[   15.252660]  __kasan_kmalloc+0xb7/0xc0
[   15.252968]  __kmalloc_cache_noprof+0x189/0x420
[   15.253349]  kasan_atomics+0x95/0x310
[   15.253550]  kunit_try_run_case+0x1a5/0x480
[   15.253894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.254249]  kthread+0x337/0x6f0
[   15.254471]  ret_from_fork+0x41/0x80
[   15.254763]  ret_from_fork_asm+0x1a/0x30
[   15.254991] 
[   15.255246] The buggy address belongs to the object at ffff888102b4cd00
[   15.255246]  which belongs to the cache kmalloc-64 of size 64
[   15.255981] The buggy address is located 0 bytes to the right of
[   15.255981]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.256496] 
[   15.256595] The buggy address belongs to the physical page:
[   15.256856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.257203] flags: 0x200000000000000(node=0|zone=2)
[   15.257395] page_type: f5(slab)
[   15.257568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.257948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.258255] page dumped because: kasan: bad access detected
[   15.258478] 
[   15.258817] Memory state around the buggy address:
[   15.259010]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.259536]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.259904] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.260166]                                      ^
[   15.260540]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260954]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261331] ==================================================================
[   14.901658] ==================================================================
[   14.902006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.902426] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.902745] 
[   14.902842] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.902887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.902900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.902920] Call Trace:
[   14.902937]  <TASK>
[   14.902952]  dump_stack_lvl+0x73/0xb0
[   14.902977]  print_report+0xd1/0x650
[   14.903000]  ? __virt_addr_valid+0x1db/0x2d0
[   14.903023]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.903046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.903069]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.903095]  kasan_report+0x141/0x180
[   14.903142]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.903171]  kasan_check_range+0x10c/0x1c0
[   14.903196]  __kasan_check_write+0x18/0x20
[   14.903217]  kasan_atomics_helper+0x19e3/0x5450
[   14.903241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.903266]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.903289]  ? kasan_atomics+0x152/0x310
[   14.903314]  kasan_atomics+0x1dc/0x310
[   14.903345]  ? __pfx_kasan_atomics+0x10/0x10
[   14.903367]  ? __pfx_read_tsc+0x10/0x10
[   14.903387]  ? ktime_get_ts64+0x86/0x230
[   14.903414]  kunit_try_run_case+0x1a5/0x480
[   14.903439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.903461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.903485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.903510]  ? __kthread_parkme+0x82/0x180
[   14.903534]  ? preempt_count_sub+0x50/0x80
[   14.903560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.903584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.903607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.903631]  kthread+0x337/0x6f0
[   14.903652]  ? trace_preempt_on+0x20/0xc0
[   14.903675]  ? __pfx_kthread+0x10/0x10
[   14.903699]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.903721]  ? calculate_sigpending+0x7b/0xa0
[   14.903743]  ? __pfx_kthread+0x10/0x10
[   14.903766]  ret_from_fork+0x41/0x80
[   14.903788]  ? __pfx_kthread+0x10/0x10
[   14.903811]  ret_from_fork_asm+0x1a/0x30
[   14.903844]  </TASK>
[   14.903854] 
[   14.910982] Allocated by task 285:
[   14.911127]  kasan_save_stack+0x45/0x70
[   14.911336]  kasan_save_track+0x18/0x40
[   14.911512]  kasan_save_alloc_info+0x3b/0x50
[   14.911657]  __kasan_kmalloc+0xb7/0xc0
[   14.911791]  __kmalloc_cache_noprof+0x189/0x420
[   14.911941]  kasan_atomics+0x95/0x310
[   14.912068]  kunit_try_run_case+0x1a5/0x480
[   14.912238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912430]  kthread+0x337/0x6f0
[   14.912604]  ret_from_fork+0x41/0x80
[   14.912784]  ret_from_fork_asm+0x1a/0x30
[   14.912978] 
[   14.913071] The buggy address belongs to the object at ffff888102b4cd00
[   14.913071]  which belongs to the cache kmalloc-64 of size 64
[   14.913615] The buggy address is located 0 bytes to the right of
[   14.913615]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.914054] 
[   14.914148] The buggy address belongs to the physical page:
[   14.914319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.914565] flags: 0x200000000000000(node=0|zone=2)
[   14.914792] page_type: f5(slab)
[   14.914964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.915335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.915678] page dumped because: kasan: bad access detected
[   14.915933] 
[   14.916025] Memory state around the buggy address:
[   14.916274]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.916550]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.916832] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.917187]                                      ^
[   14.917391]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917664]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917941] ==================================================================
[   14.609200] ==================================================================
[   14.609710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.610024] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.610447] 
[   14.610539] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.610607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.610795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.610819] Call Trace:
[   14.610836]  <TASK>
[   14.610854]  dump_stack_lvl+0x73/0xb0
[   14.610880]  print_report+0xd1/0x650
[   14.610904]  ? __virt_addr_valid+0x1db/0x2d0
[   14.610927]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.610952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.610976]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.610999]  kasan_report+0x141/0x180
[   14.611023]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.611052]  __asan_report_load4_noabort+0x18/0x20
[   14.611073]  kasan_atomics_helper+0x49e8/0x5450
[   14.611098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.611183]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.611210]  ? kasan_atomics+0x152/0x310
[   14.611234]  kasan_atomics+0x1dc/0x310
[   14.611255]  ? __pfx_kasan_atomics+0x10/0x10
[   14.611277]  ? __pfx_read_tsc+0x10/0x10
[   14.611298]  ? ktime_get_ts64+0x86/0x230
[   14.611338]  kunit_try_run_case+0x1a5/0x480
[   14.611363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.611412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.611437]  ? __kthread_parkme+0x82/0x180
[   14.611460]  ? preempt_count_sub+0x50/0x80
[   14.611485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.611509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.611533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.611556]  kthread+0x337/0x6f0
[   14.611577]  ? trace_preempt_on+0x20/0xc0
[   14.611602]  ? __pfx_kthread+0x10/0x10
[   14.611625]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.611647]  ? calculate_sigpending+0x7b/0xa0
[   14.611670]  ? __pfx_kthread+0x10/0x10
[   14.611693]  ret_from_fork+0x41/0x80
[   14.611715]  ? __pfx_kthread+0x10/0x10
[   14.611738]  ret_from_fork_asm+0x1a/0x30
[   14.611772]  </TASK>
[   14.611784] 
[   14.621484] Allocated by task 285:
[   14.621639]  kasan_save_stack+0x45/0x70
[   14.621968]  kasan_save_track+0x18/0x40
[   14.622282]  kasan_save_alloc_info+0x3b/0x50
[   14.622601]  __kasan_kmalloc+0xb7/0xc0
[   14.622877]  __kmalloc_cache_noprof+0x189/0x420
[   14.623055]  kasan_atomics+0x95/0x310
[   14.623464]  kunit_try_run_case+0x1a5/0x480
[   14.623632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.623993]  kthread+0x337/0x6f0
[   14.624314]  ret_from_fork+0x41/0x80
[   14.624609]  ret_from_fork_asm+0x1a/0x30
[   14.624878] 
[   14.624966] The buggy address belongs to the object at ffff888102b4cd00
[   14.624966]  which belongs to the cache kmalloc-64 of size 64
[   14.625771] The buggy address is located 0 bytes to the right of
[   14.625771]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.626571] 
[   14.626665] The buggy address belongs to the physical page:
[   14.626900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.627392] flags: 0x200000000000000(node=0|zone=2)
[   14.627674] page_type: f5(slab)
[   14.627808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.628338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.628766] page dumped because: kasan: bad access detected
[   14.629079] 
[   14.629222] Memory state around the buggy address:
[   14.629460]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.629771]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.630093] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.630499]                                      ^
[   14.630730]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.631003]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.631303] ==================================================================
[   14.214646] ==================================================================
[   14.214991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.215610] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.215908] 
[   14.215993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.216037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.216050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.216071] Call Trace:
[   14.216085]  <TASK>
[   14.216099]  dump_stack_lvl+0x73/0xb0
[   14.216148]  print_report+0xd1/0x650
[   14.216171]  ? __virt_addr_valid+0x1db/0x2d0
[   14.216193]  ? kasan_atomics_helper+0x860/0x5450
[   14.216215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.216239]  ? kasan_atomics_helper+0x860/0x5450
[   14.216262]  kasan_report+0x141/0x180
[   14.216287]  ? kasan_atomics_helper+0x860/0x5450
[   14.216316]  kasan_check_range+0x10c/0x1c0
[   14.216349]  __kasan_check_write+0x18/0x20
[   14.216371]  kasan_atomics_helper+0x860/0x5450
[   14.216394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.216418]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.216441]  ? kasan_atomics+0x152/0x310
[   14.216466]  kasan_atomics+0x1dc/0x310
[   14.216486]  ? __pfx_kasan_atomics+0x10/0x10
[   14.216508]  ? __pfx_read_tsc+0x10/0x10
[   14.216528]  ? ktime_get_ts64+0x86/0x230
[   14.216554]  kunit_try_run_case+0x1a5/0x480
[   14.216579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.216602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.216626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.216651]  ? __kthread_parkme+0x82/0x180
[   14.216673]  ? preempt_count_sub+0x50/0x80
[   14.216699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.216723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.216770]  kthread+0x337/0x6f0
[   14.216792]  ? trace_preempt_on+0x20/0xc0
[   14.216817]  ? __pfx_kthread+0x10/0x10
[   14.216840]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.216863]  ? calculate_sigpending+0x7b/0xa0
[   14.216885]  ? __pfx_kthread+0x10/0x10
[   14.216909]  ret_from_fork+0x41/0x80
[   14.216931]  ? __pfx_kthread+0x10/0x10
[   14.216954]  ret_from_fork_asm+0x1a/0x30
[   14.216987]  </TASK>
[   14.216998] 
[   14.226536] Allocated by task 285:
[   14.226863]  kasan_save_stack+0x45/0x70
[   14.227019]  kasan_save_track+0x18/0x40
[   14.227236]  kasan_save_alloc_info+0x3b/0x50
[   14.227586]  __kasan_kmalloc+0xb7/0xc0
[   14.227841]  __kmalloc_cache_noprof+0x189/0x420
[   14.228018]  kasan_atomics+0x95/0x310
[   14.228238]  kunit_try_run_case+0x1a5/0x480
[   14.228451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.228680]  kthread+0x337/0x6f0
[   14.228860]  ret_from_fork+0x41/0x80
[   14.229036]  ret_from_fork_asm+0x1a/0x30
[   14.229607] 
[   14.229688] The buggy address belongs to the object at ffff888102b4cd00
[   14.229688]  which belongs to the cache kmalloc-64 of size 64
[   14.230358] The buggy address is located 0 bytes to the right of
[   14.230358]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.230984] 
[   14.231200] The buggy address belongs to the physical page:
[   14.231478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.231898] flags: 0x200000000000000(node=0|zone=2)
[   14.232209] page_type: f5(slab)
[   14.232398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.232834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.233309] page dumped because: kasan: bad access detected
[   14.233565] 
[   14.233646] Memory state around the buggy address:
[   14.233864]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.234408]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.234715] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.235068]                                      ^
[   14.235345]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.235743]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.236155] ==================================================================
[   14.284197] ==================================================================
[   14.285112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.285551] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.285950] 
[   14.286269] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.286318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.286344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.286366] Call Trace:
[   14.286470]  <TASK>
[   14.286491]  dump_stack_lvl+0x73/0xb0
[   14.286519]  print_report+0xd1/0x650
[   14.286542]  ? __virt_addr_valid+0x1db/0x2d0
[   14.286564]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.286587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.286611]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.286634]  kasan_report+0x141/0x180
[   14.286657]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.286685]  kasan_check_range+0x10c/0x1c0
[   14.286709]  __kasan_check_write+0x18/0x20
[   14.286731]  kasan_atomics_helper+0xa2b/0x5450
[   14.286757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.286780]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.286802]  ? kasan_atomics+0x152/0x310
[   14.286827]  kasan_atomics+0x1dc/0x310
[   14.286846]  ? __pfx_kasan_atomics+0x10/0x10
[   14.286868]  ? __pfx_read_tsc+0x10/0x10
[   14.286888]  ? ktime_get_ts64+0x86/0x230
[   14.286914]  kunit_try_run_case+0x1a5/0x480
[   14.286939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.286961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.286985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.287010]  ? __kthread_parkme+0x82/0x180
[   14.287031]  ? preempt_count_sub+0x50/0x80
[   14.287057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.287081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.287104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.287137]  kthread+0x337/0x6f0
[   14.287159]  ? trace_preempt_on+0x20/0xc0
[   14.287185]  ? __pfx_kthread+0x10/0x10
[   14.287207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.287230]  ? calculate_sigpending+0x7b/0xa0
[   14.287253]  ? __pfx_kthread+0x10/0x10
[   14.287276]  ret_from_fork+0x41/0x80
[   14.287296]  ? __pfx_kthread+0x10/0x10
[   14.287319]  ret_from_fork_asm+0x1a/0x30
[   14.287365]  </TASK>
[   14.287376] 
[   14.297632] Allocated by task 285:
[   14.297782]  kasan_save_stack+0x45/0x70
[   14.298044]  kasan_save_track+0x18/0x40
[   14.298387]  kasan_save_alloc_info+0x3b/0x50
[   14.298559]  __kasan_kmalloc+0xb7/0xc0
[   14.298864]  __kmalloc_cache_noprof+0x189/0x420
[   14.299156]  kasan_atomics+0x95/0x310
[   14.299503]  kunit_try_run_case+0x1a5/0x480
[   14.299707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.300036]  kthread+0x337/0x6f0
[   14.300291]  ret_from_fork+0x41/0x80
[   14.300524]  ret_from_fork_asm+0x1a/0x30
[   14.300678] 
[   14.300775] The buggy address belongs to the object at ffff888102b4cd00
[   14.300775]  which belongs to the cache kmalloc-64 of size 64
[   14.301558] The buggy address is located 0 bytes to the right of
[   14.301558]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.302125] 
[   14.302313] The buggy address belongs to the physical page:
[   14.302622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.303015] flags: 0x200000000000000(node=0|zone=2)
[   14.303306] page_type: f5(slab)
[   14.303558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.303962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.304372] page dumped because: kasan: bad access detected
[   14.304624] 
[   14.304829] Memory state around the buggy address:
[   14.304996]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.305379]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.305832] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.306192]                                      ^
[   14.306402]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.306790]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.307099] ==================================================================
[   14.585838] ==================================================================
[   14.586197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.586534] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.586858] 
[   14.586972] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.587018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.587031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.587052] Call Trace:
[   14.587067]  <TASK>
[   14.587083]  dump_stack_lvl+0x73/0xb0
[   14.587109]  print_report+0xd1/0x650
[   14.587132]  ? __virt_addr_valid+0x1db/0x2d0
[   14.587153]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.587199]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587222]  kasan_report+0x141/0x180
[   14.587246]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587274]  kasan_check_range+0x10c/0x1c0
[   14.587334]  __kasan_check_write+0x18/0x20
[   14.587356]  kasan_atomics_helper+0x1217/0x5450
[   14.587381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.587405]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.587428]  ? kasan_atomics+0x152/0x310
[   14.587453]  kasan_atomics+0x1dc/0x310
[   14.587474]  ? __pfx_kasan_atomics+0x10/0x10
[   14.587496]  ? __pfx_read_tsc+0x10/0x10
[   14.587516]  ? ktime_get_ts64+0x86/0x230
[   14.587543]  kunit_try_run_case+0x1a5/0x480
[   14.587568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.587590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.587615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.587641]  ? __kthread_parkme+0x82/0x180
[   14.587663]  ? preempt_count_sub+0x50/0x80
[   14.587688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.587713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.587736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.587761]  kthread+0x337/0x6f0
[   14.587782]  ? trace_preempt_on+0x20/0xc0
[   14.587806]  ? __pfx_kthread+0x10/0x10
[   14.587829]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.587851]  ? calculate_sigpending+0x7b/0xa0
[   14.587873]  ? __pfx_kthread+0x10/0x10
[   14.587915]  ret_from_fork+0x41/0x80
[   14.587950]  ? __pfx_kthread+0x10/0x10
[   14.587974]  ret_from_fork_asm+0x1a/0x30
[   14.588033]  </TASK>
[   14.588044] 
[   14.597505] Allocated by task 285:
[   14.598004]  kasan_save_stack+0x45/0x70
[   14.598254]  kasan_save_track+0x18/0x40
[   14.598490]  kasan_save_alloc_info+0x3b/0x50
[   14.598721]  __kasan_kmalloc+0xb7/0xc0
[   14.598872]  __kmalloc_cache_noprof+0x189/0x420
[   14.599115]  kasan_atomics+0x95/0x310
[   14.599281]  kunit_try_run_case+0x1a5/0x480
[   14.599827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.600072]  kthread+0x337/0x6f0
[   14.600294]  ret_from_fork+0x41/0x80
[   14.600510]  ret_from_fork_asm+0x1a/0x30
[   14.600683] 
[   14.600780] The buggy address belongs to the object at ffff888102b4cd00
[   14.600780]  which belongs to the cache kmalloc-64 of size 64
[   14.601256] The buggy address is located 0 bytes to the right of
[   14.601256]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.601976] 
[   14.602080] The buggy address belongs to the physical page:
[   14.602966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.603304] flags: 0x200000000000000(node=0|zone=2)
[   14.603638] page_type: f5(slab)
[   14.603923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.604275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.604686] page dumped because: kasan: bad access detected
[   14.605004] 
[   14.605105] Memory state around the buggy address:
[   14.605475]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.605806]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.606115] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.606656]                                      ^
[   14.606966]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.607415]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.607784] ==================================================================
[   14.029432] ==================================================================
[   14.030188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.030931] Read of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.031393] 
[   14.031568] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.031635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.031649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.031671] Call Trace:
[   14.031689]  <TASK>
[   14.031717]  dump_stack_lvl+0x73/0xb0
[   14.031744]  print_report+0xd1/0x650
[   14.031767]  ? __virt_addr_valid+0x1db/0x2d0
[   14.031789]  ? kasan_atomics_helper+0x3df/0x5450
[   14.031812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.031835]  ? kasan_atomics_helper+0x3df/0x5450
[   14.031858]  kasan_report+0x141/0x180
[   14.031883]  ? kasan_atomics_helper+0x3df/0x5450
[   14.031911]  kasan_check_range+0x10c/0x1c0
[   14.031936]  __kasan_check_read+0x15/0x20
[   14.031957]  kasan_atomics_helper+0x3df/0x5450
[   14.031980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.032003]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.032026]  ? kasan_atomics+0x152/0x310
[   14.032051]  kasan_atomics+0x1dc/0x310
[   14.032070]  ? __pfx_kasan_atomics+0x10/0x10
[   14.032092]  ? __pfx_read_tsc+0x10/0x10
[   14.032113]  ? ktime_get_ts64+0x86/0x230
[   14.032150]  kunit_try_run_case+0x1a5/0x480
[   14.032174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.032221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.032246]  ? __kthread_parkme+0x82/0x180
[   14.032269]  ? preempt_count_sub+0x50/0x80
[   14.032294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.032353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.032377]  kthread+0x337/0x6f0
[   14.032398]  ? trace_preempt_on+0x20/0xc0
[   14.032423]  ? __pfx_kthread+0x10/0x10
[   14.032446]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.032469]  ? calculate_sigpending+0x7b/0xa0
[   14.032492]  ? __pfx_kthread+0x10/0x10
[   14.032516]  ret_from_fork+0x41/0x80
[   14.032537]  ? __pfx_kthread+0x10/0x10
[   14.032560]  ret_from_fork_asm+0x1a/0x30
[   14.032592]  </TASK>
[   14.032604] 
[   14.044846] Allocated by task 285:
[   14.045230]  kasan_save_stack+0x45/0x70
[   14.045450]  kasan_save_track+0x18/0x40
[   14.045816]  kasan_save_alloc_info+0x3b/0x50
[   14.046140]  __kasan_kmalloc+0xb7/0xc0
[   14.046529]  __kmalloc_cache_noprof+0x189/0x420
[   14.046769]  kasan_atomics+0x95/0x310
[   14.047116]  kunit_try_run_case+0x1a5/0x480
[   14.047407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.047584]  kthread+0x337/0x6f0
[   14.047705]  ret_from_fork+0x41/0x80
[   14.047833]  ret_from_fork_asm+0x1a/0x30
[   14.047973] 
[   14.048044] The buggy address belongs to the object at ffff888102b4cd00
[   14.048044]  which belongs to the cache kmalloc-64 of size 64
[   14.048411] The buggy address is located 0 bytes to the right of
[   14.048411]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.048979] 
[   14.049063] The buggy address belongs to the physical page:
[   14.049415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.049666] flags: 0x200000000000000(node=0|zone=2)
[   14.049921] page_type: f5(slab)
[   14.050091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.050421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.050767] page dumped because: kasan: bad access detected
[   14.050963] 
[   14.051033] Memory state around the buggy address:
[   14.051220]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.051579]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.051858] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.052141]                                      ^
[   14.052398]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.052637]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.052908] ==================================================================
[   14.446083] ==================================================================
[   14.447075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.447509] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.447818] 
[   14.447922] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.447968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.448004] Call Trace:
[   14.448022]  <TASK>
[   14.448038]  dump_stack_lvl+0x73/0xb0
[   14.448064]  print_report+0xd1/0x650
[   14.448088]  ? __virt_addr_valid+0x1db/0x2d0
[   14.448112]  ? kasan_atomics_helper+0xf10/0x5450
[   14.448335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.448362]  ? kasan_atomics_helper+0xf10/0x5450
[   14.448387]  kasan_report+0x141/0x180
[   14.448412]  ? kasan_atomics_helper+0xf10/0x5450
[   14.448441]  kasan_check_range+0x10c/0x1c0
[   14.448624]  __kasan_check_write+0x18/0x20
[   14.448646]  kasan_atomics_helper+0xf10/0x5450
[   14.448671]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.448696]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.448719]  ? kasan_atomics+0x152/0x310
[   14.448744]  kasan_atomics+0x1dc/0x310
[   14.448764]  ? __pfx_kasan_atomics+0x10/0x10
[   14.448787]  ? __pfx_read_tsc+0x10/0x10
[   14.448808]  ? ktime_get_ts64+0x86/0x230
[   14.448835]  kunit_try_run_case+0x1a5/0x480
[   14.448859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.448906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.448931]  ? __kthread_parkme+0x82/0x180
[   14.448953]  ? preempt_count_sub+0x50/0x80
[   14.448978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.449002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.449049]  kthread+0x337/0x6f0
[   14.449071]  ? trace_preempt_on+0x20/0xc0
[   14.449096]  ? __pfx_kthread+0x10/0x10
[   14.449119]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.449159]  ? calculate_sigpending+0x7b/0xa0
[   14.449183]  ? __pfx_kthread+0x10/0x10
[   14.449205]  ret_from_fork+0x41/0x80
[   14.449228]  ? __pfx_kthread+0x10/0x10
[   14.449251]  ret_from_fork_asm+0x1a/0x30
[   14.449283]  </TASK>
[   14.449295] 
[   14.460296] Allocated by task 285:
[   14.460530]  kasan_save_stack+0x45/0x70
[   14.460735]  kasan_save_track+0x18/0x40
[   14.460913]  kasan_save_alloc_info+0x3b/0x50
[   14.461106]  __kasan_kmalloc+0xb7/0xc0
[   14.461550]  __kmalloc_cache_noprof+0x189/0x420
[   14.461883]  kasan_atomics+0x95/0x310
[   14.462292]  kunit_try_run_case+0x1a5/0x480
[   14.462532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.462768]  kthread+0x337/0x6f0
[   14.462925]  ret_from_fork+0x41/0x80
[   14.463096]  ret_from_fork_asm+0x1a/0x30
[   14.463490] 
[   14.463694] The buggy address belongs to the object at ffff888102b4cd00
[   14.463694]  which belongs to the cache kmalloc-64 of size 64
[   14.464569] The buggy address is located 0 bytes to the right of
[   14.464569]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.465087] 
[   14.465401] The buggy address belongs to the physical page:
[   14.465870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.466383] flags: 0x200000000000000(node=0|zone=2)
[   14.466611] page_type: f5(slab)
[   14.466773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.467086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.467683] page dumped because: kasan: bad access detected
[   14.468032] 
[   14.468258] Memory state around the buggy address:
[   14.468699]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469015]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.469721] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.470151]                                      ^
[   14.470509]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471144]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471455] ==================================================================
[   14.827967] ==================================================================
[   14.828393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.828732] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.829015] 
[   14.829098] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.829141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.829154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.829175] Call Trace:
[   14.829190]  <TASK>
[   14.829206]  dump_stack_lvl+0x73/0xb0
[   14.829229]  print_report+0xd1/0x650
[   14.829252]  ? __virt_addr_valid+0x1db/0x2d0
[   14.829274]  ? kasan_atomics_helper+0x177f/0x5450
[   14.829297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.829321]  ? kasan_atomics_helper+0x177f/0x5450
[   14.829353]  kasan_report+0x141/0x180
[   14.829376]  ? kasan_atomics_helper+0x177f/0x5450
[   14.829404]  kasan_check_range+0x10c/0x1c0
[   14.829428]  __kasan_check_write+0x18/0x20
[   14.829449]  kasan_atomics_helper+0x177f/0x5450
[   14.829488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.829512]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829535]  ? kasan_atomics+0x152/0x310
[   14.829582]  kasan_atomics+0x1dc/0x310
[   14.829603]  ? __pfx_kasan_atomics+0x10/0x10
[   14.829625]  ? __pfx_read_tsc+0x10/0x10
[   14.829662]  ? ktime_get_ts64+0x86/0x230
[   14.829689]  kunit_try_run_case+0x1a5/0x480
[   14.829730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829805]  ? __kthread_parkme+0x82/0x180
[   14.829828]  ? preempt_count_sub+0x50/0x80
[   14.829854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829942]  kthread+0x337/0x6f0
[   14.829963]  ? trace_preempt_on+0x20/0xc0
[   14.829987]  ? __pfx_kthread+0x10/0x10
[   14.830010]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830048]  ? calculate_sigpending+0x7b/0xa0
[   14.830071]  ? __pfx_kthread+0x10/0x10
[   14.830094]  ret_from_fork+0x41/0x80
[   14.830116]  ? __pfx_kthread+0x10/0x10
[   14.830147]  ret_from_fork_asm+0x1a/0x30
[   14.830178]  </TASK>
[   14.830190] 
[   14.838191] Allocated by task 285:
[   14.838404]  kasan_save_stack+0x45/0x70
[   14.838584]  kasan_save_track+0x18/0x40
[   14.838810]  kasan_save_alloc_info+0x3b/0x50
[   14.839019]  __kasan_kmalloc+0xb7/0xc0
[   14.839188]  __kmalloc_cache_noprof+0x189/0x420
[   14.839390]  kasan_atomics+0x95/0x310
[   14.839521]  kunit_try_run_case+0x1a5/0x480
[   14.839667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.839841]  kthread+0x337/0x6f0
[   14.839970]  ret_from_fork+0x41/0x80
[   14.840155]  ret_from_fork_asm+0x1a/0x30
[   14.840385] 
[   14.840481] The buggy address belongs to the object at ffff888102b4cd00
[   14.840481]  which belongs to the cache kmalloc-64 of size 64
[   14.841063] The buggy address is located 0 bytes to the right of
[   14.841063]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.841727] 
[   14.841853] The buggy address belongs to the physical page:
[   14.842099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.842484] flags: 0x200000000000000(node=0|zone=2)
[   14.842674] page_type: f5(slab)
[   14.842796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.843028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.843660] page dumped because: kasan: bad access detected
[   14.843933] 
[   14.844038] Memory state around the buggy address:
[   14.844273]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.844652]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.844906] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.845148]                                      ^
[   14.845385]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845741]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846005] ==================================================================
[   14.769376] ==================================================================
[   14.769778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.770051] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.770495] 
[   14.770597] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.770660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.770687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.770721] Call Trace:
[   14.770737]  <TASK>
[   14.770766]  dump_stack_lvl+0x73/0xb0
[   14.770805]  print_report+0xd1/0x650
[   14.770855]  ? __virt_addr_valid+0x1db/0x2d0
[   14.770891]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.770926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.770949]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.770972]  kasan_report+0x141/0x180
[   14.770996]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.771024]  kasan_check_range+0x10c/0x1c0
[   14.771049]  __kasan_check_write+0x18/0x20
[   14.771070]  kasan_atomics_helper+0x15b6/0x5450
[   14.771094]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.771117]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.771140]  ? kasan_atomics+0x152/0x310
[   14.771164]  kasan_atomics+0x1dc/0x310
[   14.771195]  ? __pfx_kasan_atomics+0x10/0x10
[   14.771217]  ? __pfx_read_tsc+0x10/0x10
[   14.771238]  ? ktime_get_ts64+0x86/0x230
[   14.771264]  kunit_try_run_case+0x1a5/0x480
[   14.771290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.771347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.771372]  ? __kthread_parkme+0x82/0x180
[   14.771396]  ? preempt_count_sub+0x50/0x80
[   14.771421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.771494]  kthread+0x337/0x6f0
[   14.771516]  ? trace_preempt_on+0x20/0xc0
[   14.771540]  ? __pfx_kthread+0x10/0x10
[   14.771564]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.771587]  ? calculate_sigpending+0x7b/0xa0
[   14.771629]  ? __pfx_kthread+0x10/0x10
[   14.771653]  ret_from_fork+0x41/0x80
[   14.771675]  ? __pfx_kthread+0x10/0x10
[   14.771698]  ret_from_fork_asm+0x1a/0x30
[   14.771731]  </TASK>
[   14.771742] 
[   14.779676] Allocated by task 285:
[   14.779864]  kasan_save_stack+0x45/0x70
[   14.780057]  kasan_save_track+0x18/0x40
[   14.780296]  kasan_save_alloc_info+0x3b/0x50
[   14.780500]  __kasan_kmalloc+0xb7/0xc0
[   14.780685]  __kmalloc_cache_noprof+0x189/0x420
[   14.780938]  kasan_atomics+0x95/0x310
[   14.781145]  kunit_try_run_case+0x1a5/0x480
[   14.781375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.781634]  kthread+0x337/0x6f0
[   14.781921]  ret_from_fork+0x41/0x80
[   14.782270]  ret_from_fork_asm+0x1a/0x30
[   14.782424] 
[   14.782497] The buggy address belongs to the object at ffff888102b4cd00
[   14.782497]  which belongs to the cache kmalloc-64 of size 64
[   14.782948] The buggy address is located 0 bytes to the right of
[   14.782948]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.783587] 
[   14.783731] The buggy address belongs to the physical page:
[   14.784042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.784628] flags: 0x200000000000000(node=0|zone=2)
[   14.784863] page_type: f5(slab)
[   14.785030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.785699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.785932] page dumped because: kasan: bad access detected
[   14.786103] 
[   14.786172] Memory state around the buggy address:
[   14.786336]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.786622]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.787163] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.787515]                                      ^
[   14.787742]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788063]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788284] ==================================================================
[   14.692319] ==================================================================
[   14.692712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.692991] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.693375] 
[   14.693472] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.693515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.693529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.693551] Call Trace:
[   14.693568]  <TASK>
[   14.693585]  dump_stack_lvl+0x73/0xb0
[   14.693609]  print_report+0xd1/0x650
[   14.693633]  ? __virt_addr_valid+0x1db/0x2d0
[   14.693656]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.693679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.693702]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.693726]  kasan_report+0x141/0x180
[   14.693749]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.693783]  __asan_report_load8_noabort+0x18/0x20
[   14.693805]  kasan_atomics_helper+0x4eae/0x5450
[   14.693830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.693854]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.693878]  ? kasan_atomics+0x152/0x310
[   14.693902]  kasan_atomics+0x1dc/0x310
[   14.693923]  ? __pfx_kasan_atomics+0x10/0x10
[   14.693944]  ? __pfx_read_tsc+0x10/0x10
[   14.693965]  ? ktime_get_ts64+0x86/0x230
[   14.693990]  kunit_try_run_case+0x1a5/0x480
[   14.694014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.694037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.694062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.694087]  ? __kthread_parkme+0x82/0x180
[   14.694109]  ? preempt_count_sub+0x50/0x80
[   14.694135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.694159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.694183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.694207]  kthread+0x337/0x6f0
[   14.694228]  ? trace_preempt_on+0x20/0xc0
[   14.694252]  ? __pfx_kthread+0x10/0x10
[   14.694275]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.694297]  ? calculate_sigpending+0x7b/0xa0
[   14.694320]  ? __pfx_kthread+0x10/0x10
[   14.694353]  ret_from_fork+0x41/0x80
[   14.694375]  ? __pfx_kthread+0x10/0x10
[   14.694397]  ret_from_fork_asm+0x1a/0x30
[   14.694429]  </TASK>
[   14.694452] 
[   14.701725] Allocated by task 285:
[   14.701927]  kasan_save_stack+0x45/0x70
[   14.702170]  kasan_save_track+0x18/0x40
[   14.702474]  kasan_save_alloc_info+0x3b/0x50
[   14.702891]  __kasan_kmalloc+0xb7/0xc0
[   14.703043]  __kmalloc_cache_noprof+0x189/0x420
[   14.703663]  kasan_atomics+0x95/0x310
[   14.703854]  kunit_try_run_case+0x1a5/0x480
[   14.704069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.704997]  kthread+0x337/0x6f0
[   14.705183]  ret_from_fork+0x41/0x80
[   14.705358]  ret_from_fork_asm+0x1a/0x30
[   14.705571] 
[   14.705670] The buggy address belongs to the object at ffff888102b4cd00
[   14.705670]  which belongs to the cache kmalloc-64 of size 64
[   14.706170] The buggy address is located 0 bytes to the right of
[   14.706170]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.706692] 
[   14.706804] The buggy address belongs to the physical page:
[   14.707033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.707381] flags: 0x200000000000000(node=0|zone=2)
[   14.707620] page_type: f5(slab)
[   14.707782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.708147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.708439] page dumped because: kasan: bad access detected
[   14.708689] 
[   14.708791] Memory state around the buggy address:
[   14.708970]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.709312]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.709673] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.710016]                                      ^
[   14.710226]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.710512]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711110] ==================================================================
[   14.415896] ==================================================================
[   14.417308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.419644] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.419889] 
[   14.419981] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.420028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.420041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.420064] Call Trace:
[   14.420081]  <TASK>
[   14.420097]  dump_stack_lvl+0x73/0xb0
[   14.420124]  print_report+0xd1/0x650
[   14.420149]  ? __virt_addr_valid+0x1db/0x2d0
[   14.420171]  ? kasan_atomics_helper+0xe78/0x5450
[   14.420193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.420217]  ? kasan_atomics_helper+0xe78/0x5450
[   14.420240]  kasan_report+0x141/0x180
[   14.420263]  ? kasan_atomics_helper+0xe78/0x5450
[   14.420292]  kasan_check_range+0x10c/0x1c0
[   14.420318]  __kasan_check_write+0x18/0x20
[   14.420365]  kasan_atomics_helper+0xe78/0x5450
[   14.420390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.420413]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.420436]  ? kasan_atomics+0x152/0x310
[   14.420460]  kasan_atomics+0x1dc/0x310
[   14.420481]  ? __pfx_kasan_atomics+0x10/0x10
[   14.420502]  ? __pfx_read_tsc+0x10/0x10
[   14.420522]  ? ktime_get_ts64+0x86/0x230
[   14.420549]  kunit_try_run_case+0x1a5/0x480
[   14.420574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.420595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.421349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.422149]  ? __kthread_parkme+0x82/0x180
[   14.422189]  ? preempt_count_sub+0x50/0x80
[   14.422219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.422269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.422297]  kthread+0x337/0x6f0
[   14.422319]  ? trace_preempt_on+0x20/0xc0
[   14.422356]  ? __pfx_kthread+0x10/0x10
[   14.422385]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.422408]  ? calculate_sigpending+0x7b/0xa0
[   14.422431]  ? __pfx_kthread+0x10/0x10
[   14.422455]  ret_from_fork+0x41/0x80
[   14.422477]  ? __pfx_kthread+0x10/0x10
[   14.422499]  ret_from_fork_asm+0x1a/0x30
[   14.422532]  </TASK>
[   14.422544] 
[   14.435685] Allocated by task 285:
[   14.435881]  kasan_save_stack+0x45/0x70
[   14.436087]  kasan_save_track+0x18/0x40
[   14.436388]  kasan_save_alloc_info+0x3b/0x50
[   14.436576]  __kasan_kmalloc+0xb7/0xc0
[   14.436787]  __kmalloc_cache_noprof+0x189/0x420
[   14.437000]  kasan_atomics+0x95/0x310
[   14.437374]  kunit_try_run_case+0x1a5/0x480
[   14.437599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.437777]  kthread+0x337/0x6f0
[   14.437913]  ret_from_fork+0x41/0x80
[   14.438103]  ret_from_fork_asm+0x1a/0x30
[   14.438312] 
[   14.438426] The buggy address belongs to the object at ffff888102b4cd00
[   14.438426]  which belongs to the cache kmalloc-64 of size 64
[   14.438927] The buggy address is located 0 bytes to the right of
[   14.438927]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.439492] 
[   14.439588] The buggy address belongs to the physical page:
[   14.440001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.440687] flags: 0x200000000000000(node=0|zone=2)
[   14.440882] page_type: f5(slab)
[   14.441033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.441491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.441835] page dumped because: kasan: bad access detected
[   14.442372] 
[   14.442475] Memory state around the buggy address:
[   14.442686]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.442981]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443643] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.444096]                                      ^
[   14.444476]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445001]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445507] ==================================================================
[   14.307841] ==================================================================
[   14.308179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.308837] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.309144] 
[   14.309231] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.309275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.309287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.309309] Call Trace:
[   14.309335]  <TASK>
[   14.309350]  dump_stack_lvl+0x73/0xb0
[   14.309376]  print_report+0xd1/0x650
[   14.309399]  ? __virt_addr_valid+0x1db/0x2d0
[   14.309421]  ? kasan_atomics_helper+0xac7/0x5450
[   14.309444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.309526]  ? kasan_atomics_helper+0xac7/0x5450
[   14.309550]  kasan_report+0x141/0x180
[   14.309575]  ? kasan_atomics_helper+0xac7/0x5450
[   14.309603]  kasan_check_range+0x10c/0x1c0
[   14.309628]  __kasan_check_write+0x18/0x20
[   14.309649]  kasan_atomics_helper+0xac7/0x5450
[   14.309673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.309696]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.309719]  ? kasan_atomics+0x152/0x310
[   14.309743]  kasan_atomics+0x1dc/0x310
[   14.309764]  ? __pfx_kasan_atomics+0x10/0x10
[   14.309790]  ? __pfx_read_tsc+0x10/0x10
[   14.309811]  ? ktime_get_ts64+0x86/0x230
[   14.309836]  kunit_try_run_case+0x1a5/0x480
[   14.309861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.309884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.309909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.309933]  ? __kthread_parkme+0x82/0x180
[   14.309955]  ? preempt_count_sub+0x50/0x80
[   14.309981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.310005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.310028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.310051]  kthread+0x337/0x6f0
[   14.310073]  ? trace_preempt_on+0x20/0xc0
[   14.310097]  ? __pfx_kthread+0x10/0x10
[   14.310120]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.310153]  ? calculate_sigpending+0x7b/0xa0
[   14.310175]  ? __pfx_kthread+0x10/0x10
[   14.310198]  ret_from_fork+0x41/0x80
[   14.310220]  ? __pfx_kthread+0x10/0x10
[   14.310242]  ret_from_fork_asm+0x1a/0x30
[   14.310275]  </TASK>
[   14.310286] 
[   14.317507] Allocated by task 285:
[   14.317659]  kasan_save_stack+0x45/0x70
[   14.317865]  kasan_save_track+0x18/0x40
[   14.318046]  kasan_save_alloc_info+0x3b/0x50
[   14.318272]  __kasan_kmalloc+0xb7/0xc0
[   14.318434]  __kmalloc_cache_noprof+0x189/0x420
[   14.318589]  kasan_atomics+0x95/0x310
[   14.318762]  kunit_try_run_case+0x1a5/0x480
[   14.318966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.319262]  kthread+0x337/0x6f0
[   14.319421]  ret_from_fork+0x41/0x80
[   14.319553]  ret_from_fork_asm+0x1a/0x30
[   14.319740] 
[   14.319835] The buggy address belongs to the object at ffff888102b4cd00
[   14.319835]  which belongs to the cache kmalloc-64 of size 64
[   14.320395] The buggy address is located 0 bytes to the right of
[   14.320395]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.320854] 
[   14.320942] The buggy address belongs to the physical page:
[   14.321238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.321545] flags: 0x200000000000000(node=0|zone=2)
[   14.321757] page_type: f5(slab)
[   14.321910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.322139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.322372] page dumped because: kasan: bad access detected
[   14.322543] 
[   14.322615] Memory state around the buggy address:
[   14.322838]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.323166]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.323499] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.323762]                                      ^
[   14.323914]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.324135]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.324456] ==================================================================
[   15.008041] ==================================================================
[   15.008304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.009163] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.009475] 
[   15.009562] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.009606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.009620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.009641] Call Trace:
[   15.009656]  <TASK>
[   15.009672]  dump_stack_lvl+0x73/0xb0
[   15.009698]  print_report+0xd1/0x650
[   15.009765]  ? __virt_addr_valid+0x1db/0x2d0
[   15.009794]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.009817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.009841]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.009864]  kasan_report+0x141/0x180
[   15.009920]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.009950]  kasan_check_range+0x10c/0x1c0
[   15.009976]  __kasan_check_write+0x18/0x20
[   15.009996]  kasan_atomics_helper+0x1ce1/0x5450
[   15.010021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.010074]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.010099]  ? kasan_atomics+0x152/0x310
[   15.010124]  kasan_atomics+0x1dc/0x310
[   15.010154]  ? __pfx_kasan_atomics+0x10/0x10
[   15.010177]  ? __pfx_read_tsc+0x10/0x10
[   15.010224]  ? ktime_get_ts64+0x86/0x230
[   15.010253]  kunit_try_run_case+0x1a5/0x480
[   15.010278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.010336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.010362]  ? __kthread_parkme+0x82/0x180
[   15.010384]  ? preempt_count_sub+0x50/0x80
[   15.010410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.010509]  kthread+0x337/0x6f0
[   15.010530]  ? trace_preempt_on+0x20/0xc0
[   15.010555]  ? __pfx_kthread+0x10/0x10
[   15.010578]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.010602]  ? calculate_sigpending+0x7b/0xa0
[   15.010624]  ? __pfx_kthread+0x10/0x10
[   15.010648]  ret_from_fork+0x41/0x80
[   15.010670]  ? __pfx_kthread+0x10/0x10
[   15.010693]  ret_from_fork_asm+0x1a/0x30
[   15.010725]  </TASK>
[   15.010736] 
[   15.019236] Allocated by task 285:
[   15.019443]  kasan_save_stack+0x45/0x70
[   15.019661]  kasan_save_track+0x18/0x40
[   15.019859]  kasan_save_alloc_info+0x3b/0x50
[   15.020084]  __kasan_kmalloc+0xb7/0xc0
[   15.020359]  __kmalloc_cache_noprof+0x189/0x420
[   15.020565]  kasan_atomics+0x95/0x310
[   15.020709]  kunit_try_run_case+0x1a5/0x480
[   15.020999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.021178]  kthread+0x337/0x6f0
[   15.021357]  ret_from_fork+0x41/0x80
[   15.021539]  ret_from_fork_asm+0x1a/0x30
[   15.021735] 
[   15.021883] The buggy address belongs to the object at ffff888102b4cd00
[   15.021883]  which belongs to the cache kmalloc-64 of size 64
[   15.022600] The buggy address is located 0 bytes to the right of
[   15.022600]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.023069] 
[   15.023257] The buggy address belongs to the physical page:
[   15.023525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.023893] flags: 0x200000000000000(node=0|zone=2)
[   15.024141] page_type: f5(slab)
[   15.024311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.024663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.024963] page dumped because: kasan: bad access detected
[   15.025177] 
[   15.025276] Memory state around the buggy address:
[   15.025509]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.025863]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026245] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.026569]                                      ^
[   15.026800]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027057]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027601] ==================================================================
[   14.002666] ==================================================================
[   14.003394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.003719] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.004316] 
[   14.004561] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.004612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.004625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.004749] Call Trace:
[   14.004764]  <TASK>
[   14.004780]  dump_stack_lvl+0x73/0xb0
[   14.004808]  print_report+0xd1/0x650
[   14.004831]  ? __virt_addr_valid+0x1db/0x2d0
[   14.004854]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.004877]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.004900]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.004923]  kasan_report+0x141/0x180
[   14.004947]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.004975]  __asan_report_store4_noabort+0x1b/0x30
[   14.004997]  kasan_atomics_helper+0x4b6e/0x5450
[   14.005021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.005044]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.005068]  ? kasan_atomics+0x152/0x310
[   14.005092]  kasan_atomics+0x1dc/0x310
[   14.005112]  ? __pfx_kasan_atomics+0x10/0x10
[   14.005143]  ? __pfx_read_tsc+0x10/0x10
[   14.005164]  ? ktime_get_ts64+0x86/0x230
[   14.005189]  kunit_try_run_case+0x1a5/0x480
[   14.005215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.005261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.005286]  ? __kthread_parkme+0x82/0x180
[   14.005308]  ? preempt_count_sub+0x50/0x80
[   14.005348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.005374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.005397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.005422]  kthread+0x337/0x6f0
[   14.005444]  ? trace_preempt_on+0x20/0xc0
[   14.005467]  ? __pfx_kthread+0x10/0x10
[   14.005490]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.005513]  ? calculate_sigpending+0x7b/0xa0
[   14.005536]  ? __pfx_kthread+0x10/0x10
[   14.005559]  ret_from_fork+0x41/0x80
[   14.005581]  ? __pfx_kthread+0x10/0x10
[   14.005604]  ret_from_fork_asm+0x1a/0x30
[   14.005636]  </TASK>
[   14.005648] 
[   14.016686] Allocated by task 285:
[   14.016874]  kasan_save_stack+0x45/0x70
[   14.017061]  kasan_save_track+0x18/0x40
[   14.017647]  kasan_save_alloc_info+0x3b/0x50
[   14.017857]  __kasan_kmalloc+0xb7/0xc0
[   14.018115]  __kmalloc_cache_noprof+0x189/0x420
[   14.018439]  kasan_atomics+0x95/0x310
[   14.018739]  kunit_try_run_case+0x1a5/0x480
[   14.019026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.019375]  kthread+0x337/0x6f0
[   14.019645]  ret_from_fork+0x41/0x80
[   14.019827]  ret_from_fork_asm+0x1a/0x30
[   14.020022] 
[   14.020110] The buggy address belongs to the object at ffff888102b4cd00
[   14.020110]  which belongs to the cache kmalloc-64 of size 64
[   14.020989] The buggy address is located 0 bytes to the right of
[   14.020989]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.021687] 
[   14.021795] The buggy address belongs to the physical page:
[   14.022208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.022683] flags: 0x200000000000000(node=0|zone=2)
[   14.023042] page_type: f5(slab)
[   14.023502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.023873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.024105] page dumped because: kasan: bad access detected
[   14.024766] 
[   14.025087] Memory state around the buggy address:
[   14.025614]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.026420]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.026737] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.026949]                                      ^
[   14.027106]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.027745]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.028484] ==================================================================
[   14.730591] ==================================================================
[   14.731571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.731961] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.732296] 
[   14.732402] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.732468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.732481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.732503] Call Trace:
[   14.732519]  <TASK>
[   14.732535]  dump_stack_lvl+0x73/0xb0
[   14.732563]  print_report+0xd1/0x650
[   14.732586]  ? __virt_addr_valid+0x1db/0x2d0
[   14.732609]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.732632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.732673]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.732697]  kasan_report+0x141/0x180
[   14.732722]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.732751]  __asan_report_store8_noabort+0x1b/0x30
[   14.732773]  kasan_atomics_helper+0x50d4/0x5450
[   14.732799]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.732824]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.732865]  ? kasan_atomics+0x152/0x310
[   14.732889]  kasan_atomics+0x1dc/0x310
[   14.732910]  ? __pfx_kasan_atomics+0x10/0x10
[   14.732932]  ? __pfx_read_tsc+0x10/0x10
[   14.732952]  ? ktime_get_ts64+0x86/0x230
[   14.732978]  kunit_try_run_case+0x1a5/0x480
[   14.733004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.733026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.733050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.733076]  ? __kthread_parkme+0x82/0x180
[   14.733098]  ? preempt_count_sub+0x50/0x80
[   14.733134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.733159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.733207]  kthread+0x337/0x6f0
[   14.733228]  ? trace_preempt_on+0x20/0xc0
[   14.733252]  ? __pfx_kthread+0x10/0x10
[   14.733294]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.733318]  ? calculate_sigpending+0x7b/0xa0
[   14.733352]  ? __pfx_kthread+0x10/0x10
[   14.733375]  ret_from_fork+0x41/0x80
[   14.733397]  ? __pfx_kthread+0x10/0x10
[   14.733420]  ret_from_fork_asm+0x1a/0x30
[   14.733470]  </TASK>
[   14.733481] 
[   14.740923] Allocated by task 285:
[   14.741054]  kasan_save_stack+0x45/0x70
[   14.741393]  kasan_save_track+0x18/0x40
[   14.741591]  kasan_save_alloc_info+0x3b/0x50
[   14.741845]  __kasan_kmalloc+0xb7/0xc0
[   14.742035]  __kmalloc_cache_noprof+0x189/0x420
[   14.742480]  kasan_atomics+0x95/0x310
[   14.742660]  kunit_try_run_case+0x1a5/0x480
[   14.742867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743062]  kthread+0x337/0x6f0
[   14.743360]  ret_from_fork+0x41/0x80
[   14.743552]  ret_from_fork_asm+0x1a/0x30
[   14.743742] 
[   14.743836] The buggy address belongs to the object at ffff888102b4cd00
[   14.743836]  which belongs to the cache kmalloc-64 of size 64
[   14.744365] The buggy address is located 0 bytes to the right of
[   14.744365]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.744871] 
[   14.744964] The buggy address belongs to the physical page:
[   14.745184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.745571] flags: 0x200000000000000(node=0|zone=2)
[   14.745791] page_type: f5(slab)
[   14.746011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.746401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.746733] page dumped because: kasan: bad access detected
[   14.746988] 
[   14.747080] Memory state around the buggy address:
[   14.747299]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.747619]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.747930] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.748335]                                      ^
[   14.748489]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.748704]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.749008] ==================================================================
[   14.325006] ==================================================================
[   14.325531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.325806] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.326029] 
[   14.326137] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.326182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.326195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.326217] Call Trace:
[   14.326232]  <TASK>
[   14.326249]  dump_stack_lvl+0x73/0xb0
[   14.326274]  print_report+0xd1/0x650
[   14.326297]  ? __virt_addr_valid+0x1db/0x2d0
[   14.326320]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.326353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.326377]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.326400]  kasan_report+0x141/0x180
[   14.326424]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.326452]  kasan_check_range+0x10c/0x1c0
[   14.326478]  __kasan_check_write+0x18/0x20
[   14.326499]  kasan_atomics_helper+0xb6a/0x5450
[   14.326523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.326546]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.326569]  ? kasan_atomics+0x152/0x310
[   14.326593]  kasan_atomics+0x1dc/0x310
[   14.326613]  ? __pfx_kasan_atomics+0x10/0x10
[   14.326635]  ? __pfx_read_tsc+0x10/0x10
[   14.326655]  ? ktime_get_ts64+0x86/0x230
[   14.326681]  kunit_try_run_case+0x1a5/0x480
[   14.326705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.326728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.326753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.326778]  ? __kthread_parkme+0x82/0x180
[   14.326800]  ? preempt_count_sub+0x50/0x80
[   14.326826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.326850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.326875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.326898]  kthread+0x337/0x6f0
[   14.326919]  ? trace_preempt_on+0x20/0xc0
[   14.326943]  ? __pfx_kthread+0x10/0x10
[   14.326966]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.326989]  ? calculate_sigpending+0x7b/0xa0
[   14.327011]  ? __pfx_kthread+0x10/0x10
[   14.327034]  ret_from_fork+0x41/0x80
[   14.327056]  ? __pfx_kthread+0x10/0x10
[   14.327078]  ret_from_fork_asm+0x1a/0x30
[   14.327110]  </TASK>
[   14.327138] 
[   14.334992] Allocated by task 285:
[   14.335141]  kasan_save_stack+0x45/0x70
[   14.335357]  kasan_save_track+0x18/0x40
[   14.335550]  kasan_save_alloc_info+0x3b/0x50
[   14.335735]  __kasan_kmalloc+0xb7/0xc0
[   14.335911]  __kmalloc_cache_noprof+0x189/0x420
[   14.336133]  kasan_atomics+0x95/0x310
[   14.336275]  kunit_try_run_case+0x1a5/0x480
[   14.336468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.336729]  kthread+0x337/0x6f0
[   14.336893]  ret_from_fork+0x41/0x80
[   14.337058]  ret_from_fork_asm+0x1a/0x30
[   14.337198] 
[   14.337269] The buggy address belongs to the object at ffff888102b4cd00
[   14.337269]  which belongs to the cache kmalloc-64 of size 64
[   14.337815] The buggy address is located 0 bytes to the right of
[   14.337815]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.338422] 
[   14.338492] The buggy address belongs to the physical page:
[   14.338801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.339172] flags: 0x200000000000000(node=0|zone=2)
[   14.339418] page_type: f5(slab)
[   14.339579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.339880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.340170] page dumped because: kasan: bad access detected
[   14.340395] 
[   14.340488] Memory state around the buggy address:
[   14.340653]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.340902]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.341223] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.341528]                                      ^
[   14.341683]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341900]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.342111] ==================================================================
[   14.236860] ==================================================================
[   14.237136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.237829] Write of size 4 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.238232] 
[   14.238318] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.238376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.238389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.238704] Call Trace:
[   14.238723]  <TASK>
[   14.238741]  dump_stack_lvl+0x73/0xb0
[   14.238768]  print_report+0xd1/0x650
[   14.238792]  ? __virt_addr_valid+0x1db/0x2d0
[   14.238815]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.238838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.238862]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.238885]  kasan_report+0x141/0x180
[   14.238909]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.238938]  kasan_check_range+0x10c/0x1c0
[   14.238963]  __kasan_check_write+0x18/0x20
[   14.238985]  kasan_atomics_helper+0x8f9/0x5450
[   14.239009]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.239033]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.239056]  ? kasan_atomics+0x152/0x310
[   14.239080]  kasan_atomics+0x1dc/0x310
[   14.239100]  ? __pfx_kasan_atomics+0x10/0x10
[   14.239132]  ? __pfx_read_tsc+0x10/0x10
[   14.239153]  ? ktime_get_ts64+0x86/0x230
[   14.239180]  kunit_try_run_case+0x1a5/0x480
[   14.239204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.239251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.239276]  ? __kthread_parkme+0x82/0x180
[   14.239299]  ? preempt_count_sub+0x50/0x80
[   14.239339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.239388]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.239413]  kthread+0x337/0x6f0
[   14.239434]  ? trace_preempt_on+0x20/0xc0
[   14.239460]  ? __pfx_kthread+0x10/0x10
[   14.239483]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.239506]  ? calculate_sigpending+0x7b/0xa0
[   14.239528]  ? __pfx_kthread+0x10/0x10
[   14.239552]  ret_from_fork+0x41/0x80
[   14.239575]  ? __pfx_kthread+0x10/0x10
[   14.239598]  ret_from_fork_asm+0x1a/0x30
[   14.239631]  </TASK>
[   14.239643] 
[   14.249815] Allocated by task 285:
[   14.250106]  kasan_save_stack+0x45/0x70
[   14.250339]  kasan_save_track+0x18/0x40
[   14.250487]  kasan_save_alloc_info+0x3b/0x50
[   14.250707]  __kasan_kmalloc+0xb7/0xc0
[   14.250894]  __kmalloc_cache_noprof+0x189/0x420
[   14.251104]  kasan_atomics+0x95/0x310
[   14.251611]  kunit_try_run_case+0x1a5/0x480
[   14.251795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.252198]  kthread+0x337/0x6f0
[   14.252546]  ret_from_fork+0x41/0x80
[   14.252721]  ret_from_fork_asm+0x1a/0x30
[   14.253025] 
[   14.253104] The buggy address belongs to the object at ffff888102b4cd00
[   14.253104]  which belongs to the cache kmalloc-64 of size 64
[   14.253828] The buggy address is located 0 bytes to the right of
[   14.253828]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.254496] 
[   14.254600] The buggy address belongs to the physical page:
[   14.254959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.255392] flags: 0x200000000000000(node=0|zone=2)
[   14.255694] page_type: f5(slab)
[   14.255874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.256371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.256730] page dumped because: kasan: bad access detected
[   14.256972] 
[   14.257055] Memory state around the buggy address:
[   14.257525]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.257901]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.258339] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.258717]                                      ^
[   14.259027]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.259416]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.259750] ==================================================================
[   15.068302] ==================================================================
[   15.068905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.069163] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   15.069782] 
[   15.069951] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   15.069994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.070007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.070028] Call Trace:
[   15.070044]  <TASK>
[   15.070061]  dump_stack_lvl+0x73/0xb0
[   15.070085]  print_report+0xd1/0x650
[   15.070109]  ? __virt_addr_valid+0x1db/0x2d0
[   15.070131]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.070154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.070179]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.070202]  kasan_report+0x141/0x180
[   15.070226]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.070254]  kasan_check_range+0x10c/0x1c0
[   15.070279]  __kasan_check_write+0x18/0x20
[   15.070300]  kasan_atomics_helper+0x1eaa/0x5450
[   15.070349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.070373]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.070397]  ? kasan_atomics+0x152/0x310
[   15.070421]  kasan_atomics+0x1dc/0x310
[   15.070441]  ? __pfx_kasan_atomics+0x10/0x10
[   15.070463]  ? __pfx_read_tsc+0x10/0x10
[   15.070484]  ? ktime_get_ts64+0x86/0x230
[   15.070511]  kunit_try_run_case+0x1a5/0x480
[   15.070536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.070584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.070611]  ? __kthread_parkme+0x82/0x180
[   15.070635]  ? preempt_count_sub+0x50/0x80
[   15.070662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.070688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.070738]  kthread+0x337/0x6f0
[   15.070760]  ? trace_preempt_on+0x20/0xc0
[   15.070784]  ? __pfx_kthread+0x10/0x10
[   15.070807]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.070830]  ? calculate_sigpending+0x7b/0xa0
[   15.070853]  ? __pfx_kthread+0x10/0x10
[   15.070878]  ret_from_fork+0x41/0x80
[   15.070900]  ? __pfx_kthread+0x10/0x10
[   15.070923]  ret_from_fork_asm+0x1a/0x30
[   15.070956]  </TASK>
[   15.070966] 
[   15.080733] Allocated by task 285:
[   15.080885]  kasan_save_stack+0x45/0x70
[   15.081076]  kasan_save_track+0x18/0x40
[   15.081313]  kasan_save_alloc_info+0x3b/0x50
[   15.081488]  __kasan_kmalloc+0xb7/0xc0
[   15.081679]  __kmalloc_cache_noprof+0x189/0x420
[   15.081863]  kasan_atomics+0x95/0x310
[   15.082041]  kunit_try_run_case+0x1a5/0x480
[   15.082249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.082559]  kthread+0x337/0x6f0
[   15.082730]  ret_from_fork+0x41/0x80
[   15.082871]  ret_from_fork_asm+0x1a/0x30
[   15.083011] 
[   15.083083] The buggy address belongs to the object at ffff888102b4cd00
[   15.083083]  which belongs to the cache kmalloc-64 of size 64
[   15.083515] The buggy address is located 0 bytes to the right of
[   15.083515]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   15.084049] 
[   15.084133] The buggy address belongs to the physical page:
[   15.084342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   15.084587] flags: 0x200000000000000(node=0|zone=2)
[   15.084803] page_type: f5(slab)
[   15.084970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.085381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.085739] page dumped because: kasan: bad access detected
[   15.085912] 
[   15.085981] Memory state around the buggy address:
[   15.086133]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086354]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.086905] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.087320]                                      ^
[   15.087556]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087875]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.088204] ==================================================================
[   14.667780] ==================================================================
[   14.668296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.668842] Read of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.669089] 
[   14.669230] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.669274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669308] Call Trace:
[   14.669335]  <TASK>
[   14.669350]  dump_stack_lvl+0x73/0xb0
[   14.669376]  print_report+0xd1/0x650
[   14.669401]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669423]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.669457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669481]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.669504]  kasan_report+0x141/0x180
[   14.669529]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.669557]  kasan_check_range+0x10c/0x1c0
[   14.669583]  __kasan_check_read+0x15/0x20
[   14.669604]  kasan_atomics_helper+0x13b5/0x5450
[   14.669629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.669652]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.669676]  ? kasan_atomics+0x152/0x310
[   14.669700]  kasan_atomics+0x1dc/0x310
[   14.669721]  ? __pfx_kasan_atomics+0x10/0x10
[   14.669743]  ? __pfx_read_tsc+0x10/0x10
[   14.669763]  ? ktime_get_ts64+0x86/0x230
[   14.669796]  kunit_try_run_case+0x1a5/0x480
[   14.669821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.669870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.669895]  ? __kthread_parkme+0x82/0x180
[   14.669917]  ? preempt_count_sub+0x50/0x80
[   14.669943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.670014]  kthread+0x337/0x6f0
[   14.670036]  ? trace_preempt_on+0x20/0xc0
[   14.670059]  ? __pfx_kthread+0x10/0x10
[   14.670082]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.670104]  ? calculate_sigpending+0x7b/0xa0
[   14.670127]  ? __pfx_kthread+0x10/0x10
[   14.670151]  ret_from_fork+0x41/0x80
[   14.670173]  ? __pfx_kthread+0x10/0x10
[   14.670195]  ret_from_fork_asm+0x1a/0x30
[   14.670229]  </TASK>
[   14.670239] 
[   14.681125] Allocated by task 285:
[   14.682256]  kasan_save_stack+0x45/0x70
[   14.682486]  kasan_save_track+0x18/0x40
[   14.683232]  kasan_save_alloc_info+0x3b/0x50
[   14.683408]  __kasan_kmalloc+0xb7/0xc0
[   14.683546]  __kmalloc_cache_noprof+0x189/0x420
[   14.683702]  kasan_atomics+0x95/0x310
[   14.683833]  kunit_try_run_case+0x1a5/0x480
[   14.683983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.684167]  kthread+0x337/0x6f0
[   14.684291]  ret_from_fork+0x41/0x80
[   14.685316]  ret_from_fork_asm+0x1a/0x30
[   14.685558] 
[   14.685660] The buggy address belongs to the object at ffff888102b4cd00
[   14.685660]  which belongs to the cache kmalloc-64 of size 64
[   14.686386] The buggy address is located 0 bytes to the right of
[   14.686386]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.686925] 
[   14.687024] The buggy address belongs to the physical page:
[   14.687838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.688188] flags: 0x200000000000000(node=0|zone=2)
[   14.688403] page_type: f5(slab)
[   14.688678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.688951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.689313] page dumped because: kasan: bad access detected
[   14.689576] 
[   14.689662] Memory state around the buggy address:
[   14.689856]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690157]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690410] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.690723]                                      ^
[   14.690874]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691245]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691548] ==================================================================
[   14.846742] ==================================================================
[   14.847105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.847405] Write of size 8 at addr ffff888102b4cd30 by task kunit_try_catch/285
[   14.847765] 
[   14.847888] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   14.847930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.847943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.847965] Call Trace:
[   14.847981]  <TASK>
[   14.847997]  dump_stack_lvl+0x73/0xb0
[   14.848022]  print_report+0xd1/0x650
[   14.848045]  ? __virt_addr_valid+0x1db/0x2d0
[   14.848068]  ? kasan_atomics_helper+0x1818/0x5450
[   14.848091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.848115]  ? kasan_atomics_helper+0x1818/0x5450
[   14.848138]  kasan_report+0x141/0x180
[   14.848162]  ? kasan_atomics_helper+0x1818/0x5450
[   14.848191]  kasan_check_range+0x10c/0x1c0
[   14.848217]  __kasan_check_write+0x18/0x20
[   14.848239]  kasan_atomics_helper+0x1818/0x5450
[   14.848263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.848305]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.848340]  ? kasan_atomics+0x152/0x310
[   14.848366]  kasan_atomics+0x1dc/0x310
[   14.848387]  ? __pfx_kasan_atomics+0x10/0x10
[   14.848409]  ? __pfx_read_tsc+0x10/0x10
[   14.848429]  ? ktime_get_ts64+0x86/0x230
[   14.848456]  kunit_try_run_case+0x1a5/0x480
[   14.848481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.848503]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.848545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.848570]  ? __kthread_parkme+0x82/0x180
[   14.848605]  ? preempt_count_sub+0x50/0x80
[   14.848645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.848681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.848768]  kthread+0x337/0x6f0
[   14.848803]  ? trace_preempt_on+0x20/0xc0
[   14.848853]  ? __pfx_kthread+0x10/0x10
[   14.848876]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.848899]  ? calculate_sigpending+0x7b/0xa0
[   14.848921]  ? __pfx_kthread+0x10/0x10
[   14.848945]  ret_from_fork+0x41/0x80
[   14.848966]  ? __pfx_kthread+0x10/0x10
[   14.848989]  ret_from_fork_asm+0x1a/0x30
[   14.849021]  </TASK>
[   14.849033] 
[   14.857076] Allocated by task 285:
[   14.857265]  kasan_save_stack+0x45/0x70
[   14.857537]  kasan_save_track+0x18/0x40
[   14.857796]  kasan_save_alloc_info+0x3b/0x50
[   14.858001]  __kasan_kmalloc+0xb7/0xc0
[   14.858186]  __kmalloc_cache_noprof+0x189/0x420
[   14.858412]  kasan_atomics+0x95/0x310
[   14.858595]  kunit_try_run_case+0x1a5/0x480
[   14.858869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.859041]  kthread+0x337/0x6f0
[   14.859163]  ret_from_fork+0x41/0x80
[   14.859291]  ret_from_fork_asm+0x1a/0x30
[   14.859719] 
[   14.859817] The buggy address belongs to the object at ffff888102b4cd00
[   14.859817]  which belongs to the cache kmalloc-64 of size 64
[   14.860568] The buggy address is located 0 bytes to the right of
[   14.860568]  allocated 48-byte region [ffff888102b4cd00, ffff888102b4cd30)
[   14.860935] 
[   14.861007] The buggy address belongs to the physical page:
[   14.861179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4c
[   14.861541] flags: 0x200000000000000(node=0|zone=2)
[   14.861950] page_type: f5(slab)
[   14.862117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.862725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.862978] page dumped because: kasan: bad access detected
[   14.863201] 
[   14.863294] Memory state around the buggy address:
[   14.863551]  ffff888102b4cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.863893]  ffff888102b4cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.864285] >ffff888102b4cd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.864554]                                      ^
[   14.864710]  ffff888102b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.864929]  ffff888102b4ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.865229] ==================================================================

[   25.394621] ==================================================================
[   25.395259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   25.395913] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.396566] 
[   25.396704] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.396718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.396723] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.396728] Call trace:
[   25.396731]  show_stack+0x20/0x38 (C)
[   25.396741]  dump_stack_lvl+0x8c/0xd0
[   25.396749]  print_report+0x118/0x608
[   25.396758]  kasan_report+0xdc/0x128
[   25.396766]  kasan_check_range+0x100/0x1a8
[   25.396776]  __kasan_check_write+0x20/0x30
[   25.396786]  kasan_atomics_helper+0x15b4/0x4858
[   25.396794]  kasan_atomics+0x198/0x2e0
[   25.396802]  kunit_try_run_case+0x170/0x3f0
[   25.396812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.396824]  kthread+0x328/0x630
[   25.396834]  ret_from_fork+0x10/0x20
[   25.396843] 
[   25.402973] Allocated by task 319:
[   25.403278]  kasan_save_stack+0x3c/0x68
[   25.403623]  kasan_save_track+0x20/0x40
[   25.403967]  kasan_save_alloc_info+0x40/0x58
[   25.404350]  __kasan_kmalloc+0xd4/0xd8
[   25.404687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.405093]  kasan_atomics+0xb8/0x2e0
[   25.405423]  kunit_try_run_case+0x170/0x3f0
[   25.405799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.406290]  kthread+0x328/0x630
[   25.406583]  ret_from_fork+0x10/0x20
[   25.406905] 
[   25.407042] The buggy address belongs to the object at ffff00000a4bdd00
[   25.407042]  which belongs to the cache kmalloc-64 of size 64
[   25.408125] The buggy address is located 0 bytes to the right of
[   25.408125]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.409254] 
[   25.409391] The buggy address belongs to the physical page:
[   25.409882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.410574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.411153] page_type: f5(slab)
[   25.411437] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.412122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.412803] page dumped because: kasan: bad access detected
[   25.413295] 
[   25.413432] Memory state around the buggy address:
[   25.413858]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.414494]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.415133] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.415769]                                      ^
[   25.416193]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.416830]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.417467] ==================================================================
[   24.312695] ==================================================================
[   24.313350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   24.314015] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.314684] 
[   24.314835] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.314867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.314877] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.314887] Call trace:
[   24.314895]  show_stack+0x20/0x38 (C)
[   24.314915]  dump_stack_lvl+0x8c/0xd0
[   24.314934]  print_report+0x118/0x608
[   24.314953]  kasan_report+0xdc/0x128
[   24.314972]  kasan_check_range+0x100/0x1a8
[   24.314993]  __kasan_check_write+0x20/0x30
[   24.315014]  kasan_atomics_helper+0x47c/0x4858
[   24.315033]  kasan_atomics+0x198/0x2e0
[   24.315050]  kunit_try_run_case+0x170/0x3f0
[   24.315074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.315099]  kthread+0x328/0x630
[   24.315121]  ret_from_fork+0x10/0x20
[   24.315141] 
[   24.321319] Allocated by task 319:
[   24.321635]  kasan_save_stack+0x3c/0x68
[   24.321994]  kasan_save_track+0x20/0x40
[   24.322353]  kasan_save_alloc_info+0x40/0x58
[   24.322752]  __kasan_kmalloc+0xd4/0xd8
[   24.323104]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.323529]  kasan_atomics+0xb8/0x2e0
[   24.323871]  kunit_try_run_case+0x170/0x3f0
[   24.324262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.324771]  kthread+0x328/0x630
[   24.325080]  ret_from_fork+0x10/0x20
[   24.325418] 
[   24.325565] The buggy address belongs to the object at ffff00000a4bdd00
[   24.325565]  which belongs to the cache kmalloc-64 of size 64
[   24.326666] The buggy address is located 0 bytes to the right of
[   24.326666]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.327815] 
[   24.327962] The buggy address belongs to the physical page:
[   24.328466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.329173] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.329767] page_type: f5(slab)
[   24.330064] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.330765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.331461] page dumped because: kasan: bad access detected
[   24.331965] 
[   24.332111] Memory state around the buggy address:
[   24.332547]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.333199]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.333853] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.334502]                                      ^
[   24.334940]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.335593]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.336243] ==================================================================
[   24.093589] ==================================================================
[   24.094262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   24.094966] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.095642] 
[   24.095798] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.095836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.095847] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.095860] Call trace:
[   24.095870]  show_stack+0x20/0x38 (C)
[   24.095894]  dump_stack_lvl+0x8c/0xd0
[   24.095919]  print_report+0x118/0x608
[   24.095941]  kasan_report+0xdc/0x128
[   24.095962]  __asan_report_store4_noabort+0x20/0x30
[   24.095988]  kasan_atomics_helper+0x3f7c/0x4858
[   24.096009]  kasan_atomics+0x198/0x2e0
[   24.096029]  kunit_try_run_case+0x170/0x3f0
[   24.096055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.096085]  kthread+0x328/0x630
[   24.096110]  ret_from_fork+0x10/0x20
[   24.096133] 
[   24.102042] Allocated by task 319:
[   24.102362]  kasan_save_stack+0x3c/0x68
[   24.102724]  kasan_save_track+0x20/0x40
[   24.103085]  kasan_save_alloc_info+0x40/0x58
[   24.103487]  __kasan_kmalloc+0xd4/0xd8
[   24.103840]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.104270]  kasan_atomics+0xb8/0x2e0
[   24.104614]  kunit_try_run_case+0x170/0x3f0
[   24.105009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.105520]  kthread+0x328/0x630
[   24.105832]  ret_from_fork+0x10/0x20
[   24.106172] 
[   24.106320] The buggy address belongs to the object at ffff00000a4bdd00
[   24.106320]  which belongs to the cache kmalloc-64 of size 64
[   24.107426] The buggy address is located 0 bytes to the right of
[   24.107426]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.108578] 
[   24.108727] The buggy address belongs to the physical page:
[   24.109234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.109948] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.110548] page_type: f5(slab)
[   24.110851] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.111555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.112253] page dumped because: kasan: bad access detected
[   24.112760] 
[   24.112907] Memory state around the buggy address:
[   24.113347]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.114001]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.114657] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.115308]                                      ^
[   24.115747]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.116403]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.117055] ==================================================================
[   24.621648] ==================================================================
[   24.622285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   24.622930] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.623584] 
[   24.623723] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.623737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.623742] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.623747] Call trace:
[   24.623750]  show_stack+0x20/0x38 (C)
[   24.623760]  dump_stack_lvl+0x8c/0xd0
[   24.623768]  print_report+0x118/0x608
[   24.623777]  kasan_report+0xdc/0x128
[   24.623786]  kasan_check_range+0x100/0x1a8
[   24.623795]  __kasan_check_write+0x20/0x30
[   24.623805]  kasan_atomics_helper+0xa04/0x4858
[   24.623814]  kasan_atomics+0x198/0x2e0
[   24.623821]  kunit_try_run_case+0x170/0x3f0
[   24.623832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.623843]  kthread+0x328/0x630
[   24.623854]  ret_from_fork+0x10/0x20
[   24.623863] 
[   24.629986] Allocated by task 319:
[   24.630291]  kasan_save_stack+0x3c/0x68
[   24.630635]  kasan_save_track+0x20/0x40
[   24.630979]  kasan_save_alloc_info+0x40/0x58
[   24.631362]  __kasan_kmalloc+0xd4/0xd8
[   24.631699]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.632106]  kasan_atomics+0xb8/0x2e0
[   24.632435]  kunit_try_run_case+0x170/0x3f0
[   24.632811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.633302]  kthread+0x328/0x630
[   24.633594]  ret_from_fork+0x10/0x20
[   24.633916] 
[   24.634053] The buggy address belongs to the object at ffff00000a4bdd00
[   24.634053]  which belongs to the cache kmalloc-64 of size 64
[   24.635136] The buggy address is located 0 bytes to the right of
[   24.635136]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.636265] 
[   24.636402] The buggy address belongs to the physical page:
[   24.636893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.637585] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.638164] page_type: f5(slab)
[   24.638447] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.639131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.639813] page dumped because: kasan: bad access detected
[   24.640305] 
[   24.640442] Memory state around the buggy address:
[   24.640867]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.641506]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.642143] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.642778]                                      ^
[   24.643203]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.643839]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.644475] ==================================================================
[   24.855414] ==================================================================
[   24.856052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   24.856698] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.857352] 
[   24.857490] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.857504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.857508] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.857513] Call trace:
[   24.857516]  show_stack+0x20/0x38 (C)
[   24.857526]  dump_stack_lvl+0x8c/0xd0
[   24.857534]  print_report+0x118/0x608
[   24.857543]  kasan_report+0xdc/0x128
[   24.857552]  kasan_check_range+0x100/0x1a8
[   24.857561]  __kasan_check_write+0x20/0x30
[   24.857570]  kasan_atomics_helper+0xd3c/0x4858
[   24.857579]  kasan_atomics+0x198/0x2e0
[   24.857587]  kunit_try_run_case+0x170/0x3f0
[   24.857597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.857609]  kthread+0x328/0x630
[   24.857618]  ret_from_fork+0x10/0x20
[   24.857627] 
[   24.863746] Allocated by task 319:
[   24.864051]  kasan_save_stack+0x3c/0x68
[   24.864396]  kasan_save_track+0x20/0x40
[   24.864740]  kasan_save_alloc_info+0x40/0x58
[   24.865123]  __kasan_kmalloc+0xd4/0xd8
[   24.865460]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.865867]  kasan_atomics+0xb8/0x2e0
[   24.866195]  kunit_try_run_case+0x170/0x3f0
[   24.866572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.867063]  kthread+0x328/0x630
[   24.867357]  ret_from_fork+0x10/0x20
[   24.867679] 
[   24.867816] The buggy address belongs to the object at ffff00000a4bdd00
[   24.867816]  which belongs to the cache kmalloc-64 of size 64
[   24.868898] The buggy address is located 0 bytes to the right of
[   24.868898]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.870028] 
[   24.870165] The buggy address belongs to the physical page:
[   24.870657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.871349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.871927] page_type: f5(slab)
[   24.872210] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.872894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.873576] page dumped because: kasan: bad access detected
[   24.874068] 
[   24.874206] Memory state around the buggy address:
[   24.874632]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.875268]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.875905] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.876541]                                      ^
[   24.876967]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.877604]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.878241] ==================================================================
[   24.215679] ==================================================================
[   24.216334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   24.216996] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.217666] 
[   24.217816] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.217849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.217859] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.217869] Call trace:
[   24.217877]  show_stack+0x20/0x38 (C)
[   24.217897]  dump_stack_lvl+0x8c/0xd0
[   24.217916]  print_report+0x118/0x608
[   24.217935]  kasan_report+0xdc/0x128
[   24.217954]  kasan_check_range+0x100/0x1a8
[   24.217975]  __kasan_check_write+0x20/0x30
[   24.217996]  kasan_atomics_helper+0x32c/0x4858
[   24.218015]  kasan_atomics+0x198/0x2e0
[   24.218033]  kunit_try_run_case+0x170/0x3f0
[   24.218056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218082]  kthread+0x328/0x630
[   24.218104]  ret_from_fork+0x10/0x20
[   24.218124] 
[   24.224311] Allocated by task 319:
[   24.224626]  kasan_save_stack+0x3c/0x68
[   24.224986]  kasan_save_track+0x20/0x40
[   24.225344]  kasan_save_alloc_info+0x40/0x58
[   24.225744]  __kasan_kmalloc+0xd4/0xd8
[   24.226095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.226520]  kasan_atomics+0xb8/0x2e0
[   24.226863]  kunit_try_run_case+0x170/0x3f0
[   24.227256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.227764]  kthread+0x328/0x630
[   24.228073]  ret_from_fork+0x10/0x20
[   24.228412] 
[   24.228557] The buggy address belongs to the object at ffff00000a4bdd00
[   24.228557]  which belongs to the cache kmalloc-64 of size 64
[   24.229658] The buggy address is located 0 bytes to the right of
[   24.229658]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.230807] 
[   24.230954] The buggy address belongs to the physical page:
[   24.231457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.232166] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.232760] page_type: f5(slab)
[   24.233058] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.233758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.234453] page dumped because: kasan: bad access detected
[   24.234957] 
[   24.235102] Memory state around the buggy address:
[   24.235539]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236192]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.236844] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.237494]                                      ^
[   24.237933]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.238585]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.239234] ==================================================================
[   24.692137] ==================================================================
[   24.692775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   24.693428] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.694074] 
[   24.694213] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.694227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.694231] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.694236] Call trace:
[   24.694239]  show_stack+0x20/0x38 (C)
[   24.694249]  dump_stack_lvl+0x8c/0xd0
[   24.694257]  print_report+0x118/0x608
[   24.694266]  kasan_report+0xdc/0x128
[   24.694274]  __asan_report_load4_noabort+0x20/0x30
[   24.694285]  kasan_atomics_helper+0x3dcc/0x4858
[   24.694293]  kasan_atomics+0x198/0x2e0
[   24.694301]  kunit_try_run_case+0x170/0x3f0
[   24.694311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.694323]  kthread+0x328/0x630
[   24.694333]  ret_from_fork+0x10/0x20
[   24.694342] 
[   24.700168] Allocated by task 319:
[   24.700473]  kasan_save_stack+0x3c/0x68
[   24.700818]  kasan_save_track+0x20/0x40
[   24.701162]  kasan_save_alloc_info+0x40/0x58
[   24.701545]  __kasan_kmalloc+0xd4/0xd8
[   24.701883]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.702290]  kasan_atomics+0xb8/0x2e0
[   24.702618]  kunit_try_run_case+0x170/0x3f0
[   24.702994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703485]  kthread+0x328/0x630
[   24.703778]  ret_from_fork+0x10/0x20
[   24.704100] 
[   24.704237] The buggy address belongs to the object at ffff00000a4bdd00
[   24.704237]  which belongs to the cache kmalloc-64 of size 64
[   24.705320] The buggy address is located 0 bytes to the right of
[   24.705320]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.706450] 
[   24.706588] The buggy address belongs to the physical page:
[   24.707080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.707770] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.708348] page_type: f5(slab)
[   24.708631] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.709315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.709997] page dumped because: kasan: bad access detected
[   24.710489] 
[   24.710626] Memory state around the buggy address:
[   24.711051]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.711688]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.712326] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.712963]                                      ^
[   24.713389]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.714028]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.714663] ==================================================================
[   24.167190] ==================================================================
[   24.167846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   24.168511] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.169174] 
[   24.169323] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.169356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.169367] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.169378] Call trace:
[   24.169385]  show_stack+0x20/0x38 (C)
[   24.169406]  dump_stack_lvl+0x8c/0xd0
[   24.169426]  print_report+0x118/0x608
[   24.169445]  kasan_report+0xdc/0x128
[   24.169464]  kasan_check_range+0x100/0x1a8
[   24.169484]  __kasan_check_read+0x20/0x30
[   24.169507]  kasan_atomics_helper+0x2b0/0x4858
[   24.169526]  kasan_atomics+0x198/0x2e0
[   24.169543]  kunit_try_run_case+0x170/0x3f0
[   24.169566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.169592]  kthread+0x328/0x630
[   24.169613]  ret_from_fork+0x10/0x20
[   24.169633] 
[   24.175809] Allocated by task 319:
[   24.176125]  kasan_save_stack+0x3c/0x68
[   24.176484]  kasan_save_track+0x20/0x40
[   24.176844]  kasan_save_alloc_info+0x40/0x58
[   24.177243]  __kasan_kmalloc+0xd4/0xd8
[   24.177595]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.178020]  kasan_atomics+0xb8/0x2e0
[   24.178362]  kunit_try_run_case+0x170/0x3f0
[   24.178755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.179265]  kthread+0x328/0x630
[   24.179574]  ret_from_fork+0x10/0x20
[   24.179911] 
[   24.180057] The buggy address belongs to the object at ffff00000a4bdd00
[   24.180057]  which belongs to the cache kmalloc-64 of size 64
[   24.181159] The buggy address is located 0 bytes to the right of
[   24.181159]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.182308] 
[   24.182454] The buggy address belongs to the physical page:
[   24.182957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.183665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.184261] page_type: f5(slab)
[   24.184560] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.185260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.185955] page dumped because: kasan: bad access detected
[   24.186459] 
[   24.186604] Memory state around the buggy address:
[   24.187042]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.187695]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.188347] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.188996]                                      ^
[   24.189435]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190089]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.190738] ==================================================================
[   24.668645] ==================================================================
[   24.669282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   24.669928] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.670582] 
[   24.670721] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.670735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.670740] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.670745] Call trace:
[   24.670748]  show_stack+0x20/0x38 (C)
[   24.670757]  dump_stack_lvl+0x8c/0xd0
[   24.670766]  print_report+0x118/0x608
[   24.670775]  kasan_report+0xdc/0x128
[   24.670783]  kasan_check_range+0x100/0x1a8
[   24.670794]  __kasan_check_write+0x20/0x30
[   24.670804]  kasan_atomics_helper+0xad4/0x4858
[   24.670813]  kasan_atomics+0x198/0x2e0
[   24.670820]  kunit_try_run_case+0x170/0x3f0
[   24.670831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.670843]  kthread+0x328/0x630
[   24.670853]  ret_from_fork+0x10/0x20
[   24.670863] 
[   24.676988] Allocated by task 319:
[   24.677293]  kasan_save_stack+0x3c/0x68
[   24.677637]  kasan_save_track+0x20/0x40
[   24.677980]  kasan_save_alloc_info+0x40/0x58
[   24.678363]  __kasan_kmalloc+0xd4/0xd8
[   24.678701]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.679108]  kasan_atomics+0xb8/0x2e0
[   24.679437]  kunit_try_run_case+0x170/0x3f0
[   24.679814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.680303]  kthread+0x328/0x630
[   24.680596]  ret_from_fork+0x10/0x20
[   24.680918] 
[   24.681055] The buggy address belongs to the object at ffff00000a4bdd00
[   24.681055]  which belongs to the cache kmalloc-64 of size 64
[   24.682137] The buggy address is located 0 bytes to the right of
[   24.682137]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.683267] 
[   24.683405] The buggy address belongs to the physical page:
[   24.683897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.684589] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.685168] page_type: f5(slab)
[   24.685453] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.686137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.686818] page dumped because: kasan: bad access detected
[   24.687310] 
[   24.687447] Memory state around the buggy address:
[   24.687871]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.688508]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.689144] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.689781]                                      ^
[   24.690208]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.690844]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.691480] ==================================================================
[   24.738801] ==================================================================
[   24.739438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   24.740092] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.740737] 
[   24.740875] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.740890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.740894] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.740899] Call trace:
[   24.740902]  show_stack+0x20/0x38 (C)
[   24.740911]  dump_stack_lvl+0x8c/0xd0
[   24.740920]  print_report+0x118/0x608
[   24.740929]  kasan_report+0xdc/0x128
[   24.740937]  __asan_report_load4_noabort+0x20/0x30
[   24.740947]  kasan_atomics_helper+0x3dbc/0x4858
[   24.740956]  kasan_atomics+0x198/0x2e0
[   24.740964]  kunit_try_run_case+0x170/0x3f0
[   24.740974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.740985]  kthread+0x328/0x630
[   24.740995]  ret_from_fork+0x10/0x20
[   24.741005] 
[   24.746837] Allocated by task 319:
[   24.747142]  kasan_save_stack+0x3c/0x68
[   24.747486]  kasan_save_track+0x20/0x40
[   24.747830]  kasan_save_alloc_info+0x40/0x58
[   24.748213]  __kasan_kmalloc+0xd4/0xd8
[   24.748550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.748958]  kasan_atomics+0xb8/0x2e0
[   24.749287]  kunit_try_run_case+0x170/0x3f0
[   24.749663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.750153]  kthread+0x328/0x630
[   24.750446]  ret_from_fork+0x10/0x20
[   24.750768] 
[   24.750905] The buggy address belongs to the object at ffff00000a4bdd00
[   24.750905]  which belongs to the cache kmalloc-64 of size 64
[   24.751987] The buggy address is located 0 bytes to the right of
[   24.751987]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.753117] 
[   24.753254] The buggy address belongs to the physical page:
[   24.753747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.754439] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.755017] page_type: f5(slab)
[   24.755302] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.755986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.756668] page dumped because: kasan: bad access detected
[   24.757160] 
[   24.757296] Memory state around the buggy address:
[   24.757721]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.758358]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.758996] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.759633]                                      ^
[   24.760059]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.760696]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.761332] ==================================================================
[   24.808673] ==================================================================
[   24.809310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   24.809956] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.810610] 
[   24.810748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.810762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.810767] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.810771] Call trace:
[   24.810775]  show_stack+0x20/0x38 (C)
[   24.810785]  dump_stack_lvl+0x8c/0xd0
[   24.810793]  print_report+0x118/0x608
[   24.810801]  kasan_report+0xdc/0x128
[   24.810810]  kasan_check_range+0x100/0x1a8
[   24.810819]  __kasan_check_write+0x20/0x30
[   24.810829]  kasan_atomics_helper+0xca0/0x4858
[   24.810838]  kasan_atomics+0x198/0x2e0
[   24.810845]  kunit_try_run_case+0x170/0x3f0
[   24.810856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.810867]  kthread+0x328/0x630
[   24.810877]  ret_from_fork+0x10/0x20
[   24.810887] 
[   24.817010] Allocated by task 319:
[   24.817315]  kasan_save_stack+0x3c/0x68
[   24.817660]  kasan_save_track+0x20/0x40
[   24.818006]  kasan_save_alloc_info+0x40/0x58
[   24.818389]  __kasan_kmalloc+0xd4/0xd8
[   24.818726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.819134]  kasan_atomics+0xb8/0x2e0
[   24.819463]  kunit_try_run_case+0x170/0x3f0
[   24.819840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.820331]  kthread+0x328/0x630
[   24.820623]  ret_from_fork+0x10/0x20
[   24.820946] 
[   24.821082] The buggy address belongs to the object at ffff00000a4bdd00
[   24.821082]  which belongs to the cache kmalloc-64 of size 64
[   24.822165] The buggy address is located 0 bytes to the right of
[   24.822165]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.823294] 
[   24.823433] The buggy address belongs to the physical page:
[   24.823924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.824617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.825195] page_type: f5(slab)
[   24.825480] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.826163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.826845] page dumped because: kasan: bad access detected
[   24.827337] 
[   24.827474] Memory state around the buggy address:
[   24.827899]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.828537]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.829174] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.829810]                                      ^
[   24.830236]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.830873]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831509] ==================================================================
[   24.925584] ==================================================================
[   24.926222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   24.926876] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.927521] 
[   24.927659] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.927674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.927678] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.927683] Call trace:
[   24.927687]  show_stack+0x20/0x38 (C)
[   24.927696]  dump_stack_lvl+0x8c/0xd0
[   24.927705]  print_report+0x118/0x608
[   24.927713]  kasan_report+0xdc/0x128
[   24.927722]  __asan_report_load8_noabort+0x20/0x30
[   24.927733]  kasan_atomics_helper+0x3f58/0x4858
[   24.927741]  kasan_atomics+0x198/0x2e0
[   24.927749]  kunit_try_run_case+0x170/0x3f0
[   24.927760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.927771]  kthread+0x328/0x630
[   24.927782]  ret_from_fork+0x10/0x20
[   24.927791] 
[   24.933618] Allocated by task 319:
[   24.933921]  kasan_save_stack+0x3c/0x68
[   24.934265]  kasan_save_track+0x20/0x40
[   24.934609]  kasan_save_alloc_info+0x40/0x58
[   24.934992]  __kasan_kmalloc+0xd4/0xd8
[   24.935328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.935735]  kasan_atomics+0xb8/0x2e0
[   24.936064]  kunit_try_run_case+0x170/0x3f0
[   24.936441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.936932]  kthread+0x328/0x630
[   24.937225]  ret_from_fork+0x10/0x20
[   24.937547] 
[   24.937685] The buggy address belongs to the object at ffff00000a4bdd00
[   24.937685]  which belongs to the cache kmalloc-64 of size 64
[   24.938768] The buggy address is located 0 bytes to the right of
[   24.938768]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.939897] 
[   24.940036] The buggy address belongs to the physical page:
[   24.940528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.941218] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.941797] page_type: f5(slab)
[   24.942082] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.942766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.943448] page dumped because: kasan: bad access detected
[   24.943940] 
[   24.944076] Memory state around the buggy address:
[   24.944502]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.945138]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.945775] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.946411]                                      ^
[   24.946837]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.947476]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.948111] ==================================================================
[   24.480221] ==================================================================
[   24.480866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   24.481518] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.482178] 
[   24.482321] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.482342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.482349] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.482356] Call trace:
[   24.482361]  show_stack+0x20/0x38 (C)
[   24.482375]  dump_stack_lvl+0x8c/0xd0
[   24.482387]  print_report+0x118/0x608
[   24.482401]  kasan_report+0xdc/0x128
[   24.482414]  kasan_check_range+0x100/0x1a8
[   24.482428]  __kasan_check_write+0x20/0x30
[   24.482443]  kasan_atomics_helper+0x760/0x4858
[   24.482456]  kasan_atomics+0x198/0x2e0
[   24.482468]  kunit_try_run_case+0x170/0x3f0
[   24.482484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.482502]  kthread+0x328/0x630
[   24.482516]  ret_from_fork+0x10/0x20
[   24.482530] 
[   24.488678] Allocated by task 319:
[   24.488986]  kasan_save_stack+0x3c/0x68
[   24.489338]  kasan_save_track+0x20/0x40
[   24.489688]  kasan_save_alloc_info+0x40/0x58
[   24.490079]  __kasan_kmalloc+0xd4/0xd8
[   24.490422]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.490836]  kasan_atomics+0xb8/0x2e0
[   24.491171]  kunit_try_run_case+0x170/0x3f0
[   24.491554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.492051]  kthread+0x328/0x630
[   24.492351]  ret_from_fork+0x10/0x20
[   24.492679] 
[   24.492819] The buggy address belongs to the object at ffff00000a4bdd00
[   24.492819]  which belongs to the cache kmalloc-64 of size 64
[   24.493909] The buggy address is located 0 bytes to the right of
[   24.493909]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.495046] 
[   24.495187] The buggy address belongs to the physical page:
[   24.495684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.496382] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.496968] page_type: f5(slab)
[   24.497257] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.497947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.498634] page dumped because: kasan: bad access detected
[   24.499131] 
[   24.499272] Memory state around the buggy address:
[   24.499702]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.500345]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.500988] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.501630]                                      ^
[   24.502060]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.502703]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.503345] ==================================================================
[   24.504064] ==================================================================
[   24.504709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   24.505362] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.506022] 
[   24.506166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.506188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.506195] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.506202] Call trace:
[   24.506207]  show_stack+0x20/0x38 (C)
[   24.506221]  dump_stack_lvl+0x8c/0xd0
[   24.506233]  print_report+0x118/0x608
[   24.506247]  kasan_report+0xdc/0x128
[   24.506260]  kasan_check_range+0x100/0x1a8
[   24.506274]  __kasan_check_write+0x20/0x30
[   24.506289]  kasan_atomics_helper+0x7cc/0x4858
[   24.506302]  kasan_atomics+0x198/0x2e0
[   24.506313]  kunit_try_run_case+0x170/0x3f0
[   24.506329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.506347]  kthread+0x328/0x630
[   24.506361]  ret_from_fork+0x10/0x20
[   24.506376] 
[   24.512522] Allocated by task 319:
[   24.512831]  kasan_save_stack+0x3c/0x68
[   24.513182]  kasan_save_track+0x20/0x40
[   24.513533]  kasan_save_alloc_info+0x40/0x58
[   24.513923]  __kasan_kmalloc+0xd4/0xd8
[   24.514265]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.514680]  kasan_atomics+0xb8/0x2e0
[   24.515014]  kunit_try_run_case+0x170/0x3f0
[   24.515397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.515895]  kthread+0x328/0x630
[   24.516194]  ret_from_fork+0x10/0x20
[   24.516522] 
[   24.516663] The buggy address belongs to the object at ffff00000a4bdd00
[   24.516663]  which belongs to the cache kmalloc-64 of size 64
[   24.517752] The buggy address is located 0 bytes to the right of
[   24.517752]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.518889] 
[   24.519030] The buggy address belongs to the physical page:
[   24.519527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.520226] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.520811] page_type: f5(slab)
[   24.521101] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.521791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.522477] page dumped because: kasan: bad access detected
[   24.522975] 
[   24.523115] Memory state around the buggy address:
[   24.523544]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.524188]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.524831] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.525473]                                      ^
[   24.525904]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.526547]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.527189] ==================================================================
[   24.240009] ==================================================================
[   24.240663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   24.241332] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.242002] 
[   24.242151] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.242183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.242193] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.242203] Call trace:
[   24.242210]  show_stack+0x20/0x38 (C)
[   24.242231]  dump_stack_lvl+0x8c/0xd0
[   24.242249]  print_report+0x118/0x608
[   24.242269]  kasan_report+0xdc/0x128
[   24.242287]  __asan_report_store4_noabort+0x20/0x30
[   24.242311]  kasan_atomics_helper+0x3f94/0x4858
[   24.242330]  kasan_atomics+0x198/0x2e0
[   24.242347]  kunit_try_run_case+0x170/0x3f0
[   24.242371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.242396]  kthread+0x328/0x630
[   24.242418]  ret_from_fork+0x10/0x20
[   24.242438] 
[   24.248336] Allocated by task 319:
[   24.248652]  kasan_save_stack+0x3c/0x68
[   24.249011]  kasan_save_track+0x20/0x40
[   24.249370]  kasan_save_alloc_info+0x40/0x58
[   24.249769]  __kasan_kmalloc+0xd4/0xd8
[   24.250119]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.250544]  kasan_atomics+0xb8/0x2e0
[   24.250887]  kunit_try_run_case+0x170/0x3f0
[   24.251280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.251788]  kthread+0x328/0x630
[   24.252098]  ret_from_fork+0x10/0x20
[   24.252435] 
[   24.252582] The buggy address belongs to the object at ffff00000a4bdd00
[   24.252582]  which belongs to the cache kmalloc-64 of size 64
[   24.253683] The buggy address is located 0 bytes to the right of
[   24.253683]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.254832] 
[   24.254978] The buggy address belongs to the physical page:
[   24.255481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.256189] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.256782] page_type: f5(slab)
[   24.257080] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.257780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.258476] page dumped because: kasan: bad access detected
[   24.258979] 
[   24.259125] Memory state around the buggy address:
[   24.259562]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.260214]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.260867] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.261517]                                      ^
[   24.261954]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.262606]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.263255] ==================================================================
[   24.598157] ==================================================================
[   24.598794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   24.599440] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.600094] 
[   24.600233] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.600248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.600252] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.600257] Call trace:
[   24.600261]  show_stack+0x20/0x38 (C)
[   24.600270]  dump_stack_lvl+0x8c/0xd0
[   24.600279]  print_report+0x118/0x608
[   24.600288]  kasan_report+0xdc/0x128
[   24.600296]  kasan_check_range+0x100/0x1a8
[   24.600306]  __kasan_check_write+0x20/0x30
[   24.600316]  kasan_atomics_helper+0x99c/0x4858
[   24.600324]  kasan_atomics+0x198/0x2e0
[   24.600332]  kunit_try_run_case+0x170/0x3f0
[   24.600342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.600354]  kthread+0x328/0x630
[   24.600364]  ret_from_fork+0x10/0x20
[   24.600374] 
[   24.606496] Allocated by task 319:
[   24.606800]  kasan_save_stack+0x3c/0x68
[   24.607144]  kasan_save_track+0x20/0x40
[   24.607488]  kasan_save_alloc_info+0x40/0x58
[   24.607871]  __kasan_kmalloc+0xd4/0xd8
[   24.608208]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.608614]  kasan_atomics+0xb8/0x2e0
[   24.608943]  kunit_try_run_case+0x170/0x3f0
[   24.609319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.609808]  kthread+0x328/0x630
[   24.610101]  ret_from_fork+0x10/0x20
[   24.610423] 
[   24.610561] The buggy address belongs to the object at ffff00000a4bdd00
[   24.610561]  which belongs to the cache kmalloc-64 of size 64
[   24.611644] The buggy address is located 0 bytes to the right of
[   24.611644]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.612773] 
[   24.612910] The buggy address belongs to the physical page:
[   24.613402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.614094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.614673] page_type: f5(slab)
[   24.614956] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.615639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.616321] page dumped because: kasan: bad access detected
[   24.616813] 
[   24.616949] Memory state around the buggy address:
[   24.617375]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.618011]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.618648] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.619284]                                      ^
[   24.619710]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.620348]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.620984] ==================================================================
[   24.785485] ==================================================================
[   24.786122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   24.786776] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.787422] 
[   24.787561] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.787575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.787579] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.787584] Call trace:
[   24.787587]  show_stack+0x20/0x38 (C)
[   24.787596]  dump_stack_lvl+0x8c/0xd0
[   24.787605]  print_report+0x118/0x608
[   24.787614]  kasan_report+0xdc/0x128
[   24.787623]  __asan_report_load4_noabort+0x20/0x30
[   24.787633]  kasan_atomics_helper+0x3de4/0x4858
[   24.787641]  kasan_atomics+0x198/0x2e0
[   24.787650]  kunit_try_run_case+0x170/0x3f0
[   24.787660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.787672]  kthread+0x328/0x630
[   24.787681]  ret_from_fork+0x10/0x20
[   24.787691] 
[   24.793522] Allocated by task 319:
[   24.793826]  kasan_save_stack+0x3c/0x68
[   24.794171]  kasan_save_track+0x20/0x40
[   24.794515]  kasan_save_alloc_info+0x40/0x58
[   24.794898]  __kasan_kmalloc+0xd4/0xd8
[   24.795236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.795643]  kasan_atomics+0xb8/0x2e0
[   24.795972]  kunit_try_run_case+0x170/0x3f0
[   24.796348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.796838]  kthread+0x328/0x630
[   24.797131]  ret_from_fork+0x10/0x20
[   24.797454] 
[   24.797590] The buggy address belongs to the object at ffff00000a4bdd00
[   24.797590]  which belongs to the cache kmalloc-64 of size 64
[   24.798673] The buggy address is located 0 bytes to the right of
[   24.798673]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.799802] 
[   24.799939] The buggy address belongs to the physical page:
[   24.800432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.801124] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.801701] page_type: f5(slab)
[   24.801986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.802670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.803352] page dumped because: kasan: bad access detected
[   24.803844] 
[   24.803981] Memory state around the buggy address:
[   24.804406]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.805043]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.805681] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.806317]                                      ^
[   24.806742]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.807379]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.808014] ==================================================================
[   24.948763] ==================================================================
[   24.949400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   24.950046] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.950699] 
[   24.950838] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.950852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.950857] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.950862] Call trace:
[   24.950865]  show_stack+0x20/0x38 (C)
[   24.950874]  dump_stack_lvl+0x8c/0xd0
[   24.950883]  print_report+0x118/0x608
[   24.950891]  kasan_report+0xdc/0x128
[   24.950900]  kasan_check_range+0x100/0x1a8
[   24.950909]  __kasan_check_write+0x20/0x30
[   24.950919]  kasan_atomics_helper+0xe44/0x4858
[   24.950928]  kasan_atomics+0x198/0x2e0
[   24.950936]  kunit_try_run_case+0x170/0x3f0
[   24.950946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.950957]  kthread+0x328/0x630
[   24.950967]  ret_from_fork+0x10/0x20
[   24.950976] 
[   24.957095] Allocated by task 319:
[   24.957399]  kasan_save_stack+0x3c/0x68
[   24.957743]  kasan_save_track+0x20/0x40
[   24.958088]  kasan_save_alloc_info+0x40/0x58
[   24.958472]  __kasan_kmalloc+0xd4/0xd8
[   24.958809]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.959215]  kasan_atomics+0xb8/0x2e0
[   24.959544]  kunit_try_run_case+0x170/0x3f0
[   24.959920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.960411]  kthread+0x328/0x630
[   24.960705]  ret_from_fork+0x10/0x20
[   24.961027] 
[   24.961163] The buggy address belongs to the object at ffff00000a4bdd00
[   24.961163]  which belongs to the cache kmalloc-64 of size 64
[   24.962246] The buggy address is located 0 bytes to the right of
[   24.962246]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.963375] 
[   24.963512] The buggy address belongs to the physical page:
[   24.964004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.964696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.965274] page_type: f5(slab)
[   24.965557] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.966241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.966923] page dumped because: kasan: bad access detected
[   24.967415] 
[   24.967552] Memory state around the buggy address:
[   24.967977]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.968616]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.969252] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.969888]                                      ^
[   24.970314]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.970951]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.971587] ==================================================================
[   25.347618] ==================================================================
[   25.348255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   25.348908] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.349561] 
[   25.349700] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.349714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.349719] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.349723] Call trace:
[   25.349726]  show_stack+0x20/0x38 (C)
[   25.349736]  dump_stack_lvl+0x8c/0xd0
[   25.349745]  print_report+0x118/0x608
[   25.349753]  kasan_report+0xdc/0x128
[   25.349762]  kasan_check_range+0x100/0x1a8
[   25.349771]  __kasan_check_write+0x20/0x30
[   25.349781]  kasan_atomics_helper+0x14e4/0x4858
[   25.349789]  kasan_atomics+0x198/0x2e0
[   25.349797]  kunit_try_run_case+0x170/0x3f0
[   25.349808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.349819]  kthread+0x328/0x630
[   25.349829]  ret_from_fork+0x10/0x20
[   25.349838] 
[   25.355966] Allocated by task 319:
[   25.356270]  kasan_save_stack+0x3c/0x68
[   25.356614]  kasan_save_track+0x20/0x40
[   25.356958]  kasan_save_alloc_info+0x40/0x58
[   25.357341]  __kasan_kmalloc+0xd4/0xd8
[   25.357678]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.358085]  kasan_atomics+0xb8/0x2e0
[   25.358413]  kunit_try_run_case+0x170/0x3f0
[   25.358789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.359278]  kthread+0x328/0x630
[   25.359571]  ret_from_fork+0x10/0x20
[   25.359893] 
[   25.360030] The buggy address belongs to the object at ffff00000a4bdd00
[   25.360030]  which belongs to the cache kmalloc-64 of size 64
[   25.361113] The buggy address is located 0 bytes to the right of
[   25.361113]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.362242] 
[   25.362379] The buggy address belongs to the physical page:
[   25.362871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.363563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.364140] page_type: f5(slab)
[   25.364424] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.365107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.365789] page dumped because: kasan: bad access detected
[   25.366281] 
[   25.366417] Memory state around the buggy address:
[   25.366843]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.367480]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.368117] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.368753]                                      ^
[   25.369179]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.369815]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.370451] ==================================================================
[   24.878899] ==================================================================
[   24.879537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   24.880191] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.880837] 
[   24.880975] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.880989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.880994] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.880998] Call trace:
[   24.881002]  show_stack+0x20/0x38 (C)
[   24.881011]  dump_stack_lvl+0x8c/0xd0
[   24.881019]  print_report+0x118/0x608
[   24.881028]  kasan_report+0xdc/0x128
[   24.881037]  __asan_report_load4_noabort+0x20/0x30
[   24.881047]  kasan_atomics_helper+0x3e04/0x4858
[   24.881056]  kasan_atomics+0x198/0x2e0
[   24.881063]  kunit_try_run_case+0x170/0x3f0
[   24.881074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.881086]  kthread+0x328/0x630
[   24.881095]  ret_from_fork+0x10/0x20
[   24.881105] 
[   24.886935] Allocated by task 319:
[   24.887239]  kasan_save_stack+0x3c/0x68
[   24.887585]  kasan_save_track+0x20/0x40
[   24.887930]  kasan_save_alloc_info+0x40/0x58
[   24.888313]  __kasan_kmalloc+0xd4/0xd8
[   24.888651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.889058]  kasan_atomics+0xb8/0x2e0
[   24.889386]  kunit_try_run_case+0x170/0x3f0
[   24.889763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.890254]  kthread+0x328/0x630
[   24.890547]  ret_from_fork+0x10/0x20
[   24.890869] 
[   24.891006] The buggy address belongs to the object at ffff00000a4bdd00
[   24.891006]  which belongs to the cache kmalloc-64 of size 64
[   24.892089] The buggy address is located 0 bytes to the right of
[   24.892089]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.893218] 
[   24.893355] The buggy address belongs to the physical page:
[   24.893847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.894538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.895117] page_type: f5(slab)
[   24.895402] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.896086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.896768] page dumped because: kasan: bad access detected
[   24.897260] 
[   24.897396] Memory state around the buggy address:
[   24.897822]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.898460]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.899097] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.899732]                                      ^
[   24.900158]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.900797]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.901432] ==================================================================
[   25.277449] ==================================================================
[   25.278086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   25.278740] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.279386] 
[   25.279524] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.279538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.279542] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.279547] Call trace:
[   25.279550]  show_stack+0x20/0x38 (C)
[   25.279560]  dump_stack_lvl+0x8c/0xd0
[   25.279568]  print_report+0x118/0x608
[   25.279577]  kasan_report+0xdc/0x128
[   25.279585]  __asan_report_load8_noabort+0x20/0x30
[   25.279596]  kasan_atomics_helper+0x3f04/0x4858
[   25.279604]  kasan_atomics+0x198/0x2e0
[   25.279612]  kunit_try_run_case+0x170/0x3f0
[   25.279622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.279634]  kthread+0x328/0x630
[   25.279644]  ret_from_fork+0x10/0x20
[   25.279653] 
[   25.285481] Allocated by task 319:
[   25.285785]  kasan_save_stack+0x3c/0x68
[   25.286129]  kasan_save_track+0x20/0x40
[   25.286474]  kasan_save_alloc_info+0x40/0x58
[   25.286857]  __kasan_kmalloc+0xd4/0xd8
[   25.287194]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.287603]  kasan_atomics+0xb8/0x2e0
[   25.287932]  kunit_try_run_case+0x170/0x3f0
[   25.288307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.288797]  kthread+0x328/0x630
[   25.289089]  ret_from_fork+0x10/0x20
[   25.289412] 
[   25.289548] The buggy address belongs to the object at ffff00000a4bdd00
[   25.289548]  which belongs to the cache kmalloc-64 of size 64
[   25.290631] The buggy address is located 0 bytes to the right of
[   25.290631]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.291761] 
[   25.291897] The buggy address belongs to the physical page:
[   25.292389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.293081] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.293660] page_type: f5(slab)
[   25.293943] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.294627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.295309] page dumped because: kasan: bad access detected
[   25.295801] 
[   25.295938] Memory state around the buggy address:
[   25.296363]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.297000]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.297637] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.298273]                                      ^
[   25.298699]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.299336]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.299972] ==================================================================
[   25.136431] ==================================================================
[   25.137068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   25.137722] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.138375] 
[   25.138515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.138530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.138534] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.138539] Call trace:
[   25.138542]  show_stack+0x20/0x38 (C)
[   25.138552]  dump_stack_lvl+0x8c/0xd0
[   25.138560]  print_report+0x118/0x608
[   25.138569]  kasan_report+0xdc/0x128
[   25.138578]  kasan_check_range+0x100/0x1a8
[   25.138588]  __kasan_check_write+0x20/0x30
[   25.138598]  kasan_atomics_helper+0x1128/0x4858
[   25.138606]  kasan_atomics+0x198/0x2e0
[   25.138614]  kunit_try_run_case+0x170/0x3f0
[   25.138625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.138636]  kthread+0x328/0x630
[   25.138646]  ret_from_fork+0x10/0x20
[   25.138655] 
[   25.144784] Allocated by task 319:
[   25.145089]  kasan_save_stack+0x3c/0x68
[   25.145434]  kasan_save_track+0x20/0x40
[   25.145778]  kasan_save_alloc_info+0x40/0x58
[   25.146161]  __kasan_kmalloc+0xd4/0xd8
[   25.146498]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.146905]  kasan_atomics+0xb8/0x2e0
[   25.147234]  kunit_try_run_case+0x170/0x3f0
[   25.147609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.148098]  kthread+0x328/0x630
[   25.148391]  ret_from_fork+0x10/0x20
[   25.148714] 
[   25.148851] The buggy address belongs to the object at ffff00000a4bdd00
[   25.148851]  which belongs to the cache kmalloc-64 of size 64
[   25.149934] The buggy address is located 0 bytes to the right of
[   25.149934]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.151064] 
[   25.151200] The buggy address belongs to the physical page:
[   25.151692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.152384] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.152961] page_type: f5(slab)
[   25.153246] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.153929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.154612] page dumped because: kasan: bad access detected
[   25.155104] 
[   25.155241] Memory state around the buggy address:
[   25.155665]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156301]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156938] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.157576]                                      ^
[   25.158002]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.158639]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.159275] ==================================================================
[   25.300624] ==================================================================
[   25.301261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   25.301914] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.302567] 
[   25.302705] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.302719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.302724] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.302728] Call trace:
[   25.302732]  show_stack+0x20/0x38 (C)
[   25.302741]  dump_stack_lvl+0x8c/0xd0
[   25.302749]  print_report+0x118/0x608
[   25.302758]  kasan_report+0xdc/0x128
[   25.302766]  kasan_check_range+0x100/0x1a8
[   25.302776]  __kasan_check_write+0x20/0x30
[   25.302786]  kasan_atomics_helper+0x1414/0x4858
[   25.302794]  kasan_atomics+0x198/0x2e0
[   25.302802]  kunit_try_run_case+0x170/0x3f0
[   25.302812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.302824]  kthread+0x328/0x630
[   25.302833]  ret_from_fork+0x10/0x20
[   25.302843] 
[   25.308974] Allocated by task 319:
[   25.309279]  kasan_save_stack+0x3c/0x68
[   25.309623]  kasan_save_track+0x20/0x40
[   25.309966]  kasan_save_alloc_info+0x40/0x58
[   25.310349]  __kasan_kmalloc+0xd4/0xd8
[   25.310687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.311093]  kasan_atomics+0xb8/0x2e0
[   25.311422]  kunit_try_run_case+0x170/0x3f0
[   25.311798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.312288]  kthread+0x328/0x630
[   25.312581]  ret_from_fork+0x10/0x20
[   25.312903] 
[   25.313040] The buggy address belongs to the object at ffff00000a4bdd00
[   25.313040]  which belongs to the cache kmalloc-64 of size 64
[   25.314122] The buggy address is located 0 bytes to the right of
[   25.314122]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.315252] 
[   25.315389] The buggy address belongs to the physical page:
[   25.315882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.316574] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.317151] page_type: f5(slab)
[   25.317434] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.318118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.318800] page dumped because: kasan: bad access detected
[   25.319292] 
[   25.319428] Memory state around the buggy address:
[   25.319854]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.320490]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.321129] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.321766]                                      ^
[   25.322192]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.322829]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323466] ==================================================================
[   24.408629] ==================================================================
[   24.409274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   24.409926] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.410586] 
[   24.410730] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.410752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.410759] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.410766] Call trace:
[   24.410771]  show_stack+0x20/0x38 (C)
[   24.410785]  dump_stack_lvl+0x8c/0xd0
[   24.410798]  print_report+0x118/0x608
[   24.410810]  kasan_report+0xdc/0x128
[   24.410823]  kasan_check_range+0x100/0x1a8
[   24.410837]  __kasan_check_write+0x20/0x30
[   24.410852]  kasan_atomics_helper+0x61c/0x4858
[   24.410864]  kasan_atomics+0x198/0x2e0
[   24.410876]  kunit_try_run_case+0x170/0x3f0
[   24.410891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.410908]  kthread+0x328/0x630
[   24.410923]  ret_from_fork+0x10/0x20
[   24.410937] 
[   24.417080] Allocated by task 319:
[   24.417388]  kasan_save_stack+0x3c/0x68
[   24.417739]  kasan_save_track+0x20/0x40
[   24.418089]  kasan_save_alloc_info+0x40/0x58
[   24.418480]  __kasan_kmalloc+0xd4/0xd8
[   24.418822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.419236]  kasan_atomics+0xb8/0x2e0
[   24.419571]  kunit_try_run_case+0x170/0x3f0
[   24.419954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.420451]  kthread+0x328/0x630
[   24.420751]  ret_from_fork+0x10/0x20
[   24.421079] 
[   24.421220] The buggy address belongs to the object at ffff00000a4bdd00
[   24.421220]  which belongs to the cache kmalloc-64 of size 64
[   24.422310] The buggy address is located 0 bytes to the right of
[   24.422310]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.423446] 
[   24.423587] The buggy address belongs to the physical page:
[   24.424083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.424781] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.425366] page_type: f5(slab)
[   24.425656] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.426345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.427032] page dumped because: kasan: bad access detected
[   24.427529] 
[   24.427670] Memory state around the buggy address:
[   24.428099]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.428743]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.429386] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.430028]                                      ^
[   24.430459]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431102]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431744] ==================================================================
[   24.832225] ==================================================================
[   24.832864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   24.833518] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.834163] 
[   24.834303] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.834318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.834322] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.834327] Call trace:
[   24.834330]  show_stack+0x20/0x38 (C)
[   24.834339]  dump_stack_lvl+0x8c/0xd0
[   24.834347]  print_report+0x118/0x608
[   24.834356]  kasan_report+0xdc/0x128
[   24.834364]  __asan_report_load4_noabort+0x20/0x30
[   24.834375]  kasan_atomics_helper+0x3dd8/0x4858
[   24.834384]  kasan_atomics+0x198/0x2e0
[   24.834391]  kunit_try_run_case+0x170/0x3f0
[   24.834401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.834413]  kthread+0x328/0x630
[   24.834423]  ret_from_fork+0x10/0x20
[   24.834432] 
[   24.840262] Allocated by task 319:
[   24.840567]  kasan_save_stack+0x3c/0x68
[   24.840911]  kasan_save_track+0x20/0x40
[   24.841254]  kasan_save_alloc_info+0x40/0x58
[   24.841638]  __kasan_kmalloc+0xd4/0xd8
[   24.841974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.842381]  kasan_atomics+0xb8/0x2e0
[   24.842710]  kunit_try_run_case+0x170/0x3f0
[   24.843087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.843578]  kthread+0x328/0x630
[   24.843871]  ret_from_fork+0x10/0x20
[   24.844193] 
[   24.844330] The buggy address belongs to the object at ffff00000a4bdd00
[   24.844330]  which belongs to the cache kmalloc-64 of size 64
[   24.845413] The buggy address is located 0 bytes to the right of
[   24.845413]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.846542] 
[   24.846680] The buggy address belongs to the physical page:
[   24.847172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.847864] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.848441] page_type: f5(slab)
[   24.848726] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.849409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.850091] page dumped because: kasan: bad access detected
[   24.850583] 
[   24.850719] Memory state around the buggy address:
[   24.851145]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.851782]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.852420] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.853056]                                      ^
[   24.853482]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.854118]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.854754] ==================================================================
[   24.761992] ==================================================================
[   24.762629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   24.763275] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.763928] 
[   24.764066] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.764081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.764085] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.764090] Call trace:
[   24.764094]  show_stack+0x20/0x38 (C)
[   24.764102]  dump_stack_lvl+0x8c/0xd0
[   24.764111]  print_report+0x118/0x608
[   24.764119]  kasan_report+0xdc/0x128
[   24.764128]  kasan_check_range+0x100/0x1a8
[   24.764137]  __kasan_check_write+0x20/0x30
[   24.764147]  kasan_atomics_helper+0xc08/0x4858
[   24.764155]  kasan_atomics+0x198/0x2e0
[   24.764164]  kunit_try_run_case+0x170/0x3f0
[   24.764174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.764185]  kthread+0x328/0x630
[   24.764195]  ret_from_fork+0x10/0x20
[   24.764204] 
[   24.770326] Allocated by task 319:
[   24.770630]  kasan_save_stack+0x3c/0x68
[   24.770974]  kasan_save_track+0x20/0x40
[   24.771319]  kasan_save_alloc_info+0x40/0x58
[   24.771702]  __kasan_kmalloc+0xd4/0xd8
[   24.772039]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.772446]  kasan_atomics+0xb8/0x2e0
[   24.772775]  kunit_try_run_case+0x170/0x3f0
[   24.773150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.773641]  kthread+0x328/0x630
[   24.773934]  ret_from_fork+0x10/0x20
[   24.774256] 
[   24.774394] The buggy address belongs to the object at ffff00000a4bdd00
[   24.774394]  which belongs to the cache kmalloc-64 of size 64
[   24.775476] The buggy address is located 0 bytes to the right of
[   24.775476]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.776606] 
[   24.776743] The buggy address belongs to the physical page:
[   24.777235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.777925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.778503] page_type: f5(slab)
[   24.778787] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.779470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.780152] page dumped because: kasan: bad access detected
[   24.780644] 
[   24.780781] Memory state around the buggy address:
[   24.781207]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.781843]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.782480] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.783116]                                      ^
[   24.783542]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.784178]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.784814] ==================================================================
[   25.018956] ==================================================================
[   25.019594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   25.020240] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.020893] 
[   25.021032] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.021046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.021051] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.021056] Call trace:
[   25.021059]  show_stack+0x20/0x38 (C)
[   25.021068]  dump_stack_lvl+0x8c/0xd0
[   25.021077]  print_report+0x118/0x608
[   25.021086]  kasan_report+0xdc/0x128
[   25.021095]  kasan_check_range+0x100/0x1a8
[   25.021104]  __kasan_check_write+0x20/0x30
[   25.021115]  kasan_atomics_helper+0xf20/0x4858
[   25.021123]  kasan_atomics+0x198/0x2e0
[   25.021132]  kunit_try_run_case+0x170/0x3f0
[   25.021142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.021154]  kthread+0x328/0x630
[   25.021164]  ret_from_fork+0x10/0x20
[   25.021174] 
[   25.027295] Allocated by task 319:
[   25.027598]  kasan_save_stack+0x3c/0x68
[   25.027943]  kasan_save_track+0x20/0x40
[   25.028287]  kasan_save_alloc_info+0x40/0x58
[   25.028670]  __kasan_kmalloc+0xd4/0xd8
[   25.029007]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.029414]  kasan_atomics+0xb8/0x2e0
[   25.029743]  kunit_try_run_case+0x170/0x3f0
[   25.030118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.030608]  kthread+0x328/0x630
[   25.030901]  ret_from_fork+0x10/0x20
[   25.031224] 
[   25.031360] The buggy address belongs to the object at ffff00000a4bdd00
[   25.031360]  which belongs to the cache kmalloc-64 of size 64
[   25.032443] The buggy address is located 0 bytes to the right of
[   25.032443]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.033572] 
[   25.033709] The buggy address belongs to the physical page:
[   25.034202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.034894] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.035472] page_type: f5(slab)
[   25.035755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.036439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.037121] page dumped because: kasan: bad access detected
[   25.037613] 
[   25.037750] Memory state around the buggy address:
[   25.038175]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.038814]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.039450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.040086]                                      ^
[   25.040512]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041150]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041786] ==================================================================
[   24.527967] ==================================================================
[   24.528605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   24.529251] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.529905] 
[   24.530044] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.530059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.530063] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.530068] Call trace:
[   24.530072]  show_stack+0x20/0x38 (C)
[   24.530081]  dump_stack_lvl+0x8c/0xd0
[   24.530089]  print_report+0x118/0x608
[   24.530098]  kasan_report+0xdc/0x128
[   24.530106]  kasan_check_range+0x100/0x1a8
[   24.530116]  __kasan_check_write+0x20/0x30
[   24.530126]  kasan_atomics_helper+0x894/0x4858
[   24.530134]  kasan_atomics+0x198/0x2e0
[   24.530142]  kunit_try_run_case+0x170/0x3f0
[   24.530152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.530164]  kthread+0x328/0x630
[   24.530174]  ret_from_fork+0x10/0x20
[   24.530183] 
[   24.536305] Allocated by task 319:
[   24.536609]  kasan_save_stack+0x3c/0x68
[   24.536954]  kasan_save_track+0x20/0x40
[   24.537297]  kasan_save_alloc_info+0x40/0x58
[   24.537680]  __kasan_kmalloc+0xd4/0xd8
[   24.538017]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.538425]  kasan_atomics+0xb8/0x2e0
[   24.538755]  kunit_try_run_case+0x170/0x3f0
[   24.539130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.539621]  kthread+0x328/0x630
[   24.539913]  ret_from_fork+0x10/0x20
[   24.540236] 
[   24.540372] The buggy address belongs to the object at ffff00000a4bdd00
[   24.540372]  which belongs to the cache kmalloc-64 of size 64
[   24.541455] The buggy address is located 0 bytes to the right of
[   24.541455]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.542585] 
[   24.542722] The buggy address belongs to the physical page:
[   24.543214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.543906] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.544485] page_type: f5(slab)
[   24.544770] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.545454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.546136] page dumped because: kasan: bad access detected
[   24.546628] 
[   24.546764] Memory state around the buggy address:
[   24.547190]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.547826]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.548464] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.549101]                                      ^
[   24.549527]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.550164]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.550800] ==================================================================
[   25.488002] ==================================================================
[   25.488640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   25.489295] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.489948] 
[   25.490088] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.490103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.490108] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.490113] Call trace:
[   25.490116]  show_stack+0x20/0x38 (C)
[   25.490125]  dump_stack_lvl+0x8c/0xd0
[   25.490134]  print_report+0x118/0x608
[   25.490143]  kasan_report+0xdc/0x128
[   25.490152]  kasan_check_range+0x100/0x1a8
[   25.490162]  __kasan_check_write+0x20/0x30
[   25.490172]  kasan_atomics_helper+0x16d0/0x4858
[   25.490180]  kasan_atomics+0x198/0x2e0
[   25.490188]  kunit_try_run_case+0x170/0x3f0
[   25.490199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.490211]  kthread+0x328/0x630
[   25.490221]  ret_from_fork+0x10/0x20
[   25.490231] 
[   25.496359] Allocated by task 319:
[   25.496663]  kasan_save_stack+0x3c/0x68
[   25.497008]  kasan_save_track+0x20/0x40
[   25.497351]  kasan_save_alloc_info+0x40/0x58
[   25.497734]  __kasan_kmalloc+0xd4/0xd8
[   25.498072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.498480]  kasan_atomics+0xb8/0x2e0
[   25.498809]  kunit_try_run_case+0x170/0x3f0
[   25.499185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.499674]  kthread+0x328/0x630
[   25.499967]  ret_from_fork+0x10/0x20
[   25.500289] 
[   25.500426] The buggy address belongs to the object at ffff00000a4bdd00
[   25.500426]  which belongs to the cache kmalloc-64 of size 64
[   25.501508] The buggy address is located 0 bytes to the right of
[   25.501508]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.502638] 
[   25.502776] The buggy address belongs to the physical page:
[   25.503269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.503961] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.504539] page_type: f5(slab)
[   25.504824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.505508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.506190] page dumped because: kasan: bad access detected
[   25.506682] 
[   25.506818] Memory state around the buggy address:
[   25.507244]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.507881]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.508518] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.509155]                                      ^
[   25.509581]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.510218]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.510854] ==================================================================
[   24.288365] ==================================================================
[   24.289019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   24.289682] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.290351] 
[   24.290500] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.290532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.290542] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.290552] Call trace:
[   24.290560]  show_stack+0x20/0x38 (C)
[   24.290580]  dump_stack_lvl+0x8c/0xd0
[   24.290599]  print_report+0x118/0x608
[   24.290618]  kasan_report+0xdc/0x128
[   24.290637]  kasan_check_range+0x100/0x1a8
[   24.290658]  __kasan_check_write+0x20/0x30
[   24.290680]  kasan_atomics_helper+0x414/0x4858
[   24.290699]  kasan_atomics+0x198/0x2e0
[   24.290716]  kunit_try_run_case+0x170/0x3f0
[   24.290738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.290764]  kthread+0x328/0x630
[   24.290785]  ret_from_fork+0x10/0x20
[   24.290806] 
[   24.296989] Allocated by task 319:
[   24.297305]  kasan_save_stack+0x3c/0x68
[   24.297665]  kasan_save_track+0x20/0x40
[   24.298023]  kasan_save_alloc_info+0x40/0x58
[   24.298423]  __kasan_kmalloc+0xd4/0xd8
[   24.298773]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.299198]  kasan_atomics+0xb8/0x2e0
[   24.299539]  kunit_try_run_case+0x170/0x3f0
[   24.299932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.300441]  kthread+0x328/0x630
[   24.300751]  ret_from_fork+0x10/0x20
[   24.301088] 
[   24.301234] The buggy address belongs to the object at ffff00000a4bdd00
[   24.301234]  which belongs to the cache kmalloc-64 of size 64
[   24.302336] The buggy address is located 0 bytes to the right of
[   24.302336]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.303485] 
[   24.303632] The buggy address belongs to the physical page:
[   24.304135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.304843] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.305437] page_type: f5(slab)
[   24.305734] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.306433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.307128] page dumped because: kasan: bad access detected
[   24.307632] 
[   24.307777] Memory state around the buggy address:
[   24.308214]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.308867]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.309519] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.310169]                                      ^
[   24.310608]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.311260]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.311910] ==================================================================
[   25.042443] ==================================================================
[   25.043081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   25.043726] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.044380] 
[   25.044518] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.044532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.044536] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.044541] Call trace:
[   25.044544]  show_stack+0x20/0x38 (C)
[   25.044554]  dump_stack_lvl+0x8c/0xd0
[   25.044562]  print_report+0x118/0x608
[   25.044571]  kasan_report+0xdc/0x128
[   25.044580]  kasan_check_range+0x100/0x1a8
[   25.044589]  __kasan_check_write+0x20/0x30
[   25.044599]  kasan_atomics_helper+0xf88/0x4858
[   25.044607]  kasan_atomics+0x198/0x2e0
[   25.044615]  kunit_try_run_case+0x170/0x3f0
[   25.044625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.044636]  kthread+0x328/0x630
[   25.044646]  ret_from_fork+0x10/0x20
[   25.044656] 
[   25.050780] Allocated by task 319:
[   25.051084]  kasan_save_stack+0x3c/0x68
[   25.051429]  kasan_save_track+0x20/0x40
[   25.051772]  kasan_save_alloc_info+0x40/0x58
[   25.052155]  __kasan_kmalloc+0xd4/0xd8
[   25.052493]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.052899]  kasan_atomics+0xb8/0x2e0
[   25.053229]  kunit_try_run_case+0x170/0x3f0
[   25.053604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.054095]  kthread+0x328/0x630
[   25.054387]  ret_from_fork+0x10/0x20
[   25.054709] 
[   25.054846] The buggy address belongs to the object at ffff00000a4bdd00
[   25.054846]  which belongs to the cache kmalloc-64 of size 64
[   25.055929] The buggy address is located 0 bytes to the right of
[   25.055929]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.057058] 
[   25.057196] The buggy address belongs to the physical page:
[   25.057688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.058379] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.058958] page_type: f5(slab)
[   25.059241] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.059925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.060607] page dumped because: kasan: bad access detected
[   25.061099] 
[   25.061236] Memory state around the buggy address:
[   25.061662]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062298]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062935] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.063573]                                      ^
[   25.063997]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.064635]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.065272] ==================================================================
[   25.464799] ==================================================================
[   25.465436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   25.466089] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.466734] 
[   25.466873] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.466887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.466891] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.466896] Call trace:
[   25.466899]  show_stack+0x20/0x38 (C)
[   25.466908]  dump_stack_lvl+0x8c/0xd0
[   25.466917]  print_report+0x118/0x608
[   25.466926]  kasan_report+0xdc/0x128
[   25.466934]  __asan_report_load8_noabort+0x20/0x30
[   25.466944]  kasan_atomics_helper+0x3df4/0x4858
[   25.466953]  kasan_atomics+0x198/0x2e0
[   25.466961]  kunit_try_run_case+0x170/0x3f0
[   25.466971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.466983]  kthread+0x328/0x630
[   25.466992]  ret_from_fork+0x10/0x20
[   25.467002] 
[   25.472835] Allocated by task 319:
[   25.473138]  kasan_save_stack+0x3c/0x68
[   25.473482]  kasan_save_track+0x20/0x40
[   25.473827]  kasan_save_alloc_info+0x40/0x58
[   25.474210]  __kasan_kmalloc+0xd4/0xd8
[   25.474547]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.474954]  kasan_atomics+0xb8/0x2e0
[   25.475283]  kunit_try_run_case+0x170/0x3f0
[   25.475658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.476149]  kthread+0x328/0x630
[   25.476442]  ret_from_fork+0x10/0x20
[   25.476764] 
[   25.476900] The buggy address belongs to the object at ffff00000a4bdd00
[   25.476900]  which belongs to the cache kmalloc-64 of size 64
[   25.477983] The buggy address is located 0 bytes to the right of
[   25.477983]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.479112] 
[   25.479249] The buggy address belongs to the physical page:
[   25.479741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.480433] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.481011] page_type: f5(slab)
[   25.481296] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.481980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.482662] page dumped because: kasan: bad access detected
[   25.483154] 
[   25.483290] Memory state around the buggy address:
[   25.483716]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.484354]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.484991] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.485627]                                      ^
[   25.486053]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.486690]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.487326] ==================================================================
[   24.645141] ==================================================================
[   24.645779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   24.646425] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.647078] 
[   24.647218] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.647232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.647237] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.647242] Call trace:
[   24.647245]  show_stack+0x20/0x38 (C)
[   24.647255]  dump_stack_lvl+0x8c/0xd0
[   24.647263]  print_report+0x118/0x608
[   24.647272]  kasan_report+0xdc/0x128
[   24.647281]  kasan_check_range+0x100/0x1a8
[   24.647290]  __kasan_check_write+0x20/0x30
[   24.647300]  kasan_atomics_helper+0xa6c/0x4858
[   24.647309]  kasan_atomics+0x198/0x2e0
[   24.647317]  kunit_try_run_case+0x170/0x3f0
[   24.647327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.647339]  kthread+0x328/0x630
[   24.647349]  ret_from_fork+0x10/0x20
[   24.647358] 
[   24.653482] Allocated by task 319:
[   24.653787]  kasan_save_stack+0x3c/0x68
[   24.654132]  kasan_save_track+0x20/0x40
[   24.654477]  kasan_save_alloc_info+0x40/0x58
[   24.654861]  __kasan_kmalloc+0xd4/0xd8
[   24.655198]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.655604]  kasan_atomics+0xb8/0x2e0
[   24.655933]  kunit_try_run_case+0x170/0x3f0
[   24.656309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.656800]  kthread+0x328/0x630
[   24.657093]  ret_from_fork+0x10/0x20
[   24.657415] 
[   24.657553] The buggy address belongs to the object at ffff00000a4bdd00
[   24.657553]  which belongs to the cache kmalloc-64 of size 64
[   24.658636] The buggy address is located 0 bytes to the right of
[   24.658636]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.659766] 
[   24.659902] The buggy address belongs to the physical page:
[   24.660394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.661086] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.661663] page_type: f5(slab)
[   24.661948] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.662632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.663313] page dumped because: kasan: bad access detected
[   24.663805] 
[   24.663942] Memory state around the buggy address:
[   24.664368]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.665004]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.665642] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.666279]                                      ^
[   24.666705]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667343]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667979] ==================================================================
[   24.117772] ==================================================================
[   24.118433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   24.119104] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.119768] 
[   24.119923] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.119959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.119969] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.119983] Call trace:
[   24.119992]  show_stack+0x20/0x38 (C)
[   24.120014]  dump_stack_lvl+0x8c/0xd0
[   24.120038]  print_report+0x118/0x608
[   24.120059]  kasan_report+0xdc/0x128
[   24.120080]  kasan_check_range+0x100/0x1a8
[   24.120102]  __kasan_check_read+0x20/0x30
[   24.120126]  kasan_atomics_helper+0x1ec/0x4858
[   24.120148]  kasan_atomics+0x198/0x2e0
[   24.120168]  kunit_try_run_case+0x170/0x3f0
[   24.120193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.120221]  kthread+0x328/0x630
[   24.120245]  ret_from_fork+0x10/0x20
[   24.120269] 
[   24.126456] Allocated by task 319:
[   24.126774]  kasan_save_stack+0x3c/0x68
[   24.127136]  kasan_save_track+0x20/0x40
[   24.127497]  kasan_save_alloc_info+0x40/0x58
[   24.127899]  __kasan_kmalloc+0xd4/0xd8
[   24.128252]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.128681]  kasan_atomics+0xb8/0x2e0
[   24.129025]  kunit_try_run_case+0x170/0x3f0
[   24.129420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.129931]  kthread+0x328/0x630
[   24.130242]  ret_from_fork+0x10/0x20
[   24.130582] 
[   24.130730] The buggy address belongs to the object at ffff00000a4bdd00
[   24.130730]  which belongs to the cache kmalloc-64 of size 64
[   24.131836] The buggy address is located 0 bytes to the right of
[   24.131836]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.132987] 
[   24.133135] The buggy address belongs to the physical page:
[   24.133643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.134354] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.134953] page_type: f5(slab)
[   24.135253] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.135956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.136654] page dumped because: kasan: bad access detected
[   24.137160] 
[   24.137308] Memory state around the buggy address:
[   24.137747]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.138402]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.139059] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.139712]                                      ^
[   24.140151]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.140806]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.141458] ==================================================================
[   24.384789] ==================================================================
[   24.385434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   24.386087] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.386746] 
[   24.386889] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.386911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.386917] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.386924] Call trace:
[   24.386929]  show_stack+0x20/0x38 (C)
[   24.386943]  dump_stack_lvl+0x8c/0xd0
[   24.386956]  print_report+0x118/0x608
[   24.386969]  kasan_report+0xdc/0x128
[   24.386982]  kasan_check_range+0x100/0x1a8
[   24.386996]  __kasan_check_write+0x20/0x30
[   24.387011]  kasan_atomics_helper+0x5b4/0x4858
[   24.387023]  kasan_atomics+0x198/0x2e0
[   24.387035]  kunit_try_run_case+0x170/0x3f0
[   24.387051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.387068]  kthread+0x328/0x630
[   24.387083]  ret_from_fork+0x10/0x20
[   24.387097] 
[   24.393242] Allocated by task 319:
[   24.393551]  kasan_save_stack+0x3c/0x68
[   24.393902]  kasan_save_track+0x20/0x40
[   24.394252]  kasan_save_alloc_info+0x40/0x58
[   24.394642]  __kasan_kmalloc+0xd4/0xd8
[   24.394984]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.395398]  kasan_atomics+0xb8/0x2e0
[   24.395733]  kunit_try_run_case+0x170/0x3f0
[   24.396115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.396613]  kthread+0x328/0x630
[   24.396912]  ret_from_fork+0x10/0x20
[   24.397240] 
[   24.397381] The buggy address belongs to the object at ffff00000a4bdd00
[   24.397381]  which belongs to the cache kmalloc-64 of size 64
[   24.398470] The buggy address is located 0 bytes to the right of
[   24.398470]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.399609] 
[   24.399749] The buggy address belongs to the physical page:
[   24.400246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.400944] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.401530] page_type: f5(slab)
[   24.401819] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.402510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.403196] page dumped because: kasan: bad access detected
[   24.403694] 
[   24.403834] Memory state around the buggy address:
[   24.404264]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.404907]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.405551] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.406193]                                      ^
[   24.406623]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.407267]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.407908] ==================================================================
[   25.511524] ==================================================================
[   25.512163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   25.512817] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.513463] 
[   25.513601] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.513615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.513620] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.513624] Call trace:
[   25.513628]  show_stack+0x20/0x38 (C)
[   25.513637]  dump_stack_lvl+0x8c/0xd0
[   25.513646]  print_report+0x118/0x608
[   25.513655]  kasan_report+0xdc/0x128
[   25.513664]  __asan_report_load8_noabort+0x20/0x30
[   25.513674]  kasan_atomics_helper+0x3e10/0x4858
[   25.513682]  kasan_atomics+0x198/0x2e0
[   25.513690]  kunit_try_run_case+0x170/0x3f0
[   25.513701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.513713]  kthread+0x328/0x630
[   25.513723]  ret_from_fork+0x10/0x20
[   25.513732] 
[   25.519563] Allocated by task 319:
[   25.519868]  kasan_save_stack+0x3c/0x68
[   25.520213]  kasan_save_track+0x20/0x40
[   25.520557]  kasan_save_alloc_info+0x40/0x58
[   25.520940]  __kasan_kmalloc+0xd4/0xd8
[   25.521277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.521684]  kasan_atomics+0xb8/0x2e0
[   25.522013]  kunit_try_run_case+0x170/0x3f0
[   25.522389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.522880]  kthread+0x328/0x630
[   25.523173]  ret_from_fork+0x10/0x20
[   25.523495] 
[   25.523632] The buggy address belongs to the object at ffff00000a4bdd00
[   25.523632]  which belongs to the cache kmalloc-64 of size 64
[   25.524714] The buggy address is located 0 bytes to the right of
[   25.524714]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.525844] 
[   25.525981] The buggy address belongs to the physical page:
[   25.526473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.527165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.527742] page_type: f5(slab)
[   25.528027] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.528710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.529392] page dumped because: kasan: bad access detected
[   25.529884] 
[   25.530021] Memory state around the buggy address:
[   25.530445]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.531082]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.531719] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.532355]                                      ^
[   25.532781]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.533418]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.534055] ==================================================================
[   24.191649] ==================================================================
[   24.192306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   24.192977] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.193639] 
[   24.193788] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.193821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.193831] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.193842] Call trace:
[   24.193849]  show_stack+0x20/0x38 (C)
[   24.193869]  dump_stack_lvl+0x8c/0xd0
[   24.193889]  print_report+0x118/0x608
[   24.193909]  kasan_report+0xdc/0x128
[   24.193927]  __asan_report_load4_noabort+0x20/0x30
[   24.193951]  kasan_atomics_helper+0x40fc/0x4858
[   24.193970]  kasan_atomics+0x198/0x2e0
[   24.193987]  kunit_try_run_case+0x170/0x3f0
[   24.194011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.194036]  kthread+0x328/0x630
[   24.194058]  ret_from_fork+0x10/0x20
[   24.194079] 
[   24.199969] Allocated by task 319:
[   24.200285]  kasan_save_stack+0x3c/0x68
[   24.200645]  kasan_save_track+0x20/0x40
[   24.201003]  kasan_save_alloc_info+0x40/0x58
[   24.201403]  __kasan_kmalloc+0xd4/0xd8
[   24.201753]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.202179]  kasan_atomics+0xb8/0x2e0
[   24.202523]  kunit_try_run_case+0x170/0x3f0
[   24.202916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.203425]  kthread+0x328/0x630
[   24.203735]  ret_from_fork+0x10/0x20
[   24.204073] 
[   24.204220] The buggy address belongs to the object at ffff00000a4bdd00
[   24.204220]  which belongs to the cache kmalloc-64 of size 64
[   24.205320] The buggy address is located 0 bytes to the right of
[   24.205320]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.206469] 
[   24.206616] The buggy address belongs to the physical page:
[   24.207120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.207828] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.208421] page_type: f5(slab)
[   24.208719] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.209418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.210113] page dumped because: kasan: bad access detected
[   24.210617] 
[   24.210763] Memory state around the buggy address:
[   24.211201]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.211853]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.212506] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.213156]                                      ^
[   24.213594]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.214246]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.214896] ==================================================================
[   24.574677] ==================================================================
[   24.575314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   24.575960] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.576614] 
[   24.576753] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.576768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.576772] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.576777] Call trace:
[   24.576780]  show_stack+0x20/0x38 (C)
[   24.576789]  dump_stack_lvl+0x8c/0xd0
[   24.576798]  print_report+0x118/0x608
[   24.576806]  kasan_report+0xdc/0x128
[   24.576815]  kasan_check_range+0x100/0x1a8
[   24.576824]  __kasan_check_write+0x20/0x30
[   24.576835]  kasan_atomics_helper+0x934/0x4858
[   24.576843]  kasan_atomics+0x198/0x2e0
[   24.576851]  kunit_try_run_case+0x170/0x3f0
[   24.576861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.576873]  kthread+0x328/0x630
[   24.576883]  ret_from_fork+0x10/0x20
[   24.576892] 
[   24.583018] Allocated by task 319:
[   24.583322]  kasan_save_stack+0x3c/0x68
[   24.583667]  kasan_save_track+0x20/0x40
[   24.584010]  kasan_save_alloc_info+0x40/0x58
[   24.584393]  __kasan_kmalloc+0xd4/0xd8
[   24.584730]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.585138]  kasan_atomics+0xb8/0x2e0
[   24.585467]  kunit_try_run_case+0x170/0x3f0
[   24.585842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.586334]  kthread+0x328/0x630
[   24.586626]  ret_from_fork+0x10/0x20
[   24.586948] 
[   24.587085] The buggy address belongs to the object at ffff00000a4bdd00
[   24.587085]  which belongs to the cache kmalloc-64 of size 64
[   24.588167] The buggy address is located 0 bytes to the right of
[   24.588167]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.589297] 
[   24.589433] The buggy address belongs to the physical page:
[   24.589925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.590617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.591194] page_type: f5(slab)
[   24.591477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.592160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.592842] page dumped because: kasan: bad access detected
[   24.593334] 
[   24.593470] Memory state around the buggy address:
[   24.593896]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.594533]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.595170] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.595806]                                      ^
[   24.596231]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.596868]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.597504] ==================================================================
[   25.581398] ==================================================================
[   25.582034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   25.582687] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.583341] 
[   25.583479] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.583494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.583498] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.583503] Call trace:
[   25.583506]  show_stack+0x20/0x38 (C)
[   25.583515]  dump_stack_lvl+0x8c/0xd0
[   25.583524]  print_report+0x118/0x608
[   25.583532]  kasan_report+0xdc/0x128
[   25.583541]  kasan_check_range+0x100/0x1a8
[   25.583550]  __kasan_check_write+0x20/0x30
[   25.583561]  kasan_atomics_helper+0x17ec/0x4858
[   25.583569]  kasan_atomics+0x198/0x2e0
[   25.583577]  kunit_try_run_case+0x170/0x3f0
[   25.583587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.583599]  kthread+0x328/0x630
[   25.583609]  ret_from_fork+0x10/0x20
[   25.583618] 
[   25.589748] Allocated by task 319:
[   25.590053]  kasan_save_stack+0x3c/0x68
[   25.590398]  kasan_save_track+0x20/0x40
[   25.590743]  kasan_save_alloc_info+0x40/0x58
[   25.591126]  __kasan_kmalloc+0xd4/0xd8
[   25.591463]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.591870]  kasan_atomics+0xb8/0x2e0
[   25.592198]  kunit_try_run_case+0x170/0x3f0
[   25.592574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.593065]  kthread+0x328/0x630
[   25.593357]  ret_from_fork+0x10/0x20
[   25.593680] 
[   25.593816] The buggy address belongs to the object at ffff00000a4bdd00
[   25.593816]  which belongs to the cache kmalloc-64 of size 64
[   25.594899] The buggy address is located 0 bytes to the right of
[   25.594899]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.596028] 
[   25.596165] The buggy address belongs to the physical page:
[   25.596657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.597349] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.597926] page_type: f5(slab)
[   25.598209] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.598893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.599575] page dumped because: kasan: bad access detected
[   25.600067] 
[   25.600203] Memory state around the buggy address:
[   25.600627]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.601266]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.601904] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.602540]                                      ^
[   25.602966]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.603602]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604239] ==================================================================
[   25.065933] ==================================================================
[   25.066570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   25.067216] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.067869] 
[   25.068009] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.068023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.068027] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.068032] Call trace:
[   25.068035]  show_stack+0x20/0x38 (C)
[   25.068045]  dump_stack_lvl+0x8c/0xd0
[   25.068053]  print_report+0x118/0x608
[   25.068062]  kasan_report+0xdc/0x128
[   25.068070]  kasan_check_range+0x100/0x1a8
[   25.068079]  __kasan_check_write+0x20/0x30
[   25.068089]  kasan_atomics_helper+0xff0/0x4858
[   25.068098]  kasan_atomics+0x198/0x2e0
[   25.068106]  kunit_try_run_case+0x170/0x3f0
[   25.068116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.068127]  kthread+0x328/0x630
[   25.068137]  ret_from_fork+0x10/0x20
[   25.068146] 
[   25.074265] Allocated by task 319:
[   25.074570]  kasan_save_stack+0x3c/0x68
[   25.074914]  kasan_save_track+0x20/0x40
[   25.075258]  kasan_save_alloc_info+0x40/0x58
[   25.075641]  __kasan_kmalloc+0xd4/0xd8
[   25.075978]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.076384]  kasan_atomics+0xb8/0x2e0
[   25.076714]  kunit_try_run_case+0x170/0x3f0
[   25.077089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.077579]  kthread+0x328/0x630
[   25.077872]  ret_from_fork+0x10/0x20
[   25.078194] 
[   25.078331] The buggy address belongs to the object at ffff00000a4bdd00
[   25.078331]  which belongs to the cache kmalloc-64 of size 64
[   25.079414] The buggy address is located 0 bytes to the right of
[   25.079414]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.080543] 
[   25.080679] The buggy address belongs to the physical page:
[   25.081171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.081862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.082441] page_type: f5(slab)
[   25.082724] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.083408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.084090] page dumped because: kasan: bad access detected
[   25.084582] 
[   25.084718] Memory state around the buggy address:
[   25.085142]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.085779]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.086416] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.087052]                                      ^
[   25.087477]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.088115]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.088750] ==================================================================
[   24.068083] ==================================================================
[   24.069475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   24.070176] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.070857] 
[   24.071023] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.071075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.071091] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.071109] Call trace:
[   24.071122]  show_stack+0x20/0x38 (C)
[   24.071157]  dump_stack_lvl+0x8c/0xd0
[   24.071190]  print_report+0x118/0x608
[   24.071222]  kasan_report+0xdc/0x128
[   24.071252]  __asan_report_load4_noabort+0x20/0x30
[   24.071288]  kasan_atomics_helper+0x40a8/0x4858
[   24.071318]  kasan_atomics+0x198/0x2e0
[   24.071346]  kunit_try_run_case+0x170/0x3f0
[   24.071383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.071423]  kthread+0x328/0x630
[   24.071459]  ret_from_fork+0x10/0x20
[   24.071493] 
[   24.077442] Allocated by task 319:
[   24.077770]  kasan_save_stack+0x3c/0x68
[   24.078145]  kasan_save_track+0x20/0x40
[   24.078517]  kasan_save_alloc_info+0x40/0x58
[   24.078932]  __kasan_kmalloc+0xd4/0xd8
[   24.079295]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.079738]  kasan_atomics+0xb8/0x2e0
[   24.080095]  kunit_try_run_case+0x170/0x3f0
[   24.080502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.081028]  kthread+0x328/0x630
[   24.081352]  ret_from_fork+0x10/0x20
[   24.081702] 
[   24.081856] The buggy address belongs to the object at ffff00000a4bdd00
[   24.081856]  which belongs to the cache kmalloc-64 of size 64
[   24.082975] The buggy address is located 0 bytes to the right of
[   24.082975]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.084142] 
[   24.084297] The buggy address belongs to the physical page:
[   24.084814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.085539] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.086150] page_type: f5(slab)
[   24.086465] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.087183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.087891] page dumped because: kasan: bad access detected
[   24.088408] 
[   24.088561] Memory state around the buggy address:
[   24.089012]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.089679]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.090346] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.091009]                                      ^
[   24.091460]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.092127]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.092790] ==================================================================
[   25.371123] ==================================================================
[   25.371761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   25.372414] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.373068] 
[   25.373207] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.373221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.373225] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.373230] Call trace:
[   25.373233]  show_stack+0x20/0x38 (C)
[   25.373243]  dump_stack_lvl+0x8c/0xd0
[   25.373251]  print_report+0x118/0x608
[   25.373260]  kasan_report+0xdc/0x128
[   25.373269]  kasan_check_range+0x100/0x1a8
[   25.373278]  __kasan_check_write+0x20/0x30
[   25.373288]  kasan_atomics_helper+0x154c/0x4858
[   25.373297]  kasan_atomics+0x198/0x2e0
[   25.373304]  kunit_try_run_case+0x170/0x3f0
[   25.373315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.373326]  kthread+0x328/0x630
[   25.373336]  ret_from_fork+0x10/0x20
[   25.373346] 
[   25.379473] Allocated by task 319:
[   25.379778]  kasan_save_stack+0x3c/0x68
[   25.380122]  kasan_save_track+0x20/0x40
[   25.380467]  kasan_save_alloc_info+0x40/0x58
[   25.380850]  __kasan_kmalloc+0xd4/0xd8
[   25.381187]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.381594]  kasan_atomics+0xb8/0x2e0
[   25.381923]  kunit_try_run_case+0x170/0x3f0
[   25.382298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.382789]  kthread+0x328/0x630
[   25.383082]  ret_from_fork+0x10/0x20
[   25.383404] 
[   25.383543] The buggy address belongs to the object at ffff00000a4bdd00
[   25.383543]  which belongs to the cache kmalloc-64 of size 64
[   25.384625] The buggy address is located 0 bytes to the right of
[   25.384625]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.385755] 
[   25.385891] The buggy address belongs to the physical page:
[   25.386383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.387075] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.387654] page_type: f5(slab)
[   25.387938] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.388623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.389304] page dumped because: kasan: bad access detected
[   25.389796] 
[   25.389932] Memory state around the buggy address:
[   25.390358]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.390994]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.391633] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.392268]                                      ^
[   25.392693]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393329]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.393966] ==================================================================
[   24.432493] ==================================================================
[   24.433137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   24.433791] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.434451] 
[   24.434594] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.434616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.434622] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.434630] Call trace:
[   24.434635]  show_stack+0x20/0x38 (C)
[   24.434649]  dump_stack_lvl+0x8c/0xd0
[   24.434661]  print_report+0x118/0x608
[   24.434675]  kasan_report+0xdc/0x128
[   24.434688]  kasan_check_range+0x100/0x1a8
[   24.434702]  __kasan_check_write+0x20/0x30
[   24.434718]  kasan_atomics_helper+0x684/0x4858
[   24.434730]  kasan_atomics+0x198/0x2e0
[   24.434742]  kunit_try_run_case+0x170/0x3f0
[   24.434758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.434776]  kthread+0x328/0x630
[   24.434791]  ret_from_fork+0x10/0x20
[   24.434805] 
[   24.440950] Allocated by task 319:
[   24.441258]  kasan_save_stack+0x3c/0x68
[   24.441609]  kasan_save_track+0x20/0x40
[   24.441960]  kasan_save_alloc_info+0x40/0x58
[   24.442350]  __kasan_kmalloc+0xd4/0xd8
[   24.442692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.443107]  kasan_atomics+0xb8/0x2e0
[   24.443443]  kunit_try_run_case+0x170/0x3f0
[   24.443826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.444323]  kthread+0x328/0x630
[   24.444623]  ret_from_fork+0x10/0x20
[   24.444951] 
[   24.445091] The buggy address belongs to the object at ffff00000a4bdd00
[   24.445091]  which belongs to the cache kmalloc-64 of size 64
[   24.446182] The buggy address is located 0 bytes to the right of
[   24.446182]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.447318] 
[   24.447459] The buggy address belongs to the physical page:
[   24.447955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.448653] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.449238] page_type: f5(slab)
[   24.449528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.450218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.450906] page dumped because: kasan: bad access detected
[   24.451404] 
[   24.451544] Memory state around the buggy address:
[   24.451974]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.452617]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.453261] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.453902]                                      ^
[   24.454333]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.454977]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.455618] ==================================================================
[   25.418128] ==================================================================
[   25.418765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   25.419418] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.420064] 
[   25.420203] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.420217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.420222] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.420227] Call trace:
[   25.420230]  show_stack+0x20/0x38 (C)
[   25.420239]  dump_stack_lvl+0x8c/0xd0
[   25.420247]  print_report+0x118/0x608
[   25.420256]  kasan_report+0xdc/0x128
[   25.420264]  __asan_report_load8_noabort+0x20/0x30
[   25.420275]  kasan_atomics_helper+0x3db0/0x4858
[   25.420284]  kasan_atomics+0x198/0x2e0
[   25.420291]  kunit_try_run_case+0x170/0x3f0
[   25.420302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.420313]  kthread+0x328/0x630
[   25.420323]  ret_from_fork+0x10/0x20
[   25.420333] 
[   25.426163] Allocated by task 319:
[   25.426468]  kasan_save_stack+0x3c/0x68
[   25.426813]  kasan_save_track+0x20/0x40
[   25.427158]  kasan_save_alloc_info+0x40/0x58
[   25.427541]  __kasan_kmalloc+0xd4/0xd8
[   25.427876]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.428283]  kasan_atomics+0xb8/0x2e0
[   25.428612]  kunit_try_run_case+0x170/0x3f0
[   25.428987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.429478]  kthread+0x328/0x630
[   25.429771]  ret_from_fork+0x10/0x20
[   25.430093] 
[   25.430230] The buggy address belongs to the object at ffff00000a4bdd00
[   25.430230]  which belongs to the cache kmalloc-64 of size 64
[   25.431312] The buggy address is located 0 bytes to the right of
[   25.431312]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.432442] 
[   25.432579] The buggy address belongs to the physical page:
[   25.433071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.433763] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.434340] page_type: f5(slab)
[   25.434624] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.435308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.435990] page dumped because: kasan: bad access detected
[   25.436482] 
[   25.436618] Memory state around the buggy address:
[   25.437044]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.437680]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.438317] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.438954]                                      ^
[   25.439380]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.440017]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.440652] ==================================================================
[   24.142591] ==================================================================
[   24.143265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   24.143939] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.144613] 
[   24.144768] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.144805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.144815] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.144827] Call trace:
[   24.144836]  show_stack+0x20/0x38 (C)
[   24.144860]  dump_stack_lvl+0x8c/0xd0
[   24.144881]  print_report+0x118/0x608
[   24.144902]  kasan_report+0xdc/0x128
[   24.144921]  kasan_check_range+0x100/0x1a8
[   24.144941]  __kasan_check_write+0x20/0x30
[   24.144964]  kasan_atomics_helper+0x24c/0x4858
[   24.144982]  kasan_atomics+0x198/0x2e0
[   24.145000]  kunit_try_run_case+0x170/0x3f0
[   24.145024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.145050]  kthread+0x328/0x630
[   24.145073]  ret_from_fork+0x10/0x20
[   24.145094] 
[   24.151282] Allocated by task 319:
[   24.151600]  kasan_save_stack+0x3c/0x68
[   24.151962]  kasan_save_track+0x20/0x40
[   24.152321]  kasan_save_alloc_info+0x40/0x58
[   24.152721]  __kasan_kmalloc+0xd4/0xd8
[   24.153072]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.153498]  kasan_atomics+0xb8/0x2e0
[   24.153841]  kunit_try_run_case+0x170/0x3f0
[   24.154232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.154742]  kthread+0x328/0x630
[   24.155050]  ret_from_fork+0x10/0x20
[   24.155388] 
[   24.155535] The buggy address belongs to the object at ffff00000a4bdd00
[   24.155535]  which belongs to the cache kmalloc-64 of size 64
[   24.156637] The buggy address is located 0 bytes to the right of
[   24.156637]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.157787] 
[   24.157935] The buggy address belongs to the physical page:
[   24.158440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.159151] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.159748] page_type: f5(slab)
[   24.160050] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.160751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.161448] page dumped because: kasan: bad access detected
[   24.161952] 
[   24.162098] Memory state around the buggy address:
[   24.162536]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163189]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.163843] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.164493]                                      ^
[   24.164932]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.165585]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.166236] ==================================================================
[   24.360958] ==================================================================
[   24.361603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   24.362256] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.362915] 
[   24.363058] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.363079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.363086] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.363093] Call trace:
[   24.363098]  show_stack+0x20/0x38 (C)
[   24.363112]  dump_stack_lvl+0x8c/0xd0
[   24.363124]  print_report+0x118/0x608
[   24.363138]  kasan_report+0xdc/0x128
[   24.363150]  kasan_check_range+0x100/0x1a8
[   24.363165]  __kasan_check_write+0x20/0x30
[   24.363179]  kasan_atomics_helper+0x54c/0x4858
[   24.363192]  kasan_atomics+0x198/0x2e0
[   24.363204]  kunit_try_run_case+0x170/0x3f0
[   24.363219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.363237]  kthread+0x328/0x630
[   24.363252]  ret_from_fork+0x10/0x20
[   24.363266] 
[   24.369412] Allocated by task 319:
[   24.369720]  kasan_save_stack+0x3c/0x68
[   24.370071]  kasan_save_track+0x20/0x40
[   24.370422]  kasan_save_alloc_info+0x40/0x58
[   24.370812]  __kasan_kmalloc+0xd4/0xd8
[   24.371155]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.371570]  kasan_atomics+0xb8/0x2e0
[   24.371903]  kunit_try_run_case+0x170/0x3f0
[   24.372286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.372783]  kthread+0x328/0x630
[   24.373083]  ret_from_fork+0x10/0x20
[   24.373411] 
[   24.373552] The buggy address belongs to the object at ffff00000a4bdd00
[   24.373552]  which belongs to the cache kmalloc-64 of size 64
[   24.374642] The buggy address is located 0 bytes to the right of
[   24.374642]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.375778] 
[   24.375919] The buggy address belongs to the physical page:
[   24.376415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.377111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.377697] page_type: f5(slab)
[   24.377985] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.378676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.379363] page dumped because: kasan: bad access detected
[   24.379860] 
[   24.380001] Memory state around the buggy address:
[   24.380430]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.381074]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.381718] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.382359]                                      ^
[   24.382791]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383434]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.384075] ==================================================================
[   25.112904] ==================================================================
[   25.113542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   25.114195] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.114849] 
[   25.114987] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.115001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.115006] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.115010] Call trace:
[   25.115014]  show_stack+0x20/0x38 (C)
[   25.115023]  dump_stack_lvl+0x8c/0xd0
[   25.115032]  print_report+0x118/0x608
[   25.115040]  kasan_report+0xdc/0x128
[   25.115049]  kasan_check_range+0x100/0x1a8
[   25.115058]  __kasan_check_write+0x20/0x30
[   25.115068]  kasan_atomics_helper+0x10c0/0x4858
[   25.115077]  kasan_atomics+0x198/0x2e0
[   25.115085]  kunit_try_run_case+0x170/0x3f0
[   25.115095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.115107]  kthread+0x328/0x630
[   25.115116]  ret_from_fork+0x10/0x20
[   25.115126] 
[   25.121257] Allocated by task 319:
[   25.121562]  kasan_save_stack+0x3c/0x68
[   25.121907]  kasan_save_track+0x20/0x40
[   25.122252]  kasan_save_alloc_info+0x40/0x58
[   25.122635]  __kasan_kmalloc+0xd4/0xd8
[   25.122972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.123380]  kasan_atomics+0xb8/0x2e0
[   25.123709]  kunit_try_run_case+0x170/0x3f0
[   25.124085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.124575]  kthread+0x328/0x630
[   25.124868]  ret_from_fork+0x10/0x20
[   25.125190] 
[   25.125327] The buggy address belongs to the object at ffff00000a4bdd00
[   25.125327]  which belongs to the cache kmalloc-64 of size 64
[   25.126410] The buggy address is located 0 bytes to the right of
[   25.126410]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.127539] 
[   25.127676] The buggy address belongs to the physical page:
[   25.128167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.128860] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.129438] page_type: f5(slab)
[   25.129723] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.130407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.131088] page dumped because: kasan: bad access detected
[   25.131580] 
[   25.131716] Memory state around the buggy address:
[   25.132142]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.132780]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133417] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.134053]                                      ^
[   25.134479]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135116]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135751] ==================================================================
[   24.972242] ==================================================================
[   24.972880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   24.973533] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.974186] 
[   24.974325] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.974339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.974343] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.974348] Call trace:
[   24.974352]  show_stack+0x20/0x38 (C)
[   24.974361]  dump_stack_lvl+0x8c/0xd0
[   24.974369]  print_report+0x118/0x608
[   24.974378]  kasan_report+0xdc/0x128
[   24.974387]  __asan_report_store8_noabort+0x20/0x30
[   24.974397]  kasan_atomics_helper+0x3e5c/0x4858
[   24.974406]  kasan_atomics+0x198/0x2e0
[   24.974414]  kunit_try_run_case+0x170/0x3f0
[   24.974424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.974435]  kthread+0x328/0x630
[   24.974445]  ret_from_fork+0x10/0x20
[   24.974454] 
[   24.980290] Allocated by task 319:
[   24.980594]  kasan_save_stack+0x3c/0x68
[   24.980939]  kasan_save_track+0x20/0x40
[   24.981285]  kasan_save_alloc_info+0x40/0x58
[   24.981668]  __kasan_kmalloc+0xd4/0xd8
[   24.982005]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.982411]  kasan_atomics+0xb8/0x2e0
[   24.982740]  kunit_try_run_case+0x170/0x3f0
[   24.983115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.983606]  kthread+0x328/0x630
[   24.983899]  ret_from_fork+0x10/0x20
[   24.984221] 
[   24.984358] The buggy address belongs to the object at ffff00000a4bdd00
[   24.984358]  which belongs to the cache kmalloc-64 of size 64
[   24.985440] The buggy address is located 0 bytes to the right of
[   24.985440]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.986569] 
[   24.986706] The buggy address belongs to the physical page:
[   24.987197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.987887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.988465] page_type: f5(slab)
[   24.988749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.989433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.990115] page dumped because: kasan: bad access detected
[   24.990607] 
[   24.990743] Memory state around the buggy address:
[   24.991168]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.991805]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.992442] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.993079]                                      ^
[   24.993505]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.994142]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.994778] ==================================================================
[   25.324119] ==================================================================
[   25.324757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   25.325410] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.326064] 
[   25.326202] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.326216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326220] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.326225] Call trace:
[   25.326228]  show_stack+0x20/0x38 (C)
[   25.326237]  dump_stack_lvl+0x8c/0xd0
[   25.326246]  print_report+0x118/0x608
[   25.326255]  kasan_report+0xdc/0x128
[   25.326263]  kasan_check_range+0x100/0x1a8
[   25.326272]  __kasan_check_write+0x20/0x30
[   25.326283]  kasan_atomics_helper+0x147c/0x4858
[   25.326291]  kasan_atomics+0x198/0x2e0
[   25.326299]  kunit_try_run_case+0x170/0x3f0
[   25.326309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.326321]  kthread+0x328/0x630
[   25.326331]  ret_from_fork+0x10/0x20
[   25.326340] 
[   25.332464] Allocated by task 319:
[   25.332768]  kasan_save_stack+0x3c/0x68
[   25.333112]  kasan_save_track+0x20/0x40
[   25.333456]  kasan_save_alloc_info+0x40/0x58
[   25.333839]  __kasan_kmalloc+0xd4/0xd8
[   25.334176]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.334583]  kasan_atomics+0xb8/0x2e0
[   25.334911]  kunit_try_run_case+0x170/0x3f0
[   25.335287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.335776]  kthread+0x328/0x630
[   25.336069]  ret_from_fork+0x10/0x20
[   25.336391] 
[   25.336528] The buggy address belongs to the object at ffff00000a4bdd00
[   25.336528]  which belongs to the cache kmalloc-64 of size 64
[   25.337611] The buggy address is located 0 bytes to the right of
[   25.337611]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.338741] 
[   25.338878] The buggy address belongs to the physical page:
[   25.339369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.340062] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.340640] page_type: f5(slab)
[   25.340924] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.341609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.342290] page dumped because: kasan: bad access detected
[   25.342782] 
[   25.342919] Memory state around the buggy address:
[   25.343344]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.343981]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344618] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.345254]                                      ^
[   25.345679]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.346317]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.346952] ==================================================================
[   24.995458] ==================================================================
[   24.996095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   24.996741] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.997394] 
[   24.997533] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.997547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.997552] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.997556] Call trace:
[   24.997560]  show_stack+0x20/0x38 (C)
[   24.997569]  dump_stack_lvl+0x8c/0xd0
[   24.997577]  print_report+0x118/0x608
[   24.997586]  kasan_report+0xdc/0x128
[   24.997595]  kasan_check_range+0x100/0x1a8
[   24.997604]  __kasan_check_write+0x20/0x30
[   24.997614]  kasan_atomics_helper+0xeb8/0x4858
[   24.997622]  kasan_atomics+0x198/0x2e0
[   24.997631]  kunit_try_run_case+0x170/0x3f0
[   24.997640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.997652]  kthread+0x328/0x630
[   24.997662]  ret_from_fork+0x10/0x20
[   24.997672] 
[   25.003794] Allocated by task 319:
[   25.004099]  kasan_save_stack+0x3c/0x68
[   25.004444]  kasan_save_track+0x20/0x40
[   25.004788]  kasan_save_alloc_info+0x40/0x58
[   25.005171]  __kasan_kmalloc+0xd4/0xd8
[   25.005508]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.005915]  kasan_atomics+0xb8/0x2e0
[   25.006243]  kunit_try_run_case+0x170/0x3f0
[   25.006619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.007110]  kthread+0x328/0x630
[   25.007403]  ret_from_fork+0x10/0x20
[   25.007725] 
[   25.007862] The buggy address belongs to the object at ffff00000a4bdd00
[   25.007862]  which belongs to the cache kmalloc-64 of size 64
[   25.008944] The buggy address is located 0 bytes to the right of
[   25.008944]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.010074] 
[   25.010211] The buggy address belongs to the physical page:
[   25.010703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.011393] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.011972] page_type: f5(slab)
[   25.012255] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.012939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.013621] page dumped because: kasan: bad access detected
[   25.014113] 
[   25.014250] Memory state around the buggy address:
[   25.014675]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.015313]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.015952] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.016587]                                      ^
[   25.017013]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.017649]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.018285] ==================================================================
[   25.558212] ==================================================================
[   25.558849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   25.559502] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.560148] 
[   25.560288] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.560302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.560306] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.560311] Call trace:
[   25.560314]  show_stack+0x20/0x38 (C)
[   25.560324]  dump_stack_lvl+0x8c/0xd0
[   25.560332]  print_report+0x118/0x608
[   25.560341]  kasan_report+0xdc/0x128
[   25.560349]  __asan_report_load8_noabort+0x20/0x30
[   25.560360]  kasan_atomics_helper+0x3e20/0x4858
[   25.560369]  kasan_atomics+0x198/0x2e0
[   25.560376]  kunit_try_run_case+0x170/0x3f0
[   25.560387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.560398]  kthread+0x328/0x630
[   25.560408]  ret_from_fork+0x10/0x20
[   25.560417] 
[   25.566248] Allocated by task 319:
[   25.566552]  kasan_save_stack+0x3c/0x68
[   25.566897]  kasan_save_track+0x20/0x40
[   25.567241]  kasan_save_alloc_info+0x40/0x58
[   25.567625]  __kasan_kmalloc+0xd4/0xd8
[   25.567961]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.568368]  kasan_atomics+0xb8/0x2e0
[   25.568697]  kunit_try_run_case+0x170/0x3f0
[   25.569074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.569564]  kthread+0x328/0x630
[   25.569857]  ret_from_fork+0x10/0x20
[   25.570180] 
[   25.570316] The buggy address belongs to the object at ffff00000a4bdd00
[   25.570316]  which belongs to the cache kmalloc-64 of size 64
[   25.571399] The buggy address is located 0 bytes to the right of
[   25.571399]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.572529] 
[   25.572665] The buggy address belongs to the physical page:
[   25.573157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.573849] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.574426] page_type: f5(slab)
[   25.574709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.575393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.576075] page dumped because: kasan: bad access detected
[   25.576567] 
[   25.576704] Memory state around the buggy address:
[   25.577130]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577767]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.578404] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.579040]                                      ^
[   25.579465]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.580102]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.580738] ==================================================================
[   24.337094] ==================================================================
[   24.337741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   24.338395] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.339054] 
[   24.339197] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.339219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.339225] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.339233] Call trace:
[   24.339238]  show_stack+0x20/0x38 (C)
[   24.339252]  dump_stack_lvl+0x8c/0xd0
[   24.339265]  print_report+0x118/0x608
[   24.339279]  kasan_report+0xdc/0x128
[   24.339291]  kasan_check_range+0x100/0x1a8
[   24.339305]  __kasan_check_write+0x20/0x30
[   24.339321]  kasan_atomics_helper+0x4e4/0x4858
[   24.339333]  kasan_atomics+0x198/0x2e0
[   24.339345]  kunit_try_run_case+0x170/0x3f0
[   24.339360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.339378]  kthread+0x328/0x630
[   24.339393]  ret_from_fork+0x10/0x20
[   24.339407] 
[   24.345552] Allocated by task 319:
[   24.345860]  kasan_save_stack+0x3c/0x68
[   24.346211]  kasan_save_track+0x20/0x40
[   24.346562]  kasan_save_alloc_info+0x40/0x58
[   24.346952]  __kasan_kmalloc+0xd4/0xd8
[   24.347294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.347708]  kasan_atomics+0xb8/0x2e0
[   24.348043]  kunit_try_run_case+0x170/0x3f0
[   24.348426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.348923]  kthread+0x328/0x630
[   24.349223]  ret_from_fork+0x10/0x20
[   24.349551] 
[   24.349691] The buggy address belongs to the object at ffff00000a4bdd00
[   24.349691]  which belongs to the cache kmalloc-64 of size 64
[   24.350782] The buggy address is located 0 bytes to the right of
[   24.350782]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.351920] 
[   24.352061] The buggy address belongs to the physical page:
[   24.352558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.353256] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.353841] page_type: f5(slab)
[   24.354132] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.354822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.355509] page dumped because: kasan: bad access detected
[   24.356007] 
[   24.356147] Memory state around the buggy address:
[   24.356577]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.357221]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.357864] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.358505]                                      ^
[   24.358936]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.359580]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.360221] ==================================================================
[   24.902099] ==================================================================
[   24.902737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   24.903383] Read of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.904029] 
[   24.904167] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.904182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.904186] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.904191] Call trace:
[   24.904194]  show_stack+0x20/0x38 (C)
[   24.904203]  dump_stack_lvl+0x8c/0xd0
[   24.904213]  print_report+0x118/0x608
[   24.904222]  kasan_report+0xdc/0x128
[   24.904230]  kasan_check_range+0x100/0x1a8
[   24.904239]  __kasan_check_read+0x20/0x30
[   24.904250]  kasan_atomics_helper+0xdd4/0x4858
[   24.904259]  kasan_atomics+0x198/0x2e0
[   24.904266]  kunit_try_run_case+0x170/0x3f0
[   24.904277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.904290]  kthread+0x328/0x630
[   24.904300]  ret_from_fork+0x10/0x20
[   24.904309] 
[   24.910423] Allocated by task 319:
[   24.910728]  kasan_save_stack+0x3c/0x68
[   24.911072]  kasan_save_track+0x20/0x40
[   24.911416]  kasan_save_alloc_info+0x40/0x58
[   24.911799]  __kasan_kmalloc+0xd4/0xd8
[   24.912136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.912543]  kasan_atomics+0xb8/0x2e0
[   24.912870]  kunit_try_run_case+0x170/0x3f0
[   24.913247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.913739]  kthread+0x328/0x630
[   24.914032]  ret_from_fork+0x10/0x20
[   24.914354] 
[   24.914492] The buggy address belongs to the object at ffff00000a4bdd00
[   24.914492]  which belongs to the cache kmalloc-64 of size 64
[   24.915575] The buggy address is located 0 bytes to the right of
[   24.915575]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.916705] 
[   24.916843] The buggy address belongs to the physical page:
[   24.917335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.918027] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.918605] page_type: f5(slab)
[   24.918888] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.919572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.920253] page dumped because: kasan: bad access detected
[   24.920745] 
[   24.920883] Memory state around the buggy address:
[   24.921309]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.921947]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.922584] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.923221]                                      ^
[   24.923647]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.924284]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.924921] ==================================================================
[   25.183431] ==================================================================
[   25.184070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   25.184723] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.185376] 
[   25.185515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.185529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.185533] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.185538] Call trace:
[   25.185541]  show_stack+0x20/0x38 (C)
[   25.185551]  dump_stack_lvl+0x8c/0xd0
[   25.185559]  print_report+0x118/0x608
[   25.185568]  kasan_report+0xdc/0x128
[   25.185576]  kasan_check_range+0x100/0x1a8
[   25.185586]  __kasan_check_write+0x20/0x30
[   25.185595]  kasan_atomics_helper+0x11f8/0x4858
[   25.185604]  kasan_atomics+0x198/0x2e0
[   25.185612]  kunit_try_run_case+0x170/0x3f0
[   25.185622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.185634]  kthread+0x328/0x630
[   25.185644]  ret_from_fork+0x10/0x20
[   25.185653] 
[   25.191780] Allocated by task 319:
[   25.192085]  kasan_save_stack+0x3c/0x68
[   25.192429]  kasan_save_track+0x20/0x40
[   25.192772]  kasan_save_alloc_info+0x40/0x58
[   25.193155]  __kasan_kmalloc+0xd4/0xd8
[   25.193492]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.193899]  kasan_atomics+0xb8/0x2e0
[   25.194228]  kunit_try_run_case+0x170/0x3f0
[   25.194604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.195093]  kthread+0x328/0x630
[   25.195386]  ret_from_fork+0x10/0x20
[   25.195708] 
[   25.195845] The buggy address belongs to the object at ffff00000a4bdd00
[   25.195845]  which belongs to the cache kmalloc-64 of size 64
[   25.196928] The buggy address is located 0 bytes to the right of
[   25.196928]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.198058] 
[   25.198195] The buggy address belongs to the physical page:
[   25.198687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.199378] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.199956] page_type: f5(slab)
[   25.200240] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.200924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.201606] page dumped because: kasan: bad access detected
[   25.202100] 
[   25.202238] Memory state around the buggy address:
[   25.202663]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.203301]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.203937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.204573]                                      ^
[   25.204999]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.205636]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.206272] ==================================================================
[   25.230434] ==================================================================
[   25.231071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   25.231724] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.232377] 
[   25.232515] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.232530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.232534] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.232538] Call trace:
[   25.232542]  show_stack+0x20/0x38 (C)
[   25.232551]  dump_stack_lvl+0x8c/0xd0
[   25.232559]  print_report+0x118/0x608
[   25.232567]  kasan_report+0xdc/0x128
[   25.232576]  kasan_check_range+0x100/0x1a8
[   25.232586]  __kasan_check_write+0x20/0x30
[   25.232595]  kasan_atomics_helper+0x12d8/0x4858
[   25.232604]  kasan_atomics+0x198/0x2e0
[   25.232612]  kunit_try_run_case+0x170/0x3f0
[   25.232622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.232633]  kthread+0x328/0x630
[   25.232643]  ret_from_fork+0x10/0x20
[   25.232652] 
[   25.238779] Allocated by task 319:
[   25.239084]  kasan_save_stack+0x3c/0x68
[   25.239429]  kasan_save_track+0x20/0x40
[   25.239774]  kasan_save_alloc_info+0x40/0x58
[   25.240157]  __kasan_kmalloc+0xd4/0xd8
[   25.240494]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.240902]  kasan_atomics+0xb8/0x2e0
[   25.241231]  kunit_try_run_case+0x170/0x3f0
[   25.241607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.242097]  kthread+0x328/0x630
[   25.242390]  ret_from_fork+0x10/0x20
[   25.242712] 
[   25.242850] The buggy address belongs to the object at ffff00000a4bdd00
[   25.242850]  which belongs to the cache kmalloc-64 of size 64
[   25.243932] The buggy address is located 0 bytes to the right of
[   25.243932]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.245062] 
[   25.245198] The buggy address belongs to the physical page:
[   25.245690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.246381] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.246960] page_type: f5(slab)
[   25.247244] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.247927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.248609] page dumped because: kasan: bad access detected
[   25.249101] 
[   25.249238] Memory state around the buggy address:
[   25.249663]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.250300]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.250937] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.251573]                                      ^
[   25.251999]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.252635]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.253272] ==================================================================
[   25.089403] ==================================================================
[   25.090040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   25.090693] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.091347] 
[   25.091485] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.091499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.091503] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.091508] Call trace:
[   25.091511]  show_stack+0x20/0x38 (C)
[   25.091520]  dump_stack_lvl+0x8c/0xd0
[   25.091529]  print_report+0x118/0x608
[   25.091537]  kasan_report+0xdc/0x128
[   25.091546]  kasan_check_range+0x100/0x1a8
[   25.091555]  __kasan_check_write+0x20/0x30
[   25.091565]  kasan_atomics_helper+0x1058/0x4858
[   25.091574]  kasan_atomics+0x198/0x2e0
[   25.091582]  kunit_try_run_case+0x170/0x3f0
[   25.091592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.091604]  kthread+0x328/0x630
[   25.091613]  ret_from_fork+0x10/0x20
[   25.091622] 
[   25.097752] Allocated by task 319:
[   25.098057]  kasan_save_stack+0x3c/0x68
[   25.098402]  kasan_save_track+0x20/0x40
[   25.098746]  kasan_save_alloc_info+0x40/0x58
[   25.099128]  __kasan_kmalloc+0xd4/0xd8
[   25.099465]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.099872]  kasan_atomics+0xb8/0x2e0
[   25.100201]  kunit_try_run_case+0x170/0x3f0
[   25.100578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.101067]  kthread+0x328/0x630
[   25.101360]  ret_from_fork+0x10/0x20
[   25.101682] 
[   25.101819] The buggy address belongs to the object at ffff00000a4bdd00
[   25.101819]  which belongs to the cache kmalloc-64 of size 64
[   25.102901] The buggy address is located 0 bytes to the right of
[   25.102901]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.104031] 
[   25.104168] The buggy address belongs to the physical page:
[   25.104659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.105351] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.105929] page_type: f5(slab)
[   25.106213] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.106896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.107578] page dumped because: kasan: bad access detected
[   25.108070] 
[   25.108207] Memory state around the buggy address:
[   25.108632]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.109271]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.109907] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.110545]                                      ^
[   25.110971]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.111608]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.112243] ==================================================================
[   24.456376] ==================================================================
[   24.457023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   24.457677] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.458338] 
[   24.458481] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.458503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.458510] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.458517] Call trace:
[   24.458523]  show_stack+0x20/0x38 (C)
[   24.458537]  dump_stack_lvl+0x8c/0xd0
[   24.458550]  print_report+0x118/0x608
[   24.458563]  kasan_report+0xdc/0x128
[   24.458575]  kasan_check_range+0x100/0x1a8
[   24.458590]  __kasan_check_write+0x20/0x30
[   24.458605]  kasan_atomics_helper+0x6ec/0x4858
[   24.458617]  kasan_atomics+0x198/0x2e0
[   24.458629]  kunit_try_run_case+0x170/0x3f0
[   24.458645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.458663]  kthread+0x328/0x630
[   24.458678]  ret_from_fork+0x10/0x20
[   24.458692] 
[   24.464839] Allocated by task 319:
[   24.465148]  kasan_save_stack+0x3c/0x68
[   24.465499]  kasan_save_track+0x20/0x40
[   24.465849]  kasan_save_alloc_info+0x40/0x58
[   24.466239]  __kasan_kmalloc+0xd4/0xd8
[   24.466581]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.466995]  kasan_atomics+0xb8/0x2e0
[   24.467330]  kunit_try_run_case+0x170/0x3f0
[   24.467712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.468210]  kthread+0x328/0x630
[   24.468509]  ret_from_fork+0x10/0x20
[   24.468838] 
[   24.468979] The buggy address belongs to the object at ffff00000a4bdd00
[   24.468979]  which belongs to the cache kmalloc-64 of size 64
[   24.470069] The buggy address is located 0 bytes to the right of
[   24.470069]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.471205] 
[   24.471346] The buggy address belongs to the physical page:
[   24.471844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.472542] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.473126] page_type: f5(slab)
[   24.473415] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.474106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.474792] page dumped because: kasan: bad access detected
[   24.475289] 
[   24.475430] Memory state around the buggy address:
[   24.475859]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.476503]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.477147] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.477788]                                      ^
[   24.478219]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.478862]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.479504] ==================================================================
[   24.715325] ==================================================================
[   24.715962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   24.716608] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.717261] 
[   24.717400] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.717414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.717418] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.717423] Call trace:
[   24.717426]  show_stack+0x20/0x38 (C)
[   24.717435]  dump_stack_lvl+0x8c/0xd0
[   24.717444]  print_report+0x118/0x608
[   24.717452]  kasan_report+0xdc/0x128
[   24.717461]  kasan_check_range+0x100/0x1a8
[   24.717470]  __kasan_check_write+0x20/0x30
[   24.717480]  kasan_atomics_helper+0xb70/0x4858
[   24.717489]  kasan_atomics+0x198/0x2e0
[   24.717496]  kunit_try_run_case+0x170/0x3f0
[   24.717507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.717518]  kthread+0x328/0x630
[   24.717528]  ret_from_fork+0x10/0x20
[   24.717538] 
[   24.723661] Allocated by task 319:
[   24.723966]  kasan_save_stack+0x3c/0x68
[   24.724311]  kasan_save_track+0x20/0x40
[   24.724655]  kasan_save_alloc_info+0x40/0x58
[   24.725038]  __kasan_kmalloc+0xd4/0xd8
[   24.725375]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.725782]  kasan_atomics+0xb8/0x2e0
[   24.726111]  kunit_try_run_case+0x170/0x3f0
[   24.726488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.726979]  kthread+0x328/0x630
[   24.727272]  ret_from_fork+0x10/0x20
[   24.727594] 
[   24.727730] The buggy address belongs to the object at ffff00000a4bdd00
[   24.727730]  which belongs to the cache kmalloc-64 of size 64
[   24.728813] The buggy address is located 0 bytes to the right of
[   24.728813]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.729943] 
[   24.730080] The buggy address belongs to the physical page:
[   24.730572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.731264] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.731842] page_type: f5(slab)
[   24.732126] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.732809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.733492] page dumped because: kasan: bad access detected
[   24.733983] 
[   24.734120] Memory state around the buggy address:
[   24.734544]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.735180]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.735817] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.736453]                                      ^
[   24.736877]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.737514]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.738150] ==================================================================
[   25.253938] ==================================================================
[   25.254575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   25.255229] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.255883] 
[   25.256021] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.256036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.256040] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.256045] Call trace:
[   25.256048]  show_stack+0x20/0x38 (C)
[   25.256057]  dump_stack_lvl+0x8c/0xd0
[   25.256066]  print_report+0x118/0x608
[   25.256075]  kasan_report+0xdc/0x128
[   25.256083]  kasan_check_range+0x100/0x1a8
[   25.256092]  __kasan_check_write+0x20/0x30
[   25.256103]  kasan_atomics_helper+0x1384/0x4858
[   25.256111]  kasan_atomics+0x198/0x2e0
[   25.256119]  kunit_try_run_case+0x170/0x3f0
[   25.256129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.256141]  kthread+0x328/0x630
[   25.256151]  ret_from_fork+0x10/0x20
[   25.256160] 
[   25.262293] Allocated by task 319:
[   25.262598]  kasan_save_stack+0x3c/0x68
[   25.262942]  kasan_save_track+0x20/0x40
[   25.263286]  kasan_save_alloc_info+0x40/0x58
[   25.263669]  __kasan_kmalloc+0xd4/0xd8
[   25.264006]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.264413]  kasan_atomics+0xb8/0x2e0
[   25.264742]  kunit_try_run_case+0x170/0x3f0
[   25.265117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.265608]  kthread+0x328/0x630
[   25.265901]  ret_from_fork+0x10/0x20
[   25.266223] 
[   25.266361] The buggy address belongs to the object at ffff00000a4bdd00
[   25.266361]  which belongs to the cache kmalloc-64 of size 64
[   25.267445] The buggy address is located 0 bytes to the right of
[   25.267445]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.268575] 
[   25.268713] The buggy address belongs to the physical page:
[   25.269205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.269895] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.270472] page_type: f5(slab)
[   25.270755] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.271440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.272121] page dumped because: kasan: bad access detected
[   25.272614] 
[   25.272751] Memory state around the buggy address:
[   25.273176]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.273813]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.274450] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.275086]                                      ^
[   25.275512]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.276151]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.276786] ==================================================================
[   25.159928] ==================================================================
[   25.160565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   25.161218] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.161872] 
[   25.162010] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.162024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.162028] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.162033] Call trace:
[   25.162036]  show_stack+0x20/0x38 (C)
[   25.162045]  dump_stack_lvl+0x8c/0xd0
[   25.162054]  print_report+0x118/0x608
[   25.162063]  kasan_report+0xdc/0x128
[   25.162071]  kasan_check_range+0x100/0x1a8
[   25.162080]  __kasan_check_write+0x20/0x30
[   25.162091]  kasan_atomics_helper+0x1190/0x4858
[   25.162099]  kasan_atomics+0x198/0x2e0
[   25.162107]  kunit_try_run_case+0x170/0x3f0
[   25.162117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.162129]  kthread+0x328/0x630
[   25.162139]  ret_from_fork+0x10/0x20
[   25.162148] 
[   25.168276] Allocated by task 319:
[   25.168580]  kasan_save_stack+0x3c/0x68
[   25.168924]  kasan_save_track+0x20/0x40
[   25.169269]  kasan_save_alloc_info+0x40/0x58
[   25.169653]  __kasan_kmalloc+0xd4/0xd8
[   25.169990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.170396]  kasan_atomics+0xb8/0x2e0
[   25.170725]  kunit_try_run_case+0x170/0x3f0
[   25.171102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.171592]  kthread+0x328/0x630
[   25.171884]  ret_from_fork+0x10/0x20
[   25.172206] 
[   25.172344] The buggy address belongs to the object at ffff00000a4bdd00
[   25.172344]  which belongs to the cache kmalloc-64 of size 64
[   25.173427] The buggy address is located 0 bytes to the right of
[   25.173427]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.174557] 
[   25.174695] The buggy address belongs to the physical page:
[   25.175187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.175879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.176456] page_type: f5(slab)
[   25.176739] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.177424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.178105] page dumped because: kasan: bad access detected
[   25.178599] 
[   25.178737] Memory state around the buggy address:
[   25.179162]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.179799]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.180438] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.181074]                                      ^
[   25.181500]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.182136]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.182772] ==================================================================
[   24.551473] ==================================================================
[   24.552112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   24.552767] Read of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.553412] 
[   24.553550] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.553565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.553570] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.553574] Call trace:
[   24.553578]  show_stack+0x20/0x38 (C)
[   24.553587]  dump_stack_lvl+0x8c/0xd0
[   24.553596]  print_report+0x118/0x608
[   24.553605]  kasan_report+0xdc/0x128
[   24.553614]  __asan_report_load4_noabort+0x20/0x30
[   24.553624]  kasan_atomics_helper+0x42d8/0x4858
[   24.553633]  kasan_atomics+0x198/0x2e0
[   24.553640]  kunit_try_run_case+0x170/0x3f0
[   24.553651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.553663]  kthread+0x328/0x630
[   24.553673]  ret_from_fork+0x10/0x20
[   24.553682] 
[   24.559515] Allocated by task 319:
[   24.559819]  kasan_save_stack+0x3c/0x68
[   24.560163]  kasan_save_track+0x20/0x40
[   24.560508]  kasan_save_alloc_info+0x40/0x58
[   24.560891]  __kasan_kmalloc+0xd4/0xd8
[   24.561228]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.561636]  kasan_atomics+0xb8/0x2e0
[   24.561965]  kunit_try_run_case+0x170/0x3f0
[   24.562340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.562831]  kthread+0x328/0x630
[   24.563124]  ret_from_fork+0x10/0x20
[   24.563446] 
[   24.563582] The buggy address belongs to the object at ffff00000a4bdd00
[   24.563582]  which belongs to the cache kmalloc-64 of size 64
[   24.564665] The buggy address is located 0 bytes to the right of
[   24.564665]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.565795] 
[   24.565932] The buggy address belongs to the physical page:
[   24.566424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.567116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.567695] page_type: f5(slab)
[   24.567979] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.568663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.569345] page dumped because: kasan: bad access detected
[   24.569837] 
[   24.569975] Memory state around the buggy address:
[   24.570401]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.571038]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.571675] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.572311]                                      ^
[   24.572737]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.573375]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.574011] ==================================================================
[   25.441303] ==================================================================
[   25.441941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   25.442594] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.443247] 
[   25.443385] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.443400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.443403] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.443408] Call trace:
[   25.443412]  show_stack+0x20/0x38 (C)
[   25.443421]  dump_stack_lvl+0x8c/0xd0
[   25.443430]  print_report+0x118/0x608
[   25.443438]  kasan_report+0xdc/0x128
[   25.443447]  kasan_check_range+0x100/0x1a8
[   25.443456]  __kasan_check_write+0x20/0x30
[   25.443466]  kasan_atomics_helper+0x1644/0x4858
[   25.443475]  kasan_atomics+0x198/0x2e0
[   25.443482]  kunit_try_run_case+0x170/0x3f0
[   25.443492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.443504]  kthread+0x328/0x630
[   25.443514]  ret_from_fork+0x10/0x20
[   25.443523] 
[   25.449654] Allocated by task 319:
[   25.449959]  kasan_save_stack+0x3c/0x68
[   25.450302]  kasan_save_track+0x20/0x40
[   25.450646]  kasan_save_alloc_info+0x40/0x58
[   25.451029]  __kasan_kmalloc+0xd4/0xd8
[   25.451364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.451772]  kasan_atomics+0xb8/0x2e0
[   25.452101]  kunit_try_run_case+0x170/0x3f0
[   25.452477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.452967]  kthread+0x328/0x630
[   25.453260]  ret_from_fork+0x10/0x20
[   25.453582] 
[   25.453720] The buggy address belongs to the object at ffff00000a4bdd00
[   25.453720]  which belongs to the cache kmalloc-64 of size 64
[   25.454803] The buggy address is located 0 bytes to the right of
[   25.454803]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.455932] 
[   25.456069] The buggy address belongs to the physical page:
[   25.456561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.457251] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.457828] page_type: f5(slab)
[   25.458113] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.458797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.459477] page dumped because: kasan: bad access detected
[   25.459969] 
[   25.460106] Memory state around the buggy address:
[   25.460531]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.461168]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.461805] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.462441]                                      ^
[   25.462867]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.463503]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.464139] ==================================================================
[   25.206929] ==================================================================
[   25.207568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   25.208220] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.208874] 
[   25.209014] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.209028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.209032] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.209037] Call trace:
[   25.209040]  show_stack+0x20/0x38 (C)
[   25.209050]  dump_stack_lvl+0x8c/0xd0
[   25.209058]  print_report+0x118/0x608
[   25.209067]  kasan_report+0xdc/0x128
[   25.209075]  kasan_check_range+0x100/0x1a8
[   25.209085]  __kasan_check_write+0x20/0x30
[   25.209094]  kasan_atomics_helper+0x126c/0x4858
[   25.209103]  kasan_atomics+0x198/0x2e0
[   25.209111]  kunit_try_run_case+0x170/0x3f0
[   25.209122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.209133]  kthread+0x328/0x630
[   25.209143]  ret_from_fork+0x10/0x20
[   25.209152] 
[   25.215282] Allocated by task 319:
[   25.215586]  kasan_save_stack+0x3c/0x68
[   25.215931]  kasan_save_track+0x20/0x40
[   25.216275]  kasan_save_alloc_info+0x40/0x58
[   25.216658]  __kasan_kmalloc+0xd4/0xd8
[   25.216995]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.217402]  kasan_atomics+0xb8/0x2e0
[   25.217731]  kunit_try_run_case+0x170/0x3f0
[   25.218106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.218596]  kthread+0x328/0x630
[   25.218888]  ret_from_fork+0x10/0x20
[   25.219211] 
[   25.219347] The buggy address belongs to the object at ffff00000a4bdd00
[   25.219347]  which belongs to the cache kmalloc-64 of size 64
[   25.220430] The buggy address is located 0 bytes to the right of
[   25.220430]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.221559] 
[   25.221696] The buggy address belongs to the physical page:
[   25.222187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.222879] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.223457] page_type: f5(slab)
[   25.223741] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.224425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.225107] page dumped because: kasan: bad access detected
[   25.225599] 
[   25.225735] Memory state around the buggy address:
[   25.226159]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.226796]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.227433] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.228069]                                      ^
[   25.228494]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.229132]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.229767] ==================================================================
[   25.534710] ==================================================================
[   25.535347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   25.536000] Write of size 8 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   25.536653] 
[   25.536792] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.536806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.536810] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.536815] Call trace:
[   25.536818]  show_stack+0x20/0x38 (C)
[   25.536827]  dump_stack_lvl+0x8c/0xd0
[   25.536836]  print_report+0x118/0x608
[   25.536844]  kasan_report+0xdc/0x128
[   25.536853]  kasan_check_range+0x100/0x1a8
[   25.536862]  __kasan_check_write+0x20/0x30
[   25.536872]  kasan_atomics_helper+0x175c/0x4858
[   25.536881]  kasan_atomics+0x198/0x2e0
[   25.536889]  kunit_try_run_case+0x170/0x3f0
[   25.536899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.536911]  kthread+0x328/0x630
[   25.536920]  ret_from_fork+0x10/0x20
[   25.536930] 
[   25.543059] Allocated by task 319:
[   25.543364]  kasan_save_stack+0x3c/0x68
[   25.543708]  kasan_save_track+0x20/0x40
[   25.544051]  kasan_save_alloc_info+0x40/0x58
[   25.544434]  __kasan_kmalloc+0xd4/0xd8
[   25.544771]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.545178]  kasan_atomics+0xb8/0x2e0
[   25.545507]  kunit_try_run_case+0x170/0x3f0
[   25.545883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.546373]  kthread+0x328/0x630
[   25.546667]  ret_from_fork+0x10/0x20
[   25.546989] 
[   25.547126] The buggy address belongs to the object at ffff00000a4bdd00
[   25.547126]  which belongs to the cache kmalloc-64 of size 64
[   25.548209] The buggy address is located 0 bytes to the right of
[   25.548209]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   25.549339] 
[   25.549476] The buggy address belongs to the physical page:
[   25.549968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   25.550658] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.551237] page_type: f5(slab)
[   25.551522] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   25.552205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.552887] page dumped because: kasan: bad access detected
[   25.553379] 
[   25.553515] Memory state around the buggy address:
[   25.553941]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.554578]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.555215] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.555851]                                      ^
[   25.556277]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556915]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.557550] ==================================================================
[   24.264029] ==================================================================
[   24.264684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   24.265346] Write of size 4 at addr ffff00000a4bdd30 by task kunit_try_catch/319
[   24.266017] 
[   24.266166] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   24.266197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.266207] Hardware name: Radxa ROCK Pi 4B (DT)
[   24.266218] Call trace:
[   24.266225]  show_stack+0x20/0x38 (C)
[   24.266245]  dump_stack_lvl+0x8c/0xd0
[   24.266264]  print_report+0x118/0x608
[   24.266283]  kasan_report+0xdc/0x128
[   24.266301]  kasan_check_range+0x100/0x1a8
[   24.266322]  __kasan_check_write+0x20/0x30
[   24.266344]  kasan_atomics_helper+0x3ac/0x4858
[   24.266363]  kasan_atomics+0x198/0x2e0
[   24.266381]  kunit_try_run_case+0x170/0x3f0
[   24.266404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.266429]  kthread+0x328/0x630
[   24.266451]  ret_from_fork+0x10/0x20
[   24.266472] 
[   24.272649] Allocated by task 319:
[   24.272966]  kasan_save_stack+0x3c/0x68
[   24.273325]  kasan_save_track+0x20/0x40
[   24.273683]  kasan_save_alloc_info+0x40/0x58
[   24.274082]  __kasan_kmalloc+0xd4/0xd8
[   24.274433]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.274858]  kasan_atomics+0xb8/0x2e0
[   24.275200]  kunit_try_run_case+0x170/0x3f0
[   24.275592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.276100]  kthread+0x328/0x630
[   24.276409]  ret_from_fork+0x10/0x20
[   24.276747] 
[   24.276893] The buggy address belongs to the object at ffff00000a4bdd00
[   24.276893]  which belongs to the cache kmalloc-64 of size 64
[   24.277994] The buggy address is located 0 bytes to the right of
[   24.277994]  allocated 48-byte region [ffff00000a4bdd00, ffff00000a4bdd30)
[   24.279143] 
[   24.279289] The buggy address belongs to the physical page:
[   24.279793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa4bd
[   24.280500] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   24.281095] page_type: f5(slab)
[   24.281393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   24.282093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.282788] page dumped because: kasan: bad access detected
[   24.283292] 
[   24.283437] Memory state around the buggy address:
[   24.283874]  ffff00000a4bdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284528]  ffff00000a4bdc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.285180] >ffff00000a4bdd00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.285830]                                      ^
[   24.286268]  ffff00000a4bdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.286921]  ffff00000a4bde00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287570] ==================================================================