Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   21.204512] ==================================================================
[   21.204662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.204779] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.204907] 
[   21.204981] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.205157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.205222] Hardware name: linux,dummy-virt (DT)
[   21.205298] Call trace:
[   21.205352]  show_stack+0x20/0x38 (C)
[   21.205471]  dump_stack_lvl+0x8c/0xd0
[   21.205605]  print_report+0x118/0x608
[   21.205720]  kasan_report+0xdc/0x128
[   21.205824]  kasan_check_range+0x100/0x1a8
[   21.205937]  __kasan_check_write+0x20/0x30
[   21.206047]  kasan_atomics_helper+0x1414/0x4858
[   21.207086]  kasan_atomics+0x198/0x2e0
[   21.207392]  kunit_try_run_case+0x170/0x3f0
[   21.208028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.208437]  kthread+0x328/0x630
[   21.208915]  ret_from_fork+0x10/0x20
[   21.209038] 
[   21.209085] Allocated by task 267:
[   21.209157]  kasan_save_stack+0x3c/0x68
[   21.209249]  kasan_save_track+0x20/0x40
[   21.209321]  kasan_save_alloc_info+0x40/0x58
[   21.209385]  __kasan_kmalloc+0xd4/0xd8
[   21.209446]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.209559]  kasan_atomics+0xb8/0x2e0
[   21.209630]  kunit_try_run_case+0x170/0x3f0
[   21.209707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.209792]  kthread+0x328/0x630
[   21.209861]  ret_from_fork+0x10/0x20
[   21.209933] 
[   21.209975] The buggy address belongs to the object at fff00000c42b8d00
[   21.209975]  which belongs to the cache kmalloc-64 of size 64
[   21.210093] The buggy address is located 0 bytes to the right of
[   21.210093]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.210225] 
[   21.210269] The buggy address belongs to the physical page:
[   21.210334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.210436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.211591] page_type: f5(slab)
[   21.211843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.211970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.212062] page dumped because: kasan: bad access detected
[   21.212133] 
[   21.212175] Memory state around the buggy address:
[   21.212248]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.212346]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.212436] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.212862]                                      ^
[   21.212977]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.213075]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.213155] ==================================================================
[   21.325225] ==================================================================
[   21.325344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.325454] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.327330] 
[   21.327436] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.327550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.327841] Hardware name: linux,dummy-virt (DT)
[   21.327928] Call trace:
[   21.327981]  show_stack+0x20/0x38 (C)
[   21.328100]  dump_stack_lvl+0x8c/0xd0
[   21.328208]  print_report+0x118/0x608
[   21.328311]  kasan_report+0xdc/0x128
[   21.328413]  kasan_check_range+0x100/0x1a8
[   21.328520]  __kasan_check_write+0x20/0x30
[   21.328642]  kasan_atomics_helper+0x175c/0x4858
[   21.328750]  kasan_atomics+0x198/0x2e0
[   21.328852]  kunit_try_run_case+0x170/0x3f0
[   21.328962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.329136]  kthread+0x328/0x630
[   21.329450]  ret_from_fork+0x10/0x20
[   21.329789] 
[   21.329838] Allocated by task 267:
[   21.330196]  kasan_save_stack+0x3c/0x68
[   21.330544]  kasan_save_track+0x20/0x40
[   21.330878]  kasan_save_alloc_info+0x40/0x58
[   21.331160]  __kasan_kmalloc+0xd4/0xd8
[   21.331251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.331711]  kasan_atomics+0xb8/0x2e0
[   21.332690]  kunit_try_run_case+0x170/0x3f0
[   21.332807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.333459]  kthread+0x328/0x630
[   21.333583]  ret_from_fork+0x10/0x20
[   21.334264] 
[   21.334661] The buggy address belongs to the object at fff00000c42b8d00
[   21.334661]  which belongs to the cache kmalloc-64 of size 64
[   21.335567] The buggy address is located 0 bytes to the right of
[   21.335567]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.335741] 
[   21.336149] The buggy address belongs to the physical page:
[   21.336272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.336400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.336521] page_type: f5(slab)
[   21.336620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.336736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.336842] page dumped because: kasan: bad access detected
[   21.338623] 
[   21.338855] Memory state around the buggy address:
[   21.339461]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.339699]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.340811] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.341686]                                      ^
[   21.343660]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343799]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343894] ==================================================================
[   20.763944] ==================================================================
[   20.764096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   20.764339] 
[   20.764451] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.764737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765438]  kasan_report+0xdc/0x128
[   20.765685]  __kasan_check_write+0x20/0x30
[   20.766304]  kunit_try_run_case+0x170/0x3f0
[   20.767190]  kasan_save_track+0x20/0x40
[   20.767857]  kthread+0x328/0x630
[   20.768247] The buggy address is located 0 bytes to the right of
[   20.768247]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.768393] 
[   20.768448] The buggy address belongs to the physical page:
[   20.768602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.768979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.769804] page dumped because: kasan: bad access detected
[   20.770503]                                      ^
[   20.770753]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.772973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   20.773249] 
[   20.773903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.774217] Hardware name: linux,dummy-virt (DT)
[   20.774299] Call trace:
[   20.774991]  kasan_report+0xdc/0x128
[   20.776174]  kthread+0x328/0x630
[   20.777027]  kasan_save_track+0x20/0x40
[   20.777149]  kasan_save_alloc_info+0x40/0x58
[   20.777257]  __kasan_kmalloc+0xd4/0xd8
[   20.777364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.777611]  kunit_try_run_case+0x170/0x3f0
[   20.777978]  ret_from_fork+0x10/0x20
[   20.778067] 
[   20.778133] The buggy address belongs to the object at fff00000c42b8d00
[   20.778133]  which belongs to the cache kmalloc-64 of size 64
[   20.778511] 
[   20.778607] The buggy address belongs to the physical page:
[   20.778681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.780900] ==================================================================
[   21.060597] ==================================================================
[   21.060711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.061330] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.061627] 
[   21.061750] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.061994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.062125] Hardware name: linux,dummy-virt (DT)
[   21.062277] Call trace:
[   21.062333]  show_stack+0x20/0x38 (C)
[   21.062651]  dump_stack_lvl+0x8c/0xd0
[   21.062837]  print_report+0x118/0x608
[   21.062986]  kasan_report+0xdc/0x128
[   21.063136]  kasan_check_range+0x100/0x1a8
[   21.063282]  __kasan_check_write+0x20/0x30
[   21.063428]  kasan_atomics_helper+0xeb8/0x4858
[   21.063590]  kasan_atomics+0x198/0x2e0
[   21.063696]  kunit_try_run_case+0x170/0x3f0
[   21.063784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.064249]  kthread+0x328/0x630
[   21.064400]  ret_from_fork+0x10/0x20
[   21.064524] 
[   21.064582] Allocated by task 267:
[   21.064657]  kasan_save_stack+0x3c/0x68
[   21.064749]  kasan_save_track+0x20/0x40
[   21.064841]  kasan_save_alloc_info+0x40/0x58
[   21.064976]  __kasan_kmalloc+0xd4/0xd8
[   21.065063]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.065166]  kasan_atomics+0xb8/0x2e0
[   21.065248]  kunit_try_run_case+0x170/0x3f0
[   21.065411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065538]  kthread+0x328/0x630
[   21.066122]  ret_from_fork+0x10/0x20
[   21.066357] 
[   21.066408] The buggy address belongs to the object at fff00000c42b8d00
[   21.066408]  which belongs to the cache kmalloc-64 of size 64
[   21.067748] The buggy address is located 0 bytes to the right of
[   21.067748]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.068000] 
[   21.068062] The buggy address belongs to the physical page:
[   21.068146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.068280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.068408] page_type: f5(slab)
[   21.068504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.068645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.070683] page dumped because: kasan: bad access detected
[   21.071240] 
[   21.072088] Memory state around the buggy address:
[   21.072405]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.072612]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.073110] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.073365]                                      ^
[   21.073448]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073588]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073690] ==================================================================
[   21.053566] ==================================================================
[   21.053695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.053881] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.054228] 
[   21.054364] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.054636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.054697] Hardware name: linux,dummy-virt (DT)
[   21.054757] Call trace:
[   21.054808]  show_stack+0x20/0x38 (C)
[   21.054920]  dump_stack_lvl+0x8c/0xd0
[   21.055043]  print_report+0x118/0x608
[   21.055189]  kasan_report+0xdc/0x128
[   21.055330]  __asan_report_store8_noabort+0x20/0x30
[   21.055488]  kasan_atomics_helper+0x3e5c/0x4858
[   21.055605]  kasan_atomics+0x198/0x2e0
[   21.055699]  kunit_try_run_case+0x170/0x3f0
[   21.055813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.056356]  kthread+0x328/0x630
[   21.056490]  ret_from_fork+0x10/0x20
[   21.056637] 
[   21.056715] Allocated by task 267:
[   21.056782]  kasan_save_stack+0x3c/0x68
[   21.056906]  kasan_save_track+0x20/0x40
[   21.057002]  kasan_save_alloc_info+0x40/0x58
[   21.057081]  __kasan_kmalloc+0xd4/0xd8
[   21.057154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.057236]  kasan_atomics+0xb8/0x2e0
[   21.057309]  kunit_try_run_case+0x170/0x3f0
[   21.057601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057703]  kthread+0x328/0x630
[   21.057805]  ret_from_fork+0x10/0x20
[   21.057915] 
[   21.057963] The buggy address belongs to the object at fff00000c42b8d00
[   21.057963]  which belongs to the cache kmalloc-64 of size 64
[   21.058109] The buggy address is located 0 bytes to the right of
[   21.058109]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.058289] 
[   21.058369] The buggy address belongs to the physical page:
[   21.058447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.058591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.058734] page_type: f5(slab)
[   21.058830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.058957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.059078] page dumped because: kasan: bad access detected
[   21.059162] 
[   21.059211] Memory state around the buggy address:
[   21.059289]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.059438]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.059563] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.059680]                                      ^
[   21.059795]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.059947]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.060084] ==================================================================
[   21.181820] ==================================================================
[   21.181968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.182072] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.182229] 
[   21.182338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.182586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.182647] Hardware name: linux,dummy-virt (DT)
[   21.182719] Call trace:
[   21.182778]  show_stack+0x20/0x38 (C)
[   21.182900]  dump_stack_lvl+0x8c/0xd0
[   21.183130]  print_report+0x118/0x608
[   21.183231]  kasan_report+0xdc/0x128
[   21.183618]  kasan_check_range+0x100/0x1a8
[   21.184471]  __kasan_check_write+0x20/0x30
[   21.184682]  kasan_atomics_helper+0x12d8/0x4858
[   21.184782]  kasan_atomics+0x198/0x2e0
[   21.184883]  kunit_try_run_case+0x170/0x3f0
[   21.185201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185298]  kthread+0x328/0x630
[   21.185351]  ret_from_fork+0x10/0x20
[   21.185413] 
[   21.185451] Allocated by task 267:
[   21.185526]  kasan_save_stack+0x3c/0x68
[   21.185665]  kasan_save_track+0x20/0x40
[   21.185765]  kasan_save_alloc_info+0x40/0x58
[   21.185879]  __kasan_kmalloc+0xd4/0xd8
[   21.185974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.186080]  kasan_atomics+0xb8/0x2e0
[   21.186167]  kunit_try_run_case+0x170/0x3f0
[   21.186271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.186431]  kthread+0x328/0x630
[   21.186527]  ret_from_fork+0x10/0x20
[   21.186621] 
[   21.186666] The buggy address belongs to the object at fff00000c42b8d00
[   21.186666]  which belongs to the cache kmalloc-64 of size 64
[   21.186868] The buggy address is located 0 bytes to the right of
[   21.186868]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.187090] 
[   21.187141] The buggy address belongs to the physical page:
[   21.187216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.187347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.187462] page_type: f5(slab)
[   21.187550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.187660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.187763] page dumped because: kasan: bad access detected
[   21.187844] 
[   21.187890] Memory state around the buggy address:
[   21.187963]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.188053]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.188712] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.188856]                                      ^
[   21.189360]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189491]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.189596] ==================================================================
[   21.105682] ==================================================================
[   21.105772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.105899] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.106064] 
[   21.106145] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.106340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.106409] Hardware name: linux,dummy-virt (DT)
[   21.106488] Call trace:
[   21.106556]  show_stack+0x20/0x38 (C)
[   21.106674]  dump_stack_lvl+0x8c/0xd0
[   21.106781]  print_report+0x118/0x608
[   21.106886]  kasan_report+0xdc/0x128
[   21.106984]  kasan_check_range+0x100/0x1a8
[   21.107092]  __kasan_check_write+0x20/0x30
[   21.107198]  kasan_atomics_helper+0xff0/0x4858
[   21.108049]  kasan_atomics+0x198/0x2e0
[   21.108258]  kunit_try_run_case+0x170/0x3f0
[   21.108468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109132]  kthread+0x328/0x630
[   21.109475]  ret_from_fork+0x10/0x20
[   21.109864] 
[   21.109920] Allocated by task 267:
[   21.110004]  kasan_save_stack+0x3c/0x68
[   21.110269]  kasan_save_track+0x20/0x40
[   21.110454]  kasan_save_alloc_info+0x40/0x58
[   21.110544]  __kasan_kmalloc+0xd4/0xd8
[   21.110929]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.111167]  kasan_atomics+0xb8/0x2e0
[   21.111497]  kunit_try_run_case+0x170/0x3f0
[   21.111624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.111804]  kthread+0x328/0x630
[   21.112042]  ret_from_fork+0x10/0x20
[   21.112380] 
[   21.112438] The buggy address belongs to the object at fff00000c42b8d00
[   21.112438]  which belongs to the cache kmalloc-64 of size 64
[   21.112583] The buggy address is located 0 bytes to the right of
[   21.112583]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.112854] 
[   21.113043] The buggy address belongs to the physical page:
[   21.113131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.113541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.113983] page_type: f5(slab)
[   21.114128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.114459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.114756] page dumped because: kasan: bad access detected
[   21.114834] 
[   21.114880] Memory state around the buggy address:
[   21.114956]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115066]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115499] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.115691]                                      ^
[   21.115865]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.116036]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.116413] ==================================================================
[   20.997223] ==================================================================
[   20.997356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.997484] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.997628] 
[   20.997714] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.997932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.998002] Hardware name: linux,dummy-virt (DT)
[   20.998086] Call trace:
[   20.998149]  show_stack+0x20/0x38 (C)
[   20.998268]  dump_stack_lvl+0x8c/0xd0
[   20.999841]  print_report+0x118/0x608
[   21.000121]  kasan_report+0xdc/0x128
[   21.000819]  kasan_check_range+0x100/0x1a8
[   21.001065]  __kasan_check_read+0x20/0x30
[   21.001325]  kasan_atomics_helper+0xdd4/0x4858
[   21.001917]  kasan_atomics+0x198/0x2e0
[   21.002109]  kunit_try_run_case+0x170/0x3f0
[   21.002630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.003510]  kthread+0x328/0x630
[   21.003791]  ret_from_fork+0x10/0x20
[   21.004462] 
[   21.004704] Allocated by task 267:
[   21.004878]  kasan_save_stack+0x3c/0x68
[   21.005161]  kasan_save_track+0x20/0x40
[   21.005593]  kasan_save_alloc_info+0x40/0x58
[   21.006071]  __kasan_kmalloc+0xd4/0xd8
[   21.006568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.006922]  kasan_atomics+0xb8/0x2e0
[   21.007098]  kunit_try_run_case+0x170/0x3f0
[   21.007193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.008196]  kthread+0x328/0x630
[   21.008497]  ret_from_fork+0x10/0x20
[   21.008598] 
[   21.009518] The buggy address belongs to the object at fff00000c42b8d00
[   21.009518]  which belongs to the cache kmalloc-64 of size 64
[   21.009716] The buggy address is located 0 bytes to the right of
[   21.009716]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.011203] 
[   21.011426] The buggy address belongs to the physical page:
[   21.011822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.012190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.012514] page_type: f5(slab)
[   21.013280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.013922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.014258] page dumped because: kasan: bad access detected
[   21.014347] 
[   21.014398] Memory state around the buggy address:
[   21.014479]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.014601]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.014713] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.014807]                                      ^
[   21.014893]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.014995]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017133] ==================================================================
[   20.965982] ==================================================================
[   20.966105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.966224] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.966339] 
[   20.966451] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.966961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.967066] Hardware name: linux,dummy-virt (DT)
[   20.967487] Call trace:
[   20.968011]  show_stack+0x20/0x38 (C)
[   20.968474]  dump_stack_lvl+0x8c/0xd0
[   20.968998]  print_report+0x118/0x608
[   20.969241]  kasan_report+0xdc/0x128
[   20.969413]  kasan_check_range+0x100/0x1a8
[   20.969906]  __kasan_check_write+0x20/0x30
[   20.970150]  kasan_atomics_helper+0xd3c/0x4858
[   20.970725]  kasan_atomics+0x198/0x2e0
[   20.970859]  kunit_try_run_case+0x170/0x3f0
[   20.970967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.971090]  kthread+0x328/0x630
[   20.971745]  ret_from_fork+0x10/0x20
[   20.972166] 
[   20.972220] Allocated by task 267:
[   20.972305]  kasan_save_stack+0x3c/0x68
[   20.972385]  kasan_save_track+0x20/0x40
[   20.972449]  kasan_save_alloc_info+0x40/0x58
[   20.972540]  __kasan_kmalloc+0xd4/0xd8
[   20.972624]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.973222]  kasan_atomics+0xb8/0x2e0
[   20.973661]  kunit_try_run_case+0x170/0x3f0
[   20.973765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.974168]  kthread+0x328/0x630
[   20.974527]  ret_from_fork+0x10/0x20
[   20.974648] 
[   20.974697] The buggy address belongs to the object at fff00000c42b8d00
[   20.974697]  which belongs to the cache kmalloc-64 of size 64
[   20.975322] The buggy address is located 0 bytes to the right of
[   20.975322]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.975497] 
[   20.976002] The buggy address belongs to the physical page:
[   20.976099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.976237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.976358] page_type: f5(slab)
[   20.977028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.977643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.978026] page dumped because: kasan: bad access detected
[   20.978121] 
[   20.978182] Memory state around the buggy address:
[   20.978276]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.978388]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.978502] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.979511]                                      ^
[   20.979949]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.980151]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.980368] ==================================================================
[   21.018662] ==================================================================
[   21.019270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.019468] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.019909] 
[   21.020027] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.020463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.020675] Hardware name: linux,dummy-virt (DT)
[   21.021173] Call trace:
[   21.021355]  show_stack+0x20/0x38 (C)
[   21.021520]  dump_stack_lvl+0x8c/0xd0
[   21.022329]  print_report+0x118/0x608
[   21.023092]  kasan_report+0xdc/0x128
[   21.023384]  __asan_report_load8_noabort+0x20/0x30
[   21.023942]  kasan_atomics_helper+0x3f58/0x4858
[   21.024312]  kasan_atomics+0x198/0x2e0
[   21.024817]  kunit_try_run_case+0x170/0x3f0
[   21.025408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.025561]  kthread+0x328/0x630
[   21.026070]  ret_from_fork+0x10/0x20
[   21.026192] 
[   21.026241] Allocated by task 267:
[   21.027521]  kasan_save_stack+0x3c/0x68
[   21.027792]  kasan_save_track+0x20/0x40
[   21.028544]  kasan_save_alloc_info+0x40/0x58
[   21.028655]  __kasan_kmalloc+0xd4/0xd8
[   21.029196]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.029380]  kasan_atomics+0xb8/0x2e0
[   21.030180]  kunit_try_run_case+0x170/0x3f0
[   21.030558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.030684]  kthread+0x328/0x630
[   21.030772]  ret_from_fork+0x10/0x20
[   21.031893] 
[   21.032276] The buggy address belongs to the object at fff00000c42b8d00
[   21.032276]  which belongs to the cache kmalloc-64 of size 64
[   21.032411] The buggy address is located 0 bytes to the right of
[   21.032411]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.032572] 
[   21.032622] The buggy address belongs to the physical page:
[   21.033923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.034074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.034200] page_type: f5(slab)
[   21.034297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.034427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.036605] page dumped because: kasan: bad access detected
[   21.036852] 
[   21.036921] Memory state around the buggy address:
[   21.037017]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.037133]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.037240] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.037955]                                      ^
[   21.038522]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039205]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.039307] ==================================================================
[   21.227163] ==================================================================
[   21.227290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.227398] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.227508] 
[   21.227646] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.228159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.228195] Hardware name: linux,dummy-virt (DT)
[   21.228228] Call trace:
[   21.228277]  show_stack+0x20/0x38 (C)
[   21.228373]  dump_stack_lvl+0x8c/0xd0
[   21.228482]  print_report+0x118/0x608
[   21.228589]  kasan_report+0xdc/0x128
[   21.228686]  kasan_check_range+0x100/0x1a8
[   21.228805]  __kasan_check_write+0x20/0x30
[   21.229033]  kasan_atomics_helper+0x14e4/0x4858
[   21.229146]  kasan_atomics+0x198/0x2e0
[   21.229256]  kunit_try_run_case+0x170/0x3f0
[   21.229355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.229503]  kthread+0x328/0x630
[   21.230009]  ret_from_fork+0x10/0x20
[   21.230289] 
[   21.230418] Allocated by task 267:
[   21.230647]  kasan_save_stack+0x3c/0x68
[   21.231006]  kasan_save_track+0x20/0x40
[   21.231131]  kasan_save_alloc_info+0x40/0x58
[   21.231226]  __kasan_kmalloc+0xd4/0xd8
[   21.231594]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.231959]  kasan_atomics+0xb8/0x2e0
[   21.232282]  kunit_try_run_case+0x170/0x3f0
[   21.232449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.232569]  kthread+0x328/0x630
[   21.232733]  ret_from_fork+0x10/0x20
[   21.233052] 
[   21.233132] The buggy address belongs to the object at fff00000c42b8d00
[   21.233132]  which belongs to the cache kmalloc-64 of size 64
[   21.233281] The buggy address is located 0 bytes to the right of
[   21.233281]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.233585] 
[   21.233762] The buggy address belongs to the physical page:
[   21.233843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.233962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.234070] page_type: f5(slab)
[   21.234497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.234808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.235105] page dumped because: kasan: bad access detected
[   21.235202] 
[   21.235250] Memory state around the buggy address:
[   21.235353]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.235454]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.235557] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.235633]                                      ^
[   21.235731]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235843]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235916] ==================================================================
[   21.153637] ==================================================================
[   21.153815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.154130] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.154514] 
[   21.154649] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.155202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.155386] Hardware name: linux,dummy-virt (DT)
[   21.155580] Call trace:
[   21.155641]  show_stack+0x20/0x38 (C)
[   21.155870]  dump_stack_lvl+0x8c/0xd0
[   21.155963]  print_report+0x118/0x608
[   21.156408]  kasan_report+0xdc/0x128
[   21.156807]  kasan_check_range+0x100/0x1a8
[   21.157086]  __kasan_check_write+0x20/0x30
[   21.157444]  kasan_atomics_helper+0x1190/0x4858
[   21.157728]  kasan_atomics+0x198/0x2e0
[   21.158087]  kunit_try_run_case+0x170/0x3f0
[   21.158407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.158709]  kthread+0x328/0x630
[   21.159012]  ret_from_fork+0x10/0x20
[   21.159219] 
[   21.159265] Allocated by task 267:
[   21.159577]  kasan_save_stack+0x3c/0x68
[   21.159713]  kasan_save_track+0x20/0x40
[   21.160017]  kasan_save_alloc_info+0x40/0x58
[   21.160404]  __kasan_kmalloc+0xd4/0xd8
[   21.160566]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.160836]  kasan_atomics+0xb8/0x2e0
[   21.160941]  kunit_try_run_case+0x170/0x3f0
[   21.161028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.161151]  kthread+0x328/0x630
[   21.161230]  ret_from_fork+0x10/0x20
[   21.161314] 
[   21.161447] The buggy address belongs to the object at fff00000c42b8d00
[   21.161447]  which belongs to the cache kmalloc-64 of size 64
[   21.161802] The buggy address is located 0 bytes to the right of
[   21.161802]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.162084] 
[   21.162289] The buggy address belongs to the physical page:
[   21.162416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.162820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.163065] page_type: f5(slab)
[   21.163200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.163349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.163464] page dumped because: kasan: bad access detected
[   21.163554] 
[   21.163601] Memory state around the buggy address:
[   21.163757]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.163854]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.164004] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.164088]                                      ^
[   21.164166]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164264]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164346] ==================================================================
[   21.273799] ==================================================================
[   21.274045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.274169] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.274293] 
[   21.274367] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.274571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.274641] Hardware name: linux,dummy-virt (DT)
[   21.274720] Call trace:
[   21.274773]  show_stack+0x20/0x38 (C)
[   21.274884]  dump_stack_lvl+0x8c/0xd0
[   21.274984]  print_report+0x118/0x608
[   21.275087]  kasan_report+0xdc/0x128
[   21.275188]  __asan_report_load8_noabort+0x20/0x30
[   21.275307]  kasan_atomics_helper+0x3df4/0x4858
[   21.275408]  kasan_atomics+0x198/0x2e0
[   21.275509]  kunit_try_run_case+0x170/0x3f0
[   21.276072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.276465]  kthread+0x328/0x630
[   21.276718]  ret_from_fork+0x10/0x20
[   21.276837] 
[   21.276879] Allocated by task 267:
[   21.276933]  kasan_save_stack+0x3c/0x68
[   21.277017]  kasan_save_track+0x20/0x40
[   21.277097]  kasan_save_alloc_info+0x40/0x58
[   21.277188]  __kasan_kmalloc+0xd4/0xd8
[   21.277272]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.277372]  kasan_atomics+0xb8/0x2e0
[   21.277459]  kunit_try_run_case+0x170/0x3f0
[   21.277587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.277700]  kthread+0x328/0x630
[   21.277782]  ret_from_fork+0x10/0x20
[   21.277874] 
[   21.277917] The buggy address belongs to the object at fff00000c42b8d00
[   21.277917]  which belongs to the cache kmalloc-64 of size 64
[   21.278392] The buggy address is located 0 bytes to the right of
[   21.278392]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.278961] 
[   21.279043] The buggy address belongs to the physical page:
[   21.279252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.279859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.280264] page_type: f5(slab)
[   21.280366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.280487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.280602] page dumped because: kasan: bad access detected
[   21.280687] 
[   21.280736] Memory state around the buggy address:
[   21.280819]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.280933]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.281049] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.281153]                                      ^
[   21.281239]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.281355]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.284027] ==================================================================
[   20.940781] ==================================================================
[   20.940906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.941015] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.941124] 
[   20.941201] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.941373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.941433] Hardware name: linux,dummy-virt (DT)
[   20.941512] Call trace:
[   20.941580]  show_stack+0x20/0x38 (C)
[   20.941691]  dump_stack_lvl+0x8c/0xd0
[   20.941789]  print_report+0x118/0x608
[   20.941880]  kasan_report+0xdc/0x128
[   20.941974]  __asan_report_load4_noabort+0x20/0x30
[   20.942080]  kasan_atomics_helper+0x3dd8/0x4858
[   20.942175]  kasan_atomics+0x198/0x2e0
[   20.942266]  kunit_try_run_case+0x170/0x3f0
[   20.942363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.942474]  kthread+0x328/0x630
[   20.943523]  ret_from_fork+0x10/0x20
[   20.943672] 
[   20.943719] Allocated by task 267:
[   20.943936]  kasan_save_stack+0x3c/0x68
[   20.944164]  kasan_save_track+0x20/0x40
[   20.944332]  kasan_save_alloc_info+0x40/0x58
[   20.944492]  __kasan_kmalloc+0xd4/0xd8
[   20.944616]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.944728]  kasan_atomics+0xb8/0x2e0
[   20.944844]  kunit_try_run_case+0x170/0x3f0
[   20.944966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.945116]  kthread+0x328/0x630
[   20.945230]  ret_from_fork+0x10/0x20
[   20.945323] 
[   20.945369] The buggy address belongs to the object at fff00000c42b8d00
[   20.945369]  which belongs to the cache kmalloc-64 of size 64
[   20.945523] The buggy address is located 0 bytes to the right of
[   20.945523]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.955876] 
[   20.955940] The buggy address belongs to the physical page:
[   20.956022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.956157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.958350] page_type: f5(slab)
[   20.958485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.958621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.958726] page dumped because: kasan: bad access detected
[   20.958807] 
[   20.958852] Memory state around the buggy address:
[   20.958931]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.959022]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.960984] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.961156]                                      ^
[   20.962157]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962974]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963479] ==================================================================
[   21.255151] ==================================================================
[   21.255478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.255620] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.255731] 
[   21.255793] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.256283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.256370] Hardware name: linux,dummy-virt (DT)
[   21.256472] Call trace:
[   21.256538]  show_stack+0x20/0x38 (C)
[   21.256666]  dump_stack_lvl+0x8c/0xd0
[   21.256776]  print_report+0x118/0x608
[   21.256881]  kasan_report+0xdc/0x128
[   21.256994]  __asan_report_load8_noabort+0x20/0x30
[   21.257103]  kasan_atomics_helper+0x3db0/0x4858
[   21.257673]  kasan_atomics+0x198/0x2e0
[   21.257835]  kunit_try_run_case+0x170/0x3f0
[   21.257988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.258164]  kthread+0x328/0x630
[   21.258309]  ret_from_fork+0x10/0x20
[   21.258454] 
[   21.258529] Allocated by task 267:
[   21.258607]  kasan_save_stack+0x3c/0x68
[   21.258693]  kasan_save_track+0x20/0x40
[   21.258781]  kasan_save_alloc_info+0x40/0x58
[   21.258866]  __kasan_kmalloc+0xd4/0xd8
[   21.258948]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.259041]  kasan_atomics+0xb8/0x2e0
[   21.259143]  kunit_try_run_case+0x170/0x3f0
[   21.259239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.259687]  kthread+0x328/0x630
[   21.260097]  ret_from_fork+0x10/0x20
[   21.260232] 
[   21.260296] The buggy address belongs to the object at fff00000c42b8d00
[   21.260296]  which belongs to the cache kmalloc-64 of size 64
[   21.260425] The buggy address is located 0 bytes to the right of
[   21.260425]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.260588] 
[   21.260641] The buggy address belongs to the physical page:
[   21.260720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.260834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.260945] page_type: f5(slab)
[   21.261930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.262103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.262198] page dumped because: kasan: bad access detected
[   21.262693] 
[   21.262748] Memory state around the buggy address:
[   21.262833]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.262945]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.263047] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.263139]                                      ^
[   21.263229]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.263334]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.263420] ==================================================================
[   20.981310] ==================================================================
[   20.981433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.981572] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.981705] 
[   20.982660] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.983046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.983121] Hardware name: linux,dummy-virt (DT)
[   20.983204] Call trace:
[   20.983260]  show_stack+0x20/0x38 (C)
[   20.983489]  dump_stack_lvl+0x8c/0xd0
[   20.984179]  print_report+0x118/0x608
[   20.984313]  kasan_report+0xdc/0x128
[   20.984818]  __asan_report_load4_noabort+0x20/0x30
[   20.984968]  kasan_atomics_helper+0x3e04/0x4858
[   20.985085]  kasan_atomics+0x198/0x2e0
[   20.985185]  kunit_try_run_case+0x170/0x3f0
[   20.985682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.986286]  kthread+0x328/0x630
[   20.986664]  ret_from_fork+0x10/0x20
[   20.986977] 
[   20.987435] Allocated by task 267:
[   20.987527]  kasan_save_stack+0x3c/0x68
[   20.987743]  kasan_save_track+0x20/0x40
[   20.987854]  kasan_save_alloc_info+0x40/0x58
[   20.987964]  __kasan_kmalloc+0xd4/0xd8
[   20.988049]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.988133]  kasan_atomics+0xb8/0x2e0
[   20.988666]  kunit_try_run_case+0x170/0x3f0
[   20.988907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.989293]  kthread+0x328/0x630
[   20.989581]  ret_from_fork+0x10/0x20
[   20.989843] 
[   20.990274] The buggy address belongs to the object at fff00000c42b8d00
[   20.990274]  which belongs to the cache kmalloc-64 of size 64
[   20.990430] The buggy address is located 0 bytes to the right of
[   20.990430]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.990756] 
[   20.991175] The buggy address belongs to the physical page:
[   20.991276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.991962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.992360] page_type: f5(slab)
[   20.992482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.992624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.992724] page dumped because: kasan: bad access detected
[   20.992806] 
[   20.993523] Memory state around the buggy address:
[   20.993640]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.993748]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.993850] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.993969]                                      ^
[   20.994065]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.994176]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.994269] ==================================================================
[   21.354566] ==================================================================
[   21.354678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.354792] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.354912] 
[   21.355583] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.356296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.356468] Hardware name: linux,dummy-virt (DT)
[   21.356602] Call trace:
[   21.356674]  show_stack+0x20/0x38 (C)
[   21.356861]  dump_stack_lvl+0x8c/0xd0
[   21.356975]  print_report+0x118/0x608
[   21.357093]  kasan_report+0xdc/0x128
[   21.357209]  kasan_check_range+0x100/0x1a8
[   21.357708]  __kasan_check_write+0x20/0x30
[   21.357843]  kasan_atomics_helper+0x17ec/0x4858
[   21.357956]  kasan_atomics+0x198/0x2e0
[   21.358096]  kunit_try_run_case+0x170/0x3f0
[   21.358211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.358333]  kthread+0x328/0x630
[   21.358438]  ret_from_fork+0x10/0x20
[   21.358561] 
[   21.358609] Allocated by task 267:
[   21.358675]  kasan_save_stack+0x3c/0x68
[   21.358775]  kasan_save_track+0x20/0x40
[   21.358852]  kasan_save_alloc_info+0x40/0x58
[   21.359334]  __kasan_kmalloc+0xd4/0xd8
[   21.359448]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.359541]  kasan_atomics+0xb8/0x2e0
[   21.359620]  kunit_try_run_case+0x170/0x3f0
[   21.359705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.360028]  kthread+0x328/0x630
[   21.360132]  ret_from_fork+0x10/0x20
[   21.360314] 
[   21.360680] The buggy address belongs to the object at fff00000c42b8d00
[   21.360680]  which belongs to the cache kmalloc-64 of size 64
[   21.360926] The buggy address is located 0 bytes to the right of
[   21.360926]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.361102] 
[   21.361174] The buggy address belongs to the physical page:
[   21.361319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.361438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.362043] page_type: f5(slab)
[   21.362355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.362562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.362880] page dumped because: kasan: bad access detected
[   21.362975] 
[   21.363320] Memory state around the buggy address:
[   21.363626]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.363746]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.364261] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.364361]                                      ^
[   21.364609]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364720]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364974] ==================================================================
[   20.845950] ==================================================================
[   20.846077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.846220] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.846327] 
[   20.846393] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.846594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.846667] Hardware name: linux,dummy-virt (DT)
[   20.846758] Call trace:
[   20.846808]  show_stack+0x20/0x38 (C)
[   20.846950]  dump_stack_lvl+0x8c/0xd0
[   20.847389]  print_report+0x118/0x608
[   20.847549]  kasan_report+0xdc/0x128
[   20.847860]  kasan_check_range+0x100/0x1a8
[   20.847957]  __kasan_check_write+0x20/0x30
[   20.848040]  kasan_atomics_helper+0xa6c/0x4858
[   20.848135]  kasan_atomics+0x198/0x2e0
[   20.848212]  kunit_try_run_case+0x170/0x3f0
[   20.848908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.849044]  kthread+0x328/0x630
[   20.852406]  ret_from_fork+0x10/0x20
[   20.852558] 
[   20.852607] Allocated by task 267:
[   20.852668]  kasan_save_stack+0x3c/0x68
[   20.852833]  kasan_save_track+0x20/0x40
[   20.853032]  kasan_save_alloc_info+0x40/0x58
[   20.853136]  __kasan_kmalloc+0xd4/0xd8
[   20.853219]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.853306]  kasan_atomics+0xb8/0x2e0
[   20.853380]  kunit_try_run_case+0x170/0x3f0
[   20.853479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853603]  kthread+0x328/0x630
[   20.853686]  ret_from_fork+0x10/0x20
[   20.853773] 
[   20.853837] The buggy address belongs to the object at fff00000c42b8d00
[   20.853837]  which belongs to the cache kmalloc-64 of size 64
[   20.854037] The buggy address is located 0 bytes to the right of
[   20.854037]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.854194] 
[   20.854241] The buggy address belongs to the physical page:
[   20.854313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.854437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.854554] page_type: f5(slab)
[   20.854638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.854750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.854849] page dumped because: kasan: bad access detected
[   20.854924] 
[   20.854972] Memory state around the buggy address:
[   20.855507]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855784]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855885] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855962]                                      ^
[   20.856058]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.856506] ==================================================================
[   20.713349] ==================================================================
[   20.717183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   20.717503] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.719240]  kasan_atomics+0x198/0x2e0
[   20.723111]  kasan_atomics+0xb8/0x2e0
[   20.725812] page dumped because: kasan: bad access detected
[   20.726402]                                      ^
[   20.728243] ==================================================================
[   21.346323] ==================================================================
[   21.346451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.346606] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.346768] 
[   21.346879] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.347135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.347226] Hardware name: linux,dummy-virt (DT)
[   21.347309] Call trace:
[   21.347356]  show_stack+0x20/0x38 (C)
[   21.347455]  dump_stack_lvl+0x8c/0xd0
[   21.347600]  print_report+0x118/0x608
[   21.347721]  kasan_report+0xdc/0x128
[   21.347821]  __asan_report_load8_noabort+0x20/0x30
[   21.347964]  kasan_atomics_helper+0x3e20/0x4858
[   21.348091]  kasan_atomics+0x198/0x2e0
[   21.348228]  kunit_try_run_case+0x170/0x3f0
[   21.348332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.348481]  kthread+0x328/0x630
[   21.348614]  ret_from_fork+0x10/0x20
[   21.348716] 
[   21.348755] Allocated by task 267:
[   21.348825]  kasan_save_stack+0x3c/0x68
[   21.348922]  kasan_save_track+0x20/0x40
[   21.348997]  kasan_save_alloc_info+0x40/0x58
[   21.349086]  __kasan_kmalloc+0xd4/0xd8
[   21.349170]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.349276]  kasan_atomics+0xb8/0x2e0
[   21.349418]  kunit_try_run_case+0x170/0x3f0
[   21.349511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.349625]  kthread+0x328/0x630
[   21.349746]  ret_from_fork+0x10/0x20
[   21.349836] 
[   21.349884] The buggy address belongs to the object at fff00000c42b8d00
[   21.349884]  which belongs to the cache kmalloc-64 of size 64
[   21.350022] The buggy address is located 0 bytes to the right of
[   21.350022]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.350177] 
[   21.350225] The buggy address belongs to the physical page:
[   21.350299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.350419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.350539] page_type: f5(slab)
[   21.350627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.350752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.350870] page dumped because: kasan: bad access detected
[   21.350952] 
[   21.351042] Memory state around the buggy address:
[   21.351168]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.351549]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.351848] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.353132]                                      ^
[   21.353225]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.353327]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.353425] ==================================================================
[   21.173487] ==================================================================
[   21.173618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.174059] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.174166] 
[   21.174241] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.174705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.174893] Hardware name: linux,dummy-virt (DT)
[   21.174966] Call trace:
[   21.175042]  show_stack+0x20/0x38 (C)
[   21.175210]  dump_stack_lvl+0x8c/0xd0
[   21.175401]  print_report+0x118/0x608
[   21.175605]  kasan_report+0xdc/0x128
[   21.175702]  kasan_check_range+0x100/0x1a8
[   21.176098]  __kasan_check_write+0x20/0x30
[   21.176296]  kasan_atomics_helper+0x126c/0x4858
[   21.176398]  kasan_atomics+0x198/0x2e0
[   21.176477]  kunit_try_run_case+0x170/0x3f0
[   21.176573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.176689]  kthread+0x328/0x630
[   21.176792]  ret_from_fork+0x10/0x20
[   21.176903] 
[   21.176951] Allocated by task 267:
[   21.177054]  kasan_save_stack+0x3c/0x68
[   21.177132]  kasan_save_track+0x20/0x40
[   21.177209]  kasan_save_alloc_info+0x40/0x58
[   21.177295]  __kasan_kmalloc+0xd4/0xd8
[   21.177387]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.177617]  kasan_atomics+0xb8/0x2e0
[   21.177984]  kunit_try_run_case+0x170/0x3f0
[   21.178144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.178294]  kthread+0x328/0x630
[   21.178407]  ret_from_fork+0x10/0x20
[   21.178520] 
[   21.178575] The buggy address belongs to the object at fff00000c42b8d00
[   21.178575]  which belongs to the cache kmalloc-64 of size 64
[   21.178721] The buggy address is located 0 bytes to the right of
[   21.178721]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.178950] 
[   21.179023] The buggy address belongs to the physical page:
[   21.179141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.179268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.179410] page_type: f5(slab)
[   21.179492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.179624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.180087] page dumped because: kasan: bad access detected
[   21.180171] 
[   21.180219] Memory state around the buggy address:
[   21.180308]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.180441]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.180572] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.180700]                                      ^
[   21.180931]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.181189]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.181293] ==================================================================
[   21.074307] ==================================================================
[   21.074486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.074662] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.074827] 
[   21.074965] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.075162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.075234] Hardware name: linux,dummy-virt (DT)
[   21.075307] Call trace:
[   21.075369]  show_stack+0x20/0x38 (C)
[   21.075474]  dump_stack_lvl+0x8c/0xd0
[   21.075591]  print_report+0x118/0x608
[   21.075697]  kasan_report+0xdc/0x128
[   21.075814]  kasan_check_range+0x100/0x1a8
[   21.075930]  __kasan_check_write+0x20/0x30
[   21.076049]  kasan_atomics_helper+0xf20/0x4858
[   21.076160]  kasan_atomics+0x198/0x2e0
[   21.076265]  kunit_try_run_case+0x170/0x3f0
[   21.076375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.076500]  kthread+0x328/0x630
[   21.077614]  ret_from_fork+0x10/0x20
[   21.077731] 
[   21.077795] Allocated by task 267:
[   21.077886]  kasan_save_stack+0x3c/0x68
[   21.077979]  kasan_save_track+0x20/0x40
[   21.078063]  kasan_save_alloc_info+0x40/0x58
[   21.078160]  __kasan_kmalloc+0xd4/0xd8
[   21.078244]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.078356]  kasan_atomics+0xb8/0x2e0
[   21.078436]  kunit_try_run_case+0x170/0x3f0
[   21.079121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.079259]  kthread+0x328/0x630
[   21.079344]  ret_from_fork+0x10/0x20
[   21.079481] 
[   21.079571] The buggy address belongs to the object at fff00000c42b8d00
[   21.079571]  which belongs to the cache kmalloc-64 of size 64
[   21.079728] The buggy address is located 0 bytes to the right of
[   21.079728]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.079859] 
[   21.079903] The buggy address belongs to the physical page:
[   21.079974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.080296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.080449] page_type: f5(slab)
[   21.080578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.080706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.080806] page dumped because: kasan: bad access detected
[   21.080890] 
[   21.080937] Memory state around the buggy address:
[   21.081013]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.081120]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.081232] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.081329]                                      ^
[   21.081408]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.082341]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.082521] ==================================================================
[   21.147625] ==================================================================
[   21.147793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.147897] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.148035] 
[   21.148106] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.148376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.148472] Hardware name: linux,dummy-virt (DT)
[   21.148547] Call trace:
[   21.148603]  show_stack+0x20/0x38 (C)
[   21.148711]  dump_stack_lvl+0x8c/0xd0
[   21.148838]  print_report+0x118/0x608
[   21.148927]  kasan_report+0xdc/0x128
[   21.149029]  kasan_check_range+0x100/0x1a8
[   21.149123]  __kasan_check_write+0x20/0x30
[   21.149234]  kasan_atomics_helper+0x1128/0x4858
[   21.149366]  kasan_atomics+0x198/0x2e0
[   21.149538]  kunit_try_run_case+0x170/0x3f0
[   21.149675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.149805]  kthread+0x328/0x630
[   21.149910]  ret_from_fork+0x10/0x20
[   21.150021] 
[   21.150069] Allocated by task 267:
[   21.150140]  kasan_save_stack+0x3c/0x68
[   21.150234]  kasan_save_track+0x20/0x40
[   21.150321]  kasan_save_alloc_info+0x40/0x58
[   21.150409]  __kasan_kmalloc+0xd4/0xd8
[   21.150493]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.150591]  kasan_atomics+0xb8/0x2e0
[   21.150673]  kunit_try_run_case+0x170/0x3f0
[   21.150765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.150865]  kthread+0x328/0x630
[   21.150955]  ret_from_fork+0x10/0x20
[   21.151039] 
[   21.151086] The buggy address belongs to the object at fff00000c42b8d00
[   21.151086]  which belongs to the cache kmalloc-64 of size 64
[   21.151224] The buggy address is located 0 bytes to the right of
[   21.151224]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.151418] 
[   21.151469] The buggy address belongs to the physical page:
[   21.151562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.151691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.151825] page_type: f5(slab)
[   21.151905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.152009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.152116] page dumped because: kasan: bad access detected
[   21.152203] 
[   21.152254] Memory state around the buggy address:
[   21.152339]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.152614]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.152727] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.152843]                                      ^
[   21.152928]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153034]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153142] ==================================================================
[   21.085332] ==================================================================
[   21.085459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.085602] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.085731] 
[   21.085814] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.086023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.086100] Hardware name: linux,dummy-virt (DT)
[   21.086186] Call trace:
[   21.086247]  show_stack+0x20/0x38 (C)
[   21.086371]  dump_stack_lvl+0x8c/0xd0
[   21.086479]  print_report+0x118/0x608
[   21.088588]  kasan_report+0xdc/0x128
[   21.089434]  kasan_check_range+0x100/0x1a8
[   21.090104]  __kasan_check_write+0x20/0x30
[   21.090275]  kasan_atomics_helper+0xf88/0x4858
[   21.091240]  kasan_atomics+0x198/0x2e0
[   21.091341]  kunit_try_run_case+0x170/0x3f0
[   21.092114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.092401]  kthread+0x328/0x630
[   21.092652]  ret_from_fork+0x10/0x20
[   21.093256] 
[   21.093348] Allocated by task 267:
[   21.093437]  kasan_save_stack+0x3c/0x68
[   21.093563]  kasan_save_track+0x20/0x40
[   21.093648]  kasan_save_alloc_info+0x40/0x58
[   21.093746]  __kasan_kmalloc+0xd4/0xd8
[   21.093843]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.094843]  kasan_atomics+0xb8/0x2e0
[   21.095456]  kunit_try_run_case+0x170/0x3f0
[   21.096097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.096203]  kthread+0x328/0x630
[   21.096277]  ret_from_fork+0x10/0x20
[   21.096357] 
[   21.097661] The buggy address belongs to the object at fff00000c42b8d00
[   21.097661]  which belongs to the cache kmalloc-64 of size 64
[   21.097852] The buggy address is located 0 bytes to the right of
[   21.097852]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.098857] 
[   21.099319] The buggy address belongs to the physical page:
[   21.099722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.099839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.099956] page_type: f5(slab)
[   21.100042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.100169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.100269] page dumped because: kasan: bad access detected
[   21.100348] 
[   21.100392] Memory state around the buggy address:
[   21.100468]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.100585]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.100687] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.102127]                                      ^
[   21.102328]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102457]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102563] ==================================================================
[   20.837966] ==================================================================
[   20.838090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.838199] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.838316] 
[   20.838391] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.838592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.838663] Hardware name: linux,dummy-virt (DT)
[   20.838768] Call trace:
[   20.838845]  show_stack+0x20/0x38 (C)
[   20.838954]  dump_stack_lvl+0x8c/0xd0
[   20.839097]  print_report+0x118/0x608
[   20.839237]  kasan_report+0xdc/0x128
[   20.839384]  kasan_check_range+0x100/0x1a8
[   20.839482]  __kasan_check_write+0x20/0x30
[   20.839687]  kasan_atomics_helper+0xa04/0x4858
[   20.839984]  kasan_atomics+0x198/0x2e0
[   20.840224]  kunit_try_run_case+0x170/0x3f0
[   20.840409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.840573]  kthread+0x328/0x630
[   20.840694]  ret_from_fork+0x10/0x20
[   20.840795] 
[   20.840993] Allocated by task 267:
[   20.841110]  kasan_save_stack+0x3c/0x68
[   20.841205]  kasan_save_track+0x20/0x40
[   20.841302]  kasan_save_alloc_info+0x40/0x58
[   20.841436]  __kasan_kmalloc+0xd4/0xd8
[   20.841599]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.841743]  kasan_atomics+0xb8/0x2e0
[   20.841861]  kunit_try_run_case+0x170/0x3f0
[   20.841993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.842141]  kthread+0x328/0x630
[   20.842254]  ret_from_fork+0x10/0x20
[   20.842333] 
[   20.842378] The buggy address belongs to the object at fff00000c42b8d00
[   20.842378]  which belongs to the cache kmalloc-64 of size 64
[   20.842519] The buggy address is located 0 bytes to the right of
[   20.842519]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.842745] 
[   20.842811] The buggy address belongs to the physical page:
[   20.842913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.843085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.843201] page_type: f5(slab)
[   20.843328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.843435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.843543] page dumped because: kasan: bad access detected
[   20.843612] 
[   20.843647] Memory state around the buggy address:
[   20.843713]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.843802]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.843906] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.843998]                                      ^
[   20.844076]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844375]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.844722] ==================================================================
[   21.197572] ==================================================================
[   21.197683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.197818] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.197993] 
[   21.198103] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.198365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.198446] Hardware name: linux,dummy-virt (DT)
[   21.198521] Call trace:
[   21.198595]  show_stack+0x20/0x38 (C)
[   21.198758]  dump_stack_lvl+0x8c/0xd0
[   21.198918]  print_report+0x118/0x608
[   21.199020]  kasan_report+0xdc/0x128
[   21.199149]  __asan_report_load8_noabort+0x20/0x30
[   21.199335]  kasan_atomics_helper+0x3f04/0x4858
[   21.199445]  kasan_atomics+0x198/0x2e0
[   21.199651]  kunit_try_run_case+0x170/0x3f0
[   21.199823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.199947]  kthread+0x328/0x630
[   21.200057]  ret_from_fork+0x10/0x20
[   21.200156] 
[   21.200202] Allocated by task 267:
[   21.200275]  kasan_save_stack+0x3c/0x68
[   21.200461]  kasan_save_track+0x20/0x40
[   21.200583]  kasan_save_alloc_info+0x40/0x58
[   21.200667]  __kasan_kmalloc+0xd4/0xd8
[   21.200768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.200856]  kasan_atomics+0xb8/0x2e0
[   21.200967]  kunit_try_run_case+0x170/0x3f0
[   21.201055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201176]  kthread+0x328/0x630
[   21.201275]  ret_from_fork+0x10/0x20
[   21.201395] 
[   21.201470] The buggy address belongs to the object at fff00000c42b8d00
[   21.201470]  which belongs to the cache kmalloc-64 of size 64
[   21.201700] The buggy address is located 0 bytes to the right of
[   21.201700]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.201909] 
[   21.201953] The buggy address belongs to the physical page:
[   21.202016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.202155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.202272] page_type: f5(slab)
[   21.202432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.202551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.202651] page dumped because: kasan: bad access detected
[   21.202731] 
[   21.202771] Memory state around the buggy address:
[   21.202855]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.202968]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.203077] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.203175]                                      ^
[   21.203258]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.203393]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.203525] ==================================================================
[   21.190410] ==================================================================
[   21.190597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.190748] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.190868] 
[   21.190955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.191215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.191333] Hardware name: linux,dummy-virt (DT)
[   21.191399] Call trace:
[   21.191447]  show_stack+0x20/0x38 (C)
[   21.191562]  dump_stack_lvl+0x8c/0xd0
[   21.191677]  print_report+0x118/0x608
[   21.192275]  kasan_report+0xdc/0x128
[   21.192406]  kasan_check_range+0x100/0x1a8
[   21.192506]  __kasan_check_write+0x20/0x30
[   21.192854]  kasan_atomics_helper+0x1384/0x4858
[   21.192980]  kasan_atomics+0x198/0x2e0
[   21.193115]  kunit_try_run_case+0x170/0x3f0
[   21.193274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.193415]  kthread+0x328/0x630
[   21.193613]  ret_from_fork+0x10/0x20
[   21.193745] 
[   21.193809] Allocated by task 267:
[   21.193883]  kasan_save_stack+0x3c/0x68
[   21.193972]  kasan_save_track+0x20/0x40
[   21.194063]  kasan_save_alloc_info+0x40/0x58
[   21.194158]  __kasan_kmalloc+0xd4/0xd8
[   21.194249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.194392]  kasan_atomics+0xb8/0x2e0
[   21.194476]  kunit_try_run_case+0x170/0x3f0
[   21.194890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.195035]  kthread+0x328/0x630
[   21.195145]  ret_from_fork+0x10/0x20
[   21.195234] 
[   21.195310] The buggy address belongs to the object at fff00000c42b8d00
[   21.195310]  which belongs to the cache kmalloc-64 of size 64
[   21.195457] The buggy address is located 0 bytes to the right of
[   21.195457]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.195624] 
[   21.195704] The buggy address belongs to the physical page:
[   21.195789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.195905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.196023] page_type: f5(slab)
[   21.196104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.196280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.196369] page dumped because: kasan: bad access detected
[   21.196475] 
[   21.196543] Memory state around the buggy address:
[   21.196612]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196725]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196811] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.196894]                                      ^
[   21.196971]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197076]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197192] ==================================================================
[   20.830005] ==================================================================
[   20.830130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.830245] Write of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.830359] 
[   20.830429] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.830629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.830693] Hardware name: linux,dummy-virt (DT)
[   20.830766] Call trace:
[   20.830821]  show_stack+0x20/0x38 (C)
[   20.830931]  dump_stack_lvl+0x8c/0xd0
[   20.831036]  print_report+0x118/0x608
[   20.831138]  kasan_report+0xdc/0x128
[   20.831236]  kasan_check_range+0x100/0x1a8
[   20.831377]  __kasan_check_write+0x20/0x30
[   20.831472]  kasan_atomics_helper+0x99c/0x4858
[   20.831847]  kasan_atomics+0x198/0x2e0
[   20.831932]  kunit_try_run_case+0x170/0x3f0
[   20.832043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.832153]  kthread+0x328/0x630
[   20.832255]  ret_from_fork+0x10/0x20
[   20.832659] 
[   20.832707] Allocated by task 267:
[   20.832799]  kasan_save_stack+0x3c/0x68
[   20.832930]  kasan_save_track+0x20/0x40
[   20.833044]  kasan_save_alloc_info+0x40/0x58
[   20.833168]  __kasan_kmalloc+0xd4/0xd8
[   20.833282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.833399]  kasan_atomics+0xb8/0x2e0
[   20.833490]  kunit_try_run_case+0x170/0x3f0
[   20.833624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.833731]  kthread+0x328/0x630
[   20.833812]  ret_from_fork+0x10/0x20
[   20.833897] 
[   20.833943] The buggy address belongs to the object at fff00000c42b8d00
[   20.833943]  which belongs to the cache kmalloc-64 of size 64
[   20.834080] The buggy address is located 0 bytes to the right of
[   20.834080]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.834230] 
[   20.834276] The buggy address belongs to the physical page:
[   20.834353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.834473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.834583] page_type: f5(slab)
[   20.834660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.835328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.835569] page dumped because: kasan: bad access detected
[   20.835653] 
[   20.835693] Memory state around the buggy address:
[   20.835757]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.835839]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.835928] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.836020]                                      ^
[   20.836102]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.836203]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.836295] ==================================================================
[   21.043175] ==================================================================
[   21.043666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.043800] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.044454] 
[   21.044562] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.044757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.044827] Hardware name: linux,dummy-virt (DT)
[   21.044906] Call trace:
[   21.044969]  show_stack+0x20/0x38 (C)
[   21.045084]  dump_stack_lvl+0x8c/0xd0
[   21.045195]  print_report+0x118/0x608
[   21.046568]  kasan_report+0xdc/0x128
[   21.046709]  kasan_check_range+0x100/0x1a8
[   21.046824]  __kasan_check_write+0x20/0x30
[   21.046942]  kasan_atomics_helper+0xe44/0x4858
[   21.047061]  kasan_atomics+0x198/0x2e0
[   21.047117]  kunit_try_run_case+0x170/0x3f0
[   21.047169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.047226]  kthread+0x328/0x630
[   21.047272]  ret_from_fork+0x10/0x20
[   21.047630] 
[   21.047701] Allocated by task 267:
[   21.047790]  kasan_save_stack+0x3c/0x68
[   21.047939]  kasan_save_track+0x20/0x40
[   21.048041]  kasan_save_alloc_info+0x40/0x58
[   21.048200]  __kasan_kmalloc+0xd4/0xd8
[   21.048276]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.048359]  kasan_atomics+0xb8/0x2e0
[   21.048437]  kunit_try_run_case+0x170/0x3f0
[   21.048968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049159]  kthread+0x328/0x630
[   21.049250]  ret_from_fork+0x10/0x20
[   21.049328] 
[   21.049374] The buggy address belongs to the object at fff00000c42b8d00
[   21.049374]  which belongs to the cache kmalloc-64 of size 64
[   21.049542] The buggy address is located 0 bytes to the right of
[   21.049542]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.049710] 
[   21.049765] The buggy address belongs to the physical page:
[   21.049846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.049993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.050121] page_type: f5(slab)
[   21.050216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.050372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.050486] page dumped because: kasan: bad access detected
[   21.050968] 
[   21.051040] Memory state around the buggy address:
[   21.051447]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.051833]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.052037] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.052132]                                      ^
[   21.052283]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052476]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052805] ==================================================================
[   21.165446] ==================================================================
[   21.165642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.165749] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.165914] 
[   21.166022] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.166290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.166376] Hardware name: linux,dummy-virt (DT)
[   21.166456] Call trace:
[   21.166540]  show_stack+0x20/0x38 (C)
[   21.166708]  dump_stack_lvl+0x8c/0xd0
[   21.166823]  print_report+0x118/0x608
[   21.166932]  kasan_report+0xdc/0x128
[   21.167033]  kasan_check_range+0x100/0x1a8
[   21.167145]  __kasan_check_write+0x20/0x30
[   21.167260]  kasan_atomics_helper+0x11f8/0x4858
[   21.167461]  kasan_atomics+0x198/0x2e0
[   21.167561]  kunit_try_run_case+0x170/0x3f0
[   21.167663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.167788]  kthread+0x328/0x630
[   21.167905]  ret_from_fork+0x10/0x20
[   21.168211] 
[   21.168273] Allocated by task 267:
[   21.168625]  kasan_save_stack+0x3c/0x68
[   21.168754]  kasan_save_track+0x20/0x40
[   21.169095]  kasan_save_alloc_info+0x40/0x58
[   21.169202]  __kasan_kmalloc+0xd4/0xd8
[   21.169279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.169416]  kasan_atomics+0xb8/0x2e0
[   21.169504]  kunit_try_run_case+0x170/0x3f0
[   21.169612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.169711]  kthread+0x328/0x630
[   21.169777]  ret_from_fork+0x10/0x20
[   21.169882] 
[   21.169933] The buggy address belongs to the object at fff00000c42b8d00
[   21.169933]  which belongs to the cache kmalloc-64 of size 64
[   21.170310] The buggy address is located 0 bytes to the right of
[   21.170310]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.170472] 
[   21.170554] The buggy address belongs to the physical page:
[   21.170664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.170784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.170946] page_type: f5(slab)
[   21.171074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.171246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.171388] page dumped because: kasan: bad access detected
[   21.171465] 
[   21.171511] Memory state around the buggy address:
[   21.171839]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.172116]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.172228] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.172540]                                      ^
[   21.172698]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.172850]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.172986] ==================================================================
[   21.137825] ==================================================================
[   21.138142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.138394] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.138784] 
[   21.139311] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.139501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.139586] Hardware name: linux,dummy-virt (DT)
[   21.139675] Call trace:
[   21.139837]  show_stack+0x20/0x38 (C)
[   21.139962]  dump_stack_lvl+0x8c/0xd0
[   21.140218]  print_report+0x118/0x608
[   21.140340]  kasan_report+0xdc/0x128
[   21.140744]  kasan_check_range+0x100/0x1a8
[   21.140926]  __kasan_check_write+0x20/0x30
[   21.141472]  kasan_atomics_helper+0x10c0/0x4858
[   21.141908]  kasan_atomics+0x198/0x2e0
[   21.142043]  kunit_try_run_case+0x170/0x3f0
[   21.142158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.142283]  kthread+0x328/0x630
[   21.142386]  ret_from_fork+0x10/0x20
[   21.142506] 
[   21.142583] Allocated by task 267:
[   21.142691]  kasan_save_stack+0x3c/0x68
[   21.142822]  kasan_save_track+0x20/0x40
[   21.142943]  kasan_save_alloc_info+0x40/0x58
[   21.143062]  __kasan_kmalloc+0xd4/0xd8
[   21.143173]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.143495]  kasan_atomics+0xb8/0x2e0
[   21.143599]  kunit_try_run_case+0x170/0x3f0
[   21.143972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.144088]  kthread+0x328/0x630
[   21.144200]  ret_from_fork+0x10/0x20
[   21.144276] 
[   21.144323] The buggy address belongs to the object at fff00000c42b8d00
[   21.144323]  which belongs to the cache kmalloc-64 of size 64
[   21.144439] The buggy address is located 0 bytes to the right of
[   21.144439]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.144621] 
[   21.144851] The buggy address belongs to the physical page:
[   21.144963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.145149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.145327] page_type: f5(slab)
[   21.145448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.145601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.145718] page dumped because: kasan: bad access detected
[   21.145831] 
[   21.145895] Memory state around the buggy address:
[   21.145986]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.146091]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.146217] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.146323]                                      ^
[   21.146440]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.146568]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.146655] ==================================================================
[   21.244445] ==================================================================
[   21.244624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.245063] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.245184] 
[   21.245399] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.245875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.246081] Hardware name: linux,dummy-virt (DT)
[   21.246185] Call trace:
[   21.246359]  show_stack+0x20/0x38 (C)
[   21.246479]  dump_stack_lvl+0x8c/0xd0
[   21.246597]  print_report+0x118/0x608
[   21.246701]  kasan_report+0xdc/0x128
[   21.246804]  kasan_check_range+0x100/0x1a8
[   21.246906]  __kasan_check_write+0x20/0x30
[   21.247014]  kasan_atomics_helper+0x15b4/0x4858
[   21.247124]  kasan_atomics+0x198/0x2e0
[   21.247648]  kunit_try_run_case+0x170/0x3f0
[   21.248103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.248241]  kthread+0x328/0x630
[   21.249005]  ret_from_fork+0x10/0x20
[   21.249144] 
[   21.249193] Allocated by task 267:
[   21.249259]  kasan_save_stack+0x3c/0x68
[   21.249355]  kasan_save_track+0x20/0x40
[   21.249433]  kasan_save_alloc_info+0x40/0x58
[   21.249892]  __kasan_kmalloc+0xd4/0xd8
[   21.250302]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.250514]  kasan_atomics+0xb8/0x2e0
[   21.251189]  kunit_try_run_case+0x170/0x3f0
[   21.251468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.251793]  kthread+0x328/0x630
[   21.251919]  ret_from_fork+0x10/0x20
[   21.252039] 
[   21.252095] The buggy address belongs to the object at fff00000c42b8d00
[   21.252095]  which belongs to the cache kmalloc-64 of size 64
[   21.252286] The buggy address is located 0 bytes to the right of
[   21.252286]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.252498] 
[   21.252573] The buggy address belongs to the physical page:
[   21.252644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.252774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.252906] page_type: f5(slab)
[   21.252997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.253129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.253232] page dumped because: kasan: bad access detected
[   21.253327] 
[   21.253373] Memory state around the buggy address:
[   21.253451]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.253570]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.253669] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.253756]                                      ^
[   21.253838]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253946]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.254035] ==================================================================
[   21.304318] ==================================================================
[   21.304432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.305460] Read of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.306136] 
[   21.306489] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.307352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.307558] Hardware name: linux,dummy-virt (DT)
[   21.307625] Call trace:
[   21.307668]  show_stack+0x20/0x38 (C)
[   21.307781]  dump_stack_lvl+0x8c/0xd0
[   21.307885]  print_report+0x118/0x608
[   21.307992]  kasan_report+0xdc/0x128
[   21.308096]  __asan_report_load8_noabort+0x20/0x30
[   21.308208]  kasan_atomics_helper+0x3e10/0x4858
[   21.308319]  kasan_atomics+0x198/0x2e0
[   21.308427]  kunit_try_run_case+0x170/0x3f0
[   21.308545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.310897]  kthread+0x328/0x630
[   21.311345]  ret_from_fork+0x10/0x20
[   21.311880] 
[   21.311932] Allocated by task 267:
[   21.311992]  kasan_save_stack+0x3c/0x68
[   21.312071]  kasan_save_track+0x20/0x40
[   21.312151]  kasan_save_alloc_info+0x40/0x58
[   21.313369]  __kasan_kmalloc+0xd4/0xd8
[   21.313472]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.313801]  kasan_atomics+0xb8/0x2e0
[   21.314409]  kunit_try_run_case+0x170/0x3f0
[   21.314517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.315057]  kthread+0x328/0x630
[   21.315150]  ret_from_fork+0x10/0x20
[   21.315237] 
[   21.316453] The buggy address belongs to the object at fff00000c42b8d00
[   21.316453]  which belongs to the cache kmalloc-64 of size 64
[   21.316983] The buggy address is located 0 bytes to the right of
[   21.316983]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.317131] 
[   21.317179] The buggy address belongs to the physical page:
[   21.318118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.318930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.319240] page_type: f5(slab)
[   21.319416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.320032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.320144] page dumped because: kasan: bad access detected
[   21.320220] 
[   21.320499] Memory state around the buggy address:
[   21.320629]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.320958]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.321065] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.321155]                                      ^
[   21.321241]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.322327]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.322637] ==================================================================
[   21.116963] ==================================================================
[   21.117074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.117180] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.117299] 
[   21.117374] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.118030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.118210] Hardware name: linux,dummy-virt (DT)
[   21.118706] Call trace:
[   21.119051]  show_stack+0x20/0x38 (C)
[   21.119759]  dump_stack_lvl+0x8c/0xd0
[   21.120314]  print_report+0x118/0x608
[   21.120411]  kasan_report+0xdc/0x128
[   21.120939]  kasan_check_range+0x100/0x1a8
[   21.121471]  __kasan_check_write+0x20/0x30
[   21.122195]  kasan_atomics_helper+0x1058/0x4858
[   21.122418]  kasan_atomics+0x198/0x2e0
[   21.122709]  kunit_try_run_case+0x170/0x3f0
[   21.123407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.124099]  kthread+0x328/0x630
[   21.124237]  ret_from_fork+0x10/0x20
[   21.124871] 
[   21.124923] Allocated by task 267:
[   21.124995]  kasan_save_stack+0x3c/0x68
[   21.125087]  kasan_save_track+0x20/0x40
[   21.125171]  kasan_save_alloc_info+0x40/0x58
[   21.126279]  __kasan_kmalloc+0xd4/0xd8
[   21.126552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.126970]  kasan_atomics+0xb8/0x2e0
[   21.127321]  kunit_try_run_case+0x170/0x3f0
[   21.127815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.127943]  kthread+0x328/0x630
[   21.128037]  ret_from_fork+0x10/0x20
[   21.128119] 
[   21.128168] The buggy address belongs to the object at fff00000c42b8d00
[   21.128168]  which belongs to the cache kmalloc-64 of size 64
[   21.129076] The buggy address is located 0 bytes to the right of
[   21.129076]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.129829] 
[   21.130210] The buggy address belongs to the physical page:
[   21.130610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.131198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.131330] page_type: f5(slab)
[   21.131427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132790] page dumped because: kasan: bad access detected
[   21.133115] 
[   21.133413] Memory state around the buggy address:
[   21.133926]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.134040]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.134571] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.134679]                                      ^
[   21.134768]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.134867]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.136306] ==================================================================
[   21.218796] ==================================================================
[   21.218916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.219033] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.219132] 
[   21.219189] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.219357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.219416] Hardware name: linux,dummy-virt (DT)
[   21.219479] Call trace:
[   21.219539]  show_stack+0x20/0x38 (C)
[   21.220616]  dump_stack_lvl+0x8c/0xd0
[   21.220754]  print_report+0x118/0x608
[   21.220839]  kasan_report+0xdc/0x128
[   21.220928]  kasan_check_range+0x100/0x1a8
[   21.221308]  __kasan_check_write+0x20/0x30
[   21.221567]  kasan_atomics_helper+0x147c/0x4858
[   21.221684]  kasan_atomics+0x198/0x2e0
[   21.221894]  kunit_try_run_case+0x170/0x3f0
[   21.222026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.222148]  kthread+0x328/0x630
[   21.222245]  ret_from_fork+0x10/0x20
[   21.222360] 
[   21.222408] Allocated by task 267:
[   21.222473]  kasan_save_stack+0x3c/0x68
[   21.222583]  kasan_save_track+0x20/0x40
[   21.222686]  kasan_save_alloc_info+0x40/0x58
[   21.222782]  __kasan_kmalloc+0xd4/0xd8
[   21.222865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.222962]  kasan_atomics+0xb8/0x2e0
[   21.223044]  kunit_try_run_case+0x170/0x3f0
[   21.223152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.223266]  kthread+0x328/0x630
[   21.223376]  ret_from_fork+0x10/0x20
[   21.223451] 
[   21.223497] The buggy address belongs to the object at fff00000c42b8d00
[   21.223497]  which belongs to the cache kmalloc-64 of size 64
[   21.223654] The buggy address is located 0 bytes to the right of
[   21.223654]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.223802] 
[   21.224015] The buggy address belongs to the physical page:
[   21.224121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.224482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.224675] page_type: f5(slab)
[   21.224770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.224894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.225144] page dumped because: kasan: bad access detected
[   21.225230] 
[   21.225272] Memory state around the buggy address:
[   21.225549]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.225724]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.225872] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.225979]                                      ^
[   21.226103]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.226252]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.226372] ==================================================================
[   20.812336] ==================================================================
[   20.812449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.812572] Read of size 4 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   20.812723] 
[   20.812841] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.813103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.813170] Hardware name: linux,dummy-virt (DT)
[   20.813249] Call trace:
[   20.813334]  show_stack+0x20/0x38 (C)
[   20.813504]  dump_stack_lvl+0x8c/0xd0
[   20.813668]  print_report+0x118/0x608
[   20.813823]  kasan_report+0xdc/0x128
[   20.813927]  __asan_report_load4_noabort+0x20/0x30
[   20.814059]  kasan_atomics_helper+0x42d8/0x4858
[   20.814221]  kasan_atomics+0x198/0x2e0
[   20.814372]  kunit_try_run_case+0x170/0x3f0
[   20.814485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.814611]  kthread+0x328/0x630
[   20.814755]  ret_from_fork+0x10/0x20
[   20.814901] 
[   20.814943] Allocated by task 267:
[   20.815006]  kasan_save_stack+0x3c/0x68
[   20.815104]  kasan_save_track+0x20/0x40
[   20.815188]  kasan_save_alloc_info+0x40/0x58
[   20.815282]  __kasan_kmalloc+0xd4/0xd8
[   20.815375]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.815489]  kasan_atomics+0xb8/0x2e0
[   20.815624]  kunit_try_run_case+0x170/0x3f0
[   20.815728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.815812]  kthread+0x328/0x630
[   20.815911]  ret_from_fork+0x10/0x20
[   20.815997] 
[   20.816043] The buggy address belongs to the object at fff00000c42b8d00
[   20.816043]  which belongs to the cache kmalloc-64 of size 64
[   20.816364] The buggy address is located 0 bytes to the right of
[   20.816364]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.816513] 
[   20.816645] The buggy address belongs to the physical page:
[   20.816727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.818990]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.823087] Call trace:
[   20.823254]  show_stack+0x20/0x38 (C)
[   20.823449]  dump_stack_lvl+0x8c/0xd0
[   20.823565]  print_report+0x118/0x608
[   20.823657]  kasan_report+0xdc/0x128
[   20.823739]  kasan_check_range+0x100/0x1a8
[   20.823834]  __kasan_check_write+0x20/0x30
[   20.823943]  kasan_atomics_helper+0x934/0x4858
[   20.824050]  kasan_atomics+0x198/0x2e0
[   20.824153]  kunit_try_run_case+0x170/0x3f0
[   20.824272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.824395]  kthread+0x328/0x630
[   20.824519]  ret_from_fork+0x10/0x20
[   20.824958] 
[   20.825015] Allocated by task 267:
[   20.825084]  kasan_save_stack+0x3c/0x68
[   20.825170]  kasan_save_track+0x20/0x40
[   20.825247]  kasan_save_alloc_info+0x40/0x58
[   20.825345]  __kasan_kmalloc+0xd4/0xd8
[   20.825426]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.825778]  kasan_atomics+0xb8/0x2e0
[   20.825872]  kunit_try_run_case+0x170/0x3f0
[   20.825970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826077]  kthread+0x328/0x630
[   20.826160]  ret_from_fork+0x10/0x20
[   20.826281] 
[   20.826339] The buggy address belongs to the object at fff00000c42b8d00
[   20.826339]  which belongs to the cache kmalloc-64 of size 64
[   20.826463] The buggy address is located 0 bytes to the right of
[   20.826463]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   20.826690] 
[   20.826760] The buggy address belongs to the physical page:
[   20.826864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   20.826987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.827097] page_type: f5(slab)
[   20.827186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.827341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.827427] page dumped because: kasan: bad access detected
[   20.827501] 
[   20.827558] Memory state around the buggy address:
[   20.827967]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.828166]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.828254] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.828356]                                      ^
[   20.828434]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.828744]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.828866] ==================================================================
[   21.264507] ==================================================================
[   21.264641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.264858] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.264976] 
[   21.265234] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.265635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.265710] Hardware name: linux,dummy-virt (DT)
[   21.265782] Call trace:
[   21.265832]  show_stack+0x20/0x38 (C)
[   21.265946]  dump_stack_lvl+0x8c/0xd0
[   21.266052]  print_report+0x118/0x608
[   21.266159]  kasan_report+0xdc/0x128
[   21.266257]  kasan_check_range+0x100/0x1a8
[   21.266366]  __kasan_check_write+0x20/0x30
[   21.266475]  kasan_atomics_helper+0x1644/0x4858
[   21.266598]  kasan_atomics+0x198/0x2e0
[   21.266704]  kunit_try_run_case+0x170/0x3f0
[   21.266812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.266934]  kthread+0x328/0x630
[   21.267038]  ret_from_fork+0x10/0x20
[   21.267144] 
[   21.267190] Allocated by task 267:
[   21.267256]  kasan_save_stack+0x3c/0x68
[   21.267961]  kasan_save_track+0x20/0x40
[   21.268130]  kasan_save_alloc_info+0x40/0x58
[   21.268258]  __kasan_kmalloc+0xd4/0xd8
[   21.268441]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.269032]  kasan_atomics+0xb8/0x2e0
[   21.269320]  kunit_try_run_case+0x170/0x3f0
[   21.269526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.269848]  kthread+0x328/0x630
[   21.269951]  ret_from_fork+0x10/0x20
[   21.270037] 
[   21.270084] The buggy address belongs to the object at fff00000c42b8d00
[   21.270084]  which belongs to the cache kmalloc-64 of size 64
[   21.270397] The buggy address is located 0 bytes to the right of
[   21.270397]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.270744] 
[   21.270832] The buggy address belongs to the physical page:
[   21.270910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.271035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.271145] page_type: f5(slab)
[   21.271234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.271371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.271481] page dumped because: kasan: bad access detected
[   21.271577] 
[   21.271621] Memory state around the buggy address:
[   21.271697]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.271811]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.272144] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.272606]                                      ^
[   21.272701]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.272792]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.273146] ==================================================================
[   21.287616] ==================================================================
[   21.287761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.288326] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.288464] 
[   21.288548] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.289674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.289867] Hardware name: linux,dummy-virt (DT)
[   21.290043] Call trace:
[   21.290096]  show_stack+0x20/0x38 (C)
[   21.290798]  dump_stack_lvl+0x8c/0xd0
[   21.290922]  print_report+0x118/0x608
[   21.291869]  kasan_report+0xdc/0x128
[   21.291977]  kasan_check_range+0x100/0x1a8
[   21.292075]  __kasan_check_write+0x20/0x30
[   21.292766]  kasan_atomics_helper+0x16d0/0x4858
[   21.293096]  kasan_atomics+0x198/0x2e0
[   21.293217]  kunit_try_run_case+0x170/0x3f0
[   21.293329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.293941]  kthread+0x328/0x630
[   21.294143]  ret_from_fork+0x10/0x20
[   21.294269] 
[   21.294327] Allocated by task 267:
[   21.294421]  kasan_save_stack+0x3c/0x68
[   21.294544]  kasan_save_track+0x20/0x40
[   21.294638]  kasan_save_alloc_info+0x40/0x58
[   21.294739]  __kasan_kmalloc+0xd4/0xd8
[   21.294848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.294939]  kasan_atomics+0xb8/0x2e0
[   21.295038]  kunit_try_run_case+0x170/0x3f0
[   21.295179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.295701]  kthread+0x328/0x630
[   21.295815]  ret_from_fork+0x10/0x20
[   21.296187] 
[   21.296237] The buggy address belongs to the object at fff00000c42b8d00
[   21.296237]  which belongs to the cache kmalloc-64 of size 64
[   21.296385] The buggy address is located 0 bytes to the right of
[   21.296385]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.296551] 
[   21.296860] The buggy address belongs to the physical page:
[   21.297010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.297139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.297338] page_type: f5(slab)
[   21.297564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.297927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.298543] page dumped because: kasan: bad access detected
[   21.299034] 
[   21.299254] Memory state around the buggy address:
[   21.299781]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.300368]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.300877] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.301676]                                      ^
[   21.301919]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302447]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302838] ==================================================================
[   21.236360] ==================================================================
[   21.236517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.236679] Write of size 8 at addr fff00000c42b8d30 by task kunit_try_catch/267
[   21.236803] 
[   21.236870] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.237058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.237123] Hardware name: linux,dummy-virt (DT)
[   21.237193] Call trace:
[   21.237249]  show_stack+0x20/0x38 (C)
[   21.237353]  dump_stack_lvl+0x8c/0xd0
[   21.237461]  print_report+0x118/0x608
[   21.237593]  kasan_report+0xdc/0x128
[   21.237699]  kasan_check_range+0x100/0x1a8
[   21.237802]  __kasan_check_write+0x20/0x30
[   21.237910]  kasan_atomics_helper+0x154c/0x4858
[   21.238019]  kasan_atomics+0x198/0x2e0
[   21.238116]  kunit_try_run_case+0x170/0x3f0
[   21.238223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.238343]  kthread+0x328/0x630
[   21.238442]  ret_from_fork+0x10/0x20
[   21.238560] 
[   21.238600] Allocated by task 267:
[   21.238660]  kasan_save_stack+0x3c/0x68
[   21.238747]  kasan_save_track+0x20/0x40
[   21.238834]  kasan_save_alloc_info+0x40/0x58
[   21.238924]  __kasan_kmalloc+0xd4/0xd8
[   21.239005]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.239106]  kasan_atomics+0xb8/0x2e0
[   21.239174]  kunit_try_run_case+0x170/0x3f0
[   21.239262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.239350]  kthread+0x328/0x630
[   21.239438]  ret_from_fork+0x10/0x20
[   21.239528] 
[   21.239661] The buggy address belongs to the object at fff00000c42b8d00
[   21.239661]  which belongs to the cache kmalloc-64 of size 64
[   21.240250] The buggy address is located 0 bytes to the right of
[   21.240250]  allocated 48-byte region [fff00000c42b8d00, fff00000c42b8d30)
[   21.240425] 
[   21.240503] The buggy address belongs to the physical page:
[   21.241038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1042b8
[   21.241187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.241304] page_type: f5(slab)
[   21.241414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.241558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.242033] page dumped because: kasan: bad access detected
[   21.242143] 
[   21.242191] Memory state around the buggy address:
[   21.242399]  fff00000c42b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.242511]  fff00000c42b8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.242898] >fff00000c42b8d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.243094]                                      ^
[   21.243332]  fff00000c42b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.243661]  fff00000c42b8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.243801] ==================================================================

[   22.258937] ==================================================================
[   22.259618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   22.260559] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.261302] 
[   22.261722] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.261852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.261888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.261943] Call Trace:
[   22.261999]  <TASK>
[   22.262136]  dump_stack_lvl+0x73/0xb0
[   22.262271]  print_report+0xd1/0x650
[   22.262353]  ? __virt_addr_valid+0x1db/0x2d0
[   22.262436]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.262527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.262612]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.262687]  kasan_report+0x141/0x180
[   22.262766]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.262853]  __asan_report_load4_noabort+0x18/0x20
[   22.262931]  kasan_atomics_helper+0x4b88/0x5450
[   22.263017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.263100]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.263174]  ? kasan_atomics+0x152/0x310
[   22.263258]  kasan_atomics+0x1dc/0x310
[   22.263324]  ? __pfx_kasan_atomics+0x10/0x10
[   22.263396]  ? __pfx_read_tsc+0x10/0x10
[   22.263467]  ? ktime_get_ts64+0x86/0x230
[   22.263624]  kunit_try_run_case+0x1a5/0x480
[   22.263707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.263776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.263844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.263882]  ? __kthread_parkme+0x82/0x180
[   22.263917]  ? preempt_count_sub+0x50/0x80
[   22.263953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.263988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.264020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.264054]  kthread+0x337/0x6f0
[   22.264082]  ? trace_preempt_on+0x20/0xc0
[   22.264116]  ? __pfx_kthread+0x10/0x10
[   22.264146]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.264176]  ? calculate_sigpending+0x7b/0xa0
[   22.264206]  ? __pfx_kthread+0x10/0x10
[   22.264238]  ret_from_fork+0x41/0x80
[   22.264266]  ? __pfx_kthread+0x10/0x10
[   22.264297]  ret_from_fork_asm+0x1a/0x30
[   22.264339]  </TASK>
[   22.264352] 
[   22.281624] Allocated by task 285:
[   22.282279]  kasan_save_stack+0x45/0x70
[   22.282805]  kasan_save_track+0x18/0x40
[   22.283229]  kasan_save_alloc_info+0x3b/0x50
[   22.284175]  __kasan_kmalloc+0xb7/0xc0
[   22.286086]  __kmalloc_cache_noprof+0x189/0x420
[   22.286867]  kasan_atomics+0x95/0x310
[   22.287549]  kunit_try_run_case+0x1a5/0x480
[   22.287942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.288343]  kthread+0x337/0x6f0
[   22.288986]  ret_from_fork+0x41/0x80
[   22.289349]  ret_from_fork_asm+0x1a/0x30
[   22.290004] 
[   22.290222] The buggy address belongs to the object at ffff888102983600
[   22.290222]  which belongs to the cache kmalloc-64 of size 64
[   22.291601] The buggy address is located 0 bytes to the right of
[   22.291601]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.293108] 
[   22.293615] The buggy address belongs to the physical page:
[   22.294192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.295321] flags: 0x200000000000000(node=0|zone=2)
[   22.296044] page_type: f5(slab)
[   22.296422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.297552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.298102] page dumped because: kasan: bad access detected
[   22.298941] 
[   22.299168] Memory state around the buggy address:
[   22.299910]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.300606]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.301336] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.302122]                                      ^
[   22.302529]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.303238]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.304157] ==================================================================
[   22.405401] ==================================================================
[   22.405905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   22.407119] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.407783] 
[   22.408097] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.408225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.408267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.408325] Call Trace:
[   22.408378]  <TASK>
[   22.408429]  dump_stack_lvl+0x73/0xb0
[   22.408595]  print_report+0xd1/0x650
[   22.408683]  ? __virt_addr_valid+0x1db/0x2d0
[   22.408828]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.408909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.408985]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.409058]  kasan_report+0x141/0x180
[   22.409137]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.409228]  __asan_report_load4_noabort+0x18/0x20
[   22.409369]  kasan_atomics_helper+0x4b54/0x5450
[   22.409832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.409923]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.410057]  ? kasan_atomics+0x152/0x310
[   22.410170]  kasan_atomics+0x1dc/0x310
[   22.410244]  ? __pfx_kasan_atomics+0x10/0x10
[   22.410293]  ? __pfx_read_tsc+0x10/0x10
[   22.410325]  ? ktime_get_ts64+0x86/0x230
[   22.410364]  kunit_try_run_case+0x1a5/0x480
[   22.410402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.410474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.410539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.410576]  ? __kthread_parkme+0x82/0x180
[   22.410610]  ? preempt_count_sub+0x50/0x80
[   22.410646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.410682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.410715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.410751]  kthread+0x337/0x6f0
[   22.410783]  ? trace_preempt_on+0x20/0xc0
[   22.410884]  ? __pfx_kthread+0x10/0x10
[   22.410970]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.411050]  ? calculate_sigpending+0x7b/0xa0
[   22.411131]  ? __pfx_kthread+0x10/0x10
[   22.411203]  ret_from_fork+0x41/0x80
[   22.411246]  ? __pfx_kthread+0x10/0x10
[   22.411282]  ret_from_fork_asm+0x1a/0x30
[   22.411327]  </TASK>
[   22.411342] 
[   22.433521] Allocated by task 285:
[   22.434209]  kasan_save_stack+0x45/0x70
[   22.434748]  kasan_save_track+0x18/0x40
[   22.435333]  kasan_save_alloc_info+0x3b/0x50
[   22.435923]  __kasan_kmalloc+0xb7/0xc0
[   22.436348]  __kmalloc_cache_noprof+0x189/0x420
[   22.437110]  kasan_atomics+0x95/0x310
[   22.437818]  kunit_try_run_case+0x1a5/0x480
[   22.438275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.438895]  kthread+0x337/0x6f0
[   22.439315]  ret_from_fork+0x41/0x80
[   22.439819]  ret_from_fork_asm+0x1a/0x30
[   22.440328] 
[   22.440612] The buggy address belongs to the object at ffff888102983600
[   22.440612]  which belongs to the cache kmalloc-64 of size 64
[   22.441648] The buggy address is located 0 bytes to the right of
[   22.441648]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.442845] 
[   22.443081] The buggy address belongs to the physical page:
[   22.443576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.444197] flags: 0x200000000000000(node=0|zone=2)
[   22.445136] page_type: f5(slab)
[   22.445462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.446376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.447252] page dumped because: kasan: bad access detected
[   22.447895] 
[   22.448175] Memory state around the buggy address:
[   22.448853]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.450026]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.450800] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.451427]                                      ^
[   22.452002]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.452741]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.453449] ==================================================================
[   22.864961] ==================================================================
[   22.866866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   22.868634] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.869133] 
[   22.869352] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.870146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.870189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.870260] Call Trace:
[   22.870309]  <TASK>
[   22.870353]  dump_stack_lvl+0x73/0xb0
[   22.870423]  print_report+0xd1/0x650
[   22.871064]  ? __virt_addr_valid+0x1db/0x2d0
[   22.871145]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.871215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.871283]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.871352]  kasan_report+0x141/0x180
[   22.871420]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.871523]  kasan_check_range+0x10c/0x1c0
[   22.871591]  __kasan_check_write+0x18/0x20
[   22.871643]  kasan_atomics_helper+0x8f9/0x5450
[   22.871702]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.871759]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.871817]  ? kasan_atomics+0x152/0x310
[   22.871875]  kasan_atomics+0x1dc/0x310
[   22.871928]  ? __pfx_kasan_atomics+0x10/0x10
[   22.871981]  ? __pfx_read_tsc+0x10/0x10
[   22.872030]  ? ktime_get_ts64+0x86/0x230
[   22.872092]  kunit_try_run_case+0x1a5/0x480
[   22.872151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.872203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.872260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.872319]  ? __kthread_parkme+0x82/0x180
[   22.872373]  ? preempt_count_sub+0x50/0x80
[   22.872433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.872504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.873516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.873596]  kthread+0x337/0x6f0
[   22.873651]  ? trace_preempt_on+0x20/0xc0
[   22.873717]  ? __pfx_kthread+0x10/0x10
[   22.873777]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.873832]  ? calculate_sigpending+0x7b/0xa0
[   22.873888]  ? __pfx_kthread+0x10/0x10
[   22.873944]  ret_from_fork+0x41/0x80
[   22.873995]  ? __pfx_kthread+0x10/0x10
[   22.874049]  ret_from_fork_asm+0x1a/0x30
[   22.874127]  </TASK>
[   22.874154] 
[   22.898182] Allocated by task 285:
[   22.899347]  kasan_save_stack+0x45/0x70
[   22.899845]  kasan_save_track+0x18/0x40
[   22.900247]  kasan_save_alloc_info+0x3b/0x50
[   22.900926]  __kasan_kmalloc+0xb7/0xc0
[   22.901344]  __kmalloc_cache_noprof+0x189/0x420
[   22.902091]  kasan_atomics+0x95/0x310
[   22.902506]  kunit_try_run_case+0x1a5/0x480
[   22.903393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.903931]  kthread+0x337/0x6f0
[   22.904273]  ret_from_fork+0x41/0x80
[   22.904713]  ret_from_fork_asm+0x1a/0x30
[   22.905300] 
[   22.905509] The buggy address belongs to the object at ffff888102983600
[   22.905509]  which belongs to the cache kmalloc-64 of size 64
[   22.906653] The buggy address is located 0 bytes to the right of
[   22.906653]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.907683] 
[   22.908020] The buggy address belongs to the physical page:
[   22.908403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.909230] flags: 0x200000000000000(node=0|zone=2)
[   22.909676] page_type: f5(slab)
[   22.910652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.911253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.911857] page dumped because: kasan: bad access detected
[   22.912303] 
[   22.913248] Memory state around the buggy address:
[   22.913837]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.914315]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.914944] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.915711]                                      ^
[   22.916078]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.916799]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.917424] ==================================================================
[   22.500051] ==================================================================
[   22.500709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   22.501410] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.502178] 
[   22.502619] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.502789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.502836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.502896] Call Trace:
[   22.502951]  <TASK>
[   22.503038]  dump_stack_lvl+0x73/0xb0
[   22.503123]  print_report+0xd1/0x650
[   22.503235]  ? __virt_addr_valid+0x1db/0x2d0
[   22.503321]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.503397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.503475]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.503674]  kasan_report+0x141/0x180
[   22.503712]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.503756]  __asan_report_store4_noabort+0x1b/0x30
[   22.503809]  kasan_atomics_helper+0x4b3a/0x5450
[   22.503894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.504016]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.504105]  ? kasan_atomics+0x152/0x310
[   22.504232]  kasan_atomics+0x1dc/0x310
[   22.504308]  ? __pfx_kasan_atomics+0x10/0x10
[   22.504389]  ? __pfx_read_tsc+0x10/0x10
[   22.504459]  ? ktime_get_ts64+0x86/0x230
[   22.504633]  kunit_try_run_case+0x1a5/0x480
[   22.504679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.504714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.504750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.504785]  ? __kthread_parkme+0x82/0x180
[   22.504818]  ? preempt_count_sub+0x50/0x80
[   22.504853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.504888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.504921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.504954]  kthread+0x337/0x6f0
[   22.504985]  ? trace_preempt_on+0x20/0xc0
[   22.505020]  ? __pfx_kthread+0x10/0x10
[   22.505052]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.505084]  ? calculate_sigpending+0x7b/0xa0
[   22.505115]  ? __pfx_kthread+0x10/0x10
[   22.505147]  ret_from_fork+0x41/0x80
[   22.505176]  ? __pfx_kthread+0x10/0x10
[   22.505208]  ret_from_fork_asm+0x1a/0x30
[   22.505253]  </TASK>
[   22.505267] 
[   22.525006] Allocated by task 285:
[   22.525733]  kasan_save_stack+0x45/0x70
[   22.526232]  kasan_save_track+0x18/0x40
[   22.526817]  kasan_save_alloc_info+0x3b/0x50
[   22.527259]  __kasan_kmalloc+0xb7/0xc0
[   22.527776]  __kmalloc_cache_noprof+0x189/0x420
[   22.528679]  kasan_atomics+0x95/0x310
[   22.528989]  kunit_try_run_case+0x1a5/0x480
[   22.529796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.530306]  kthread+0x337/0x6f0
[   22.530868]  ret_from_fork+0x41/0x80
[   22.531326]  ret_from_fork_asm+0x1a/0x30
[   22.531925] 
[   22.532201] The buggy address belongs to the object at ffff888102983600
[   22.532201]  which belongs to the cache kmalloc-64 of size 64
[   22.533302] The buggy address is located 0 bytes to the right of
[   22.533302]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.534988] 
[   22.535252] The buggy address belongs to the physical page:
[   22.535943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.536814] flags: 0x200000000000000(node=0|zone=2)
[   22.537274] page_type: f5(slab)
[   22.537787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.538954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.539680] page dumped because: kasan: bad access detected
[   22.540103] 
[   22.540354] Memory state around the buggy address:
[   22.541011]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.541801]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.542349] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.543144]                                      ^
[   22.543672]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.544370]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.545681] ==================================================================
[   22.598561] ==================================================================
[   22.598984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   22.601182] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.601881] 
[   22.602116] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.602252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.602293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.602352] Call Trace:
[   22.604691]  <TASK>
[   22.604745]  dump_stack_lvl+0x73/0xb0
[   22.604831]  print_report+0xd1/0x650
[   22.604901]  ? __virt_addr_valid+0x1db/0x2d0
[   22.604964]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.605026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.605092]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.605156]  kasan_report+0x141/0x180
[   22.605221]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.605289]  kasan_check_range+0x10c/0x1c0
[   22.605364]  __kasan_check_write+0x18/0x20
[   22.605426]  kasan_atomics_helper+0x5fe/0x5450
[   22.605518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.605609]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.605683]  ? kasan_atomics+0x152/0x310
[   22.605755]  kasan_atomics+0x1dc/0x310
[   22.605823]  ? __pfx_kasan_atomics+0x10/0x10
[   22.605891]  ? __pfx_read_tsc+0x10/0x10
[   22.605952]  ? ktime_get_ts64+0x86/0x230
[   22.606028]  kunit_try_run_case+0x1a5/0x480
[   22.606097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.606150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.606212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.606272]  ? __kthread_parkme+0x82/0x180
[   22.606325]  ? preempt_count_sub+0x50/0x80
[   22.606387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.606443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.606617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.606683]  kthread+0x337/0x6f0
[   22.606737]  ? trace_preempt_on+0x20/0xc0
[   22.606794]  ? __pfx_kthread+0x10/0x10
[   22.606848]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.606902]  ? calculate_sigpending+0x7b/0xa0
[   22.606955]  ? __pfx_kthread+0x10/0x10
[   22.607011]  ret_from_fork+0x41/0x80
[   22.607060]  ? __pfx_kthread+0x10/0x10
[   22.607113]  ret_from_fork_asm+0x1a/0x30
[   22.607314]  </TASK>
[   22.607347] 
[   22.631692] Allocated by task 285:
[   22.633556]  kasan_save_stack+0x45/0x70
[   22.634058]  kasan_save_track+0x18/0x40
[   22.634444]  kasan_save_alloc_info+0x3b/0x50
[   22.634962]  __kasan_kmalloc+0xb7/0xc0
[   22.635313]  __kmalloc_cache_noprof+0x189/0x420
[   22.635804]  kasan_atomics+0x95/0x310
[   22.636232]  kunit_try_run_case+0x1a5/0x480
[   22.636753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.637321]  kthread+0x337/0x6f0
[   22.638138]  ret_from_fork+0x41/0x80
[   22.639075]  ret_from_fork_asm+0x1a/0x30
[   22.639526] 
[   22.640149] The buggy address belongs to the object at ffff888102983600
[   22.640149]  which belongs to the cache kmalloc-64 of size 64
[   22.641387] The buggy address is located 0 bytes to the right of
[   22.641387]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.642833] 
[   22.643229] The buggy address belongs to the physical page:
[   22.643618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.644202] flags: 0x200000000000000(node=0|zone=2)
[   22.644754] page_type: f5(slab)
[   22.645243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.646890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.647442] page dumped because: kasan: bad access detected
[   22.647879] 
[   22.648136] Memory state around the buggy address:
[   22.649210]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.649936]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.650574] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.651881]                                      ^
[   22.652465]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.653250]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.653912] ==================================================================
[   22.918630] ==================================================================
[   22.919122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   22.920581] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.921234] 
[   22.921701] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.921840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.921882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.921942] Call Trace:
[   22.922000]  <TASK>
[   22.922055]  dump_stack_lvl+0x73/0xb0
[   22.922149]  print_report+0xd1/0x650
[   22.922229]  ? __virt_addr_valid+0x1db/0x2d0
[   22.922316]  ? kasan_atomics_helper+0x992/0x5450
[   22.922394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.922635]  ? kasan_atomics_helper+0x992/0x5450
[   22.922716]  kasan_report+0x141/0x180
[   22.922802]  ? kasan_atomics_helper+0x992/0x5450
[   22.922897]  kasan_check_range+0x10c/0x1c0
[   22.922983]  __kasan_check_write+0x18/0x20
[   22.923049]  kasan_atomics_helper+0x992/0x5450
[   22.923088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.923124]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.923159]  ? kasan_atomics+0x152/0x310
[   22.923193]  kasan_atomics+0x1dc/0x310
[   22.923222]  ? __pfx_kasan_atomics+0x10/0x10
[   22.923255]  ? __pfx_read_tsc+0x10/0x10
[   22.923286]  ? ktime_get_ts64+0x86/0x230
[   22.923325]  kunit_try_run_case+0x1a5/0x480
[   22.923360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.923393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.923540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.923603]  ? __kthread_parkme+0x82/0x180
[   22.923638]  ? preempt_count_sub+0x50/0x80
[   22.923675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.923710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.923743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.923777]  kthread+0x337/0x6f0
[   22.923807]  ? trace_preempt_on+0x20/0xc0
[   22.923842]  ? __pfx_kthread+0x10/0x10
[   22.923875]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.923907]  ? calculate_sigpending+0x7b/0xa0
[   22.923938]  ? __pfx_kthread+0x10/0x10
[   22.923971]  ret_from_fork+0x41/0x80
[   22.924001]  ? __pfx_kthread+0x10/0x10
[   22.924033]  ret_from_fork_asm+0x1a/0x30
[   22.924077]  </TASK>
[   22.924092] 
[   22.947240] Allocated by task 285:
[   22.947713]  kasan_save_stack+0x45/0x70
[   22.948123]  kasan_save_track+0x18/0x40
[   22.949039]  kasan_save_alloc_info+0x3b/0x50
[   22.949388]  __kasan_kmalloc+0xb7/0xc0
[   22.950078]  __kmalloc_cache_noprof+0x189/0x420
[   22.950884]  kasan_atomics+0x95/0x310
[   22.951179]  kunit_try_run_case+0x1a5/0x480
[   22.951748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.952150]  kthread+0x337/0x6f0
[   22.952522]  ret_from_fork+0x41/0x80
[   22.952985]  ret_from_fork_asm+0x1a/0x30
[   22.953370] 
[   22.953591] The buggy address belongs to the object at ffff888102983600
[   22.953591]  which belongs to the cache kmalloc-64 of size 64
[   22.955031] The buggy address is located 0 bytes to the right of
[   22.955031]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.956511] 
[   22.956951] The buggy address belongs to the physical page:
[   22.957601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.958171] flags: 0x200000000000000(node=0|zone=2)
[   22.958929] page_type: f5(slab)
[   22.959330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.959949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.960805] page dumped because: kasan: bad access detected
[   22.961318] 
[   22.961647] Memory state around the buggy address:
[   22.962044]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.963051]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.963619] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.964234]                                      ^
[   22.964786]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.965729]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.966177] ==================================================================
[   24.813597] ==================================================================
[   24.814123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   24.815166] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.815816] 
[   24.816092] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.816224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.816264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.816323] Call Trace:
[   24.816378]  <TASK>
[   24.816493]  dump_stack_lvl+0x73/0xb0
[   24.816578]  print_report+0xd1/0x650
[   24.816661]  ? __virt_addr_valid+0x1db/0x2d0
[   24.816743]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.816824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.816907]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.816987]  kasan_report+0x141/0x180
[   24.817069]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.817164]  __asan_report_load8_noabort+0x18/0x20
[   24.817248]  kasan_atomics_helper+0x4f71/0x5450
[   24.817332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.817454]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.817556]  ? kasan_atomics+0x152/0x310
[   24.817651]  kasan_atomics+0x1dc/0x310
[   24.817723]  ? __pfx_kasan_atomics+0x10/0x10
[   24.817803]  ? __pfx_read_tsc+0x10/0x10
[   24.817874]  ? ktime_get_ts64+0x86/0x230
[   24.817963]  kunit_try_run_case+0x1a5/0x480
[   24.818047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.818125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.818207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.818287]  ? __kthread_parkme+0x82/0x180
[   24.818358]  ? preempt_count_sub+0x50/0x80
[   24.818421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.818525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.818567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.818602]  kthread+0x337/0x6f0
[   24.818633]  ? trace_preempt_on+0x20/0xc0
[   24.818668]  ? __pfx_kthread+0x10/0x10
[   24.818700]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.818732]  ? calculate_sigpending+0x7b/0xa0
[   24.818764]  ? __pfx_kthread+0x10/0x10
[   24.818796]  ret_from_fork+0x41/0x80
[   24.818827]  ? __pfx_kthread+0x10/0x10
[   24.818859]  ret_from_fork_asm+0x1a/0x30
[   24.818904]  </TASK>
[   24.818920] 
[   24.833735] Allocated by task 285:
[   24.834158]  kasan_save_stack+0x45/0x70
[   24.834780]  kasan_save_track+0x18/0x40
[   24.835192]  kasan_save_alloc_info+0x3b/0x50
[   24.835696]  __kasan_kmalloc+0xb7/0xc0
[   24.836008]  __kmalloc_cache_noprof+0x189/0x420
[   24.836352]  kasan_atomics+0x95/0x310
[   24.836769]  kunit_try_run_case+0x1a5/0x480
[   24.837218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.837953]  kthread+0x337/0x6f0
[   24.838290]  ret_from_fork+0x41/0x80
[   24.838885]  ret_from_fork_asm+0x1a/0x30
[   24.839371] 
[   24.840747] The buggy address belongs to the object at ffff888102983600
[   24.840747]  which belongs to the cache kmalloc-64 of size 64
[   24.841726] The buggy address is located 0 bytes to the right of
[   24.841726]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.842679] 
[   24.842912] The buggy address belongs to the physical page:
[   24.843406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.845935] flags: 0x200000000000000(node=0|zone=2)
[   24.846130] page_type: f5(slab)
[   24.846275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.846790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.847446] page dumped because: kasan: bad access detected
[   24.847898] 
[   24.848087] Memory state around the buggy address:
[   24.848636]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.849236]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.849873] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.850537]                                      ^
[   24.850920]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.851613]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.852102] ==================================================================
[   23.144890] ==================================================================
[   23.145372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   23.146512] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.146995] 
[   23.147273] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.147423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.147897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.147931] Call Trace:
[   23.147958]  <TASK>
[   23.147985]  dump_stack_lvl+0x73/0xb0
[   23.148027]  print_report+0xd1/0x650
[   23.148063]  ? __virt_addr_valid+0x1db/0x2d0
[   23.148097]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.148129]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.148163]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.148196]  kasan_report+0x141/0x180
[   23.148234]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.148273]  __asan_report_load4_noabort+0x18/0x20
[   23.148305]  kasan_atomics_helper+0x4a84/0x5450
[   23.148341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.148375]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.148412]  ? kasan_atomics+0x152/0x310
[   23.148498]  kasan_atomics+0x1dc/0x310
[   23.148544]  ? __pfx_kasan_atomics+0x10/0x10
[   23.148577]  ? __pfx_read_tsc+0x10/0x10
[   23.148607]  ? ktime_get_ts64+0x86/0x230
[   23.148649]  kunit_try_run_case+0x1a5/0x480
[   23.148686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.148720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.148757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.148791]  ? __kthread_parkme+0x82/0x180
[   23.148825]  ? preempt_count_sub+0x50/0x80
[   23.148860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.148895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.148929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.148963]  kthread+0x337/0x6f0
[   23.148996]  ? trace_preempt_on+0x20/0xc0
[   23.149031]  ? __pfx_kthread+0x10/0x10
[   23.149065]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.149099]  ? calculate_sigpending+0x7b/0xa0
[   23.149132]  ? __pfx_kthread+0x10/0x10
[   23.149166]  ret_from_fork+0x41/0x80
[   23.149198]  ? __pfx_kthread+0x10/0x10
[   23.149230]  ret_from_fork_asm+0x1a/0x30
[   23.149276]  </TASK>
[   23.149291] 
[   23.168301] Allocated by task 285:
[   23.169147]  kasan_save_stack+0x45/0x70
[   23.169989]  kasan_save_track+0x18/0x40
[   23.170340]  kasan_save_alloc_info+0x3b/0x50
[   23.171356]  __kasan_kmalloc+0xb7/0xc0
[   23.172083]  __kmalloc_cache_noprof+0x189/0x420
[   23.172735]  kasan_atomics+0x95/0x310
[   23.173255]  kunit_try_run_case+0x1a5/0x480
[   23.174163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.174725]  kthread+0x337/0x6f0
[   23.175067]  ret_from_fork+0x41/0x80
[   23.175688]  ret_from_fork_asm+0x1a/0x30
[   23.176029] 
[   23.176245] The buggy address belongs to the object at ffff888102983600
[   23.176245]  which belongs to the cache kmalloc-64 of size 64
[   23.177213] The buggy address is located 0 bytes to the right of
[   23.177213]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.179213] 
[   23.179390] The buggy address belongs to the physical page:
[   23.179837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.180857] flags: 0x200000000000000(node=0|zone=2)
[   23.181232] page_type: f5(slab)
[   23.181644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.182135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.182703] page dumped because: kasan: bad access detected
[   23.183205] 
[   23.183409] Memory state around the buggy address:
[   23.183915]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.184621]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.185227] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.185844]                                      ^
[   23.186342]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.186873]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.187552] ==================================================================
[   23.636104] ==================================================================
[   23.636696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   23.637326] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.637993] 
[   23.638247] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.638451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.638511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.638572] Call Trace:
[   23.638631]  <TASK>
[   23.638685]  dump_stack_lvl+0x73/0xb0
[   23.638767]  print_report+0xd1/0x650
[   23.638843]  ? __virt_addr_valid+0x1db/0x2d0
[   23.638918]  ? kasan_atomics_helper+0x1217/0x5450
[   23.638994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.639072]  ? kasan_atomics_helper+0x1217/0x5450
[   23.639154]  kasan_report+0x141/0x180
[   23.639276]  ? kasan_atomics_helper+0x1217/0x5450
[   23.639373]  kasan_check_range+0x10c/0x1c0
[   23.639475]  __kasan_check_write+0x18/0x20
[   23.639568]  kasan_atomics_helper+0x1217/0x5450
[   23.639649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.639687]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.639722]  ? kasan_atomics+0x152/0x310
[   23.639757]  kasan_atomics+0x1dc/0x310
[   23.639785]  ? __pfx_kasan_atomics+0x10/0x10
[   23.639817]  ? __pfx_read_tsc+0x10/0x10
[   23.639847]  ? ktime_get_ts64+0x86/0x230
[   23.639885]  kunit_try_run_case+0x1a5/0x480
[   23.639919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.639951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.639987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.640022]  ? __kthread_parkme+0x82/0x180
[   23.640053]  ? preempt_count_sub+0x50/0x80
[   23.640088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.640123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.640157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.640190]  kthread+0x337/0x6f0
[   23.640223]  ? trace_preempt_on+0x20/0xc0
[   23.640258]  ? __pfx_kthread+0x10/0x10
[   23.640291]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.640323]  ? calculate_sigpending+0x7b/0xa0
[   23.640355]  ? __pfx_kthread+0x10/0x10
[   23.640389]  ret_from_fork+0x41/0x80
[   23.640437]  ? __pfx_kthread+0x10/0x10
[   23.640506]  ret_from_fork_asm+0x1a/0x30
[   23.640556]  </TASK>
[   23.640572] 
[   23.663164] Allocated by task 285:
[   23.664719]  kasan_save_stack+0x45/0x70
[   23.665559]  kasan_save_track+0x18/0x40
[   23.667546]  kasan_save_alloc_info+0x3b/0x50
[   23.667990]  __kasan_kmalloc+0xb7/0xc0
[   23.669967]  __kmalloc_cache_noprof+0x189/0x420
[   23.670284]  kasan_atomics+0x95/0x310
[   23.672741]  kunit_try_run_case+0x1a5/0x480
[   23.673202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.674215]  kthread+0x337/0x6f0
[   23.674539]  ret_from_fork+0x41/0x80
[   23.675323]  ret_from_fork_asm+0x1a/0x30
[   23.676513] 
[   23.676677] The buggy address belongs to the object at ffff888102983600
[   23.676677]  which belongs to the cache kmalloc-64 of size 64
[   23.677895] The buggy address is located 0 bytes to the right of
[   23.677895]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.679294] 
[   23.679592] The buggy address belongs to the physical page:
[   23.680001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.680677] flags: 0x200000000000000(node=0|zone=2)
[   23.681562] page_type: f5(slab)
[   23.682358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.682953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.683792] page dumped because: kasan: bad access detected
[   23.684311] 
[   23.684462] Memory state around the buggy address:
[   23.685405]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.686209]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.687289] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.688309]                                      ^
[   23.688741]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.689345]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.690109] ==================================================================
[   23.876020] ==================================================================
[   23.876635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   23.877340] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   23.878369] 
[   23.878781] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.878892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.878926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.878974] Call Trace:
[   23.879017]  <TASK>
[   23.879060]  dump_stack_lvl+0x73/0xb0
[   23.879190]  print_report+0xd1/0x650
[   23.879271]  ? __virt_addr_valid+0x1db/0x2d0
[   23.879355]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.879461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.879615]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.879695]  kasan_report+0x141/0x180
[   23.879769]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.879860]  __asan_report_load8_noabort+0x18/0x20
[   23.879934]  kasan_atomics_helper+0x4eae/0x5450
[   23.880015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.880078]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.880151]  ? kasan_atomics+0x152/0x310
[   23.880230]  kasan_atomics+0x1dc/0x310
[   23.880292]  ? __pfx_kasan_atomics+0x10/0x10
[   23.880357]  ? __pfx_read_tsc+0x10/0x10
[   23.880474]  ? ktime_get_ts64+0x86/0x230
[   23.880603]  kunit_try_run_case+0x1a5/0x480
[   23.880717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.880795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.880896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.881014]  ? __kthread_parkme+0x82/0x180
[   23.881094]  ? preempt_count_sub+0x50/0x80
[   23.881147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.881184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.881221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.881257]  kthread+0x337/0x6f0
[   23.881289]  ? trace_preempt_on+0x20/0xc0
[   23.881325]  ? __pfx_kthread+0x10/0x10
[   23.881359]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.881394]  ? calculate_sigpending+0x7b/0xa0
[   23.881472]  ? __pfx_kthread+0x10/0x10
[   23.881537]  ret_from_fork+0x41/0x80
[   23.881587]  ? __pfx_kthread+0x10/0x10
[   23.881625]  ret_from_fork_asm+0x1a/0x30
[   23.881674]  </TASK>
[   23.881690] 
[   23.898267] Allocated by task 285:
[   23.898757]  kasan_save_stack+0x45/0x70
[   23.899278]  kasan_save_track+0x18/0x40
[   23.899760]  kasan_save_alloc_info+0x3b/0x50
[   23.900097]  __kasan_kmalloc+0xb7/0xc0
[   23.900455]  __kmalloc_cache_noprof+0x189/0x420
[   23.900991]  kasan_atomics+0x95/0x310
[   23.901464]  kunit_try_run_case+0x1a5/0x480
[   23.901962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.902539]  kthread+0x337/0x6f0
[   23.902928]  ret_from_fork+0x41/0x80
[   23.903367]  ret_from_fork_asm+0x1a/0x30
[   23.903863] 
[   23.904136] The buggy address belongs to the object at ffff888102983600
[   23.904136]  which belongs to the cache kmalloc-64 of size 64
[   23.904919] The buggy address is located 0 bytes to the right of
[   23.904919]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.906089] 
[   23.906328] The buggy address belongs to the physical page:
[   23.906865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.907387] flags: 0x200000000000000(node=0|zone=2)
[   23.907958] page_type: f5(slab)
[   23.908400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.909105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.909846] page dumped because: kasan: bad access detected
[   23.910357] 
[   23.910648] Memory state around the buggy address:
[   23.911099]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.911774]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912321] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.913040]                                      ^
[   23.913598]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.914186]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.914902] ==================================================================
[   23.231170] ==================================================================
[   23.231911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   23.232657] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.233248] 
[   23.233545] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.233685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.233725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.233784] Call Trace:
[   23.233840]  <TASK>
[   23.233896]  dump_stack_lvl+0x73/0xb0
[   23.233983]  print_report+0xd1/0x650
[   23.234068]  ? __virt_addr_valid+0x1db/0x2d0
[   23.234149]  ? kasan_atomics_helper+0xde0/0x5450
[   23.234227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.234311]  ? kasan_atomics_helper+0xde0/0x5450
[   23.234390]  kasan_report+0x141/0x180
[   23.234543]  ? kasan_atomics_helper+0xde0/0x5450
[   23.234637]  kasan_check_range+0x10c/0x1c0
[   23.234725]  __kasan_check_write+0x18/0x20
[   23.234804]  kasan_atomics_helper+0xde0/0x5450
[   23.234885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.234962]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.235040]  ? kasan_atomics+0x152/0x310
[   23.235120]  kasan_atomics+0x1dc/0x310
[   23.235192]  ? __pfx_kasan_atomics+0x10/0x10
[   23.235267]  ? __pfx_read_tsc+0x10/0x10
[   23.235336]  ? ktime_get_ts64+0x86/0x230
[   23.235466]  kunit_try_run_case+0x1a5/0x480
[   23.235548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.235584]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.235619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.235654]  ? __kthread_parkme+0x82/0x180
[   23.235688]  ? preempt_count_sub+0x50/0x80
[   23.235724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.235757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.235789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.235822]  kthread+0x337/0x6f0
[   23.235852]  ? trace_preempt_on+0x20/0xc0
[   23.235886]  ? __pfx_kthread+0x10/0x10
[   23.235917]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.235951]  ? calculate_sigpending+0x7b/0xa0
[   23.235983]  ? __pfx_kthread+0x10/0x10
[   23.236016]  ret_from_fork+0x41/0x80
[   23.236047]  ? __pfx_kthread+0x10/0x10
[   23.236079]  ret_from_fork_asm+0x1a/0x30
[   23.236125]  </TASK>
[   23.236140] 
[   23.251752] Allocated by task 285:
[   23.252276]  kasan_save_stack+0x45/0x70
[   23.252865]  kasan_save_track+0x18/0x40
[   23.253335]  kasan_save_alloc_info+0x3b/0x50
[   23.253846]  __kasan_kmalloc+0xb7/0xc0
[   23.254256]  __kmalloc_cache_noprof+0x189/0x420
[   23.254671]  kasan_atomics+0x95/0x310
[   23.255085]  kunit_try_run_case+0x1a5/0x480
[   23.255627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.256213]  kthread+0x337/0x6f0
[   23.256674]  ret_from_fork+0x41/0x80
[   23.257121]  ret_from_fork_asm+0x1a/0x30
[   23.257677] 
[   23.257937] The buggy address belongs to the object at ffff888102983600
[   23.257937]  which belongs to the cache kmalloc-64 of size 64
[   23.258989] The buggy address is located 0 bytes to the right of
[   23.258989]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.259845] 
[   23.260034] The buggy address belongs to the physical page:
[   23.260618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.261358] flags: 0x200000000000000(node=0|zone=2)
[   23.261940] page_type: f5(slab)
[   23.262379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.263068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.263735] page dumped because: kasan: bad access detected
[   23.264284] 
[   23.264614] Memory state around the buggy address:
[   23.265075]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.265718]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.266397] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.267059]                                      ^
[   23.267639]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.268339]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.269052] ==================================================================
[   23.592036] ==================================================================
[   23.592558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   23.593641] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.594395] 
[   23.594664] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.594793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.594834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.594896] Call Trace:
[   23.594953]  <TASK>
[   23.595008]  dump_stack_lvl+0x73/0xb0
[   23.595094]  print_report+0xd1/0x650
[   23.595181]  ? __virt_addr_valid+0x1db/0x2d0
[   23.595263]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.595338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.595423]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.595517]  kasan_report+0x141/0x180
[   23.595620]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.595667]  __asan_report_load4_noabort+0x18/0x20
[   23.595701]  kasan_atomics_helper+0x4a02/0x5450
[   23.595740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.595776]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.595809]  ? kasan_atomics+0x152/0x310
[   23.595840]  kasan_atomics+0x1dc/0x310
[   23.595867]  ? __pfx_kasan_atomics+0x10/0x10
[   23.595896]  ? __pfx_read_tsc+0x10/0x10
[   23.595924]  ? ktime_get_ts64+0x86/0x230
[   23.595963]  kunit_try_run_case+0x1a5/0x480
[   23.596002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.596034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.596071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.596107]  ? __kthread_parkme+0x82/0x180
[   23.596139]  ? preempt_count_sub+0x50/0x80
[   23.596176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.596210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.596243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.596277]  kthread+0x337/0x6f0
[   23.596309]  ? trace_preempt_on+0x20/0xc0
[   23.596344]  ? __pfx_kthread+0x10/0x10
[   23.596378]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.596419]  ? calculate_sigpending+0x7b/0xa0
[   23.596505]  ? __pfx_kthread+0x10/0x10
[   23.596545]  ret_from_fork+0x41/0x80
[   23.596579]  ? __pfx_kthread+0x10/0x10
[   23.596613]  ret_from_fork_asm+0x1a/0x30
[   23.596659]  </TASK>
[   23.596676] 
[   23.616157] Allocated by task 285:
[   23.616799]  kasan_save_stack+0x45/0x70
[   23.617134]  kasan_save_track+0x18/0x40
[   23.617557]  kasan_save_alloc_info+0x3b/0x50
[   23.618236]  __kasan_kmalloc+0xb7/0xc0
[   23.618665]  __kmalloc_cache_noprof+0x189/0x420
[   23.619575]  kasan_atomics+0x95/0x310
[   23.620304]  kunit_try_run_case+0x1a5/0x480
[   23.620964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.621374]  kthread+0x337/0x6f0
[   23.621933]  ret_from_fork+0x41/0x80
[   23.622502]  ret_from_fork_asm+0x1a/0x30
[   23.623075] 
[   23.623558] The buggy address belongs to the object at ffff888102983600
[   23.623558]  which belongs to the cache kmalloc-64 of size 64
[   23.624509] The buggy address is located 0 bytes to the right of
[   23.624509]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.625351] 
[   23.625697] The buggy address belongs to the physical page:
[   23.626165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.626856] flags: 0x200000000000000(node=0|zone=2)
[   23.627358] page_type: f5(slab)
[   23.627785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.628401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.629288] page dumped because: kasan: bad access detected
[   23.629838] 
[   23.630071] Memory state around the buggy address:
[   23.630589]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631141]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631831] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.632364]                                      ^
[   23.632876]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.633635]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.634211] ==================================================================
[   24.771861] ==================================================================
[   24.772445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   24.773153] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.774192] 
[   24.774521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.774650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.774691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.774751] Call Trace:
[   24.774802]  <TASK>
[   24.774852]  dump_stack_lvl+0x73/0xb0
[   24.774933]  print_report+0xd1/0x650
[   24.775014]  ? __virt_addr_valid+0x1db/0x2d0
[   24.775092]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.775169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.775255]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.775336]  kasan_report+0x141/0x180
[   24.775463]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.775618]  kasan_check_range+0x10c/0x1c0
[   24.775700]  __kasan_check_write+0x18/0x20
[   24.775773]  kasan_atomics_helper+0x1f43/0x5450
[   24.775878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.775957]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.776033]  ? kasan_atomics+0x152/0x310
[   24.776115]  kasan_atomics+0x1dc/0x310
[   24.776187]  ? __pfx_kasan_atomics+0x10/0x10
[   24.776265]  ? __pfx_read_tsc+0x10/0x10
[   24.776338]  ? ktime_get_ts64+0x86/0x230
[   24.776433]  kunit_try_run_case+0x1a5/0x480
[   24.776541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.776619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.776701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.776792]  ? __kthread_parkme+0x82/0x180
[   24.776881]  ? preempt_count_sub+0x50/0x80
[   24.776970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.777049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.777129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.777210]  kthread+0x337/0x6f0
[   24.777287]  ? trace_preempt_on+0x20/0xc0
[   24.777372]  ? __pfx_kthread+0x10/0x10
[   24.777463]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.777531]  ? calculate_sigpending+0x7b/0xa0
[   24.777565]  ? __pfx_kthread+0x10/0x10
[   24.777611]  ret_from_fork+0x41/0x80
[   24.777643]  ? __pfx_kthread+0x10/0x10
[   24.777678]  ret_from_fork_asm+0x1a/0x30
[   24.777723]  </TASK>
[   24.777738] 
[   24.792228] Allocated by task 285:
[   24.792616]  kasan_save_stack+0x45/0x70
[   24.792974]  kasan_save_track+0x18/0x40
[   24.793443]  kasan_save_alloc_info+0x3b/0x50
[   24.793947]  __kasan_kmalloc+0xb7/0xc0
[   24.794376]  __kmalloc_cache_noprof+0x189/0x420
[   24.795008]  kasan_atomics+0x95/0x310
[   24.795647]  kunit_try_run_case+0x1a5/0x480
[   24.796777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.797208]  kthread+0x337/0x6f0
[   24.798204]  ret_from_fork+0x41/0x80
[   24.799597]  ret_from_fork_asm+0x1a/0x30
[   24.800089] 
[   24.800326] The buggy address belongs to the object at ffff888102983600
[   24.800326]  which belongs to the cache kmalloc-64 of size 64
[   24.802987] The buggy address is located 0 bytes to the right of
[   24.802987]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.803431] 
[   24.803649] The buggy address belongs to the physical page:
[   24.804818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.805558] flags: 0x200000000000000(node=0|zone=2)
[   24.805964] page_type: f5(slab)
[   24.806292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.806909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.807522] page dumped because: kasan: bad access detected
[   24.808311] 
[   24.808554] Memory state around the buggy address:
[   24.808910]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.809376]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.810004] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.810666]                                      ^
[   24.811150]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.811813]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.812361] ==================================================================
[   24.939558] ==================================================================
[   24.939958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   24.940225] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.940463] 
[   24.942237] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.942324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.942343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.942375] Call Trace:
[   24.942401]  <TASK>
[   24.942495]  dump_stack_lvl+0x73/0xb0
[   24.942779]  print_report+0xd1/0x650
[   24.942953]  ? __virt_addr_valid+0x1db/0x2d0
[   24.943047]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.943096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.943132]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.943166]  kasan_report+0x141/0x180
[   24.943200]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.943239]  kasan_check_range+0x10c/0x1c0
[   24.943275]  __kasan_check_write+0x18/0x20
[   24.943305]  kasan_atomics_helper+0x20c8/0x5450
[   24.943338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.943371]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.943408]  ? kasan_atomics+0x152/0x310
[   24.943500]  kasan_atomics+0x1dc/0x310
[   24.943536]  ? __pfx_kasan_atomics+0x10/0x10
[   24.943569]  ? __pfx_read_tsc+0x10/0x10
[   24.943598]  ? ktime_get_ts64+0x86/0x230
[   24.943637]  kunit_try_run_case+0x1a5/0x480
[   24.943671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.943703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.943738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.943772]  ? __kthread_parkme+0x82/0x180
[   24.943804]  ? preempt_count_sub+0x50/0x80
[   24.943840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.943873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.943905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.943938]  kthread+0x337/0x6f0
[   24.943967]  ? trace_preempt_on+0x20/0xc0
[   24.944001]  ? __pfx_kthread+0x10/0x10
[   24.944032]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.944064]  ? calculate_sigpending+0x7b/0xa0
[   24.944095]  ? __pfx_kthread+0x10/0x10
[   24.944127]  ret_from_fork+0x41/0x80
[   24.944157]  ? __pfx_kthread+0x10/0x10
[   24.944191]  ret_from_fork_asm+0x1a/0x30
[   24.944235]  </TASK>
[   24.944249] 
[   24.966729] Allocated by task 285:
[   24.967105]  kasan_save_stack+0x45/0x70
[   24.968031]  kasan_save_track+0x18/0x40
[   24.968379]  kasan_save_alloc_info+0x3b/0x50
[   24.969128]  __kasan_kmalloc+0xb7/0xc0
[   24.969517]  __kmalloc_cache_noprof+0x189/0x420
[   24.970165]  kasan_atomics+0x95/0x310
[   24.970904]  kunit_try_run_case+0x1a5/0x480
[   24.972013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.972687]  kthread+0x337/0x6f0
[   24.972978]  ret_from_fork+0x41/0x80
[   24.973283]  ret_from_fork_asm+0x1a/0x30
[   24.974196] 
[   24.974727] The buggy address belongs to the object at ffff888102983600
[   24.974727]  which belongs to the cache kmalloc-64 of size 64
[   24.976008] The buggy address is located 0 bytes to the right of
[   24.976008]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.977278] 
[   24.977490] The buggy address belongs to the physical page:
[   24.978136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.979034] flags: 0x200000000000000(node=0|zone=2)
[   24.980035] page_type: f5(slab)
[   24.980370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.981259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.981791] page dumped because: kasan: bad access detected
[   24.982548] 
[   24.983031] Memory state around the buggy address:
[   24.983809]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.984345]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.985296] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.986086]                                      ^
[   24.986425]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.987051]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.988275] ==================================================================
[   24.147351] ==================================================================
[   24.148922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   24.149188] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.149458] 
[   24.149764] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.150247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.150294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.150354] Call Trace:
[   24.150411]  <TASK>
[   24.150465]  dump_stack_lvl+0x73/0xb0
[   24.150565]  print_report+0xd1/0x650
[   24.150649]  ? __virt_addr_valid+0x1db/0x2d0
[   24.150725]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.150845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.150928]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.151048]  kasan_report+0x141/0x180
[   24.151138]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.151230]  kasan_check_range+0x10c/0x1c0
[   24.151306]  __kasan_check_write+0x18/0x20
[   24.151343]  kasan_atomics_helper+0x16e7/0x5450
[   24.151379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.151426]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.151512]  ? kasan_atomics+0x152/0x310
[   24.151581]  kasan_atomics+0x1dc/0x310
[   24.151613]  ? __pfx_kasan_atomics+0x10/0x10
[   24.151645]  ? __pfx_read_tsc+0x10/0x10
[   24.151675]  ? ktime_get_ts64+0x86/0x230
[   24.151714]  kunit_try_run_case+0x1a5/0x480
[   24.151750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.151784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.151819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.151857]  ? __kthread_parkme+0x82/0x180
[   24.151891]  ? preempt_count_sub+0x50/0x80
[   24.151928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.151964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.151998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.152033]  kthread+0x337/0x6f0
[   24.152064]  ? trace_preempt_on+0x20/0xc0
[   24.152099]  ? __pfx_kthread+0x10/0x10
[   24.152132]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.152165]  ? calculate_sigpending+0x7b/0xa0
[   24.152197]  ? __pfx_kthread+0x10/0x10
[   24.152231]  ret_from_fork+0x41/0x80
[   24.152263]  ? __pfx_kthread+0x10/0x10
[   24.152296]  ret_from_fork_asm+0x1a/0x30
[   24.152341]  </TASK>
[   24.152356] 
[   24.174004] Allocated by task 285:
[   24.174672]  kasan_save_stack+0x45/0x70
[   24.175007]  kasan_save_track+0x18/0x40
[   24.175398]  kasan_save_alloc_info+0x3b/0x50
[   24.175930]  __kasan_kmalloc+0xb7/0xc0
[   24.176286]  __kmalloc_cache_noprof+0x189/0x420
[   24.177327]  kasan_atomics+0x95/0x310
[   24.177833]  kunit_try_run_case+0x1a5/0x480
[   24.178396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.179453]  kthread+0x337/0x6f0
[   24.180055]  ret_from_fork+0x41/0x80
[   24.180328]  ret_from_fork_asm+0x1a/0x30
[   24.180882] 
[   24.181223] The buggy address belongs to the object at ffff888102983600
[   24.181223]  which belongs to the cache kmalloc-64 of size 64
[   24.182321] The buggy address is located 0 bytes to the right of
[   24.182321]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.184772] 
[   24.185097] The buggy address belongs to the physical page:
[   24.185614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.186206] flags: 0x200000000000000(node=0|zone=2)
[   24.187005] page_type: f5(slab)
[   24.187806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.188552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.189060] page dumped because: kasan: bad access detected
[   24.189604] 
[   24.190058] Memory state around the buggy address:
[   24.191292]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.192270]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.193230] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.193945]                                      ^
[   24.194902]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.196092]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.197268] ==================================================================
[   23.916182] ==================================================================
[   23.917197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   23.918023] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   23.918676] 
[   23.918991] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.919125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.919169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.919250] Call Trace:
[   23.919333]  <TASK>
[   23.919388]  dump_stack_lvl+0x73/0xb0
[   23.919514]  print_report+0xd1/0x650
[   23.919577]  ? __virt_addr_valid+0x1db/0x2d0
[   23.919642]  ? kasan_atomics_helper+0x1467/0x5450
[   23.919714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.919818]  ? kasan_atomics_helper+0x1467/0x5450
[   23.919928]  kasan_report+0x141/0x180
[   23.920009]  ? kasan_atomics_helper+0x1467/0x5450
[   23.920120]  kasan_check_range+0x10c/0x1c0
[   23.920240]  __kasan_check_write+0x18/0x20
[   23.920318]  kasan_atomics_helper+0x1467/0x5450
[   23.920417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.920663]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.920749]  ? kasan_atomics+0x152/0x310
[   23.920833]  kasan_atomics+0x1dc/0x310
[   23.920907]  ? __pfx_kasan_atomics+0x10/0x10
[   23.920979]  ? __pfx_read_tsc+0x10/0x10
[   23.921015]  ? ktime_get_ts64+0x86/0x230
[   23.921059]  kunit_try_run_case+0x1a5/0x480
[   23.921096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.921168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.921204]  ? __kthread_parkme+0x82/0x180
[   23.921237]  ? preempt_count_sub+0x50/0x80
[   23.921277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.921347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.921428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.921521]  kthread+0x337/0x6f0
[   23.921601]  ? trace_preempt_on+0x20/0xc0
[   23.921677]  ? __pfx_kthread+0x10/0x10
[   23.921745]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.921811]  ? calculate_sigpending+0x7b/0xa0
[   23.921871]  ? __pfx_kthread+0x10/0x10
[   23.921934]  ret_from_fork+0x41/0x80
[   23.921995]  ? __pfx_kthread+0x10/0x10
[   23.922062]  ret_from_fork_asm+0x1a/0x30
[   23.922151]  </TASK>
[   23.922181] 
[   23.946166] Allocated by task 285:
[   23.946733]  kasan_save_stack+0x45/0x70
[   23.947320]  kasan_save_track+0x18/0x40
[   23.947805]  kasan_save_alloc_info+0x3b/0x50
[   23.948357]  __kasan_kmalloc+0xb7/0xc0
[   23.948872]  __kmalloc_cache_noprof+0x189/0x420
[   23.949471]  kasan_atomics+0x95/0x310
[   23.949964]  kunit_try_run_case+0x1a5/0x480
[   23.950541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.951078]  kthread+0x337/0x6f0
[   23.951553]  ret_from_fork+0x41/0x80
[   23.952024]  ret_from_fork_asm+0x1a/0x30
[   23.952553] 
[   23.952872] The buggy address belongs to the object at ffff888102983600
[   23.952872]  which belongs to the cache kmalloc-64 of size 64
[   23.954067] The buggy address is located 0 bytes to the right of
[   23.954067]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.955214] 
[   23.955543] The buggy address belongs to the physical page:
[   23.956045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.956915] flags: 0x200000000000000(node=0|zone=2)
[   23.957458] page_type: f5(slab)
[   23.957891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.958411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.959138] page dumped because: kasan: bad access detected
[   23.959713] 
[   23.960004] Memory state around the buggy address:
[   23.960510]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.961126]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.961731] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.962385]                                      ^
[   23.962944]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.963516]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964195] ==================================================================
[   24.380867] ==================================================================
[   24.381552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   24.382090] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.383187] 
[   24.383408] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.383565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.383589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.383620] Call Trace:
[   24.383646]  <TASK>
[   24.383673]  dump_stack_lvl+0x73/0xb0
[   24.383716]  print_report+0xd1/0x650
[   24.383751]  ? __virt_addr_valid+0x1db/0x2d0
[   24.383782]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.383813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.383844]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.383876]  kasan_report+0x141/0x180
[   24.383908]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.383946]  kasan_check_range+0x10c/0x1c0
[   24.383980]  __kasan_check_write+0x18/0x20
[   24.384009]  kasan_atomics_helper+0x19e3/0x5450
[   24.384043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.384078]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.384112]  ? kasan_atomics+0x152/0x310
[   24.384144]  kasan_atomics+0x1dc/0x310
[   24.384171]  ? __pfx_kasan_atomics+0x10/0x10
[   24.384201]  ? __pfx_read_tsc+0x10/0x10
[   24.384234]  ? ktime_get_ts64+0x86/0x230
[   24.384275]  kunit_try_run_case+0x1a5/0x480
[   24.384311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.384345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.384380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.384432]  ? __kthread_parkme+0x82/0x180
[   24.384520]  ? preempt_count_sub+0x50/0x80
[   24.384606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.384689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.384773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.384851]  kthread+0x337/0x6f0
[   24.384924]  ? trace_preempt_on+0x20/0xc0
[   24.385006]  ? __pfx_kthread+0x10/0x10
[   24.385083]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.385218]  ? calculate_sigpending+0x7b/0xa0
[   24.385299]  ? __pfx_kthread+0x10/0x10
[   24.385379]  ret_from_fork+0x41/0x80
[   24.385453]  ? __pfx_kthread+0x10/0x10
[   24.385558]  ret_from_fork_asm+0x1a/0x30
[   24.385671]  </TASK>
[   24.385709] 
[   24.406987] Allocated by task 285:
[   24.407664]  kasan_save_stack+0x45/0x70
[   24.408099]  kasan_save_track+0x18/0x40
[   24.408313]  kasan_save_alloc_info+0x3b/0x50
[   24.408783]  __kasan_kmalloc+0xb7/0xc0
[   24.409444]  __kmalloc_cache_noprof+0x189/0x420
[   24.410258]  kasan_atomics+0x95/0x310
[   24.411027]  kunit_try_run_case+0x1a5/0x480
[   24.411371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.411845]  kthread+0x337/0x6f0
[   24.412166]  ret_from_fork+0x41/0x80
[   24.412522]  ret_from_fork_asm+0x1a/0x30
[   24.412948] 
[   24.413187] The buggy address belongs to the object at ffff888102983600
[   24.413187]  which belongs to the cache kmalloc-64 of size 64
[   24.414789] The buggy address is located 0 bytes to the right of
[   24.414789]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.416015] 
[   24.416229] The buggy address belongs to the physical page:
[   24.417158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.417896] flags: 0x200000000000000(node=0|zone=2)
[   24.418594] page_type: f5(slab)
[   24.419119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.420032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.420742] page dumped because: kasan: bad access detected
[   24.421233] 
[   24.421498] Memory state around the buggy address:
[   24.422289]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.423068]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.423926] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.424405]                                      ^
[   24.425130]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.426001]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.426360] ==================================================================
[   24.516188] ==================================================================
[   24.517077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   24.517837] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.518497] 
[   24.518784] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.518914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.518991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.519057] Call Trace:
[   24.519114]  <TASK>
[   24.519170]  dump_stack_lvl+0x73/0xb0
[   24.519251]  print_report+0xd1/0x650
[   24.519325]  ? __virt_addr_valid+0x1db/0x2d0
[   24.519444]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.519553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.519633]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.519711]  kasan_report+0x141/0x180
[   24.519790]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.519884]  kasan_check_range+0x10c/0x1c0
[   24.519965]  __kasan_check_write+0x18/0x20
[   24.520035]  kasan_atomics_helper+0x1c18/0x5450
[   24.520113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.520192]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.520258]  ? kasan_atomics+0x152/0x310
[   24.520317]  kasan_atomics+0x1dc/0x310
[   24.520390]  ? __pfx_kasan_atomics+0x10/0x10
[   24.520531]  ? __pfx_read_tsc+0x10/0x10
[   24.520604]  ? ktime_get_ts64+0x86/0x230
[   24.520692]  kunit_try_run_case+0x1a5/0x480
[   24.520784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.520861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.520935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.521016]  ? __kthread_parkme+0x82/0x180
[   24.521091]  ? preempt_count_sub+0x50/0x80
[   24.521174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.521263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.521345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.521468]  kthread+0x337/0x6f0
[   24.521563]  ? trace_preempt_on+0x20/0xc0
[   24.521657]  ? __pfx_kthread+0x10/0x10
[   24.521734]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.521812]  ? calculate_sigpending+0x7b/0xa0
[   24.521886]  ? __pfx_kthread+0x10/0x10
[   24.521952]  ret_from_fork+0x41/0x80
[   24.521986]  ? __pfx_kthread+0x10/0x10
[   24.522020]  ret_from_fork_asm+0x1a/0x30
[   24.522065]  </TASK>
[   24.522081] 
[   24.536400] Allocated by task 285:
[   24.536816]  kasan_save_stack+0x45/0x70
[   24.537308]  kasan_save_track+0x18/0x40
[   24.537814]  kasan_save_alloc_info+0x3b/0x50
[   24.538228]  __kasan_kmalloc+0xb7/0xc0
[   24.538684]  __kmalloc_cache_noprof+0x189/0x420
[   24.539040]  kasan_atomics+0x95/0x310
[   24.539353]  kunit_try_run_case+0x1a5/0x480
[   24.539887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.540468]  kthread+0x337/0x6f0
[   24.540870]  ret_from_fork+0x41/0x80
[   24.541196]  ret_from_fork_asm+0x1a/0x30
[   24.541607] 
[   24.541845] The buggy address belongs to the object at ffff888102983600
[   24.541845]  which belongs to the cache kmalloc-64 of size 64
[   24.542856] The buggy address is located 0 bytes to the right of
[   24.542856]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.543749] 
[   24.543987] The buggy address belongs to the physical page:
[   24.544546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.545194] flags: 0x200000000000000(node=0|zone=2)
[   24.545631] page_type: f5(slab)
[   24.546002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.546717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.547336] page dumped because: kasan: bad access detected
[   24.547763] 
[   24.547995] Memory state around the buggy address:
[   24.550544]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.551204]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.551749] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.552189]                                      ^
[   24.553063]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.554135]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.554738] ==================================================================
[   24.199572] ==================================================================
[   24.200912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   24.201473] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.203366] 
[   24.203929] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.204350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.204389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.204448] Call Trace:
[   24.204515]  <TASK>
[   24.204641]  dump_stack_lvl+0x73/0xb0
[   24.204731]  print_report+0xd1/0x650
[   24.204799]  ? __virt_addr_valid+0x1db/0x2d0
[   24.204866]  ? kasan_atomics_helper+0x177f/0x5450
[   24.204922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.204981]  ? kasan_atomics_helper+0x177f/0x5450
[   24.205042]  kasan_report+0x141/0x180
[   24.205751]  ? kasan_atomics_helper+0x177f/0x5450
[   24.205846]  kasan_check_range+0x10c/0x1c0
[   24.205933]  __kasan_check_write+0x18/0x20
[   24.206002]  kasan_atomics_helper+0x177f/0x5450
[   24.206079]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.206141]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.206200]  ? kasan_atomics+0x152/0x310
[   24.206261]  kasan_atomics+0x1dc/0x310
[   24.206310]  ? __pfx_kasan_atomics+0x10/0x10
[   24.206371]  ? __pfx_read_tsc+0x10/0x10
[   24.206506]  ? ktime_get_ts64+0x86/0x230
[   24.206590]  kunit_try_run_case+0x1a5/0x480
[   24.206654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.206706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.206762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.206820]  ? __kthread_parkme+0x82/0x180
[   24.206874]  ? preempt_count_sub+0x50/0x80
[   24.206934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.206991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.207046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.207104]  kthread+0x337/0x6f0
[   24.207156]  ? trace_preempt_on+0x20/0xc0
[   24.207210]  ? __pfx_kthread+0x10/0x10
[   24.207263]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.207316]  ? calculate_sigpending+0x7b/0xa0
[   24.207368]  ? __pfx_kthread+0x10/0x10
[   24.207551]  ret_from_fork+0x41/0x80
[   24.207613]  ? __pfx_kthread+0x10/0x10
[   24.207650]  ret_from_fork_asm+0x1a/0x30
[   24.207696]  </TASK>
[   24.207712] 
[   24.226500] Allocated by task 285:
[   24.227252]  kasan_save_stack+0x45/0x70
[   24.228103]  kasan_save_track+0x18/0x40
[   24.228686]  kasan_save_alloc_info+0x3b/0x50
[   24.229098]  __kasan_kmalloc+0xb7/0xc0
[   24.229499]  __kmalloc_cache_noprof+0x189/0x420
[   24.230059]  kasan_atomics+0x95/0x310
[   24.230430]  kunit_try_run_case+0x1a5/0x480
[   24.230859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.231293]  kthread+0x337/0x6f0
[   24.231669]  ret_from_fork+0x41/0x80
[   24.231977]  ret_from_fork_asm+0x1a/0x30
[   24.232384] 
[   24.232863] The buggy address belongs to the object at ffff888102983600
[   24.232863]  which belongs to the cache kmalloc-64 of size 64
[   24.234180] The buggy address is located 0 bytes to the right of
[   24.234180]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.236254] 
[   24.236520] The buggy address belongs to the physical page:
[   24.237111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.238303] flags: 0x200000000000000(node=0|zone=2)
[   24.238906] page_type: f5(slab)
[   24.239299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.240247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.240995] page dumped because: kasan: bad access detected
[   24.241446] 
[   24.242057] Memory state around the buggy address:
[   24.242389]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.243151]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.244001] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.244882]                                      ^
[   24.245260]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.245798]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.246247] ==================================================================
[   23.014052] ==================================================================
[   23.014585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   23.015058] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.015333] 
[   23.015439] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.015588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.015629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.015678] Call Trace:
[   23.015710]  <TASK>
[   23.015747]  dump_stack_lvl+0x73/0xb0
[   23.015817]  print_report+0xd1/0x650
[   23.015884]  ? __virt_addr_valid+0x1db/0x2d0
[   23.015956]  ? kasan_atomics_helper+0xac7/0x5450
[   23.016028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.016109]  ? kasan_atomics_helper+0xac7/0x5450
[   23.016188]  kasan_report+0x141/0x180
[   23.016267]  ? kasan_atomics_helper+0xac7/0x5450
[   23.016360]  kasan_check_range+0x10c/0x1c0
[   23.016406]  __kasan_check_write+0x18/0x20
[   23.016555]  kasan_atomics_helper+0xac7/0x5450
[   23.016650]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.016834]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.016927]  ? kasan_atomics+0x152/0x310
[   23.017011]  kasan_atomics+0x1dc/0x310
[   23.017083]  ? __pfx_kasan_atomics+0x10/0x10
[   23.017156]  ? __pfx_read_tsc+0x10/0x10
[   23.017224]  ? ktime_get_ts64+0x86/0x230
[   23.017308]  kunit_try_run_case+0x1a5/0x480
[   23.017390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.017464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.017566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.017650]  ? __kthread_parkme+0x82/0x180
[   23.017705]  ? preempt_count_sub+0x50/0x80
[   23.017747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.017787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.017821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.017855]  kthread+0x337/0x6f0
[   23.017886]  ? trace_preempt_on+0x20/0xc0
[   23.017919]  ? __pfx_kthread+0x10/0x10
[   23.017951]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.017986]  ? calculate_sigpending+0x7b/0xa0
[   23.018018]  ? __pfx_kthread+0x10/0x10
[   23.018051]  ret_from_fork+0x41/0x80
[   23.018083]  ? __pfx_kthread+0x10/0x10
[   23.018116]  ret_from_fork_asm+0x1a/0x30
[   23.018163]  </TASK>
[   23.018177] 
[   23.036581] Allocated by task 285:
[   23.037052]  kasan_save_stack+0x45/0x70
[   23.037582]  kasan_save_track+0x18/0x40
[   23.038101]  kasan_save_alloc_info+0x3b/0x50
[   23.038565]  __kasan_kmalloc+0xb7/0xc0
[   23.038884]  __kmalloc_cache_noprof+0x189/0x420
[   23.039606]  kasan_atomics+0x95/0x310
[   23.040057]  kunit_try_run_case+0x1a5/0x480
[   23.040674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.041324]  kthread+0x337/0x6f0
[   23.041806]  ret_from_fork+0x41/0x80
[   23.042330]  ret_from_fork_asm+0x1a/0x30
[   23.042831] 
[   23.043076] The buggy address belongs to the object at ffff888102983600
[   23.043076]  which belongs to the cache kmalloc-64 of size 64
[   23.044120] The buggy address is located 0 bytes to the right of
[   23.044120]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.045356] 
[   23.045657] The buggy address belongs to the physical page:
[   23.046203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.047088] flags: 0x200000000000000(node=0|zone=2)
[   23.047778] page_type: f5(slab)
[   23.048224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.048987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.049782] page dumped because: kasan: bad access detected
[   23.050322] 
[   23.050597] Memory state around the buggy address:
[   23.051214]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.051998]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.052825] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.053326]                                      ^
[   23.054272]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.054976]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.055827] ==================================================================
[   22.456788] ==================================================================
[   22.458132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   22.458938] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.459671] 
[   22.459982] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.460158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.460203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.460262] Call Trace:
[   22.460317]  <TASK>
[   22.460375]  dump_stack_lvl+0x73/0xb0
[   22.460662]  print_report+0xd1/0x650
[   22.460749]  ? __virt_addr_valid+0x1db/0x2d0
[   22.460795]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.460828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.460864]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.460897]  kasan_report+0x141/0x180
[   22.460931]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.460971]  kasan_check_range+0x10c/0x1c0
[   22.461008]  __kasan_check_write+0x18/0x20
[   22.461036]  kasan_atomics_helper+0x4a0/0x5450
[   22.461071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.461106]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.461140]  ? kasan_atomics+0x152/0x310
[   22.461171]  kasan_atomics+0x1dc/0x310
[   22.461198]  ? __pfx_kasan_atomics+0x10/0x10
[   22.461228]  ? __pfx_read_tsc+0x10/0x10
[   22.461257]  ? ktime_get_ts64+0x86/0x230
[   22.461309]  kunit_try_run_case+0x1a5/0x480
[   22.461375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.461412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.461593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.461671]  ? __kthread_parkme+0x82/0x180
[   22.461742]  ? preempt_count_sub+0x50/0x80
[   22.461814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.461879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.461959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.462006]  kthread+0x337/0x6f0
[   22.462038]  ? trace_preempt_on+0x20/0xc0
[   22.462073]  ? __pfx_kthread+0x10/0x10
[   22.462105]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.462136]  ? calculate_sigpending+0x7b/0xa0
[   22.462167]  ? __pfx_kthread+0x10/0x10
[   22.462199]  ret_from_fork+0x41/0x80
[   22.462230]  ? __pfx_kthread+0x10/0x10
[   22.462262]  ret_from_fork_asm+0x1a/0x30
[   22.462305]  </TASK>
[   22.462319] 
[   22.479936] Allocated by task 285:
[   22.480381]  kasan_save_stack+0x45/0x70
[   22.480870]  kasan_save_track+0x18/0x40
[   22.481279]  kasan_save_alloc_info+0x3b/0x50
[   22.482272]  __kasan_kmalloc+0xb7/0xc0
[   22.482863]  __kmalloc_cache_noprof+0x189/0x420
[   22.483363]  kasan_atomics+0x95/0x310
[   22.483889]  kunit_try_run_case+0x1a5/0x480
[   22.484323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.485011]  kthread+0x337/0x6f0
[   22.485305]  ret_from_fork+0x41/0x80
[   22.486169]  ret_from_fork_asm+0x1a/0x30
[   22.486812] 
[   22.487055] The buggy address belongs to the object at ffff888102983600
[   22.487055]  which belongs to the cache kmalloc-64 of size 64
[   22.488185] The buggy address is located 0 bytes to the right of
[   22.488185]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.489313] 
[   22.489641] The buggy address belongs to the physical page:
[   22.490243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.491236] flags: 0x200000000000000(node=0|zone=2)
[   22.491965] page_type: f5(slab)
[   22.492385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.493197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.493861] page dumped because: kasan: bad access detected
[   22.494287] 
[   22.494519] Memory state around the buggy address:
[   22.494927]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.495457]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.496149] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.496847]                                      ^
[   22.497348]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.498306]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.499000] ==================================================================
[   23.412213] ==================================================================
[   23.413142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   23.413891] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.414548] 
[   23.414860] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.414993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.415034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.415113] Call Trace:
[   23.415196]  <TASK>
[   23.415249]  dump_stack_lvl+0x73/0xb0
[   23.415315]  print_report+0xd1/0x650
[   23.415352]  ? __virt_addr_valid+0x1db/0x2d0
[   23.415387]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.415515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.415619]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.415730]  kasan_report+0x141/0x180
[   23.415814]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.415908]  __asan_report_load4_noabort+0x18/0x20
[   23.416011]  kasan_atomics_helper+0x4a36/0x5450
[   23.416124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.416171]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.416208]  ? kasan_atomics+0x152/0x310
[   23.416243]  kasan_atomics+0x1dc/0x310
[   23.416272]  ? __pfx_kasan_atomics+0x10/0x10
[   23.416305]  ? __pfx_read_tsc+0x10/0x10
[   23.416336]  ? ktime_get_ts64+0x86/0x230
[   23.416377]  kunit_try_run_case+0x1a5/0x480
[   23.416466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.416533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.416573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.416610]  ? __kthread_parkme+0x82/0x180
[   23.416644]  ? preempt_count_sub+0x50/0x80
[   23.416680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.416715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.416749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.416786]  kthread+0x337/0x6f0
[   23.416818]  ? trace_preempt_on+0x20/0xc0
[   23.416854]  ? __pfx_kthread+0x10/0x10
[   23.416889]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.416923]  ? calculate_sigpending+0x7b/0xa0
[   23.416956]  ? __pfx_kthread+0x10/0x10
[   23.416988]  ret_from_fork+0x41/0x80
[   23.417019]  ? __pfx_kthread+0x10/0x10
[   23.417051]  ret_from_fork_asm+0x1a/0x30
[   23.417096]  </TASK>
[   23.417111] 
[   23.432006] Allocated by task 285:
[   23.432505]  kasan_save_stack+0x45/0x70
[   23.433055]  kasan_save_track+0x18/0x40
[   23.433676]  kasan_save_alloc_info+0x3b/0x50
[   23.434227]  __kasan_kmalloc+0xb7/0xc0
[   23.434706]  __kmalloc_cache_noprof+0x189/0x420
[   23.435070]  kasan_atomics+0x95/0x310
[   23.435375]  kunit_try_run_case+0x1a5/0x480
[   23.435974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.436605]  kthread+0x337/0x6f0
[   23.437004]  ret_from_fork+0x41/0x80
[   23.437539]  ret_from_fork_asm+0x1a/0x30
[   23.438023] 
[   23.438313] The buggy address belongs to the object at ffff888102983600
[   23.438313]  which belongs to the cache kmalloc-64 of size 64
[   23.439289] The buggy address is located 0 bytes to the right of
[   23.439289]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.440128] 
[   23.440445] The buggy address belongs to the physical page:
[   23.441036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.441758] flags: 0x200000000000000(node=0|zone=2)
[   23.442258] page_type: f5(slab)
[   23.443776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.444364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.445459] page dumped because: kasan: bad access detected
[   23.445858] 
[   23.446097] Memory state around the buggy address:
[   23.446756]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.447297]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.448362] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.449217]                                      ^
[   23.449741]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.450663]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.451169] ==================================================================
[   23.452685] ==================================================================
[   23.453882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   23.455020] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.456351] 
[   23.456889] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.457084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.457124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.457182] Call Trace:
[   23.457234]  <TASK>
[   23.457282]  dump_stack_lvl+0x73/0xb0
[   23.457326]  print_report+0xd1/0x650
[   23.457360]  ? __virt_addr_valid+0x1db/0x2d0
[   23.457393]  ? kasan_atomics_helper+0x1079/0x5450
[   23.457495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.457543]  ? kasan_atomics_helper+0x1079/0x5450
[   23.457590]  kasan_report+0x141/0x180
[   23.457624]  ? kasan_atomics_helper+0x1079/0x5450
[   23.457663]  kasan_check_range+0x10c/0x1c0
[   23.457698]  __kasan_check_write+0x18/0x20
[   23.457727]  kasan_atomics_helper+0x1079/0x5450
[   23.457760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.457794]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.457828]  ? kasan_atomics+0x152/0x310
[   23.457861]  kasan_atomics+0x1dc/0x310
[   23.457890]  ? __pfx_kasan_atomics+0x10/0x10
[   23.457920]  ? __pfx_read_tsc+0x10/0x10
[   23.457949]  ? ktime_get_ts64+0x86/0x230
[   23.457986]  kunit_try_run_case+0x1a5/0x480
[   23.458019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.458052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.458087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.458121]  ? __kthread_parkme+0x82/0x180
[   23.458152]  ? preempt_count_sub+0x50/0x80
[   23.458187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.458221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.458253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.458285]  kthread+0x337/0x6f0
[   23.458316]  ? trace_preempt_on+0x20/0xc0
[   23.458349]  ? __pfx_kthread+0x10/0x10
[   23.458380]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.458421]  ? calculate_sigpending+0x7b/0xa0
[   23.458508]  ? __pfx_kthread+0x10/0x10
[   23.458548]  ret_from_fork+0x41/0x80
[   23.458580]  ? __pfx_kthread+0x10/0x10
[   23.458612]  ret_from_fork_asm+0x1a/0x30
[   23.458657]  </TASK>
[   23.458672] 
[   23.475135] Allocated by task 285:
[   23.475722]  kasan_save_stack+0x45/0x70
[   23.476137]  kasan_save_track+0x18/0x40
[   23.476625]  kasan_save_alloc_info+0x3b/0x50
[   23.477137]  __kasan_kmalloc+0xb7/0xc0
[   23.477727]  __kmalloc_cache_noprof+0x189/0x420
[   23.478072]  kasan_atomics+0x95/0x310
[   23.478406]  kunit_try_run_case+0x1a5/0x480
[   23.479092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.479472]  kthread+0x337/0x6f0
[   23.479774]  ret_from_fork+0x41/0x80
[   23.480297]  ret_from_fork_asm+0x1a/0x30
[   23.481041] 
[   23.481338] The buggy address belongs to the object at ffff888102983600
[   23.481338]  which belongs to the cache kmalloc-64 of size 64
[   23.482339] The buggy address is located 0 bytes to the right of
[   23.482339]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.485568] 
[   23.485822] The buggy address belongs to the physical page:
[   23.486397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.487063] flags: 0x200000000000000(node=0|zone=2)
[   23.487648] page_type: f5(slab)
[   23.488008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.488682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.489280] page dumped because: kasan: bad access detected
[   23.489947] 
[   23.490161] Memory state around the buggy address:
[   23.490726]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491353]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.492155] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.492806]                                      ^
[   23.493234]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493924]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.494386] ==================================================================
[   23.544350] ==================================================================
[   23.544990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   23.545865] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.546887] 
[   23.547335] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.547728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.547753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.547784] Call Trace:
[   23.547808]  <TASK>
[   23.547834]  dump_stack_lvl+0x73/0xb0
[   23.547875]  print_report+0xd1/0x650
[   23.547910]  ? __virt_addr_valid+0x1db/0x2d0
[   23.547942]  ? kasan_atomics_helper+0x1148/0x5450
[   23.547975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.548009]  ? kasan_atomics_helper+0x1148/0x5450
[   23.548041]  kasan_report+0x141/0x180
[   23.548076]  ? kasan_atomics_helper+0x1148/0x5450
[   23.548115]  kasan_check_range+0x10c/0x1c0
[   23.548151]  __kasan_check_write+0x18/0x20
[   23.548181]  kasan_atomics_helper+0x1148/0x5450
[   23.548216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.548250]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.548283]  ? kasan_atomics+0x152/0x310
[   23.548315]  kasan_atomics+0x1dc/0x310
[   23.548342]  ? __pfx_kasan_atomics+0x10/0x10
[   23.548372]  ? __pfx_read_tsc+0x10/0x10
[   23.548400]  ? ktime_get_ts64+0x86/0x230
[   23.548472]  kunit_try_run_case+0x1a5/0x480
[   23.548534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.548570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.548606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.548642]  ? __kthread_parkme+0x82/0x180
[   23.548675]  ? preempt_count_sub+0x50/0x80
[   23.548711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.548746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.548779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.548812]  kthread+0x337/0x6f0
[   23.548844]  ? trace_preempt_on+0x20/0xc0
[   23.548878]  ? __pfx_kthread+0x10/0x10
[   23.548912]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.548946]  ? calculate_sigpending+0x7b/0xa0
[   23.548979]  ? __pfx_kthread+0x10/0x10
[   23.549013]  ret_from_fork+0x41/0x80
[   23.549045]  ? __pfx_kthread+0x10/0x10
[   23.549078]  ret_from_fork_asm+0x1a/0x30
[   23.549123]  </TASK>
[   23.549138] 
[   23.570058] Allocated by task 285:
[   23.570499]  kasan_save_stack+0x45/0x70
[   23.570909]  kasan_save_track+0x18/0x40
[   23.571290]  kasan_save_alloc_info+0x3b/0x50
[   23.572230]  __kasan_kmalloc+0xb7/0xc0
[   23.572735]  __kmalloc_cache_noprof+0x189/0x420
[   23.573416]  kasan_atomics+0x95/0x310
[   23.573915]  kunit_try_run_case+0x1a5/0x480
[   23.574306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.575116]  kthread+0x337/0x6f0
[   23.575788]  ret_from_fork+0x41/0x80
[   23.576151]  ret_from_fork_asm+0x1a/0x30
[   23.576810] 
[   23.577066] The buggy address belongs to the object at ffff888102983600
[   23.577066]  which belongs to the cache kmalloc-64 of size 64
[   23.578536] The buggy address is located 0 bytes to the right of
[   23.578536]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.579868] 
[   23.580318] The buggy address belongs to the physical page:
[   23.580986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.581873] flags: 0x200000000000000(node=0|zone=2)
[   23.582311] page_type: f5(slab)
[   23.582965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.583787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.584376] page dumped because: kasan: bad access detected
[   23.585117] 
[   23.585359] Memory state around the buggy address:
[   23.586096]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.586855]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.587105] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.587336]                                      ^
[   23.587674]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.588471]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.589643] ==================================================================
[   24.338908] ==================================================================
[   24.339750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   24.340446] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.341297] 
[   24.341529] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.341675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.341723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.341787] Call Trace:
[   24.341843]  <TASK>
[   24.341898]  dump_stack_lvl+0x73/0xb0
[   24.341985]  print_report+0xd1/0x650
[   24.342064]  ? __virt_addr_valid+0x1db/0x2d0
[   24.342142]  ? kasan_atomics_helper+0x194a/0x5450
[   24.342222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.342303]  ? kasan_atomics_helper+0x194a/0x5450
[   24.342383]  kasan_report+0x141/0x180
[   24.342532]  ? kasan_atomics_helper+0x194a/0x5450
[   24.342635]  kasan_check_range+0x10c/0x1c0
[   24.342725]  __kasan_check_write+0x18/0x20
[   24.342796]  kasan_atomics_helper+0x194a/0x5450
[   24.342878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.342957]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.343035]  ? kasan_atomics+0x152/0x310
[   24.343116]  kasan_atomics+0x1dc/0x310
[   24.343187]  ? __pfx_kasan_atomics+0x10/0x10
[   24.343259]  ? __pfx_read_tsc+0x10/0x10
[   24.343315]  ? ktime_get_ts64+0x86/0x230
[   24.343357]  kunit_try_run_case+0x1a5/0x480
[   24.343395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.343492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.343542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.343581]  ? __kthread_parkme+0x82/0x180
[   24.343617]  ? preempt_count_sub+0x50/0x80
[   24.343654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.343690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.343725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.343759]  kthread+0x337/0x6f0
[   24.343789]  ? trace_preempt_on+0x20/0xc0
[   24.343824]  ? __pfx_kthread+0x10/0x10
[   24.343858]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.343892]  ? calculate_sigpending+0x7b/0xa0
[   24.343924]  ? __pfx_kthread+0x10/0x10
[   24.343957]  ret_from_fork+0x41/0x80
[   24.343988]  ? __pfx_kthread+0x10/0x10
[   24.344021]  ret_from_fork_asm+0x1a/0x30
[   24.344067]  </TASK>
[   24.344081] 
[   24.359498] Allocated by task 285:
[   24.359926]  kasan_save_stack+0x45/0x70
[   24.360374]  kasan_save_track+0x18/0x40
[   24.360789]  kasan_save_alloc_info+0x3b/0x50
[   24.361122]  __kasan_kmalloc+0xb7/0xc0
[   24.361430]  __kmalloc_cache_noprof+0x189/0x420
[   24.361901]  kasan_atomics+0x95/0x310
[   24.362594]  kunit_try_run_case+0x1a5/0x480
[   24.363074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.363715]  kthread+0x337/0x6f0
[   24.364014]  ret_from_fork+0x41/0x80
[   24.364415]  ret_from_fork_asm+0x1a/0x30
[   24.364842] 
[   24.365032] The buggy address belongs to the object at ffff888102983600
[   24.365032]  which belongs to the cache kmalloc-64 of size 64
[   24.365913] The buggy address is located 0 bytes to the right of
[   24.365913]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.366785] 
[   24.367047] The buggy address belongs to the physical page:
[   24.367623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.368121] flags: 0x200000000000000(node=0|zone=2)
[   24.369562] page_type: f5(slab)
[   24.370860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.371613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.372279] page dumped because: kasan: bad access detected
[   24.373693] 
[   24.374304] Memory state around the buggy address:
[   24.375032]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.376054]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.376798] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.377415]                                      ^
[   24.377888]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.378712]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379328] ==================================================================
[   22.758684] ==================================================================
[   22.760235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   22.761080] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.762056] 
[   22.762248] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.762323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.762343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.762376] Call Trace:
[   22.762408]  <TASK>
[   22.762447]  dump_stack_lvl+0x73/0xb0
[   22.762556]  print_report+0xd1/0x650
[   22.762637]  ? __virt_addr_valid+0x1db/0x2d0
[   22.762719]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.762795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.762877]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.762956]  kasan_report+0x141/0x180
[   22.763039]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.763110]  kasan_check_range+0x10c/0x1c0
[   22.763153]  __kasan_check_write+0x18/0x20
[   22.763184]  kasan_atomics_helper+0x7c7/0x5450
[   22.763247]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.763303]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.763341]  ? kasan_atomics+0x152/0x310
[   22.763374]  kasan_atomics+0x1dc/0x310
[   22.763403]  ? __pfx_kasan_atomics+0x10/0x10
[   22.763642]  ? __pfx_read_tsc+0x10/0x10
[   22.763731]  ? ktime_get_ts64+0x86/0x230
[   22.763817]  kunit_try_run_case+0x1a5/0x480
[   22.763894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.763964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.764032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.764112]  ? __kthread_parkme+0x82/0x180
[   22.764186]  ? preempt_count_sub+0x50/0x80
[   22.764244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.764282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.764314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.764347]  kthread+0x337/0x6f0
[   22.764378]  ? trace_preempt_on+0x20/0xc0
[   22.764435]  ? __pfx_kthread+0x10/0x10
[   22.764555]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.764620]  ? calculate_sigpending+0x7b/0xa0
[   22.764655]  ? __pfx_kthread+0x10/0x10
[   22.764688]  ret_from_fork+0x41/0x80
[   22.764721]  ? __pfx_kthread+0x10/0x10
[   22.764754]  ret_from_fork_asm+0x1a/0x30
[   22.764798]  </TASK>
[   22.764814] 
[   22.788196] Allocated by task 285:
[   22.788595]  kasan_save_stack+0x45/0x70
[   22.788978]  kasan_save_track+0x18/0x40
[   22.789282]  kasan_save_alloc_info+0x3b/0x50
[   22.790747]  __kasan_kmalloc+0xb7/0xc0
[   22.791077]  __kmalloc_cache_noprof+0x189/0x420
[   22.791519]  kasan_atomics+0x95/0x310
[   22.792309]  kunit_try_run_case+0x1a5/0x480
[   22.792749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.794240]  kthread+0x337/0x6f0
[   22.794514]  ret_from_fork+0x41/0x80
[   22.795291]  ret_from_fork_asm+0x1a/0x30
[   22.796128] 
[   22.796372] The buggy address belongs to the object at ffff888102983600
[   22.796372]  which belongs to the cache kmalloc-64 of size 64
[   22.797679] The buggy address is located 0 bytes to the right of
[   22.797679]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.799337] 
[   22.799527] The buggy address belongs to the physical page:
[   22.800417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.800958] flags: 0x200000000000000(node=0|zone=2)
[   22.801680] page_type: f5(slab)
[   22.801959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.803296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.804086] page dumped because: kasan: bad access detected
[   22.804593] 
[   22.804801] Memory state around the buggy address:
[   22.805243]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.806281]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.807159] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.808252]                                      ^
[   22.809047]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.809891]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.810687] ==================================================================
[   22.207281] ==================================================================
[   22.208278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   22.209237] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.210396] 
[   22.210854] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.210921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.210940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.210967] Call Trace:
[   22.210986]  <TASK>
[   22.211006]  dump_stack_lvl+0x73/0xb0
[   22.211045]  print_report+0xd1/0x650
[   22.211076]  ? __virt_addr_valid+0x1db/0x2d0
[   22.211106]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.211273]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.211400]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.211507]  kasan_report+0x141/0x180
[   22.211586]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.211731]  __asan_report_store4_noabort+0x1b/0x30
[   22.211807]  kasan_atomics_helper+0x4ba2/0x5450
[   22.211885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.211963]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.212042]  ? kasan_atomics+0x152/0x310
[   22.212081]  kasan_atomics+0x1dc/0x310
[   22.212109]  ? __pfx_kasan_atomics+0x10/0x10
[   22.212137]  ? __pfx_read_tsc+0x10/0x10
[   22.212165]  ? ktime_get_ts64+0x86/0x230
[   22.212202]  kunit_try_run_case+0x1a5/0x480
[   22.212236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.212266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.212301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.212334]  ? __kthread_parkme+0x82/0x180
[   22.212364]  ? preempt_count_sub+0x50/0x80
[   22.212398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.212578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.212646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.212716]  kthread+0x337/0x6f0
[   22.212779]  ? trace_preempt_on+0x20/0xc0
[   22.212848]  ? __pfx_kthread+0x10/0x10
[   22.212905]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.212938]  ? calculate_sigpending+0x7b/0xa0
[   22.212968]  ? __pfx_kthread+0x10/0x10
[   22.213000]  ret_from_fork+0x41/0x80
[   22.213029]  ? __pfx_kthread+0x10/0x10
[   22.213060]  ret_from_fork_asm+0x1a/0x30
[   22.213103]  </TASK>
[   22.213116] 
[   22.237254] Allocated by task 285:
[   22.237621]  kasan_save_stack+0x45/0x70
[   22.238046]  kasan_save_track+0x18/0x40
[   22.238956]  kasan_save_alloc_info+0x3b/0x50
[   22.239306]  __kasan_kmalloc+0xb7/0xc0
[   22.239794]  __kmalloc_cache_noprof+0x189/0x420
[   22.240156]  kasan_atomics+0x95/0x310
[   22.240473]  kunit_try_run_case+0x1a5/0x480
[   22.240846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.241234]  kthread+0x337/0x6f0
[   22.242975]  ret_from_fork+0x41/0x80
[   22.243276]  ret_from_fork_asm+0x1a/0x30
[   22.244251] 
[   22.245089] The buggy address belongs to the object at ffff888102983600
[   22.245089]  which belongs to the cache kmalloc-64 of size 64
[   22.246032] The buggy address is located 0 bytes to the right of
[   22.246032]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.247993] 
[   22.248172] The buggy address belongs to the physical page:
[   22.249148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.249762] flags: 0x200000000000000(node=0|zone=2)
[   22.250403] page_type: f5(slab)
[   22.250826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.251368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.251954] page dumped because: kasan: bad access detected
[   22.252320] 
[   22.252671] Memory state around the buggy address:
[   22.253302]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.254753]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.255003] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.255230]                                      ^
[   22.255398]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.256975]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.257558] ==================================================================
[   23.189299] ==================================================================
[   23.191347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   23.192349] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.193161] 
[   23.193444] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.193587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.193609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.193641] Call Trace:
[   23.193668]  <TASK>
[   23.193701]  dump_stack_lvl+0x73/0xb0
[   23.193775]  print_report+0xd1/0x650
[   23.193812]  ? __virt_addr_valid+0x1db/0x2d0
[   23.193846]  ? kasan_atomics_helper+0xd47/0x5450
[   23.193878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.193913]  ? kasan_atomics_helper+0xd47/0x5450
[   23.193946]  kasan_report+0x141/0x180
[   23.193979]  ? kasan_atomics_helper+0xd47/0x5450
[   23.194018]  kasan_check_range+0x10c/0x1c0
[   23.194055]  __kasan_check_write+0x18/0x20
[   23.194086]  kasan_atomics_helper+0xd47/0x5450
[   23.194122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.194158]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.194191]  ? kasan_atomics+0x152/0x310
[   23.194224]  kasan_atomics+0x1dc/0x310
[   23.194253]  ? __pfx_kasan_atomics+0x10/0x10
[   23.194283]  ? __pfx_read_tsc+0x10/0x10
[   23.194312]  ? ktime_get_ts64+0x86/0x230
[   23.194350]  kunit_try_run_case+0x1a5/0x480
[   23.194386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.194436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.194644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.194728]  ? __kthread_parkme+0x82/0x180
[   23.194803]  ? preempt_count_sub+0x50/0x80
[   23.194884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.194963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.195002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.195039]  kthread+0x337/0x6f0
[   23.195072]  ? trace_preempt_on+0x20/0xc0
[   23.195106]  ? __pfx_kthread+0x10/0x10
[   23.195139]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.195171]  ? calculate_sigpending+0x7b/0xa0
[   23.195202]  ? __pfx_kthread+0x10/0x10
[   23.195233]  ret_from_fork+0x41/0x80
[   23.195263]  ? __pfx_kthread+0x10/0x10
[   23.195294]  ret_from_fork_asm+0x1a/0x30
[   23.195340]  </TASK>
[   23.195355] 
[   23.214035] Allocated by task 285:
[   23.214555]  kasan_save_stack+0x45/0x70
[   23.214925]  kasan_save_track+0x18/0x40
[   23.215240]  kasan_save_alloc_info+0x3b/0x50
[   23.215624]  __kasan_kmalloc+0xb7/0xc0
[   23.215977]  __kmalloc_cache_noprof+0x189/0x420
[   23.216469]  kasan_atomics+0x95/0x310
[   23.216894]  kunit_try_run_case+0x1a5/0x480
[   23.217340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.217929]  kthread+0x337/0x6f0
[   23.218309]  ret_from_fork+0x41/0x80
[   23.218783]  ret_from_fork_asm+0x1a/0x30
[   23.219201] 
[   23.219471] The buggy address belongs to the object at ffff888102983600
[   23.219471]  which belongs to the cache kmalloc-64 of size 64
[   23.220278] The buggy address is located 0 bytes to the right of
[   23.220278]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.221241] 
[   23.221551] The buggy address belongs to the physical page:
[   23.222073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.222849] flags: 0x200000000000000(node=0|zone=2)
[   23.223293] page_type: f5(slab)
[   23.223725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.224344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.225014] page dumped because: kasan: bad access detected
[   23.225504] 
[   23.225747] Memory state around the buggy address:
[   23.226135]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.226696]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.227322] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.228003]                                      ^
[   23.228543]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.229108]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.229667] ==================================================================
[   25.043079] ==================================================================
[   25.043819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   25.045097] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   25.045869] 
[   25.045991] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.046055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.046074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.046105] Call Trace:
[   25.046129]  <TASK>
[   25.046154]  dump_stack_lvl+0x73/0xb0
[   25.046193]  print_report+0xd1/0x650
[   25.046228]  ? __virt_addr_valid+0x1db/0x2d0
[   25.046262]  ? kasan_atomics_helper+0x218a/0x5450
[   25.046293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.046327]  ? kasan_atomics_helper+0x218a/0x5450
[   25.046361]  kasan_report+0x141/0x180
[   25.046394]  ? kasan_atomics_helper+0x218a/0x5450
[   25.046517]  kasan_check_range+0x10c/0x1c0
[   25.046692]  __kasan_check_write+0x18/0x20
[   25.046826]  kasan_atomics_helper+0x218a/0x5450
[   25.046929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.047016]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.047099]  ? kasan_atomics+0x152/0x310
[   25.047179]  kasan_atomics+0x1dc/0x310
[   25.047216]  ? __pfx_kasan_atomics+0x10/0x10
[   25.047249]  ? __pfx_read_tsc+0x10/0x10
[   25.047280]  ? ktime_get_ts64+0x86/0x230
[   25.047320]  kunit_try_run_case+0x1a5/0x480
[   25.047357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.047463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.047531]  ? __kthread_parkme+0x82/0x180
[   25.047566]  ? preempt_count_sub+0x50/0x80
[   25.047603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.047674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.047708]  kthread+0x337/0x6f0
[   25.047741]  ? trace_preempt_on+0x20/0xc0
[   25.047776]  ? __pfx_kthread+0x10/0x10
[   25.047809]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.047842]  ? calculate_sigpending+0x7b/0xa0
[   25.047875]  ? __pfx_kthread+0x10/0x10
[   25.047909]  ret_from_fork+0x41/0x80
[   25.047940]  ? __pfx_kthread+0x10/0x10
[   25.047974]  ret_from_fork_asm+0x1a/0x30
[   25.048019]  </TASK>
[   25.048035] 
[   25.063897] Allocated by task 285:
[   25.064399]  kasan_save_stack+0x45/0x70
[   25.064917]  kasan_save_track+0x18/0x40
[   25.065272]  kasan_save_alloc_info+0x3b/0x50
[   25.066105]  __kasan_kmalloc+0xb7/0xc0
[   25.066584]  __kmalloc_cache_noprof+0x189/0x420
[   25.067045]  kasan_atomics+0x95/0x310
[   25.067447]  kunit_try_run_case+0x1a5/0x480
[   25.067971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.068449]  kthread+0x337/0x6f0
[   25.068927]  ret_from_fork+0x41/0x80
[   25.069383]  ret_from_fork_asm+0x1a/0x30
[   25.069796] 
[   25.070069] The buggy address belongs to the object at ffff888102983600
[   25.070069]  which belongs to the cache kmalloc-64 of size 64
[   25.071223] The buggy address is located 0 bytes to the right of
[   25.071223]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   25.072411] 
[   25.072679] The buggy address belongs to the physical page:
[   25.073217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   25.073842] flags: 0x200000000000000(node=0|zone=2)
[   25.074203] page_type: f5(slab)
[   25.074671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.075388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.076116] page dumped because: kasan: bad access detected
[   25.076655] 
[   25.076891] Memory state around the buggy address:
[   25.077311]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.078201]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.078839] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.079471]                                      ^
[   25.079981]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.080661]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.081322] ==================================================================
[   23.782458] ==================================================================
[   23.784146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   23.784786] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.786061] 
[   23.786292] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.786729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.786772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.786806] Call Trace:
[   23.786832]  <TASK>
[   23.786856]  dump_stack_lvl+0x73/0xb0
[   23.786896]  print_report+0xd1/0x650
[   23.786932]  ? __virt_addr_valid+0x1db/0x2d0
[   23.786963]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.786996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.787031]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.787065]  kasan_report+0x141/0x180
[   23.787100]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.787140]  __asan_report_load4_noabort+0x18/0x20
[   23.787170]  kasan_atomics_helper+0x49ce/0x5450
[   23.787204]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.787238]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.787271]  ? kasan_atomics+0x152/0x310
[   23.787304]  kasan_atomics+0x1dc/0x310
[   23.787333]  ? __pfx_kasan_atomics+0x10/0x10
[   23.787364]  ? __pfx_read_tsc+0x10/0x10
[   23.787394]  ? ktime_get_ts64+0x86/0x230
[   23.787476]  kunit_try_run_case+0x1a5/0x480
[   23.787541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.787577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.787614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.787651]  ? __kthread_parkme+0x82/0x180
[   23.787684]  ? preempt_count_sub+0x50/0x80
[   23.787722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.787757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.787789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.787824]  kthread+0x337/0x6f0
[   23.787855]  ? trace_preempt_on+0x20/0xc0
[   23.787890]  ? __pfx_kthread+0x10/0x10
[   23.787924]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.787958]  ? calculate_sigpending+0x7b/0xa0
[   23.787989]  ? __pfx_kthread+0x10/0x10
[   23.788023]  ret_from_fork+0x41/0x80
[   23.788054]  ? __pfx_kthread+0x10/0x10
[   23.788086]  ret_from_fork_asm+0x1a/0x30
[   23.788132]  </TASK>
[   23.788146] 
[   23.808652] Allocated by task 285:
[   23.809203]  kasan_save_stack+0x45/0x70
[   23.809944]  kasan_save_track+0x18/0x40
[   23.810382]  kasan_save_alloc_info+0x3b/0x50
[   23.811263]  __kasan_kmalloc+0xb7/0xc0
[   23.811548]  __kmalloc_cache_noprof+0x189/0x420
[   23.812039]  kasan_atomics+0x95/0x310
[   23.812424]  kunit_try_run_case+0x1a5/0x480
[   23.812866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.813351]  kthread+0x337/0x6f0
[   23.814237]  ret_from_fork+0x41/0x80
[   23.814716]  ret_from_fork_asm+0x1a/0x30
[   23.815313] 
[   23.815724] The buggy address belongs to the object at ffff888102983600
[   23.815724]  which belongs to the cache kmalloc-64 of size 64
[   23.817007] The buggy address is located 0 bytes to the right of
[   23.817007]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.818078] 
[   23.818633] The buggy address belongs to the physical page:
[   23.819120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.820018] flags: 0x200000000000000(node=0|zone=2)
[   23.820447] page_type: f5(slab)
[   23.820822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.821915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.822422] page dumped because: kasan: bad access detected
[   23.823130] 
[   23.823368] Memory state around the buggy address:
[   23.824228]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.825062]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.825608] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.826381]                                      ^
[   23.826869]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.827677]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.828391] ==================================================================
[   22.704156] ==================================================================
[   22.705813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   22.706787] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.707311] 
[   22.708325] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.708398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.708428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.708530] Call Trace:
[   22.708588]  <TASK>
[   22.708616]  dump_stack_lvl+0x73/0xb0
[   22.708657]  print_report+0xd1/0x650
[   22.708693]  ? __virt_addr_valid+0x1db/0x2d0
[   22.708727]  ? kasan_atomics_helper+0x72f/0x5450
[   22.708760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.708796]  ? kasan_atomics_helper+0x72f/0x5450
[   22.708830]  kasan_report+0x141/0x180
[   22.708863]  ? kasan_atomics_helper+0x72f/0x5450
[   22.708903]  kasan_check_range+0x10c/0x1c0
[   22.708941]  __kasan_check_write+0x18/0x20
[   22.708970]  kasan_atomics_helper+0x72f/0x5450
[   22.709004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.709040]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.709073]  ? kasan_atomics+0x152/0x310
[   22.709105]  kasan_atomics+0x1dc/0x310
[   22.709132]  ? __pfx_kasan_atomics+0x10/0x10
[   22.709163]  ? __pfx_read_tsc+0x10/0x10
[   22.709193]  ? ktime_get_ts64+0x86/0x230
[   22.709232]  kunit_try_run_case+0x1a5/0x480
[   22.709267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.709301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.709338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.709375]  ? __kthread_parkme+0x82/0x180
[   22.709408]  ? preempt_count_sub+0x50/0x80
[   22.709522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.709596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.709633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.709667]  kthread+0x337/0x6f0
[   22.709699]  ? trace_preempt_on+0x20/0xc0
[   22.709733]  ? __pfx_kthread+0x10/0x10
[   22.709766]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.709799]  ? calculate_sigpending+0x7b/0xa0
[   22.709830]  ? __pfx_kthread+0x10/0x10
[   22.709863]  ret_from_fork+0x41/0x80
[   22.709896]  ? __pfx_kthread+0x10/0x10
[   22.709928]  ret_from_fork_asm+0x1a/0x30
[   22.709974]  </TASK>
[   22.709990] 
[   22.732794] Allocated by task 285:
[   22.733212]  kasan_save_stack+0x45/0x70
[   22.734237]  kasan_save_track+0x18/0x40
[   22.734614]  kasan_save_alloc_info+0x3b/0x50
[   22.735756]  __kasan_kmalloc+0xb7/0xc0
[   22.736344]  __kmalloc_cache_noprof+0x189/0x420
[   22.736774]  kasan_atomics+0x95/0x310
[   22.737536]  kunit_try_run_case+0x1a5/0x480
[   22.738107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.738607]  kthread+0x337/0x6f0
[   22.739138]  ret_from_fork+0x41/0x80
[   22.739757]  ret_from_fork_asm+0x1a/0x30
[   22.740180] 
[   22.740405] The buggy address belongs to the object at ffff888102983600
[   22.740405]  which belongs to the cache kmalloc-64 of size 64
[   22.742328] The buggy address is located 0 bytes to the right of
[   22.742328]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.743970] 
[   22.744136] The buggy address belongs to the physical page:
[   22.745700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.746284] flags: 0x200000000000000(node=0|zone=2)
[   22.746864] page_type: f5(slab)
[   22.747147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.748211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.749339] page dumped because: kasan: bad access detected
[   22.750885] 
[   22.751233] Memory state around the buggy address:
[   22.752089]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.752970]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.754014] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.754744]                                      ^
[   22.755059]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756496]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756999] ==================================================================
[   24.638047] ==================================================================
[   24.638690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   24.639223] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.640331] 
[   24.640683] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.640859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.640901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.640960] Call Trace:
[   24.641034]  <TASK>
[   24.641116]  dump_stack_lvl+0x73/0xb0
[   24.641204]  print_report+0xd1/0x650
[   24.641284]  ? __virt_addr_valid+0x1db/0x2d0
[   24.641365]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.641587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.641703]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.641782]  kasan_report+0x141/0x180
[   24.641863]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.642038]  kasan_check_range+0x10c/0x1c0
[   24.642131]  __kasan_check_write+0x18/0x20
[   24.642241]  kasan_atomics_helper+0x1d7a/0x5450
[   24.642375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.642565]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.642706]  ? kasan_atomics+0x152/0x310
[   24.642799]  kasan_atomics+0x1dc/0x310
[   24.642838]  ? __pfx_kasan_atomics+0x10/0x10
[   24.642871]  ? __pfx_read_tsc+0x10/0x10
[   24.642900]  ? ktime_get_ts64+0x86/0x230
[   24.642939]  kunit_try_run_case+0x1a5/0x480
[   24.642974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.643007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.643040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.643074]  ? __kthread_parkme+0x82/0x180
[   24.643105]  ? preempt_count_sub+0x50/0x80
[   24.643139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.643173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.643205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.643237]  kthread+0x337/0x6f0
[   24.643267]  ? trace_preempt_on+0x20/0xc0
[   24.643301]  ? __pfx_kthread+0x10/0x10
[   24.643333]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.643363]  ? calculate_sigpending+0x7b/0xa0
[   24.643393]  ? __pfx_kthread+0x10/0x10
[   24.643465]  ret_from_fork+0x41/0x80
[   24.643528]  ? __pfx_kthread+0x10/0x10
[   24.643562]  ret_from_fork_asm+0x1a/0x30
[   24.643607]  </TASK>
[   24.643622] 
[   24.659705] Allocated by task 285:
[   24.660140]  kasan_save_stack+0x45/0x70
[   24.660683]  kasan_save_track+0x18/0x40
[   24.661113]  kasan_save_alloc_info+0x3b/0x50
[   24.661676]  __kasan_kmalloc+0xb7/0xc0
[   24.661986]  __kmalloc_cache_noprof+0x189/0x420
[   24.662507]  kasan_atomics+0x95/0x310
[   24.662983]  kunit_try_run_case+0x1a5/0x480
[   24.663493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.664245]  kthread+0x337/0x6f0
[   24.664682]  ret_from_fork+0x41/0x80
[   24.664992]  ret_from_fork_asm+0x1a/0x30
[   24.665493] 
[   24.665775] The buggy address belongs to the object at ffff888102983600
[   24.665775]  which belongs to the cache kmalloc-64 of size 64
[   24.666684] The buggy address is located 0 bytes to the right of
[   24.666684]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.667984] 
[   24.668337] The buggy address belongs to the physical page:
[   24.668917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.669542] flags: 0x200000000000000(node=0|zone=2)
[   24.670124] page_type: f5(slab)
[   24.670566] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.671135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.672043] page dumped because: kasan: bad access detected
[   24.672429] 
[   24.672731] Memory state around the buggy address:
[   24.673222]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.673933]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.674525] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.675129]                                      ^
[   24.675681]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.676241]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.676917] ==================================================================
[   23.317896] ==================================================================
[   23.318514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   23.318988] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.319980] 
[   23.320384] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.320935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.320981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.321163] Call Trace:
[   23.321222]  <TASK>
[   23.321278]  dump_stack_lvl+0x73/0xb0
[   23.321360]  print_report+0xd1/0x650
[   23.321531]  ? __virt_addr_valid+0x1db/0x2d0
[   23.321670]  ? kasan_atomics_helper+0xf10/0x5450
[   23.321787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.321891]  ? kasan_atomics_helper+0xf10/0x5450
[   23.321969]  kasan_report+0x141/0x180
[   23.322050]  ? kasan_atomics_helper+0xf10/0x5450
[   23.322144]  kasan_check_range+0x10c/0x1c0
[   23.322225]  __kasan_check_write+0x18/0x20
[   23.322296]  kasan_atomics_helper+0xf10/0x5450
[   23.322374]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.322450]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.322569]  ? kasan_atomics+0x152/0x310
[   23.322662]  kasan_atomics+0x1dc/0x310
[   23.322741]  ? __pfx_kasan_atomics+0x10/0x10
[   23.322815]  ? __pfx_read_tsc+0x10/0x10
[   23.322878]  ? ktime_get_ts64+0x86/0x230
[   23.322923]  kunit_try_run_case+0x1a5/0x480
[   23.322961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.322994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.323031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.323067]  ? __kthread_parkme+0x82/0x180
[   23.323101]  ? preempt_count_sub+0x50/0x80
[   23.323137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.323171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.323203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.323236]  kthread+0x337/0x6f0
[   23.323266]  ? trace_preempt_on+0x20/0xc0
[   23.323299]  ? __pfx_kthread+0x10/0x10
[   23.323330]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.323364]  ? calculate_sigpending+0x7b/0xa0
[   23.323398]  ? __pfx_kthread+0x10/0x10
[   23.323476]  ret_from_fork+0x41/0x80
[   23.323538]  ? __pfx_kthread+0x10/0x10
[   23.323576]  ret_from_fork_asm+0x1a/0x30
[   23.323625]  </TASK>
[   23.323640] 
[   23.342227] Allocated by task 285:
[   23.342887]  kasan_save_stack+0x45/0x70
[   23.343834]  kasan_save_track+0x18/0x40
[   23.344312]  kasan_save_alloc_info+0x3b/0x50
[   23.344667]  __kasan_kmalloc+0xb7/0xc0
[   23.344917]  __kmalloc_cache_noprof+0x189/0x420
[   23.345615]  kasan_atomics+0x95/0x310
[   23.346247]  kunit_try_run_case+0x1a5/0x480
[   23.347072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.347466]  kthread+0x337/0x6f0
[   23.348045]  ret_from_fork+0x41/0x80
[   23.348351]  ret_from_fork_asm+0x1a/0x30
[   23.349018] 
[   23.349230] The buggy address belongs to the object at ffff888102983600
[   23.349230]  which belongs to the cache kmalloc-64 of size 64
[   23.350920] The buggy address is located 0 bytes to the right of
[   23.350920]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.351839] 
[   23.352260] The buggy address belongs to the physical page:
[   23.353210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.354008] flags: 0x200000000000000(node=0|zone=2)
[   23.354697] page_type: f5(slab)
[   23.354863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.355117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.355359] page dumped because: kasan: bad access detected
[   23.355780] 
[   23.356071] Memory state around the buggy address:
[   23.356881]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.357560]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.358036] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.358810]                                      ^
[   23.359238]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.359989]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.360617] ==================================================================
[   22.357119] ==================================================================
[   22.357818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   22.358649] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.359264] 
[   22.359756] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.359891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.359931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.359992] Call Trace:
[   22.360065]  <TASK>
[   22.360144]  dump_stack_lvl+0x73/0xb0
[   22.360230]  print_report+0xd1/0x650
[   22.360309]  ? __virt_addr_valid+0x1db/0x2d0
[   22.360383]  ? kasan_atomics_helper+0x3df/0x5450
[   22.360648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.360762]  ? kasan_atomics_helper+0x3df/0x5450
[   22.360844]  kasan_report+0x141/0x180
[   22.360927]  ? kasan_atomics_helper+0x3df/0x5450
[   22.361043]  kasan_check_range+0x10c/0x1c0
[   22.361159]  __kasan_check_read+0x15/0x20
[   22.361201]  kasan_atomics_helper+0x3df/0x5450
[   22.361238]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.361275]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.361308]  ? kasan_atomics+0x152/0x310
[   22.361341]  kasan_atomics+0x1dc/0x310
[   22.361370]  ? __pfx_kasan_atomics+0x10/0x10
[   22.361400]  ? __pfx_read_tsc+0x10/0x10
[   22.361429]  ? ktime_get_ts64+0x86/0x230
[   22.361468]  kunit_try_run_case+0x1a5/0x480
[   22.361615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.361667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.361708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.361744]  ? __kthread_parkme+0x82/0x180
[   22.361776]  ? preempt_count_sub+0x50/0x80
[   22.361812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.361845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.361878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.361911]  kthread+0x337/0x6f0
[   22.361942]  ? trace_preempt_on+0x20/0xc0
[   22.361976]  ? __pfx_kthread+0x10/0x10
[   22.362007]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.362039]  ? calculate_sigpending+0x7b/0xa0
[   22.362069]  ? __pfx_kthread+0x10/0x10
[   22.362103]  ret_from_fork+0x41/0x80
[   22.362133]  ? __pfx_kthread+0x10/0x10
[   22.362165]  ret_from_fork_asm+0x1a/0x30
[   22.362208]  </TASK>
[   22.362224] 
[   22.381321] Allocated by task 285:
[   22.382224]  kasan_save_stack+0x45/0x70
[   22.382701]  kasan_save_track+0x18/0x40
[   22.383313]  kasan_save_alloc_info+0x3b/0x50
[   22.383926]  __kasan_kmalloc+0xb7/0xc0
[   22.384784]  __kmalloc_cache_noprof+0x189/0x420
[   22.386109]  kasan_atomics+0x95/0x310
[   22.386657]  kunit_try_run_case+0x1a5/0x480
[   22.387720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.388298]  kthread+0x337/0x6f0
[   22.388548]  ret_from_fork+0x41/0x80
[   22.389340]  ret_from_fork_asm+0x1a/0x30
[   22.389912] 
[   22.390083] The buggy address belongs to the object at ffff888102983600
[   22.390083]  which belongs to the cache kmalloc-64 of size 64
[   22.392008] The buggy address is located 0 bytes to the right of
[   22.392008]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.393421] 
[   22.394138] The buggy address belongs to the physical page:
[   22.395191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.396062] flags: 0x200000000000000(node=0|zone=2)
[   22.397070] page_type: f5(slab)
[   22.397418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.398387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.399027] page dumped because: kasan: bad access detected
[   22.399443] 
[   22.400367] Memory state around the buggy address:
[   22.400999]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.401324]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.402557] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.403238]                                      ^
[   22.403948]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404714]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404999] ==================================================================
[   24.295994] ==================================================================
[   24.296864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   24.298017] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.298639] 
[   24.298887] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.299014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.299035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.299065] Call Trace:
[   24.299093]  <TASK>
[   24.299118]  dump_stack_lvl+0x73/0xb0
[   24.299158]  print_report+0xd1/0x650
[   24.299190]  ? __virt_addr_valid+0x1db/0x2d0
[   24.299222]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.299253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.299287]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.299319]  kasan_report+0x141/0x180
[   24.299351]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.299389]  kasan_check_range+0x10c/0x1c0
[   24.299536]  __kasan_check_write+0x18/0x20
[   24.299617]  kasan_atomics_helper+0x18b1/0x5450
[   24.299703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.299782]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.299863]  ? kasan_atomics+0x152/0x310
[   24.299988]  kasan_atomics+0x1dc/0x310
[   24.300068]  ? __pfx_kasan_atomics+0x10/0x10
[   24.300148]  ? __pfx_read_tsc+0x10/0x10
[   24.300258]  ? ktime_get_ts64+0x86/0x230
[   24.300351]  kunit_try_run_case+0x1a5/0x480
[   24.300454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.300550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.300618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.300658]  ? __kthread_parkme+0x82/0x180
[   24.300690]  ? preempt_count_sub+0x50/0x80
[   24.300726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.300760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.300792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.300824]  kthread+0x337/0x6f0
[   24.300856]  ? trace_preempt_on+0x20/0xc0
[   24.300890]  ? __pfx_kthread+0x10/0x10
[   24.300922]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.300953]  ? calculate_sigpending+0x7b/0xa0
[   24.300984]  ? __pfx_kthread+0x10/0x10
[   24.301016]  ret_from_fork+0x41/0x80
[   24.301045]  ? __pfx_kthread+0x10/0x10
[   24.301077]  ret_from_fork_asm+0x1a/0x30
[   24.301122]  </TASK>
[   24.301136] 
[   24.316846] Allocated by task 285:
[   24.317196]  kasan_save_stack+0x45/0x70
[   24.317564]  kasan_save_track+0x18/0x40
[   24.318057]  kasan_save_alloc_info+0x3b/0x50
[   24.318549]  __kasan_kmalloc+0xb7/0xc0
[   24.319042]  __kmalloc_cache_noprof+0x189/0x420
[   24.319560]  kasan_atomics+0x95/0x310
[   24.320095]  kunit_try_run_case+0x1a5/0x480
[   24.320654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.321188]  kthread+0x337/0x6f0
[   24.321670]  ret_from_fork+0x41/0x80
[   24.322056]  ret_from_fork_asm+0x1a/0x30
[   24.322547] 
[   24.322804] The buggy address belongs to the object at ffff888102983600
[   24.322804]  which belongs to the cache kmalloc-64 of size 64
[   24.323931] The buggy address is located 0 bytes to the right of
[   24.323931]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.325068] 
[   24.325362] The buggy address belongs to the physical page:
[   24.326008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.326625] flags: 0x200000000000000(node=0|zone=2)
[   24.327151] page_type: f5(slab)
[   24.327460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.327959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.328775] page dumped because: kasan: bad access detected
[   24.329339] 
[   24.329625] Memory state around the buggy address:
[   24.330127]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.331198]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.333511] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.334995]                                      ^
[   24.335362]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.336121]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.337064] ==================================================================
[   24.060441] ==================================================================
[   24.061275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   24.061935] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.063110] 
[   24.063392] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.063601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.063645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.063738] Call Trace:
[   24.063801]  <TASK>
[   24.063858]  dump_stack_lvl+0x73/0xb0
[   24.064032]  print_report+0xd1/0x650
[   24.064130]  ? __virt_addr_valid+0x1db/0x2d0
[   24.064207]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.064268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.064302]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.064334]  kasan_report+0x141/0x180
[   24.064367]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.064407]  kasan_check_range+0x10c/0x1c0
[   24.064505]  __kasan_check_write+0x18/0x20
[   24.064542]  kasan_atomics_helper+0x15b6/0x5450
[   24.064578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.064612]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.064645]  ? kasan_atomics+0x152/0x310
[   24.064679]  kasan_atomics+0x1dc/0x310
[   24.064706]  ? __pfx_kasan_atomics+0x10/0x10
[   24.064735]  ? __pfx_read_tsc+0x10/0x10
[   24.064763]  ? ktime_get_ts64+0x86/0x230
[   24.064800]  kunit_try_run_case+0x1a5/0x480
[   24.064834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.064866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.064901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.064935]  ? __kthread_parkme+0x82/0x180
[   24.064966]  ? preempt_count_sub+0x50/0x80
[   24.065002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.065035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.065067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.065099]  kthread+0x337/0x6f0
[   24.065129]  ? trace_preempt_on+0x20/0xc0
[   24.065165]  ? __pfx_kthread+0x10/0x10
[   24.065199]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.065232]  ? calculate_sigpending+0x7b/0xa0
[   24.065263]  ? __pfx_kthread+0x10/0x10
[   24.065295]  ret_from_fork+0x41/0x80
[   24.065325]  ? __pfx_kthread+0x10/0x10
[   24.065357]  ret_from_fork_asm+0x1a/0x30
[   24.065400]  </TASK>
[   24.065431] 
[   24.083392] Allocated by task 285:
[   24.084058]  kasan_save_stack+0x45/0x70
[   24.084854]  kasan_save_track+0x18/0x40
[   24.085184]  kasan_save_alloc_info+0x3b/0x50
[   24.086054]  __kasan_kmalloc+0xb7/0xc0
[   24.086508]  __kmalloc_cache_noprof+0x189/0x420
[   24.087188]  kasan_atomics+0x95/0x310
[   24.087687]  kunit_try_run_case+0x1a5/0x480
[   24.088099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.088629]  kthread+0x337/0x6f0
[   24.088988]  ret_from_fork+0x41/0x80
[   24.089350]  ret_from_fork_asm+0x1a/0x30
[   24.090275] 
[   24.090575] The buggy address belongs to the object at ffff888102983600
[   24.090575]  which belongs to the cache kmalloc-64 of size 64
[   24.091870] The buggy address is located 0 bytes to the right of
[   24.091870]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.093132] 
[   24.093317] The buggy address belongs to the physical page:
[   24.094508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.095310] flags: 0x200000000000000(node=0|zone=2)
[   24.096006] page_type: f5(slab)
[   24.096286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.097335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.098293] page dumped because: kasan: bad access detected
[   24.098946] 
[   24.099111] Memory state around the buggy address:
[   24.099584]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.100087]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.101188] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.101875]                                      ^
[   24.102615]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.103257]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.103887] ==================================================================
[   23.057383] ==================================================================
[   23.058761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   23.059650] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.060057] 
[   23.060291] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.060513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.060559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.060649] Call Trace:
[   23.060712]  <TASK>
[   23.060796]  dump_stack_lvl+0x73/0xb0
[   23.060913]  print_report+0xd1/0x650
[   23.060992]  ? __virt_addr_valid+0x1db/0x2d0
[   23.061069]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.061139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.061215]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.061291]  kasan_report+0x141/0x180
[   23.061367]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.061555]  kasan_check_range+0x10c/0x1c0
[   23.061667]  __kasan_check_write+0x18/0x20
[   23.061779]  kasan_atomics_helper+0xb6a/0x5450
[   23.061899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.061980]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.062066]  ? kasan_atomics+0x152/0x310
[   23.062151]  kasan_atomics+0x1dc/0x310
[   23.062225]  ? __pfx_kasan_atomics+0x10/0x10
[   23.062299]  ? __pfx_read_tsc+0x10/0x10
[   23.062366]  ? ktime_get_ts64+0x86/0x230
[   23.062507]  kunit_try_run_case+0x1a5/0x480
[   23.062595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.062665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.062730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.062768]  ? __kthread_parkme+0x82/0x180
[   23.062800]  ? preempt_count_sub+0x50/0x80
[   23.062837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.062874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.062907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.062940]  kthread+0x337/0x6f0
[   23.062970]  ? trace_preempt_on+0x20/0xc0
[   23.063004]  ? __pfx_kthread+0x10/0x10
[   23.063035]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.063068]  ? calculate_sigpending+0x7b/0xa0
[   23.063099]  ? __pfx_kthread+0x10/0x10
[   23.063131]  ret_from_fork+0x41/0x80
[   23.063161]  ? __pfx_kthread+0x10/0x10
[   23.063193]  ret_from_fork_asm+0x1a/0x30
[   23.063236]  </TASK>
[   23.063251] 
[   23.077321] Allocated by task 285:
[   23.077764]  kasan_save_stack+0x45/0x70
[   23.078191]  kasan_save_track+0x18/0x40
[   23.078670]  kasan_save_alloc_info+0x3b/0x50
[   23.079024]  __kasan_kmalloc+0xb7/0xc0
[   23.079388]  __kmalloc_cache_noprof+0x189/0x420
[   23.079942]  kasan_atomics+0x95/0x310
[   23.080338]  kunit_try_run_case+0x1a5/0x480
[   23.080786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.081222]  kthread+0x337/0x6f0
[   23.081684]  ret_from_fork+0x41/0x80
[   23.082098]  ret_from_fork_asm+0x1a/0x30
[   23.082612] 
[   23.082805] The buggy address belongs to the object at ffff888102983600
[   23.082805]  which belongs to the cache kmalloc-64 of size 64
[   23.083770] The buggy address is located 0 bytes to the right of
[   23.083770]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.084547] 
[   23.084792] The buggy address belongs to the physical page:
[   23.085325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.086123] flags: 0x200000000000000(node=0|zone=2)
[   23.086669] page_type: f5(slab)
[   23.086999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.087725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.088294] page dumped because: kasan: bad access detected
[   23.088726] 
[   23.088911] Memory state around the buggy address:
[   23.089333]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.090026]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.090699] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.091324]                                      ^
[   23.091846]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.092406]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.093001] ==================================================================
[   23.270811] ==================================================================
[   23.271539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   23.272156] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.272905] 
[   23.273217] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.273351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.273393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.273539] Call Trace:
[   23.273610]  <TASK>
[   23.273662]  dump_stack_lvl+0x73/0xb0
[   23.273743]  print_report+0xd1/0x650
[   23.273820]  ? __virt_addr_valid+0x1db/0x2d0
[   23.273890]  ? kasan_atomics_helper+0xe78/0x5450
[   23.273944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.274013]  ? kasan_atomics_helper+0xe78/0x5450
[   23.274127]  kasan_report+0x141/0x180
[   23.274218]  ? kasan_atomics_helper+0xe78/0x5450
[   23.274375]  kasan_check_range+0x10c/0x1c0
[   23.274550]  __kasan_check_write+0x18/0x20
[   23.274656]  kasan_atomics_helper+0xe78/0x5450
[   23.274771]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.274859]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.275003]  ? kasan_atomics+0x152/0x310
[   23.275091]  kasan_atomics+0x1dc/0x310
[   23.275168]  ? __pfx_kasan_atomics+0x10/0x10
[   23.275244]  ? __pfx_read_tsc+0x10/0x10
[   23.275312]  ? ktime_get_ts64+0x86/0x230
[   23.275395]  kunit_try_run_case+0x1a5/0x480
[   23.275541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.275617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.275692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.275770]  ? __kthread_parkme+0x82/0x180
[   23.275846]  ? preempt_count_sub+0x50/0x80
[   23.275927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.276005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.276067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.276104]  kthread+0x337/0x6f0
[   23.276136]  ? trace_preempt_on+0x20/0xc0
[   23.276171]  ? __pfx_kthread+0x10/0x10
[   23.276204]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.276236]  ? calculate_sigpending+0x7b/0xa0
[   23.276268]  ? __pfx_kthread+0x10/0x10
[   23.276300]  ret_from_fork+0x41/0x80
[   23.276333]  ? __pfx_kthread+0x10/0x10
[   23.276365]  ret_from_fork_asm+0x1a/0x30
[   23.276430]  </TASK>
[   23.276498] 
[   23.298380] Allocated by task 285:
[   23.299016]  kasan_save_stack+0x45/0x70
[   23.299365]  kasan_save_track+0x18/0x40
[   23.299907]  kasan_save_alloc_info+0x3b/0x50
[   23.301052]  __kasan_kmalloc+0xb7/0xc0
[   23.301627]  __kmalloc_cache_noprof+0x189/0x420
[   23.302293]  kasan_atomics+0x95/0x310
[   23.302690]  kunit_try_run_case+0x1a5/0x480
[   23.303280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.304042]  kthread+0x337/0x6f0
[   23.304368]  ret_from_fork+0x41/0x80
[   23.304775]  ret_from_fork_asm+0x1a/0x30
[   23.305197] 
[   23.305436] The buggy address belongs to the object at ffff888102983600
[   23.305436]  which belongs to the cache kmalloc-64 of size 64
[   23.306355] The buggy address is located 0 bytes to the right of
[   23.306355]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.307398] 
[   23.307694] The buggy address belongs to the physical page:
[   23.308171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.309027] flags: 0x200000000000000(node=0|zone=2)
[   23.309541] page_type: f5(slab)
[   23.310021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.310622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.311318] page dumped because: kasan: bad access detected
[   23.311751] 
[   23.312014] Memory state around the buggy address:
[   23.312563]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.313142]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.313963] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.314522]                                      ^
[   23.315120]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.315793]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.316325] ==================================================================
[   23.362477] ==================================================================
[   23.363567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   23.364156] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.365019] 
[   23.365599] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.365734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.365778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.365840] Call Trace:
[   23.365896]  <TASK>
[   23.365946]  dump_stack_lvl+0x73/0xb0
[   23.366024]  print_report+0xd1/0x650
[   23.366063]  ? __virt_addr_valid+0x1db/0x2d0
[   23.366097]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.366130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.366164]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.366197]  kasan_report+0x141/0x180
[   23.366233]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.366273]  kasan_check_range+0x10c/0x1c0
[   23.366309]  __kasan_check_write+0x18/0x20
[   23.366339]  kasan_atomics_helper+0xfa9/0x5450
[   23.366373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.366411]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.366511]  ? kasan_atomics+0x152/0x310
[   23.366551]  kasan_atomics+0x1dc/0x310
[   23.366580]  ? __pfx_kasan_atomics+0x10/0x10
[   23.366612]  ? __pfx_read_tsc+0x10/0x10
[   23.366641]  ? ktime_get_ts64+0x86/0x230
[   23.366680]  kunit_try_run_case+0x1a5/0x480
[   23.366715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.366747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.366784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.366820]  ? __kthread_parkme+0x82/0x180
[   23.366853]  ? preempt_count_sub+0x50/0x80
[   23.366889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.366924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.366956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.366990]  kthread+0x337/0x6f0
[   23.367021]  ? trace_preempt_on+0x20/0xc0
[   23.367057]  ? __pfx_kthread+0x10/0x10
[   23.367090]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.367124]  ? calculate_sigpending+0x7b/0xa0
[   23.367158]  ? __pfx_kthread+0x10/0x10
[   23.367193]  ret_from_fork+0x41/0x80
[   23.367225]  ? __pfx_kthread+0x10/0x10
[   23.367258]  ret_from_fork_asm+0x1a/0x30
[   23.367304]  </TASK>
[   23.367319] 
[   23.383436] Allocated by task 285:
[   23.384097]  kasan_save_stack+0x45/0x70
[   23.384959]  kasan_save_track+0x18/0x40
[   23.385641]  kasan_save_alloc_info+0x3b/0x50
[   23.386389]  __kasan_kmalloc+0xb7/0xc0
[   23.387100]  __kmalloc_cache_noprof+0x189/0x420
[   23.388017]  kasan_atomics+0x95/0x310
[   23.388783]  kunit_try_run_case+0x1a5/0x480
[   23.389512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.390510]  kthread+0x337/0x6f0
[   23.391055]  ret_from_fork+0x41/0x80
[   23.392736]  ret_from_fork_asm+0x1a/0x30
[   23.394879] 
[   23.395225] The buggy address belongs to the object at ffff888102983600
[   23.395225]  which belongs to the cache kmalloc-64 of size 64
[   23.398176] The buggy address is located 0 bytes to the right of
[   23.398176]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.400033] 
[   23.400366] The buggy address belongs to the physical page:
[   23.401178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.401702] flags: 0x200000000000000(node=0|zone=2)
[   23.402576] page_type: f5(slab)
[   23.403098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.404164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.405057] page dumped because: kasan: bad access detected
[   23.405353] 
[   23.405729] Memory state around the buggy address:
[   23.406559]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.407646]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.408445] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.409187]                                      ^
[   23.409646]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.410256]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.411011] ==================================================================
[   23.496315] ==================================================================
[   23.497202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   23.497948] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.498724] 
[   23.499007] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.499141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.499187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.499243] Call Trace:
[   23.499347]  <TASK>
[   23.499403]  dump_stack_lvl+0x73/0xb0
[   23.499547]  print_report+0xd1/0x650
[   23.499624]  ? __virt_addr_valid+0x1db/0x2d0
[   23.499704]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.499786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.499867]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.499944]  kasan_report+0x141/0x180
[   23.500030]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.500125]  __asan_report_load4_noabort+0x18/0x20
[   23.500200]  kasan_atomics_helper+0x4a1c/0x5450
[   23.500273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.500312]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.500347]  ? kasan_atomics+0x152/0x310
[   23.500379]  kasan_atomics+0x1dc/0x310
[   23.500430]  ? __pfx_kasan_atomics+0x10/0x10
[   23.500523]  ? __pfx_read_tsc+0x10/0x10
[   23.500557]  ? ktime_get_ts64+0x86/0x230
[   23.500595]  kunit_try_run_case+0x1a5/0x480
[   23.500631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.500663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.500697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.500732]  ? __kthread_parkme+0x82/0x180
[   23.500766]  ? preempt_count_sub+0x50/0x80
[   23.500803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.500837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.500870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.500903]  kthread+0x337/0x6f0
[   23.500934]  ? trace_preempt_on+0x20/0xc0
[   23.500969]  ? __pfx_kthread+0x10/0x10
[   23.501002]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.501034]  ? calculate_sigpending+0x7b/0xa0
[   23.501064]  ? __pfx_kthread+0x10/0x10
[   23.501096]  ret_from_fork+0x41/0x80
[   23.501126]  ? __pfx_kthread+0x10/0x10
[   23.501158]  ret_from_fork_asm+0x1a/0x30
[   23.501201]  </TASK>
[   23.501216] 
[   23.521831] Allocated by task 285:
[   23.522220]  kasan_save_stack+0x45/0x70
[   23.522976]  kasan_save_track+0x18/0x40
[   23.523412]  kasan_save_alloc_info+0x3b/0x50
[   23.524149]  __kasan_kmalloc+0xb7/0xc0
[   23.524609]  __kmalloc_cache_noprof+0x189/0x420
[   23.525031]  kasan_atomics+0x95/0x310
[   23.525755]  kunit_try_run_case+0x1a5/0x480
[   23.526211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.526968]  kthread+0x337/0x6f0
[   23.527374]  ret_from_fork+0x41/0x80
[   23.528059]  ret_from_fork_asm+0x1a/0x30
[   23.528738] 
[   23.528984] The buggy address belongs to the object at ffff888102983600
[   23.528984]  which belongs to the cache kmalloc-64 of size 64
[   23.530022] The buggy address is located 0 bytes to the right of
[   23.530022]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.531571] 
[   23.531968] The buggy address belongs to the physical page:
[   23.532681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.533511] flags: 0x200000000000000(node=0|zone=2)
[   23.533970] page_type: f5(slab)
[   23.534617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.535494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.536080] page dumped because: kasan: bad access detected
[   23.536911] 
[   23.537423] Memory state around the buggy address:
[   23.537919]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.538469]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.539258] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.540041]                                      ^
[   23.540676]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.541430]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.542076] ==================================================================
[   22.305110] ==================================================================
[   22.305916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   22.307381] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.308711] 
[   22.308923] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.308991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.309010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.309039] Call Trace:
[   22.309063]  <TASK>
[   22.309086]  dump_stack_lvl+0x73/0xb0
[   22.309124]  print_report+0xd1/0x650
[   22.309288]  ? __virt_addr_valid+0x1db/0x2d0
[   22.309325]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.309385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.309422]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.309459]  kasan_report+0x141/0x180
[   22.309532]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.309645]  __asan_report_store4_noabort+0x1b/0x30
[   22.309725]  kasan_atomics_helper+0x4b6e/0x5450
[   22.309767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.309805]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.309841]  ? kasan_atomics+0x152/0x310
[   22.309900]  kasan_atomics+0x1dc/0x310
[   22.309956]  ? __pfx_kasan_atomics+0x10/0x10
[   22.309990]  ? __pfx_read_tsc+0x10/0x10
[   22.310019]  ? ktime_get_ts64+0x86/0x230
[   22.310060]  kunit_try_run_case+0x1a5/0x480
[   22.310097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.310130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.310166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.310202]  ? __kthread_parkme+0x82/0x180
[   22.310237]  ? preempt_count_sub+0x50/0x80
[   22.310272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.310307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.310341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.310385]  kthread+0x337/0x6f0
[   22.310623]  ? trace_preempt_on+0x20/0xc0
[   22.310703]  ? __pfx_kthread+0x10/0x10
[   22.310781]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.311017]  ? calculate_sigpending+0x7b/0xa0
[   22.311062]  ? __pfx_kthread+0x10/0x10
[   22.311100]  ret_from_fork+0x41/0x80
[   22.311134]  ? __pfx_kthread+0x10/0x10
[   22.311169]  ret_from_fork_asm+0x1a/0x30
[   22.311217]  </TASK>
[   22.311232] 
[   22.329663] Allocated by task 285:
[   22.330818]  kasan_save_stack+0x45/0x70
[   22.333627]  kasan_save_track+0x18/0x40
[   22.333911]  kasan_save_alloc_info+0x3b/0x50
[   22.334173]  __kasan_kmalloc+0xb7/0xc0
[   22.334447]  __kmalloc_cache_noprof+0x189/0x420
[   22.335883]  kasan_atomics+0x95/0x310
[   22.336291]  kunit_try_run_case+0x1a5/0x480
[   22.336959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.337701]  kthread+0x337/0x6f0
[   22.338137]  ret_from_fork+0x41/0x80
[   22.338806]  ret_from_fork_asm+0x1a/0x30
[   22.339138] 
[   22.339323] The buggy address belongs to the object at ffff888102983600
[   22.339323]  which belongs to the cache kmalloc-64 of size 64
[   22.342210] The buggy address is located 0 bytes to the right of
[   22.342210]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.344314] 
[   22.344747] The buggy address belongs to the physical page:
[   22.345287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.346061] flags: 0x200000000000000(node=0|zone=2)
[   22.346885] page_type: f5(slab)
[   22.347919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.348675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.349400] page dumped because: kasan: bad access detected
[   22.350119] 
[   22.350349] Memory state around the buggy address:
[   22.351404]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.352161]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.352914] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.353651]                                      ^
[   22.353985]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.354822]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.355444] ==================================================================
[   24.247757] ==================================================================
[   24.248950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   24.250272] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.251072] 
[   24.251355] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.251959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.251988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.252022] Call Trace:
[   24.252047]  <TASK>
[   24.252070]  dump_stack_lvl+0x73/0xb0
[   24.252111]  print_report+0xd1/0x650
[   24.252145]  ? __virt_addr_valid+0x1db/0x2d0
[   24.252180]  ? kasan_atomics_helper+0x1818/0x5450
[   24.252211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.252245]  ? kasan_atomics_helper+0x1818/0x5450
[   24.252278]  kasan_report+0x141/0x180
[   24.252311]  ? kasan_atomics_helper+0x1818/0x5450
[   24.252350]  kasan_check_range+0x10c/0x1c0
[   24.252387]  __kasan_check_write+0x18/0x20
[   24.252457]  kasan_atomics_helper+0x1818/0x5450
[   24.252524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.252561]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.252597]  ? kasan_atomics+0x152/0x310
[   24.252631]  kasan_atomics+0x1dc/0x310
[   24.252660]  ? __pfx_kasan_atomics+0x10/0x10
[   24.252690]  ? __pfx_read_tsc+0x10/0x10
[   24.252720]  ? ktime_get_ts64+0x86/0x230
[   24.252758]  kunit_try_run_case+0x1a5/0x480
[   24.252794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.252827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.252863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.252898]  ? __kthread_parkme+0x82/0x180
[   24.252931]  ? preempt_count_sub+0x50/0x80
[   24.252967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.253002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.253036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.253070]  kthread+0x337/0x6f0
[   24.253102]  ? trace_preempt_on+0x20/0xc0
[   24.253138]  ? __pfx_kthread+0x10/0x10
[   24.253171]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.253204]  ? calculate_sigpending+0x7b/0xa0
[   24.253240]  ? __pfx_kthread+0x10/0x10
[   24.253274]  ret_from_fork+0x41/0x80
[   24.253308]  ? __pfx_kthread+0x10/0x10
[   24.253347]  ret_from_fork_asm+0x1a/0x30
[   24.253395]  </TASK>
[   24.253422] 
[   24.274075] Allocated by task 285:
[   24.274266]  kasan_save_stack+0x45/0x70
[   24.274589]  kasan_save_track+0x18/0x40
[   24.275288]  kasan_save_alloc_info+0x3b/0x50
[   24.275863]  __kasan_kmalloc+0xb7/0xc0
[   24.276287]  __kmalloc_cache_noprof+0x189/0x420
[   24.277501]  kasan_atomics+0x95/0x310
[   24.277949]  kunit_try_run_case+0x1a5/0x480
[   24.278324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.279216]  kthread+0x337/0x6f0
[   24.279794]  ret_from_fork+0x41/0x80
[   24.280313]  ret_from_fork_asm+0x1a/0x30
[   24.280715] 
[   24.281043] The buggy address belongs to the object at ffff888102983600
[   24.281043]  which belongs to the cache kmalloc-64 of size 64
[   24.282819] The buggy address is located 0 bytes to the right of
[   24.282819]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.283724] 
[   24.284041] The buggy address belongs to the physical page:
[   24.284895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.285794] flags: 0x200000000000000(node=0|zone=2)
[   24.286205] page_type: f5(slab)
[   24.286618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.287280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.288082] page dumped because: kasan: bad access detected
[   24.288526] 
[   24.288678] Memory state around the buggy address:
[   24.289040]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.289793]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.291000] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.292331]                                      ^
[   24.292642]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.294044]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.294985] ==================================================================
[   24.104520] ==================================================================
[   24.105517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   24.106507] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.107683] 
[   24.107910] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.108042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.108082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.108144] Call Trace:
[   24.108198]  <TASK>
[   24.108252]  dump_stack_lvl+0x73/0xb0
[   24.108336]  print_report+0xd1/0x650
[   24.108397]  ? __virt_addr_valid+0x1db/0x2d0
[   24.108532]  ? kasan_atomics_helper+0x164f/0x5450
[   24.108616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.108697]  ? kasan_atomics_helper+0x164f/0x5450
[   24.108773]  kasan_report+0x141/0x180
[   24.108854]  ? kasan_atomics_helper+0x164f/0x5450
[   24.108943]  kasan_check_range+0x10c/0x1c0
[   24.109028]  __kasan_check_write+0x18/0x20
[   24.109076]  kasan_atomics_helper+0x164f/0x5450
[   24.109112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.109148]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.109181]  ? kasan_atomics+0x152/0x310
[   24.109212]  kasan_atomics+0x1dc/0x310
[   24.109238]  ? __pfx_kasan_atomics+0x10/0x10
[   24.109267]  ? __pfx_read_tsc+0x10/0x10
[   24.109296]  ? ktime_get_ts64+0x86/0x230
[   24.109337]  kunit_try_run_case+0x1a5/0x480
[   24.109374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.109407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.109510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.109552]  ? __kthread_parkme+0x82/0x180
[   24.109597]  ? preempt_count_sub+0x50/0x80
[   24.109635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.109669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.109703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.109736]  kthread+0x337/0x6f0
[   24.109768]  ? trace_preempt_on+0x20/0xc0
[   24.109803]  ? __pfx_kthread+0x10/0x10
[   24.109836]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.109871]  ? calculate_sigpending+0x7b/0xa0
[   24.109904]  ? __pfx_kthread+0x10/0x10
[   24.109938]  ret_from_fork+0x41/0x80
[   24.109970]  ? __pfx_kthread+0x10/0x10
[   24.110004]  ret_from_fork_asm+0x1a/0x30
[   24.110049]  </TASK>
[   24.110063] 
[   24.127400] Allocated by task 285:
[   24.127900]  kasan_save_stack+0x45/0x70
[   24.128577]  kasan_save_track+0x18/0x40
[   24.129129]  kasan_save_alloc_info+0x3b/0x50
[   24.129709]  __kasan_kmalloc+0xb7/0xc0
[   24.130058]  __kmalloc_cache_noprof+0x189/0x420
[   24.130732]  kasan_atomics+0x95/0x310
[   24.131127]  kunit_try_run_case+0x1a5/0x480
[   24.131694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.132306]  kthread+0x337/0x6f0
[   24.132841]  ret_from_fork+0x41/0x80
[   24.133259]  ret_from_fork_asm+0x1a/0x30
[   24.133790] 
[   24.134070] The buggy address belongs to the object at ffff888102983600
[   24.134070]  which belongs to the cache kmalloc-64 of size 64
[   24.134872] The buggy address is located 0 bytes to the right of
[   24.134872]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.136020] 
[   24.136266] The buggy address belongs to the physical page:
[   24.136869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.137364] flags: 0x200000000000000(node=0|zone=2)
[   24.137954] page_type: f5(slab)
[   24.138456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.139298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.139999] page dumped because: kasan: bad access detected
[   24.140640] 
[   24.140878] Memory state around the buggy address:
[   24.141316]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.141858]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.142743] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.143352]                                      ^
[   24.143863]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.144741]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.145366] ==================================================================
[   23.732113] ==================================================================
[   23.733976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   23.734602] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.735260] 
[   23.735791] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.736020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.736064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.736122] Call Trace:
[   23.736176]  <TASK>
[   23.736227]  dump_stack_lvl+0x73/0xb0
[   23.736306]  print_report+0xd1/0x650
[   23.736382]  ? __virt_addr_valid+0x1db/0x2d0
[   23.736462]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.736561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.736637]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.736719]  kasan_report+0x141/0x180
[   23.736805]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.736901]  kasan_check_range+0x10c/0x1c0
[   23.736994]  __kasan_check_write+0x18/0x20
[   23.737070]  kasan_atomics_helper+0x12e6/0x5450
[   23.737153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.737233]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.737315]  ? kasan_atomics+0x152/0x310
[   23.737395]  kasan_atomics+0x1dc/0x310
[   23.737499]  ? __pfx_kasan_atomics+0x10/0x10
[   23.737594]  ? __pfx_read_tsc+0x10/0x10
[   23.737663]  ? ktime_get_ts64+0x86/0x230
[   23.737750]  kunit_try_run_case+0x1a5/0x480
[   23.737829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.737904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.737982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.738059]  ? __kthread_parkme+0x82/0x180
[   23.738096]  ? preempt_count_sub+0x50/0x80
[   23.738133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.738168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.738202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.738236]  kthread+0x337/0x6f0
[   23.738267]  ? trace_preempt_on+0x20/0xc0
[   23.738303]  ? __pfx_kthread+0x10/0x10
[   23.738336]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.738368]  ? calculate_sigpending+0x7b/0xa0
[   23.738398]  ? __pfx_kthread+0x10/0x10
[   23.738470]  ret_from_fork+0x41/0x80
[   23.738533]  ? __pfx_kthread+0x10/0x10
[   23.738567]  ret_from_fork_asm+0x1a/0x30
[   23.738615]  </TASK>
[   23.738630] 
[   23.759947] Allocated by task 285:
[   23.760854]  kasan_save_stack+0x45/0x70
[   23.761265]  kasan_save_track+0x18/0x40
[   23.761936]  kasan_save_alloc_info+0x3b/0x50
[   23.762355]  __kasan_kmalloc+0xb7/0xc0
[   23.763107]  __kmalloc_cache_noprof+0x189/0x420
[   23.763699]  kasan_atomics+0x95/0x310
[   23.764069]  kunit_try_run_case+0x1a5/0x480
[   23.764718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.765187]  kthread+0x337/0x6f0
[   23.765991]  ret_from_fork+0x41/0x80
[   23.766344]  ret_from_fork_asm+0x1a/0x30
[   23.766775] 
[   23.767248] The buggy address belongs to the object at ffff888102983600
[   23.767248]  which belongs to the cache kmalloc-64 of size 64
[   23.768268] The buggy address is located 0 bytes to the right of
[   23.768268]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.769805] 
[   23.770032] The buggy address belongs to the physical page:
[   23.771012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.771660] flags: 0x200000000000000(node=0|zone=2)
[   23.772063] page_type: f5(slab)
[   23.772346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.773805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.774639] page dumped because: kasan: bad access detected
[   23.775362] 
[   23.775644] Memory state around the buggy address:
[   23.775967]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.777397]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.777938] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.778693]                                      ^
[   23.779273]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.780070]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.781214] ==================================================================
[   22.655559] ==================================================================
[   22.656627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   22.658307] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.659226] 
[   22.659759] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.659995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.660030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.660063] Call Trace:
[   22.660091]  <TASK>
[   22.660117]  dump_stack_lvl+0x73/0xb0
[   22.660163]  print_report+0xd1/0x650
[   22.660197]  ? __virt_addr_valid+0x1db/0x2d0
[   22.660230]  ? kasan_atomics_helper+0x697/0x5450
[   22.660261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.660294]  ? kasan_atomics_helper+0x697/0x5450
[   22.660329]  kasan_report+0x141/0x180
[   22.660361]  ? kasan_atomics_helper+0x697/0x5450
[   22.660398]  kasan_check_range+0x10c/0x1c0
[   22.660533]  __kasan_check_write+0x18/0x20
[   22.660612]  kasan_atomics_helper+0x697/0x5450
[   22.660688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.660802]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.660880]  ? kasan_atomics+0x152/0x310
[   22.660952]  kasan_atomics+0x1dc/0x310
[   22.661017]  ? __pfx_kasan_atomics+0x10/0x10
[   22.661085]  ? __pfx_read_tsc+0x10/0x10
[   22.661147]  ? ktime_get_ts64+0x86/0x230
[   22.661227]  kunit_try_run_case+0x1a5/0x480
[   22.661306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.661340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.661376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.661411]  ? __kthread_parkme+0x82/0x180
[   22.661519]  ? preempt_count_sub+0x50/0x80
[   22.661616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.661658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.661692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.661725]  kthread+0x337/0x6f0
[   22.661756]  ? trace_preempt_on+0x20/0xc0
[   22.661789]  ? __pfx_kthread+0x10/0x10
[   22.661821]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.661854]  ? calculate_sigpending+0x7b/0xa0
[   22.661885]  ? __pfx_kthread+0x10/0x10
[   22.661918]  ret_from_fork+0x41/0x80
[   22.661947]  ? __pfx_kthread+0x10/0x10
[   22.661980]  ret_from_fork_asm+0x1a/0x30
[   22.662025]  </TASK>
[   22.662039] 
[   22.683200] Allocated by task 285:
[   22.683846]  kasan_save_stack+0x45/0x70
[   22.684134]  kasan_save_track+0x18/0x40
[   22.684297]  kasan_save_alloc_info+0x3b/0x50
[   22.684702]  __kasan_kmalloc+0xb7/0xc0
[   22.685289]  __kmalloc_cache_noprof+0x189/0x420
[   22.685718]  kasan_atomics+0x95/0x310
[   22.686876]  kunit_try_run_case+0x1a5/0x480
[   22.687290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.687760]  kthread+0x337/0x6f0
[   22.688166]  ret_from_fork+0x41/0x80
[   22.688541]  ret_from_fork_asm+0x1a/0x30
[   22.688915] 
[   22.689163] The buggy address belongs to the object at ffff888102983600
[   22.689163]  which belongs to the cache kmalloc-64 of size 64
[   22.691159] The buggy address is located 0 bytes to the right of
[   22.691159]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.692273] 
[   22.692879] The buggy address belongs to the physical page:
[   22.693801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.694595] flags: 0x200000000000000(node=0|zone=2)
[   22.695082] page_type: f5(slab)
[   22.695420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.696063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.696739] page dumped because: kasan: bad access detected
[   22.697204] 
[   22.697545] Memory state around the buggy address:
[   22.698107]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.698868]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.699774] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.700362]                                      ^
[   22.701347]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.702150]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.703007] ==================================================================
[   24.013881] ==================================================================
[   24.014701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   24.015368] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.016563] 
[   24.016813] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.017162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.017206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.017267] Call Trace:
[   24.017304]  <TASK>
[   24.017332]  dump_stack_lvl+0x73/0xb0
[   24.017379]  print_report+0xd1/0x650
[   24.017427]  ? __virt_addr_valid+0x1db/0x2d0
[   24.017506]  ? kasan_atomics_helper+0x151d/0x5450
[   24.017544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.017591]  ? kasan_atomics_helper+0x151d/0x5450
[   24.017625]  kasan_report+0x141/0x180
[   24.017661]  ? kasan_atomics_helper+0x151d/0x5450
[   24.017701]  kasan_check_range+0x10c/0x1c0
[   24.017738]  __kasan_check_write+0x18/0x20
[   24.017767]  kasan_atomics_helper+0x151d/0x5450
[   24.017801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.017836]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.017870]  ? kasan_atomics+0x152/0x310
[   24.017903]  kasan_atomics+0x1dc/0x310
[   24.017931]  ? __pfx_kasan_atomics+0x10/0x10
[   24.017961]  ? __pfx_read_tsc+0x10/0x10
[   24.017990]  ? ktime_get_ts64+0x86/0x230
[   24.018031]  kunit_try_run_case+0x1a5/0x480
[   24.018068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.018102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.018139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.018175]  ? __kthread_parkme+0x82/0x180
[   24.018207]  ? preempt_count_sub+0x50/0x80
[   24.018244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.018277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.018312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.018345]  kthread+0x337/0x6f0
[   24.018377]  ? trace_preempt_on+0x20/0xc0
[   24.018422]  ? __pfx_kthread+0x10/0x10
[   24.018491]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.018534]  ? calculate_sigpending+0x7b/0xa0
[   24.018567]  ? __pfx_kthread+0x10/0x10
[   24.018600]  ret_from_fork+0x41/0x80
[   24.018633]  ? __pfx_kthread+0x10/0x10
[   24.018666]  ret_from_fork_asm+0x1a/0x30
[   24.018712]  </TASK>
[   24.018727] 
[   24.039644] Allocated by task 285:
[   24.040171]  kasan_save_stack+0x45/0x70
[   24.040712]  kasan_save_track+0x18/0x40
[   24.041290]  kasan_save_alloc_info+0x3b/0x50
[   24.041760]  __kasan_kmalloc+0xb7/0xc0
[   24.042336]  __kmalloc_cache_noprof+0x189/0x420
[   24.042937]  kasan_atomics+0x95/0x310
[   24.043543]  kunit_try_run_case+0x1a5/0x480
[   24.044201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.044652]  kthread+0x337/0x6f0
[   24.044808]  ret_from_fork+0x41/0x80
[   24.044964]  ret_from_fork_asm+0x1a/0x30
[   24.045133] 
[   24.045223] The buggy address belongs to the object at ffff888102983600
[   24.045223]  which belongs to the cache kmalloc-64 of size 64
[   24.046596] The buggy address is located 0 bytes to the right of
[   24.046596]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.047910] 
[   24.048166] The buggy address belongs to the physical page:
[   24.048813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.049904] flags: 0x200000000000000(node=0|zone=2)
[   24.050461] page_type: f5(slab)
[   24.051028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.051987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.052747] page dumped because: kasan: bad access detected
[   24.053327] 
[   24.053662] Memory state around the buggy address:
[   24.054495]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.055173]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.056049] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.056702]                                      ^
[   24.057142]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.057836]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.058780] ==================================================================
[   25.082855] ==================================================================
[   25.083514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   25.084168] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   25.084961] 
[   25.085188] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.085317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.085359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.085420] Call Trace:
[   25.085516]  <TASK>
[   25.085615]  dump_stack_lvl+0x73/0xb0
[   25.085732]  print_report+0xd1/0x650
[   25.085851]  ? __virt_addr_valid+0x1db/0x2d0
[   25.085963]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.086073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.086189]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.086301]  kasan_report+0x141/0x180
[   25.086445]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.086560]  __asan_report_load8_noabort+0x18/0x20
[   25.086639]  kasan_atomics_helper+0x4fa5/0x5450
[   25.086722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.086801]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.086878]  ? kasan_atomics+0x152/0x310
[   25.086958]  kasan_atomics+0x1dc/0x310
[   25.087028]  ? __pfx_kasan_atomics+0x10/0x10
[   25.087103]  ? __pfx_read_tsc+0x10/0x10
[   25.087165]  ? ktime_get_ts64+0x86/0x230
[   25.087249]  kunit_try_run_case+0x1a5/0x480
[   25.087327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.087399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.087497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.087583]  ? __kthread_parkme+0x82/0x180
[   25.087657]  ? preempt_count_sub+0x50/0x80
[   25.087757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.087819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.087855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.087891]  kthread+0x337/0x6f0
[   25.087929]  ? trace_preempt_on+0x20/0xc0
[   25.088000]  ? __pfx_kthread+0x10/0x10
[   25.088054]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.088127]  ? calculate_sigpending+0x7b/0xa0
[   25.088240]  ? __pfx_kthread+0x10/0x10
[   25.088330]  ret_from_fork+0x41/0x80
[   25.088461]  ? __pfx_kthread+0x10/0x10
[   25.088598]  ret_from_fork_asm+0x1a/0x30
[   25.088742]  </TASK>
[   25.088786] 
[   25.103871] Allocated by task 285:
[   25.104335]  kasan_save_stack+0x45/0x70
[   25.104847]  kasan_save_track+0x18/0x40
[   25.105292]  kasan_save_alloc_info+0x3b/0x50
[   25.105841]  __kasan_kmalloc+0xb7/0xc0
[   25.106258]  __kmalloc_cache_noprof+0x189/0x420
[   25.106828]  kasan_atomics+0x95/0x310
[   25.107279]  kunit_try_run_case+0x1a5/0x480
[   25.107635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.108065]  kthread+0x337/0x6f0
[   25.108540]  ret_from_fork+0x41/0x80
[   25.108989]  ret_from_fork_asm+0x1a/0x30
[   25.109492] 
[   25.109747] The buggy address belongs to the object at ffff888102983600
[   25.109747]  which belongs to the cache kmalloc-64 of size 64
[   25.110582] The buggy address is located 0 bytes to the right of
[   25.110582]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   25.112121] 
[   25.112542] The buggy address belongs to the physical page:
[   25.113098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   25.113809] flags: 0x200000000000000(node=0|zone=2)
[   25.114171] page_type: f5(slab)
[   25.114635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.115788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.116424] page dumped because: kasan: bad access detected
[   25.116800] 
[   25.117053] Memory state around the buggy address:
[   25.117558]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.118229]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.118695] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.119139]                                      ^
[   25.119553]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.120216]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.120870] ==================================================================
[   24.428192] ==================================================================
[   24.428734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   24.429408] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.430558] 
[   24.431177] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.431297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.431330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.431363] Call Trace:
[   24.431389]  <TASK>
[   24.431425]  dump_stack_lvl+0x73/0xb0
[   24.431504]  print_report+0xd1/0x650
[   24.431550]  ? __virt_addr_valid+0x1db/0x2d0
[   24.431587]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.431622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.431656]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.431690]  kasan_report+0x141/0x180
[   24.431726]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.431765]  kasan_check_range+0x10c/0x1c0
[   24.431803]  __kasan_check_write+0x18/0x20
[   24.431832]  kasan_atomics_helper+0x1a7f/0x5450
[   24.431866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.431900]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.431933]  ? kasan_atomics+0x152/0x310
[   24.431966]  kasan_atomics+0x1dc/0x310
[   24.431993]  ? __pfx_kasan_atomics+0x10/0x10
[   24.432023]  ? __pfx_read_tsc+0x10/0x10
[   24.432051]  ? ktime_get_ts64+0x86/0x230
[   24.432089]  kunit_try_run_case+0x1a5/0x480
[   24.432124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.432158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.432194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.432229]  ? __kthread_parkme+0x82/0x180
[   24.432262]  ? preempt_count_sub+0x50/0x80
[   24.432298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.432332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.432366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.432400]  kthread+0x337/0x6f0
[   24.432487]  ? trace_preempt_on+0x20/0xc0
[   24.432569]  ? __pfx_kthread+0x10/0x10
[   24.432651]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.432728]  ? calculate_sigpending+0x7b/0xa0
[   24.432807]  ? __pfx_kthread+0x10/0x10
[   24.432886]  ret_from_fork+0x41/0x80
[   24.432963]  ? __pfx_kthread+0x10/0x10
[   24.433043]  ret_from_fork_asm+0x1a/0x30
[   24.433150]  </TASK>
[   24.433191] 
[   24.451716] Allocated by task 285:
[   24.452190]  kasan_save_stack+0x45/0x70
[   24.452805]  kasan_save_track+0x18/0x40
[   24.453255]  kasan_save_alloc_info+0x3b/0x50
[   24.453871]  __kasan_kmalloc+0xb7/0xc0
[   24.454186]  __kmalloc_cache_noprof+0x189/0x420
[   24.454628]  kasan_atomics+0x95/0x310
[   24.455105]  kunit_try_run_case+0x1a5/0x480
[   24.455725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.456320]  kthread+0x337/0x6f0
[   24.456835]  ret_from_fork+0x41/0x80
[   24.457341]  ret_from_fork_asm+0x1a/0x30
[   24.457829] 
[   24.458058] The buggy address belongs to the object at ffff888102983600
[   24.458058]  which belongs to the cache kmalloc-64 of size 64
[   24.458793] The buggy address is located 0 bytes to the right of
[   24.458793]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.459693] 
[   24.459936] The buggy address belongs to the physical page:
[   24.460444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.462879] flags: 0x200000000000000(node=0|zone=2)
[   24.463205] page_type: f5(slab)
[   24.464460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.466869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.468788] page dumped because: kasan: bad access detected
[   24.470553] 
[   24.471578] Memory state around the buggy address:
[   24.472570]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.473085]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.473832] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.474647]                                      ^
[   24.475153]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.475700]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.476206] ==================================================================
[   24.478900] ==================================================================
[   24.479682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   24.480384] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.481011] 
[   24.481279] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.481416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.481461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.481543] Call Trace:
[   24.481609]  <TASK>
[   24.481639]  dump_stack_lvl+0x73/0xb0
[   24.481682]  print_report+0xd1/0x650
[   24.481724]  ? __virt_addr_valid+0x1db/0x2d0
[   24.481795]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.481830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.481867]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.481902]  kasan_report+0x141/0x180
[   24.481936]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.481976]  kasan_check_range+0x10c/0x1c0
[   24.482013]  __kasan_check_write+0x18/0x20
[   24.482043]  kasan_atomics_helper+0x1b22/0x5450
[   24.482078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.482112]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.482144]  ? kasan_atomics+0x152/0x310
[   24.482177]  kasan_atomics+0x1dc/0x310
[   24.482204]  ? __pfx_kasan_atomics+0x10/0x10
[   24.482233]  ? __pfx_read_tsc+0x10/0x10
[   24.482263]  ? ktime_get_ts64+0x86/0x230
[   24.482301]  kunit_try_run_case+0x1a5/0x480
[   24.482336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.482368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.482412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.482550]  ? __kthread_parkme+0x82/0x180
[   24.482632]  ? preempt_count_sub+0x50/0x80
[   24.482715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.482793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.482868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.482946]  kthread+0x337/0x6f0
[   24.483023]  ? trace_preempt_on+0x20/0xc0
[   24.483066]  ? __pfx_kthread+0x10/0x10
[   24.483101]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.483136]  ? calculate_sigpending+0x7b/0xa0
[   24.483169]  ? __pfx_kthread+0x10/0x10
[   24.483205]  ret_from_fork+0x41/0x80
[   24.483236]  ? __pfx_kthread+0x10/0x10
[   24.483271]  ret_from_fork_asm+0x1a/0x30
[   24.483316]  </TASK>
[   24.483332] 
[   24.499045] Allocated by task 285:
[   24.499386]  kasan_save_stack+0x45/0x70
[   24.499897]  kasan_save_track+0x18/0x40
[   24.500310]  kasan_save_alloc_info+0x3b/0x50
[   24.500819]  __kasan_kmalloc+0xb7/0xc0
[   24.501241]  __kmalloc_cache_noprof+0x189/0x420
[   24.501692]  kasan_atomics+0x95/0x310
[   24.502005]  kunit_try_run_case+0x1a5/0x480
[   24.502372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.502950]  kthread+0x337/0x6f0
[   24.503328]  ret_from_fork+0x41/0x80
[   24.503789]  ret_from_fork_asm+0x1a/0x30
[   24.504237] 
[   24.504551] The buggy address belongs to the object at ffff888102983600
[   24.504551]  which belongs to the cache kmalloc-64 of size 64
[   24.505595] The buggy address is located 0 bytes to the right of
[   24.505595]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.506398] 
[   24.506659] The buggy address belongs to the physical page:
[   24.507075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.507872] flags: 0x200000000000000(node=0|zone=2)
[   24.508382] page_type: f5(slab)
[   24.508804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.509505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.509987] page dumped because: kasan: bad access detected
[   24.510546] 
[   24.510785] Memory state around the buggy address:
[   24.511242]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.511939]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.512643] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.513168]                                      ^
[   24.513608]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.514221]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.514888] ==================================================================
[   24.556153] ==================================================================
[   24.556833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   24.557416] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.559086] 
[   24.559382] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.559709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.559754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.559818] Call Trace:
[   24.559875]  <TASK>
[   24.559929]  dump_stack_lvl+0x73/0xb0
[   24.560031]  print_report+0xd1/0x650
[   24.560111]  ? __virt_addr_valid+0x1db/0x2d0
[   24.560190]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.560263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.560311]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.560344]  kasan_report+0x141/0x180
[   24.560378]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.560449]  __asan_report_load8_noabort+0x18/0x20
[   24.560521]  kasan_atomics_helper+0x4f30/0x5450
[   24.560560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.560593]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.560627]  ? kasan_atomics+0x152/0x310
[   24.560658]  kasan_atomics+0x1dc/0x310
[   24.560684]  ? __pfx_kasan_atomics+0x10/0x10
[   24.560714]  ? __pfx_read_tsc+0x10/0x10
[   24.560743]  ? ktime_get_ts64+0x86/0x230
[   24.560780]  kunit_try_run_case+0x1a5/0x480
[   24.560816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.560847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.560881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.560916]  ? __kthread_parkme+0x82/0x180
[   24.560947]  ? preempt_count_sub+0x50/0x80
[   24.560982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.561015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.561047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.561080]  kthread+0x337/0x6f0
[   24.561111]  ? trace_preempt_on+0x20/0xc0
[   24.561144]  ? __pfx_kthread+0x10/0x10
[   24.561175]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.561207]  ? calculate_sigpending+0x7b/0xa0
[   24.561237]  ? __pfx_kthread+0x10/0x10
[   24.561269]  ret_from_fork+0x41/0x80
[   24.561300]  ? __pfx_kthread+0x10/0x10
[   24.561332]  ret_from_fork_asm+0x1a/0x30
[   24.561377]  </TASK>
[   24.561392] 
[   24.575062] Allocated by task 285:
[   24.575527]  kasan_save_stack+0x45/0x70
[   24.575987]  kasan_save_track+0x18/0x40
[   24.576412]  kasan_save_alloc_info+0x3b/0x50
[   24.576879]  __kasan_kmalloc+0xb7/0xc0
[   24.577309]  __kmalloc_cache_noprof+0x189/0x420
[   24.578136]  kasan_atomics+0x95/0x310
[   24.578596]  kunit_try_run_case+0x1a5/0x480
[   24.579038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.579622]  kthread+0x337/0x6f0
[   24.579999]  ret_from_fork+0x41/0x80
[   24.580378]  ret_from_fork_asm+0x1a/0x30
[   24.580729] 
[   24.580921] The buggy address belongs to the object at ffff888102983600
[   24.580921]  which belongs to the cache kmalloc-64 of size 64
[   24.583141] The buggy address is located 0 bytes to the right of
[   24.583141]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.585029] 
[   24.585132] The buggy address belongs to the physical page:
[   24.585325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.586697] flags: 0x200000000000000(node=0|zone=2)
[   24.587751] page_type: f5(slab)
[   24.588327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.588981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.589674] page dumped because: kasan: bad access detected
[   24.590061] 
[   24.590359] Memory state around the buggy address:
[   24.590873]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.591592]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.592323] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.592991]                                      ^
[   24.593450]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.594083]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.594866] ==================================================================
[   24.596160] ==================================================================
[   24.596772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   24.597370] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.597963] 
[   24.598187] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.598315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.598359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.598459] Call Trace:
[   24.598581]  <TASK>
[   24.598647]  dump_stack_lvl+0x73/0xb0
[   24.598785]  print_report+0xd1/0x650
[   24.598914]  ? __virt_addr_valid+0x1db/0x2d0
[   24.599028]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.599105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.599186]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.599321]  kasan_report+0x141/0x180
[   24.599461]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.599577]  kasan_check_range+0x10c/0x1c0
[   24.599661]  __kasan_check_write+0x18/0x20
[   24.599734]  kasan_atomics_helper+0x1ce1/0x5450
[   24.599818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.599895]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.599976]  ? kasan_atomics+0x152/0x310
[   24.600104]  kasan_atomics+0x1dc/0x310
[   24.600186]  ? __pfx_kasan_atomics+0x10/0x10
[   24.600265]  ? __pfx_read_tsc+0x10/0x10
[   24.600314]  ? ktime_get_ts64+0x86/0x230
[   24.600359]  kunit_try_run_case+0x1a5/0x480
[   24.600397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.600504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.600549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.600588]  ? __kthread_parkme+0x82/0x180
[   24.600622]  ? preempt_count_sub+0x50/0x80
[   24.600659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.600694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.600728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.600762]  kthread+0x337/0x6f0
[   24.600793]  ? trace_preempt_on+0x20/0xc0
[   24.600827]  ? __pfx_kthread+0x10/0x10
[   24.600861]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.600896]  ? calculate_sigpending+0x7b/0xa0
[   24.600927]  ? __pfx_kthread+0x10/0x10
[   24.600961]  ret_from_fork+0x41/0x80
[   24.600991]  ? __pfx_kthread+0x10/0x10
[   24.601025]  ret_from_fork_asm+0x1a/0x30
[   24.601070]  </TASK>
[   24.601085] 
[   24.619755] Allocated by task 285:
[   24.620105]  kasan_save_stack+0x45/0x70
[   24.620649]  kasan_save_track+0x18/0x40
[   24.621134]  kasan_save_alloc_info+0x3b/0x50
[   24.621658]  __kasan_kmalloc+0xb7/0xc0
[   24.622066]  __kmalloc_cache_noprof+0x189/0x420
[   24.622571]  kasan_atomics+0x95/0x310
[   24.622976]  kunit_try_run_case+0x1a5/0x480
[   24.623532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.624059]  kthread+0x337/0x6f0
[   24.624554]  ret_from_fork+0x41/0x80
[   24.625012]  ret_from_fork_asm+0x1a/0x30
[   24.625586] 
[   24.625805] The buggy address belongs to the object at ffff888102983600
[   24.625805]  which belongs to the cache kmalloc-64 of size 64
[   24.626864] The buggy address is located 0 bytes to the right of
[   24.626864]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.627848] 
[   24.628139] The buggy address belongs to the physical page:
[   24.628709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.629378] flags: 0x200000000000000(node=0|zone=2)
[   24.629809] page_type: f5(slab)
[   24.630108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.630906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.631638] page dumped because: kasan: bad access detected
[   24.632176] 
[   24.632468] Memory state around the buggy address:
[   24.632914]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.633686]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.634340] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.634997]                                      ^
[   24.635519]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.636127]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.636802] ==================================================================
[   22.156529] ==================================================================
[   22.157603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   22.158205] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.159644] 
[   22.160228] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.160333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.160350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.160384] Call Trace:
[   22.160401]  <TASK>
[   22.160456]  dump_stack_lvl+0x73/0xb0
[   22.160582]  print_report+0xd1/0x650
[   22.160667]  ? __virt_addr_valid+0x1db/0x2d0
[   22.160704]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.160736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.160772]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.160803]  kasan_report+0x141/0x180
[   22.160835]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.160872]  __asan_report_load4_noabort+0x18/0x20
[   22.160900]  kasan_atomics_helper+0x4bbc/0x5450
[   22.160932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.160963]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.160995]  ? kasan_atomics+0x152/0x310
[   22.161028]  kasan_atomics+0x1dc/0x310
[   22.161053]  ? __pfx_kasan_atomics+0x10/0x10
[   22.161081]  ? __pfx_read_tsc+0x10/0x10
[   22.161109]  ? ktime_get_ts64+0x86/0x230
[   22.161146]  kunit_try_run_case+0x1a5/0x480
[   22.161180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.161211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.161244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.161278]  ? __kthread_parkme+0x82/0x180
[   22.161308]  ? preempt_count_sub+0x50/0x80
[   22.161343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.161375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.161406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.161465]  kthread+0x337/0x6f0
[   22.161560]  ? trace_preempt_on+0x20/0xc0
[   22.161624]  ? __pfx_kthread+0x10/0x10
[   22.161657]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.161688]  ? calculate_sigpending+0x7b/0xa0
[   22.161718]  ? __pfx_kthread+0x10/0x10
[   22.161750]  ret_from_fork+0x41/0x80
[   22.161778]  ? __pfx_kthread+0x10/0x10
[   22.161809]  ret_from_fork_asm+0x1a/0x30
[   22.161853]  </TASK>
[   22.161867] 
[   22.181480] Allocated by task 285:
[   22.182306]  kasan_save_stack+0x45/0x70
[   22.182941]  kasan_save_track+0x18/0x40
[   22.183430]  kasan_save_alloc_info+0x3b/0x50
[   22.183965]  __kasan_kmalloc+0xb7/0xc0
[   22.184272]  __kmalloc_cache_noprof+0x189/0x420
[   22.184876]  kasan_atomics+0x95/0x310
[   22.185816]  kunit_try_run_case+0x1a5/0x480
[   22.186249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.187036]  kthread+0x337/0x6f0
[   22.187841]  ret_from_fork+0x41/0x80
[   22.188172]  ret_from_fork_asm+0x1a/0x30
[   22.188854] 
[   22.189332] The buggy address belongs to the object at ffff888102983600
[   22.189332]  which belongs to the cache kmalloc-64 of size 64
[   22.191101] The buggy address is located 0 bytes to the right of
[   22.191101]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.192903] 
[   22.193146] The buggy address belongs to the physical page:
[   22.194133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.195218] flags: 0x200000000000000(node=0|zone=2)
[   22.195600] page_type: f5(slab)
[   22.196262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.197066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.197931] page dumped because: kasan: bad access detected
[   22.198956] 
[   22.199342] Memory state around the buggy address:
[   22.199918]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.201042]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.201945] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.202766]                                      ^
[   22.203850]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.204373]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.205366] ==================================================================
[   23.691496] ==================================================================
[   23.692860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   23.693708] Read of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.694234] 
[   23.694431] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.694640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.694683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.694743] Call Trace:
[   23.694797]  <TASK>
[   23.694853]  dump_stack_lvl+0x73/0xb0
[   23.694940]  print_report+0xd1/0x650
[   23.695019]  ? __virt_addr_valid+0x1db/0x2d0
[   23.695100]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.695172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.695248]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.695325]  kasan_report+0x141/0x180
[   23.695404]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.695535]  __asan_report_load4_noabort+0x18/0x20
[   23.695612]  kasan_atomics_helper+0x49e8/0x5450
[   23.695700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.695779]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.695856]  ? kasan_atomics+0x152/0x310
[   23.695967]  kasan_atomics+0x1dc/0x310
[   23.696026]  ? __pfx_kasan_atomics+0x10/0x10
[   23.696061]  ? __pfx_read_tsc+0x10/0x10
[   23.696092]  ? ktime_get_ts64+0x86/0x230
[   23.696131]  kunit_try_run_case+0x1a5/0x480
[   23.696167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.696198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.696234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.696268]  ? __kthread_parkme+0x82/0x180
[   23.696300]  ? preempt_count_sub+0x50/0x80
[   23.696336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.696369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.696402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.696464]  kthread+0x337/0x6f0
[   23.696528]  ? trace_preempt_on+0x20/0xc0
[   23.696565]  ? __pfx_kthread+0x10/0x10
[   23.696597]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.696629]  ? calculate_sigpending+0x7b/0xa0
[   23.696660]  ? __pfx_kthread+0x10/0x10
[   23.696692]  ret_from_fork+0x41/0x80
[   23.696723]  ? __pfx_kthread+0x10/0x10
[   23.696756]  ret_from_fork_asm+0x1a/0x30
[   23.696803]  </TASK>
[   23.696818] 
[   23.711134] Allocated by task 285:
[   23.711554]  kasan_save_stack+0x45/0x70
[   23.712040]  kasan_save_track+0x18/0x40
[   23.712452]  kasan_save_alloc_info+0x3b/0x50
[   23.712812]  __kasan_kmalloc+0xb7/0xc0
[   23.713125]  __kmalloc_cache_noprof+0x189/0x420
[   23.713702]  kasan_atomics+0x95/0x310
[   23.714296]  kunit_try_run_case+0x1a5/0x480
[   23.714847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.715246]  kthread+0x337/0x6f0
[   23.715667]  ret_from_fork+0x41/0x80
[   23.716046]  ret_from_fork_asm+0x1a/0x30
[   23.716514] 
[   23.716742] The buggy address belongs to the object at ffff888102983600
[   23.716742]  which belongs to the cache kmalloc-64 of size 64
[   23.720351] The buggy address is located 0 bytes to the right of
[   23.720351]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.721332] 
[   23.721659] The buggy address belongs to the physical page:
[   23.722153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.722854] flags: 0x200000000000000(node=0|zone=2)
[   23.723311] page_type: f5(slab)
[   23.723865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.724386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.725116] page dumped because: kasan: bad access detected
[   23.725634] 
[   23.725845] Memory state around the buggy address:
[   23.726287]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.727910]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.728431] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.729107]                                      ^
[   23.729584]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.730142]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.730795] ==================================================================
[   23.966797] ==================================================================
[   23.967385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   23.968199] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   23.969335] 
[   23.969683] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.969907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.969965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.970004] Call Trace:
[   23.970037]  <TASK>
[   23.970066]  dump_stack_lvl+0x73/0xb0
[   23.970140]  print_report+0xd1/0x650
[   23.970193]  ? __virt_addr_valid+0x1db/0x2d0
[   23.970228]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.970262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.970296]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.970328]  kasan_report+0x141/0x180
[   23.970363]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.970403]  __asan_report_store8_noabort+0x1b/0x30
[   23.970767]  kasan_atomics_helper+0x50d4/0x5450
[   23.970810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.970846]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.970882]  ? kasan_atomics+0x152/0x310
[   23.970915]  kasan_atomics+0x1dc/0x310
[   23.970942]  ? __pfx_kasan_atomics+0x10/0x10
[   23.970971]  ? __pfx_read_tsc+0x10/0x10
[   23.970998]  ? ktime_get_ts64+0x86/0x230
[   23.971035]  kunit_try_run_case+0x1a5/0x480
[   23.971069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.971100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.971136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.971171]  ? __kthread_parkme+0x82/0x180
[   23.971202]  ? preempt_count_sub+0x50/0x80
[   23.971239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.971273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.971307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.971341]  kthread+0x337/0x6f0
[   23.971370]  ? trace_preempt_on+0x20/0xc0
[   23.971420]  ? __pfx_kthread+0x10/0x10
[   23.971517]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.971555]  ? calculate_sigpending+0x7b/0xa0
[   23.971588]  ? __pfx_kthread+0x10/0x10
[   23.971621]  ret_from_fork+0x41/0x80
[   23.971652]  ? __pfx_kthread+0x10/0x10
[   23.971685]  ret_from_fork_asm+0x1a/0x30
[   23.971732]  </TASK>
[   23.971748] 
[   23.992597] Allocated by task 285:
[   23.992977]  kasan_save_stack+0x45/0x70
[   23.994021]  kasan_save_track+0x18/0x40
[   23.994576]  kasan_save_alloc_info+0x3b/0x50
[   23.994761]  __kasan_kmalloc+0xb7/0xc0
[   23.994917]  __kmalloc_cache_noprof+0x189/0x420
[   23.995091]  kasan_atomics+0x95/0x310
[   23.995240]  kunit_try_run_case+0x1a5/0x480
[   23.995407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.996287]  kthread+0x337/0x6f0
[   23.996935]  ret_from_fork+0x41/0x80
[   23.997648]  ret_from_fork_asm+0x1a/0x30
[   23.998151] 
[   23.998375] The buggy address belongs to the object at ffff888102983600
[   23.998375]  which belongs to the cache kmalloc-64 of size 64
[   23.999713] The buggy address is located 0 bytes to the right of
[   23.999713]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.001067] 
[   24.001237] The buggy address belongs to the physical page:
[   24.001843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.003084] flags: 0x200000000000000(node=0|zone=2)
[   24.003422] page_type: f5(slab)
[   24.003832] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.004443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.005402] page dumped because: kasan: bad access detected
[   24.006086] 
[   24.006316] Memory state around the buggy address:
[   24.007097]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.007857]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.009087] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.009927]                                      ^
[   24.010355]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.011119]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.011842] ==================================================================
[   23.094292] ==================================================================
[   23.095059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   23.095734] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   23.096365] 
[   23.097711] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.097843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.097883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.097943] Call Trace:
[   23.097996]  <TASK>
[   23.098045]  dump_stack_lvl+0x73/0xb0
[   23.098124]  print_report+0xd1/0x650
[   23.098202]  ? __virt_addr_valid+0x1db/0x2d0
[   23.098276]  ? kasan_atomics_helper+0xc70/0x5450
[   23.098349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.098424]  ? kasan_atomics_helper+0xc70/0x5450
[   23.099010]  kasan_report+0x141/0x180
[   23.099101]  ? kasan_atomics_helper+0xc70/0x5450
[   23.099210]  kasan_check_range+0x10c/0x1c0
[   23.099294]  __kasan_check_write+0x18/0x20
[   23.099365]  kasan_atomics_helper+0xc70/0x5450
[   23.099423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.099558]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.099596]  ? kasan_atomics+0x152/0x310
[   23.099630]  kasan_atomics+0x1dc/0x310
[   23.099658]  ? __pfx_kasan_atomics+0x10/0x10
[   23.099687]  ? __pfx_read_tsc+0x10/0x10
[   23.099715]  ? ktime_get_ts64+0x86/0x230
[   23.099751]  kunit_try_run_case+0x1a5/0x480
[   23.099787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.099820]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.099855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.099889]  ? __kthread_parkme+0x82/0x180
[   23.099920]  ? preempt_count_sub+0x50/0x80
[   23.099954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.099987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.100019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.100051]  kthread+0x337/0x6f0
[   23.100080]  ? trace_preempt_on+0x20/0xc0
[   23.100114]  ? __pfx_kthread+0x10/0x10
[   23.100145]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.100176]  ? calculate_sigpending+0x7b/0xa0
[   23.100207]  ? __pfx_kthread+0x10/0x10
[   23.100239]  ret_from_fork+0x41/0x80
[   23.100268]  ? __pfx_kthread+0x10/0x10
[   23.100300]  ret_from_fork_asm+0x1a/0x30
[   23.100343]  </TASK>
[   23.100358] 
[   23.118817] Allocated by task 285:
[   23.119239]  kasan_save_stack+0x45/0x70
[   23.119801]  kasan_save_track+0x18/0x40
[   23.120210]  kasan_save_alloc_info+0x3b/0x50
[   23.120717]  __kasan_kmalloc+0xb7/0xc0
[   23.121178]  __kmalloc_cache_noprof+0x189/0x420
[   23.121639]  kasan_atomics+0x95/0x310
[   23.122095]  kunit_try_run_case+0x1a5/0x480
[   23.122599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.122983]  kthread+0x337/0x6f0
[   23.123276]  ret_from_fork+0x41/0x80
[   23.123772]  ret_from_fork_asm+0x1a/0x30
[   23.124199] 
[   23.124510] The buggy address belongs to the object at ffff888102983600
[   23.124510]  which belongs to the cache kmalloc-64 of size 64
[   23.125594] The buggy address is located 0 bytes to the right of
[   23.125594]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.126289] 
[   23.127173] The buggy address belongs to the physical page:
[   23.127737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.129831] flags: 0x200000000000000(node=0|zone=2)
[   23.130935] page_type: f5(slab)
[   23.132366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.133973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.134923] page dumped because: kasan: bad access detected
[   23.135263] 
[   23.136504] Memory state around the buggy address:
[   23.137583]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.139256]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.140691] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.141270]                                      ^
[   23.142036]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.142723]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.143532] ==================================================================
[   22.546984] ==================================================================
[   22.547772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   22.548287] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.549073] 
[   22.549397] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.549561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.549622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.549823] Call Trace:
[   22.549880]  <TASK>
[   22.549930]  dump_stack_lvl+0x73/0xb0
[   22.550012]  print_report+0xd1/0x650
[   22.550090]  ? __virt_addr_valid+0x1db/0x2d0
[   22.550165]  ? kasan_atomics_helper+0x565/0x5450
[   22.550240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.550361]  ? kasan_atomics_helper+0x565/0x5450
[   22.550449]  kasan_report+0x141/0x180
[   22.550551]  ? kasan_atomics_helper+0x565/0x5450
[   22.550732]  kasan_check_range+0x10c/0x1c0
[   22.550819]  __kasan_check_write+0x18/0x20
[   22.550890]  kasan_atomics_helper+0x565/0x5450
[   22.550980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.551040]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.551076]  ? kasan_atomics+0x152/0x310
[   22.551108]  kasan_atomics+0x1dc/0x310
[   22.551136]  ? __pfx_kasan_atomics+0x10/0x10
[   22.551165]  ? __pfx_read_tsc+0x10/0x10
[   22.551194]  ? ktime_get_ts64+0x86/0x230
[   22.551229]  kunit_try_run_case+0x1a5/0x480
[   22.551264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.551294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.551328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.551367]  ? __kthread_parkme+0x82/0x180
[   22.551399]  ? preempt_count_sub+0x50/0x80
[   22.551477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.551583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.551624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.551658]  kthread+0x337/0x6f0
[   22.551689]  ? trace_preempt_on+0x20/0xc0
[   22.551723]  ? __pfx_kthread+0x10/0x10
[   22.551755]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.551787]  ? calculate_sigpending+0x7b/0xa0
[   22.551818]  ? __pfx_kthread+0x10/0x10
[   22.551849]  ret_from_fork+0x41/0x80
[   22.551880]  ? __pfx_kthread+0x10/0x10
[   22.551912]  ret_from_fork_asm+0x1a/0x30
[   22.551954]  </TASK>
[   22.551968] 
[   22.574154] Allocated by task 285:
[   22.574520]  kasan_save_stack+0x45/0x70
[   22.575622]  kasan_save_track+0x18/0x40
[   22.576005]  kasan_save_alloc_info+0x3b/0x50
[   22.576753]  __kasan_kmalloc+0xb7/0xc0
[   22.577130]  __kmalloc_cache_noprof+0x189/0x420
[   22.577923]  kasan_atomics+0x95/0x310
[   22.578601]  kunit_try_run_case+0x1a5/0x480
[   22.579003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.580088]  kthread+0x337/0x6f0
[   22.580735]  ret_from_fork+0x41/0x80
[   22.581386]  ret_from_fork_asm+0x1a/0x30
[   22.582053] 
[   22.582302] The buggy address belongs to the object at ffff888102983600
[   22.582302]  which belongs to the cache kmalloc-64 of size 64
[   22.583922] The buggy address is located 0 bytes to the right of
[   22.583922]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.585594] 
[   22.586247] The buggy address belongs to the physical page:
[   22.586909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.587472] flags: 0x200000000000000(node=0|zone=2)
[   22.588403] page_type: f5(slab)
[   22.588913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.589477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.591017] page dumped because: kasan: bad access detected
[   22.591674] 
[   22.591840] Memory state around the buggy address:
[   22.592284]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.592946]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.593551] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.595365]                                      ^
[   22.595763]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.596297]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.597797] ==================================================================
[   22.812113] ==================================================================
[   22.813876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   22.814418] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.815230] 
[   22.815821] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.816222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.816243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.816277] Call Trace:
[   22.816301]  <TASK>
[   22.816327]  dump_stack_lvl+0x73/0xb0
[   22.816367]  print_report+0xd1/0x650
[   22.816401]  ? __virt_addr_valid+0x1db/0x2d0
[   22.816544]  ? kasan_atomics_helper+0x860/0x5450
[   22.816612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.816649]  ? kasan_atomics_helper+0x860/0x5450
[   22.816681]  kasan_report+0x141/0x180
[   22.816715]  ? kasan_atomics_helper+0x860/0x5450
[   22.816753]  kasan_check_range+0x10c/0x1c0
[   22.816789]  __kasan_check_write+0x18/0x20
[   22.816818]  kasan_atomics_helper+0x860/0x5450
[   22.816851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.816883]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.816917]  ? kasan_atomics+0x152/0x310
[   22.816948]  kasan_atomics+0x1dc/0x310
[   22.816975]  ? __pfx_kasan_atomics+0x10/0x10
[   22.817003]  ? __pfx_read_tsc+0x10/0x10
[   22.817032]  ? ktime_get_ts64+0x86/0x230
[   22.817068]  kunit_try_run_case+0x1a5/0x480
[   22.817103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.817133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.817167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.817201]  ? __kthread_parkme+0x82/0x180
[   22.817231]  ? preempt_count_sub+0x50/0x80
[   22.817266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.817299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.817332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.817366]  kthread+0x337/0x6f0
[   22.817396]  ? trace_preempt_on+0x20/0xc0
[   22.817777]  ? __pfx_kthread+0x10/0x10
[   22.817827]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.817862]  ? calculate_sigpending+0x7b/0xa0
[   22.817894]  ? __pfx_kthread+0x10/0x10
[   22.817927]  ret_from_fork+0x41/0x80
[   22.817957]  ? __pfx_kthread+0x10/0x10
[   22.817991]  ret_from_fork_asm+0x1a/0x30
[   22.818037]  </TASK>
[   22.818052] 
[   22.841534] Allocated by task 285:
[   22.842253]  kasan_save_stack+0x45/0x70
[   22.842914]  kasan_save_track+0x18/0x40
[   22.843464]  kasan_save_alloc_info+0x3b/0x50
[   22.844358]  __kasan_kmalloc+0xb7/0xc0
[   22.845184]  __kmalloc_cache_noprof+0x189/0x420
[   22.845993]  kasan_atomics+0x95/0x310
[   22.846310]  kunit_try_run_case+0x1a5/0x480
[   22.846802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.847765]  kthread+0x337/0x6f0
[   22.848054]  ret_from_fork+0x41/0x80
[   22.848353]  ret_from_fork_asm+0x1a/0x30
[   22.848768] 
[   22.849018] The buggy address belongs to the object at ffff888102983600
[   22.849018]  which belongs to the cache kmalloc-64 of size 64
[   22.851266] The buggy address is located 0 bytes to the right of
[   22.851266]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   22.852329] 
[   22.853411] The buggy address belongs to the physical page:
[   22.853961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   22.854937] flags: 0x200000000000000(node=0|zone=2)
[   22.855336] page_type: f5(slab)
[   22.855801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.857208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.858128] page dumped because: kasan: bad access detected
[   22.858871] 
[   22.859052] Memory state around the buggy address:
[   22.859407]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.860038]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.861088] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.862244]                                      ^
[   22.863405]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.863809]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.864188] ==================================================================
[   25.170849] ==================================================================
[   25.171493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   25.172083] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   25.172612] 
[   25.172847] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.172960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.172994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.173042] Call Trace:
[   25.173093]  <TASK>
[   25.173139]  dump_stack_lvl+0x73/0xb0
[   25.173204]  print_report+0xd1/0x650
[   25.173264]  ? __virt_addr_valid+0x1db/0x2d0
[   25.173325]  ? kasan_atomics_helper+0x5115/0x5450
[   25.173407]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.173500]  ? kasan_atomics_helper+0x5115/0x5450
[   25.173600]  kasan_report+0x141/0x180
[   25.173681]  ? kasan_atomics_helper+0x5115/0x5450
[   25.173773]  __asan_report_load8_noabort+0x18/0x20
[   25.173848]  kasan_atomics_helper+0x5115/0x5450
[   25.173927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.174004]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.174085]  ? kasan_atomics+0x152/0x310
[   25.174172]  kasan_atomics+0x1dc/0x310
[   25.174247]  ? __pfx_kasan_atomics+0x10/0x10
[   25.174326]  ? __pfx_read_tsc+0x10/0x10
[   25.174396]  ? ktime_get_ts64+0x86/0x230
[   25.174531]  kunit_try_run_case+0x1a5/0x480
[   25.174616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.174693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.174775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.174862]  ? __kthread_parkme+0x82/0x180
[   25.174943]  ? preempt_count_sub+0x50/0x80
[   25.175011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.175049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.175083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.175117]  kthread+0x337/0x6f0
[   25.175184]  ? trace_preempt_on+0x20/0xc0
[   25.175266]  ? __pfx_kthread+0x10/0x10
[   25.175347]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.175441]  ? calculate_sigpending+0x7b/0xa0
[   25.175543]  ? __pfx_kthread+0x10/0x10
[   25.175626]  ret_from_fork+0x41/0x80
[   25.175699]  ? __pfx_kthread+0x10/0x10
[   25.175774]  ret_from_fork_asm+0x1a/0x30
[   25.175878]  </TASK>
[   25.175919] 
[   25.190381] Allocated by task 285:
[   25.190852]  kasan_save_stack+0x45/0x70
[   25.191316]  kasan_save_track+0x18/0x40
[   25.191995]  kasan_save_alloc_info+0x3b/0x50
[   25.192386]  __kasan_kmalloc+0xb7/0xc0
[   25.192802]  __kmalloc_cache_noprof+0x189/0x420
[   25.193240]  kasan_atomics+0x95/0x310
[   25.193631]  kunit_try_run_case+0x1a5/0x480
[   25.194256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.194726]  kthread+0x337/0x6f0
[   25.195125]  ret_from_fork+0x41/0x80
[   25.195432]  ret_from_fork_asm+0x1a/0x30
[   25.195885] 
[   25.196125] The buggy address belongs to the object at ffff888102983600
[   25.196125]  which belongs to the cache kmalloc-64 of size 64
[   25.196845] The buggy address is located 0 bytes to the right of
[   25.196845]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   25.197938] 
[   25.198139] The buggy address belongs to the physical page:
[   25.198559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   25.199272] flags: 0x200000000000000(node=0|zone=2)
[   25.199866] page_type: f5(slab)
[   25.200287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.201327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.201966] page dumped because: kasan: bad access detected
[   25.202471] 
[   25.202722] Memory state around the buggy address:
[   25.203091]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.203714]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.204162] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.204711]                                      ^
[   25.205309]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.205997]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.206438] ==================================================================
[   24.989747] ==================================================================
[   24.990868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   24.991308] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.991748] 
[   24.991952] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.992075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.992112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.992167] Call Trace:
[   24.992218]  <TASK>
[   24.992270]  dump_stack_lvl+0x73/0xb0
[   24.992348]  print_report+0xd1/0x650
[   24.992422]  ? __virt_addr_valid+0x1db/0x2d0
[   24.993035]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.993541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.993632]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.993704]  kasan_report+0x141/0x180
[   24.993777]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.993853]  __asan_report_load8_noabort+0x18/0x20
[   24.993920]  kasan_atomics_helper+0x4fb2/0x5450
[   24.994000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.994072]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.994139]  ? kasan_atomics+0x152/0x310
[   24.994207]  kasan_atomics+0x1dc/0x310
[   24.994260]  ? __pfx_kasan_atomics+0x10/0x10
[   24.994311]  ? __pfx_read_tsc+0x10/0x10
[   24.994360]  ? ktime_get_ts64+0x86/0x230
[   24.994466]  kunit_try_run_case+0x1a5/0x480
[   24.994549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.994602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.994660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.994718]  ? __kthread_parkme+0x82/0x180
[   24.994771]  ? preempt_count_sub+0x50/0x80
[   24.994832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.994887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.994943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.994999]  kthread+0x337/0x6f0
[   24.995051]  ? trace_preempt_on+0x20/0xc0
[   24.995108]  ? __pfx_kthread+0x10/0x10
[   24.995160]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.995213]  ? calculate_sigpending+0x7b/0xa0
[   24.995272]  ? __pfx_kthread+0x10/0x10
[   24.995341]  ret_from_fork+0x41/0x80
[   24.995448]  ? __pfx_kthread+0x10/0x10
[   24.995551]  ret_from_fork_asm+0x1a/0x30
[   24.995654]  </TASK>
[   24.995693] 
[   25.020508] Allocated by task 285:
[   25.021288]  kasan_save_stack+0x45/0x70
[   25.021785]  kasan_save_track+0x18/0x40
[   25.022129]  kasan_save_alloc_info+0x3b/0x50
[   25.022556]  __kasan_kmalloc+0xb7/0xc0
[   25.022942]  __kmalloc_cache_noprof+0x189/0x420
[   25.023337]  kasan_atomics+0x95/0x310
[   25.024180]  kunit_try_run_case+0x1a5/0x480
[   25.025370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.025978]  kthread+0x337/0x6f0
[   25.026268]  ret_from_fork+0x41/0x80
[   25.026643]  ret_from_fork_asm+0x1a/0x30
[   25.027679] 
[   25.027970] The buggy address belongs to the object at ffff888102983600
[   25.027970]  which belongs to the cache kmalloc-64 of size 64
[   25.029223] The buggy address is located 0 bytes to the right of
[   25.029223]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   25.030218] 
[   25.030788] The buggy address belongs to the physical page:
[   25.031252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   25.032035] flags: 0x200000000000000(node=0|zone=2)
[   25.033017] page_type: f5(slab)
[   25.033329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.034085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.034337] page dumped because: kasan: bad access detected
[   25.035144] 
[   25.035307] Memory state around the buggy address:
[   25.036145]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.037120]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.037668] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.038249]                                      ^
[   25.038749]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.039748]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.040298] ==================================================================
[   22.967994] ==================================================================
[   22.969465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   22.969811] Write of size 4 at addr ffff888102983630 by task kunit_try_catch/285
[   22.970057] 
[   22.970166] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   22.970232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.970252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.970283] Call Trace:
[   22.970308]  <TASK>
[   22.970332]  dump_stack_lvl+0x73/0xb0
[   22.970371]  print_report+0xd1/0x650
[   22.970404]  ? __virt_addr_valid+0x1db/0x2d0
[   22.970474]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.970664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.970749]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.970830]  kasan_report+0x141/0x180
[   22.970913]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.971028]  kasan_check_range+0x10c/0x1c0
[   22.971133]  __kasan_check_write+0x18/0x20
[   22.971209]  kasan_atomics_helper+0xa2b/0x5450
[   22.971288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.971364]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.971444]  ? kasan_atomics+0x152/0x310
[   22.971550]  kasan_atomics+0x1dc/0x310
[   22.971738]  ? __pfx_kasan_atomics+0x10/0x10
[   22.971823]  ? __pfx_read_tsc+0x10/0x10
[   22.971898]  ? ktime_get_ts64+0x86/0x230
[   22.972013]  kunit_try_run_case+0x1a5/0x480
[   22.972125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.972198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.972255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.972292]  ? __kthread_parkme+0x82/0x180
[   22.972325]  ? preempt_count_sub+0x50/0x80
[   22.972361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.972395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.972467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.972579]  kthread+0x337/0x6f0
[   22.972658]  ? trace_preempt_on+0x20/0xc0
[   22.972741]  ? __pfx_kthread+0x10/0x10
[   22.972817]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.972901]  ? calculate_sigpending+0x7b/0xa0
[   22.972936]  ? __pfx_kthread+0x10/0x10
[   22.972970]  ret_from_fork+0x41/0x80
[   22.973002]  ? __pfx_kthread+0x10/0x10
[   22.973034]  ret_from_fork_asm+0x1a/0x30
[   22.973078]  </TASK>
[   22.973093] 
[   22.992782] Allocated by task 285:
[   22.993215]  kasan_save_stack+0x45/0x70
[   22.993808]  kasan_save_track+0x18/0x40
[   22.994181]  kasan_save_alloc_info+0x3b/0x50
[   22.994757]  __kasan_kmalloc+0xb7/0xc0
[   22.995168]  __kmalloc_cache_noprof+0x189/0x420
[   22.995784]  kasan_atomics+0x95/0x310
[   22.996101]  kunit_try_run_case+0x1a5/0x480
[   22.996435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.996964]  kthread+0x337/0x6f0
[   22.997506]  ret_from_fork+0x41/0x80
[   22.997929]  ret_from_fork_asm+0x1a/0x30
[   22.998364] 
[   22.999083] The buggy address belongs to the object at ffff888102983600
[   22.999083]  which belongs to the cache kmalloc-64 of size 64
[   22.999802] The buggy address is located 0 bytes to the right of
[   22.999802]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.001118] 
[   23.001322] The buggy address belongs to the physical page:
[   23.001724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.002466] flags: 0x200000000000000(node=0|zone=2)
[   23.003132] page_type: f5(slab)
[   23.003530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.004329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.005354] page dumped because: kasan: bad access detected
[   23.005755] 
[   23.005944] Memory state around the buggy address:
[   23.006404]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.007122]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.007903] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.008336]                                      ^
[   23.008855]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.009566]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.010188] ==================================================================
[   24.680150] ==================================================================
[   24.680830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   24.681323] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.682032] 
[   24.682319] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.682452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.682722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.682793] Call Trace:
[   24.682886]  <TASK>
[   24.682945]  dump_stack_lvl+0x73/0xb0
[   24.683034]  print_report+0xd1/0x650
[   24.683116]  ? __virt_addr_valid+0x1db/0x2d0
[   24.683194]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.683265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.683344]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.683419]  kasan_report+0x141/0x180
[   24.683517]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.683611]  kasan_check_range+0x10c/0x1c0
[   24.683692]  __kasan_check_write+0x18/0x20
[   24.683765]  kasan_atomics_helper+0x1e12/0x5450
[   24.683845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.683924]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.684045]  ? kasan_atomics+0x152/0x310
[   24.684137]  kasan_atomics+0x1dc/0x310
[   24.684251]  ? __pfx_kasan_atomics+0x10/0x10
[   24.684331]  ? __pfx_read_tsc+0x10/0x10
[   24.684400]  ? ktime_get_ts64+0x86/0x230
[   24.684467]  kunit_try_run_case+0x1a5/0x480
[   24.684561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.684672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.684761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.684846]  ? __kthread_parkme+0x82/0x180
[   24.684922]  ? preempt_count_sub+0x50/0x80
[   24.685025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.685112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.685338]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.685489]  kthread+0x337/0x6f0
[   24.685581]  ? trace_preempt_on+0x20/0xc0
[   24.685670]  ? __pfx_kthread+0x10/0x10
[   24.685748]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.685824]  ? calculate_sigpending+0x7b/0xa0
[   24.685944]  ? __pfx_kthread+0x10/0x10
[   24.686024]  ret_from_fork+0x41/0x80
[   24.686099]  ? __pfx_kthread+0x10/0x10
[   24.686177]  ret_from_fork_asm+0x1a/0x30
[   24.686317]  </TASK>
[   24.686361] 
[   24.702335] Allocated by task 285:
[   24.702850]  kasan_save_stack+0x45/0x70
[   24.703347]  kasan_save_track+0x18/0x40
[   24.703827]  kasan_save_alloc_info+0x3b/0x50
[   24.704230]  __kasan_kmalloc+0xb7/0xc0
[   24.704640]  __kmalloc_cache_noprof+0x189/0x420
[   24.704991]  kasan_atomics+0x95/0x310
[   24.705304]  kunit_try_run_case+0x1a5/0x480
[   24.707079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.708880]  kthread+0x337/0x6f0
[   24.710164]  ret_from_fork+0x41/0x80
[   24.710819]  ret_from_fork_asm+0x1a/0x30
[   24.711848] 
[   24.712329] The buggy address belongs to the object at ffff888102983600
[   24.712329]  which belongs to the cache kmalloc-64 of size 64
[   24.713832] The buggy address is located 0 bytes to the right of
[   24.713832]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.714862] 
[   24.715069] The buggy address belongs to the physical page:
[   24.715812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.716981] flags: 0x200000000000000(node=0|zone=2)
[   24.717371] page_type: f5(slab)
[   24.717747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.718383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.719126] page dumped because: kasan: bad access detected
[   24.719676] 
[   24.719883] Memory state around the buggy address:
[   24.720345]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.720988]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.722003] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.722669]                                      ^
[   24.723014]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.724132]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.725786] ==================================================================
[   24.897214] ==================================================================
[   24.899153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   24.900035] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.900895] 
[   24.901437] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.901662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.901705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.901763] Call Trace:
[   24.901815]  <TASK>
[   24.901868]  dump_stack_lvl+0x73/0xb0
[   24.901951]  print_report+0xd1/0x650
[   24.902055]  ? __virt_addr_valid+0x1db/0x2d0
[   24.902166]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.902243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.902319]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.902393]  kasan_report+0x141/0x180
[   24.902507]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.902603]  __asan_report_load8_noabort+0x18/0x20
[   24.902680]  kasan_atomics_helper+0x4f98/0x5450
[   24.902774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.902814]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.902849]  ? kasan_atomics+0x152/0x310
[   24.902882]  kasan_atomics+0x1dc/0x310
[   24.902910]  ? __pfx_kasan_atomics+0x10/0x10
[   24.902939]  ? __pfx_read_tsc+0x10/0x10
[   24.902967]  ? ktime_get_ts64+0x86/0x230
[   24.903004]  kunit_try_run_case+0x1a5/0x480
[   24.903038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.903069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.903104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.903138]  ? __kthread_parkme+0x82/0x180
[   24.903169]  ? preempt_count_sub+0x50/0x80
[   24.903205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.903237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.903269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.903302]  kthread+0x337/0x6f0
[   24.903331]  ? trace_preempt_on+0x20/0xc0
[   24.903365]  ? __pfx_kthread+0x10/0x10
[   24.903397]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.903468]  ? calculate_sigpending+0x7b/0xa0
[   24.903531]  ? __pfx_kthread+0x10/0x10
[   24.903566]  ret_from_fork+0x41/0x80
[   24.903598]  ? __pfx_kthread+0x10/0x10
[   24.903630]  ret_from_fork_asm+0x1a/0x30
[   24.903674]  </TASK>
[   24.903689] 
[   24.919174] Allocated by task 285:
[   24.919692]  kasan_save_stack+0x45/0x70
[   24.920105]  kasan_save_track+0x18/0x40
[   24.920427]  kasan_save_alloc_info+0x3b/0x50
[   24.920963]  __kasan_kmalloc+0xb7/0xc0
[   24.921389]  __kmalloc_cache_noprof+0x189/0x420
[   24.921913]  kasan_atomics+0x95/0x310
[   24.922303]  kunit_try_run_case+0x1a5/0x480
[   24.922661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.923066]  kthread+0x337/0x6f0
[   24.923443]  ret_from_fork+0x41/0x80
[   24.923948]  ret_from_fork_asm+0x1a/0x30
[   24.924699] 
[   24.924962] The buggy address belongs to the object at ffff888102983600
[   24.924962]  which belongs to the cache kmalloc-64 of size 64
[   24.926090] The buggy address is located 0 bytes to the right of
[   24.926090]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.927149] 
[   24.927342] The buggy address belongs to the physical page:
[   24.927728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.928523] flags: 0x200000000000000(node=0|zone=2)
[   24.929098] page_type: f5(slab)
[   24.929579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.930452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.931244] page dumped because: kasan: bad access detected
[   24.931752] 
[   24.932022] Memory state around the buggy address:
[   24.932369]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.933938]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.936019] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.936674]                                      ^
[   24.937058]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.937687]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.938190] ==================================================================
[   24.727620] ==================================================================
[   24.728279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   24.728704] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.729193] 
[   24.729415] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.729555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.729604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.729654] Call Trace:
[   24.729695]  <TASK>
[   24.729733]  dump_stack_lvl+0x73/0xb0
[   24.729791]  print_report+0xd1/0x650
[   24.729847]  ? __virt_addr_valid+0x1db/0x2d0
[   24.729901]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.729971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.730035]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.730091]  kasan_report+0x141/0x180
[   24.730147]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.730214]  kasan_check_range+0x10c/0x1c0
[   24.730273]  __kasan_check_write+0x18/0x20
[   24.730325]  kasan_atomics_helper+0x1eaa/0x5450
[   24.730383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.730444]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.731258]  ? kasan_atomics+0x152/0x310
[   24.731787]  kasan_atomics+0x1dc/0x310
[   24.731855]  ? __pfx_kasan_atomics+0x10/0x10
[   24.731915]  ? __pfx_read_tsc+0x10/0x10
[   24.731977]  ? ktime_get_ts64+0x86/0x230
[   24.732058]  kunit_try_run_case+0x1a5/0x480
[   24.732137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.732208]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.732285]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.732363]  ? __kthread_parkme+0x82/0x180
[   24.732437]  ? preempt_count_sub+0x50/0x80
[   24.732572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.732655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.732734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.732812]  kthread+0x337/0x6f0
[   24.732885]  ? trace_preempt_on+0x20/0xc0
[   24.732962]  ? __pfx_kthread+0x10/0x10
[   24.733040]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.733115]  ? calculate_sigpending+0x7b/0xa0
[   24.733186]  ? __pfx_kthread+0x10/0x10
[   24.733263]  ret_from_fork+0x41/0x80
[   24.733331]  ? __pfx_kthread+0x10/0x10
[   24.733408]  ret_from_fork_asm+0x1a/0x30
[   24.733533]  </TASK>
[   24.733588] 
[   24.752461] Allocated by task 285:
[   24.752945]  kasan_save_stack+0x45/0x70
[   24.753464]  kasan_save_track+0x18/0x40
[   24.753930]  kasan_save_alloc_info+0x3b/0x50
[   24.754394]  __kasan_kmalloc+0xb7/0xc0
[   24.754857]  __kmalloc_cache_noprof+0x189/0x420
[   24.755347]  kasan_atomics+0x95/0x310
[   24.755803]  kunit_try_run_case+0x1a5/0x480
[   24.756166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.756669]  kthread+0x337/0x6f0
[   24.757062]  ret_from_fork+0x41/0x80
[   24.757533]  ret_from_fork_asm+0x1a/0x30
[   24.757976] 
[   24.758205] The buggy address belongs to the object at ffff888102983600
[   24.758205]  which belongs to the cache kmalloc-64 of size 64
[   24.759176] The buggy address is located 0 bytes to the right of
[   24.759176]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.759962] 
[   24.760162] The buggy address belongs to the physical page:
[   24.760619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.761338] flags: 0x200000000000000(node=0|zone=2)
[   24.761902] page_type: f5(slab)
[   24.762288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.763038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.763730] page dumped because: kasan: bad access detected
[   24.764244] 
[   24.764492] Memory state around the buggy address:
[   24.764838]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.765279]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.765952] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.766621]                                      ^
[   24.767082]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.769741]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.770338] ==================================================================
[   23.829503] ==================================================================
[   23.830948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   23.831639] Read of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   23.832270] 
[   23.832911] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   23.833028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.833066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.833099] Call Trace:
[   23.833126]  <TASK>
[   23.833163]  dump_stack_lvl+0x73/0xb0
[   23.833227]  print_report+0xd1/0x650
[   23.833265]  ? __virt_addr_valid+0x1db/0x2d0
[   23.833299]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.833333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.833367]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.833400]  kasan_report+0x141/0x180
[   23.833556]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.833650]  kasan_check_range+0x10c/0x1c0
[   23.833691]  __kasan_check_read+0x15/0x20
[   23.833720]  kasan_atomics_helper+0x13b5/0x5450
[   23.833754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.833786]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.833820]  ? kasan_atomics+0x152/0x310
[   23.833853]  kasan_atomics+0x1dc/0x310
[   23.833881]  ? __pfx_kasan_atomics+0x10/0x10
[   23.833909]  ? __pfx_read_tsc+0x10/0x10
[   23.833939]  ? ktime_get_ts64+0x86/0x230
[   23.833977]  kunit_try_run_case+0x1a5/0x480
[   23.834012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.834044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.834081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.834115]  ? __kthread_parkme+0x82/0x180
[   23.834146]  ? preempt_count_sub+0x50/0x80
[   23.834181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.834213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.834246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.834280]  kthread+0x337/0x6f0
[   23.834311]  ? trace_preempt_on+0x20/0xc0
[   23.834345]  ? __pfx_kthread+0x10/0x10
[   23.834377]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.834408]  ? calculate_sigpending+0x7b/0xa0
[   23.834510]  ? __pfx_kthread+0x10/0x10
[   23.834547]  ret_from_fork+0x41/0x80
[   23.834580]  ? __pfx_kthread+0x10/0x10
[   23.834612]  ret_from_fork_asm+0x1a/0x30
[   23.834656]  </TASK>
[   23.834670] 
[   23.854977] Allocated by task 285:
[   23.855374]  kasan_save_stack+0x45/0x70
[   23.856160]  kasan_save_track+0x18/0x40
[   23.856625]  kasan_save_alloc_info+0x3b/0x50
[   23.857041]  __kasan_kmalloc+0xb7/0xc0
[   23.857390]  __kmalloc_cache_noprof+0x189/0x420
[   23.858263]  kasan_atomics+0x95/0x310
[   23.858765]  kunit_try_run_case+0x1a5/0x480
[   23.859350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.860005]  kthread+0x337/0x6f0
[   23.860554]  ret_from_fork+0x41/0x80
[   23.860988]  ret_from_fork_asm+0x1a/0x30
[   23.861314] 
[   23.861845] The buggy address belongs to the object at ffff888102983600
[   23.861845]  which belongs to the cache kmalloc-64 of size 64
[   23.863202] The buggy address is located 0 bytes to the right of
[   23.863202]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   23.865036] 
[   23.865228] The buggy address belongs to the physical page:
[   23.865746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   23.867032] flags: 0x200000000000000(node=0|zone=2)
[   23.867523] page_type: f5(slab)
[   23.867835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.868463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.869224] page dumped because: kasan: bad access detected
[   23.870162] 
[   23.870333] Memory state around the buggy address:
[   23.870884]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.871927]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.872400] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.872991]                                      ^
[   23.873178]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.873424]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.874532] ==================================================================
[   24.853837] ==================================================================
[   24.854556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   24.855165] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   24.855740] 
[   24.856013] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   24.856148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.856192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.856251] Call Trace:
[   24.856306]  <TASK>
[   24.856357]  dump_stack_lvl+0x73/0xb0
[   24.856509]  print_report+0xd1/0x650
[   24.856593]  ? __virt_addr_valid+0x1db/0x2d0
[   24.856678]  ? kasan_atomics_helper+0x2006/0x5450
[   24.856755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.856837]  ? kasan_atomics_helper+0x2006/0x5450
[   24.856921]  kasan_report+0x141/0x180
[   24.857009]  ? kasan_atomics_helper+0x2006/0x5450
[   24.857099]  kasan_check_range+0x10c/0x1c0
[   24.857180]  __kasan_check_write+0x18/0x20
[   24.857251]  kasan_atomics_helper+0x2006/0x5450
[   24.857335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.857456]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.857562]  ? kasan_atomics+0x152/0x310
[   24.857656]  kasan_atomics+0x1dc/0x310
[   24.857729]  ? __pfx_kasan_atomics+0x10/0x10
[   24.857804]  ? __pfx_read_tsc+0x10/0x10
[   24.857874]  ? ktime_get_ts64+0x86/0x230
[   24.857953]  kunit_try_run_case+0x1a5/0x480
[   24.858001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.858035]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.858071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.858106]  ? __kthread_parkme+0x82/0x180
[   24.858138]  ? preempt_count_sub+0x50/0x80
[   24.858174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.858208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.858240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.858273]  kthread+0x337/0x6f0
[   24.858304]  ? trace_preempt_on+0x20/0xc0
[   24.858338]  ? __pfx_kthread+0x10/0x10
[   24.858370]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.858424]  ? calculate_sigpending+0x7b/0xa0
[   24.858505]  ? __pfx_kthread+0x10/0x10
[   24.858544]  ret_from_fork+0x41/0x80
[   24.858576]  ? __pfx_kthread+0x10/0x10
[   24.858610]  ret_from_fork_asm+0x1a/0x30
[   24.858654]  </TASK>
[   24.858669] 
[   24.877381] Allocated by task 285:
[   24.877758]  kasan_save_stack+0x45/0x70
[   24.878190]  kasan_save_track+0x18/0x40
[   24.878673]  kasan_save_alloc_info+0x3b/0x50
[   24.879331]  __kasan_kmalloc+0xb7/0xc0
[   24.879856]  __kmalloc_cache_noprof+0x189/0x420
[   24.880489]  kasan_atomics+0x95/0x310
[   24.881066]  kunit_try_run_case+0x1a5/0x480
[   24.881770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.882495]  kthread+0x337/0x6f0
[   24.883048]  ret_from_fork+0x41/0x80
[   24.883679]  ret_from_fork_asm+0x1a/0x30
[   24.884269] 
[   24.884617] The buggy address belongs to the object at ffff888102983600
[   24.884617]  which belongs to the cache kmalloc-64 of size 64
[   24.884992] The buggy address is located 0 bytes to the right of
[   24.884992]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   24.885367] 
[   24.885455] The buggy address belongs to the physical page:
[   24.886677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   24.887371] flags: 0x200000000000000(node=0|zone=2)
[   24.888126] page_type: f5(slab)
[   24.888817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.889461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.890112] page dumped because: kasan: bad access detected
[   24.890308] 
[   24.890397] Memory state around the buggy address:
[   24.891335]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.891947]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.892857] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.893890]                                      ^
[   24.894281]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.895205]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.896125] ==================================================================
[   25.122458] ==================================================================
[   25.123489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   25.124201] Write of size 8 at addr ffff888102983630 by task kunit_try_catch/285
[   25.125089] 
[   25.125431] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   25.125594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.125634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.125692] Call Trace:
[   25.125747]  <TASK>
[   25.125791]  dump_stack_lvl+0x73/0xb0
[   25.125865]  print_report+0xd1/0x650
[   25.125945]  ? __virt_addr_valid+0x1db/0x2d0
[   25.126090]  ? kasan_atomics_helper+0x224c/0x5450
[   25.126199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.126313]  ? kasan_atomics_helper+0x224c/0x5450
[   25.126425]  kasan_report+0x141/0x180
[   25.126561]  ? kasan_atomics_helper+0x224c/0x5450
[   25.126690]  kasan_check_range+0x10c/0x1c0
[   25.126869]  __kasan_check_write+0x18/0x20
[   25.126966]  kasan_atomics_helper+0x224c/0x5450
[   25.127059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.127140]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.127218]  ? kasan_atomics+0x152/0x310
[   25.127300]  kasan_atomics+0x1dc/0x310
[   25.127374]  ? __pfx_kasan_atomics+0x10/0x10
[   25.127456]  ? __pfx_read_tsc+0x10/0x10
[   25.127553]  ? ktime_get_ts64+0x86/0x230
[   25.127639]  kunit_try_run_case+0x1a5/0x480
[   25.127738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.127817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.127896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.127978]  ? __kthread_parkme+0x82/0x180
[   25.128053]  ? preempt_count_sub+0x50/0x80
[   25.128135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.128213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.128292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.128370]  kthread+0x337/0x6f0
[   25.128444]  ? trace_preempt_on+0x20/0xc0
[   25.128548]  ? __pfx_kthread+0x10/0x10
[   25.128621]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.128696]  ? calculate_sigpending+0x7b/0xa0
[   25.128772]  ? __pfx_kthread+0x10/0x10
[   25.128854]  ret_from_fork+0x41/0x80
[   25.128905]  ? __pfx_kthread+0x10/0x10
[   25.128980]  ret_from_fork_asm+0x1a/0x30
[   25.129120]  </TASK>
[   25.129163] 
[   25.150469] Allocated by task 285:
[   25.150976]  kasan_save_stack+0x45/0x70
[   25.151490]  kasan_save_track+0x18/0x40
[   25.152147]  kasan_save_alloc_info+0x3b/0x50
[   25.152600]  __kasan_kmalloc+0xb7/0xc0
[   25.153019]  __kmalloc_cache_noprof+0x189/0x420
[   25.153646]  kasan_atomics+0x95/0x310
[   25.153953]  kunit_try_run_case+0x1a5/0x480
[   25.154905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.155749]  kthread+0x337/0x6f0
[   25.156306]  ret_from_fork+0x41/0x80
[   25.156966]  ret_from_fork_asm+0x1a/0x30
[   25.157297] 
[   25.157824] The buggy address belongs to the object at ffff888102983600
[   25.157824]  which belongs to the cache kmalloc-64 of size 64
[   25.159088] The buggy address is located 0 bytes to the right of
[   25.159088]  allocated 48-byte region [ffff888102983600, ffff888102983630)
[   25.160361] 
[   25.160587] The buggy address belongs to the physical page:
[   25.160983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102983
[   25.161636] flags: 0x200000000000000(node=0|zone=2)
[   25.162017] page_type: f5(slab)
[   25.162320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.162961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.163498] page dumped because: kasan: bad access detected
[   25.164329] 
[   25.164662] Memory state around the buggy address:
[   25.165066]  ffff888102983500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.165655]  ffff888102983580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.166316] >ffff888102983600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.167520]                                      ^
[   25.168255]  ffff888102983680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.169033]  ffff888102983700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.169625] ==================================================================

[   22.477909] ==================================================================
[   22.478584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   22.479258] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.479932] 
[   22.480087] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.480124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.480134] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.480146] Call trace:
[   22.480155]  show_stack+0x20/0x38 (C)
[   22.480178]  dump_stack_lvl+0x8c/0xd0
[   22.480200]  print_report+0x118/0x608
[   22.480219]  kasan_report+0xdc/0x128
[   22.480238]  kasan_check_range+0x100/0x1a8
[   22.480259]  __kasan_check_write+0x20/0x30
[   22.480281]  kasan_atomics_helper+0x24c/0x4858
[   22.480299]  kasan_atomics+0x198/0x2e0
[   22.480317]  kunit_try_run_case+0x170/0x3f0
[   22.480342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.480368]  kthread+0x328/0x630
[   22.480391]  ret_from_fork+0x10/0x20
[   22.480413] 
[   22.486599] Allocated by task 323:
[   22.486917]  kasan_save_stack+0x3c/0x68
[   22.487278]  kasan_save_track+0x20/0x40
[   22.487637]  kasan_save_alloc_info+0x40/0x58
[   22.488037]  __kasan_kmalloc+0xd4/0xd8
[   22.488388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.488815]  kasan_atomics+0xb8/0x2e0
[   22.489157]  kunit_try_run_case+0x170/0x3f0
[   22.489550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.490058]  kthread+0x328/0x630
[   22.490368]  ret_from_fork+0x10/0x20
[   22.490705] 
[   22.490852] The buggy address belongs to the object at ffff00000ea09200
[   22.490852]  which belongs to the cache kmalloc-64 of size 64
[   22.491953] The buggy address is located 0 bytes to the right of
[   22.491953]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.493104] 
[   22.493251] The buggy address belongs to the physical page:
[   22.493757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.494468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.495066] page_type: f5(slab)
[   22.495367] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.496068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.496764] page dumped because: kasan: bad access detected
[   22.497269] 
[   22.497414] Memory state around the buggy address:
[   22.497853]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.498505]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.499158] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.499809]                                      ^
[   22.500247]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500901]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.501551] ==================================================================
[   22.862340] ==================================================================
[   22.862980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   22.863626] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.864280] 
[   22.864420] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.864434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.864438] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.864444] Call trace:
[   22.864447]  show_stack+0x20/0x38 (C)
[   22.864457]  dump_stack_lvl+0x8c/0xd0
[   22.864466]  print_report+0x118/0x608
[   22.864475]  kasan_report+0xdc/0x128
[   22.864483]  kasan_check_range+0x100/0x1a8
[   22.864492]  __kasan_check_write+0x20/0x30
[   22.864502]  kasan_atomics_helper+0x894/0x4858
[   22.864510]  kasan_atomics+0x198/0x2e0
[   22.864518]  kunit_try_run_case+0x170/0x3f0
[   22.864529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.864541]  kthread+0x328/0x630
[   22.864551]  ret_from_fork+0x10/0x20
[   22.864561] 
[   22.870686] Allocated by task 323:
[   22.870990]  kasan_save_stack+0x3c/0x68
[   22.871334]  kasan_save_track+0x20/0x40
[   22.871678]  kasan_save_alloc_info+0x40/0x58
[   22.872060]  __kasan_kmalloc+0xd4/0xd8
[   22.872397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.872805]  kasan_atomics+0xb8/0x2e0
[   22.873134]  kunit_try_run_case+0x170/0x3f0
[   22.873509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.874000]  kthread+0x328/0x630
[   22.874293]  ret_from_fork+0x10/0x20
[   22.874615] 
[   22.874752] The buggy address belongs to the object at ffff00000ea09200
[   22.874752]  which belongs to the cache kmalloc-64 of size 64
[   22.875834] The buggy address is located 0 bytes to the right of
[   22.875834]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.876963] 
[   22.877102] The buggy address belongs to the physical page:
[   22.877593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.878285] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.878862] page_type: f5(slab)
[   22.879147] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.879831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.880513] page dumped because: kasan: bad access detected
[   22.881005] 
[   22.881143] Memory state around the buggy address:
[   22.881568]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.882206]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.882843] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.883481]                                      ^
[   22.883907]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.884543]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.885180] ==================================================================
[   23.096545] ==================================================================
[   23.097183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   23.097829] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.098483] 
[   23.098621] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.098636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.098641] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.098646] Call trace:
[   23.098649]  show_stack+0x20/0x38 (C)
[   23.098658]  dump_stack_lvl+0x8c/0xd0
[   23.098667]  print_report+0x118/0x608
[   23.098676]  kasan_report+0xdc/0x128
[   23.098684]  kasan_check_range+0x100/0x1a8
[   23.098694]  __kasan_check_write+0x20/0x30
[   23.098704]  kasan_atomics_helper+0xc08/0x4858
[   23.098712]  kasan_atomics+0x198/0x2e0
[   23.098720]  kunit_try_run_case+0x170/0x3f0
[   23.098732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.098744]  kthread+0x328/0x630
[   23.098754]  ret_from_fork+0x10/0x20
[   23.098764] 
[   23.104885] Allocated by task 323:
[   23.105189]  kasan_save_stack+0x3c/0x68
[   23.105535]  kasan_save_track+0x20/0x40
[   23.105878]  kasan_save_alloc_info+0x40/0x58
[   23.106261]  __kasan_kmalloc+0xd4/0xd8
[   23.106598]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.107005]  kasan_atomics+0xb8/0x2e0
[   23.107334]  kunit_try_run_case+0x170/0x3f0
[   23.107710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.108199]  kthread+0x328/0x630
[   23.108492]  ret_from_fork+0x10/0x20
[   23.108814] 
[   23.108952] The buggy address belongs to the object at ffff00000ea09200
[   23.108952]  which belongs to the cache kmalloc-64 of size 64
[   23.110034] The buggy address is located 0 bytes to the right of
[   23.110034]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.111164] 
[   23.111301] The buggy address belongs to the physical page:
[   23.111794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.112485] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.113063] page_type: f5(slab)
[   23.113346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.114030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.114712] page dumped because: kasan: bad access detected
[   23.115204] 
[   23.115341] Memory state around the buggy address:
[   23.115765]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.116401]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.117038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.117674]                                      ^
[   23.118098]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118735]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.119370] ==================================================================
[   22.401964] ==================================================================
[   22.403347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   22.404047] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.404727] 
[   22.404894] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.404944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.404959] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.404978] Call trace:
[   22.404991]  show_stack+0x20/0x38 (C)
[   22.405024]  dump_stack_lvl+0x8c/0xd0
[   22.405058]  print_report+0x118/0x608
[   22.405090]  kasan_report+0xdc/0x128
[   22.405119]  __asan_report_load4_noabort+0x20/0x30
[   22.405154]  kasan_atomics_helper+0x40a8/0x4858
[   22.405184]  kasan_atomics+0x198/0x2e0
[   22.405211]  kunit_try_run_case+0x170/0x3f0
[   22.405247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.405288]  kthread+0x328/0x630
[   22.405323]  ret_from_fork+0x10/0x20
[   22.405358] 
[   22.411305] Allocated by task 323:
[   22.411632]  kasan_save_stack+0x3c/0x68
[   22.412008]  kasan_save_track+0x20/0x40
[   22.412380]  kasan_save_alloc_info+0x40/0x58
[   22.412794]  __kasan_kmalloc+0xd4/0xd8
[   22.413159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.413602]  kasan_atomics+0xb8/0x2e0
[   22.413959]  kunit_try_run_case+0x170/0x3f0
[   22.414367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.414893]  kthread+0x328/0x630
[   22.415219]  ret_from_fork+0x10/0x20
[   22.415570] 
[   22.415725] The buggy address belongs to the object at ffff00000ea09200
[   22.415725]  which belongs to the cache kmalloc-64 of size 64
[   22.416845] The buggy address is located 0 bytes to the right of
[   22.416845]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.418012] 
[   22.418168] The buggy address belongs to the physical page:
[   22.418685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.419412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.420025] page_type: f5(slab)
[   22.420340] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.421057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.421766] page dumped because: kasan: bad access detected
[   22.422283] 
[   22.422436] Memory state around the buggy address:
[   22.422886]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.423554]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.424222] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.424886]                                      ^
[   22.425336]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.426004]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.426667] ==================================================================
[   22.909039] ==================================================================
[   22.909676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   22.910322] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.910975] 
[   22.911114] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.911128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.911132] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.911137] Call trace:
[   22.911140]  show_stack+0x20/0x38 (C)
[   22.911149]  dump_stack_lvl+0x8c/0xd0
[   22.911158]  print_report+0x118/0x608
[   22.911167]  kasan_report+0xdc/0x128
[   22.911175]  kasan_check_range+0x100/0x1a8
[   22.911184]  __kasan_check_write+0x20/0x30
[   22.911194]  kasan_atomics_helper+0x934/0x4858
[   22.911203]  kasan_atomics+0x198/0x2e0
[   22.911211]  kunit_try_run_case+0x170/0x3f0
[   22.911221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.911233]  kthread+0x328/0x630
[   22.911242]  ret_from_fork+0x10/0x20
[   22.911252] 
[   22.917372] Allocated by task 323:
[   22.917676]  kasan_save_stack+0x3c/0x68
[   22.918021]  kasan_save_track+0x20/0x40
[   22.918365]  kasan_save_alloc_info+0x40/0x58
[   22.918747]  __kasan_kmalloc+0xd4/0xd8
[   22.919084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.919491]  kasan_atomics+0xb8/0x2e0
[   22.919820]  kunit_try_run_case+0x170/0x3f0
[   22.920195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.920685]  kthread+0x328/0x630
[   22.920978]  ret_from_fork+0x10/0x20
[   22.921300] 
[   22.921436] The buggy address belongs to the object at ffff00000ea09200
[   22.921436]  which belongs to the cache kmalloc-64 of size 64
[   22.922519] The buggy address is located 0 bytes to the right of
[   22.922519]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.923648] 
[   22.923785] The buggy address belongs to the physical page:
[   22.924276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.924968] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.925547] page_type: f5(slab)
[   22.925831] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.926515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.927197] page dumped because: kasan: bad access detected
[   22.927689] 
[   22.927825] Memory state around the buggy address:
[   22.928251]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.928888]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.929525] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.930161]                                      ^
[   22.930586]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.931225]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.931862] ==================================================================
[   23.588495] ==================================================================
[   23.589132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   23.589785] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.590439] 
[   23.590577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.590591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.590595] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.590601] Call trace:
[   23.590604]  show_stack+0x20/0x38 (C)
[   23.590613]  dump_stack_lvl+0x8c/0xd0
[   23.590621]  print_report+0x118/0x608
[   23.590630]  kasan_report+0xdc/0x128
[   23.590638]  kasan_check_range+0x100/0x1a8
[   23.590648]  __kasan_check_write+0x20/0x30
[   23.590657]  kasan_atomics_helper+0x1384/0x4858
[   23.590666]  kasan_atomics+0x198/0x2e0
[   23.590674]  kunit_try_run_case+0x170/0x3f0
[   23.590684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.590695]  kthread+0x328/0x630
[   23.590705]  ret_from_fork+0x10/0x20
[   23.590715] 
[   23.596845] Allocated by task 323:
[   23.597149]  kasan_save_stack+0x3c/0x68
[   23.597495]  kasan_save_track+0x20/0x40
[   23.597838]  kasan_save_alloc_info+0x40/0x58
[   23.598221]  __kasan_kmalloc+0xd4/0xd8
[   23.598558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.598965]  kasan_atomics+0xb8/0x2e0
[   23.599293]  kunit_try_run_case+0x170/0x3f0
[   23.599671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.600161]  kthread+0x328/0x630
[   23.600454]  ret_from_fork+0x10/0x20
[   23.600777] 
[   23.600913] The buggy address belongs to the object at ffff00000ea09200
[   23.600913]  which belongs to the cache kmalloc-64 of size 64
[   23.601996] The buggy address is located 0 bytes to the right of
[   23.601996]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.603125] 
[   23.603262] The buggy address belongs to the physical page:
[   23.603754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.604445] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.605024] page_type: f5(slab)
[   23.605307] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.605991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.606673] page dumped because: kasan: bad access detected
[   23.607166] 
[   23.607302] Memory state around the buggy address:
[   23.607727]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.608364]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.609001] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.609637]                                      ^
[   23.610063]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.610700]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.611336] ==================================================================
[   22.599189] ==================================================================
[   22.599843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   22.600505] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.601174] 
[   22.601323] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.601355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.601365] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.601376] Call trace:
[   22.601383]  show_stack+0x20/0x38 (C)
[   22.601403]  dump_stack_lvl+0x8c/0xd0
[   22.601422]  print_report+0x118/0x608
[   22.601442]  kasan_report+0xdc/0x128
[   22.601461]  kasan_check_range+0x100/0x1a8
[   22.601481]  __kasan_check_write+0x20/0x30
[   22.601502]  kasan_atomics_helper+0x3ac/0x4858
[   22.601522]  kasan_atomics+0x198/0x2e0
[   22.601539]  kunit_try_run_case+0x170/0x3f0
[   22.601561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.601588]  kthread+0x328/0x630
[   22.601610]  ret_from_fork+0x10/0x20
[   22.601631] 
[   22.607813] Allocated by task 323:
[   22.608129]  kasan_save_stack+0x3c/0x68
[   22.608489]  kasan_save_track+0x20/0x40
[   22.608847]  kasan_save_alloc_info+0x40/0x58
[   22.609246]  __kasan_kmalloc+0xd4/0xd8
[   22.609597]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.610023]  kasan_atomics+0xb8/0x2e0
[   22.610365]  kunit_try_run_case+0x170/0x3f0
[   22.610757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.611266]  kthread+0x328/0x630
[   22.611575]  ret_from_fork+0x10/0x20
[   22.611913] 
[   22.612059] The buggy address belongs to the object at ffff00000ea09200
[   22.612059]  which belongs to the cache kmalloc-64 of size 64
[   22.613160] The buggy address is located 0 bytes to the right of
[   22.613160]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.614309] 
[   22.614455] The buggy address belongs to the physical page:
[   22.614958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.615665] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.616258] page_type: f5(slab)
[   22.616555] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.617254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.617949] page dumped because: kasan: bad access detected
[   22.618453] 
[   22.618598] Memory state around the buggy address:
[   22.619035]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.619688]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.620340] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.620990]                                      ^
[   22.621427]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622080]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622729] ==================================================================
[   22.695668] ==================================================================
[   22.696312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   22.696965] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.697625] 
[   22.697768] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.697790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.697796] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.697804] Call trace:
[   22.697809]  show_stack+0x20/0x38 (C)
[   22.697823]  dump_stack_lvl+0x8c/0xd0
[   22.697836]  print_report+0x118/0x608
[   22.697849]  kasan_report+0xdc/0x128
[   22.697861]  kasan_check_range+0x100/0x1a8
[   22.697875]  __kasan_check_write+0x20/0x30
[   22.697890]  kasan_atomics_helper+0x54c/0x4858
[   22.697903]  kasan_atomics+0x198/0x2e0
[   22.697915]  kunit_try_run_case+0x170/0x3f0
[   22.697930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.697948]  kthread+0x328/0x630
[   22.697963]  ret_from_fork+0x10/0x20
[   22.697978] 
[   22.704121] Allocated by task 323:
[   22.704430]  kasan_save_stack+0x3c/0x68
[   22.704781]  kasan_save_track+0x20/0x40
[   22.705131]  kasan_save_alloc_info+0x40/0x58
[   22.705520]  __kasan_kmalloc+0xd4/0xd8
[   22.705862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.706277]  kasan_atomics+0xb8/0x2e0
[   22.706612]  kunit_try_run_case+0x170/0x3f0
[   22.706994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707492]  kthread+0x328/0x630
[   22.707792]  ret_from_fork+0x10/0x20
[   22.708120] 
[   22.708260] The buggy address belongs to the object at ffff00000ea09200
[   22.708260]  which belongs to the cache kmalloc-64 of size 64
[   22.709350] The buggy address is located 0 bytes to the right of
[   22.709350]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.710487] 
[   22.710627] The buggy address belongs to the physical page:
[   22.711124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.711822] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.712407] page_type: f5(slab)
[   22.712697] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.713387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.714073] page dumped because: kasan: bad access detected
[   22.714571] 
[   22.714711] Memory state around the buggy address:
[   22.715141]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.715784]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.716428] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.717069]                                      ^
[   22.717500]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718144]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718785] ==================================================================
[   23.120032] ==================================================================
[   23.120670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   23.121323] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.121968] 
[   23.122108] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.122122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.122126] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.122131] Call trace:
[   23.122135]  show_stack+0x20/0x38 (C)
[   23.122144]  dump_stack_lvl+0x8c/0xd0
[   23.122153]  print_report+0x118/0x608
[   23.122161]  kasan_report+0xdc/0x128
[   23.122170]  __asan_report_load4_noabort+0x20/0x30
[   23.122180]  kasan_atomics_helper+0x3de4/0x4858
[   23.122189]  kasan_atomics+0x198/0x2e0
[   23.122197]  kunit_try_run_case+0x170/0x3f0
[   23.122207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.122219]  kthread+0x328/0x630
[   23.122229]  ret_from_fork+0x10/0x20
[   23.122239] 
[   23.128068] Allocated by task 323:
[   23.128373]  kasan_save_stack+0x3c/0x68
[   23.128717]  kasan_save_track+0x20/0x40
[   23.129061]  kasan_save_alloc_info+0x40/0x58
[   23.129444]  __kasan_kmalloc+0xd4/0xd8
[   23.129781]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.130188]  kasan_atomics+0xb8/0x2e0
[   23.130517]  kunit_try_run_case+0x170/0x3f0
[   23.130893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.131383]  kthread+0x328/0x630
[   23.131677]  ret_from_fork+0x10/0x20
[   23.131999] 
[   23.132136] The buggy address belongs to the object at ffff00000ea09200
[   23.132136]  which belongs to the cache kmalloc-64 of size 64
[   23.133219] The buggy address is located 0 bytes to the right of
[   23.133219]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.134348] 
[   23.134485] The buggy address belongs to the physical page:
[   23.134977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.135669] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.136247] page_type: f5(slab)
[   23.136532] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.137216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.137897] page dumped because: kasan: bad access detected
[   23.138389] 
[   23.138526] Memory state around the buggy address:
[   23.138951]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.139590]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.140226] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.140862]                                      ^
[   23.141288]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.141925]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.142560] ==================================================================
[   22.452586] ==================================================================
[   22.453260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   22.453941] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.454620] 
[   22.454785] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.454836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.454851] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.454869] Call trace:
[   22.454882]  show_stack+0x20/0x38 (C)
[   22.454914]  dump_stack_lvl+0x8c/0xd0
[   22.454947]  print_report+0x118/0x608
[   22.454978]  kasan_report+0xdc/0x128
[   22.455007]  kasan_check_range+0x100/0x1a8
[   22.455040]  __kasan_check_read+0x20/0x30
[   22.455073]  kasan_atomics_helper+0x1ec/0x4858
[   22.455103]  kasan_atomics+0x198/0x2e0
[   22.455131]  kunit_try_run_case+0x170/0x3f0
[   22.455167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.455207]  kthread+0x328/0x630
[   22.455242]  ret_from_fork+0x10/0x20
[   22.455275] 
[   22.461516] Allocated by task 323:
[   22.461844]  kasan_save_stack+0x3c/0x68
[   22.462219]  kasan_save_track+0x20/0x40
[   22.462592]  kasan_save_alloc_info+0x40/0x58
[   22.463007]  __kasan_kmalloc+0xd4/0xd8
[   22.463371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.463815]  kasan_atomics+0xb8/0x2e0
[   22.464171]  kunit_try_run_case+0x170/0x3f0
[   22.464580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.465105]  kthread+0x328/0x630
[   22.465430]  ret_from_fork+0x10/0x20
[   22.465782] 
[   22.465937] The buggy address belongs to the object at ffff00000ea09200
[   22.465937]  which belongs to the cache kmalloc-64 of size 64
[   22.467057] The buggy address is located 0 bytes to the right of
[   22.467057]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.468224] 
[   22.468380] The buggy address belongs to the physical page:
[   22.468897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.469624] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.470238] page_type: f5(slab)
[   22.470551] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.471268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.471977] page dumped because: kasan: bad access detected
[   22.472494] 
[   22.472648] Memory state around the buggy address:
[   22.473096]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.473764]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.474432] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.475094]                                      ^
[   22.475543]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.476211]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.476874] ==================================================================
[   23.705677] ==================================================================
[   23.706315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   23.706967] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.707621] 
[   23.707759] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.707773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.707778] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.707783] Call trace:
[   23.707786]  show_stack+0x20/0x38 (C)
[   23.707795]  dump_stack_lvl+0x8c/0xd0
[   23.707803]  print_report+0x118/0x608
[   23.707812]  kasan_report+0xdc/0x128
[   23.707821]  kasan_check_range+0x100/0x1a8
[   23.707830]  __kasan_check_write+0x20/0x30
[   23.707840]  kasan_atomics_helper+0x154c/0x4858
[   23.707848]  kasan_atomics+0x198/0x2e0
[   23.707856]  kunit_try_run_case+0x170/0x3f0
[   23.707867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.707878]  kthread+0x328/0x630
[   23.707888]  ret_from_fork+0x10/0x20
[   23.707898] 
[   23.714025] Allocated by task 323:
[   23.714330]  kasan_save_stack+0x3c/0x68
[   23.714674]  kasan_save_track+0x20/0x40
[   23.715018]  kasan_save_alloc_info+0x40/0x58
[   23.715401]  __kasan_kmalloc+0xd4/0xd8
[   23.715738]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.716145]  kasan_atomics+0xb8/0x2e0
[   23.716474]  kunit_try_run_case+0x170/0x3f0
[   23.716849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.717339]  kthread+0x328/0x630
[   23.717632]  ret_from_fork+0x10/0x20
[   23.717954] 
[   23.718090] The buggy address belongs to the object at ffff00000ea09200
[   23.718090]  which belongs to the cache kmalloc-64 of size 64
[   23.719173] The buggy address is located 0 bytes to the right of
[   23.719173]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.720303] 
[   23.720440] The buggy address belongs to the physical page:
[   23.720931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.721623] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.722200] page_type: f5(slab)
[   23.722485] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.723169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.723851] page dumped because: kasan: bad access detected
[   23.724343] 
[   23.724481] Memory state around the buggy address:
[   23.724906]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.725544]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.726182] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.726818]                                      ^
[   23.727243]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.727880]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.728515] ==================================================================
[   23.143222] ==================================================================
[   23.143859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   23.144504] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.145158] 
[   23.145296] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.145311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.145315] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.145320] Call trace:
[   23.145323]  show_stack+0x20/0x38 (C)
[   23.145332]  dump_stack_lvl+0x8c/0xd0
[   23.145341]  print_report+0x118/0x608
[   23.145350]  kasan_report+0xdc/0x128
[   23.145358]  kasan_check_range+0x100/0x1a8
[   23.145367]  __kasan_check_write+0x20/0x30
[   23.145377]  kasan_atomics_helper+0xca0/0x4858
[   23.145385]  kasan_atomics+0x198/0x2e0
[   23.145393]  kunit_try_run_case+0x170/0x3f0
[   23.145404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.145416]  kthread+0x328/0x630
[   23.145426]  ret_from_fork+0x10/0x20
[   23.145436] 
[   23.151559] Allocated by task 323:
[   23.151863]  kasan_save_stack+0x3c/0x68
[   23.152207]  kasan_save_track+0x20/0x40
[   23.152552]  kasan_save_alloc_info+0x40/0x58
[   23.152935]  __kasan_kmalloc+0xd4/0xd8
[   23.153272]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.153679]  kasan_atomics+0xb8/0x2e0
[   23.154008]  kunit_try_run_case+0x170/0x3f0
[   23.154384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.154875]  kthread+0x328/0x630
[   23.155168]  ret_from_fork+0x10/0x20
[   23.155490] 
[   23.155627] The buggy address belongs to the object at ffff00000ea09200
[   23.155627]  which belongs to the cache kmalloc-64 of size 64
[   23.156709] The buggy address is located 0 bytes to the right of
[   23.156709]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.157838] 
[   23.157976] The buggy address belongs to the physical page:
[   23.158467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.159159] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.159738] page_type: f5(slab)
[   23.160022] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.160706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.161388] page dumped because: kasan: bad access detected
[   23.161879] 
[   23.162016] Memory state around the buggy address:
[   23.162441]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.163078]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.163715] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.164350]                                      ^
[   23.164775]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.165413]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.166049] ==================================================================
[   23.541475] ==================================================================
[   23.542112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   23.542765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.543419] 
[   23.543557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.543571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.543575] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.543581] Call trace:
[   23.543584]  show_stack+0x20/0x38 (C)
[   23.543593]  dump_stack_lvl+0x8c/0xd0
[   23.543601]  print_report+0x118/0x608
[   23.543610]  kasan_report+0xdc/0x128
[   23.543618]  kasan_check_range+0x100/0x1a8
[   23.543627]  __kasan_check_write+0x20/0x30
[   23.543637]  kasan_atomics_helper+0x126c/0x4858
[   23.543646]  kasan_atomics+0x198/0x2e0
[   23.543654]  kunit_try_run_case+0x170/0x3f0
[   23.543664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.543675]  kthread+0x328/0x630
[   23.543685]  ret_from_fork+0x10/0x20
[   23.543695] 
[   23.549823] Allocated by task 323:
[   23.550127]  kasan_save_stack+0x3c/0x68
[   23.550471]  kasan_save_track+0x20/0x40
[   23.550815]  kasan_save_alloc_info+0x40/0x58
[   23.551198]  __kasan_kmalloc+0xd4/0xd8
[   23.551534]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.551942]  kasan_atomics+0xb8/0x2e0
[   23.552270]  kunit_try_run_case+0x170/0x3f0
[   23.552646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553137]  kthread+0x328/0x630
[   23.553429]  ret_from_fork+0x10/0x20
[   23.553752] 
[   23.553888] The buggy address belongs to the object at ffff00000ea09200
[   23.553888]  which belongs to the cache kmalloc-64 of size 64
[   23.554971] The buggy address is located 0 bytes to the right of
[   23.554971]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.556100] 
[   23.556238] The buggy address belongs to the physical page:
[   23.556729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.557421] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.558000] page_type: f5(slab)
[   23.558284] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.558968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.559650] page dumped because: kasan: bad access detected
[   23.560142] 
[   23.560280] Memory state around the buggy address:
[   23.560705]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.561344]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.561981] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.562618]                                      ^
[   23.563044]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.563681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.564316] ==================================================================
[   23.729167] ==================================================================
[   23.729804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   23.730457] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.731111] 
[   23.731249] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.731263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.731268] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.731273] Call trace:
[   23.731276]  show_stack+0x20/0x38 (C)
[   23.731285]  dump_stack_lvl+0x8c/0xd0
[   23.731294]  print_report+0x118/0x608
[   23.731302]  kasan_report+0xdc/0x128
[   23.731311]  kasan_check_range+0x100/0x1a8
[   23.731320]  __kasan_check_write+0x20/0x30
[   23.731329]  kasan_atomics_helper+0x15b4/0x4858
[   23.731338]  kasan_atomics+0x198/0x2e0
[   23.731346]  kunit_try_run_case+0x170/0x3f0
[   23.731356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.731368]  kthread+0x328/0x630
[   23.731378]  ret_from_fork+0x10/0x20
[   23.731388] 
[   23.737512] Allocated by task 323:
[   23.737816]  kasan_save_stack+0x3c/0x68
[   23.738161]  kasan_save_track+0x20/0x40
[   23.738505]  kasan_save_alloc_info+0x40/0x58
[   23.738888]  __kasan_kmalloc+0xd4/0xd8
[   23.739225]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.739632]  kasan_atomics+0xb8/0x2e0
[   23.739961]  kunit_try_run_case+0x170/0x3f0
[   23.740337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.740827]  kthread+0x328/0x630
[   23.741120]  ret_from_fork+0x10/0x20
[   23.741443] 
[   23.741579] The buggy address belongs to the object at ffff00000ea09200
[   23.741579]  which belongs to the cache kmalloc-64 of size 64
[   23.742662] The buggy address is located 0 bytes to the right of
[   23.742662]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.743791] 
[   23.743928] The buggy address belongs to the physical page:
[   23.744419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.745111] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.745688] page_type: f5(slab)
[   23.745972] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.746656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.747338] page dumped because: kasan: bad access detected
[   23.747830] 
[   23.747966] Memory state around the buggy address:
[   23.748392]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.749029]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.749666] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.750302]                                      ^
[   23.750726]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.751363]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.752000] ==================================================================
[   22.502445] ==================================================================
[   22.503102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   22.503765] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.504428] 
[   22.504577] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.504611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.504621] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.504631] Call trace:
[   22.504640]  show_stack+0x20/0x38 (C)
[   22.504660]  dump_stack_lvl+0x8c/0xd0
[   22.504678]  print_report+0x118/0x608
[   22.504697]  kasan_report+0xdc/0x128
[   22.504716]  kasan_check_range+0x100/0x1a8
[   22.504737]  __kasan_check_read+0x20/0x30
[   22.504757]  kasan_atomics_helper+0x2b0/0x4858
[   22.504776]  kasan_atomics+0x198/0x2e0
[   22.504793]  kunit_try_run_case+0x170/0x3f0
[   22.504816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.504843]  kthread+0x328/0x630
[   22.504864]  ret_from_fork+0x10/0x20
[   22.504885] 
[   22.511057] Allocated by task 323:
[   22.511373]  kasan_save_stack+0x3c/0x68
[   22.511733]  kasan_save_track+0x20/0x40
[   22.512091]  kasan_save_alloc_info+0x40/0x58
[   22.512490]  __kasan_kmalloc+0xd4/0xd8
[   22.512841]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.513268]  kasan_atomics+0xb8/0x2e0
[   22.513609]  kunit_try_run_case+0x170/0x3f0
[   22.514002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.514509]  kthread+0x328/0x630
[   22.514818]  ret_from_fork+0x10/0x20
[   22.515156] 
[   22.515302] The buggy address belongs to the object at ffff00000ea09200
[   22.515302]  which belongs to the cache kmalloc-64 of size 64
[   22.516403] The buggy address is located 0 bytes to the right of
[   22.516403]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.517551] 
[   22.517697] The buggy address belongs to the physical page:
[   22.518201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.518909] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.519503] page_type: f5(slab)
[   22.519802] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.520502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.521196] page dumped because: kasan: bad access detected
[   22.521700] 
[   22.521845] Memory state around the buggy address:
[   22.522282]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.522934]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.523587] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.524237]                                      ^
[   22.524675]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.525327]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.525976] ==================================================================
[   23.049795] ==================================================================
[   23.050434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   23.051079] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.051733] 
[   23.051871] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.051886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.051890] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.051895] Call trace:
[   23.051898]  show_stack+0x20/0x38 (C)
[   23.051909]  dump_stack_lvl+0x8c/0xd0
[   23.051917]  print_report+0x118/0x608
[   23.051926]  kasan_report+0xdc/0x128
[   23.051934]  kasan_check_range+0x100/0x1a8
[   23.051943]  __kasan_check_write+0x20/0x30
[   23.051953]  kasan_atomics_helper+0xb70/0x4858
[   23.051962]  kasan_atomics+0x198/0x2e0
[   23.051970]  kunit_try_run_case+0x170/0x3f0
[   23.051980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.051993]  kthread+0x328/0x630
[   23.052003]  ret_from_fork+0x10/0x20
[   23.052012] 
[   23.058133] Allocated by task 323:
[   23.058437]  kasan_save_stack+0x3c/0x68
[   23.058783]  kasan_save_track+0x20/0x40
[   23.059127]  kasan_save_alloc_info+0x40/0x58
[   23.059510]  __kasan_kmalloc+0xd4/0xd8
[   23.059847]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.060255]  kasan_atomics+0xb8/0x2e0
[   23.060584]  kunit_try_run_case+0x170/0x3f0
[   23.060960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.061449]  kthread+0x328/0x630
[   23.061742]  ret_from_fork+0x10/0x20
[   23.062064] 
[   23.062202] The buggy address belongs to the object at ffff00000ea09200
[   23.062202]  which belongs to the cache kmalloc-64 of size 64
[   23.063285] The buggy address is located 0 bytes to the right of
[   23.063285]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.064414] 
[   23.064553] The buggy address belongs to the physical page:
[   23.065044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.065735] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.066312] page_type: f5(slab)
[   23.066597] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.067281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.067963] page dumped because: kasan: bad access detected
[   23.068454] 
[   23.068591] Memory state around the buggy address:
[   23.069017]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.069653]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.070290] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.070927]                                      ^
[   23.071353]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071990]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.072627] ==================================================================
[   23.775847] ==================================================================
[   23.776484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   23.777137] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.777791] 
[   23.777929] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.777943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.777947] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.777952] Call trace:
[   23.777955]  show_stack+0x20/0x38 (C)
[   23.777965]  dump_stack_lvl+0x8c/0xd0
[   23.777973]  print_report+0x118/0x608
[   23.777982]  kasan_report+0xdc/0x128
[   23.777990]  kasan_check_range+0x100/0x1a8
[   23.777999]  __kasan_check_write+0x20/0x30
[   23.778010]  kasan_atomics_helper+0x1644/0x4858
[   23.778018]  kasan_atomics+0x198/0x2e0
[   23.778026]  kunit_try_run_case+0x170/0x3f0
[   23.778037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.778048]  kthread+0x328/0x630
[   23.778058]  ret_from_fork+0x10/0x20
[   23.778067] 
[   23.784197] Allocated by task 323:
[   23.784502]  kasan_save_stack+0x3c/0x68
[   23.784847]  kasan_save_track+0x20/0x40
[   23.785191]  kasan_save_alloc_info+0x40/0x58
[   23.785574]  __kasan_kmalloc+0xd4/0xd8
[   23.785911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.786318]  kasan_atomics+0xb8/0x2e0
[   23.786646]  kunit_try_run_case+0x170/0x3f0
[   23.787022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.787513]  kthread+0x328/0x630
[   23.787805]  ret_from_fork+0x10/0x20
[   23.788128] 
[   23.788265] The buggy address belongs to the object at ffff00000ea09200
[   23.788265]  which belongs to the cache kmalloc-64 of size 64
[   23.789347] The buggy address is located 0 bytes to the right of
[   23.789347]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.790477] 
[   23.790613] The buggy address belongs to the physical page:
[   23.791105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.791796] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.792375] page_type: f5(slab)
[   23.792660] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.793344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.794026] page dumped because: kasan: bad access detected
[   23.794518] 
[   23.794656] Memory state around the buggy address:
[   23.795081]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.795720]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.796357] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.796993]                                      ^
[   23.797419]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.798055]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.798690] ==================================================================
[   22.932516] ==================================================================
[   22.933154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.933800] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.934454] 
[   22.934592] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.934607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.934611] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.934617] Call trace:
[   22.934620]  show_stack+0x20/0x38 (C)
[   22.934629]  dump_stack_lvl+0x8c/0xd0
[   22.934638]  print_report+0x118/0x608
[   22.934647]  kasan_report+0xdc/0x128
[   22.934655]  kasan_check_range+0x100/0x1a8
[   22.934664]  __kasan_check_write+0x20/0x30
[   22.934674]  kasan_atomics_helper+0x99c/0x4858
[   22.934683]  kasan_atomics+0x198/0x2e0
[   22.934690]  kunit_try_run_case+0x170/0x3f0
[   22.934701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.934712]  kthread+0x328/0x630
[   22.934722]  ret_from_fork+0x10/0x20
[   22.934732] 
[   22.940855] Allocated by task 323:
[   22.941159]  kasan_save_stack+0x3c/0x68
[   22.941503]  kasan_save_track+0x20/0x40
[   22.941847]  kasan_save_alloc_info+0x40/0x58
[   22.942229]  __kasan_kmalloc+0xd4/0xd8
[   22.942567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.942973]  kasan_atomics+0xb8/0x2e0
[   22.943302]  kunit_try_run_case+0x170/0x3f0
[   22.943677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.944167]  kthread+0x328/0x630
[   22.944459]  ret_from_fork+0x10/0x20
[   22.944781] 
[   22.944918] The buggy address belongs to the object at ffff00000ea09200
[   22.944918]  which belongs to the cache kmalloc-64 of size 64
[   22.946000] The buggy address is located 0 bytes to the right of
[   22.946000]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.947130] 
[   22.947266] The buggy address belongs to the physical page:
[   22.947758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.948449] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.949027] page_type: f5(slab)
[   22.949311] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.949995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.950677] page dumped because: kasan: bad access detected
[   22.951168] 
[   22.951305] Memory state around the buggy address:
[   22.951730]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.952367]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.953004] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.953641]                                      ^
[   22.954065]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954702]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.955337] ==================================================================
[   23.494474] ==================================================================
[   23.495112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   23.495765] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.496419] 
[   23.496557] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.496572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.496577] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.496581] Call trace:
[   23.496585]  show_stack+0x20/0x38 (C)
[   23.496594]  dump_stack_lvl+0x8c/0xd0
[   23.496603]  print_report+0x118/0x608
[   23.496611]  kasan_report+0xdc/0x128
[   23.496619]  kasan_check_range+0x100/0x1a8
[   23.496629]  __kasan_check_write+0x20/0x30
[   23.496638]  kasan_atomics_helper+0x1190/0x4858
[   23.496647]  kasan_atomics+0x198/0x2e0
[   23.496655]  kunit_try_run_case+0x170/0x3f0
[   23.496666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.496678]  kthread+0x328/0x630
[   23.496687]  ret_from_fork+0x10/0x20
[   23.496697] 
[   23.502825] Allocated by task 323:
[   23.503129]  kasan_save_stack+0x3c/0x68
[   23.503475]  kasan_save_track+0x20/0x40
[   23.503820]  kasan_save_alloc_info+0x40/0x58
[   23.504203]  __kasan_kmalloc+0xd4/0xd8
[   23.504540]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.504947]  kasan_atomics+0xb8/0x2e0
[   23.505276]  kunit_try_run_case+0x170/0x3f0
[   23.505652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.506144]  kthread+0x328/0x630
[   23.506436]  ret_from_fork+0x10/0x20
[   23.506758] 
[   23.506895] The buggy address belongs to the object at ffff00000ea09200
[   23.506895]  which belongs to the cache kmalloc-64 of size 64
[   23.507978] The buggy address is located 0 bytes to the right of
[   23.507978]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.509107] 
[   23.509245] The buggy address belongs to the physical page:
[   23.509737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.510428] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.511006] page_type: f5(slab)
[   23.511290] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.511974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.512656] page dumped because: kasan: bad access detected
[   23.513147] 
[   23.513284] Memory state around the buggy address:
[   23.513709]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.514346]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.514983] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.515619]                                      ^
[   23.516044]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.516681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.517318] ==================================================================
[   22.955995] ==================================================================
[   22.956632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   22.957277] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.957932] 
[   22.958070] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.958084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.958088] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.958093] Call trace:
[   22.958097]  show_stack+0x20/0x38 (C)
[   22.958106]  dump_stack_lvl+0x8c/0xd0
[   22.958114]  print_report+0x118/0x608
[   22.958123]  kasan_report+0xdc/0x128
[   22.958131]  kasan_check_range+0x100/0x1a8
[   22.958140]  __kasan_check_write+0x20/0x30
[   22.958150]  kasan_atomics_helper+0xa04/0x4858
[   22.958159]  kasan_atomics+0x198/0x2e0
[   22.958167]  kunit_try_run_case+0x170/0x3f0
[   22.958177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.958189]  kthread+0x328/0x630
[   22.958199]  ret_from_fork+0x10/0x20
[   22.958209] 
[   22.964332] Allocated by task 323:
[   22.964636]  kasan_save_stack+0x3c/0x68
[   22.964980]  kasan_save_track+0x20/0x40
[   22.965324]  kasan_save_alloc_info+0x40/0x58
[   22.965707]  __kasan_kmalloc+0xd4/0xd8
[   22.966044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.966451]  kasan_atomics+0xb8/0x2e0
[   22.966780]  kunit_try_run_case+0x170/0x3f0
[   22.967155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.967646]  kthread+0x328/0x630
[   22.967939]  ret_from_fork+0x10/0x20
[   22.968261] 
[   22.968398] The buggy address belongs to the object at ffff00000ea09200
[   22.968398]  which belongs to the cache kmalloc-64 of size 64
[   22.969480] The buggy address is located 0 bytes to the right of
[   22.969480]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.970609] 
[   22.970746] The buggy address belongs to the physical page:
[   22.971237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.971927] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.972506] page_type: f5(slab)
[   22.972789] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.973472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.974154] page dumped because: kasan: bad access detected
[   22.974646] 
[   22.974782] Memory state around the buggy address:
[   22.975208]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.975844]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.976483] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.977118]                                      ^
[   22.977544]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.978181]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.978817] ==================================================================
[   23.447434] ==================================================================
[   23.448071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   23.448724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.449377] 
[   23.449517] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.449531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.449536] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.449541] Call trace:
[   23.449544]  show_stack+0x20/0x38 (C)
[   23.449554]  dump_stack_lvl+0x8c/0xd0
[   23.449562]  print_report+0x118/0x608
[   23.449571]  kasan_report+0xdc/0x128
[   23.449579]  kasan_check_range+0x100/0x1a8
[   23.449589]  __kasan_check_write+0x20/0x30
[   23.449599]  kasan_atomics_helper+0x10c0/0x4858
[   23.449607]  kasan_atomics+0x198/0x2e0
[   23.449615]  kunit_try_run_case+0x170/0x3f0
[   23.449626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.449638]  kthread+0x328/0x630
[   23.449648]  ret_from_fork+0x10/0x20
[   23.449657] 
[   23.455784] Allocated by task 323:
[   23.456089]  kasan_save_stack+0x3c/0x68
[   23.456432]  kasan_save_track+0x20/0x40
[   23.456777]  kasan_save_alloc_info+0x40/0x58
[   23.457160]  __kasan_kmalloc+0xd4/0xd8
[   23.457497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.457904]  kasan_atomics+0xb8/0x2e0
[   23.458233]  kunit_try_run_case+0x170/0x3f0
[   23.458608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.459099]  kthread+0x328/0x630
[   23.459392]  ret_from_fork+0x10/0x20
[   23.459714] 
[   23.459851] The buggy address belongs to the object at ffff00000ea09200
[   23.459851]  which belongs to the cache kmalloc-64 of size 64
[   23.460933] The buggy address is located 0 bytes to the right of
[   23.460933]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.462062] 
[   23.462199] The buggy address belongs to the physical page:
[   23.462691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.463383] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.463960] page_type: f5(slab)
[   23.464245] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.464929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.465611] page dumped because: kasan: bad access detected
[   23.466103] 
[   23.466239] Memory state around the buggy address:
[   23.466665]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.467302]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.467940] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.468578]                                      ^
[   23.469002]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.469639]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.470274] ==================================================================
[   23.236622] ==================================================================
[   23.237259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   23.237905] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.238550] 
[   23.238688] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.238702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.238707] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.238712] Call trace:
[   23.238715]  show_stack+0x20/0x38 (C)
[   23.238724]  dump_stack_lvl+0x8c/0xd0
[   23.238733]  print_report+0x118/0x608
[   23.238741]  kasan_report+0xdc/0x128
[   23.238750]  kasan_check_range+0x100/0x1a8
[   23.238759]  __kasan_check_read+0x20/0x30
[   23.238769]  kasan_atomics_helper+0xdd4/0x4858
[   23.238778]  kasan_atomics+0x198/0x2e0
[   23.238786]  kunit_try_run_case+0x170/0x3f0
[   23.238796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.238808]  kthread+0x328/0x630
[   23.238818]  ret_from_fork+0x10/0x20
[   23.238827] 
[   23.244941] Allocated by task 323:
[   23.245245]  kasan_save_stack+0x3c/0x68
[   23.245589]  kasan_save_track+0x20/0x40
[   23.245933]  kasan_save_alloc_info+0x40/0x58
[   23.246316]  __kasan_kmalloc+0xd4/0xd8
[   23.246652]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.247059]  kasan_atomics+0xb8/0x2e0
[   23.247387]  kunit_try_run_case+0x170/0x3f0
[   23.247763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.248253]  kthread+0x328/0x630
[   23.248546]  ret_from_fork+0x10/0x20
[   23.248868] 
[   23.249005] The buggy address belongs to the object at ffff00000ea09200
[   23.249005]  which belongs to the cache kmalloc-64 of size 64
[   23.250087] The buggy address is located 0 bytes to the right of
[   23.250087]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.251217] 
[   23.251353] The buggy address belongs to the physical page:
[   23.251845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.252537] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.253114] page_type: f5(slab)
[   23.253399] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.254082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.254764] page dumped because: kasan: bad access detected
[   23.255255] 
[   23.255393] Memory state around the buggy address:
[   23.255819]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.256457]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.257096] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.257731]                                      ^
[   23.258157]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.258795]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.259431] ==================================================================
[   22.814929] ==================================================================
[   22.815574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   22.816228] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.816888] 
[   22.817030] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.817052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.817059] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.817067] Call trace:
[   22.817072]  show_stack+0x20/0x38 (C)
[   22.817085]  dump_stack_lvl+0x8c/0xd0
[   22.817098]  print_report+0x118/0x608
[   22.817111]  kasan_report+0xdc/0x128
[   22.817124]  kasan_check_range+0x100/0x1a8
[   22.817138]  __kasan_check_write+0x20/0x30
[   22.817153]  kasan_atomics_helper+0x760/0x4858
[   22.817166]  kasan_atomics+0x198/0x2e0
[   22.817178]  kunit_try_run_case+0x170/0x3f0
[   22.817193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.817210]  kthread+0x328/0x630
[   22.817225]  ret_from_fork+0x10/0x20
[   22.817240] 
[   22.823384] Allocated by task 323:
[   22.823692]  kasan_save_stack+0x3c/0x68
[   22.824043]  kasan_save_track+0x20/0x40
[   22.824393]  kasan_save_alloc_info+0x40/0x58
[   22.824783]  __kasan_kmalloc+0xd4/0xd8
[   22.825125]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.825540]  kasan_atomics+0xb8/0x2e0
[   22.825874]  kunit_try_run_case+0x170/0x3f0
[   22.826257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826754]  kthread+0x328/0x630
[   22.827054]  ret_from_fork+0x10/0x20
[   22.827383] 
[   22.827523] The buggy address belongs to the object at ffff00000ea09200
[   22.827523]  which belongs to the cache kmalloc-64 of size 64
[   22.828613] The buggy address is located 0 bytes to the right of
[   22.828613]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.829749] 
[   22.829891] The buggy address belongs to the physical page:
[   22.830389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.831087] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.831672] page_type: f5(slab)
[   22.831960] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.832651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.833339] page dumped because: kasan: bad access detected
[   22.833836] 
[   22.833976] Memory state around the buggy address:
[   22.834405]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835049]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835692] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.836334]                                      ^
[   22.836764]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.837408]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.838050] ==================================================================
[   23.213418] ==================================================================
[   23.214057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   23.214711] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.215356] 
[   23.215495] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.215509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.215513] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.215518] Call trace:
[   23.215521]  show_stack+0x20/0x38 (C)
[   23.215530]  dump_stack_lvl+0x8c/0xd0
[   23.215539]  print_report+0x118/0x608
[   23.215548]  kasan_report+0xdc/0x128
[   23.215556]  __asan_report_load4_noabort+0x20/0x30
[   23.215566]  kasan_atomics_helper+0x3e04/0x4858
[   23.215575]  kasan_atomics+0x198/0x2e0
[   23.215583]  kunit_try_run_case+0x170/0x3f0
[   23.215593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.215605]  kthread+0x328/0x630
[   23.215615]  ret_from_fork+0x10/0x20
[   23.215625] 
[   23.221456] Allocated by task 323:
[   23.221760]  kasan_save_stack+0x3c/0x68
[   23.222104]  kasan_save_track+0x20/0x40
[   23.222449]  kasan_save_alloc_info+0x40/0x58
[   23.222832]  __kasan_kmalloc+0xd4/0xd8
[   23.223169]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.223577]  kasan_atomics+0xb8/0x2e0
[   23.223906]  kunit_try_run_case+0x170/0x3f0
[   23.224282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.224772]  kthread+0x328/0x630
[   23.225064]  ret_from_fork+0x10/0x20
[   23.225387] 
[   23.225523] The buggy address belongs to the object at ffff00000ea09200
[   23.225523]  which belongs to the cache kmalloc-64 of size 64
[   23.226606] The buggy address is located 0 bytes to the right of
[   23.226606]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.227735] 
[   23.227873] The buggy address belongs to the physical page:
[   23.228364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.229056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.229635] page_type: f5(slab)
[   23.229918] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.230602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.231283] page dumped because: kasan: bad access detected
[   23.231775] 
[   23.231911] Memory state around the buggy address:
[   23.232336]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.232973]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.233610] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.234246]                                      ^
[   23.234671]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.235307]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.235943] ==================================================================
[   23.752658] ==================================================================
[   23.753295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   23.753948] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.754594] 
[   23.754732] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.754746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.754751] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.754755] Call trace:
[   23.754759]  show_stack+0x20/0x38 (C)
[   23.754768]  dump_stack_lvl+0x8c/0xd0
[   23.754776]  print_report+0x118/0x608
[   23.754784]  kasan_report+0xdc/0x128
[   23.754793]  __asan_report_load8_noabort+0x20/0x30
[   23.754803]  kasan_atomics_helper+0x3db0/0x4858
[   23.754812]  kasan_atomics+0x198/0x2e0
[   23.754820]  kunit_try_run_case+0x170/0x3f0
[   23.754830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.754842]  kthread+0x328/0x630
[   23.754852]  ret_from_fork+0x10/0x20
[   23.754861] 
[   23.760691] Allocated by task 323:
[   23.760995]  kasan_save_stack+0x3c/0x68
[   23.761341]  kasan_save_track+0x20/0x40
[   23.761685]  kasan_save_alloc_info+0x40/0x58
[   23.762067]  __kasan_kmalloc+0xd4/0xd8
[   23.762405]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.762812]  kasan_atomics+0xb8/0x2e0
[   23.763140]  kunit_try_run_case+0x170/0x3f0
[   23.763516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.764007]  kthread+0x328/0x630
[   23.764299]  ret_from_fork+0x10/0x20
[   23.764622] 
[   23.764760] The buggy address belongs to the object at ffff00000ea09200
[   23.764760]  which belongs to the cache kmalloc-64 of size 64
[   23.765842] The buggy address is located 0 bytes to the right of
[   23.765842]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.766972] 
[   23.767109] The buggy address belongs to the physical page:
[   23.767600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.768291] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.768869] page_type: f5(slab)
[   23.769154] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.769838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.770519] page dumped because: kasan: bad access detected
[   23.771011] 
[   23.771148] Memory state around the buggy address:
[   23.771574]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.772210]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.772847] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.773483]                                      ^
[   23.773908]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.774546]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.775182] ==================================================================
[   23.353479] ==================================================================
[   23.354115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   23.354760] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.355414] 
[   23.355552] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.355567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.355571] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.355576] Call trace:
[   23.355579]  show_stack+0x20/0x38 (C)
[   23.355588]  dump_stack_lvl+0x8c/0xd0
[   23.355597]  print_report+0x118/0x608
[   23.355605]  kasan_report+0xdc/0x128
[   23.355614]  kasan_check_range+0x100/0x1a8
[   23.355622]  __kasan_check_write+0x20/0x30
[   23.355632]  kasan_atomics_helper+0xf20/0x4858
[   23.355641]  kasan_atomics+0x198/0x2e0
[   23.355648]  kunit_try_run_case+0x170/0x3f0
[   23.355659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.355671]  kthread+0x328/0x630
[   23.355681]  ret_from_fork+0x10/0x20
[   23.355690] 
[   23.361813] Allocated by task 323:
[   23.362118]  kasan_save_stack+0x3c/0x68
[   23.362463]  kasan_save_track+0x20/0x40
[   23.362806]  kasan_save_alloc_info+0x40/0x58
[   23.363189]  __kasan_kmalloc+0xd4/0xd8
[   23.363526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.363933]  kasan_atomics+0xb8/0x2e0
[   23.364262]  kunit_try_run_case+0x170/0x3f0
[   23.364637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.365128]  kthread+0x328/0x630
[   23.365421]  ret_from_fork+0x10/0x20
[   23.365743] 
[   23.365881] The buggy address belongs to the object at ffff00000ea09200
[   23.365881]  which belongs to the cache kmalloc-64 of size 64
[   23.366964] The buggy address is located 0 bytes to the right of
[   23.366964]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.368093] 
[   23.368230] The buggy address belongs to the physical page:
[   23.368722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.369412] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.369990] page_type: f5(slab)
[   23.370274] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.370958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.371640] page dumped because: kasan: bad access detected
[   23.372132] 
[   23.372269] Memory state around the buggy address:
[   23.372693]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.373330]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.373966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.374603]                                      ^
[   23.375029]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.375666]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.376303] ==================================================================
[   22.427702] ==================================================================
[   22.428388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   22.429083] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.429768] 
[   22.429936] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.429988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.430003] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.430021] Call trace:
[   22.430035]  show_stack+0x20/0x38 (C)
[   22.430068]  dump_stack_lvl+0x8c/0xd0
[   22.430100]  print_report+0x118/0x608
[   22.430133]  kasan_report+0xdc/0x128
[   22.430163]  __asan_report_store4_noabort+0x20/0x30
[   22.430199]  kasan_atomics_helper+0x3f7c/0x4858
[   22.430230]  kasan_atomics+0x198/0x2e0
[   22.430257]  kunit_try_run_case+0x170/0x3f0
[   22.430294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.430335]  kthread+0x328/0x630
[   22.430370]  ret_from_fork+0x10/0x20
[   22.430404] 
[   22.436361] Allocated by task 323:
[   22.436690]  kasan_save_stack+0x3c/0x68
[   22.437065]  kasan_save_track+0x20/0x40
[   22.437439]  kasan_save_alloc_info+0x40/0x58
[   22.437854]  __kasan_kmalloc+0xd4/0xd8
[   22.438218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.438659]  kasan_atomics+0xb8/0x2e0
[   22.439016]  kunit_try_run_case+0x170/0x3f0
[   22.439424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.439951]  kthread+0x328/0x630
[   22.440275]  ret_from_fork+0x10/0x20
[   22.440626] 
[   22.440781] The buggy address belongs to the object at ffff00000ea09200
[   22.440781]  which belongs to the cache kmalloc-64 of size 64
[   22.441900] The buggy address is located 0 bytes to the right of
[   22.441900]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.443067] 
[   22.443223] The buggy address belongs to the physical page:
[   22.443740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.444465] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.445078] page_type: f5(slab)
[   22.445393] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.446820] page dumped because: kasan: bad access detected
[   22.447336] 
[   22.447490] Memory state around the buggy address:
[   22.447939]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.448608]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.449276] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.449939]                                      ^
[   22.450388]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451056]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451719] ==================================================================
[   22.719496] ==================================================================
[   22.720140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   22.720793] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.721452] 
[   22.721595] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.721616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.721623] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.721630] Call trace:
[   22.721635]  show_stack+0x20/0x38 (C)
[   22.721649]  dump_stack_lvl+0x8c/0xd0
[   22.721662]  print_report+0x118/0x608
[   22.721675]  kasan_report+0xdc/0x128
[   22.721687]  kasan_check_range+0x100/0x1a8
[   22.721701]  __kasan_check_write+0x20/0x30
[   22.721716]  kasan_atomics_helper+0x5b4/0x4858
[   22.721728]  kasan_atomics+0x198/0x2e0
[   22.721741]  kunit_try_run_case+0x170/0x3f0
[   22.721756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.721773]  kthread+0x328/0x630
[   22.721788]  ret_from_fork+0x10/0x20
[   22.721803] 
[   22.727949] Allocated by task 323:
[   22.728258]  kasan_save_stack+0x3c/0x68
[   22.728609]  kasan_save_track+0x20/0x40
[   22.728959]  kasan_save_alloc_info+0x40/0x58
[   22.729349]  __kasan_kmalloc+0xd4/0xd8
[   22.729691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.730106]  kasan_atomics+0xb8/0x2e0
[   22.730441]  kunit_try_run_case+0x170/0x3f0
[   22.730824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.731321]  kthread+0x328/0x630
[   22.731621]  ret_from_fork+0x10/0x20
[   22.731950] 
[   22.732090] The buggy address belongs to the object at ffff00000ea09200
[   22.732090]  which belongs to the cache kmalloc-64 of size 64
[   22.733180] The buggy address is located 0 bytes to the right of
[   22.733180]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.734317] 
[   22.734457] The buggy address belongs to the physical page:
[   22.734954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.735652] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.736237] page_type: f5(slab)
[   22.736528] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.737218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.737904] page dumped because: kasan: bad access detected
[   22.738402] 
[   22.738542] Memory state around the buggy address:
[   22.738972]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.739615]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740259] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.740901]                                      ^
[   22.741331]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.741974]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.742616] ==================================================================
[   23.846081] ==================================================================
[   23.846719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   23.847372] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.848018] 
[   23.848156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.848170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.848175] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.848179] Call trace:
[   23.848183]  show_stack+0x20/0x38 (C)
[   23.848192]  dump_stack_lvl+0x8c/0xd0
[   23.848201]  print_report+0x118/0x608
[   23.848210]  kasan_report+0xdc/0x128
[   23.848218]  __asan_report_load8_noabort+0x20/0x30
[   23.848229]  kasan_atomics_helper+0x3e10/0x4858
[   23.848237]  kasan_atomics+0x198/0x2e0
[   23.848245]  kunit_try_run_case+0x170/0x3f0
[   23.848255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848267]  kthread+0x328/0x630
[   23.848277]  ret_from_fork+0x10/0x20
[   23.848287] 
[   23.854112] Allocated by task 323:
[   23.854415]  kasan_save_stack+0x3c/0x68
[   23.854760]  kasan_save_track+0x20/0x40
[   23.855104]  kasan_save_alloc_info+0x40/0x58
[   23.855487]  __kasan_kmalloc+0xd4/0xd8
[   23.855824]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.856231]  kasan_atomics+0xb8/0x2e0
[   23.856560]  kunit_try_run_case+0x170/0x3f0
[   23.856937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.857427]  kthread+0x328/0x630
[   23.857721]  ret_from_fork+0x10/0x20
[   23.858043] 
[   23.858181] The buggy address belongs to the object at ffff00000ea09200
[   23.858181]  which belongs to the cache kmalloc-64 of size 64
[   23.859265] The buggy address is located 0 bytes to the right of
[   23.859265]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.860395] 
[   23.860531] The buggy address belongs to the physical page:
[   23.861023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.861715] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.862294] page_type: f5(slab)
[   23.862578] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.863262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.863944] page dumped because: kasan: bad access detected
[   23.864436] 
[   23.864573] Memory state around the buggy address:
[   23.864998]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.865635]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.866272] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.866909]                                      ^
[   23.867335]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.867972]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.868609] ==================================================================
[   23.799355] ==================================================================
[   23.799993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   23.800647] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.801293] 
[   23.801432] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.801446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.801450] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.801455] Call trace:
[   23.801458]  show_stack+0x20/0x38 (C)
[   23.801468]  dump_stack_lvl+0x8c/0xd0
[   23.801476]  print_report+0x118/0x608
[   23.801485]  kasan_report+0xdc/0x128
[   23.801493]  __asan_report_load8_noabort+0x20/0x30
[   23.801504]  kasan_atomics_helper+0x3df4/0x4858
[   23.801512]  kasan_atomics+0x198/0x2e0
[   23.801520]  kunit_try_run_case+0x170/0x3f0
[   23.801531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.801543]  kthread+0x328/0x630
[   23.801553]  ret_from_fork+0x10/0x20
[   23.801563] 
[   23.807390] Allocated by task 323:
[   23.807694]  kasan_save_stack+0x3c/0x68
[   23.808039]  kasan_save_track+0x20/0x40
[   23.808382]  kasan_save_alloc_info+0x40/0x58
[   23.808765]  __kasan_kmalloc+0xd4/0xd8
[   23.809102]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.809509]  kasan_atomics+0xb8/0x2e0
[   23.809838]  kunit_try_run_case+0x170/0x3f0
[   23.810213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.810703]  kthread+0x328/0x630
[   23.810996]  ret_from_fork+0x10/0x20
[   23.811318] 
[   23.811455] The buggy address belongs to the object at ffff00000ea09200
[   23.811455]  which belongs to the cache kmalloc-64 of size 64
[   23.812538] The buggy address is located 0 bytes to the right of
[   23.812538]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.813667] 
[   23.813804] The buggy address belongs to the physical page:
[   23.814296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.814988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.815565] page_type: f5(slab)
[   23.815850] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.816532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.817214] page dumped because: kasan: bad access detected
[   23.817706] 
[   23.817843] Memory state around the buggy address:
[   23.818268]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.818907]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.819546] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.820181]                                      ^
[   23.820607]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.821244]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.821880] ==================================================================
[   23.915986] ==================================================================
[   23.916623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   23.917277] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.917931] 
[   23.918069] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.918084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.918088] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.918093] Call trace:
[   23.918096]  show_stack+0x20/0x38 (C)
[   23.918105]  dump_stack_lvl+0x8c/0xd0
[   23.918114]  print_report+0x118/0x608
[   23.918123]  kasan_report+0xdc/0x128
[   23.918132]  kasan_check_range+0x100/0x1a8
[   23.918141]  __kasan_check_write+0x20/0x30
[   23.918150]  kasan_atomics_helper+0x17ec/0x4858
[   23.918159]  kasan_atomics+0x198/0x2e0
[   23.918166]  kunit_try_run_case+0x170/0x3f0
[   23.918178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.918190]  kthread+0x328/0x630
[   23.918200]  ret_from_fork+0x10/0x20
[   23.918209] 
[   23.924336] Allocated by task 323:
[   23.924641]  kasan_save_stack+0x3c/0x68
[   23.924985]  kasan_save_track+0x20/0x40
[   23.925329]  kasan_save_alloc_info+0x40/0x58
[   23.925711]  __kasan_kmalloc+0xd4/0xd8
[   23.926048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.926456]  kasan_atomics+0xb8/0x2e0
[   23.926785]  kunit_try_run_case+0x170/0x3f0
[   23.927160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.927651]  kthread+0x328/0x630
[   23.927944]  ret_from_fork+0x10/0x20
[   23.928266] 
[   23.928403] The buggy address belongs to the object at ffff00000ea09200
[   23.928403]  which belongs to the cache kmalloc-64 of size 64
[   23.929485] The buggy address is located 0 bytes to the right of
[   23.929485]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.930615] 
[   23.930751] The buggy address belongs to the physical page:
[   23.931243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.931935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.932514] page_type: f5(slab)
[   23.932799] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.933482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.934164] page dumped because: kasan: bad access detected
[   23.934657] 
[   23.934793] Memory state around the buggy address:
[   23.935219]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.935856]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.936493] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.937129]                                      ^
[   23.937553]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938190]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938826] ==================================================================
[   22.623537] ==================================================================
[   22.624194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   22.624857] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.625526] 
[   22.625675] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.625707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.625717] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.625727] Call trace:
[   22.625735]  show_stack+0x20/0x38 (C)
[   22.625755]  dump_stack_lvl+0x8c/0xd0
[   22.625775]  print_report+0x118/0x608
[   22.625794]  kasan_report+0xdc/0x128
[   22.625812]  kasan_check_range+0x100/0x1a8
[   22.625832]  __kasan_check_write+0x20/0x30
[   22.625854]  kasan_atomics_helper+0x414/0x4858
[   22.625873]  kasan_atomics+0x198/0x2e0
[   22.625890]  kunit_try_run_case+0x170/0x3f0
[   22.625913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.625940]  kthread+0x328/0x630
[   22.625962]  ret_from_fork+0x10/0x20
[   22.625984] 
[   22.632166] Allocated by task 323:
[   22.632482]  kasan_save_stack+0x3c/0x68
[   22.632842]  kasan_save_track+0x20/0x40
[   22.633200]  kasan_save_alloc_info+0x40/0x58
[   22.633598]  __kasan_kmalloc+0xd4/0xd8
[   22.633949]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.634376]  kasan_atomics+0xb8/0x2e0
[   22.634718]  kunit_try_run_case+0x170/0x3f0
[   22.635109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.635618]  kthread+0x328/0x630
[   22.635927]  ret_from_fork+0x10/0x20
[   22.636266] 
[   22.636411] The buggy address belongs to the object at ffff00000ea09200
[   22.636411]  which belongs to the cache kmalloc-64 of size 64
[   22.637512] The buggy address is located 0 bytes to the right of
[   22.637512]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.638660] 
[   22.638806] The buggy address belongs to the physical page:
[   22.639311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.640019] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.640612] page_type: f5(slab)
[   22.640910] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.641610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.642305] page dumped because: kasan: bad access detected
[   22.642809] 
[   22.642955] Memory state around the buggy address:
[   22.643393]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.644046]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.644698] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.645348]                                      ^
[   22.645786]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.646438]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.647088] ==================================================================
[   22.526768] ==================================================================
[   22.527421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   22.528092] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.528754] 
[   22.528904] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.528937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.528946] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.528958] Call trace:
[   22.528965]  show_stack+0x20/0x38 (C)
[   22.528986]  dump_stack_lvl+0x8c/0xd0
[   22.529005]  print_report+0x118/0x608
[   22.529024]  kasan_report+0xdc/0x128
[   22.529042]  __asan_report_load4_noabort+0x20/0x30
[   22.529065]  kasan_atomics_helper+0x40fc/0x4858
[   22.529084]  kasan_atomics+0x198/0x2e0
[   22.529102]  kunit_try_run_case+0x170/0x3f0
[   22.529125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.529151]  kthread+0x328/0x630
[   22.529173]  ret_from_fork+0x10/0x20
[   22.529193] 
[   22.535082] Allocated by task 323:
[   22.535398]  kasan_save_stack+0x3c/0x68
[   22.535757]  kasan_save_track+0x20/0x40
[   22.536116]  kasan_save_alloc_info+0x40/0x58
[   22.536514]  __kasan_kmalloc+0xd4/0xd8
[   22.536864]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.537290]  kasan_atomics+0xb8/0x2e0
[   22.537631]  kunit_try_run_case+0x170/0x3f0
[   22.538024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.538532]  kthread+0x328/0x630
[   22.538841]  ret_from_fork+0x10/0x20
[   22.539178] 
[   22.539325] The buggy address belongs to the object at ffff00000ea09200
[   22.539325]  which belongs to the cache kmalloc-64 of size 64
[   22.540426] The buggy address is located 0 bytes to the right of
[   22.540426]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.541575] 
[   22.541721] The buggy address belongs to the physical page:
[   22.542224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.542931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.543526] page_type: f5(slab)
[   22.543824] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.544524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.545220] page dumped because: kasan: bad access detected
[   22.545723] 
[   22.545868] Memory state around the buggy address:
[   22.546305]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.546958]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.547611] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.548260]                                      ^
[   22.548698]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.549350]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.550000] ==================================================================
[   23.283297] ==================================================================
[   23.283934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   23.284579] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.285232] 
[   23.285371] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.285385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.285389] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.285394] Call trace:
[   23.285397]  show_stack+0x20/0x38 (C)
[   23.285406]  dump_stack_lvl+0x8c/0xd0
[   23.285415]  print_report+0x118/0x608
[   23.285424]  kasan_report+0xdc/0x128
[   23.285432]  kasan_check_range+0x100/0x1a8
[   23.285441]  __kasan_check_write+0x20/0x30
[   23.285451]  kasan_atomics_helper+0xe44/0x4858
[   23.285460]  kasan_atomics+0x198/0x2e0
[   23.285467]  kunit_try_run_case+0x170/0x3f0
[   23.285478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.285489]  kthread+0x328/0x630
[   23.285499]  ret_from_fork+0x10/0x20
[   23.285509] 
[   23.291630] Allocated by task 323:
[   23.291934]  kasan_save_stack+0x3c/0x68
[   23.292278]  kasan_save_track+0x20/0x40
[   23.292622]  kasan_save_alloc_info+0x40/0x58
[   23.293004]  __kasan_kmalloc+0xd4/0xd8
[   23.293342]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.293748]  kasan_atomics+0xb8/0x2e0
[   23.294077]  kunit_try_run_case+0x170/0x3f0
[   23.294454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.294943]  kthread+0x328/0x630
[   23.295236]  ret_from_fork+0x10/0x20
[   23.295558] 
[   23.295695] The buggy address belongs to the object at ffff00000ea09200
[   23.295695]  which belongs to the cache kmalloc-64 of size 64
[   23.296778] The buggy address is located 0 bytes to the right of
[   23.296778]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.297907] 
[   23.298044] The buggy address belongs to the physical page:
[   23.298537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.299228] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.299806] page_type: f5(slab)
[   23.300089] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.300773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.301455] page dumped because: kasan: bad access detected
[   23.301947] 
[   23.302084] Memory state around the buggy address:
[   23.302509]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.303146]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.303783] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.304419]                                      ^
[   23.304845]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.305483]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.306119] ==================================================================
[   23.306770] ==================================================================
[   23.307407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   23.308060] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.308714] 
[   23.308851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.308866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.308870] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.308875] Call trace:
[   23.308878]  show_stack+0x20/0x38 (C)
[   23.308887]  dump_stack_lvl+0x8c/0xd0
[   23.308896]  print_report+0x118/0x608
[   23.308905]  kasan_report+0xdc/0x128
[   23.308913]  __asan_report_store8_noabort+0x20/0x30
[   23.308923]  kasan_atomics_helper+0x3e5c/0x4858
[   23.308932]  kasan_atomics+0x198/0x2e0
[   23.308940]  kunit_try_run_case+0x170/0x3f0
[   23.308950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.308961]  kthread+0x328/0x630
[   23.308971]  ret_from_fork+0x10/0x20
[   23.308981] 
[   23.314818] Allocated by task 323:
[   23.315123]  kasan_save_stack+0x3c/0x68
[   23.315467]  kasan_save_track+0x20/0x40
[   23.315811]  kasan_save_alloc_info+0x40/0x58
[   23.316194]  __kasan_kmalloc+0xd4/0xd8
[   23.316531]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.316939]  kasan_atomics+0xb8/0x2e0
[   23.317268]  kunit_try_run_case+0x170/0x3f0
[   23.317643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.318133]  kthread+0x328/0x630
[   23.318426]  ret_from_fork+0x10/0x20
[   23.318748] 
[   23.318886] The buggy address belongs to the object at ffff00000ea09200
[   23.318886]  which belongs to the cache kmalloc-64 of size 64
[   23.319969] The buggy address is located 0 bytes to the right of
[   23.319969]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.321098] 
[   23.321235] The buggy address belongs to the physical page:
[   23.321727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.322419] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.322997] page_type: f5(slab)
[   23.323282] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.323966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.324648] page dumped because: kasan: bad access detected
[   23.325139] 
[   23.325276] Memory state around the buggy address:
[   23.325701]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.326340]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.326978] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.327614]                                      ^
[   23.328039]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.328678]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.329313] ==================================================================
[   23.376955] ==================================================================
[   23.377591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   23.378237] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.378890] 
[   23.379028] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.379042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.379046] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.379051] Call trace:
[   23.379054]  show_stack+0x20/0x38 (C)
[   23.379063]  dump_stack_lvl+0x8c/0xd0
[   23.379072]  print_report+0x118/0x608
[   23.379081]  kasan_report+0xdc/0x128
[   23.379089]  kasan_check_range+0x100/0x1a8
[   23.379099]  __kasan_check_write+0x20/0x30
[   23.379108]  kasan_atomics_helper+0xf88/0x4858
[   23.379117]  kasan_atomics+0x198/0x2e0
[   23.379124]  kunit_try_run_case+0x170/0x3f0
[   23.379135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.379146]  kthread+0x328/0x630
[   23.379156]  ret_from_fork+0x10/0x20
[   23.379166] 
[   23.385289] Allocated by task 323:
[   23.385594]  kasan_save_stack+0x3c/0x68
[   23.385938]  kasan_save_track+0x20/0x40
[   23.386282]  kasan_save_alloc_info+0x40/0x58
[   23.386665]  __kasan_kmalloc+0xd4/0xd8
[   23.387002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.387409]  kasan_atomics+0xb8/0x2e0
[   23.387738]  kunit_try_run_case+0x170/0x3f0
[   23.388113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.388602]  kthread+0x328/0x630
[   23.388896]  ret_from_fork+0x10/0x20
[   23.389218] 
[   23.389356] The buggy address belongs to the object at ffff00000ea09200
[   23.389356]  which belongs to the cache kmalloc-64 of size 64
[   23.390438] The buggy address is located 0 bytes to the right of
[   23.390438]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.391568] 
[   23.391705] The buggy address belongs to the physical page:
[   23.392196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.392887] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.393465] page_type: f5(slab)
[   23.393749] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.394433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.395115] page dumped because: kasan: bad access detected
[   23.395607] 
[   23.395745] Memory state around the buggy address:
[   23.396170]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.396807]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.397446] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.398083]                                      ^
[   23.398508]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399145]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399781] ==================================================================
[   23.822556] ==================================================================
[   23.823194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   23.823847] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.824501] 
[   23.824640] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.824655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.824659] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.824664] Call trace:
[   23.824667]  show_stack+0x20/0x38 (C)
[   23.824676]  dump_stack_lvl+0x8c/0xd0
[   23.824685]  print_report+0x118/0x608
[   23.824694]  kasan_report+0xdc/0x128
[   23.824702]  kasan_check_range+0x100/0x1a8
[   23.824712]  __kasan_check_write+0x20/0x30
[   23.824721]  kasan_atomics_helper+0x16d0/0x4858
[   23.824730]  kasan_atomics+0x198/0x2e0
[   23.824738]  kunit_try_run_case+0x170/0x3f0
[   23.824748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.824760]  kthread+0x328/0x630
[   23.824770]  ret_from_fork+0x10/0x20
[   23.824779] 
[   23.830906] Allocated by task 323:
[   23.831210]  kasan_save_stack+0x3c/0x68
[   23.831554]  kasan_save_track+0x20/0x40
[   23.831897]  kasan_save_alloc_info+0x40/0x58
[   23.832280]  __kasan_kmalloc+0xd4/0xd8
[   23.832617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.833024]  kasan_atomics+0xb8/0x2e0
[   23.833353]  kunit_try_run_case+0x170/0x3f0
[   23.833729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.834220]  kthread+0x328/0x630
[   23.834513]  ret_from_fork+0x10/0x20
[   23.834835] 
[   23.834971] The buggy address belongs to the object at ffff00000ea09200
[   23.834971]  which belongs to the cache kmalloc-64 of size 64
[   23.836054] The buggy address is located 0 bytes to the right of
[   23.836054]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.837183] 
[   23.837320] The buggy address belongs to the physical page:
[   23.837813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.838505] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.839084] page_type: f5(slab)
[   23.839368] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.840052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.840734] page dumped because: kasan: bad access detected
[   23.841226] 
[   23.841362] Memory state around the buggy address:
[   23.841788]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.842424]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.843062] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.843699]                                      ^
[   23.844125]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844763]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845399] ==================================================================
[   22.767203] ==================================================================
[   22.767847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   22.768498] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.769158] 
[   22.769301] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.769323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.769329] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.769336] Call trace:
[   22.769341]  show_stack+0x20/0x38 (C)
[   22.769355]  dump_stack_lvl+0x8c/0xd0
[   22.769368]  print_report+0x118/0x608
[   22.769381]  kasan_report+0xdc/0x128
[   22.769394]  kasan_check_range+0x100/0x1a8
[   22.769408]  __kasan_check_write+0x20/0x30
[   22.769422]  kasan_atomics_helper+0x684/0x4858
[   22.769435]  kasan_atomics+0x198/0x2e0
[   22.769447]  kunit_try_run_case+0x170/0x3f0
[   22.769463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.769480]  kthread+0x328/0x630
[   22.769495]  ret_from_fork+0x10/0x20
[   22.769510] 
[   22.775656] Allocated by task 323:
[   22.775965]  kasan_save_stack+0x3c/0x68
[   22.776316]  kasan_save_track+0x20/0x40
[   22.776667]  kasan_save_alloc_info+0x40/0x58
[   22.777057]  __kasan_kmalloc+0xd4/0xd8
[   22.777398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.777815]  kasan_atomics+0xb8/0x2e0
[   22.778149]  kunit_try_run_case+0x170/0x3f0
[   22.778532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.779029]  kthread+0x328/0x630
[   22.779329]  ret_from_fork+0x10/0x20
[   22.779658] 
[   22.779798] The buggy address belongs to the object at ffff00000ea09200
[   22.779798]  which belongs to the cache kmalloc-64 of size 64
[   22.780888] The buggy address is located 0 bytes to the right of
[   22.780888]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.782024] 
[   22.782165] The buggy address belongs to the physical page:
[   22.782661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.783359] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.783945] page_type: f5(slab)
[   22.784235] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.784925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.785611] page dumped because: kasan: bad access detected
[   22.786109] 
[   22.786249] Memory state around the buggy address:
[   22.786679]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.787322]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.787966] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.788608]                                      ^
[   22.789038]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.789681]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.790323] ==================================================================
[   23.517978] ==================================================================
[   23.518616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   23.519269] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.519923] 
[   23.520061] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.520075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.520079] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.520084] Call trace:
[   23.520088]  show_stack+0x20/0x38 (C)
[   23.520097]  dump_stack_lvl+0x8c/0xd0
[   23.520105]  print_report+0x118/0x608
[   23.520114]  kasan_report+0xdc/0x128
[   23.520122]  kasan_check_range+0x100/0x1a8
[   23.520131]  __kasan_check_write+0x20/0x30
[   23.520141]  kasan_atomics_helper+0x11f8/0x4858
[   23.520150]  kasan_atomics+0x198/0x2e0
[   23.520158]  kunit_try_run_case+0x170/0x3f0
[   23.520168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.520179]  kthread+0x328/0x630
[   23.520189]  ret_from_fork+0x10/0x20
[   23.520198] 
[   23.526326] Allocated by task 323:
[   23.526631]  kasan_save_stack+0x3c/0x68
[   23.526975]  kasan_save_track+0x20/0x40
[   23.527320]  kasan_save_alloc_info+0x40/0x58
[   23.527702]  __kasan_kmalloc+0xd4/0xd8
[   23.528039]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.528446]  kasan_atomics+0xb8/0x2e0
[   23.528775]  kunit_try_run_case+0x170/0x3f0
[   23.529151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.529641]  kthread+0x328/0x630
[   23.529934]  ret_from_fork+0x10/0x20
[   23.530257] 
[   23.530393] The buggy address belongs to the object at ffff00000ea09200
[   23.530393]  which belongs to the cache kmalloc-64 of size 64
[   23.531475] The buggy address is located 0 bytes to the right of
[   23.531475]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.532605] 
[   23.532742] The buggy address belongs to the physical page:
[   23.533233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.533925] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.534503] page_type: f5(slab)
[   23.534788] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.535472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.536154] page dumped because: kasan: bad access detected
[   23.536646] 
[   23.536782] Memory state around the buggy address:
[   23.537208]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.537844]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.538481] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.539117]                                      ^
[   23.539543]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540181]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540817] ==================================================================
[   22.885851] ==================================================================
[   22.886488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.887141] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.887787] 
[   22.887925] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.887939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.887944] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.887948] Call trace:
[   22.887952]  show_stack+0x20/0x38 (C)
[   22.887961]  dump_stack_lvl+0x8c/0xd0
[   22.887970]  print_report+0x118/0x608
[   22.887978]  kasan_report+0xdc/0x128
[   22.887987]  __asan_report_load4_noabort+0x20/0x30
[   22.887997]  kasan_atomics_helper+0x42d8/0x4858
[   22.888005]  kasan_atomics+0x198/0x2e0
[   22.888013]  kunit_try_run_case+0x170/0x3f0
[   22.888024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.888035]  kthread+0x328/0x630
[   22.888045]  ret_from_fork+0x10/0x20
[   22.888055] 
[   22.893887] Allocated by task 323:
[   22.894192]  kasan_save_stack+0x3c/0x68
[   22.894536]  kasan_save_track+0x20/0x40
[   22.894880]  kasan_save_alloc_info+0x40/0x58
[   22.895262]  __kasan_kmalloc+0xd4/0xd8
[   22.895598]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.896005]  kasan_atomics+0xb8/0x2e0
[   22.896334]  kunit_try_run_case+0x170/0x3f0
[   22.896710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.897200]  kthread+0x328/0x630
[   22.897493]  ret_from_fork+0x10/0x20
[   22.897816] 
[   22.897952] The buggy address belongs to the object at ffff00000ea09200
[   22.897952]  which belongs to the cache kmalloc-64 of size 64
[   22.899035] The buggy address is located 0 bytes to the right of
[   22.899035]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.900163] 
[   22.900300] The buggy address belongs to the physical page:
[   22.900792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.901484] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.902061] page_type: f5(slab)
[   22.902346] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.903030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.903711] page dumped because: kasan: bad access detected
[   22.904203] 
[   22.904340] Memory state around the buggy address:
[   22.904764]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.905400]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.906038] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.906673]                                      ^
[   22.907099]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.907736]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.908372] ==================================================================
[   23.611997] ==================================================================
[   23.612635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   23.613289] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.613935] 
[   23.614073] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.614087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.614091] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.614096] Call trace:
[   23.614100]  show_stack+0x20/0x38 (C)
[   23.614108]  dump_stack_lvl+0x8c/0xd0
[   23.614117]  print_report+0x118/0x608
[   23.614126]  kasan_report+0xdc/0x128
[   23.614134]  __asan_report_load8_noabort+0x20/0x30
[   23.614145]  kasan_atomics_helper+0x3f04/0x4858
[   23.614153]  kasan_atomics+0x198/0x2e0
[   23.614161]  kunit_try_run_case+0x170/0x3f0
[   23.614172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.614183]  kthread+0x328/0x630
[   23.614193]  ret_from_fork+0x10/0x20
[   23.614202] 
[   23.620032] Allocated by task 323:
[   23.620336]  kasan_save_stack+0x3c/0x68
[   23.620680]  kasan_save_track+0x20/0x40
[   23.621024]  kasan_save_alloc_info+0x40/0x58
[   23.621407]  __kasan_kmalloc+0xd4/0xd8
[   23.621744]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.622151]  kasan_atomics+0xb8/0x2e0
[   23.622480]  kunit_try_run_case+0x170/0x3f0
[   23.622857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.623346]  kthread+0x328/0x630
[   23.623639]  ret_from_fork+0x10/0x20
[   23.623961] 
[   23.624098] The buggy address belongs to the object at ffff00000ea09200
[   23.624098]  which belongs to the cache kmalloc-64 of size 64
[   23.625180] The buggy address is located 0 bytes to the right of
[   23.625180]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.626310] 
[   23.626446] The buggy address belongs to the physical page:
[   23.626938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.627629] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.628208] page_type: f5(slab)
[   23.628491] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.629175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.629857] page dumped because: kasan: bad access detected
[   23.630349] 
[   23.630487] Memory state around the buggy address:
[   23.630913]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631549]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.632186] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.632822]                                      ^
[   23.633248]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.633886]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.634522] ==================================================================
[   23.260109] ==================================================================
[   23.260748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   23.261400] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.262045] 
[   23.262184] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.262198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.262202] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.262207] Call trace:
[   23.262210]  show_stack+0x20/0x38 (C)
[   23.262219]  dump_stack_lvl+0x8c/0xd0
[   23.262228]  print_report+0x118/0x608
[   23.262236]  kasan_report+0xdc/0x128
[   23.262245]  __asan_report_load8_noabort+0x20/0x30
[   23.262256]  kasan_atomics_helper+0x3f58/0x4858
[   23.262264]  kasan_atomics+0x198/0x2e0
[   23.262272]  kunit_try_run_case+0x170/0x3f0
[   23.262282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.262294]  kthread+0x328/0x630
[   23.262304]  ret_from_fork+0x10/0x20
[   23.262313] 
[   23.268147] Allocated by task 323:
[   23.268452]  kasan_save_stack+0x3c/0x68
[   23.268796]  kasan_save_track+0x20/0x40
[   23.269140]  kasan_save_alloc_info+0x40/0x58
[   23.269523]  __kasan_kmalloc+0xd4/0xd8
[   23.269860]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.270268]  kasan_atomics+0xb8/0x2e0
[   23.270597]  kunit_try_run_case+0x170/0x3f0
[   23.270973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.271464]  kthread+0x328/0x630
[   23.271757]  ret_from_fork+0x10/0x20
[   23.272080] 
[   23.272216] The buggy address belongs to the object at ffff00000ea09200
[   23.272216]  which belongs to the cache kmalloc-64 of size 64
[   23.273299] The buggy address is located 0 bytes to the right of
[   23.273299]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.274428] 
[   23.274565] The buggy address belongs to the physical page:
[   23.275058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.275749] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.276327] page_type: f5(slab)
[   23.276612] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.277295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.277978] page dumped because: kasan: bad access detected
[   23.278470] 
[   23.278606] Memory state around the buggy address:
[   23.279032]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.279670]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.280307] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.280942]                                      ^
[   23.281367]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.282004]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.282641] ==================================================================
[   23.400442] ==================================================================
[   23.401079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   23.401724] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.402377] 
[   23.402515] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.402530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.402534] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.402539] Call trace:
[   23.402542]  show_stack+0x20/0x38 (C)
[   23.402551]  dump_stack_lvl+0x8c/0xd0
[   23.402560]  print_report+0x118/0x608
[   23.402568]  kasan_report+0xdc/0x128
[   23.402577]  kasan_check_range+0x100/0x1a8
[   23.402586]  __kasan_check_write+0x20/0x30
[   23.402596]  kasan_atomics_helper+0xff0/0x4858
[   23.402605]  kasan_atomics+0x198/0x2e0
[   23.402612]  kunit_try_run_case+0x170/0x3f0
[   23.402622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402634]  kthread+0x328/0x630
[   23.402644]  ret_from_fork+0x10/0x20
[   23.402653] 
[   23.408776] Allocated by task 323:
[   23.409079]  kasan_save_stack+0x3c/0x68
[   23.409423]  kasan_save_track+0x20/0x40
[   23.409768]  kasan_save_alloc_info+0x40/0x58
[   23.410151]  __kasan_kmalloc+0xd4/0xd8
[   23.410489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.410895]  kasan_atomics+0xb8/0x2e0
[   23.411224]  kunit_try_run_case+0x170/0x3f0
[   23.411600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.412090]  kthread+0x328/0x630
[   23.412384]  ret_from_fork+0x10/0x20
[   23.412706] 
[   23.412843] The buggy address belongs to the object at ffff00000ea09200
[   23.412843]  which belongs to the cache kmalloc-64 of size 64
[   23.413926] The buggy address is located 0 bytes to the right of
[   23.413926]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.415055] 
[   23.415192] The buggy address belongs to the physical page:
[   23.415683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.416375] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.416952] page_type: f5(slab)
[   23.417237] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.417920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.418602] page dumped because: kasan: bad access detected
[   23.419095] 
[   23.419232] Memory state around the buggy address:
[   23.419657]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.420294]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.420931] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.421568]                                      ^
[   23.421994]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.422631]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.423267] ==================================================================
[   23.026463] ==================================================================
[   23.027099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   23.027752] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.028398] 
[   23.028537] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.028552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.028556] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.028561] Call trace:
[   23.028564]  show_stack+0x20/0x38 (C)
[   23.028573]  dump_stack_lvl+0x8c/0xd0
[   23.028582]  print_report+0x118/0x608
[   23.028591]  kasan_report+0xdc/0x128
[   23.028599]  __asan_report_load4_noabort+0x20/0x30
[   23.028610]  kasan_atomics_helper+0x3dcc/0x4858
[   23.028618]  kasan_atomics+0x198/0x2e0
[   23.028626]  kunit_try_run_case+0x170/0x3f0
[   23.028637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.028649]  kthread+0x328/0x630
[   23.028659]  ret_from_fork+0x10/0x20
[   23.028668] 
[   23.034499] Allocated by task 323:
[   23.034804]  kasan_save_stack+0x3c/0x68
[   23.035149]  kasan_save_track+0x20/0x40
[   23.035493]  kasan_save_alloc_info+0x40/0x58
[   23.035876]  __kasan_kmalloc+0xd4/0xd8
[   23.036213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.036620]  kasan_atomics+0xb8/0x2e0
[   23.036948]  kunit_try_run_case+0x170/0x3f0
[   23.037324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.037815]  kthread+0x328/0x630
[   23.038108]  ret_from_fork+0x10/0x20
[   23.038431] 
[   23.038567] The buggy address belongs to the object at ffff00000ea09200
[   23.038567]  which belongs to the cache kmalloc-64 of size 64
[   23.039650] The buggy address is located 0 bytes to the right of
[   23.039650]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.040780] 
[   23.040917] The buggy address belongs to the physical page:
[   23.041408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.042099] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.042676] page_type: f5(slab)
[   23.042959] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.043643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.044325] page dumped because: kasan: bad access detected
[   23.044817] 
[   23.044955] Memory state around the buggy address:
[   23.045380]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046017]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.046653] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.047289]                                      ^
[   23.047715]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.048353]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.048989] ==================================================================
[   23.423934] ==================================================================
[   23.424571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   23.425224] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.425878] 
[   23.426016] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.426030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.426035] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.426040] Call trace:
[   23.426043]  show_stack+0x20/0x38 (C)
[   23.426052]  dump_stack_lvl+0x8c/0xd0
[   23.426061]  print_report+0x118/0x608
[   23.426069]  kasan_report+0xdc/0x128
[   23.426078]  kasan_check_range+0x100/0x1a8
[   23.426087]  __kasan_check_write+0x20/0x30
[   23.426097]  kasan_atomics_helper+0x1058/0x4858
[   23.426105]  kasan_atomics+0x198/0x2e0
[   23.426113]  kunit_try_run_case+0x170/0x3f0
[   23.426123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.426135]  kthread+0x328/0x630
[   23.426145]  ret_from_fork+0x10/0x20
[   23.426155] 
[   23.432281] Allocated by task 323:
[   23.432586]  kasan_save_stack+0x3c/0x68
[   23.432930]  kasan_save_track+0x20/0x40
[   23.433273]  kasan_save_alloc_info+0x40/0x58
[   23.433656]  __kasan_kmalloc+0xd4/0xd8
[   23.433993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.434400]  kasan_atomics+0xb8/0x2e0
[   23.434729]  kunit_try_run_case+0x170/0x3f0
[   23.435104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.435594]  kthread+0x328/0x630
[   23.435887]  ret_from_fork+0x10/0x20
[   23.436209] 
[   23.436346] The buggy address belongs to the object at ffff00000ea09200
[   23.436346]  which belongs to the cache kmalloc-64 of size 64
[   23.437429] The buggy address is located 0 bytes to the right of
[   23.437429]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.438558] 
[   23.438695] The buggy address belongs to the physical page:
[   23.439186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.439878] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.440457] page_type: f5(slab)
[   23.440740] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.441424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.442105] page dumped because: kasan: bad access detected
[   23.442597] 
[   23.442734] Memory state around the buggy address:
[   23.443159]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.443796]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.444433] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.445069]                                      ^
[   23.445495]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446132]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.446768] ==================================================================
[   23.564985] ==================================================================
[   23.565623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   23.566276] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.566930] 
[   23.567068] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.567082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.567087] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.567092] Call trace:
[   23.567095]  show_stack+0x20/0x38 (C)
[   23.567105]  dump_stack_lvl+0x8c/0xd0
[   23.567113]  print_report+0x118/0x608
[   23.567122]  kasan_report+0xdc/0x128
[   23.567130]  kasan_check_range+0x100/0x1a8
[   23.567140]  __kasan_check_write+0x20/0x30
[   23.567149]  kasan_atomics_helper+0x12d8/0x4858
[   23.567158]  kasan_atomics+0x198/0x2e0
[   23.567165]  kunit_try_run_case+0x170/0x3f0
[   23.567176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.567188]  kthread+0x328/0x630
[   23.567198]  ret_from_fork+0x10/0x20
[   23.567207] 
[   23.573335] Allocated by task 323:
[   23.573640]  kasan_save_stack+0x3c/0x68
[   23.573983]  kasan_save_track+0x20/0x40
[   23.574327]  kasan_save_alloc_info+0x40/0x58
[   23.574710]  __kasan_kmalloc+0xd4/0xd8
[   23.575047]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.575454]  kasan_atomics+0xb8/0x2e0
[   23.575782]  kunit_try_run_case+0x170/0x3f0
[   23.576158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.576648]  kthread+0x328/0x630
[   23.576940]  ret_from_fork+0x10/0x20
[   23.577262] 
[   23.577400] The buggy address belongs to the object at ffff00000ea09200
[   23.577400]  which belongs to the cache kmalloc-64 of size 64
[   23.578483] The buggy address is located 0 bytes to the right of
[   23.578483]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.579612] 
[   23.579749] The buggy address belongs to the physical page:
[   23.580241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.580932] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.581512] page_type: f5(slab)
[   23.581795] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.582479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.583161] page dumped because: kasan: bad access detected
[   23.583653] 
[   23.583791] Memory state around the buggy address:
[   23.584216]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.584853]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.585491] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.586127]                                      ^
[   23.586553]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.587190]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.587828] ==================================================================
[   22.979490] ==================================================================
[   22.980127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.980773] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.981427] 
[   22.981565] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.981580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.981584] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.981589] Call trace:
[   22.981592]  show_stack+0x20/0x38 (C)
[   22.981601]  dump_stack_lvl+0x8c/0xd0
[   22.981610]  print_report+0x118/0x608
[   22.981619]  kasan_report+0xdc/0x128
[   22.981628]  kasan_check_range+0x100/0x1a8
[   22.981637]  __kasan_check_write+0x20/0x30
[   22.981647]  kasan_atomics_helper+0xa6c/0x4858
[   22.981655]  kasan_atomics+0x198/0x2e0
[   22.981663]  kunit_try_run_case+0x170/0x3f0
[   22.981674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.981686]  kthread+0x328/0x630
[   22.981696]  ret_from_fork+0x10/0x20
[   22.981706] 
[   22.987831] Allocated by task 323:
[   22.988135]  kasan_save_stack+0x3c/0x68
[   22.988480]  kasan_save_track+0x20/0x40
[   22.988823]  kasan_save_alloc_info+0x40/0x58
[   22.989206]  __kasan_kmalloc+0xd4/0xd8
[   22.989542]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.989949]  kasan_atomics+0xb8/0x2e0
[   22.990279]  kunit_try_run_case+0x170/0x3f0
[   22.990654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.991145]  kthread+0x328/0x630
[   22.991438]  ret_from_fork+0x10/0x20
[   22.991760] 
[   22.991897] The buggy address belongs to the object at ffff00000ea09200
[   22.991897]  which belongs to the cache kmalloc-64 of size 64
[   22.992979] The buggy address is located 0 bytes to the right of
[   22.992979]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.994109] 
[   22.994246] The buggy address belongs to the physical page:
[   22.994738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.995429] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.996008] page_type: f5(slab)
[   22.996292] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.996976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.997658] page dumped because: kasan: bad access detected
[   22.998150] 
[   22.998287] Memory state around the buggy address:
[   22.998712]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.999350]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.999987] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.000623]                                      ^
[   23.001049]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.001686]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.002322] ==================================================================
[   23.470955] ==================================================================
[   23.471593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   23.472248] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.472902] 
[   23.473040] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.473055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.473059] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.473064] Call trace:
[   23.473067]  show_stack+0x20/0x38 (C)
[   23.473077]  dump_stack_lvl+0x8c/0xd0
[   23.473085]  print_report+0x118/0x608
[   23.473094]  kasan_report+0xdc/0x128
[   23.473102]  kasan_check_range+0x100/0x1a8
[   23.473112]  __kasan_check_write+0x20/0x30
[   23.473122]  kasan_atomics_helper+0x1128/0x4858
[   23.473130]  kasan_atomics+0x198/0x2e0
[   23.473138]  kunit_try_run_case+0x170/0x3f0
[   23.473148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.473160]  kthread+0x328/0x630
[   23.473170]  ret_from_fork+0x10/0x20
[   23.473179] 
[   23.479312] Allocated by task 323:
[   23.479617]  kasan_save_stack+0x3c/0x68
[   23.479961]  kasan_save_track+0x20/0x40
[   23.480304]  kasan_save_alloc_info+0x40/0x58
[   23.480687]  __kasan_kmalloc+0xd4/0xd8
[   23.481024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.481432]  kasan_atomics+0xb8/0x2e0
[   23.481760]  kunit_try_run_case+0x170/0x3f0
[   23.482136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.482625]  kthread+0x328/0x630
[   23.482918]  ret_from_fork+0x10/0x20
[   23.483240] 
[   23.483377] The buggy address belongs to the object at ffff00000ea09200
[   23.483377]  which belongs to the cache kmalloc-64 of size 64
[   23.484459] The buggy address is located 0 bytes to the right of
[   23.484459]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.485589] 
[   23.485726] The buggy address belongs to the physical page:
[   23.486218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.486910] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.487489] page_type: f5(slab)
[   23.487774] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.488457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.489139] page dumped because: kasan: bad access detected
[   23.489632] 
[   23.489769] Memory state around the buggy address:
[   23.490195]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.490832]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491469] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.492105]                                      ^
[   23.492530]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493168]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493804] ==================================================================
[   22.575161] ==================================================================
[   22.575816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   22.576487] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.577156] 
[   22.577306] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.577338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.577347] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.577358] Call trace:
[   22.577366]  show_stack+0x20/0x38 (C)
[   22.577386]  dump_stack_lvl+0x8c/0xd0
[   22.577405]  print_report+0x118/0x608
[   22.577424]  kasan_report+0xdc/0x128
[   22.577442]  __asan_report_store4_noabort+0x20/0x30
[   22.577466]  kasan_atomics_helper+0x3f94/0x4858
[   22.577484]  kasan_atomics+0x198/0x2e0
[   22.577502]  kunit_try_run_case+0x170/0x3f0
[   22.577525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.577551]  kthread+0x328/0x630
[   22.577572]  ret_from_fork+0x10/0x20
[   22.577593] 
[   22.583486] Allocated by task 323:
[   22.583801]  kasan_save_stack+0x3c/0x68
[   22.584160]  kasan_save_track+0x20/0x40
[   22.584519]  kasan_save_alloc_info+0x40/0x58
[   22.584917]  __kasan_kmalloc+0xd4/0xd8
[   22.585267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.585693]  kasan_atomics+0xb8/0x2e0
[   22.586035]  kunit_try_run_case+0x170/0x3f0
[   22.586428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.586936]  kthread+0x328/0x630
[   22.587245]  ret_from_fork+0x10/0x20
[   22.587583] 
[   22.587728] The buggy address belongs to the object at ffff00000ea09200
[   22.587728]  which belongs to the cache kmalloc-64 of size 64
[   22.588828] The buggy address is located 0 bytes to the right of
[   22.588828]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.589976] 
[   22.590122] The buggy address belongs to the physical page:
[   22.590627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.591335] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.591927] page_type: f5(slab)
[   22.592225] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.592925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.593621] page dumped because: kasan: bad access detected
[   22.594125] 
[   22.594270] Memory state around the buggy address:
[   22.594707]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.595360]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.596012] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.596661]                                      ^
[   22.597098]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.597751]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.598402] ==================================================================
[   23.635174] ==================================================================
[   23.635812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   23.636465] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.637119] 
[   23.637256] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.637271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.637275] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.637280] Call trace:
[   23.637283]  show_stack+0x20/0x38 (C)
[   23.637292]  dump_stack_lvl+0x8c/0xd0
[   23.637301]  print_report+0x118/0x608
[   23.637310]  kasan_report+0xdc/0x128
[   23.637318]  kasan_check_range+0x100/0x1a8
[   23.637327]  __kasan_check_write+0x20/0x30
[   23.637337]  kasan_atomics_helper+0x1414/0x4858
[   23.637345]  kasan_atomics+0x198/0x2e0
[   23.637353]  kunit_try_run_case+0x170/0x3f0
[   23.637364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.637375]  kthread+0x328/0x630
[   23.637385]  ret_from_fork+0x10/0x20
[   23.637394] 
[   23.643524] Allocated by task 323:
[   23.643828]  kasan_save_stack+0x3c/0x68
[   23.644172]  kasan_save_track+0x20/0x40
[   23.644516]  kasan_save_alloc_info+0x40/0x58
[   23.644899]  __kasan_kmalloc+0xd4/0xd8
[   23.645236]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.645644]  kasan_atomics+0xb8/0x2e0
[   23.645973]  kunit_try_run_case+0x170/0x3f0
[   23.646349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.646839]  kthread+0x328/0x630
[   23.647132]  ret_from_fork+0x10/0x20
[   23.647454] 
[   23.647592] The buggy address belongs to the object at ffff00000ea09200
[   23.647592]  which belongs to the cache kmalloc-64 of size 64
[   23.648675] The buggy address is located 0 bytes to the right of
[   23.648675]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.649804] 
[   23.649941] The buggy address belongs to the physical page:
[   23.650434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.651125] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.651703] page_type: f5(slab)
[   23.651986] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.652670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.653352] page dumped because: kasan: bad access detected
[   23.653843] 
[   23.653980] Memory state around the buggy address:
[   23.654405]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.655042]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.655679] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.656315]                                      ^
[   23.656741]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.657377]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.658013] ==================================================================
[   23.073335] ==================================================================
[   23.073974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   23.074628] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.075273] 
[   23.075412] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.075426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.075431] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.075435] Call trace:
[   23.075439]  show_stack+0x20/0x38 (C)
[   23.075448]  dump_stack_lvl+0x8c/0xd0
[   23.075457]  print_report+0x118/0x608
[   23.075466]  kasan_report+0xdc/0x128
[   23.075474]  __asan_report_load4_noabort+0x20/0x30
[   23.075485]  kasan_atomics_helper+0x3dbc/0x4858
[   23.075494]  kasan_atomics+0x198/0x2e0
[   23.075502]  kunit_try_run_case+0x170/0x3f0
[   23.075512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.075524]  kthread+0x328/0x630
[   23.075534]  ret_from_fork+0x10/0x20
[   23.075544] 
[   23.081376] Allocated by task 323:
[   23.081680]  kasan_save_stack+0x3c/0x68
[   23.082025]  kasan_save_track+0x20/0x40
[   23.082369]  kasan_save_alloc_info+0x40/0x58
[   23.082752]  __kasan_kmalloc+0xd4/0xd8
[   23.083090]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.083498]  kasan_atomics+0xb8/0x2e0
[   23.083827]  kunit_try_run_case+0x170/0x3f0
[   23.084204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.084694]  kthread+0x328/0x630
[   23.084987]  ret_from_fork+0x10/0x20
[   23.085309] 
[   23.085446] The buggy address belongs to the object at ffff00000ea09200
[   23.085446]  which belongs to the cache kmalloc-64 of size 64
[   23.086529] The buggy address is located 0 bytes to the right of
[   23.086529]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.087658] 
[   23.087796] The buggy address belongs to the physical page:
[   23.088288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.088979] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.089558] page_type: f5(slab)
[   23.089842] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.090526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.091207] page dumped because: kasan: bad access detected
[   23.091699] 
[   23.091836] Memory state around the buggy address:
[   23.092261]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.092900]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.093536] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.094172]                                      ^
[   23.094598]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095235]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.095872] ==================================================================
[   22.671795] ==================================================================
[   22.672439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   22.673092] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.673752] 
[   22.673894] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.673916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.673922] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.673930] Call trace:
[   22.673935]  show_stack+0x20/0x38 (C)
[   22.673948]  dump_stack_lvl+0x8c/0xd0
[   22.673961]  print_report+0x118/0x608
[   22.673974]  kasan_report+0xdc/0x128
[   22.673986]  kasan_check_range+0x100/0x1a8
[   22.674000]  __kasan_check_write+0x20/0x30
[   22.674015]  kasan_atomics_helper+0x4e4/0x4858
[   22.674028]  kasan_atomics+0x198/0x2e0
[   22.674039]  kunit_try_run_case+0x170/0x3f0
[   22.674054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.674072]  kthread+0x328/0x630
[   22.674087]  ret_from_fork+0x10/0x20
[   22.674101] 
[   22.680249] Allocated by task 323:
[   22.680557]  kasan_save_stack+0x3c/0x68
[   22.680907]  kasan_save_track+0x20/0x40
[   22.681258]  kasan_save_alloc_info+0x40/0x58
[   22.681648]  __kasan_kmalloc+0xd4/0xd8
[   22.681990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.682405]  kasan_atomics+0xb8/0x2e0
[   22.682740]  kunit_try_run_case+0x170/0x3f0
[   22.683123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.683621]  kthread+0x328/0x630
[   22.683920]  ret_from_fork+0x10/0x20
[   22.684249] 
[   22.684391] The buggy address belongs to the object at ffff00000ea09200
[   22.684391]  which belongs to the cache kmalloc-64 of size 64
[   22.685481] The buggy address is located 0 bytes to the right of
[   22.685481]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.686618] 
[   22.686758] The buggy address belongs to the physical page:
[   22.687255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.687952] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.688538] page_type: f5(slab)
[   22.688826] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.689518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.690204] page dumped because: kasan: bad access detected
[   22.690702] 
[   22.690842] Memory state around the buggy address:
[   22.691272]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.691915]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.692558] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.693200]                                      ^
[   22.693631]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694274]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694915] ==================================================================
[   23.166716] ==================================================================
[   23.167353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   23.168006] Read of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.168652] 
[   23.168791] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.168804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.168809] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.168814] Call trace:
[   23.168817]  show_stack+0x20/0x38 (C)
[   23.168826]  dump_stack_lvl+0x8c/0xd0
[   23.168834]  print_report+0x118/0x608
[   23.168842]  kasan_report+0xdc/0x128
[   23.168851]  __asan_report_load4_noabort+0x20/0x30
[   23.168861]  kasan_atomics_helper+0x3dd8/0x4858
[   23.168870]  kasan_atomics+0x198/0x2e0
[   23.168877]  kunit_try_run_case+0x170/0x3f0
[   23.168888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.168900]  kthread+0x328/0x630
[   23.168910]  ret_from_fork+0x10/0x20
[   23.168919] 
[   23.174751] Allocated by task 323:
[   23.175055]  kasan_save_stack+0x3c/0x68
[   23.175400]  kasan_save_track+0x20/0x40
[   23.175743]  kasan_save_alloc_info+0x40/0x58
[   23.176126]  __kasan_kmalloc+0xd4/0xd8
[   23.176462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.176869]  kasan_atomics+0xb8/0x2e0
[   23.177196]  kunit_try_run_case+0x170/0x3f0
[   23.177572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.178063]  kthread+0x328/0x630
[   23.178356]  ret_from_fork+0x10/0x20
[   23.178678] 
[   23.178815] The buggy address belongs to the object at ffff00000ea09200
[   23.178815]  which belongs to the cache kmalloc-64 of size 64
[   23.179897] The buggy address is located 0 bytes to the right of
[   23.179897]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.181027] 
[   23.181165] The buggy address belongs to the physical page:
[   23.181656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.182347] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.182924] page_type: f5(slab)
[   23.183207] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.183891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.184572] page dumped because: kasan: bad access detected
[   23.185064] 
[   23.185202] Memory state around the buggy address:
[   23.185627]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.186264]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.186902] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.187538]                                      ^
[   23.187964]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.188601]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.189238] ==================================================================
[   23.869275] ==================================================================
[   23.869912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   23.870565] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.871219] 
[   23.871357] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.871371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.871375] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.871380] Call trace:
[   23.871383]  show_stack+0x20/0x38 (C)
[   23.871393]  dump_stack_lvl+0x8c/0xd0
[   23.871401]  print_report+0x118/0x608
[   23.871410]  kasan_report+0xdc/0x128
[   23.871418]  kasan_check_range+0x100/0x1a8
[   23.871427]  __kasan_check_write+0x20/0x30
[   23.871437]  kasan_atomics_helper+0x175c/0x4858
[   23.871445]  kasan_atomics+0x198/0x2e0
[   23.871453]  kunit_try_run_case+0x170/0x3f0
[   23.871463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.871475]  kthread+0x328/0x630
[   23.871485]  ret_from_fork+0x10/0x20
[   23.871494] 
[   23.877622] Allocated by task 323:
[   23.877926]  kasan_save_stack+0x3c/0x68
[   23.878271]  kasan_save_track+0x20/0x40
[   23.878615]  kasan_save_alloc_info+0x40/0x58
[   23.878998]  __kasan_kmalloc+0xd4/0xd8
[   23.879335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.879742]  kasan_atomics+0xb8/0x2e0
[   23.880071]  kunit_try_run_case+0x170/0x3f0
[   23.880448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.880939]  kthread+0x328/0x630
[   23.881232]  ret_from_fork+0x10/0x20
[   23.881554] 
[   23.881691] The buggy address belongs to the object at ffff00000ea09200
[   23.881691]  which belongs to the cache kmalloc-64 of size 64
[   23.882773] The buggy address is located 0 bytes to the right of
[   23.882773]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.883903] 
[   23.884039] The buggy address belongs to the physical page:
[   23.884531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.885223] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.885800] page_type: f5(slab)
[   23.886084] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.886767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.887449] page dumped because: kasan: bad access detected
[   23.887941] 
[   23.888078] Memory state around the buggy address:
[   23.888504]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.889140]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.889779] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.890416]                                      ^
[   23.890842]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.891479]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.892116] ==================================================================
[   22.647949] ==================================================================
[   22.648596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   22.649250] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.649910] 
[   22.650053] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.650075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.650082] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.650089] Call trace:
[   22.650094]  show_stack+0x20/0x38 (C)
[   22.650108]  dump_stack_lvl+0x8c/0xd0
[   22.650121]  print_report+0x118/0x608
[   22.650135]  kasan_report+0xdc/0x128
[   22.650147]  kasan_check_range+0x100/0x1a8
[   22.650161]  __kasan_check_write+0x20/0x30
[   22.650176]  kasan_atomics_helper+0x47c/0x4858
[   22.650189]  kasan_atomics+0x198/0x2e0
[   22.650201]  kunit_try_run_case+0x170/0x3f0
[   22.650216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.650234]  kthread+0x328/0x630
[   22.650249]  ret_from_fork+0x10/0x20
[   22.650264] 
[   22.656407] Allocated by task 323:
[   22.656716]  kasan_save_stack+0x3c/0x68
[   22.657067]  kasan_save_track+0x20/0x40
[   22.657417]  kasan_save_alloc_info+0x40/0x58
[   22.657807]  __kasan_kmalloc+0xd4/0xd8
[   22.658149]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.658564]  kasan_atomics+0xb8/0x2e0
[   22.658899]  kunit_try_run_case+0x170/0x3f0
[   22.659282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.659779]  kthread+0x328/0x630
[   22.660079]  ret_from_fork+0x10/0x20
[   22.660407] 
[   22.660548] The buggy address belongs to the object at ffff00000ea09200
[   22.660548]  which belongs to the cache kmalloc-64 of size 64
[   22.661638] The buggy address is located 0 bytes to the right of
[   22.661638]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.662777] 
[   22.662917] The buggy address belongs to the physical page:
[   22.663415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.664112] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.664698] page_type: f5(slab)
[   22.664987] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.665677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.666364] page dumped because: kasan: bad access detected
[   22.666861] 
[   22.667002] Memory state around the buggy address:
[   22.667431]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.668074]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.668718] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.669360]                                      ^
[   22.669790]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.670433]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671075] ==================================================================
[   22.838831] ==================================================================
[   22.839471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   22.840117] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.840771] 
[   22.840909] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.840924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.840928] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.840934] Call trace:
[   22.840937]  show_stack+0x20/0x38 (C)
[   22.840946]  dump_stack_lvl+0x8c/0xd0
[   22.840955]  print_report+0x118/0x608
[   22.840964]  kasan_report+0xdc/0x128
[   22.840972]  kasan_check_range+0x100/0x1a8
[   22.840981]  __kasan_check_write+0x20/0x30
[   22.840991]  kasan_atomics_helper+0x7cc/0x4858
[   22.840999]  kasan_atomics+0x198/0x2e0
[   22.841008]  kunit_try_run_case+0x170/0x3f0
[   22.841018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.841030]  kthread+0x328/0x630
[   22.841040]  ret_from_fork+0x10/0x20
[   22.841049] 
[   22.847172] Allocated by task 323:
[   22.847477]  kasan_save_stack+0x3c/0x68
[   22.847821]  kasan_save_track+0x20/0x40
[   22.848165]  kasan_save_alloc_info+0x40/0x58
[   22.848547]  __kasan_kmalloc+0xd4/0xd8
[   22.848884]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.849293]  kasan_atomics+0xb8/0x2e0
[   22.849622]  kunit_try_run_case+0x170/0x3f0
[   22.849998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.850489]  kthread+0x328/0x630
[   22.850782]  ret_from_fork+0x10/0x20
[   22.851104] 
[   22.851240] The buggy address belongs to the object at ffff00000ea09200
[   22.851240]  which belongs to the cache kmalloc-64 of size 64
[   22.852323] The buggy address is located 0 bytes to the right of
[   22.852323]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.853452] 
[   22.853589] The buggy address belongs to the physical page:
[   22.854080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.854773] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.855351] page_type: f5(slab)
[   22.855636] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.856319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.857001] page dumped because: kasan: bad access detected
[   22.857493] 
[   22.857631] Memory state around the buggy address:
[   22.858057]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.858693]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.859332] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.859968]                                      ^
[   22.860394]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.861031]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.861667] ==================================================================
[   23.002978] ==================================================================
[   23.003616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   23.004262] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.004916] 
[   23.005054] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.005069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.005073] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.005078] Call trace:
[   23.005082]  show_stack+0x20/0x38 (C)
[   23.005091]  dump_stack_lvl+0x8c/0xd0
[   23.005099]  print_report+0x118/0x608
[   23.005108]  kasan_report+0xdc/0x128
[   23.005117]  kasan_check_range+0x100/0x1a8
[   23.005126]  __kasan_check_write+0x20/0x30
[   23.005136]  kasan_atomics_helper+0xad4/0x4858
[   23.005144]  kasan_atomics+0x198/0x2e0
[   23.005152]  kunit_try_run_case+0x170/0x3f0
[   23.005162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.005174]  kthread+0x328/0x630
[   23.005184]  ret_from_fork+0x10/0x20
[   23.005194] 
[   23.011317] Allocated by task 323:
[   23.011622]  kasan_save_stack+0x3c/0x68
[   23.011967]  kasan_save_track+0x20/0x40
[   23.012311]  kasan_save_alloc_info+0x40/0x58
[   23.012694]  __kasan_kmalloc+0xd4/0xd8
[   23.013030]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.013437]  kasan_atomics+0xb8/0x2e0
[   23.013766]  kunit_try_run_case+0x170/0x3f0
[   23.014142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.014633]  kthread+0x328/0x630
[   23.014926]  ret_from_fork+0x10/0x20
[   23.015248] 
[   23.015385] The buggy address belongs to the object at ffff00000ea09200
[   23.015385]  which belongs to the cache kmalloc-64 of size 64
[   23.016468] The buggy address is located 0 bytes to the right of
[   23.016468]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.017597] 
[   23.017735] The buggy address belongs to the physical page:
[   23.018227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.018918] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.019496] page_type: f5(slab)
[   23.019780] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.020464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.021146] page dumped because: kasan: bad access detected
[   23.021638] 
[   23.021774] Memory state around the buggy address:
[   23.022200]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.022838]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.023475] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.024112]                                      ^
[   23.024537]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.025174]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.025810] ==================================================================
[   23.189913] ==================================================================
[   23.190551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   23.191197] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.191850] 
[   23.191989] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.192003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.192007] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.192012] Call trace:
[   23.192015]  show_stack+0x20/0x38 (C)
[   23.192024]  dump_stack_lvl+0x8c/0xd0
[   23.192033]  print_report+0x118/0x608
[   23.192041]  kasan_report+0xdc/0x128
[   23.192049]  kasan_check_range+0x100/0x1a8
[   23.192059]  __kasan_check_write+0x20/0x30
[   23.192068]  kasan_atomics_helper+0xd3c/0x4858
[   23.192077]  kasan_atomics+0x198/0x2e0
[   23.192085]  kunit_try_run_case+0x170/0x3f0
[   23.192095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.192107]  kthread+0x328/0x630
[   23.192117]  ret_from_fork+0x10/0x20
[   23.192126] 
[   23.198249] Allocated by task 323:
[   23.198553]  kasan_save_stack+0x3c/0x68
[   23.198897]  kasan_save_track+0x20/0x40
[   23.199242]  kasan_save_alloc_info+0x40/0x58
[   23.199625]  __kasan_kmalloc+0xd4/0xd8
[   23.199962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.200369]  kasan_atomics+0xb8/0x2e0
[   23.200698]  kunit_try_run_case+0x170/0x3f0
[   23.201073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.201562]  kthread+0x328/0x630
[   23.201855]  ret_from_fork+0x10/0x20
[   23.202178] 
[   23.202316] The buggy address belongs to the object at ffff00000ea09200
[   23.202316]  which belongs to the cache kmalloc-64 of size 64
[   23.203399] The buggy address is located 0 bytes to the right of
[   23.203399]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.204527] 
[   23.204664] The buggy address belongs to the physical page:
[   23.205155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.205847] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.206426] page_type: f5(slab)
[   23.206709] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.207393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.208074] page dumped because: kasan: bad access detected
[   23.208566] 
[   23.208702] Memory state around the buggy address:
[   23.209128]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.209766]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.210403] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.211039]                                      ^
[   23.211465]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212103]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212739] ==================================================================
[   22.550825] ==================================================================
[   22.551479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   22.552141] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.552812] 
[   22.552961] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.552993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.553003] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.553013] Call trace:
[   22.553021]  show_stack+0x20/0x38 (C)
[   22.553041]  dump_stack_lvl+0x8c/0xd0
[   22.553060]  print_report+0x118/0x608
[   22.553079]  kasan_report+0xdc/0x128
[   22.553097]  kasan_check_range+0x100/0x1a8
[   22.553117]  __kasan_check_write+0x20/0x30
[   22.553139]  kasan_atomics_helper+0x32c/0x4858
[   22.553158]  kasan_atomics+0x198/0x2e0
[   22.553175]  kunit_try_run_case+0x170/0x3f0
[   22.553198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.553224]  kthread+0x328/0x630
[   22.553246]  ret_from_fork+0x10/0x20
[   22.553267] 
[   22.559446] Allocated by task 323:
[   22.559762]  kasan_save_stack+0x3c/0x68
[   22.560121]  kasan_save_track+0x20/0x40
[   22.560480]  kasan_save_alloc_info+0x40/0x58
[   22.560879]  __kasan_kmalloc+0xd4/0xd8
[   22.561230]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.561656]  kasan_atomics+0xb8/0x2e0
[   22.561999]  kunit_try_run_case+0x170/0x3f0
[   22.562390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.562899]  kthread+0x328/0x630
[   22.563207]  ret_from_fork+0x10/0x20
[   22.563545] 
[   22.563691] The buggy address belongs to the object at ffff00000ea09200
[   22.563691]  which belongs to the cache kmalloc-64 of size 64
[   22.564791] The buggy address is located 0 bytes to the right of
[   22.564791]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.565941] 
[   22.566086] The buggy address belongs to the physical page:
[   22.566590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.567299] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.567892] page_type: f5(slab)
[   22.568189] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.568889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.569583] page dumped because: kasan: bad access detected
[   22.570088] 
[   22.570233] Memory state around the buggy address:
[   22.570670]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.571322]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.571974] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.572623]                                      ^
[   22.573060]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.573712]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.574362] ==================================================================
[   22.791057] ==================================================================
[   22.791701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   22.792354] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.793014] 
[   22.793156] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.793178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.793184] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.793191] Call trace:
[   22.793196]  show_stack+0x20/0x38 (C)
[   22.793210]  dump_stack_lvl+0x8c/0xd0
[   22.793223]  print_report+0x118/0x608
[   22.793236]  kasan_report+0xdc/0x128
[   22.793249]  kasan_check_range+0x100/0x1a8
[   22.793262]  __kasan_check_write+0x20/0x30
[   22.793277]  kasan_atomics_helper+0x6ec/0x4858
[   22.793290]  kasan_atomics+0x198/0x2e0
[   22.793301]  kunit_try_run_case+0x170/0x3f0
[   22.793317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.793335]  kthread+0x328/0x630
[   22.793350]  ret_from_fork+0x10/0x20
[   22.793364] 
[   22.799511] Allocated by task 323:
[   22.799820]  kasan_save_stack+0x3c/0x68
[   22.800171]  kasan_save_track+0x20/0x40
[   22.800521]  kasan_save_alloc_info+0x40/0x58
[   22.800911]  __kasan_kmalloc+0xd4/0xd8
[   22.801254]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.801668]  kasan_atomics+0xb8/0x2e0
[   22.802003]  kunit_try_run_case+0x170/0x3f0
[   22.802386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.802883]  kthread+0x328/0x630
[   22.803183]  ret_from_fork+0x10/0x20
[   22.803511] 
[   22.803652] The buggy address belongs to the object at ffff00000ea09200
[   22.803652]  which belongs to the cache kmalloc-64 of size 64
[   22.804741] The buggy address is located 0 bytes to the right of
[   22.804741]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.805877] 
[   22.806018] The buggy address belongs to the physical page:
[   22.806515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.807213] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.807798] page_type: f5(slab)
[   22.808088] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.808778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.809464] page dumped because: kasan: bad access detected
[   22.809961] 
[   22.810101] Memory state around the buggy address:
[   22.810531]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811175]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811818] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.812460]                                      ^
[   22.812890]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.813534]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.814175] ==================================================================
[   23.329990] ==================================================================
[   23.330628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   23.331274] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.331927] 
[   23.332067] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.332081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.332086] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.332091] Call trace:
[   23.332094]  show_stack+0x20/0x38 (C)
[   23.332103]  dump_stack_lvl+0x8c/0xd0
[   23.332112]  print_report+0x118/0x608
[   23.332122]  kasan_report+0xdc/0x128
[   23.332130]  kasan_check_range+0x100/0x1a8
[   23.332139]  __kasan_check_write+0x20/0x30
[   23.332150]  kasan_atomics_helper+0xeb8/0x4858
[   23.332158]  kasan_atomics+0x198/0x2e0
[   23.332166]  kunit_try_run_case+0x170/0x3f0
[   23.332177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.332189]  kthread+0x328/0x630
[   23.332199]  ret_from_fork+0x10/0x20
[   23.332209] 
[   23.338330] Allocated by task 323:
[   23.338634]  kasan_save_stack+0x3c/0x68
[   23.338978]  kasan_save_track+0x20/0x40
[   23.339323]  kasan_save_alloc_info+0x40/0x58
[   23.339706]  __kasan_kmalloc+0xd4/0xd8
[   23.340043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.340451]  kasan_atomics+0xb8/0x2e0
[   23.340779]  kunit_try_run_case+0x170/0x3f0
[   23.341155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.341646]  kthread+0x328/0x630
[   23.341939]  ret_from_fork+0x10/0x20
[   23.342261] 
[   23.342398] The buggy address belongs to the object at ffff00000ea09200
[   23.342398]  which belongs to the cache kmalloc-64 of size 64
[   23.343481] The buggy address is located 0 bytes to the right of
[   23.343481]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.344610] 
[   23.344747] The buggy address belongs to the physical page:
[   23.345239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.345931] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.346509] page_type: f5(slab)
[   23.346793] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.347477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.348158] page dumped because: kasan: bad access detected
[   23.348651] 
[   23.348787] Memory state around the buggy address:
[   23.349213]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.349851]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.350488] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.351123]                                      ^
[   23.351549]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352186]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352822] ==================================================================
[   22.743350] ==================================================================
[   22.743995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   22.744650] Write of size 4 at addr ffff00000ea09230 by task kunit_try_catch/323
[   22.745310] 
[   22.745453] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.745474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745481] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.745488] Call trace:
[   22.745493]  show_stack+0x20/0x38 (C)
[   22.745507]  dump_stack_lvl+0x8c/0xd0
[   22.745521]  print_report+0x118/0x608
[   22.745534]  kasan_report+0xdc/0x128
[   22.745546]  kasan_check_range+0x100/0x1a8
[   22.745560]  __kasan_check_write+0x20/0x30
[   22.745575]  kasan_atomics_helper+0x61c/0x4858
[   22.745588]  kasan_atomics+0x198/0x2e0
[   22.745600]  kunit_try_run_case+0x170/0x3f0
[   22.745615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.745633]  kthread+0x328/0x630
[   22.745649]  ret_from_fork+0x10/0x20
[   22.745664] 
[   22.751808] Allocated by task 323:
[   22.752116]  kasan_save_stack+0x3c/0x68
[   22.752468]  kasan_save_track+0x20/0x40
[   22.752818]  kasan_save_alloc_info+0x40/0x58
[   22.753208]  __kasan_kmalloc+0xd4/0xd8
[   22.753549]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.753964]  kasan_atomics+0xb8/0x2e0
[   22.754299]  kunit_try_run_case+0x170/0x3f0
[   22.754681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.755179]  kthread+0x328/0x630
[   22.755479]  ret_from_fork+0x10/0x20
[   22.755807] 
[   22.755947] The buggy address belongs to the object at ffff00000ea09200
[   22.755947]  which belongs to the cache kmalloc-64 of size 64
[   22.757037] The buggy address is located 0 bytes to the right of
[   22.757037]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   22.758173] 
[   22.758314] The buggy address belongs to the physical page:
[   22.758810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   22.759508] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.760093] page_type: f5(slab)
[   22.760383] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   22.761073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.761760] page dumped because: kasan: bad access detected
[   22.762257] 
[   22.762397] Memory state around the buggy address:
[   22.762828]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763471]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.764115] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.764756]                                      ^
[   22.765187]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.765831]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.766472] ==================================================================
[   23.658664] ==================================================================
[   23.659302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   23.659955] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.660609] 
[   23.660747] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.660761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.660765] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.660770] Call trace:
[   23.660773]  show_stack+0x20/0x38 (C)
[   23.660783]  dump_stack_lvl+0x8c/0xd0
[   23.660791]  print_report+0x118/0x608
[   23.660800]  kasan_report+0xdc/0x128
[   23.660808]  kasan_check_range+0x100/0x1a8
[   23.660817]  __kasan_check_write+0x20/0x30
[   23.660827]  kasan_atomics_helper+0x147c/0x4858
[   23.660836]  kasan_atomics+0x198/0x2e0
[   23.660844]  kunit_try_run_case+0x170/0x3f0
[   23.660854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.660865]  kthread+0x328/0x630
[   23.660875]  ret_from_fork+0x10/0x20
[   23.660885] 
[   23.667016] Allocated by task 323:
[   23.667320]  kasan_save_stack+0x3c/0x68
[   23.667664]  kasan_save_track+0x20/0x40
[   23.668007]  kasan_save_alloc_info+0x40/0x58
[   23.668390]  __kasan_kmalloc+0xd4/0xd8
[   23.668728]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.669135]  kasan_atomics+0xb8/0x2e0
[   23.669463]  kunit_try_run_case+0x170/0x3f0
[   23.669840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.670329]  kthread+0x328/0x630
[   23.670623]  ret_from_fork+0x10/0x20
[   23.670945] 
[   23.671083] The buggy address belongs to the object at ffff00000ea09200
[   23.671083]  which belongs to the cache kmalloc-64 of size 64
[   23.672165] The buggy address is located 0 bytes to the right of
[   23.672165]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.673295] 
[   23.673433] The buggy address belongs to the physical page:
[   23.673926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.674617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.675194] page_type: f5(slab)
[   23.675477] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.676162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.676843] page dumped because: kasan: bad access detected
[   23.677335] 
[   23.677472] Memory state around the buggy address:
[   23.677898]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.678534]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.679171] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.679807]                                      ^
[   23.680233]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.680870]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.681505] ==================================================================
[   23.892776] ==================================================================
[   23.893413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   23.894066] Read of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.894712] 
[   23.894851] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.894866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.894870] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.894875] Call trace:
[   23.894878]  show_stack+0x20/0x38 (C)
[   23.894887]  dump_stack_lvl+0x8c/0xd0
[   23.894896]  print_report+0x118/0x608
[   23.894905]  kasan_report+0xdc/0x128
[   23.894913]  __asan_report_load8_noabort+0x20/0x30
[   23.894923]  kasan_atomics_helper+0x3e20/0x4858
[   23.894932]  kasan_atomics+0x198/0x2e0
[   23.894940]  kunit_try_run_case+0x170/0x3f0
[   23.894951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.894963]  kthread+0x328/0x630
[   23.894973]  ret_from_fork+0x10/0x20
[   23.894982] 
[   23.900816] Allocated by task 323:
[   23.901121]  kasan_save_stack+0x3c/0x68
[   23.901464]  kasan_save_track+0x20/0x40
[   23.901809]  kasan_save_alloc_info+0x40/0x58
[   23.902192]  __kasan_kmalloc+0xd4/0xd8
[   23.902529]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.902937]  kasan_atomics+0xb8/0x2e0
[   23.903266]  kunit_try_run_case+0x170/0x3f0
[   23.903641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.904132]  kthread+0x328/0x630
[   23.904425]  ret_from_fork+0x10/0x20
[   23.904748] 
[   23.904884] The buggy address belongs to the object at ffff00000ea09200
[   23.904884]  which belongs to the cache kmalloc-64 of size 64
[   23.905966] The buggy address is located 0 bytes to the right of
[   23.905966]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.907096] 
[   23.907233] The buggy address belongs to the physical page:
[   23.907725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.908417] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.908995] page_type: f5(slab)
[   23.909278] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.909962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.910644] page dumped because: kasan: bad access detected
[   23.911136] 
[   23.911273] Memory state around the buggy address:
[   23.911697]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912334]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.912973] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.913610]                                      ^
[   23.914036]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.914674]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.915311] ==================================================================
[   23.682175] ==================================================================
[   23.682812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   23.683466] Write of size 8 at addr ffff00000ea09230 by task kunit_try_catch/323
[   23.684120] 
[   23.684258] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   23.684273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.684277] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.684282] Call trace:
[   23.684285]  show_stack+0x20/0x38 (C)
[   23.684295]  dump_stack_lvl+0x8c/0xd0
[   23.684303]  print_report+0x118/0x608
[   23.684312]  kasan_report+0xdc/0x128
[   23.684320]  kasan_check_range+0x100/0x1a8
[   23.684330]  __kasan_check_write+0x20/0x30
[   23.684339]  kasan_atomics_helper+0x14e4/0x4858
[   23.684348]  kasan_atomics+0x198/0x2e0
[   23.684356]  kunit_try_run_case+0x170/0x3f0
[   23.684367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.684379]  kthread+0x328/0x630
[   23.684389]  ret_from_fork+0x10/0x20
[   23.684398] 
[   23.690526] Allocated by task 323:
[   23.690831]  kasan_save_stack+0x3c/0x68
[   23.691176]  kasan_save_track+0x20/0x40
[   23.691520]  kasan_save_alloc_info+0x40/0x58
[   23.691903]  __kasan_kmalloc+0xd4/0xd8
[   23.692240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.692647]  kasan_atomics+0xb8/0x2e0
[   23.692975]  kunit_try_run_case+0x170/0x3f0
[   23.693351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.693842]  kthread+0x328/0x630
[   23.694135]  ret_from_fork+0x10/0x20
[   23.694457] 
[   23.694595] The buggy address belongs to the object at ffff00000ea09200
[   23.694595]  which belongs to the cache kmalloc-64 of size 64
[   23.695677] The buggy address is located 0 bytes to the right of
[   23.695677]  allocated 48-byte region [ffff00000ea09200, ffff00000ea09230)
[   23.696807] 
[   23.696943] The buggy address belongs to the physical page:
[   23.697435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xea09
[   23.698127] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.698705] page_type: f5(slab)
[   23.698988] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   23.699672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.700354] page dumped because: kasan: bad access detected
[   23.700846] 
[   23.700983] Memory state around the buggy address:
[   23.701407]  ffff00000ea09100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.702045]  ffff00000ea09180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.702682] >ffff00000ea09200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.703318]                                      ^
[   23.703743]  ffff00000ea09280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.704381]  ffff00000ea09300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.705016] ==================================================================