Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.216537] ==================================================================
[   32.216678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   32.217230] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.218176] 
[   32.218302] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.218489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.218569] Hardware name: linux,dummy-virt (DT)
[   32.218663] Call trace:
[   32.218732]  show_stack+0x20/0x38 (C)
[   32.218880]  dump_stack_lvl+0x8c/0xd0
[   32.219027]  print_report+0x118/0x608
[   32.219165]  kasan_report+0xdc/0x128
[   32.219325]  kasan_check_range+0x100/0x1a8
[   32.219501]  __kasan_check_write+0x20/0x30
[   32.219705]  kasan_atomics_helper+0x175c/0x4858
[   32.219910]  kasan_atomics+0x198/0x2e0
[   32.220074]  kunit_try_run_case+0x170/0x3f0
[   32.220224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.220468]  kthread+0x328/0x630
[   32.220599]  ret_from_fork+0x10/0x20
[   32.221007] 
[   32.221118] Allocated by task 267:
[   32.221734]  kasan_save_stack+0x3c/0x68
[   32.221952]  kasan_save_track+0x20/0x40
[   32.222116]  kasan_save_alloc_info+0x40/0x58
[   32.222734]  __kasan_kmalloc+0xd4/0xd8
[   32.223107]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.223692]  kasan_atomics+0xb8/0x2e0
[   32.224239]  kunit_try_run_case+0x170/0x3f0
[   32.224422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.224565]  kthread+0x328/0x630
[   32.224669]  ret_from_fork+0x10/0x20
[   32.224761] 
[   32.224811] The buggy address belongs to the object at fff00000c78a2180
[   32.224811]  which belongs to the cache kmalloc-64 of size 64
[   32.224985] The buggy address is located 0 bytes to the right of
[   32.224985]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.225188] 
[   32.225259] The buggy address belongs to the physical page:
[   32.225362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.225726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.226369] page_type: f5(slab)
[   32.226771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.227313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.227484] page dumped because: kasan: bad access detected
[   32.228727] 
[   32.229374] Memory state around the buggy address:
[   32.229687]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.230057]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.231120] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.231782]                                      ^
[   32.232945]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.233103]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.233843] ==================================================================
[   31.851426] ==================================================================
[   31.851610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   31.851811] Read of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.851988] 
[   31.852117] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.852426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.852521] Hardware name: linux,dummy-virt (DT)
[   31.852603] Call trace:
[   31.852700]  show_stack+0x20/0x38 (C)
[   31.853101]  dump_stack_lvl+0x8c/0xd0
[   31.853410]  print_report+0x118/0x608
[   31.853555]  kasan_report+0xdc/0x128
[   31.853685]  __asan_report_load4_noabort+0x20/0x30
[   31.853950]  kasan_atomics_helper+0x3dd8/0x4858
[   31.854104]  kasan_atomics+0x198/0x2e0
[   31.854263]  kunit_try_run_case+0x170/0x3f0
[   31.854413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.854600]  kthread+0x328/0x630
[   31.854755]  ret_from_fork+0x10/0x20
[   31.854976] 
[   31.855038] Allocated by task 267:
[   31.855121]  kasan_save_stack+0x3c/0x68
[   31.855242]  kasan_save_track+0x20/0x40
[   31.855351]  kasan_save_alloc_info+0x40/0x58
[   31.855501]  __kasan_kmalloc+0xd4/0xd8
[   31.855618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.855749]  kasan_atomics+0xb8/0x2e0
[   31.855867]  kunit_try_run_case+0x170/0x3f0
[   31.856024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.856152]  kthread+0x328/0x630
[   31.856266]  ret_from_fork+0x10/0x20
[   31.856463] 
[   31.856519] The buggy address belongs to the object at fff00000c78a2180
[   31.856519]  which belongs to the cache kmalloc-64 of size 64
[   31.857118] The buggy address is located 0 bytes to the right of
[   31.857118]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.857358] 
[   31.857415] The buggy address belongs to the physical page:
[   31.857507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.857660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.857813] page_type: f5(slab)
[   31.858595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.859048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.859435] page dumped because: kasan: bad access detected
[   31.859570] 
[   31.859625] Memory state around the buggy address:
[   31.860003]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.860094]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.860162] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.860221]                                      ^
[   31.860271]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.860337]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.860394] ==================================================================
[   32.046257] ==================================================================
[   32.046749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   32.047229] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.047634] 
[   32.047753] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.049502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.049575] Hardware name: linux,dummy-virt (DT)
[   32.049624] Call trace:
[   32.049668]  show_stack+0x20/0x38 (C)
[   32.049783]  dump_stack_lvl+0x8c/0xd0
[   32.049859]  print_report+0x118/0x608
[   32.049927]  kasan_report+0xdc/0x128
[   32.049991]  kasan_check_range+0x100/0x1a8
[   32.050061]  __kasan_check_write+0x20/0x30
[   32.050128]  kasan_atomics_helper+0x126c/0x4858
[   32.050197]  kasan_atomics+0x198/0x2e0
[   32.050259]  kunit_try_run_case+0x170/0x3f0
[   32.050331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.050409]  kthread+0x328/0x630
[   32.050514]  ret_from_fork+0x10/0x20
[   32.050659] 
[   32.050716] Allocated by task 267:
[   32.050803]  kasan_save_stack+0x3c/0x68
[   32.050922]  kasan_save_track+0x20/0x40
[   32.051037]  kasan_save_alloc_info+0x40/0x58
[   32.051157]  __kasan_kmalloc+0xd4/0xd8
[   32.051551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.051711]  kasan_atomics+0xb8/0x2e0
[   32.051836]  kunit_try_run_case+0x170/0x3f0
[   32.052351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.052507]  kthread+0x328/0x630
[   32.052647]  ret_from_fork+0x10/0x20
[   32.052754] 
[   32.053168] The buggy address belongs to the object at fff00000c78a2180
[   32.053168]  which belongs to the cache kmalloc-64 of size 64
[   32.053377] The buggy address is located 0 bytes to the right of
[   32.053377]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.053599] 
[   32.054031] The buggy address belongs to the physical page:
[   32.054537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.054708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.055128] page_type: f5(slab)
[   32.055547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.055852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.056119] page dumped because: kasan: bad access detected
[   32.056519] 
[   32.056591] Memory state around the buggy address:
[   32.056698]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.056830]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.056967] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.057323]                                      ^
[   32.057863]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.058189]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.058500] ==================================================================
[   32.252927] ==================================================================
[   32.253139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   32.253323] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.253495] 
[   32.253597] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.253848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.253940] Hardware name: linux,dummy-virt (DT)
[   32.254037] Call trace:
[   32.254115]  show_stack+0x20/0x38 (C)
[   32.254321]  dump_stack_lvl+0x8c/0xd0
[   32.254501]  print_report+0x118/0x608
[   32.254638]  kasan_report+0xdc/0x128
[   32.254888]  kasan_check_range+0x100/0x1a8
[   32.255429]  __kasan_check_write+0x20/0x30
[   32.255632]  kasan_atomics_helper+0x17ec/0x4858
[   32.255810]  kasan_atomics+0x198/0x2e0
[   32.256146]  kunit_try_run_case+0x170/0x3f0
[   32.256393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.256588]  kthread+0x328/0x630
[   32.256730]  ret_from_fork+0x10/0x20
[   32.256876] 
[   32.256943] Allocated by task 267:
[   32.257651]  kasan_save_stack+0x3c/0x68
[   32.258136]  kasan_save_track+0x20/0x40
[   32.258246]  kasan_save_alloc_info+0x40/0x58
[   32.258839]  __kasan_kmalloc+0xd4/0xd8
[   32.259831]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.259994]  kasan_atomics+0xb8/0x2e0
[   32.260091]  kunit_try_run_case+0x170/0x3f0
[   32.260188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.260642]  kthread+0x328/0x630
[   32.260790]  ret_from_fork+0x10/0x20
[   32.261811] 
[   32.261925] The buggy address belongs to the object at fff00000c78a2180
[   32.261925]  which belongs to the cache kmalloc-64 of size 64
[   32.262130] The buggy address is located 0 bytes to the right of
[   32.262130]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.262338] 
[   32.262523] The buggy address belongs to the physical page:
[   32.262734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.262997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.263169] page_type: f5(slab)
[   32.263280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.263468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.263606] page dumped because: kasan: bad access detected
[   32.264569] 
[   32.264775] Memory state around the buggy address:
[   32.264912]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265053]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.265161] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.265252]                                      ^
[   32.265598]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.266115]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.266665] ==================================================================
[   31.909682] ==================================================================
[   31.909899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   31.910118] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.910325] 
[   31.910473] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.910695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.910815] Hardware name: linux,dummy-virt (DT)
[   31.910961] Call trace:
[   31.911024]  show_stack+0x20/0x38 (C)
[   31.911202]  dump_stack_lvl+0x8c/0xd0
[   31.911324]  print_report+0x118/0x608
[   31.911482]  kasan_report+0xdc/0x128
[   31.911612]  kasan_check_range+0x100/0x1a8
[   31.911731]  __kasan_check_write+0x20/0x30
[   31.911872]  kasan_atomics_helper+0xe44/0x4858
[   31.912151]  kasan_atomics+0x198/0x2e0
[   31.912343]  kunit_try_run_case+0x170/0x3f0
[   31.912495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.912723]  kthread+0x328/0x630
[   31.912924]  ret_from_fork+0x10/0x20
[   31.913072] 
[   31.913134] Allocated by task 267:
[   31.913225]  kasan_save_stack+0x3c/0x68
[   31.913346]  kasan_save_track+0x20/0x40
[   31.913535]  kasan_save_alloc_info+0x40/0x58
[   31.913665]  __kasan_kmalloc+0xd4/0xd8
[   31.913779]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.913938]  kasan_atomics+0xb8/0x2e0
[   31.914027]  kunit_try_run_case+0x170/0x3f0
[   31.914124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.914258]  kthread+0x328/0x630
[   31.914361]  ret_from_fork+0x10/0x20
[   31.914478] 
[   31.914537] The buggy address belongs to the object at fff00000c78a2180
[   31.914537]  which belongs to the cache kmalloc-64 of size 64
[   31.914750] The buggy address is located 0 bytes to the right of
[   31.914750]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.914950] 
[   31.915003] The buggy address belongs to the physical page:
[   31.915098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.915259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.915426] page_type: f5(slab)
[   31.915570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.915883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.916101] page dumped because: kasan: bad access detected
[   31.916158] 
[   31.916188] Memory state around the buggy address:
[   31.916290]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.916426]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.916592] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.916718]                                      ^
[   31.916834]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.916975]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.917101] ==================================================================
[   31.761921] ==================================================================
[   31.762099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   31.762257] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.762412] 
[   31.762532] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.762787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.762875] Hardware name: linux,dummy-virt (DT)
[   31.762976] Call trace:
[   31.763047]  show_stack+0x20/0x38 (C)
[   31.763196]  dump_stack_lvl+0x8c/0xd0
[   31.763341]  print_report+0x118/0x608
[   31.763528]  kasan_report+0xdc/0x128
[   31.763658]  kasan_check_range+0x100/0x1a8
[   31.764118]  __kasan_check_write+0x20/0x30
[   31.764252]  kasan_atomics_helper+0xad4/0x4858
[   31.764417]  kasan_atomics+0x198/0x2e0
[   31.764587]  kunit_try_run_case+0x170/0x3f0
[   31.764732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.764971]  kthread+0x328/0x630
[   31.765409]  ret_from_fork+0x10/0x20
[   31.765758] 
[   31.765847] Allocated by task 267:
[   31.765947]  kasan_save_stack+0x3c/0x68
[   31.766165]  kasan_save_track+0x20/0x40
[   31.766404]  kasan_save_alloc_info+0x40/0x58
[   31.766551]  __kasan_kmalloc+0xd4/0xd8
[   31.766666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.766800]  kasan_atomics+0xb8/0x2e0
[   31.766912]  kunit_try_run_case+0x170/0x3f0
[   31.767038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.767177]  kthread+0x328/0x630
[   31.767299]  ret_from_fork+0x10/0x20
[   31.767419] 
[   31.767501] The buggy address belongs to the object at fff00000c78a2180
[   31.767501]  which belongs to the cache kmalloc-64 of size 64
[   31.767945] The buggy address is located 0 bytes to the right of
[   31.767945]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.768195] 
[   31.768269] The buggy address belongs to the physical page:
[   31.768481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.768641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.768771] page_type: f5(slab)
[   31.768861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.769005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.769130] page dumped because: kasan: bad access detected
[   31.769385] 
[   31.769466] Memory state around the buggy address:
[   31.769597]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.769749]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.769923] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.770065]                                      ^
[   31.770182]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.770356]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.770514] ==================================================================
[   31.939224] ==================================================================
[   31.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   31.939533] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.939705] 
[   31.939808] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.940059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.940148] Hardware name: linux,dummy-virt (DT)
[   31.940249] Call trace:
[   31.940320]  show_stack+0x20/0x38 (C)
[   31.940478]  dump_stack_lvl+0x8c/0xd0
[   31.940616]  print_report+0x118/0x608
[   31.940759]  kasan_report+0xdc/0x128
[   31.940893]  kasan_check_range+0x100/0x1a8
[   31.941099]  __kasan_check_write+0x20/0x30
[   31.941624]  kasan_atomics_helper+0xf20/0x4858
[   31.942252]  kasan_atomics+0x198/0x2e0
[   31.942388]  kunit_try_run_case+0x170/0x3f0
[   31.942786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.942978]  kthread+0x328/0x630
[   31.943123]  ret_from_fork+0x10/0x20
[   31.943259] 
[   31.943317] Allocated by task 267:
[   31.943469]  kasan_save_stack+0x3c/0x68
[   31.943645]  kasan_save_track+0x20/0x40
[   31.943785]  kasan_save_alloc_info+0x40/0x58
[   31.943904]  __kasan_kmalloc+0xd4/0xd8
[   31.944019]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.944151]  kasan_atomics+0xb8/0x2e0
[   31.944257]  kunit_try_run_case+0x170/0x3f0
[   31.944796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.945157]  kthread+0x328/0x630
[   31.945407]  ret_from_fork+0x10/0x20
[   31.945754] 
[   31.945824] The buggy address belongs to the object at fff00000c78a2180
[   31.945824]  which belongs to the cache kmalloc-64 of size 64
[   31.946012] The buggy address is located 0 bytes to the right of
[   31.946012]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.946353] 
[   31.946783] The buggy address belongs to the physical page:
[   31.947043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.947228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.947395] page_type: f5(slab)
[   31.947526] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.947682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.947814] page dumped because: kasan: bad access detected
[   31.947948] 
[   31.948004] Memory state around the buggy address:
[   31.948109]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.948506]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.948664] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.948776]                                      ^
[   31.948858]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.948961]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.949402] ==================================================================
[   32.124861] ==================================================================
[   32.124994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   32.125132] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.125282] 
[   32.125387] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.125659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.125742] Hardware name: linux,dummy-virt (DT)
[   32.125843] Call trace:
[   32.125914]  show_stack+0x20/0x38 (C)
[   32.126062]  dump_stack_lvl+0x8c/0xd0
[   32.126207]  print_report+0x118/0x608
[   32.126336]  kasan_report+0xdc/0x128
[   32.127334]  kasan_check_range+0x100/0x1a8
[   32.127869]  __kasan_check_write+0x20/0x30
[   32.128063]  kasan_atomics_helper+0x154c/0x4858
[   32.128204]  kasan_atomics+0x198/0x2e0
[   32.128333]  kunit_try_run_case+0x170/0x3f0
[   32.128496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.128693]  kthread+0x328/0x630
[   32.128861]  ret_from_fork+0x10/0x20
[   32.128983] 
[   32.129046] Allocated by task 267:
[   32.129132]  kasan_save_stack+0x3c/0x68
[   32.129661]  kasan_save_track+0x20/0x40
[   32.130217]  kasan_save_alloc_info+0x40/0x58
[   32.130495]  __kasan_kmalloc+0xd4/0xd8
[   32.130894]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.131153]  kasan_atomics+0xb8/0x2e0
[   32.131259]  kunit_try_run_case+0x170/0x3f0
[   32.131399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.131555]  kthread+0x328/0x630
[   32.131666]  ret_from_fork+0x10/0x20
[   32.132385] 
[   32.132472] The buggy address belongs to the object at fff00000c78a2180
[   32.132472]  which belongs to the cache kmalloc-64 of size 64
[   32.132628] The buggy address is located 0 bytes to the right of
[   32.132628]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.132857] 
[   32.133609] The buggy address belongs to the physical page:
[   32.133872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.134263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.134437] page_type: f5(slab)
[   32.134577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.134743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.134880] page dumped because: kasan: bad access detected
[   32.135602] 
[   32.135868] Memory state around the buggy address:
[   32.136350]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.136660]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.137048] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.137331]                                      ^
[   32.137730]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137908]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138007] ==================================================================
[   32.203962] ==================================================================
[   32.204145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   32.204549] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.204772] 
[   32.204902] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.205152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.205459] Hardware name: linux,dummy-virt (DT)
[   32.205768] Call trace:
[   32.205870]  show_stack+0x20/0x38 (C)
[   32.206096]  dump_stack_lvl+0x8c/0xd0
[   32.206251]  print_report+0x118/0x608
[   32.206389]  kasan_report+0xdc/0x128
[   32.206533]  __asan_report_load8_noabort+0x20/0x30
[   32.206655]  kasan_atomics_helper+0x3e10/0x4858
[   32.206787]  kasan_atomics+0x198/0x2e0
[   32.206912]  kunit_try_run_case+0x170/0x3f0
[   32.207061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.207232]  kthread+0x328/0x630
[   32.207371]  ret_from_fork+0x10/0x20
[   32.207553] 
[   32.207613] Allocated by task 267:
[   32.207704]  kasan_save_stack+0x3c/0x68
[   32.207819]  kasan_save_track+0x20/0x40
[   32.207931]  kasan_save_alloc_info+0x40/0x58
[   32.208050]  __kasan_kmalloc+0xd4/0xd8
[   32.208164]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.208294]  kasan_atomics+0xb8/0x2e0
[   32.208405]  kunit_try_run_case+0x170/0x3f0
[   32.208788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.209129]  kthread+0x328/0x630
[   32.209267]  ret_from_fork+0x10/0x20
[   32.209618] 
[   32.209687] The buggy address belongs to the object at fff00000c78a2180
[   32.209687]  which belongs to the cache kmalloc-64 of size 64
[   32.209930] The buggy address is located 0 bytes to the right of
[   32.209930]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.210217] 
[   32.210317] The buggy address belongs to the physical page:
[   32.210466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.210763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.211239] page_type: f5(slab)
[   32.211391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.211562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.211803] page dumped because: kasan: bad access detected
[   32.212106] 
[   32.212202] Memory state around the buggy address:
[   32.212323]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.212510]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.212703] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.212879]                                      ^
[   32.213025]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213193]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.213296] ==================================================================
[   31.730782] ==================================================================
[   31.730944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   31.731163] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.731872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.734158]  kunit_try_run_case+0x170/0x3f0
[   31.734949]  ret_from_fork+0x10/0x20
[   31.735494] 
[   31.735592] Allocated by task 267:
[   31.735826]  kasan_save_stack+0x3c/0x68
[   31.736092]  kasan_save_track+0x20/0x40
[   31.736298]  kasan_save_alloc_info+0x40/0x58
[   31.736462]  __kasan_kmalloc+0xd4/0xd8
[   31.736601]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.736751]  kasan_atomics+0xb8/0x2e0
[   31.736933]  kunit_try_run_case+0x170/0x3f0
[   31.737136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.737307]  kthread+0x328/0x630
[   31.737460]  ret_from_fork+0x10/0x20
[   31.737581] 
[   31.737644] The buggy address belongs to the object at fff00000c78a2180
[   31.737644]  which belongs to the cache kmalloc-64 of size 64
[   31.737819] The buggy address is located 0 bytes to the right of
[   31.737819]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.738022] 
[   31.738093] The buggy address belongs to the physical page:
[   31.738190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.738351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.738525] page_type: f5(slab)
[   31.738642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.738827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.738995] page dumped because: kasan: bad access detected
[   31.739107] 
[   31.739170] Memory state around the buggy address:
[   31.739275]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.739492]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.739886] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.740296]                                      ^
[   31.740427]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.740557]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.740684] ==================================================================
[   32.072838] ==================================================================
[   32.072988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   32.073128] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.073282] 
[   32.073379] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.073652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.073742] Hardware name: linux,dummy-virt (DT)
[   32.073881] Call trace:
[   32.073962]  show_stack+0x20/0x38 (C)
[   32.074107]  dump_stack_lvl+0x8c/0xd0
[   32.074255]  print_report+0x118/0x608
[   32.074393]  kasan_report+0xdc/0x128
[   32.076126]  kasan_check_range+0x100/0x1a8
[   32.076295]  __kasan_check_write+0x20/0x30
[   32.076475]  kasan_atomics_helper+0x1384/0x4858
[   32.076621]  kasan_atomics+0x198/0x2e0
[   32.076753]  kunit_try_run_case+0x170/0x3f0
[   32.077756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.078415]  kthread+0x328/0x630
[   32.078581]  ret_from_fork+0x10/0x20
[   32.078872] 
[   32.078937] Allocated by task 267:
[   32.079138]  kasan_save_stack+0x3c/0x68
[   32.079726]  kasan_save_track+0x20/0x40
[   32.079937]  kasan_save_alloc_info+0x40/0x58
[   32.080514]  __kasan_kmalloc+0xd4/0xd8
[   32.080676]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.080945]  kasan_atomics+0xb8/0x2e0
[   32.081067]  kunit_try_run_case+0x170/0x3f0
[   32.081642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.081792]  kthread+0x328/0x630
[   32.082053]  ret_from_fork+0x10/0x20
[   32.082600] 
[   32.083029] The buggy address belongs to the object at fff00000c78a2180
[   32.083029]  which belongs to the cache kmalloc-64 of size 64
[   32.083617] The buggy address is located 0 bytes to the right of
[   32.083617]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.083840] 
[   32.083911] The buggy address belongs to the physical page:
[   32.084007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.085425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.085629] page_type: f5(slab)
[   32.085800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.086088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.086248] page dumped because: kasan: bad access detected
[   32.086389] 
[   32.087090] Memory state around the buggy address:
[   32.087442]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.087618]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.087758] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.088423]                                      ^
[   32.088579]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.088709]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.088837] ==================================================================
[   32.184039] ==================================================================
[   32.184175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   32.184361] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.184516] 
[   32.184584] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.184771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.184890] Hardware name: linux,dummy-virt (DT)
[   32.185020] Call trace:
[   32.185089]  show_stack+0x20/0x38 (C)
[   32.185216]  dump_stack_lvl+0x8c/0xd0
[   32.185346]  print_report+0x118/0x608
[   32.185479]  kasan_report+0xdc/0x128
[   32.185600]  __asan_report_load8_noabort+0x20/0x30
[   32.185734]  kasan_atomics_helper+0x3df4/0x4858
[   32.185865]  kasan_atomics+0x198/0x2e0
[   32.186002]  kunit_try_run_case+0x170/0x3f0
[   32.186200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.186402]  kthread+0x328/0x630
[   32.186566]  ret_from_fork+0x10/0x20
[   32.186714] 
[   32.186780] Allocated by task 267:
[   32.186865]  kasan_save_stack+0x3c/0x68
[   32.186987]  kasan_save_track+0x20/0x40
[   32.187097]  kasan_save_alloc_info+0x40/0x58
[   32.187217]  __kasan_kmalloc+0xd4/0xd8
[   32.187322]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.187479]  kasan_atomics+0xb8/0x2e0
[   32.187588]  kunit_try_run_case+0x170/0x3f0
[   32.187713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.187852]  kthread+0x328/0x630
[   32.187960]  ret_from_fork+0x10/0x20
[   32.188071] 
[   32.188500] The buggy address belongs to the object at fff00000c78a2180
[   32.188500]  which belongs to the cache kmalloc-64 of size 64
[   32.190013] The buggy address is located 0 bytes to the right of
[   32.190013]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.190219] 
[   32.190288] The buggy address belongs to the physical page:
[   32.190393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.190575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.190731] page_type: f5(slab)
[   32.190875] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.191032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.191160] page dumped because: kasan: bad access detected
[   32.191247] 
[   32.191305] Memory state around the buggy address:
[   32.191424]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.191624]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.191813] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.191984]                                      ^
[   32.192109]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192244]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.192365] ==================================================================
[   32.106218] ==================================================================
[   32.106381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   32.106539] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.106689] 
[   32.106753] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.106876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.106916] Hardware name: linux,dummy-virt (DT)
[   32.106964] Call trace:
[   32.107000]  show_stack+0x20/0x38 (C)
[   32.107078]  dump_stack_lvl+0x8c/0xd0
[   32.107150]  print_report+0x118/0x608
[   32.107215]  kasan_report+0xdc/0x128
[   32.107281]  kasan_check_range+0x100/0x1a8
[   32.107348]  __kasan_check_write+0x20/0x30
[   32.107433]  kasan_atomics_helper+0x147c/0x4858
[   32.107558]  kasan_atomics+0x198/0x2e0
[   32.107660]  kunit_try_run_case+0x170/0x3f0
[   32.107801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.107967]  kthread+0x328/0x630
[   32.108097]  ret_from_fork+0x10/0x20
[   32.108240] 
[   32.108306] Allocated by task 267:
[   32.108391]  kasan_save_stack+0x3c/0x68
[   32.108529]  kasan_save_track+0x20/0x40
[   32.108640]  kasan_save_alloc_info+0x40/0x58
[   32.108762]  __kasan_kmalloc+0xd4/0xd8
[   32.109074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.109618]  kasan_atomics+0xb8/0x2e0
[   32.109748]  kunit_try_run_case+0x170/0x3f0
[   32.109865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.109977]  kthread+0x328/0x630
[   32.110085]  ret_from_fork+0x10/0x20
[   32.110197] 
[   32.110267] The buggy address belongs to the object at fff00000c78a2180
[   32.110267]  which belongs to the cache kmalloc-64 of size 64
[   32.110864] The buggy address is located 0 bytes to the right of
[   32.110864]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.111407] 
[   32.111535] The buggy address belongs to the physical page:
[   32.111664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.111834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.112003] page_type: f5(slab)
[   32.112174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.112398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.112601] page dumped because: kasan: bad access detected
[   32.112746] 
[   32.112835] Memory state around the buggy address:
[   32.112976]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.113170]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.113358] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.113504]                                      ^
[   32.113601]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.113724]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.113847] ==================================================================
[   31.706346] ==================================================================
[   31.706512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   31.706669] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.706822] 
[   31.706926] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.707182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.708241] Hardware name: linux,dummy-virt (DT)
[   31.708377] Call trace:
[   31.709021]  show_stack+0x20/0x38 (C)
[   31.709403]  dump_stack_lvl+0x8c/0xd0
[   31.709734]  print_report+0x118/0x608
[   31.710856]  kasan_report+0xdc/0x128
[   31.711219]  kasan_check_range+0x100/0x1a8
[   31.712307]  __kasan_check_write+0x20/0x30
[   31.712793]  kasan_atomics_helper+0x99c/0x4858
[   31.712974]  kasan_atomics+0x198/0x2e0
[   31.713564]  kunit_try_run_case+0x170/0x3f0
[   31.713725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.713894]  kthread+0x328/0x630
[   31.714678]  ret_from_fork+0x10/0x20
[   31.715843] 
[   31.716084] Allocated by task 267:
[   31.716338]  kasan_save_stack+0x3c/0x68
[   31.716541]  kasan_save_track+0x20/0x40
[   31.716801]  kasan_save_alloc_info+0x40/0x58
[   31.717261]  __kasan_kmalloc+0xd4/0xd8
[   31.717697]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.718053]  kasan_atomics+0xb8/0x2e0
[   31.718292]  kunit_try_run_case+0x170/0x3f0
[   31.718417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.718571]  kthread+0x328/0x630
[   31.719819]  ret_from_fork+0x10/0x20
[   31.720569] 
[   31.721160] The buggy address belongs to the object at fff00000c78a2180
[   31.721160]  which belongs to the cache kmalloc-64 of size 64
[   31.721478] The buggy address is located 0 bytes to the right of
[   31.721478]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.721863] 
[   31.721942] The buggy address belongs to the physical page:
[   31.722193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.722695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.723514] page_type: f5(slab)
[   31.723737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.724196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.724657] page dumped because: kasan: bad access detected
[   31.725595] 
[   31.725697] Memory state around the buggy address:
[   31.725907]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.726935]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.727076] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.727725]                                      ^
[   31.728140]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.728510]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.728640] ==================================================================
[   31.741925] ==================================================================
[   31.742134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   31.742303] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.742492] 
[   31.742641] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.742987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.743119] Hardware name: linux,dummy-virt (DT)
[   31.743222] Call trace:
[   31.743293]  show_stack+0x20/0x38 (C)
[   31.743901]  dump_stack_lvl+0x8c/0xd0
[   31.744118]  print_report+0x118/0x608
[   31.744253]  kasan_report+0xdc/0x128
[   31.744386]  kasan_check_range+0x100/0x1a8
[   31.744555]  __kasan_check_write+0x20/0x30
[   31.744704]  kasan_atomics_helper+0xa6c/0x4858
[   31.744850]  kasan_atomics+0x198/0x2e0
[   31.744988]  kunit_try_run_case+0x170/0x3f0
[   31.747789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.748319]  kthread+0x328/0x630
[   31.748484]  ret_from_fork+0x10/0x20
[   31.748609] 
[   31.748658] Allocated by task 267:
[   31.748740]  kasan_save_stack+0x3c/0x68
[   31.749237]  kasan_save_track+0x20/0x40
[   31.749504]  kasan_save_alloc_info+0x40/0x58
[   31.750089]  __kasan_kmalloc+0xd4/0xd8
[   31.750211]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.750341]  kasan_atomics+0xb8/0x2e0
[   31.750469]  kunit_try_run_case+0x170/0x3f0
[   31.750600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.750741]  kthread+0x328/0x630
[   31.750852]  ret_from_fork+0x10/0x20
[   31.750967] 
[   31.751036] The buggy address belongs to the object at fff00000c78a2180
[   31.751036]  which belongs to the cache kmalloc-64 of size 64
[   31.751984] The buggy address is located 0 bytes to the right of
[   31.751984]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.753329] 
[   31.753405] The buggy address belongs to the physical page:
[   31.753566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.753819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.754069] page_type: f5(slab)
[   31.754245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.754715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.755129] page dumped because: kasan: bad access detected
[   31.755252] 
[   31.755315] Memory state around the buggy address:
[   31.755683]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.755869]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.756008] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.756306]                                      ^
[   31.756659]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.756790]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.756891] ==================================================================
[   31.986897] ==================================================================
[   31.987046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   31.987198] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.987356] 
[   31.987900] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.988328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.988422] Hardware name: linux,dummy-virt (DT)
[   31.988743] Call trace:
[   31.988897]  show_stack+0x20/0x38 (C)
[   31.989057]  dump_stack_lvl+0x8c/0xd0
[   31.989197]  print_report+0x118/0x608
[   31.989379]  kasan_report+0xdc/0x128
[   31.989643]  kasan_check_range+0x100/0x1a8
[   31.990239]  __kasan_check_write+0x20/0x30
[   31.990511]  kasan_atomics_helper+0x10c0/0x4858
[   31.990728]  kasan_atomics+0x198/0x2e0
[   31.990921]  kunit_try_run_case+0x170/0x3f0
[   31.991266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.991564]  kthread+0x328/0x630
[   31.991732]  ret_from_fork+0x10/0x20
[   31.991960] 
[   31.992028] Allocated by task 267:
[   31.992468]  kasan_save_stack+0x3c/0x68
[   31.992759]  kasan_save_track+0x20/0x40
[   31.992885]  kasan_save_alloc_info+0x40/0x58
[   31.993108]  __kasan_kmalloc+0xd4/0xd8
[   31.993404]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.993649]  kasan_atomics+0xb8/0x2e0
[   31.993761]  kunit_try_run_case+0x170/0x3f0
[   31.993874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.994003]  kthread+0x328/0x630
[   31.994184]  ret_from_fork+0x10/0x20
[   31.994413] 
[   31.994687] The buggy address belongs to the object at fff00000c78a2180
[   31.994687]  which belongs to the cache kmalloc-64 of size 64
[   31.995151] The buggy address is located 0 bytes to the right of
[   31.995151]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.995535] 
[   31.995603] The buggy address belongs to the physical page:
[   31.996250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.996714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.997132] page_type: f5(slab)
[   31.997313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.997440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.997577] page dumped because: kasan: bad access detected
[   31.997677] 
[   31.997730] Memory state around the buggy address:
[   31.998015]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.998291]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.998637] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.998855]                                      ^
[   31.998971]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.999104]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.999229] ==================================================================
[   32.139199] ==================================================================
[   32.139473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   32.139878] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.140202] 
[   32.140318] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.140572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.140657] Hardware name: linux,dummy-virt (DT)
[   32.140762] Call trace:
[   32.140835]  show_stack+0x20/0x38 (C)
[   32.141645]  dump_stack_lvl+0x8c/0xd0
[   32.142048]  print_report+0x118/0x608
[   32.142182]  kasan_report+0xdc/0x128
[   32.142355]  kasan_check_range+0x100/0x1a8
[   32.142514]  __kasan_check_write+0x20/0x30
[   32.142666]  kasan_atomics_helper+0x15b4/0x4858
[   32.143397]  kasan_atomics+0x198/0x2e0
[   32.143871]  kunit_try_run_case+0x170/0x3f0
[   32.144247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.144814]  kthread+0x328/0x630
[   32.145171]  ret_from_fork+0x10/0x20
[   32.145341] 
[   32.145410] Allocated by task 267:
[   32.145915]  kasan_save_stack+0x3c/0x68
[   32.146187]  kasan_save_track+0x20/0x40
[   32.146491]  kasan_save_alloc_info+0x40/0x58
[   32.146754]  __kasan_kmalloc+0xd4/0xd8
[   32.146865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.147652]  kasan_atomics+0xb8/0x2e0
[   32.147946]  kunit_try_run_case+0x170/0x3f0
[   32.148497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.148639]  kthread+0x328/0x630
[   32.148753]  ret_from_fork+0x10/0x20
[   32.148856] 
[   32.148911] The buggy address belongs to the object at fff00000c78a2180
[   32.148911]  which belongs to the cache kmalloc-64 of size 64
[   32.149460] The buggy address is located 0 bytes to the right of
[   32.149460]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.149686] 
[   32.149898] The buggy address belongs to the physical page:
[   32.150008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.150170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.150320] page_type: f5(slab)
[   32.150442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.150625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.150762] page dumped because: kasan: bad access detected
[   32.150875] 
[   32.150942] Memory state around the buggy address:
[   32.151046]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.151188]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.151327] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.151865]                                      ^
[   32.152038]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.152179]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.152305] ==================================================================
[   32.098328] ==================================================================
[   32.098529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   32.098665] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.098927] 
[   32.099070] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.099342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.099428] Hardware name: linux,dummy-virt (DT)
[   32.099530] Call trace:
[   32.099605]  show_stack+0x20/0x38 (C)
[   32.099778]  dump_stack_lvl+0x8c/0xd0
[   32.100027]  print_report+0x118/0x608
[   32.100183]  kasan_report+0xdc/0x128
[   32.100296]  kasan_check_range+0x100/0x1a8
[   32.100467]  __kasan_check_write+0x20/0x30
[   32.100599]  kasan_atomics_helper+0x1414/0x4858
[   32.100772]  kasan_atomics+0x198/0x2e0
[   32.100903]  kunit_try_run_case+0x170/0x3f0
[   32.101046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.101194]  kthread+0x328/0x630
[   32.101358]  ret_from_fork+0x10/0x20
[   32.101601] 
[   32.101690] Allocated by task 267:
[   32.101826]  kasan_save_stack+0x3c/0x68
[   32.101956]  kasan_save_track+0x20/0x40
[   32.102116]  kasan_save_alloc_info+0x40/0x58
[   32.102237]  __kasan_kmalloc+0xd4/0xd8
[   32.102352]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.102493]  kasan_atomics+0xb8/0x2e0
[   32.102607]  kunit_try_run_case+0x170/0x3f0
[   32.102725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.102864]  kthread+0x328/0x630
[   32.102973]  ret_from_fork+0x10/0x20
[   32.103085] 
[   32.103155] The buggy address belongs to the object at fff00000c78a2180
[   32.103155]  which belongs to the cache kmalloc-64 of size 64
[   32.103340] The buggy address is located 0 bytes to the right of
[   32.103340]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.103555] 
[   32.103623] The buggy address belongs to the physical page:
[   32.103746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.103894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.104078] page_type: f5(slab)
[   32.104206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.104373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.104512] page dumped because: kasan: bad access detected
[   32.104619] 
[   32.104682] Memory state around the buggy address:
[   32.104824]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.104963]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.105128] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.105273]                                      ^
[   32.105428]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.105631]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.105749] ==================================================================
[   32.237293] ==================================================================
[   32.237460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   32.237695] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.237917] 
[   32.238057] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.238333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.238501] Hardware name: linux,dummy-virt (DT)
[   32.238608] Call trace:
[   32.238681]  show_stack+0x20/0x38 (C)
[   32.239272]  dump_stack_lvl+0x8c/0xd0
[   32.239535]  print_report+0x118/0x608
[   32.239736]  kasan_report+0xdc/0x128
[   32.239966]  __asan_report_load8_noabort+0x20/0x30
[   32.240159]  kasan_atomics_helper+0x3e20/0x4858
[   32.240614]  kasan_atomics+0x198/0x2e0
[   32.241016]  kunit_try_run_case+0x170/0x3f0
[   32.241216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.241593]  kthread+0x328/0x630
[   32.242012]  ret_from_fork+0x10/0x20
[   32.242588] 
[   32.242715] Allocated by task 267:
[   32.242810]  kasan_save_stack+0x3c/0x68
[   32.242995]  kasan_save_track+0x20/0x40
[   32.243539]  kasan_save_alloc_info+0x40/0x58
[   32.244078]  __kasan_kmalloc+0xd4/0xd8
[   32.244206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.244515]  kasan_atomics+0xb8/0x2e0
[   32.244859]  kunit_try_run_case+0x170/0x3f0
[   32.245058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.245282]  kthread+0x328/0x630
[   32.245376]  ret_from_fork+0x10/0x20
[   32.245486] 
[   32.245547] The buggy address belongs to the object at fff00000c78a2180
[   32.245547]  which belongs to the cache kmalloc-64 of size 64
[   32.246119] The buggy address is located 0 bytes to the right of
[   32.246119]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.246702] 
[   32.246897] The buggy address belongs to the physical page:
[   32.247314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.247540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.247866] page_type: f5(slab)
[   32.248107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.248817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.248965] page dumped because: kasan: bad access detected
[   32.249049] 
[   32.249225] Memory state around the buggy address:
[   32.249339]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.249572]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.249871] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.250417]                                      ^
[   32.250737]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251087]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251580] ==================================================================
[   31.927679] ==================================================================
[   31.927831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   31.928669] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.928851] 
[   31.928986] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.929333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.929503] Hardware name: linux,dummy-virt (DT)
[   31.929605] Call trace:
[   31.930130]  show_stack+0x20/0x38 (C)
[   31.930319]  dump_stack_lvl+0x8c/0xd0
[   31.930560]  print_report+0x118/0x608
[   31.930696]  kasan_report+0xdc/0x128
[   31.930931]  kasan_check_range+0x100/0x1a8
[   31.931156]  __kasan_check_write+0x20/0x30
[   31.931370]  kasan_atomics_helper+0xeb8/0x4858
[   31.931599]  kasan_atomics+0x198/0x2e0
[   31.931776]  kunit_try_run_case+0x170/0x3f0
[   31.931925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.932599]  kthread+0x328/0x630
[   31.932742]  ret_from_fork+0x10/0x20
[   31.932859] 
[   31.933186] Allocated by task 267:
[   31.933491]  kasan_save_stack+0x3c/0x68
[   31.933689]  kasan_save_track+0x20/0x40
[   31.933858]  kasan_save_alloc_info+0x40/0x58
[   31.934023]  __kasan_kmalloc+0xd4/0xd8
[   31.934186]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.934362]  kasan_atomics+0xb8/0x2e0
[   31.934526]  kunit_try_run_case+0x170/0x3f0
[   31.934703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.934894]  kthread+0x328/0x630
[   31.935056]  ret_from_fork+0x10/0x20
[   31.935218] 
[   31.935288] The buggy address belongs to the object at fff00000c78a2180
[   31.935288]  which belongs to the cache kmalloc-64 of size 64
[   31.935482] The buggy address is located 0 bytes to the right of
[   31.935482]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.935699] 
[   31.935784] The buggy address belongs to the physical page:
[   31.935877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.936531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.936761] page_type: f5(slab)
[   31.937129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.937367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.938066] page dumped because: kasan: bad access detected
[   31.938143] 
[   31.938173] Memory state around the buggy address:
[   31.938230]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.938296]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.938362] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.938417]                                      ^
[   31.938506]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.938633]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.938752] ==================================================================
[   32.090704] ==================================================================
[   32.090850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   32.090995] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.091145] 
[   32.091250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.091525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.091610] Hardware name: linux,dummy-virt (DT)
[   32.091714] Call trace:
[   32.091784]  show_stack+0x20/0x38 (C)
[   32.091980]  dump_stack_lvl+0x8c/0xd0
[   32.092114]  print_report+0x118/0x608
[   32.092249]  kasan_report+0xdc/0x128
[   32.092390]  __asan_report_load8_noabort+0x20/0x30
[   32.092570]  kasan_atomics_helper+0x3f04/0x4858
[   32.092704]  kasan_atomics+0x198/0x2e0
[   32.092838]  kunit_try_run_case+0x170/0x3f0
[   32.092995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.093216]  kthread+0x328/0x630
[   32.093339]  ret_from_fork+0x10/0x20
[   32.093617] 
[   32.093701] Allocated by task 267:
[   32.093782]  kasan_save_stack+0x3c/0x68
[   32.093935]  kasan_save_track+0x20/0x40
[   32.094041]  kasan_save_alloc_info+0x40/0x58
[   32.094196]  __kasan_kmalloc+0xd4/0xd8
[   32.094300]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.094437]  kasan_atomics+0xb8/0x2e0
[   32.094587]  kunit_try_run_case+0x170/0x3f0
[   32.094691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.094824]  kthread+0x328/0x630
[   32.094962]  ret_from_fork+0x10/0x20
[   32.095069] 
[   32.095125] The buggy address belongs to the object at fff00000c78a2180
[   32.095125]  which belongs to the cache kmalloc-64 of size 64
[   32.095269] The buggy address is located 0 bytes to the right of
[   32.095269]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.095493] 
[   32.095562] The buggy address belongs to the physical page:
[   32.095697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.095997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.096160] page_type: f5(slab)
[   32.096287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.096505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.096699] page dumped because: kasan: bad access detected
[   32.096846] 
[   32.096911] Memory state around the buggy address:
[   32.097009]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.097126]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.097276] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.097384]                                      ^
[   32.097512]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.097654]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.097796] ==================================================================
[   32.114583] ==================================================================
[   32.114719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   32.114858] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.115038] 
[   32.115185] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.115561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.115679] Hardware name: linux,dummy-virt (DT)
[   32.115825] Call trace:
[   32.115900]  show_stack+0x20/0x38 (C)
[   32.116059]  dump_stack_lvl+0x8c/0xd0
[   32.116397]  print_report+0x118/0x608
[   32.116555]  kasan_report+0xdc/0x128
[   32.116887]  kasan_check_range+0x100/0x1a8
[   32.117019]  __kasan_check_write+0x20/0x30
[   32.117167]  kasan_atomics_helper+0x14e4/0x4858
[   32.117349]  kasan_atomics+0x198/0x2e0
[   32.117563]  kunit_try_run_case+0x170/0x3f0
[   32.117722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.117956]  kthread+0x328/0x630
[   32.118147]  ret_from_fork+0x10/0x20
[   32.118354] 
[   32.118460] Allocated by task 267:
[   32.118537]  kasan_save_stack+0x3c/0x68
[   32.118648]  kasan_save_track+0x20/0x40
[   32.118952]  kasan_save_alloc_info+0x40/0x58
[   32.119097]  __kasan_kmalloc+0xd4/0xd8
[   32.119408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.119580]  kasan_atomics+0xb8/0x2e0
[   32.119733]  kunit_try_run_case+0x170/0x3f0
[   32.119846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120006]  kthread+0x328/0x630
[   32.120162]  ret_from_fork+0x10/0x20
[   32.120317] 
[   32.120389] The buggy address belongs to the object at fff00000c78a2180
[   32.120389]  which belongs to the cache kmalloc-64 of size 64
[   32.120591] The buggy address is located 0 bytes to the right of
[   32.120591]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.120807] 
[   32.120902] The buggy address belongs to the physical page:
[   32.121044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.121223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.121399] page_type: f5(slab)
[   32.121516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.121660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.121790] page dumped because: kasan: bad access detected
[   32.122153] 
[   32.122251] Memory state around the buggy address:
[   32.122371]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.122527]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.122690] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.122822]                                      ^
[   32.122941]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.123123]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.123273] ==================================================================
[   32.031753] ==================================================================
[   32.031903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   32.032574] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.032734] 
[   32.032911] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.033549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.033646] Hardware name: linux,dummy-virt (DT)
[   32.033743] Call trace:
[   32.033844]  show_stack+0x20/0x38 (C)
[   32.034115]  dump_stack_lvl+0x8c/0xd0
[   32.034707]  print_report+0x118/0x608
[   32.035105]  kasan_report+0xdc/0x128
[   32.035403]  kasan_check_range+0x100/0x1a8
[   32.035572]  __kasan_check_write+0x20/0x30
[   32.035718]  kasan_atomics_helper+0x11f8/0x4858
[   32.035865]  kasan_atomics+0x198/0x2e0
[   32.035995]  kunit_try_run_case+0x170/0x3f0
[   32.036719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.037301]  kthread+0x328/0x630
[   32.037539]  ret_from_fork+0x10/0x20
[   32.037720] 
[   32.037786] Allocated by task 267:
[   32.037879]  kasan_save_stack+0x3c/0x68
[   32.037999]  kasan_save_track+0x20/0x40
[   32.038252]  kasan_save_alloc_info+0x40/0x58
[   32.038555]  __kasan_kmalloc+0xd4/0xd8
[   32.038996]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.039407]  kasan_atomics+0xb8/0x2e0
[   32.039742]  kunit_try_run_case+0x170/0x3f0
[   32.039991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.040133]  kthread+0x328/0x630
[   32.040481]  ret_from_fork+0x10/0x20
[   32.040809] 
[   32.040899] The buggy address belongs to the object at fff00000c78a2180
[   32.040899]  which belongs to the cache kmalloc-64 of size 64
[   32.041099] The buggy address is located 0 bytes to the right of
[   32.041099]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.041302] 
[   32.041372] The buggy address belongs to the physical page:
[   32.041489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.041649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.042392] page_type: f5(slab)
[   32.042622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.042889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.043119] page dumped because: kasan: bad access detected
[   32.043391] 
[   32.043473] Memory state around the buggy address:
[   32.043582]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.043994]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.044139] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.044782]                                      ^
[   32.045130]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.045278]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.045376] ==================================================================
[   32.176210] ==================================================================
[   32.176362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   32.176596] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.176805] 
[   32.176943] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.177236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.177325] Hardware name: linux,dummy-virt (DT)
[   32.177420] Call trace:
[   32.177512]  show_stack+0x20/0x38 (C)
[   32.177650]  dump_stack_lvl+0x8c/0xd0
[   32.177772]  print_report+0x118/0x608
[   32.177902]  kasan_report+0xdc/0x128
[   32.178031]  kasan_check_range+0x100/0x1a8
[   32.178178]  __kasan_check_write+0x20/0x30
[   32.178321]  kasan_atomics_helper+0x1644/0x4858
[   32.178489]  kasan_atomics+0x198/0x2e0
[   32.178619]  kunit_try_run_case+0x170/0x3f0
[   32.178760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.178902]  kthread+0x328/0x630
[   32.179101]  ret_from_fork+0x10/0x20
[   32.179294] 
[   32.179356] Allocated by task 267:
[   32.179466]  kasan_save_stack+0x3c/0x68
[   32.179642]  kasan_save_track+0x20/0x40
[   32.179792]  kasan_save_alloc_info+0x40/0x58
[   32.179915]  __kasan_kmalloc+0xd4/0xd8
[   32.180018]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.180170]  kasan_atomics+0xb8/0x2e0
[   32.180275]  kunit_try_run_case+0x170/0x3f0
[   32.180388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.180553]  kthread+0x328/0x630
[   32.180666]  ret_from_fork+0x10/0x20
[   32.180777] 
[   32.180846] The buggy address belongs to the object at fff00000c78a2180
[   32.180846]  which belongs to the cache kmalloc-64 of size 64
[   32.181041] The buggy address is located 0 bytes to the right of
[   32.181041]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.181267] 
[   32.181339] The buggy address belongs to the physical page:
[   32.181432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.181599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.181801] page_type: f5(slab)
[   32.181942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.182189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.182318] page dumped because: kasan: bad access detected
[   32.182397] 
[   32.182466] Memory state around the buggy address:
[   32.182561]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.182705]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.182838] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.182983]                                      ^
[   32.183138]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183331]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.183529] ==================================================================
[   32.193127] ==================================================================
[   32.193228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   32.193306] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.193502] 
[   32.193644] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.193994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.194070] Hardware name: linux,dummy-virt (DT)
[   32.194152] Call trace:
[   32.194212]  show_stack+0x20/0x38 (C)
[   32.194347]  dump_stack_lvl+0x8c/0xd0
[   32.194502]  print_report+0x118/0x608
[   32.194690]  kasan_report+0xdc/0x128
[   32.194889]  kasan_check_range+0x100/0x1a8
[   32.195087]  __kasan_check_write+0x20/0x30
[   32.195297]  kasan_atomics_helper+0x16d0/0x4858
[   32.195463]  kasan_atomics+0x198/0x2e0
[   32.195594]  kunit_try_run_case+0x170/0x3f0
[   32.195737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.195902]  kthread+0x328/0x630
[   32.196667]  ret_from_fork+0x10/0x20
[   32.197209] 
[   32.197401] Allocated by task 267:
[   32.197591]  kasan_save_stack+0x3c/0x68
[   32.197764]  kasan_save_track+0x20/0x40
[   32.197907]  kasan_save_alloc_info+0x40/0x58
[   32.198058]  __kasan_kmalloc+0xd4/0xd8
[   32.198210]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.198396]  kasan_atomics+0xb8/0x2e0
[   32.198519]  kunit_try_run_case+0x170/0x3f0
[   32.198624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.199038]  kthread+0x328/0x630
[   32.199460]  ret_from_fork+0x10/0x20
[   32.199629] 
[   32.199699] The buggy address belongs to the object at fff00000c78a2180
[   32.199699]  which belongs to the cache kmalloc-64 of size 64
[   32.199937] The buggy address is located 0 bytes to the right of
[   32.199937]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.200120] 
[   32.200441] The buggy address belongs to the physical page:
[   32.200663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.200861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.201021] page_type: f5(slab)
[   32.201138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.201310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.201492] page dumped because: kasan: bad access detected
[   32.201603] 
[   32.201660] Memory state around the buggy address:
[   32.201759]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202119]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.202283] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.202405]                                      ^
[   32.202566]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.202759]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.202921] ==================================================================
[   31.884383] ==================================================================
[   31.884534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   31.884686] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.884899] 
[   31.885045] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.885299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.885383] Hardware name: linux,dummy-virt (DT)
[   31.885501] Call trace:
[   31.885574]  show_stack+0x20/0x38 (C)
[   31.885722]  dump_stack_lvl+0x8c/0xd0
[   31.885866]  print_report+0x118/0x608
[   31.885998]  kasan_report+0xdc/0x128
[   31.886140]  kasan_check_range+0x100/0x1a8
[   31.886282]  __kasan_check_read+0x20/0x30
[   31.886477]  kasan_atomics_helper+0xdd4/0x4858
[   31.886602]  kasan_atomics+0x198/0x2e0
[   31.886727]  kunit_try_run_case+0x170/0x3f0
[   31.886857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.887021]  kthread+0x328/0x630
[   31.887166]  ret_from_fork+0x10/0x20
[   31.887422] 
[   31.887505] Allocated by task 267:
[   31.887604]  kasan_save_stack+0x3c/0x68
[   31.887729]  kasan_save_track+0x20/0x40
[   31.887829]  kasan_save_alloc_info+0x40/0x58
[   31.887986]  __kasan_kmalloc+0xd4/0xd8
[   31.888147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.888265]  kasan_atomics+0xb8/0x2e0
[   31.888414]  kunit_try_run_case+0x170/0x3f0
[   31.888538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.888824]  kthread+0x328/0x630
[   31.888941]  ret_from_fork+0x10/0x20
[   31.889038] 
[   31.889108] The buggy address belongs to the object at fff00000c78a2180
[   31.889108]  which belongs to the cache kmalloc-64 of size 64
[   31.889460] The buggy address is located 0 bytes to the right of
[   31.889460]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.889677] 
[   31.889766] The buggy address belongs to the physical page:
[   31.889878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.890020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.890230] page_type: f5(slab)
[   31.890341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.890479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.890575] page dumped because: kasan: bad access detected
[   31.890687] 
[   31.890744] Memory state around the buggy address:
[   31.890845]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.890973]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.891111] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.891236]                                      ^
[   31.891388]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.891525]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.891677] ==================================================================
[   31.917678] ==================================================================
[   31.917806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   31.917937] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.918088] 
[   31.918182] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.918839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.918994] Hardware name: linux,dummy-virt (DT)
[   31.919090] Call trace:
[   31.919199]  show_stack+0x20/0x38 (C)
[   31.919421]  dump_stack_lvl+0x8c/0xd0
[   31.919575]  print_report+0x118/0x608
[   31.919751]  kasan_report+0xdc/0x128
[   31.919950]  __asan_report_store8_noabort+0x20/0x30
[   31.920163]  kasan_atomics_helper+0x3e5c/0x4858
[   31.920369]  kasan_atomics+0x198/0x2e0
[   31.920576]  kunit_try_run_case+0x170/0x3f0
[   31.920775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.920988]  kthread+0x328/0x630
[   31.921134]  ret_from_fork+0x10/0x20
[   31.921344] 
[   31.921427] Allocated by task 267:
[   31.921520]  kasan_save_stack+0x3c/0x68
[   31.921622]  kasan_save_track+0x20/0x40
[   31.921720]  kasan_save_alloc_info+0x40/0x58
[   31.921899]  __kasan_kmalloc+0xd4/0xd8
[   31.922045]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.922508]  kasan_atomics+0xb8/0x2e0
[   31.922613]  kunit_try_run_case+0x170/0x3f0
[   31.923068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.923270]  kthread+0x328/0x630
[   31.923712]  ret_from_fork+0x10/0x20
[   31.923819] 
[   31.923871] The buggy address belongs to the object at fff00000c78a2180
[   31.923871]  which belongs to the cache kmalloc-64 of size 64
[   31.924284] The buggy address is located 0 bytes to the right of
[   31.924284]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.924777] 
[   31.924877] The buggy address belongs to the physical page:
[   31.925023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.925256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.925395] page_type: f5(slab)
[   31.925510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.925628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.925728] page dumped because: kasan: bad access detected
[   31.925810] 
[   31.925858] Memory state around the buggy address:
[   31.925938]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.926069]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.926213] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.926316]                                      ^
[   31.926458]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.926576]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.926720] ==================================================================
[   31.961572] ==================================================================
[   31.961977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   31.962158] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.962315] 
[   31.962768] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.963361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.963491] Hardware name: linux,dummy-virt (DT)
[   31.963677] Call trace:
[   31.963755]  show_stack+0x20/0x38 (C)
[   31.964235]  dump_stack_lvl+0x8c/0xd0
[   31.964369]  print_report+0x118/0x608
[   31.964518]  kasan_report+0xdc/0x128
[   31.964649]  kasan_check_range+0x100/0x1a8
[   31.964798]  __kasan_check_write+0x20/0x30
[   31.964946]  kasan_atomics_helper+0xff0/0x4858
[   31.965094]  kasan_atomics+0x198/0x2e0
[   31.965227]  kunit_try_run_case+0x170/0x3f0
[   31.965377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.965560]  kthread+0x328/0x630
[   31.965986]  ret_from_fork+0x10/0x20
[   31.966489] 
[   31.966580] Allocated by task 267:
[   31.966672]  kasan_save_stack+0x3c/0x68
[   31.966805]  kasan_save_track+0x20/0x40
[   31.966913]  kasan_save_alloc_info+0x40/0x58
[   31.967332]  __kasan_kmalloc+0xd4/0xd8
[   31.967784]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.968198]  kasan_atomics+0xb8/0x2e0
[   31.968378]  kunit_try_run_case+0x170/0x3f0
[   31.968607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.968766]  kthread+0x328/0x630
[   31.968884]  ret_from_fork+0x10/0x20
[   31.968996] 
[   31.969064] The buggy address belongs to the object at fff00000c78a2180
[   31.969064]  which belongs to the cache kmalloc-64 of size 64
[   31.969211] The buggy address is located 0 bytes to the right of
[   31.969211]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.969357] 
[   31.969673] The buggy address belongs to the physical page:
[   31.969776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.970163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.970436] page_type: f5(slab)
[   31.970850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.971173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.971319] page dumped because: kasan: bad access detected
[   31.971429] 
[   31.971505] Memory state around the buggy address:
[   31.971607]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.971751]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.972309] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.972691]                                      ^
[   31.972967]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.973225]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.973540] ==================================================================
[   31.872746] ==================================================================
[   31.872892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   31.873064] Read of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.873511] 
[   31.873915] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.874181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.874267] Hardware name: linux,dummy-virt (DT)
[   31.874371] Call trace:
[   31.874459]  show_stack+0x20/0x38 (C)
[   31.874617]  dump_stack_lvl+0x8c/0xd0
[   31.874759]  print_report+0x118/0x608
[   31.875951]  kasan_report+0xdc/0x128
[   31.876476]  __asan_report_load4_noabort+0x20/0x30
[   31.876656]  kasan_atomics_helper+0x3e04/0x4858
[   31.877160]  kasan_atomics+0x198/0x2e0
[   31.877378]  kunit_try_run_case+0x170/0x3f0
[   31.877583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.877741]  kthread+0x328/0x630
[   31.877853]  ret_from_fork+0x10/0x20
[   31.878006] 
[   31.878070] Allocated by task 267:
[   31.878155]  kasan_save_stack+0x3c/0x68
[   31.878260]  kasan_save_track+0x20/0x40
[   31.878363]  kasan_save_alloc_info+0x40/0x58
[   31.878494]  __kasan_kmalloc+0xd4/0xd8
[   31.878821]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.879020]  kasan_atomics+0xb8/0x2e0
[   31.879289]  kunit_try_run_case+0x170/0x3f0
[   31.879876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.880033]  kthread+0x328/0x630
[   31.880188]  ret_from_fork+0x10/0x20
[   31.880302] 
[   31.880360] The buggy address belongs to the object at fff00000c78a2180
[   31.880360]  which belongs to the cache kmalloc-64 of size 64
[   31.880678] The buggy address is located 0 bytes to the right of
[   31.880678]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.880958] 
[   31.881043] The buggy address belongs to the physical page:
[   31.881148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.881312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.881484] page_type: f5(slab)
[   31.881582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.881700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.881822] page dumped because: kasan: bad access detected
[   31.881927] 
[   31.881983] Memory state around the buggy address:
[   31.882113]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.882237]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.882359] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.882527]                                      ^
[   31.882714]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.882864]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.882977] ==================================================================
[   31.893582] ==================================================================
[   31.893797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   31.894009] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.894168] 
[   31.894273] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.894536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.894626] Hardware name: linux,dummy-virt (DT)
[   31.894726] Call trace:
[   31.894791]  show_stack+0x20/0x38 (C)
[   31.894934]  dump_stack_lvl+0x8c/0xd0
[   31.895083]  print_report+0x118/0x608
[   31.895222]  kasan_report+0xdc/0x128
[   31.895363]  __asan_report_load8_noabort+0x20/0x30
[   31.895944]  kasan_atomics_helper+0x3f58/0x4858
[   31.896597]  kasan_atomics+0x198/0x2e0
[   31.896780]  kunit_try_run_case+0x170/0x3f0
[   31.897117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.897734]  kthread+0x328/0x630
[   31.898718]  ret_from_fork+0x10/0x20
[   31.899066] 
[   31.899157] Allocated by task 267:
[   31.899260]  kasan_save_stack+0x3c/0x68
[   31.899558]  kasan_save_track+0x20/0x40
[   31.899679]  kasan_save_alloc_info+0x40/0x58
[   31.899811]  __kasan_kmalloc+0xd4/0xd8
[   31.899923]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.900035]  kasan_atomics+0xb8/0x2e0
[   31.900123]  kunit_try_run_case+0x170/0x3f0
[   31.900228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.900364]  kthread+0x328/0x630
[   31.900495]  ret_from_fork+0x10/0x20
[   31.902250] 
[   31.902339] The buggy address belongs to the object at fff00000c78a2180
[   31.902339]  which belongs to the cache kmalloc-64 of size 64
[   31.902549] The buggy address is located 0 bytes to the right of
[   31.902549]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.902756] 
[   31.902820] The buggy address belongs to the physical page:
[   31.902919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.903085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.903241] page_type: f5(slab)
[   31.903364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.905077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.905233] page dumped because: kasan: bad access detected
[   31.905345] 
[   31.905406] Memory state around the buggy address:
[   31.905728]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.905868]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.906004] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.906114]                                      ^
[   31.906220]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.906350]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.906633] ==================================================================
[   32.002134] ==================================================================
[   32.002472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   32.002780] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.003132] 
[   32.003332] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.003852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.004175] Hardware name: linux,dummy-virt (DT)
[   32.004291] Call trace:
[   32.004552]  show_stack+0x20/0x38 (C)
[   32.004949]  dump_stack_lvl+0x8c/0xd0
[   32.005295]  print_report+0x118/0x608
[   32.005675]  kasan_report+0xdc/0x128
[   32.006217]  kasan_check_range+0x100/0x1a8
[   32.006540]  __kasan_check_write+0x20/0x30
[   32.006879]  kasan_atomics_helper+0x1128/0x4858
[   32.007290]  kasan_atomics+0x198/0x2e0
[   32.007582]  kunit_try_run_case+0x170/0x3f0
[   32.007851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.008288]  kthread+0x328/0x630
[   32.008654]  ret_from_fork+0x10/0x20
[   32.008806] 
[   32.008868] Allocated by task 267:
[   32.008953]  kasan_save_stack+0x3c/0x68
[   32.009323]  kasan_save_track+0x20/0x40
[   32.009785]  kasan_save_alloc_info+0x40/0x58
[   32.009938]  __kasan_kmalloc+0xd4/0xd8
[   32.010229]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.010376]  kasan_atomics+0xb8/0x2e0
[   32.010819]  kunit_try_run_case+0x170/0x3f0
[   32.011466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.011679]  kthread+0x328/0x630
[   32.011853]  ret_from_fork+0x10/0x20
[   32.011976] 
[   32.012031] The buggy address belongs to the object at fff00000c78a2180
[   32.012031]  which belongs to the cache kmalloc-64 of size 64
[   32.012231] The buggy address is located 0 bytes to the right of
[   32.012231]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.012488] 
[   32.012567] The buggy address belongs to the physical page:
[   32.012699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.012866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.013022] page_type: f5(slab)
[   32.013125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.013246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.013550] page dumped because: kasan: bad access detected
[   32.013655] 
[   32.013719] Memory state around the buggy address:
[   32.014069]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.014249]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.014385] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.014524]                                      ^
[   32.014642]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.014782]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.014901] ==================================================================
[   31.974417] ==================================================================
[   31.974808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   31.974964] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.975125] 
[   31.975227] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.975504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.975594] Hardware name: linux,dummy-virt (DT)
[   31.975693] Call trace:
[   31.975773]  show_stack+0x20/0x38 (C)
[   31.975971]  dump_stack_lvl+0x8c/0xd0
[   31.976409]  print_report+0x118/0x608
[   31.976671]  kasan_report+0xdc/0x128
[   31.977024]  kasan_check_range+0x100/0x1a8
[   31.977279]  __kasan_check_write+0x20/0x30
[   31.977460]  kasan_atomics_helper+0x1058/0x4858
[   31.977610]  kasan_atomics+0x198/0x2e0
[   31.977748]  kunit_try_run_case+0x170/0x3f0
[   31.978144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.978486]  kthread+0x328/0x630
[   31.978735]  ret_from_fork+0x10/0x20
[   31.978960] 
[   31.979030] Allocated by task 267:
[   31.979124]  kasan_save_stack+0x3c/0x68
[   31.979271]  kasan_save_track+0x20/0x40
[   31.979399]  kasan_save_alloc_info+0x40/0x58
[   31.979536]  __kasan_kmalloc+0xd4/0xd8
[   31.979666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.979799]  kasan_atomics+0xb8/0x2e0
[   31.979906]  kunit_try_run_case+0x170/0x3f0
[   31.980397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.980802]  kthread+0x328/0x630
[   31.980936]  ret_from_fork+0x10/0x20
[   31.981029] 
[   31.981085] The buggy address belongs to the object at fff00000c78a2180
[   31.981085]  which belongs to the cache kmalloc-64 of size 64
[   31.981508] The buggy address is located 0 bytes to the right of
[   31.981508]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.982368] 
[   31.982951] The buggy address belongs to the physical page:
[   31.983077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.983333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.983593] page_type: f5(slab)
[   31.984030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.984281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.984503] page dumped because: kasan: bad access detected
[   31.984800] 
[   31.984992] Memory state around the buggy address:
[   31.985174]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.985512]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.985630] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.985728]                                      ^
[   31.985820]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.985917]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.986025] ==================================================================
[   32.153144] ==================================================================
[   32.153649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   32.153809] Read of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.155558] 
[   32.155707] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.155963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.156049] Hardware name: linux,dummy-virt (DT)
[   32.156152] Call trace:
[   32.156219]  show_stack+0x20/0x38 (C)
[   32.156372]  dump_stack_lvl+0x8c/0xd0
[   32.156540]  print_report+0x118/0x608
[   32.156680]  kasan_report+0xdc/0x128
[   32.156822]  __asan_report_load8_noabort+0x20/0x30
[   32.156974]  kasan_atomics_helper+0x3db0/0x4858
[   32.157122]  kasan_atomics+0x198/0x2e0
[   32.157259]  kunit_try_run_case+0x170/0x3f0
[   32.157412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.160412]  kthread+0x328/0x630
[   32.161568]  ret_from_fork+0x10/0x20
[   32.162302] 
[   32.162876] Allocated by task 267:
[   32.163020]  kasan_save_stack+0x3c/0x68
[   32.163439]  kasan_save_track+0x20/0x40
[   32.164182]  kasan_save_alloc_info+0x40/0x58
[   32.164324]  __kasan_kmalloc+0xd4/0xd8
[   32.164421]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.164536]  kasan_atomics+0xb8/0x2e0
[   32.164621]  kunit_try_run_case+0x170/0x3f0
[   32.164720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.164830]  kthread+0x328/0x630
[   32.164921]  ret_from_fork+0x10/0x20
[   32.165026] 
[   32.165091] The buggy address belongs to the object at fff00000c78a2180
[   32.165091]  which belongs to the cache kmalloc-64 of size 64
[   32.165280] The buggy address is located 0 bytes to the right of
[   32.165280]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.165503] 
[   32.168089] The buggy address belongs to the physical page:
[   32.168420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.168585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.169238] page_type: f5(slab)
[   32.169697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.169891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.170033] page dumped because: kasan: bad access detected
[   32.170132] 
[   32.170194] Memory state around the buggy address:
[   32.170296]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.170440]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.172637] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.172887]                                      ^
[   32.173973]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.174796]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.175144] ==================================================================
[   32.060077] ==================================================================
[   32.060518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   32.060745] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.060910] 
[   32.060998] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.061238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.061327] Hardware name: linux,dummy-virt (DT)
[   32.061541] Call trace:
[   32.061620]  show_stack+0x20/0x38 (C)
[   32.061968]  dump_stack_lvl+0x8c/0xd0
[   32.062205]  print_report+0x118/0x608
[   32.062359]  kasan_report+0xdc/0x128
[   32.062564]  kasan_check_range+0x100/0x1a8
[   32.062721]  __kasan_check_write+0x20/0x30
[   32.062888]  kasan_atomics_helper+0x12d8/0x4858
[   32.063091]  kasan_atomics+0x198/0x2e0
[   32.063278]  kunit_try_run_case+0x170/0x3f0
[   32.063488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.063680]  kthread+0x328/0x630
[   32.063845]  ret_from_fork+0x10/0x20
[   32.064027] 
[   32.064084] Allocated by task 267:
[   32.064170]  kasan_save_stack+0x3c/0x68
[   32.064294]  kasan_save_track+0x20/0x40
[   32.064804]  kasan_save_alloc_info+0x40/0x58
[   32.064980]  __kasan_kmalloc+0xd4/0xd8
[   32.065320]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.065483]  kasan_atomics+0xb8/0x2e0
[   32.065584]  kunit_try_run_case+0x170/0x3f0
[   32.065684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.065795]  kthread+0x328/0x630
[   32.066153]  ret_from_fork+0x10/0x20
[   32.066289] 
[   32.066350] The buggy address belongs to the object at fff00000c78a2180
[   32.066350]  which belongs to the cache kmalloc-64 of size 64
[   32.066574] The buggy address is located 0 bytes to the right of
[   32.066574]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.066826] 
[   32.066899] The buggy address belongs to the physical page:
[   32.067040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.067267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.067489] page_type: f5(slab)
[   32.067657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.067814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.067993] page dumped because: kasan: bad access detected
[   32.068086] 
[   32.068147] Memory state around the buggy address:
[   32.068343]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.068503]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.068989] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.069136]                                      ^
[   32.069865]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.070582]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.071183] ==================================================================
[   31.862479] ==================================================================
[   31.862627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   31.862783] Write of size 4 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.864094] 
[   31.864222] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.864359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.864400] Hardware name: linux,dummy-virt (DT)
[   31.864471] Call trace:
[   31.864541]  show_stack+0x20/0x38 (C)
[   31.864676]  dump_stack_lvl+0x8c/0xd0
[   31.864793]  print_report+0x118/0x608
[   31.864900]  kasan_report+0xdc/0x128
[   31.865014]  kasan_check_range+0x100/0x1a8
[   31.865133]  __kasan_check_write+0x20/0x30
[   31.865264]  kasan_atomics_helper+0xd3c/0x4858
[   31.865403]  kasan_atomics+0x198/0x2e0
[   31.865549]  kunit_try_run_case+0x170/0x3f0
[   31.865689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.865856]  kthread+0x328/0x630
[   31.865998]  ret_from_fork+0x10/0x20
[   31.866353] 
[   31.866471] Allocated by task 267:
[   31.866573]  kasan_save_stack+0x3c/0x68
[   31.867070]  kasan_save_track+0x20/0x40
[   31.867216]  kasan_save_alloc_info+0x40/0x58
[   31.867331]  __kasan_kmalloc+0xd4/0xd8
[   31.867465]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.867611]  kasan_atomics+0xb8/0x2e0
[   31.867772]  kunit_try_run_case+0x170/0x3f0
[   31.867902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.868046]  kthread+0x328/0x630
[   31.868200]  ret_from_fork+0x10/0x20
[   31.868356] 
[   31.868421] The buggy address belongs to the object at fff00000c78a2180
[   31.868421]  which belongs to the cache kmalloc-64 of size 64
[   31.868619] The buggy address is located 0 bytes to the right of
[   31.868619]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.868830] 
[   31.868922] The buggy address belongs to the physical page:
[   31.869077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.869305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.869500] page_type: f5(slab)
[   31.869603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.869747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.869880] page dumped because: kasan: bad access detected
[   31.869985] 
[   31.870152] Memory state around the buggy address:
[   31.870348]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.870496]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.870627] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.870744]                                      ^
[   31.870837]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.870975]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.871112] ==================================================================
[   32.017491] ==================================================================
[   32.017765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   32.017925] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   32.018077] 
[   32.018175] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   32.018420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.018512] Hardware name: linux,dummy-virt (DT)
[   32.018609] Call trace:
[   32.018676]  show_stack+0x20/0x38 (C)
[   32.018830]  dump_stack_lvl+0x8c/0xd0
[   32.018970]  print_report+0x118/0x608
[   32.019681]  kasan_report+0xdc/0x128
[   32.020053]  kasan_check_range+0x100/0x1a8
[   32.020413]  __kasan_check_write+0x20/0x30
[   32.020712]  kasan_atomics_helper+0x1190/0x4858
[   32.020907]  kasan_atomics+0x198/0x2e0
[   32.021022]  kunit_try_run_case+0x170/0x3f0
[   32.021155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.021322]  kthread+0x328/0x630
[   32.021955]  ret_from_fork+0x10/0x20
[   32.022290] 
[   32.022487] Allocated by task 267:
[   32.022992]  kasan_save_stack+0x3c/0x68
[   32.023306]  kasan_save_track+0x20/0x40
[   32.023700]  kasan_save_alloc_info+0x40/0x58
[   32.023865]  __kasan_kmalloc+0xd4/0xd8
[   32.024018]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.024236]  kasan_atomics+0xb8/0x2e0
[   32.024358]  kunit_try_run_case+0x170/0x3f0
[   32.024501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.024846]  kthread+0x328/0x630
[   32.024966]  ret_from_fork+0x10/0x20
[   32.025057] 
[   32.025323] The buggy address belongs to the object at fff00000c78a2180
[   32.025323]  which belongs to the cache kmalloc-64 of size 64
[   32.025531] The buggy address is located 0 bytes to the right of
[   32.025531]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   32.025990] 
[   32.026627] The buggy address belongs to the physical page:
[   32.026883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   32.027060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.027585] page_type: f5(slab)
[   32.027730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.028264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.028611] page dumped because: kasan: bad access detected
[   32.028754] 
[   32.028810] Memory state around the buggy address:
[   32.028896]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.029020]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.029160] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   32.029564]                                      ^
[   32.029808]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.030272]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.030734] ==================================================================
[   31.950496] ==================================================================
[   31.950665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   31.950809] Write of size 8 at addr fff00000c78a21b0 by task kunit_try_catch/267
[   31.951130] 
[   31.951262] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.951548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.951640] Hardware name: linux,dummy-virt (DT)
[   31.951772] Call trace:
[   31.951854]  show_stack+0x20/0x38 (C)
[   31.952071]  dump_stack_lvl+0x8c/0xd0
[   31.952208]  print_report+0x118/0x608
[   31.952318]  kasan_report+0xdc/0x128
[   31.952532]  kasan_check_range+0x100/0x1a8
[   31.952653]  __kasan_check_write+0x20/0x30
[   31.952728]  kasan_atomics_helper+0xf88/0x4858
[   31.952831]  kasan_atomics+0x198/0x2e0
[   31.952951]  kunit_try_run_case+0x170/0x3f0
[   31.953094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.953588]  kthread+0x328/0x630
[   31.954004]  ret_from_fork+0x10/0x20
[   31.954336] 
[   31.954428] Allocated by task 267:
[   31.954537]  kasan_save_stack+0x3c/0x68
[   31.954668]  kasan_save_track+0x20/0x40
[   31.954794]  kasan_save_alloc_info+0x40/0x58
[   31.954970]  __kasan_kmalloc+0xd4/0xd8
[   31.955075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.955199]  kasan_atomics+0xb8/0x2e0
[   31.955308]  kunit_try_run_case+0x170/0x3f0
[   31.955441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.955589]  kthread+0x328/0x630
[   31.955706]  ret_from_fork+0x10/0x20
[   31.955822] 
[   31.955885] The buggy address belongs to the object at fff00000c78a2180
[   31.955885]  which belongs to the cache kmalloc-64 of size 64
[   31.956067] The buggy address is located 0 bytes to the right of
[   31.956067]  allocated 48-byte region [fff00000c78a2180, fff00000c78a21b0)
[   31.956267] 
[   31.956374] The buggy address belongs to the physical page:
[   31.956807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078a2
[   31.957246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.957612] page_type: f5(slab)
[   31.957751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.958031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.958159] page dumped because: kasan: bad access detected
[   31.958239] 
[   31.958284] Memory state around the buggy address:
[   31.958545]  fff00000c78a2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.958683]  fff00000c78a2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.958871] >fff00000c78a2180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.958996]                                      ^
[   31.959140]  fff00000c78a2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.959328]  fff00000c78a2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.959526] ==================================================================

[   15.362612] ==================================================================
[   15.363008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.363316] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.363579] 
[   15.363672] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.363720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.363734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.363756] Call Trace:
[   15.363775]  <TASK>
[   15.363794]  dump_stack_lvl+0x73/0xb0
[   15.363822]  print_report+0xd1/0x650
[   15.363846]  ? __virt_addr_valid+0x1db/0x2d0
[   15.363869]  ? kasan_atomics_helper+0xc70/0x5450
[   15.363892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.363916]  ? kasan_atomics_helper+0xc70/0x5450
[   15.363938]  kasan_report+0x141/0x180
[   15.363962]  ? kasan_atomics_helper+0xc70/0x5450
[   15.363990]  kasan_check_range+0x10c/0x1c0
[   15.364011]  __kasan_check_write+0x18/0x20
[   15.364033]  kasan_atomics_helper+0xc70/0x5450
[   15.364058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.364081]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.364106]  ? kasan_atomics+0x152/0x310
[   15.364132]  kasan_atomics+0x1dc/0x310
[   15.364155]  ? __pfx_kasan_atomics+0x10/0x10
[   15.364177]  ? trace_hardirqs_on+0x37/0xe0
[   15.364203]  ? __pfx_read_tsc+0x10/0x10
[   15.364224]  ? ktime_get_ts64+0x86/0x230
[   15.364250]  kunit_try_run_case+0x1a5/0x480
[   15.364276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.364311]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.364337]  ? __kthread_parkme+0x82/0x180
[   15.364360]  ? preempt_count_sub+0x50/0x80
[   15.364387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.364412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.364455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.364479]  kthread+0x337/0x6f0
[   15.364497]  ? trace_preempt_on+0x20/0xc0
[   15.364520]  ? __pfx_kthread+0x10/0x10
[   15.364539]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.364562]  ? calculate_sigpending+0x7b/0xa0
[   15.364585]  ? __pfx_kthread+0x10/0x10
[   15.364604]  ret_from_fork+0x41/0x80
[   15.364626]  ? __pfx_kthread+0x10/0x10
[   15.364645]  ret_from_fork_asm+0x1a/0x30
[   15.364678]  </TASK>
[   15.364691] 
[   15.372171] Allocated by task 284:
[   15.372367]  kasan_save_stack+0x45/0x70
[   15.372572]  kasan_save_track+0x18/0x40
[   15.372714]  kasan_save_alloc_info+0x3b/0x50
[   15.372925]  __kasan_kmalloc+0xb7/0xc0
[   15.373119]  __kmalloc_cache_noprof+0x189/0x420
[   15.373348]  kasan_atomics+0x95/0x310
[   15.373529]  kunit_try_run_case+0x1a5/0x480
[   15.373732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.373973]  kthread+0x337/0x6f0
[   15.374136]  ret_from_fork+0x41/0x80
[   15.374278]  ret_from_fork_asm+0x1a/0x30
[   15.374502] 
[   15.374602] The buggy address belongs to the object at ffff888102717100
[   15.374602]  which belongs to the cache kmalloc-64 of size 64
[   15.375057] The buggy address is located 0 bytes to the right of
[   15.375057]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.375466] 
[   15.375543] The buggy address belongs to the physical page:
[   15.375715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.376063] flags: 0x200000000000000(node=0|zone=2)
[   15.376309] page_type: f5(slab)
[   15.376506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.376848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.377142] page dumped because: kasan: bad access detected
[   15.377328] 
[   15.377399] Memory state around the buggy address:
[   15.377580]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.377853]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.378176] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.378547]                                      ^
[   15.378789]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379112]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380003] ==================================================================
[   15.545094] ==================================================================
[   15.545457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.545737] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.546162] 
[   15.546277] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.546343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.546357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.546389] Call Trace:
[   15.546408]  <TASK>
[   15.546426]  dump_stack_lvl+0x73/0xb0
[   15.546462]  print_report+0xd1/0x650
[   15.546485]  ? __virt_addr_valid+0x1db/0x2d0
[   15.546516]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.546538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.546561]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.546594]  kasan_report+0x141/0x180
[   15.546618]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.546647]  __asan_report_load4_noabort+0x18/0x20
[   15.546668]  kasan_atomics_helper+0x4a1c/0x5450
[   15.546709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.546732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.546765]  ? kasan_atomics+0x152/0x310
[   15.546789]  kasan_atomics+0x1dc/0x310
[   15.546809]  ? __pfx_kasan_atomics+0x10/0x10
[   15.546828]  ? trace_hardirqs_on+0x37/0xe0
[   15.546861]  ? __pfx_read_tsc+0x10/0x10
[   15.546881]  ? ktime_get_ts64+0x86/0x230
[   15.546908]  kunit_try_run_case+0x1a5/0x480
[   15.546942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.546966]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.547000]  ? __kthread_parkme+0x82/0x180
[   15.547022]  ? preempt_count_sub+0x50/0x80
[   15.547047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.547082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.547130]  kthread+0x337/0x6f0
[   15.547155]  ? trace_preempt_on+0x20/0xc0
[   15.547179]  ? __pfx_kthread+0x10/0x10
[   15.547198]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.547231]  ? calculate_sigpending+0x7b/0xa0
[   15.547254]  ? __pfx_kthread+0x10/0x10
[   15.547273]  ret_from_fork+0x41/0x80
[   15.547295]  ? __pfx_kthread+0x10/0x10
[   15.547324]  ret_from_fork_asm+0x1a/0x30
[   15.547356]  </TASK>
[   15.547368] 
[   15.555034] Allocated by task 284:
[   15.555219]  kasan_save_stack+0x45/0x70
[   15.555454]  kasan_save_track+0x18/0x40
[   15.555627]  kasan_save_alloc_info+0x3b/0x50
[   15.555775]  __kasan_kmalloc+0xb7/0xc0
[   15.555914]  __kmalloc_cache_noprof+0x189/0x420
[   15.556070]  kasan_atomics+0x95/0x310
[   15.556236]  kunit_try_run_case+0x1a5/0x480
[   15.556464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556717]  kthread+0x337/0x6f0
[   15.556885]  ret_from_fork+0x41/0x80
[   15.557057]  ret_from_fork_asm+0x1a/0x30
[   15.557199] 
[   15.557271] The buggy address belongs to the object at ffff888102717100
[   15.557271]  which belongs to the cache kmalloc-64 of size 64
[   15.557631] The buggy address is located 0 bytes to the right of
[   15.557631]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.558188] 
[   15.558315] The buggy address belongs to the physical page:
[   15.558583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.558960] flags: 0x200000000000000(node=0|zone=2)
[   15.559235] page_type: f5(slab)
[   15.559405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.559775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.560006] page dumped because: kasan: bad access detected
[   15.560248] 
[   15.560354] Memory state around the buggy address:
[   15.560786]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.561108]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.561438] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.561717]                                      ^
[   15.561953]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.562262]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.562593] ==================================================================
[   14.974275] ==================================================================
[   14.975199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.975554] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   14.975858] 
[   14.975978] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.976029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.976043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.976065] Call Trace:
[   14.976096]  <TASK>
[   14.976115]  dump_stack_lvl+0x73/0xb0
[   14.976146]  print_report+0xd1/0x650
[   14.976168]  ? __virt_addr_valid+0x1db/0x2d0
[   14.976192]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.976214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.976236]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.976259]  kasan_report+0x141/0x180
[   14.976281]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.976320]  __asan_report_load4_noabort+0x18/0x20
[   14.976341]  kasan_atomics_helper+0x4bbc/0x5450
[   14.976363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.976386]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.976410]  ? kasan_atomics+0x152/0x310
[   14.976433]  kasan_atomics+0x1dc/0x310
[   14.976453]  ? __pfx_kasan_atomics+0x10/0x10
[   14.976472]  ? trace_hardirqs_on+0x37/0xe0
[   14.976496]  ? __pfx_read_tsc+0x10/0x10
[   14.976517]  ? ktime_get_ts64+0x86/0x230
[   14.976543]  kunit_try_run_case+0x1a5/0x480
[   14.976568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.976593]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.976618]  ? __kthread_parkme+0x82/0x180
[   14.976641]  ? preempt_count_sub+0x50/0x80
[   14.976669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.976693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.976716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.976738]  kthread+0x337/0x6f0
[   14.976755]  ? trace_preempt_on+0x20/0xc0
[   14.976777]  ? __pfx_kthread+0x10/0x10
[   14.976796]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.976816]  ? calculate_sigpending+0x7b/0xa0
[   14.976838]  ? __pfx_kthread+0x10/0x10
[   14.976856]  ret_from_fork+0x41/0x80
[   14.976877]  ? __pfx_kthread+0x10/0x10
[   14.976895]  ret_from_fork_asm+0x1a/0x30
[   14.976927]  </TASK>
[   14.976939] 
[   14.985339] Allocated by task 284:
[   14.985497]  kasan_save_stack+0x45/0x70
[   14.985652]  kasan_save_track+0x18/0x40
[   14.985792]  kasan_save_alloc_info+0x3b/0x50
[   14.986089]  __kasan_kmalloc+0xb7/0xc0
[   14.986466]  __kmalloc_cache_noprof+0x189/0x420
[   14.986799]  kasan_atomics+0x95/0x310
[   14.987021]  kunit_try_run_case+0x1a5/0x480
[   14.987215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.987466]  kthread+0x337/0x6f0
[   14.987640]  ret_from_fork+0x41/0x80
[   14.987825]  ret_from_fork_asm+0x1a/0x30
[   14.988063] 
[   14.988162] The buggy address belongs to the object at ffff888102717100
[   14.988162]  which belongs to the cache kmalloc-64 of size 64
[   14.988682] The buggy address is located 0 bytes to the right of
[   14.988682]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   14.989324] 
[   14.989405] The buggy address belongs to the physical page:
[   14.989582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   14.989836] flags: 0x200000000000000(node=0|zone=2)
[   14.990143] page_type: f5(slab)
[   14.990331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.990669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.991314] page dumped because: kasan: bad access detected
[   14.991853] 
[   14.992056] Memory state around the buggy address:
[   14.992263]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.992607]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.992900] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.993195]                                      ^
[   14.993395]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.993618]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994078] ==================================================================
[   16.100997] ==================================================================
[   16.101686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.101945] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.102173] 
[   16.102260] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.102696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.102718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.102741] Call Trace:
[   16.102758]  <TASK>
[   16.102773]  dump_stack_lvl+0x73/0xb0
[   16.102803]  print_report+0xd1/0x650
[   16.102987]  ? __virt_addr_valid+0x1db/0x2d0
[   16.103021]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.103045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.103070]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.103093]  kasan_report+0x141/0x180
[   16.103118]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.103146]  kasan_check_range+0x10c/0x1c0
[   16.103167]  __kasan_check_write+0x18/0x20
[   16.103188]  kasan_atomics_helper+0x1f43/0x5450
[   16.103213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.103237]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.103259]  ? kasan_atomics+0x152/0x310
[   16.103283]  kasan_atomics+0x1dc/0x310
[   16.103315]  ? __pfx_kasan_atomics+0x10/0x10
[   16.103336]  ? trace_hardirqs_on+0x37/0xe0
[   16.103359]  ? __pfx_read_tsc+0x10/0x10
[   16.103380]  ? ktime_get_ts64+0x86/0x230
[   16.103405]  kunit_try_run_case+0x1a5/0x480
[   16.103430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.103466]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.103491]  ? __kthread_parkme+0x82/0x180
[   16.103514]  ? preempt_count_sub+0x50/0x80
[   16.103540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.103565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.103589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.103613]  kthread+0x337/0x6f0
[   16.103632]  ? trace_preempt_on+0x20/0xc0
[   16.103658]  ? __pfx_kthread+0x10/0x10
[   16.103679]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.103703]  ? calculate_sigpending+0x7b/0xa0
[   16.103727]  ? __pfx_kthread+0x10/0x10
[   16.103747]  ret_from_fork+0x41/0x80
[   16.103772]  ? __pfx_kthread+0x10/0x10
[   16.103794]  ret_from_fork_asm+0x1a/0x30
[   16.103826]  </TASK>
[   16.103838] 
[   16.116358] Allocated by task 284:
[   16.116749]  kasan_save_stack+0x45/0x70
[   16.116973]  kasan_save_track+0x18/0x40
[   16.117157]  kasan_save_alloc_info+0x3b/0x50
[   16.117353]  __kasan_kmalloc+0xb7/0xc0
[   16.117807]  __kmalloc_cache_noprof+0x189/0x420
[   16.118139]  kasan_atomics+0x95/0x310
[   16.118727]  kunit_try_run_case+0x1a5/0x480
[   16.119009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.119392]  kthread+0x337/0x6f0
[   16.119883]  ret_from_fork+0x41/0x80
[   16.120115]  ret_from_fork_asm+0x1a/0x30
[   16.120428] 
[   16.120668] The buggy address belongs to the object at ffff888102717100
[   16.120668]  which belongs to the cache kmalloc-64 of size 64
[   16.121159] The buggy address is located 0 bytes to the right of
[   16.121159]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.121945] 
[   16.122189] The buggy address belongs to the physical page:
[   16.122648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.123074] flags: 0x200000000000000(node=0|zone=2)
[   16.123291] page_type: f5(slab)
[   16.123655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.124100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.124832] page dumped because: kasan: bad access detected
[   16.125081] 
[   16.125168] Memory state around the buggy address:
[   16.125385]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126151]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.126473] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.126704]                                      ^
[   16.126861]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127072]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127280] ==================================================================
[   15.841808] ==================================================================
[   15.842200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.842915] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.843245] 
[   15.843385] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.843431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.843443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.843465] Call Trace:
[   15.843480]  <TASK>
[   15.843495]  dump_stack_lvl+0x73/0xb0
[   15.843523]  print_report+0xd1/0x650
[   15.843546]  ? __virt_addr_valid+0x1db/0x2d0
[   15.843568]  ? kasan_atomics_helper+0x177f/0x5450
[   15.843590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.843625]  ? kasan_atomics_helper+0x177f/0x5450
[   15.843648]  kasan_report+0x141/0x180
[   15.843672]  ? kasan_atomics_helper+0x177f/0x5450
[   15.843711]  kasan_check_range+0x10c/0x1c0
[   15.843733]  __kasan_check_write+0x18/0x20
[   15.843753]  kasan_atomics_helper+0x177f/0x5450
[   15.843778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.843801]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.843822]  ? kasan_atomics+0x152/0x310
[   15.843848]  kasan_atomics+0x1dc/0x310
[   15.843869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.843888]  ? trace_hardirqs_on+0x37/0xe0
[   15.843912]  ? __pfx_read_tsc+0x10/0x10
[   15.843932]  ? ktime_get_ts64+0x86/0x230
[   15.843958]  kunit_try_run_case+0x1a5/0x480
[   15.843993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844017]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.844052]  ? __kthread_parkme+0x82/0x180
[   15.844075]  ? preempt_count_sub+0x50/0x80
[   15.844100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.844156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.844180]  kthread+0x337/0x6f0
[   15.844197]  ? trace_preempt_on+0x20/0xc0
[   15.844230]  ? __pfx_kthread+0x10/0x10
[   15.844249]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.844272]  ? calculate_sigpending+0x7b/0xa0
[   15.844309]  ? __pfx_kthread+0x10/0x10
[   15.844329]  ret_from_fork+0x41/0x80
[   15.844351]  ? __pfx_kthread+0x10/0x10
[   15.844380]  ret_from_fork_asm+0x1a/0x30
[   15.844413]  </TASK>
[   15.844425] 
[   15.852483] Allocated by task 284:
[   15.852673]  kasan_save_stack+0x45/0x70
[   15.852878]  kasan_save_track+0x18/0x40
[   15.853049]  kasan_save_alloc_info+0x3b/0x50
[   15.853265]  __kasan_kmalloc+0xb7/0xc0
[   15.853470]  __kmalloc_cache_noprof+0x189/0x420
[   15.853687]  kasan_atomics+0x95/0x310
[   15.853874]  kunit_try_run_case+0x1a5/0x480
[   15.854098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.854339]  kthread+0x337/0x6f0
[   15.854537]  ret_from_fork+0x41/0x80
[   15.854723]  ret_from_fork_asm+0x1a/0x30
[   15.854924] 
[   15.855011] The buggy address belongs to the object at ffff888102717100
[   15.855011]  which belongs to the cache kmalloc-64 of size 64
[   15.855560] The buggy address is located 0 bytes to the right of
[   15.855560]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.855964] 
[   15.856038] The buggy address belongs to the physical page:
[   15.856213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.856543] flags: 0x200000000000000(node=0|zone=2)
[   15.856863] page_type: f5(slab)
[   15.857036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.857381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.857705] page dumped because: kasan: bad access detected
[   15.857880] 
[   15.857951] Memory state around the buggy address:
[   15.858108]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858425]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858784] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.859129]                                      ^
[   15.859364]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.859715]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.860013] ==================================================================
[   15.034159] ==================================================================
[   15.034733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.035196] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.035551] 
[   15.035638] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.035685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.035699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.035720] Call Trace:
[   15.035738]  <TASK>
[   15.035757]  dump_stack_lvl+0x73/0xb0
[   15.035784]  print_report+0xd1/0x650
[   15.035807]  ? __virt_addr_valid+0x1db/0x2d0
[   15.035828]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.035851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.035874]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.035897]  kasan_report+0x141/0x180
[   15.035921]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.035948]  __asan_report_store4_noabort+0x1b/0x30
[   15.035971]  kasan_atomics_helper+0x4b6e/0x5450
[   15.035995]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.036019]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.036042]  ? kasan_atomics+0x152/0x310
[   15.036078]  kasan_atomics+0x1dc/0x310
[   15.036098]  ? __pfx_kasan_atomics+0x10/0x10
[   15.036119]  ? trace_hardirqs_on+0x37/0xe0
[   15.036143]  ? __pfx_read_tsc+0x10/0x10
[   15.036164]  ? ktime_get_ts64+0x86/0x230
[   15.036216]  kunit_try_run_case+0x1a5/0x480
[   15.036241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036266]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.036292]  ? __kthread_parkme+0x82/0x180
[   15.036326]  ? preempt_count_sub+0x50/0x80
[   15.036352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.036424]  kthread+0x337/0x6f0
[   15.036603]  ? trace_preempt_on+0x20/0xc0
[   15.036787]  ? __pfx_kthread+0x10/0x10
[   15.037128]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.037154]  ? calculate_sigpending+0x7b/0xa0
[   15.037178]  ? __pfx_kthread+0x10/0x10
[   15.037198]  ret_from_fork+0x41/0x80
[   15.037220]  ? __pfx_kthread+0x10/0x10
[   15.037240]  ret_from_fork_asm+0x1a/0x30
[   15.037274]  </TASK>
[   15.037287] 
[   15.048852] Allocated by task 284:
[   15.049377]  kasan_save_stack+0x45/0x70
[   15.049777]  kasan_save_track+0x18/0x40
[   15.050062]  kasan_save_alloc_info+0x3b/0x50
[   15.050285]  __kasan_kmalloc+0xb7/0xc0
[   15.050686]  __kmalloc_cache_noprof+0x189/0x420
[   15.050926]  kasan_atomics+0x95/0x310
[   15.051243]  kunit_try_run_case+0x1a5/0x480
[   15.051634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.051892]  kthread+0x337/0x6f0
[   15.052118]  ret_from_fork+0x41/0x80
[   15.052278]  ret_from_fork_asm+0x1a/0x30
[   15.052729] 
[   15.052979] The buggy address belongs to the object at ffff888102717100
[   15.052979]  which belongs to the cache kmalloc-64 of size 64
[   15.053476] The buggy address is located 0 bytes to the right of
[   15.053476]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.054284] 
[   15.054383] The buggy address belongs to the physical page:
[   15.054953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.055486] flags: 0x200000000000000(node=0|zone=2)
[   15.055840] page_type: f5(slab)
[   15.056249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.056706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.057203] page dumped because: kasan: bad access detected
[   15.057513] 
[   15.057782] Memory state around the buggy address:
[   15.058171]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.058655]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.059254] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.059810]                                      ^
[   15.060166]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060478]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060965] ==================================================================
[   15.263552] ==================================================================
[   15.263841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.264419] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.264747] 
[   15.264845] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.264895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.264912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.264934] Call Trace:
[   15.264948]  <TASK>
[   15.264962]  dump_stack_lvl+0x73/0xb0
[   15.264992]  print_report+0xd1/0x650
[   15.265015]  ? __virt_addr_valid+0x1db/0x2d0
[   15.265039]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.265062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.265086]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.265109]  kasan_report+0x141/0x180
[   15.265134]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.265163]  kasan_check_range+0x10c/0x1c0
[   15.265186]  __kasan_check_write+0x18/0x20
[   15.265206]  kasan_atomics_helper+0x8f9/0x5450
[   15.265231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.265255]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.265278]  ? kasan_atomics+0x152/0x310
[   15.265316]  kasan_atomics+0x1dc/0x310
[   15.265337]  ? __pfx_kasan_atomics+0x10/0x10
[   15.265358]  ? trace_hardirqs_on+0x37/0xe0
[   15.265382]  ? __pfx_read_tsc+0x10/0x10
[   15.265402]  ? ktime_get_ts64+0x86/0x230
[   15.265428]  kunit_try_run_case+0x1a5/0x480
[   15.265462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265488]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.265513]  ? __kthread_parkme+0x82/0x180
[   15.265536]  ? preempt_count_sub+0x50/0x80
[   15.265562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.265609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.265633]  kthread+0x337/0x6f0
[   15.265650]  ? trace_preempt_on+0x20/0xc0
[   15.265675]  ? __pfx_kthread+0x10/0x10
[   15.265694]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.265716]  ? calculate_sigpending+0x7b/0xa0
[   15.265741]  ? __pfx_kthread+0x10/0x10
[   15.265761]  ret_from_fork+0x41/0x80
[   15.265786]  ? __pfx_kthread+0x10/0x10
[   15.265807]  ret_from_fork_asm+0x1a/0x30
[   15.265839]  </TASK>
[   15.265851] 
[   15.273578] Allocated by task 284:
[   15.273764]  kasan_save_stack+0x45/0x70
[   15.273951]  kasan_save_track+0x18/0x40
[   15.274102]  kasan_save_alloc_info+0x3b/0x50
[   15.274324]  __kasan_kmalloc+0xb7/0xc0
[   15.274517]  __kmalloc_cache_noprof+0x189/0x420
[   15.274732]  kasan_atomics+0x95/0x310
[   15.274896]  kunit_try_run_case+0x1a5/0x480
[   15.275072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.275296]  kthread+0x337/0x6f0
[   15.275493]  ret_from_fork+0x41/0x80
[   15.275658]  ret_from_fork_asm+0x1a/0x30
[   15.275823] 
[   15.275896] The buggy address belongs to the object at ffff888102717100
[   15.275896]  which belongs to the cache kmalloc-64 of size 64
[   15.276256] The buggy address is located 0 bytes to the right of
[   15.276256]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.276664] 
[   15.276763] The buggy address belongs to the physical page:
[   15.277021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.277395] flags: 0x200000000000000(node=0|zone=2)
[   15.277634] page_type: f5(slab)
[   15.277804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.278035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.278263] page dumped because: kasan: bad access detected
[   15.278451] 
[   15.278565] Memory state around the buggy address:
[   15.278795]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.279115]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.279455] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.279775]                                      ^
[   15.279994]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.280298]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.280627] ==================================================================
[   15.126713] ==================================================================
[   15.127370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.127937] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.128548] 
[   15.128666] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.128717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.128731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.128754] Call Trace:
[   15.128795]  <TASK>
[   15.128813]  dump_stack_lvl+0x73/0xb0
[   15.128860]  print_report+0xd1/0x650
[   15.128885]  ? __virt_addr_valid+0x1db/0x2d0
[   15.128920]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.128957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.128982]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.129019]  kasan_report+0x141/0x180
[   15.129042]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.129084]  __asan_report_store4_noabort+0x1b/0x30
[   15.129106]  kasan_atomics_helper+0x4b3a/0x5450
[   15.129143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.129180]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.129251]  ? kasan_atomics+0x152/0x310
[   15.129277]  kasan_atomics+0x1dc/0x310
[   15.129310]  ? __pfx_kasan_atomics+0x10/0x10
[   15.129331]  ? trace_hardirqs_on+0x37/0xe0
[   15.129356]  ? __pfx_read_tsc+0x10/0x10
[   15.129376]  ? ktime_get_ts64+0x86/0x230
[   15.129402]  kunit_try_run_case+0x1a5/0x480
[   15.129426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.129451]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.129477]  ? __kthread_parkme+0x82/0x180
[   15.129500]  ? preempt_count_sub+0x50/0x80
[   15.129525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.129550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.129573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.129597]  kthread+0x337/0x6f0
[   15.129615]  ? trace_preempt_on+0x20/0xc0
[   15.129638]  ? __pfx_kthread+0x10/0x10
[   15.129658]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.129679]  ? calculate_sigpending+0x7b/0xa0
[   15.129701]  ? __pfx_kthread+0x10/0x10
[   15.129721]  ret_from_fork+0x41/0x80
[   15.129742]  ? __pfx_kthread+0x10/0x10
[   15.129761]  ret_from_fork_asm+0x1a/0x30
[   15.129793]  </TASK>
[   15.129805] 
[   15.138797] Allocated by task 284:
[   15.139045]  kasan_save_stack+0x45/0x70
[   15.139201]  kasan_save_track+0x18/0x40
[   15.139363]  kasan_save_alloc_info+0x3b/0x50
[   15.139588]  __kasan_kmalloc+0xb7/0xc0
[   15.139821]  __kmalloc_cache_noprof+0x189/0x420
[   15.140318]  kasan_atomics+0x95/0x310
[   15.140525]  kunit_try_run_case+0x1a5/0x480
[   15.140779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.141049]  kthread+0x337/0x6f0
[   15.141220]  ret_from_fork+0x41/0x80
[   15.141466]  ret_from_fork_asm+0x1a/0x30
[   15.141701] 
[   15.141776] The buggy address belongs to the object at ffff888102717100
[   15.141776]  which belongs to the cache kmalloc-64 of size 64
[   15.142544] The buggy address is located 0 bytes to the right of
[   15.142544]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.143240] 
[   15.143332] The buggy address belongs to the physical page:
[   15.143710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.144094] flags: 0x200000000000000(node=0|zone=2)
[   15.144369] page_type: f5(slab)
[   15.144602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.145148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.145511] page dumped because: kasan: bad access detected
[   15.145741] 
[   15.145815] Memory state around the buggy address:
[   15.146010]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.146376]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.146783] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.147073]                                      ^
[   15.147231]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147827]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148320] ==================================================================
[   15.306170] ==================================================================
[   15.306521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.306762] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.307062] 
[   15.307150] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.307196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.307209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.307231] Call Trace:
[   15.307244]  <TASK>
[   15.307258]  dump_stack_lvl+0x73/0xb0
[   15.307285]  print_report+0xd1/0x650
[   15.307318]  ? __virt_addr_valid+0x1db/0x2d0
[   15.307341]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.307363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.307385]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.307408]  kasan_report+0x141/0x180
[   15.307431]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.307459]  kasan_check_range+0x10c/0x1c0
[   15.307479]  __kasan_check_write+0x18/0x20
[   15.307500]  kasan_atomics_helper+0xa2b/0x5450
[   15.307523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.307546]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.307570]  ? kasan_atomics+0x152/0x310
[   15.307594]  kasan_atomics+0x1dc/0x310
[   15.307614]  ? __pfx_kasan_atomics+0x10/0x10
[   15.307634]  ? trace_hardirqs_on+0x37/0xe0
[   15.307658]  ? __pfx_read_tsc+0x10/0x10
[   15.307678]  ? ktime_get_ts64+0x86/0x230
[   15.307703]  kunit_try_run_case+0x1a5/0x480
[   15.307728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.307752]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.307777]  ? __kthread_parkme+0x82/0x180
[   15.307799]  ? preempt_count_sub+0x50/0x80
[   15.307826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.307850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.307873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.307897]  kthread+0x337/0x6f0
[   15.307914]  ? trace_preempt_on+0x20/0xc0
[   15.307937]  ? __pfx_kthread+0x10/0x10
[   15.307957]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.307978]  ? calculate_sigpending+0x7b/0xa0
[   15.308000]  ? __pfx_kthread+0x10/0x10
[   15.308019]  ret_from_fork+0x41/0x80
[   15.308040]  ? __pfx_kthread+0x10/0x10
[   15.308059]  ret_from_fork_asm+0x1a/0x30
[   15.308091]  </TASK>
[   15.308102] 
[   15.315713] Allocated by task 284:
[   15.315904]  kasan_save_stack+0x45/0x70
[   15.316110]  kasan_save_track+0x18/0x40
[   15.316336]  kasan_save_alloc_info+0x3b/0x50
[   15.316565]  __kasan_kmalloc+0xb7/0xc0
[   15.316738]  __kmalloc_cache_noprof+0x189/0x420
[   15.316945]  kasan_atomics+0x95/0x310
[   15.317119]  kunit_try_run_case+0x1a5/0x480
[   15.317315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.318472]  kthread+0x337/0x6f0
[   15.318641]  ret_from_fork+0x41/0x80
[   15.318789]  ret_from_fork_asm+0x1a/0x30
[   15.318995] 
[   15.319100] The buggy address belongs to the object at ffff888102717100
[   15.319100]  which belongs to the cache kmalloc-64 of size 64
[   15.320242] The buggy address is located 0 bytes to the right of
[   15.320242]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.320893] 
[   15.321131] The buggy address belongs to the physical page:
[   15.321371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.321882] flags: 0x200000000000000(node=0|zone=2)
[   15.322180] page_type: f5(slab)
[   15.322334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.322821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.323208] page dumped because: kasan: bad access detected
[   15.323589] 
[   15.323695] Memory state around the buggy address:
[   15.323902]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324365]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324780] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.325148]                                      ^
[   15.325385]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325837]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.326159] ==================================================================
[   15.599856] ==================================================================
[   15.600275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.600876] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.601198] 
[   15.601291] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.601350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.601364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.601386] Call Trace:
[   15.601401]  <TASK>
[   15.601416]  dump_stack_lvl+0x73/0xb0
[   15.601445]  print_report+0xd1/0x650
[   15.601469]  ? __virt_addr_valid+0x1db/0x2d0
[   15.601491]  ? kasan_atomics_helper+0x1217/0x5450
[   15.601514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.601538]  ? kasan_atomics_helper+0x1217/0x5450
[   15.601563]  kasan_report+0x141/0x180
[   15.601588]  ? kasan_atomics_helper+0x1217/0x5450
[   15.601617]  kasan_check_range+0x10c/0x1c0
[   15.601638]  __kasan_check_write+0x18/0x20
[   15.601658]  kasan_atomics_helper+0x1217/0x5450
[   15.601682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.601705]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.601728]  ? kasan_atomics+0x152/0x310
[   15.601753]  kasan_atomics+0x1dc/0x310
[   15.601774]  ? __pfx_kasan_atomics+0x10/0x10
[   15.601793]  ? trace_hardirqs_on+0x37/0xe0
[   15.601817]  ? __pfx_read_tsc+0x10/0x10
[   15.601838]  ? ktime_get_ts64+0x86/0x230
[   15.601865]  kunit_try_run_case+0x1a5/0x480
[   15.601890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.601915]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.601940]  ? __kthread_parkme+0x82/0x180
[   15.601962]  ? preempt_count_sub+0x50/0x80
[   15.601988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.602048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.602082]  kthread+0x337/0x6f0
[   15.602100]  ? trace_preempt_on+0x20/0xc0
[   15.602122]  ? __pfx_kthread+0x10/0x10
[   15.602142]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.602164]  ? calculate_sigpending+0x7b/0xa0
[   15.602197]  ? __pfx_kthread+0x10/0x10
[   15.602216]  ret_from_fork+0x41/0x80
[   15.602238]  ? __pfx_kthread+0x10/0x10
[   15.602267]  ret_from_fork_asm+0x1a/0x30
[   15.602300]  </TASK>
[   15.602319] 
[   15.610475] Allocated by task 284:
[   15.610690]  kasan_save_stack+0x45/0x70
[   15.610916]  kasan_save_track+0x18/0x40
[   15.611082]  kasan_save_alloc_info+0x3b/0x50
[   15.611286]  __kasan_kmalloc+0xb7/0xc0
[   15.611520]  __kmalloc_cache_noprof+0x189/0x420
[   15.611730]  kasan_atomics+0x95/0x310
[   15.611924]  kunit_try_run_case+0x1a5/0x480
[   15.612097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612370]  kthread+0x337/0x6f0
[   15.612580]  ret_from_fork+0x41/0x80
[   15.612752]  ret_from_fork_asm+0x1a/0x30
[   15.612959] 
[   15.613051] The buggy address belongs to the object at ffff888102717100
[   15.613051]  which belongs to the cache kmalloc-64 of size 64
[   15.613417] The buggy address is located 0 bytes to the right of
[   15.613417]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.613782] 
[   15.613855] The buggy address belongs to the physical page:
[   15.614028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.614382] flags: 0x200000000000000(node=0|zone=2)
[   15.614866] page_type: f5(slab)
[   15.615038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.615389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.616098] page dumped because: kasan: bad access detected
[   15.616282] 
[   15.616363] Memory state around the buggy address:
[   15.616725]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.617053]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.617395] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.617697]                                      ^
[   15.617860]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618078]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618294] ==================================================================
[   15.879198] ==================================================================
[   15.879521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.879871] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.880476] 
[   15.880565] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.880611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.880625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.880646] Call Trace:
[   15.880663]  <TASK>
[   15.880679]  dump_stack_lvl+0x73/0xb0
[   15.880705]  print_report+0xd1/0x650
[   15.880728]  ? __virt_addr_valid+0x1db/0x2d0
[   15.880750]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.880773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.880795]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.880817]  kasan_report+0x141/0x180
[   15.880841]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.880867]  kasan_check_range+0x10c/0x1c0
[   15.880889]  __kasan_check_write+0x18/0x20
[   15.880909]  kasan_atomics_helper+0x18b1/0x5450
[   15.880933]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.880972]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.881008]  ? kasan_atomics+0x152/0x310
[   15.881032]  kasan_atomics+0x1dc/0x310
[   15.881051]  ? __pfx_kasan_atomics+0x10/0x10
[   15.881084]  ? trace_hardirqs_on+0x37/0xe0
[   15.881107]  ? __pfx_read_tsc+0x10/0x10
[   15.881127]  ? ktime_get_ts64+0x86/0x230
[   15.881152]  kunit_try_run_case+0x1a5/0x480
[   15.881177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.881201]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.881225]  ? __kthread_parkme+0x82/0x180
[   15.881247]  ? preempt_count_sub+0x50/0x80
[   15.881273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.881297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.881330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.881353]  kthread+0x337/0x6f0
[   15.881371]  ? trace_preempt_on+0x20/0xc0
[   15.881394]  ? __pfx_kthread+0x10/0x10
[   15.881413]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.881434]  ? calculate_sigpending+0x7b/0xa0
[   15.881456]  ? __pfx_kthread+0x10/0x10
[   15.881475]  ret_from_fork+0x41/0x80
[   15.881496]  ? __pfx_kthread+0x10/0x10
[   15.881517]  ret_from_fork_asm+0x1a/0x30
[   15.881549]  </TASK>
[   15.881561] 
[   15.889452] Allocated by task 284:
[   15.889605]  kasan_save_stack+0x45/0x70
[   15.889754]  kasan_save_track+0x18/0x40
[   15.889891]  kasan_save_alloc_info+0x3b/0x50
[   15.890038]  __kasan_kmalloc+0xb7/0xc0
[   15.890257]  __kmalloc_cache_noprof+0x189/0x420
[   15.890486]  kasan_atomics+0x95/0x310
[   15.890671]  kunit_try_run_case+0x1a5/0x480
[   15.890883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.891120]  kthread+0x337/0x6f0
[   15.891242]  ret_from_fork+0x41/0x80
[   15.891386]  ret_from_fork_asm+0x1a/0x30
[   15.891538] 
[   15.891635] The buggy address belongs to the object at ffff888102717100
[   15.891635]  which belongs to the cache kmalloc-64 of size 64
[   15.892193] The buggy address is located 0 bytes to the right of
[   15.892193]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.892759] 
[   15.892833] The buggy address belongs to the physical page:
[   15.893007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.893248] flags: 0x200000000000000(node=0|zone=2)
[   15.893537] page_type: f5(slab)
[   15.893722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.894064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.894408] page dumped because: kasan: bad access detected
[   15.894812] 
[   15.894971] Memory state around the buggy address:
[   15.895128]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.895357]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.895576] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.896213]                                      ^
[   15.896449]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.896799]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.897184] ==================================================================
[   16.079439] ==================================================================
[   16.079783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.080419] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.080775] 
[   16.080883] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.080927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.080941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.080962] Call Trace:
[   16.080987]  <TASK>
[   16.081003]  dump_stack_lvl+0x73/0xb0
[   16.081031]  print_report+0xd1/0x650
[   16.081066]  ? __virt_addr_valid+0x1db/0x2d0
[   16.081087]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.081110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.081133]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.081156]  kasan_report+0x141/0x180
[   16.081180]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.081208]  kasan_check_range+0x10c/0x1c0
[   16.081229]  __kasan_check_write+0x18/0x20
[   16.081249]  kasan_atomics_helper+0x1eaa/0x5450
[   16.081273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.081297]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.081329]  ? kasan_atomics+0x152/0x310
[   16.081363]  kasan_atomics+0x1dc/0x310
[   16.081384]  ? __pfx_kasan_atomics+0x10/0x10
[   16.081404]  ? trace_hardirqs_on+0x37/0xe0
[   16.081448]  ? __pfx_read_tsc+0x10/0x10
[   16.081469]  ? ktime_get_ts64+0x86/0x230
[   16.081494]  kunit_try_run_case+0x1a5/0x480
[   16.081520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081555]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.081579]  ? __kthread_parkme+0x82/0x180
[   16.081601]  ? preempt_count_sub+0x50/0x80
[   16.081637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.081684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.081708]  kthread+0x337/0x6f0
[   16.081735]  ? trace_preempt_on+0x20/0xc0
[   16.081758]  ? __pfx_kthread+0x10/0x10
[   16.081777]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.081809]  ? calculate_sigpending+0x7b/0xa0
[   16.081831]  ? __pfx_kthread+0x10/0x10
[   16.081850]  ret_from_fork+0x41/0x80
[   16.081872]  ? __pfx_kthread+0x10/0x10
[   16.081899]  ret_from_fork_asm+0x1a/0x30
[   16.081930]  </TASK>
[   16.081943] 
[   16.089923] Allocated by task 284:
[   16.090133]  kasan_save_stack+0x45/0x70
[   16.090295]  kasan_save_track+0x18/0x40
[   16.090532]  kasan_save_alloc_info+0x3b/0x50
[   16.090698]  __kasan_kmalloc+0xb7/0xc0
[   16.090910]  __kmalloc_cache_noprof+0x189/0x420
[   16.091107]  kasan_atomics+0x95/0x310
[   16.091270]  kunit_try_run_case+0x1a5/0x480
[   16.091483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.091715]  kthread+0x337/0x6f0
[   16.091886]  ret_from_fork+0x41/0x80
[   16.092079]  ret_from_fork_asm+0x1a/0x30
[   16.092245] 
[   16.092356] The buggy address belongs to the object at ffff888102717100
[   16.092356]  which belongs to the cache kmalloc-64 of size 64
[   16.092852] The buggy address is located 0 bytes to the right of
[   16.092852]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.093265] 
[   16.093347] The buggy address belongs to the physical page:
[   16.093560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.094102] flags: 0x200000000000000(node=0|zone=2)
[   16.094260] page_type: f5(slab)
[   16.094428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.094777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.095144] page dumped because: kasan: bad access detected
[   16.095367] 
[   16.095439] Memory state around the buggy address:
[   16.095589]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.095910]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.096231] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.097806]                                      ^
[   16.098485]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.099248]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.099874] ==================================================================
[   15.581520] ==================================================================
[   15.581881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.582297] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.582665] 
[   15.582759] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.582802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.582815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.582836] Call Trace:
[   15.582850]  <TASK>
[   15.582866]  dump_stack_lvl+0x73/0xb0
[   15.582893]  print_report+0xd1/0x650
[   15.582917]  ? __virt_addr_valid+0x1db/0x2d0
[   15.582938]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.582960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.582983]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.583006]  kasan_report+0x141/0x180
[   15.583029]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.583058]  __asan_report_load4_noabort+0x18/0x20
[   15.583093]  kasan_atomics_helper+0x4a02/0x5450
[   15.583117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.583141]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.583174]  ? kasan_atomics+0x152/0x310
[   15.583199]  kasan_atomics+0x1dc/0x310
[   15.583219]  ? __pfx_kasan_atomics+0x10/0x10
[   15.583238]  ? trace_hardirqs_on+0x37/0xe0
[   15.583261]  ? __pfx_read_tsc+0x10/0x10
[   15.583281]  ? ktime_get_ts64+0x86/0x230
[   15.583314]  kunit_try_run_case+0x1a5/0x480
[   15.583339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.583363]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.583387]  ? __kthread_parkme+0x82/0x180
[   15.583409]  ? preempt_count_sub+0x50/0x80
[   15.583435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.583458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.583481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.583505]  kthread+0x337/0x6f0
[   15.583523]  ? trace_preempt_on+0x20/0xc0
[   15.583546]  ? __pfx_kthread+0x10/0x10
[   15.583565]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.583587]  ? calculate_sigpending+0x7b/0xa0
[   15.583618]  ? __pfx_kthread+0x10/0x10
[   15.583638]  ret_from_fork+0x41/0x80
[   15.583659]  ? __pfx_kthread+0x10/0x10
[   15.583678]  ret_from_fork_asm+0x1a/0x30
[   15.583721]  </TASK>
[   15.583733] 
[   15.591740] Allocated by task 284:
[   15.591917]  kasan_save_stack+0x45/0x70
[   15.592119]  kasan_save_track+0x18/0x40
[   15.592338]  kasan_save_alloc_info+0x3b/0x50
[   15.592582]  __kasan_kmalloc+0xb7/0xc0
[   15.592769]  __kmalloc_cache_noprof+0x189/0x420
[   15.592926]  kasan_atomics+0x95/0x310
[   15.593059]  kunit_try_run_case+0x1a5/0x480
[   15.593209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.593482]  kthread+0x337/0x6f0
[   15.593652]  ret_from_fork+0x41/0x80
[   15.593836]  ret_from_fork_asm+0x1a/0x30
[   15.594032] 
[   15.594130] The buggy address belongs to the object at ffff888102717100
[   15.594130]  which belongs to the cache kmalloc-64 of size 64
[   15.594784] The buggy address is located 0 bytes to the right of
[   15.594784]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.595151] 
[   15.595224] The buggy address belongs to the physical page:
[   15.595407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.595737] flags: 0x200000000000000(node=0|zone=2)
[   15.595971] page_type: f5(slab)
[   15.596138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.596495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.596833] page dumped because: kasan: bad access detected
[   15.597099] 
[   15.597194] Memory state around the buggy address:
[   15.597405]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.597785]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.598106] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.598352]                                      ^
[   15.598511]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598732]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599149] ==================================================================
[   16.309293] ==================================================================
[   16.309686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.309971] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.310314] 
[   16.310462] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.310507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.310520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.310541] Call Trace:
[   16.310554]  <TASK>
[   16.310569]  dump_stack_lvl+0x73/0xb0
[   16.310597]  print_report+0xd1/0x650
[   16.310621]  ? __virt_addr_valid+0x1db/0x2d0
[   16.310643]  ? kasan_atomics_helper+0x224c/0x5450
[   16.310665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.310692]  ? kasan_atomics_helper+0x224c/0x5450
[   16.310716]  kasan_report+0x141/0x180
[   16.310740]  ? kasan_atomics_helper+0x224c/0x5450
[   16.310767]  kasan_check_range+0x10c/0x1c0
[   16.310790]  __kasan_check_write+0x18/0x20
[   16.310811]  kasan_atomics_helper+0x224c/0x5450
[   16.310834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.310869]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.310892]  ? kasan_atomics+0x152/0x310
[   16.310927]  kasan_atomics+0x1dc/0x310
[   16.310948]  ? __pfx_kasan_atomics+0x10/0x10
[   16.310968]  ? trace_hardirqs_on+0x37/0xe0
[   16.310991]  ? __pfx_read_tsc+0x10/0x10
[   16.311012]  ? ktime_get_ts64+0x86/0x230
[   16.311036]  kunit_try_run_case+0x1a5/0x480
[   16.311061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.311086]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.311111]  ? __kthread_parkme+0x82/0x180
[   16.311134]  ? preempt_count_sub+0x50/0x80
[   16.311160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.311184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.311208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.311233]  kthread+0x337/0x6f0
[   16.311258]  ? trace_preempt_on+0x20/0xc0
[   16.311281]  ? __pfx_kthread+0x10/0x10
[   16.311300]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.311337]  ? calculate_sigpending+0x7b/0xa0
[   16.311359]  ? __pfx_kthread+0x10/0x10
[   16.311379]  ret_from_fork+0x41/0x80
[   16.311400]  ? __pfx_kthread+0x10/0x10
[   16.311419]  ret_from_fork_asm+0x1a/0x30
[   16.311469]  </TASK>
[   16.311481] 
[   16.318934] Allocated by task 284:
[   16.319062]  kasan_save_stack+0x45/0x70
[   16.319211]  kasan_save_track+0x18/0x40
[   16.319450]  kasan_save_alloc_info+0x3b/0x50
[   16.319662]  __kasan_kmalloc+0xb7/0xc0
[   16.319851]  __kmalloc_cache_noprof+0x189/0x420
[   16.320069]  kasan_atomics+0x95/0x310
[   16.320253]  kunit_try_run_case+0x1a5/0x480
[   16.320497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.320720]  kthread+0x337/0x6f0
[   16.320840]  ret_from_fork+0x41/0x80
[   16.321025]  ret_from_fork_asm+0x1a/0x30
[   16.321226] 
[   16.321355] The buggy address belongs to the object at ffff888102717100
[   16.321355]  which belongs to the cache kmalloc-64 of size 64
[   16.321867] The buggy address is located 0 bytes to the right of
[   16.321867]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.322324] 
[   16.322465] The buggy address belongs to the physical page:
[   16.322722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.323081] flags: 0x200000000000000(node=0|zone=2)
[   16.323259] page_type: f5(slab)
[   16.323396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.323802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.324183] page dumped because: kasan: bad access detected
[   16.324366] 
[   16.324488] Memory state around the buggy address:
[   16.324743]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.325082]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.325363] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.325706]                                      ^
[   16.325947]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.326239]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.326536] ==================================================================
[   15.226524] ==================================================================
[   15.226848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.227369] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.227726] 
[   15.227820] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.227869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.227883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.227906] Call Trace:
[   15.227919]  <TASK>
[   15.227934]  dump_stack_lvl+0x73/0xb0
[   15.227963]  print_report+0xd1/0x650
[   15.227986]  ? __virt_addr_valid+0x1db/0x2d0
[   15.228009]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.228031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.228056]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.228079]  kasan_report+0x141/0x180
[   15.228103]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.228131]  kasan_check_range+0x10c/0x1c0
[   15.228153]  __kasan_check_write+0x18/0x20
[   15.228174]  kasan_atomics_helper+0x7c7/0x5450
[   15.228198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.228222]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.228246]  ? kasan_atomics+0x152/0x310
[   15.228270]  kasan_atomics+0x1dc/0x310
[   15.228291]  ? __pfx_kasan_atomics+0x10/0x10
[   15.228324]  ? trace_hardirqs_on+0x37/0xe0
[   15.228347]  ? __pfx_read_tsc+0x10/0x10
[   15.228368]  ? ktime_get_ts64+0x86/0x230
[   15.228393]  kunit_try_run_case+0x1a5/0x480
[   15.228417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.228453]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.228478]  ? __kthread_parkme+0x82/0x180
[   15.228500]  ? preempt_count_sub+0x50/0x80
[   15.228527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.228551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.228575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.228598]  kthread+0x337/0x6f0
[   15.228616]  ? trace_preempt_on+0x20/0xc0
[   15.228639]  ? __pfx_kthread+0x10/0x10
[   15.228659]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.228681]  ? calculate_sigpending+0x7b/0xa0
[   15.228703]  ? __pfx_kthread+0x10/0x10
[   15.228722]  ret_from_fork+0x41/0x80
[   15.228744]  ? __pfx_kthread+0x10/0x10
[   15.228763]  ret_from_fork_asm+0x1a/0x30
[   15.228795]  </TASK>
[   15.228808] 
[   15.236054] Allocated by task 284:
[   15.236205]  kasan_save_stack+0x45/0x70
[   15.236421]  kasan_save_track+0x18/0x40
[   15.236761]  kasan_save_alloc_info+0x3b/0x50
[   15.236973]  __kasan_kmalloc+0xb7/0xc0
[   15.237166]  __kmalloc_cache_noprof+0x189/0x420
[   15.237402]  kasan_atomics+0x95/0x310
[   15.237628]  kunit_try_run_case+0x1a5/0x480
[   15.237810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.238051]  kthread+0x337/0x6f0
[   15.238206]  ret_from_fork+0x41/0x80
[   15.238352]  ret_from_fork_asm+0x1a/0x30
[   15.238712] 
[   15.238809] The buggy address belongs to the object at ffff888102717100
[   15.238809]  which belongs to the cache kmalloc-64 of size 64
[   15.239218] The buggy address is located 0 bytes to the right of
[   15.239218]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.239854] 
[   15.239954] The buggy address belongs to the physical page:
[   15.240179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.240443] flags: 0x200000000000000(node=0|zone=2)
[   15.240606] page_type: f5(slab)
[   15.240729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.240988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.241334] page dumped because: kasan: bad access detected
[   15.241788] 
[   15.241866] Memory state around the buggy address:
[   15.242023]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.242242]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.242470] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.242733]                                      ^
[   15.242959]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243286]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243616] ==================================================================
[   15.456099] ==================================================================
[   15.456775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.457107] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.457402] 
[   15.457540] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.457587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.457600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.457621] Call Trace:
[   15.457640]  <TASK>
[   15.457657]  dump_stack_lvl+0x73/0xb0
[   15.457684]  print_report+0xd1/0x650
[   15.457707]  ? __virt_addr_valid+0x1db/0x2d0
[   15.457729]  ? kasan_atomics_helper+0xf10/0x5450
[   15.457751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.457775]  ? kasan_atomics_helper+0xf10/0x5450
[   15.457797]  kasan_report+0x141/0x180
[   15.457820]  ? kasan_atomics_helper+0xf10/0x5450
[   15.457849]  kasan_check_range+0x10c/0x1c0
[   15.457871]  __kasan_check_write+0x18/0x20
[   15.457891]  kasan_atomics_helper+0xf10/0x5450
[   15.457915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.457939]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.457962]  ? kasan_atomics+0x152/0x310
[   15.457987]  kasan_atomics+0x1dc/0x310
[   15.458008]  ? __pfx_kasan_atomics+0x10/0x10
[   15.458027]  ? trace_hardirqs_on+0x37/0xe0
[   15.458051]  ? __pfx_read_tsc+0x10/0x10
[   15.458071]  ? ktime_get_ts64+0x86/0x230
[   15.458097]  kunit_try_run_case+0x1a5/0x480
[   15.458123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458147]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.458173]  ? __kthread_parkme+0x82/0x180
[   15.458196]  ? preempt_count_sub+0x50/0x80
[   15.458221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.458269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.458293]  kthread+0x337/0x6f0
[   15.458322]  ? trace_preempt_on+0x20/0xc0
[   15.458346]  ? __pfx_kthread+0x10/0x10
[   15.458365]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.458387]  ? calculate_sigpending+0x7b/0xa0
[   15.458409]  ? __pfx_kthread+0x10/0x10
[   15.458447]  ret_from_fork+0x41/0x80
[   15.458468]  ? __pfx_kthread+0x10/0x10
[   15.458488]  ret_from_fork_asm+0x1a/0x30
[   15.458521]  </TASK>
[   15.458533] 
[   15.465629] Allocated by task 284:
[   15.465804]  kasan_save_stack+0x45/0x70
[   15.466009]  kasan_save_track+0x18/0x40
[   15.466201]  kasan_save_alloc_info+0x3b/0x50
[   15.466420]  __kasan_kmalloc+0xb7/0xc0
[   15.466630]  __kmalloc_cache_noprof+0x189/0x420
[   15.466792]  kasan_atomics+0x95/0x310
[   15.466924]  kunit_try_run_case+0x1a5/0x480
[   15.467139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.467413]  kthread+0x337/0x6f0
[   15.467602]  ret_from_fork+0x41/0x80
[   15.467788]  ret_from_fork_asm+0x1a/0x30
[   15.467966] 
[   15.468055] The buggy address belongs to the object at ffff888102717100
[   15.468055]  which belongs to the cache kmalloc-64 of size 64
[   15.468581] The buggy address is located 0 bytes to the right of
[   15.468581]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.469066] 
[   15.469152] The buggy address belongs to the physical page:
[   15.469410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.469685] flags: 0x200000000000000(node=0|zone=2)
[   15.469854] page_type: f5(slab)
[   15.469979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.470213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.470585] page dumped because: kasan: bad access detected
[   15.470845] 
[   15.470939] Memory state around the buggy address:
[   15.471163]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.471517]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.471834] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.472058]                                      ^
[   15.472214]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.472951]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.473234] ==================================================================
[   15.728058] ==================================================================
[   15.728377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.729260] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.729621] 
[   15.729731] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.729781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.729796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.729818] Call Trace:
[   15.729833]  <TASK>
[   15.729850]  dump_stack_lvl+0x73/0xb0
[   15.729879]  print_report+0xd1/0x650
[   15.729914]  ? __virt_addr_valid+0x1db/0x2d0
[   15.729937]  ? kasan_atomics_helper+0x1467/0x5450
[   15.729960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.729994]  ? kasan_atomics_helper+0x1467/0x5450
[   15.730017]  kasan_report+0x141/0x180
[   15.730041]  ? kasan_atomics_helper+0x1467/0x5450
[   15.730069]  kasan_check_range+0x10c/0x1c0
[   15.730089]  __kasan_check_write+0x18/0x20
[   15.730110]  kasan_atomics_helper+0x1467/0x5450
[   15.730134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.730157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.730181]  ? kasan_atomics+0x152/0x310
[   15.730213]  kasan_atomics+0x1dc/0x310
[   15.730233]  ? __pfx_kasan_atomics+0x10/0x10
[   15.730253]  ? trace_hardirqs_on+0x37/0xe0
[   15.730289]  ? __pfx_read_tsc+0x10/0x10
[   15.730318]  ? ktime_get_ts64+0x86/0x230
[   15.730344]  kunit_try_run_case+0x1a5/0x480
[   15.730370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730395]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.730421]  ? __kthread_parkme+0x82/0x180
[   15.730453]  ? preempt_count_sub+0x50/0x80
[   15.730480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.730552]  kthread+0x337/0x6f0
[   15.730569]  ? trace_preempt_on+0x20/0xc0
[   15.730593]  ? __pfx_kthread+0x10/0x10
[   15.730611]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.730634]  ? calculate_sigpending+0x7b/0xa0
[   15.730656]  ? __pfx_kthread+0x10/0x10
[   15.730680]  ret_from_fork+0x41/0x80
[   15.730702]  ? __pfx_kthread+0x10/0x10
[   15.730721]  ret_from_fork_asm+0x1a/0x30
[   15.730754]  </TASK>
[   15.730766] 
[   15.738335] Allocated by task 284:
[   15.738556]  kasan_save_stack+0x45/0x70
[   15.738792]  kasan_save_track+0x18/0x40
[   15.739012]  kasan_save_alloc_info+0x3b/0x50
[   15.739225]  __kasan_kmalloc+0xb7/0xc0
[   15.739452]  __kmalloc_cache_noprof+0x189/0x420
[   15.739656]  kasan_atomics+0x95/0x310
[   15.739836]  kunit_try_run_case+0x1a5/0x480
[   15.740047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.740264]  kthread+0x337/0x6f0
[   15.740453]  ret_from_fork+0x41/0x80
[   15.740660]  ret_from_fork_asm+0x1a/0x30
[   15.740851] 
[   15.740964] The buggy address belongs to the object at ffff888102717100
[   15.740964]  which belongs to the cache kmalloc-64 of size 64
[   15.741513] The buggy address is located 0 bytes to the right of
[   15.741513]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.741902] 
[   15.741977] The buggy address belongs to the physical page:
[   15.742154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.742555] flags: 0x200000000000000(node=0|zone=2)
[   15.742794] page_type: f5(slab)
[   15.743149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.743400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.743770] page dumped because: kasan: bad access detected
[   15.744078] 
[   15.744198] Memory state around the buggy address:
[   15.744400]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.744620]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.744839] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.745428]                                      ^
[   15.745758]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746105]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746327] ==================================================================
[   15.747100] ==================================================================
[   15.747414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.747760] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.748188] 
[   15.748288] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.748343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.748378] Call Trace:
[   15.748393]  <TASK>
[   15.748408]  dump_stack_lvl+0x73/0xb0
[   15.748445]  print_report+0xd1/0x650
[   15.748479]  ? __virt_addr_valid+0x1db/0x2d0
[   15.748501]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.748523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.748559]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.748583]  kasan_report+0x141/0x180
[   15.748606]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.748635]  __asan_report_store8_noabort+0x1b/0x30
[   15.748658]  kasan_atomics_helper+0x50d4/0x5450
[   15.748682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.748706]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.748728]  ? kasan_atomics+0x152/0x310
[   15.748751]  kasan_atomics+0x1dc/0x310
[   15.748772]  ? __pfx_kasan_atomics+0x10/0x10
[   15.748792]  ? trace_hardirqs_on+0x37/0xe0
[   15.748825]  ? __pfx_read_tsc+0x10/0x10
[   15.748846]  ? ktime_get_ts64+0x86/0x230
[   15.748871]  kunit_try_run_case+0x1a5/0x480
[   15.748905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.748931]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.748955]  ? __kthread_parkme+0x82/0x180
[   15.748978]  ? preempt_count_sub+0x50/0x80
[   15.749012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749093]  kthread+0x337/0x6f0
[   15.749111]  ? trace_preempt_on+0x20/0xc0
[   15.749134]  ? __pfx_kthread+0x10/0x10
[   15.749153]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749183]  ? calculate_sigpending+0x7b/0xa0
[   15.749205]  ? __pfx_kthread+0x10/0x10
[   15.749225]  ret_from_fork+0x41/0x80
[   15.749256]  ? __pfx_kthread+0x10/0x10
[   15.749275]  ret_from_fork_asm+0x1a/0x30
[   15.749316]  </TASK>
[   15.749337] 
[   15.756914] Allocated by task 284:
[   15.757095]  kasan_save_stack+0x45/0x70
[   15.757241]  kasan_save_track+0x18/0x40
[   15.757389]  kasan_save_alloc_info+0x3b/0x50
[   15.757537]  __kasan_kmalloc+0xb7/0xc0
[   15.757673]  __kmalloc_cache_noprof+0x189/0x420
[   15.757827]  kasan_atomics+0x95/0x310
[   15.757957]  kunit_try_run_case+0x1a5/0x480
[   15.758431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.758702]  kthread+0x337/0x6f0
[   15.758870]  ret_from_fork+0x41/0x80
[   15.759053]  ret_from_fork_asm+0x1a/0x30
[   15.759248] 
[   15.759352] The buggy address belongs to the object at ffff888102717100
[   15.759352]  which belongs to the cache kmalloc-64 of size 64
[   15.760149] The buggy address is located 0 bytes to the right of
[   15.760149]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.760815] 
[   15.760927] The buggy address belongs to the physical page:
[   15.761192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.761593] flags: 0x200000000000000(node=0|zone=2)
[   15.761809] page_type: f5(slab)
[   15.761931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.762163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.762441] page dumped because: kasan: bad access detected
[   15.762704] 
[   15.762800] Memory state around the buggy address:
[   15.763116]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763473]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763856] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764091]                                      ^
[   15.764337]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764842]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765151] ==================================================================
[   16.061397] ==================================================================
[   16.062095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.062497] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.062827] 
[   16.062919] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.062966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.062979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.063002] Call Trace:
[   16.063015]  <TASK>
[   16.063030]  dump_stack_lvl+0x73/0xb0
[   16.063057]  print_report+0xd1/0x650
[   16.063080]  ? __virt_addr_valid+0x1db/0x2d0
[   16.063114]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.063136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.063160]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.063195]  kasan_report+0x141/0x180
[   16.063219]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.063247]  kasan_check_range+0x10c/0x1c0
[   16.063276]  __kasan_check_write+0x18/0x20
[   16.063296]  kasan_atomics_helper+0x1e12/0x5450
[   16.063337]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.063360]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.063384]  ? kasan_atomics+0x152/0x310
[   16.063408]  kasan_atomics+0x1dc/0x310
[   16.063428]  ? __pfx_kasan_atomics+0x10/0x10
[   16.063457]  ? trace_hardirqs_on+0x37/0xe0
[   16.063481]  ? __pfx_read_tsc+0x10/0x10
[   16.063502]  ? ktime_get_ts64+0x86/0x230
[   16.063537]  kunit_try_run_case+0x1a5/0x480
[   16.063562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063588]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.063614]  ? __kthread_parkme+0x82/0x180
[   16.063645]  ? preempt_count_sub+0x50/0x80
[   16.063671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.063729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.063753]  kthread+0x337/0x6f0
[   16.063770]  ? trace_preempt_on+0x20/0xc0
[   16.063793]  ? __pfx_kthread+0x10/0x10
[   16.063812]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.063833]  ? calculate_sigpending+0x7b/0xa0
[   16.063855]  ? __pfx_kthread+0x10/0x10
[   16.063875]  ret_from_fork+0x41/0x80
[   16.063896]  ? __pfx_kthread+0x10/0x10
[   16.063915]  ret_from_fork_asm+0x1a/0x30
[   16.063946]  </TASK>
[   16.063959] 
[   16.071734] Allocated by task 284:
[   16.071882]  kasan_save_stack+0x45/0x70
[   16.072062]  kasan_save_track+0x18/0x40
[   16.072196]  kasan_save_alloc_info+0x3b/0x50
[   16.072358]  __kasan_kmalloc+0xb7/0xc0
[   16.072545]  __kmalloc_cache_noprof+0x189/0x420
[   16.072803]  kasan_atomics+0x95/0x310
[   16.073002]  kunit_try_run_case+0x1a5/0x480
[   16.073160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.073340]  kthread+0x337/0x6f0
[   16.073579]  ret_from_fork+0x41/0x80
[   16.073792]  ret_from_fork_asm+0x1a/0x30
[   16.073991] 
[   16.074085] The buggy address belongs to the object at ffff888102717100
[   16.074085]  which belongs to the cache kmalloc-64 of size 64
[   16.074652] The buggy address is located 0 bytes to the right of
[   16.074652]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.075168] 
[   16.075268] The buggy address belongs to the physical page:
[   16.075545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.075876] flags: 0x200000000000000(node=0|zone=2)
[   16.076106] page_type: f5(slab)
[   16.076266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.076632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.076954] page dumped because: kasan: bad access detected
[   16.077180] 
[   16.077250] Memory state around the buggy address:
[   16.077415]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077625]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077863] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.078399]                                      ^
[   16.078643]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078864]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079071] ==================================================================
[   16.223805] ==================================================================
[   16.224555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.224876] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.225106] 
[   16.225197] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.225243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.225258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.225279] Call Trace:
[   16.225298]  <TASK>
[   16.225329]  dump_stack_lvl+0x73/0xb0
[   16.225357]  print_report+0xd1/0x650
[   16.225380]  ? __virt_addr_valid+0x1db/0x2d0
[   16.225403]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.225452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.225476]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.225499]  kasan_report+0x141/0x180
[   16.225523]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.225550]  kasan_check_range+0x10c/0x1c0
[   16.225572]  __kasan_check_write+0x18/0x20
[   16.225592]  kasan_atomics_helper+0x20c8/0x5450
[   16.225617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.225641]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.225663]  ? kasan_atomics+0x152/0x310
[   16.225686]  kasan_atomics+0x1dc/0x310
[   16.225707]  ? __pfx_kasan_atomics+0x10/0x10
[   16.225727]  ? trace_hardirqs_on+0x37/0xe0
[   16.225750]  ? __pfx_read_tsc+0x10/0x10
[   16.225771]  ? ktime_get_ts64+0x86/0x230
[   16.225797]  kunit_try_run_case+0x1a5/0x480
[   16.225822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.225847]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.225872]  ? __kthread_parkme+0x82/0x180
[   16.225894]  ? preempt_count_sub+0x50/0x80
[   16.225920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.225944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.225968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.225992]  kthread+0x337/0x6f0
[   16.226009]  ? trace_preempt_on+0x20/0xc0
[   16.226033]  ? __pfx_kthread+0x10/0x10
[   16.226052]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.226074]  ? calculate_sigpending+0x7b/0xa0
[   16.226097]  ? __pfx_kthread+0x10/0x10
[   16.226117]  ret_from_fork+0x41/0x80
[   16.226140]  ? __pfx_kthread+0x10/0x10
[   16.226159]  ret_from_fork_asm+0x1a/0x30
[   16.226192]  </TASK>
[   16.226206] 
[   16.233593] Allocated by task 284:
[   16.233725]  kasan_save_stack+0x45/0x70
[   16.233870]  kasan_save_track+0x18/0x40
[   16.234031]  kasan_save_alloc_info+0x3b/0x50
[   16.234244]  __kasan_kmalloc+0xb7/0xc0
[   16.234446]  __kmalloc_cache_noprof+0x189/0x420
[   16.234668]  kasan_atomics+0x95/0x310
[   16.234856]  kunit_try_run_case+0x1a5/0x480
[   16.235041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.235217]  kthread+0x337/0x6f0
[   16.235394]  ret_from_fork+0x41/0x80
[   16.235765]  ret_from_fork_asm+0x1a/0x30
[   16.235964] 
[   16.236060] The buggy address belongs to the object at ffff888102717100
[   16.236060]  which belongs to the cache kmalloc-64 of size 64
[   16.236557] The buggy address is located 0 bytes to the right of
[   16.236557]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.236960] 
[   16.237034] The buggy address belongs to the physical page:
[   16.237207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.238356] flags: 0x200000000000000(node=0|zone=2)
[   16.238979] page_type: f5(slab)
[   16.239561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.240578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.241330] page dumped because: kasan: bad access detected
[   16.241918] 
[   16.241999] Memory state around the buggy address:
[   16.242162]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.242865]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.243716] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.244592]                                      ^
[   16.245052]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245614]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245840] ==================================================================
[   15.327343] ==================================================================
[   15.327703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.328029] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.328355] 
[   15.328474] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.328522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.328536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.328557] Call Trace:
[   15.328574]  <TASK>
[   15.328591]  dump_stack_lvl+0x73/0xb0
[   15.328620]  print_report+0xd1/0x650
[   15.328643]  ? __virt_addr_valid+0x1db/0x2d0
[   15.328665]  ? kasan_atomics_helper+0xac7/0x5450
[   15.328687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.328711]  ? kasan_atomics_helper+0xac7/0x5450
[   15.328734]  kasan_report+0x141/0x180
[   15.328757]  ? kasan_atomics_helper+0xac7/0x5450
[   15.328785]  kasan_check_range+0x10c/0x1c0
[   15.328806]  __kasan_check_write+0x18/0x20
[   15.328827]  kasan_atomics_helper+0xac7/0x5450
[   15.328851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.328876]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.328898]  ? kasan_atomics+0x152/0x310
[   15.328923]  kasan_atomics+0x1dc/0x310
[   15.328944]  ? __pfx_kasan_atomics+0x10/0x10
[   15.328966]  ? trace_hardirqs_on+0x37/0xe0
[   15.328992]  ? __pfx_read_tsc+0x10/0x10
[   15.329013]  ? ktime_get_ts64+0x86/0x230
[   15.329039]  kunit_try_run_case+0x1a5/0x480
[   15.329064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.329089]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.329114]  ? __kthread_parkme+0x82/0x180
[   15.329137]  ? preempt_count_sub+0x50/0x80
[   15.329163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.329187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.329211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.329235]  kthread+0x337/0x6f0
[   15.329253]  ? trace_preempt_on+0x20/0xc0
[   15.329276]  ? __pfx_kthread+0x10/0x10
[   15.329296]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.329329]  ? calculate_sigpending+0x7b/0xa0
[   15.329351]  ? __pfx_kthread+0x10/0x10
[   15.329371]  ret_from_fork+0x41/0x80
[   15.329394]  ? __pfx_kthread+0x10/0x10
[   15.329413]  ret_from_fork_asm+0x1a/0x30
[   15.329464]  </TASK>
[   15.329477] 
[   15.336632] Allocated by task 284:
[   15.336766]  kasan_save_stack+0x45/0x70
[   15.336912]  kasan_save_track+0x18/0x40
[   15.337082]  kasan_save_alloc_info+0x3b/0x50
[   15.337293]  __kasan_kmalloc+0xb7/0xc0
[   15.337519]  __kmalloc_cache_noprof+0x189/0x420
[   15.337753]  kasan_atomics+0x95/0x310
[   15.337945]  kunit_try_run_case+0x1a5/0x480
[   15.338154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.338417]  kthread+0x337/0x6f0
[   15.338611]  ret_from_fork+0x41/0x80
[   15.338774]  ret_from_fork_asm+0x1a/0x30
[   15.338964] 
[   15.339062] The buggy address belongs to the object at ffff888102717100
[   15.339062]  which belongs to the cache kmalloc-64 of size 64
[   15.339540] The buggy address is located 0 bytes to the right of
[   15.339540]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.340042] 
[   15.340117] The buggy address belongs to the physical page:
[   15.340292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.340589] flags: 0x200000000000000(node=0|zone=2)
[   15.340823] page_type: f5(slab)
[   15.340993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.341347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.341700] page dumped because: kasan: bad access detected
[   15.341908] 
[   15.341980] Memory state around the buggy address:
[   15.342137]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342364]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342652] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.342985]                                      ^
[   15.343218]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343578]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343904] ==================================================================
[   15.344883] ==================================================================
[   15.345241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.345557] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.345788] 
[   15.345901] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.345946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.345960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.345981] Call Trace:
[   15.345996]  <TASK>
[   15.346011]  dump_stack_lvl+0x73/0xb0
[   15.346040]  print_report+0xd1/0x650
[   15.346063]  ? __virt_addr_valid+0x1db/0x2d0
[   15.346085]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.346107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.346131]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.346154]  kasan_report+0x141/0x180
[   15.346177]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.346205]  kasan_check_range+0x10c/0x1c0
[   15.346227]  __kasan_check_write+0x18/0x20
[   15.346247]  kasan_atomics_helper+0xb6a/0x5450
[   15.346271]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.346295]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.346327]  ? kasan_atomics+0x152/0x310
[   15.346352]  kasan_atomics+0x1dc/0x310
[   15.346371]  ? __pfx_kasan_atomics+0x10/0x10
[   15.346391]  ? trace_hardirqs_on+0x37/0xe0
[   15.346416]  ? __pfx_read_tsc+0x10/0x10
[   15.346456]  ? ktime_get_ts64+0x86/0x230
[   15.346482]  kunit_try_run_case+0x1a5/0x480
[   15.346508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346532]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.346558]  ? __kthread_parkme+0x82/0x180
[   15.346581]  ? preempt_count_sub+0x50/0x80
[   15.346606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.346654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.346684]  kthread+0x337/0x6f0
[   15.346702]  ? trace_preempt_on+0x20/0xc0
[   15.346725]  ? __pfx_kthread+0x10/0x10
[   15.346744]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.346768]  ? calculate_sigpending+0x7b/0xa0
[   15.346791]  ? __pfx_kthread+0x10/0x10
[   15.346811]  ret_from_fork+0x41/0x80
[   15.346832]  ? __pfx_kthread+0x10/0x10
[   15.346856]  ret_from_fork_asm+0x1a/0x30
[   15.346891]  </TASK>
[   15.346904] 
[   15.354190] Allocated by task 284:
[   15.354386]  kasan_save_stack+0x45/0x70
[   15.354612]  kasan_save_track+0x18/0x40
[   15.354809]  kasan_save_alloc_info+0x3b/0x50
[   15.354987]  __kasan_kmalloc+0xb7/0xc0
[   15.355180]  __kmalloc_cache_noprof+0x189/0x420
[   15.355357]  kasan_atomics+0x95/0x310
[   15.355515]  kunit_try_run_case+0x1a5/0x480
[   15.355667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.355859]  kthread+0x337/0x6f0
[   15.356028]  ret_from_fork+0x41/0x80
[   15.356217]  ret_from_fork_asm+0x1a/0x30
[   15.356442] 
[   15.356541] The buggy address belongs to the object at ffff888102717100
[   15.356541]  which belongs to the cache kmalloc-64 of size 64
[   15.357011] The buggy address is located 0 bytes to the right of
[   15.357011]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.357389] 
[   15.357512] The buggy address belongs to the physical page:
[   15.357769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.358124] flags: 0x200000000000000(node=0|zone=2)
[   15.358368] page_type: f5(slab)
[   15.358559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.358900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.359131] page dumped because: kasan: bad access detected
[   15.359316] 
[   15.359412] Memory state around the buggy address:
[   15.359660]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.360000]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.360351] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.360676]                                      ^
[   15.360866]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361084]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361344] ==================================================================
[   15.399588] ==================================================================
[   15.399984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.400334] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.400662] 
[   15.400765] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.400813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.400827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.400850] Call Trace:
[   15.400867]  <TASK>
[   15.400884]  dump_stack_lvl+0x73/0xb0
[   15.400912]  print_report+0xd1/0x650
[   15.400935]  ? __virt_addr_valid+0x1db/0x2d0
[   15.400958]  ? kasan_atomics_helper+0xd47/0x5450
[   15.400980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.401003]  ? kasan_atomics_helper+0xd47/0x5450
[   15.401027]  kasan_report+0x141/0x180
[   15.401051]  ? kasan_atomics_helper+0xd47/0x5450
[   15.401079]  kasan_check_range+0x10c/0x1c0
[   15.401101]  __kasan_check_write+0x18/0x20
[   15.401122]  kasan_atomics_helper+0xd47/0x5450
[   15.401146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.401170]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.401193]  ? kasan_atomics+0x152/0x310
[   15.401218]  kasan_atomics+0x1dc/0x310
[   15.401239]  ? __pfx_kasan_atomics+0x10/0x10
[   15.401260]  ? trace_hardirqs_on+0x37/0xe0
[   15.401284]  ? __pfx_read_tsc+0x10/0x10
[   15.401315]  ? ktime_get_ts64+0x86/0x230
[   15.401342]  kunit_try_run_case+0x1a5/0x480
[   15.401367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401392]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.401417]  ? __kthread_parkme+0x82/0x180
[   15.401460]  ? preempt_count_sub+0x50/0x80
[   15.401487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.401535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.401560]  kthread+0x337/0x6f0
[   15.401578]  ? trace_preempt_on+0x20/0xc0
[   15.401602]  ? __pfx_kthread+0x10/0x10
[   15.401621]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.401643]  ? calculate_sigpending+0x7b/0xa0
[   15.401665]  ? __pfx_kthread+0x10/0x10
[   15.401685]  ret_from_fork+0x41/0x80
[   15.401707]  ? __pfx_kthread+0x10/0x10
[   15.401726]  ret_from_fork_asm+0x1a/0x30
[   15.401759]  </TASK>
[   15.401772] 
[   15.408884] Allocated by task 284:
[   15.409052]  kasan_save_stack+0x45/0x70
[   15.409251]  kasan_save_track+0x18/0x40
[   15.409482]  kasan_save_alloc_info+0x3b/0x50
[   15.409691]  __kasan_kmalloc+0xb7/0xc0
[   15.409880]  __kmalloc_cache_noprof+0x189/0x420
[   15.410100]  kasan_atomics+0x95/0x310
[   15.410284]  kunit_try_run_case+0x1a5/0x480
[   15.410465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.410645]  kthread+0x337/0x6f0
[   15.410779]  ret_from_fork+0x41/0x80
[   15.410966]  ret_from_fork_asm+0x1a/0x30
[   15.411170] 
[   15.411265] The buggy address belongs to the object at ffff888102717100
[   15.411265]  which belongs to the cache kmalloc-64 of size 64
[   15.411838] The buggy address is located 0 bytes to the right of
[   15.411838]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.412345] 
[   15.412465] The buggy address belongs to the physical page:
[   15.412694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.413010] flags: 0x200000000000000(node=0|zone=2)
[   15.413232] page_type: f5(slab)
[   15.413400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.413717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.414010] page dumped because: kasan: bad access detected
[   15.414252] 
[   15.414354] Memory state around the buggy address:
[   15.414576]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.414851]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.415136] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.415417]                                      ^
[   15.415594]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.415812]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.416027] ==================================================================
[   15.860534] ==================================================================
[   15.861061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.861409] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.861748] 
[   15.861854] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.861910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.861924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.861946] Call Trace:
[   15.861963]  <TASK>
[   15.861990]  dump_stack_lvl+0x73/0xb0
[   15.862019]  print_report+0xd1/0x650
[   15.862041]  ? __virt_addr_valid+0x1db/0x2d0
[   15.862063]  ? kasan_atomics_helper+0x1818/0x5450
[   15.862085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.862108]  ? kasan_atomics_helper+0x1818/0x5450
[   15.862131]  kasan_report+0x141/0x180
[   15.862154]  ? kasan_atomics_helper+0x1818/0x5450
[   15.862191]  kasan_check_range+0x10c/0x1c0
[   15.862212]  __kasan_check_write+0x18/0x20
[   15.862232]  kasan_atomics_helper+0x1818/0x5450
[   15.862268]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.862291]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.862322]  ? kasan_atomics+0x152/0x310
[   15.862346]  kasan_atomics+0x1dc/0x310
[   15.862376]  ? __pfx_kasan_atomics+0x10/0x10
[   15.862396]  ? trace_hardirqs_on+0x37/0xe0
[   15.862420]  ? __pfx_read_tsc+0x10/0x10
[   15.862450]  ? ktime_get_ts64+0x86/0x230
[   15.862475]  kunit_try_run_case+0x1a5/0x480
[   15.862500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862525]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.862550]  ? __kthread_parkme+0x82/0x180
[   15.862572]  ? preempt_count_sub+0x50/0x80
[   15.862598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.862645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.862668]  kthread+0x337/0x6f0
[   15.862690]  ? trace_preempt_on+0x20/0xc0
[   15.862713]  ? __pfx_kthread+0x10/0x10
[   15.862732]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.862754]  ? calculate_sigpending+0x7b/0xa0
[   15.862776]  ? __pfx_kthread+0x10/0x10
[   15.862796]  ret_from_fork+0x41/0x80
[   15.862817]  ? __pfx_kthread+0x10/0x10
[   15.862836]  ret_from_fork_asm+0x1a/0x30
[   15.862868]  </TASK>
[   15.862879] 
[   15.870968] Allocated by task 284:
[   15.871178]  kasan_save_stack+0x45/0x70
[   15.871371]  kasan_save_track+0x18/0x40
[   15.871618]  kasan_save_alloc_info+0x3b/0x50
[   15.871834]  __kasan_kmalloc+0xb7/0xc0
[   15.872023]  __kmalloc_cache_noprof+0x189/0x420
[   15.872244]  kasan_atomics+0x95/0x310
[   15.872446]  kunit_try_run_case+0x1a5/0x480
[   15.872669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.872930]  kthread+0x337/0x6f0
[   15.873111]  ret_from_fork+0x41/0x80
[   15.873317]  ret_from_fork_asm+0x1a/0x30
[   15.873518] 
[   15.873604] The buggy address belongs to the object at ffff888102717100
[   15.873604]  which belongs to the cache kmalloc-64 of size 64
[   15.873955] The buggy address is located 0 bytes to the right of
[   15.873955]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.874326] 
[   15.874436] The buggy address belongs to the physical page:
[   15.874757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.875122] flags: 0x200000000000000(node=0|zone=2)
[   15.875367] page_type: f5(slab)
[   15.875649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.875991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.876221] page dumped because: kasan: bad access detected
[   15.876404] 
[   15.876570] Memory state around the buggy address:
[   15.876825]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.877180]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.877576] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.877901]                                      ^
[   15.878114]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878424]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878747] ==================================================================
[   15.920285] ==================================================================
[   15.920831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.921143] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.921627] 
[   15.921860] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.922075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.922094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.922116] Call Trace:
[   15.922131]  <TASK>
[   15.922147]  dump_stack_lvl+0x73/0xb0
[   15.922176]  print_report+0xd1/0x650
[   15.922200]  ? __virt_addr_valid+0x1db/0x2d0
[   15.922221]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.922244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.922267]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.922290]  kasan_report+0x141/0x180
[   15.922323]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.922351]  kasan_check_range+0x10c/0x1c0
[   15.922373]  __kasan_check_write+0x18/0x20
[   15.922393]  kasan_atomics_helper+0x19e3/0x5450
[   15.922417]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.922506]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.922544]  ? kasan_atomics+0x152/0x310
[   15.922569]  kasan_atomics+0x1dc/0x310
[   15.922601]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922621]  ? trace_hardirqs_on+0x37/0xe0
[   15.922644]  ? __pfx_read_tsc+0x10/0x10
[   15.922697]  ? ktime_get_ts64+0x86/0x230
[   15.922723]  kunit_try_run_case+0x1a5/0x480
[   15.922748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922773]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.922797]  ? __kthread_parkme+0x82/0x180
[   15.922819]  ? preempt_count_sub+0x50/0x80
[   15.922845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.922892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.922915]  kthread+0x337/0x6f0
[   15.922933]  ? trace_preempt_on+0x20/0xc0
[   15.922956]  ? __pfx_kthread+0x10/0x10
[   15.922975]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.922997]  ? calculate_sigpending+0x7b/0xa0
[   15.923018]  ? __pfx_kthread+0x10/0x10
[   15.923038]  ret_from_fork+0x41/0x80
[   15.923059]  ? __pfx_kthread+0x10/0x10
[   15.923078]  ret_from_fork_asm+0x1a/0x30
[   15.923110]  </TASK>
[   15.923122] 
[   15.934223] Allocated by task 284:
[   15.934405]  kasan_save_stack+0x45/0x70
[   15.934864]  kasan_save_track+0x18/0x40
[   15.935059]  kasan_save_alloc_info+0x3b/0x50
[   15.935243]  __kasan_kmalloc+0xb7/0xc0
[   15.935403]  __kmalloc_cache_noprof+0x189/0x420
[   15.935571]  kasan_atomics+0x95/0x310
[   15.935782]  kunit_try_run_case+0x1a5/0x480
[   15.935985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.936236]  kthread+0x337/0x6f0
[   15.936427]  ret_from_fork+0x41/0x80
[   15.936672]  ret_from_fork_asm+0x1a/0x30
[   15.936813] 
[   15.936958] The buggy address belongs to the object at ffff888102717100
[   15.936958]  which belongs to the cache kmalloc-64 of size 64
[   15.937550] The buggy address is located 0 bytes to the right of
[   15.937550]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.938039] 
[   15.938151] The buggy address belongs to the physical page:
[   15.938357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.938635] flags: 0x200000000000000(node=0|zone=2)
[   15.939007] page_type: f5(slab)
[   15.939182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.939642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.939997] page dumped because: kasan: bad access detected
[   15.940172] 
[   15.940248] Memory state around the buggy address:
[   15.940522]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.940821]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.941173] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.941498]                                      ^
[   15.941729]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.942030]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.942346] ==================================================================
[   15.563231] ==================================================================
[   15.563603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.563840] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.564499] 
[   15.564612] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.564669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.564683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.564705] Call Trace:
[   15.564730]  <TASK>
[   15.564745]  dump_stack_lvl+0x73/0xb0
[   15.564775]  print_report+0xd1/0x650
[   15.564798]  ? __virt_addr_valid+0x1db/0x2d0
[   15.564819]  ? kasan_atomics_helper+0x1148/0x5450
[   15.564841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.564865]  ? kasan_atomics_helper+0x1148/0x5450
[   15.564889]  kasan_report+0x141/0x180
[   15.564912]  ? kasan_atomics_helper+0x1148/0x5450
[   15.564940]  kasan_check_range+0x10c/0x1c0
[   15.564961]  __kasan_check_write+0x18/0x20
[   15.564982]  kasan_atomics_helper+0x1148/0x5450
[   15.565006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.565029]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.565051]  ? kasan_atomics+0x152/0x310
[   15.565085]  kasan_atomics+0x1dc/0x310
[   15.565106]  ? __pfx_kasan_atomics+0x10/0x10
[   15.565126]  ? trace_hardirqs_on+0x37/0xe0
[   15.565160]  ? __pfx_read_tsc+0x10/0x10
[   15.565180]  ? ktime_get_ts64+0x86/0x230
[   15.565206]  kunit_try_run_case+0x1a5/0x480
[   15.565236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.565261]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.565286]  ? __kthread_parkme+0x82/0x180
[   15.565324]  ? preempt_count_sub+0x50/0x80
[   15.565350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.565374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.565397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.565429]  kthread+0x337/0x6f0
[   15.565456]  ? trace_preempt_on+0x20/0xc0
[   15.565480]  ? __pfx_kthread+0x10/0x10
[   15.565509]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.565531]  ? calculate_sigpending+0x7b/0xa0
[   15.565553]  ? __pfx_kthread+0x10/0x10
[   15.565572]  ret_from_fork+0x41/0x80
[   15.565594]  ? __pfx_kthread+0x10/0x10
[   15.565613]  ret_from_fork_asm+0x1a/0x30
[   15.565645]  </TASK>
[   15.565656] 
[   15.573364] Allocated by task 284:
[   15.573496]  kasan_save_stack+0x45/0x70
[   15.573642]  kasan_save_track+0x18/0x40
[   15.573780]  kasan_save_alloc_info+0x3b/0x50
[   15.573990]  __kasan_kmalloc+0xb7/0xc0
[   15.574181]  __kmalloc_cache_noprof+0x189/0x420
[   15.574434]  kasan_atomics+0x95/0x310
[   15.574623]  kunit_try_run_case+0x1a5/0x480
[   15.574834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.575091]  kthread+0x337/0x6f0
[   15.575286]  ret_from_fork+0x41/0x80
[   15.575513]  ret_from_fork_asm+0x1a/0x30
[   15.575710] 
[   15.575804] The buggy address belongs to the object at ffff888102717100
[   15.575804]  which belongs to the cache kmalloc-64 of size 64
[   15.576219] The buggy address is located 0 bytes to the right of
[   15.576219]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.576982] 
[   15.577056] The buggy address belongs to the physical page:
[   15.577229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.577799] flags: 0x200000000000000(node=0|zone=2)
[   15.578059] page_type: f5(slab)
[   15.578251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.578613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.578849] page dumped because: kasan: bad access detected
[   15.579024] 
[   15.579095] Memory state around the buggy address:
[   15.579299]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579669]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579991] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.580299]                                      ^
[   15.580560]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.580873]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.581120] ==================================================================
[   16.159458] ==================================================================
[   16.160255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.161083] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.162062] 
[   16.162283] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.162432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.162448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.162470] Call Trace:
[   16.162485]  <TASK>
[   16.162501]  dump_stack_lvl+0x73/0xb0
[   16.162531]  print_report+0xd1/0x650
[   16.162555]  ? __virt_addr_valid+0x1db/0x2d0
[   16.162578]  ? kasan_atomics_helper+0x2006/0x5450
[   16.162693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.162721]  ? kasan_atomics_helper+0x2006/0x5450
[   16.162745]  kasan_report+0x141/0x180
[   16.162769]  ? kasan_atomics_helper+0x2006/0x5450
[   16.162797]  kasan_check_range+0x10c/0x1c0
[   16.162819]  __kasan_check_write+0x18/0x20
[   16.162840]  kasan_atomics_helper+0x2006/0x5450
[   16.162866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.162890]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.162913]  ? kasan_atomics+0x152/0x310
[   16.162937]  kasan_atomics+0x1dc/0x310
[   16.162957]  ? __pfx_kasan_atomics+0x10/0x10
[   16.162977]  ? trace_hardirqs_on+0x37/0xe0
[   16.163001]  ? __pfx_read_tsc+0x10/0x10
[   16.163021]  ? ktime_get_ts64+0x86/0x230
[   16.163047]  kunit_try_run_case+0x1a5/0x480
[   16.163071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163096]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.163121]  ? __kthread_parkme+0x82/0x180
[   16.163144]  ? preempt_count_sub+0x50/0x80
[   16.163170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.163218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.163242]  kthread+0x337/0x6f0
[   16.163260]  ? trace_preempt_on+0x20/0xc0
[   16.163283]  ? __pfx_kthread+0x10/0x10
[   16.163313]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.163335]  ? calculate_sigpending+0x7b/0xa0
[   16.163358]  ? __pfx_kthread+0x10/0x10
[   16.163377]  ret_from_fork+0x41/0x80
[   16.163399]  ? __pfx_kthread+0x10/0x10
[   16.163418]  ret_from_fork_asm+0x1a/0x30
[   16.163450]  </TASK>
[   16.163462] 
[   16.177463] Allocated by task 284:
[   16.177635]  kasan_save_stack+0x45/0x70
[   16.177815]  kasan_save_track+0x18/0x40
[   16.177976]  kasan_save_alloc_info+0x3b/0x50
[   16.178156]  __kasan_kmalloc+0xb7/0xc0
[   16.178906]  __kmalloc_cache_noprof+0x189/0x420
[   16.179777]  kasan_atomics+0x95/0x310
[   16.180238]  kunit_try_run_case+0x1a5/0x480
[   16.180970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.181587]  kthread+0x337/0x6f0
[   16.182076]  ret_from_fork+0x41/0x80
[   16.182671]  ret_from_fork_asm+0x1a/0x30
[   16.183215] 
[   16.183631] The buggy address belongs to the object at ffff888102717100
[   16.183631]  which belongs to the cache kmalloc-64 of size 64
[   16.185097] The buggy address is located 0 bytes to the right of
[   16.185097]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.186698] 
[   16.187005] The buggy address belongs to the physical page:
[   16.187677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.187948] flags: 0x200000000000000(node=0|zone=2)
[   16.188118] page_type: f5(slab)
[   16.188244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.188951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.190015] page dumped because: kasan: bad access detected
[   16.190821] 
[   16.191223] Memory state around the buggy address:
[   16.191965]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.192833]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.193063] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.193279]                                      ^
[   16.193804]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.194463]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.195068] ==================================================================
[   15.646493] ==================================================================
[   15.647219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.647988] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.648505] 
[   15.648705] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.648753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.648767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.648790] Call Trace:
[   15.648803]  <TASK>
[   15.648818]  dump_stack_lvl+0x73/0xb0
[   15.648846]  print_report+0xd1/0x650
[   15.648881]  ? __virt_addr_valid+0x1db/0x2d0
[   15.648903]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.648925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.648960]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.648982]  kasan_report+0x141/0x180
[   15.649006]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.649034]  kasan_check_range+0x10c/0x1c0
[   15.649054]  __kasan_check_write+0x18/0x20
[   15.649076]  kasan_atomics_helper+0x12e6/0x5450
[   15.649100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.649122]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.649146]  ? kasan_atomics+0x152/0x310
[   15.649170]  kasan_atomics+0x1dc/0x310
[   15.649189]  ? __pfx_kasan_atomics+0x10/0x10
[   15.649209]  ? trace_hardirqs_on+0x37/0xe0
[   15.649232]  ? __pfx_read_tsc+0x10/0x10
[   15.649253]  ? ktime_get_ts64+0x86/0x230
[   15.649279]  kunit_try_run_case+0x1a5/0x480
[   15.649362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649387]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.649413]  ? __kthread_parkme+0x82/0x180
[   15.649447]  ? preempt_count_sub+0x50/0x80
[   15.649473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.649520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.649546]  kthread+0x337/0x6f0
[   15.649563]  ? trace_preempt_on+0x20/0xc0
[   15.649586]  ? __pfx_kthread+0x10/0x10
[   15.649605]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.649627]  ? calculate_sigpending+0x7b/0xa0
[   15.649648]  ? __pfx_kthread+0x10/0x10
[   15.649667]  ret_from_fork+0x41/0x80
[   15.649690]  ? __pfx_kthread+0x10/0x10
[   15.649709]  ret_from_fork_asm+0x1a/0x30
[   15.649741]  </TASK>
[   15.649754] 
[   15.660753] Allocated by task 284:
[   15.660887]  kasan_save_stack+0x45/0x70
[   15.661114]  kasan_save_track+0x18/0x40
[   15.661327]  kasan_save_alloc_info+0x3b/0x50
[   15.661553]  __kasan_kmalloc+0xb7/0xc0
[   15.661742]  __kmalloc_cache_noprof+0x189/0x420
[   15.661898]  kasan_atomics+0x95/0x310
[   15.662030]  kunit_try_run_case+0x1a5/0x480
[   15.662209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662498]  kthread+0x337/0x6f0
[   15.662701]  ret_from_fork+0x41/0x80
[   15.662954]  ret_from_fork_asm+0x1a/0x30
[   15.663155] 
[   15.663262] The buggy address belongs to the object at ffff888102717100
[   15.663262]  which belongs to the cache kmalloc-64 of size 64
[   15.663815] The buggy address is located 0 bytes to the right of
[   15.663815]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.664357] 
[   15.664439] The buggy address belongs to the physical page:
[   15.664752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.665107] flags: 0x200000000000000(node=0|zone=2)
[   15.665347] page_type: f5(slab)
[   15.665523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.665853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.666190] page dumped because: kasan: bad access detected
[   15.666448] 
[   15.666555] Memory state around the buggy address:
[   15.666777]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667080]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667290] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.667643]                                      ^
[   15.667875]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668192]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668507] ==================================================================
[   15.475196] ==================================================================
[   15.475542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.475783] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.476593] 
[   15.477004] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.477056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.477071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.477094] Call Trace:
[   15.477108]  <TASK>
[   15.477124]  dump_stack_lvl+0x73/0xb0
[   15.477154]  print_report+0xd1/0x650
[   15.477178]  ? __virt_addr_valid+0x1db/0x2d0
[   15.477200]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.477222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.477247]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.477269]  kasan_report+0x141/0x180
[   15.477293]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.477332]  kasan_check_range+0x10c/0x1c0
[   15.477354]  __kasan_check_write+0x18/0x20
[   15.477374]  kasan_atomics_helper+0xfa9/0x5450
[   15.477398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.477422]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.477445]  ? kasan_atomics+0x152/0x310
[   15.477491]  kasan_atomics+0x1dc/0x310
[   15.477512]  ? __pfx_kasan_atomics+0x10/0x10
[   15.477532]  ? trace_hardirqs_on+0x37/0xe0
[   15.477556]  ? __pfx_read_tsc+0x10/0x10
[   15.477576]  ? ktime_get_ts64+0x86/0x230
[   15.477601]  kunit_try_run_case+0x1a5/0x480
[   15.477626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477650]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.477676]  ? __kthread_parkme+0x82/0x180
[   15.477698]  ? preempt_count_sub+0x50/0x80
[   15.477724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.477795]  kthread+0x337/0x6f0
[   15.477813]  ? trace_preempt_on+0x20/0xc0
[   15.477836]  ? __pfx_kthread+0x10/0x10
[   15.477856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.477877]  ? calculate_sigpending+0x7b/0xa0
[   15.477899]  ? __pfx_kthread+0x10/0x10
[   15.477918]  ret_from_fork+0x41/0x80
[   15.477940]  ? __pfx_kthread+0x10/0x10
[   15.477959]  ret_from_fork_asm+0x1a/0x30
[   15.477991]  </TASK>
[   15.478004] 
[   15.489875] Allocated by task 284:
[   15.490106]  kasan_save_stack+0x45/0x70
[   15.490531]  kasan_save_track+0x18/0x40
[   15.490849]  kasan_save_alloc_info+0x3b/0x50
[   15.491191]  __kasan_kmalloc+0xb7/0xc0
[   15.491370]  __kmalloc_cache_noprof+0x189/0x420
[   15.491823]  kasan_atomics+0x95/0x310
[   15.492172]  kunit_try_run_case+0x1a5/0x480
[   15.492413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.492901]  kthread+0x337/0x6f0
[   15.493023]  ret_from_fork+0x41/0x80
[   15.493154]  ret_from_fork_asm+0x1a/0x30
[   15.493296] 
[   15.493380] The buggy address belongs to the object at ffff888102717100
[   15.493380]  which belongs to the cache kmalloc-64 of size 64
[   15.494433] The buggy address is located 0 bytes to the right of
[   15.494433]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.495564] 
[   15.495785] The buggy address belongs to the physical page:
[   15.496284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.496984] flags: 0x200000000000000(node=0|zone=2)
[   15.497366] page_type: f5(slab)
[   15.497519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.498181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.498780] page dumped because: kasan: bad access detected
[   15.499130] 
[   15.499327] Memory state around the buggy address:
[   15.499658]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.500016]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.500235] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.500472]                                      ^
[   15.500639]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500982]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.501264] ==================================================================
[   15.688235] ==================================================================
[   15.688930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.689271] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.689670] 
[   15.689774] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.689825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.689839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.689863] Call Trace:
[   15.689886]  <TASK>
[   15.689910]  dump_stack_lvl+0x73/0xb0
[   15.689942]  print_report+0xd1/0x650
[   15.689967]  ? __virt_addr_valid+0x1db/0x2d0
[   15.689992]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.690014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.690038]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.690061]  kasan_report+0x141/0x180
[   15.690084]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.690113]  kasan_check_range+0x10c/0x1c0
[   15.690133]  __kasan_check_read+0x15/0x20
[   15.690154]  kasan_atomics_helper+0x13b5/0x5450
[   15.690178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.690201]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.690224]  ? kasan_atomics+0x152/0x310
[   15.690248]  kasan_atomics+0x1dc/0x310
[   15.690268]  ? __pfx_kasan_atomics+0x10/0x10
[   15.690288]  ? trace_hardirqs_on+0x37/0xe0
[   15.690323]  ? __pfx_read_tsc+0x10/0x10
[   15.690345]  ? ktime_get_ts64+0x86/0x230
[   15.690372]  kunit_try_run_case+0x1a5/0x480
[   15.690400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690425]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.690453]  ? __kthread_parkme+0x82/0x180
[   15.690475]  ? preempt_count_sub+0x50/0x80
[   15.690502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.690526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.690549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.690573]  kthread+0x337/0x6f0
[   15.690590]  ? trace_preempt_on+0x20/0xc0
[   15.690613]  ? __pfx_kthread+0x10/0x10
[   15.690632]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.690654]  ? calculate_sigpending+0x7b/0xa0
[   15.690682]  ? __pfx_kthread+0x10/0x10
[   15.690701]  ret_from_fork+0x41/0x80
[   15.690723]  ? __pfx_kthread+0x10/0x10
[   15.690741]  ret_from_fork_asm+0x1a/0x30
[   15.690775]  </TASK>
[   15.690789] 
[   15.698544] Allocated by task 284:
[   15.698736]  kasan_save_stack+0x45/0x70
[   15.698946]  kasan_save_track+0x18/0x40
[   15.699142]  kasan_save_alloc_info+0x3b/0x50
[   15.699367]  __kasan_kmalloc+0xb7/0xc0
[   15.699629]  __kmalloc_cache_noprof+0x189/0x420
[   15.699837]  kasan_atomics+0x95/0x310
[   15.699976]  kunit_try_run_case+0x1a5/0x480
[   15.700124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.700298]  kthread+0x337/0x6f0
[   15.700501]  ret_from_fork+0x41/0x80
[   15.700794]  ret_from_fork_asm+0x1a/0x30
[   15.701045] 
[   15.701143] The buggy address belongs to the object at ffff888102717100
[   15.701143]  which belongs to the cache kmalloc-64 of size 64
[   15.701780] The buggy address is located 0 bytes to the right of
[   15.701780]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.702149] 
[   15.702226] The buggy address belongs to the physical page:
[   15.702577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.702955] flags: 0x200000000000000(node=0|zone=2)
[   15.703230] page_type: f5(slab)
[   15.703414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.703803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.704175] page dumped because: kasan: bad access detected
[   15.704362] 
[   15.704442] Memory state around the buggy address:
[   15.704640]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705002]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705561] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.705812]                                      ^
[   15.706064]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706371]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706737] ==================================================================
[   16.022383] ==================================================================
[   16.023119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.023417] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.023686] 
[   16.023775] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.023821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.023835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.023868] Call Trace:
[   16.023886]  <TASK>
[   16.023903]  dump_stack_lvl+0x73/0xb0
[   16.023942]  print_report+0xd1/0x650
[   16.023966]  ? __virt_addr_valid+0x1db/0x2d0
[   16.023989]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.024012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.024035]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.024058]  kasan_report+0x141/0x180
[   16.024082]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.024111]  kasan_check_range+0x10c/0x1c0
[   16.024132]  __kasan_check_write+0x18/0x20
[   16.024153]  kasan_atomics_helper+0x1ce1/0x5450
[   16.024178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.024201]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.024224]  ? kasan_atomics+0x152/0x310
[   16.024248]  kasan_atomics+0x1dc/0x310
[   16.024269]  ? __pfx_kasan_atomics+0x10/0x10
[   16.024289]  ? trace_hardirqs_on+0x37/0xe0
[   16.024321]  ? __pfx_read_tsc+0x10/0x10
[   16.024341]  ? ktime_get_ts64+0x86/0x230
[   16.024368]  kunit_try_run_case+0x1a5/0x480
[   16.024393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.024418]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.024442]  ? __kthread_parkme+0x82/0x180
[   16.024464]  ? preempt_count_sub+0x50/0x80
[   16.024489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.024513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.024536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.024560]  kthread+0x337/0x6f0
[   16.024577]  ? trace_preempt_on+0x20/0xc0
[   16.024600]  ? __pfx_kthread+0x10/0x10
[   16.024619]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.024641]  ? calculate_sigpending+0x7b/0xa0
[   16.024663]  ? __pfx_kthread+0x10/0x10
[   16.024683]  ret_from_fork+0x41/0x80
[   16.024703]  ? __pfx_kthread+0x10/0x10
[   16.024722]  ret_from_fork_asm+0x1a/0x30
[   16.024754]  </TASK>
[   16.024766] 
[   16.032779] Allocated by task 284:
[   16.032991]  kasan_save_stack+0x45/0x70
[   16.033193]  kasan_save_track+0x18/0x40
[   16.033392]  kasan_save_alloc_info+0x3b/0x50
[   16.033764]  __kasan_kmalloc+0xb7/0xc0
[   16.033957]  __kmalloc_cache_noprof+0x189/0x420
[   16.034177]  kasan_atomics+0x95/0x310
[   16.034352]  kunit_try_run_case+0x1a5/0x480
[   16.034655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.034915]  kthread+0x337/0x6f0
[   16.035087]  ret_from_fork+0x41/0x80
[   16.035286]  ret_from_fork_asm+0x1a/0x30
[   16.035442] 
[   16.035569] The buggy address belongs to the object at ffff888102717100
[   16.035569]  which belongs to the cache kmalloc-64 of size 64
[   16.036147] The buggy address is located 0 bytes to the right of
[   16.036147]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.036672] 
[   16.036799] The buggy address belongs to the physical page:
[   16.037030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.037319] flags: 0x200000000000000(node=0|zone=2)
[   16.037488] page_type: f5(slab)
[   16.037613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.037899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.038263] page dumped because: kasan: bad access detected
[   16.038528] 
[   16.038707] Memory state around the buggy address:
[   16.038932]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.039166]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.039393] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.039944]                                      ^
[   16.040182]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.040646]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.041045] ==================================================================
[   16.041652] ==================================================================
[   16.042316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.042806] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.043046] 
[   16.043180] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.043225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.043239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.043260] Call Trace:
[   16.043277]  <TASK>
[   16.043295]  dump_stack_lvl+0x73/0xb0
[   16.043332]  print_report+0xd1/0x650
[   16.043355]  ? __virt_addr_valid+0x1db/0x2d0
[   16.043377]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.043422]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043446]  kasan_report+0x141/0x180
[   16.043480]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.043508]  kasan_check_range+0x10c/0x1c0
[   16.043529]  __kasan_check_write+0x18/0x20
[   16.043561]  kasan_atomics_helper+0x1d7a/0x5450
[   16.043585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.043609]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.043632]  ? kasan_atomics+0x152/0x310
[   16.043656]  kasan_atomics+0x1dc/0x310
[   16.043676]  ? __pfx_kasan_atomics+0x10/0x10
[   16.043696]  ? trace_hardirqs_on+0x37/0xe0
[   16.043720]  ? __pfx_read_tsc+0x10/0x10
[   16.043740]  ? ktime_get_ts64+0x86/0x230
[   16.043766]  kunit_try_run_case+0x1a5/0x480
[   16.043791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043816]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.043849]  ? __kthread_parkme+0x82/0x180
[   16.043872]  ? preempt_count_sub+0x50/0x80
[   16.043899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.043956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.043979]  kthread+0x337/0x6f0
[   16.043996]  ? trace_preempt_on+0x20/0xc0
[   16.044029]  ? __pfx_kthread+0x10/0x10
[   16.044047]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.044069]  ? calculate_sigpending+0x7b/0xa0
[   16.044101]  ? __pfx_kthread+0x10/0x10
[   16.044122]  ret_from_fork+0x41/0x80
[   16.044144]  ? __pfx_kthread+0x10/0x10
[   16.044163]  ret_from_fork_asm+0x1a/0x30
[   16.044195]  </TASK>
[   16.044207] 
[   16.052172] Allocated by task 284:
[   16.052360]  kasan_save_stack+0x45/0x70
[   16.052584]  kasan_save_track+0x18/0x40
[   16.052783]  kasan_save_alloc_info+0x3b/0x50
[   16.053001]  __kasan_kmalloc+0xb7/0xc0
[   16.053166]  __kmalloc_cache_noprof+0x189/0x420
[   16.053406]  kasan_atomics+0x95/0x310
[   16.053645]  kunit_try_run_case+0x1a5/0x480
[   16.053793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053985]  kthread+0x337/0x6f0
[   16.054175]  ret_from_fork+0x41/0x80
[   16.054372]  ret_from_fork_asm+0x1a/0x30
[   16.054574] 
[   16.054648] The buggy address belongs to the object at ffff888102717100
[   16.054648]  which belongs to the cache kmalloc-64 of size 64
[   16.055285] The buggy address is located 0 bytes to the right of
[   16.055285]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.055758] 
[   16.055835] The buggy address belongs to the physical page:
[   16.056012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.056364] flags: 0x200000000000000(node=0|zone=2)
[   16.056742] page_type: f5(slab)
[   16.057018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.057385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.057677] page dumped because: kasan: bad access detected
[   16.057853] 
[   16.057925] Memory state around the buggy address:
[   16.058084]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.058380]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.059056] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.059422]                                      ^
[   16.059679]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059990]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.060287] ==================================================================
[   15.526613] ==================================================================
[   15.527067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.527429] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.527731] 
[   15.527873] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.527919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.527933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.527956] Call Trace:
[   15.527982]  <TASK>
[   15.527999]  dump_stack_lvl+0x73/0xb0
[   15.528027]  print_report+0xd1/0x650
[   15.528065]  ? __virt_addr_valid+0x1db/0x2d0
[   15.528087]  ? kasan_atomics_helper+0x1079/0x5450
[   15.528110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.528134]  ? kasan_atomics_helper+0x1079/0x5450
[   15.528157]  kasan_report+0x141/0x180
[   15.528181]  ? kasan_atomics_helper+0x1079/0x5450
[   15.528209]  kasan_check_range+0x10c/0x1c0
[   15.528237]  __kasan_check_write+0x18/0x20
[   15.528258]  kasan_atomics_helper+0x1079/0x5450
[   15.528282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.528320]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.528343]  ? kasan_atomics+0x152/0x310
[   15.528366]  kasan_atomics+0x1dc/0x310
[   15.528386]  ? __pfx_kasan_atomics+0x10/0x10
[   15.528406]  ? trace_hardirqs_on+0x37/0xe0
[   15.528429]  ? __pfx_read_tsc+0x10/0x10
[   15.528463]  ? ktime_get_ts64+0x86/0x230
[   15.528489]  kunit_try_run_case+0x1a5/0x480
[   15.528515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528539]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.528563]  ? __kthread_parkme+0x82/0x180
[   15.528596]  ? preempt_count_sub+0x50/0x80
[   15.528621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.528710]  kthread+0x337/0x6f0
[   15.528739]  ? trace_preempt_on+0x20/0xc0
[   15.528763]  ? __pfx_kthread+0x10/0x10
[   15.528782]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.528804]  ? calculate_sigpending+0x7b/0xa0
[   15.528828]  ? __pfx_kthread+0x10/0x10
[   15.528849]  ret_from_fork+0x41/0x80
[   15.528879]  ? __pfx_kthread+0x10/0x10
[   15.528899]  ret_from_fork_asm+0x1a/0x30
[   15.528932]  </TASK>
[   15.528954] 
[   15.536518] Allocated by task 284:
[   15.536662]  kasan_save_stack+0x45/0x70
[   15.536819]  kasan_save_track+0x18/0x40
[   15.537058]  kasan_save_alloc_info+0x3b/0x50
[   15.537300]  __kasan_kmalloc+0xb7/0xc0
[   15.537503]  __kmalloc_cache_noprof+0x189/0x420
[   15.537770]  kasan_atomics+0x95/0x310
[   15.538142]  kunit_try_run_case+0x1a5/0x480
[   15.538373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.538596]  kthread+0x337/0x6f0
[   15.538723]  ret_from_fork+0x41/0x80
[   15.538999]  ret_from_fork_asm+0x1a/0x30
[   15.539221] 
[   15.539327] The buggy address belongs to the object at ffff888102717100
[   15.539327]  which belongs to the cache kmalloc-64 of size 64
[   15.539845] The buggy address is located 0 bytes to the right of
[   15.539845]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.540379] 
[   15.540493] The buggy address belongs to the physical page:
[   15.540802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.541143] flags: 0x200000000000000(node=0|zone=2)
[   15.541318] page_type: f5(slab)
[   15.541443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.541676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541991] page dumped because: kasan: bad access detected
[   15.542242] 
[   15.542344] Memory state around the buggy address:
[   15.542567]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542817]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.543038] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.543253]                                      ^
[   15.543756]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.544081]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.544440] ==================================================================
[   15.962313] ==================================================================
[   15.962876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.963182] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.963549] 
[   15.963647] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.963695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.963710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.963744] Call Trace:
[   15.963762]  <TASK>
[   15.963779]  dump_stack_lvl+0x73/0xb0
[   15.963817]  print_report+0xd1/0x650
[   15.963841]  ? __virt_addr_valid+0x1db/0x2d0
[   15.963864]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.963896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963921]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.963945]  kasan_report+0x141/0x180
[   15.963979]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.964008]  kasan_check_range+0x10c/0x1c0
[   15.964031]  __kasan_check_write+0x18/0x20
[   15.964060]  kasan_atomics_helper+0x1b22/0x5450
[   15.964085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.964120]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.964143]  ? kasan_atomics+0x152/0x310
[   15.964168]  kasan_atomics+0x1dc/0x310
[   15.964197]  ? __pfx_kasan_atomics+0x10/0x10
[   15.964218]  ? trace_hardirqs_on+0x37/0xe0
[   15.964242]  ? __pfx_read_tsc+0x10/0x10
[   15.964272]  ? ktime_get_ts64+0x86/0x230
[   15.964300]  kunit_try_run_case+0x1a5/0x480
[   15.964334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.964367]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.964393]  ? __kthread_parkme+0x82/0x180
[   15.964416]  ? preempt_count_sub+0x50/0x80
[   15.964464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.964489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.964537]  kthread+0x337/0x6f0
[   15.964565]  ? trace_preempt_on+0x20/0xc0
[   15.964589]  ? __pfx_kthread+0x10/0x10
[   15.964608]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.964641]  ? calculate_sigpending+0x7b/0xa0
[   15.964663]  ? __pfx_kthread+0x10/0x10
[   15.964683]  ret_from_fork+0x41/0x80
[   15.964704]  ? __pfx_kthread+0x10/0x10
[   15.964733]  ret_from_fork_asm+0x1a/0x30
[   15.964766]  </TASK>
[   15.964777] 
[   15.972591] Allocated by task 284:
[   15.972866]  kasan_save_stack+0x45/0x70
[   15.973056]  kasan_save_track+0x18/0x40
[   15.973209]  kasan_save_alloc_info+0x3b/0x50
[   15.973368]  __kasan_kmalloc+0xb7/0xc0
[   15.973505]  __kmalloc_cache_noprof+0x189/0x420
[   15.973660]  kasan_atomics+0x95/0x310
[   15.973791]  kunit_try_run_case+0x1a5/0x480
[   15.973986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974362]  kthread+0x337/0x6f0
[   15.974543]  ret_from_fork+0x41/0x80
[   15.974731]  ret_from_fork_asm+0x1a/0x30
[   15.974926] 
[   15.975019] The buggy address belongs to the object at ffff888102717100
[   15.975019]  which belongs to the cache kmalloc-64 of size 64
[   15.975534] The buggy address is located 0 bytes to the right of
[   15.975534]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.975898] 
[   15.975970] The buggy address belongs to the physical page:
[   15.976141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.976392] flags: 0x200000000000000(node=0|zone=2)
[   15.976601] page_type: f5(slab)
[   15.976724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.976955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.977181] page dumped because: kasan: bad access detected
[   15.977403] 
[   15.977501] Memory state around the buggy address:
[   15.977699]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.977920]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.978137] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.978363]                                      ^
[   15.978520]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978743]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.978958] ==================================================================
[   15.083477] ==================================================================
[   15.083858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.084384] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.084708] 
[   15.084820] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.084937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.084953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.084975] Call Trace:
[   15.084990]  <TASK>
[   15.085004]  dump_stack_lvl+0x73/0xb0
[   15.085034]  print_report+0xd1/0x650
[   15.085079]  ? __virt_addr_valid+0x1db/0x2d0
[   15.085101]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.085123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.085164]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.085186]  kasan_report+0x141/0x180
[   15.085210]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.085239]  __asan_report_load4_noabort+0x18/0x20
[   15.085260]  kasan_atomics_helper+0x4b54/0x5450
[   15.085284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.085320]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.085359]  ? kasan_atomics+0x152/0x310
[   15.085383]  kasan_atomics+0x1dc/0x310
[   15.085403]  ? __pfx_kasan_atomics+0x10/0x10
[   15.085424]  ? trace_hardirqs_on+0x37/0xe0
[   15.085447]  ? __pfx_read_tsc+0x10/0x10
[   15.085467]  ? ktime_get_ts64+0x86/0x230
[   15.085493]  kunit_try_run_case+0x1a5/0x480
[   15.085518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.085543]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.085568]  ? __kthread_parkme+0x82/0x180
[   15.085590]  ? preempt_count_sub+0x50/0x80
[   15.085632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.085657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.085681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.085705]  kthread+0x337/0x6f0
[   15.085724]  ? trace_preempt_on+0x20/0xc0
[   15.085748]  ? __pfx_kthread+0x10/0x10
[   15.085767]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.085804]  ? calculate_sigpending+0x7b/0xa0
[   15.085827]  ? __pfx_kthread+0x10/0x10
[   15.085847]  ret_from_fork+0x41/0x80
[   15.085869]  ? __pfx_kthread+0x10/0x10
[   15.085927]  ret_from_fork_asm+0x1a/0x30
[   15.085963]  </TASK>
[   15.085976] 
[   15.094729] Allocated by task 284:
[   15.094864]  kasan_save_stack+0x45/0x70
[   15.095100]  kasan_save_track+0x18/0x40
[   15.095486]  kasan_save_alloc_info+0x3b/0x50
[   15.095772]  __kasan_kmalloc+0xb7/0xc0
[   15.096068]  __kmalloc_cache_noprof+0x189/0x420
[   15.096234]  kasan_atomics+0x95/0x310
[   15.096439]  kunit_try_run_case+0x1a5/0x480
[   15.097013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097245]  kthread+0x337/0x6f0
[   15.097588]  ret_from_fork+0x41/0x80
[   15.097831]  ret_from_fork_asm+0x1a/0x30
[   15.098121] 
[   15.098228] The buggy address belongs to the object at ffff888102717100
[   15.098228]  which belongs to the cache kmalloc-64 of size 64
[   15.098816] The buggy address is located 0 bytes to the right of
[   15.098816]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.099384] 
[   15.099528] The buggy address belongs to the physical page:
[   15.099865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.100255] flags: 0x200000000000000(node=0|zone=2)
[   15.100533] page_type: f5(slab)
[   15.100730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.101076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.101594] page dumped because: kasan: bad access detected
[   15.101843] 
[   15.102036] Memory state around the buggy address:
[   15.102266]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.102617]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.102864] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.103204]                                      ^
[   15.103513]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103835]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.104197] ==================================================================
[   15.381380] ==================================================================
[   15.381736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.382065] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.382992] 
[   15.383168] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.383221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.383237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.383260] Call Trace:
[   15.383279]  <TASK>
[   15.383295]  dump_stack_lvl+0x73/0xb0
[   15.383339]  print_report+0xd1/0x650
[   15.383364]  ? __virt_addr_valid+0x1db/0x2d0
[   15.383387]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.383410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.383456]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.383481]  kasan_report+0x141/0x180
[   15.383504]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.383533]  __asan_report_load4_noabort+0x18/0x20
[   15.383555]  kasan_atomics_helper+0x4a84/0x5450
[   15.383579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.383603]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.383625]  ? kasan_atomics+0x152/0x310
[   15.383650]  kasan_atomics+0x1dc/0x310
[   15.383669]  ? __pfx_kasan_atomics+0x10/0x10
[   15.383689]  ? trace_hardirqs_on+0x37/0xe0
[   15.383713]  ? __pfx_read_tsc+0x10/0x10
[   15.383734]  ? ktime_get_ts64+0x86/0x230
[   15.383760]  kunit_try_run_case+0x1a5/0x480
[   15.383785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.383811]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.383835]  ? __kthread_parkme+0x82/0x180
[   15.383858]  ? preempt_count_sub+0x50/0x80
[   15.383884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.383908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.383932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.383955]  kthread+0x337/0x6f0
[   15.383973]  ? trace_preempt_on+0x20/0xc0
[   15.383997]  ? __pfx_kthread+0x10/0x10
[   15.384016]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.384038]  ? calculate_sigpending+0x7b/0xa0
[   15.384060]  ? __pfx_kthread+0x10/0x10
[   15.384080]  ret_from_fork+0x41/0x80
[   15.384102]  ? __pfx_kthread+0x10/0x10
[   15.384121]  ret_from_fork_asm+0x1a/0x30
[   15.384153]  </TASK>
[   15.384166] 
[   15.391209] Allocated by task 284:
[   15.391400]  kasan_save_stack+0x45/0x70
[   15.391596]  kasan_save_track+0x18/0x40
[   15.391781]  kasan_save_alloc_info+0x3b/0x50
[   15.391972]  __kasan_kmalloc+0xb7/0xc0
[   15.392145]  __kmalloc_cache_noprof+0x189/0x420
[   15.392372]  kasan_atomics+0x95/0x310
[   15.392558]  kunit_try_run_case+0x1a5/0x480
[   15.392739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392981]  kthread+0x337/0x6f0
[   15.393139]  ret_from_fork+0x41/0x80
[   15.393272]  ret_from_fork_asm+0x1a/0x30
[   15.393484] 
[   15.393586] The buggy address belongs to the object at ffff888102717100
[   15.393586]  which belongs to the cache kmalloc-64 of size 64
[   15.394042] The buggy address is located 0 bytes to the right of
[   15.394042]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.394585] 
[   15.394671] The buggy address belongs to the physical page:
[   15.394898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.395234] flags: 0x200000000000000(node=0|zone=2)
[   15.395412] page_type: f5(slab)
[   15.395558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.395792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.396103] page dumped because: kasan: bad access detected
[   15.396364] 
[   15.396486] Memory state around the buggy address:
[   15.396714]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397040]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.397329] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.397573]                                      ^
[   15.397732]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398015]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.398344] ==================================================================
[   15.169042] ==================================================================
[   15.169414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.169979] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.170664] 
[   15.170760] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.170805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.170819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.170840] Call Trace:
[   15.170856]  <TASK>
[   15.170872]  dump_stack_lvl+0x73/0xb0
[   15.170900]  print_report+0xd1/0x650
[   15.171102]  ? __virt_addr_valid+0x1db/0x2d0
[   15.171132]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.171155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.171180]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.171203]  kasan_report+0x141/0x180
[   15.171227]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.171255]  kasan_check_range+0x10c/0x1c0
[   15.171276]  __kasan_check_write+0x18/0x20
[   15.171299]  kasan_atomics_helper+0x5fe/0x5450
[   15.171336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.171360]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.171383]  ? kasan_atomics+0x152/0x310
[   15.171407]  kasan_atomics+0x1dc/0x310
[   15.171427]  ? __pfx_kasan_atomics+0x10/0x10
[   15.171447]  ? trace_hardirqs_on+0x37/0xe0
[   15.171469]  ? __pfx_read_tsc+0x10/0x10
[   15.171490]  ? ktime_get_ts64+0x86/0x230
[   15.171517]  kunit_try_run_case+0x1a5/0x480
[   15.171542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.171567]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.171591]  ? __kthread_parkme+0x82/0x180
[   15.171614]  ? preempt_count_sub+0x50/0x80
[   15.171639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.171664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.171711]  kthread+0x337/0x6f0
[   15.171729]  ? trace_preempt_on+0x20/0xc0
[   15.171753]  ? __pfx_kthread+0x10/0x10
[   15.171772]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.171794]  ? calculate_sigpending+0x7b/0xa0
[   15.171815]  ? __pfx_kthread+0x10/0x10
[   15.171835]  ret_from_fork+0x41/0x80
[   15.171856]  ? __pfx_kthread+0x10/0x10
[   15.171884]  ret_from_fork_asm+0x1a/0x30
[   15.171916]  </TASK>
[   15.171928] 
[   15.179558] Allocated by task 284:
[   15.179689]  kasan_save_stack+0x45/0x70
[   15.179884]  kasan_save_track+0x18/0x40
[   15.180081]  kasan_save_alloc_info+0x3b/0x50
[   15.180314]  __kasan_kmalloc+0xb7/0xc0
[   15.180496]  __kmalloc_cache_noprof+0x189/0x420
[   15.180699]  kasan_atomics+0x95/0x310
[   15.180858]  kunit_try_run_case+0x1a5/0x480
[   15.181067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181329]  kthread+0x337/0x6f0
[   15.181512]  ret_from_fork+0x41/0x80
[   15.181667]  ret_from_fork_asm+0x1a/0x30
[   15.181845] 
[   15.181949] The buggy address belongs to the object at ffff888102717100
[   15.181949]  which belongs to the cache kmalloc-64 of size 64
[   15.182447] The buggy address is located 0 bytes to the right of
[   15.182447]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.182842] 
[   15.182918] The buggy address belongs to the physical page:
[   15.183092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.183401] flags: 0x200000000000000(node=0|zone=2)
[   15.183634] page_type: f5(slab)
[   15.183806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.184149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.184465] page dumped because: kasan: bad access detected
[   15.184641] 
[   15.184713] Memory state around the buggy address:
[   15.184868]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.185179]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.185598] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.185921]                                      ^
[   15.186153]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.186536]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.186836] ==================================================================
[   15.979370] ==================================================================
[   15.979967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.980386] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.980959] 
[   15.981075] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.981121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.981135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.981157] Call Trace:
[   15.981170]  <TASK>
[   15.981185]  dump_stack_lvl+0x73/0xb0
[   15.981212]  print_report+0xd1/0x650
[   15.981235]  ? __virt_addr_valid+0x1db/0x2d0
[   15.981258]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.981280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.981318]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.981342]  kasan_report+0x141/0x180
[   15.981365]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.981393]  kasan_check_range+0x10c/0x1c0
[   15.981415]  __kasan_check_write+0x18/0x20
[   15.981436]  kasan_atomics_helper+0x1c18/0x5450
[   15.981468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.981492]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.981525]  ? kasan_atomics+0x152/0x310
[   15.981550]  kasan_atomics+0x1dc/0x310
[   15.981570]  ? __pfx_kasan_atomics+0x10/0x10
[   15.981590]  ? trace_hardirqs_on+0x37/0xe0
[   15.981632]  ? __pfx_read_tsc+0x10/0x10
[   15.981653]  ? ktime_get_ts64+0x86/0x230
[   15.981678]  kunit_try_run_case+0x1a5/0x480
[   15.981712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981737]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.981762]  ? __kthread_parkme+0x82/0x180
[   15.981784]  ? preempt_count_sub+0x50/0x80
[   15.981811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.981835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.981858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.981882]  kthread+0x337/0x6f0
[   15.981899]  ? trace_preempt_on+0x20/0xc0
[   15.981922]  ? __pfx_kthread+0x10/0x10
[   15.981941]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.981963]  ? calculate_sigpending+0x7b/0xa0
[   15.981986]  ? __pfx_kthread+0x10/0x10
[   15.982005]  ret_from_fork+0x41/0x80
[   15.982026]  ? __pfx_kthread+0x10/0x10
[   15.982045]  ret_from_fork_asm+0x1a/0x30
[   15.982078]  </TASK>
[   15.982090] 
[   15.989881] Allocated by task 284:
[   15.990081]  kasan_save_stack+0x45/0x70
[   15.990284]  kasan_save_track+0x18/0x40
[   15.990598]  kasan_save_alloc_info+0x3b/0x50
[   15.990784]  __kasan_kmalloc+0xb7/0xc0
[   15.990991]  __kmalloc_cache_noprof+0x189/0x420
[   15.991211]  kasan_atomics+0x95/0x310
[   15.991407]  kunit_try_run_case+0x1a5/0x480
[   15.991580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.991779]  kthread+0x337/0x6f0
[   15.991918]  ret_from_fork+0x41/0x80
[   15.992087]  ret_from_fork_asm+0x1a/0x30
[   15.992265] 
[   15.992373] The buggy address belongs to the object at ffff888102717100
[   15.992373]  which belongs to the cache kmalloc-64 of size 64
[   15.992869] The buggy address is located 0 bytes to the right of
[   15.992869]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.993268] 
[   15.993353] The buggy address belongs to the physical page:
[   15.993528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.993771] flags: 0x200000000000000(node=0|zone=2)
[   15.993933] page_type: f5(slab)
[   15.994055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.994356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.995078] page dumped because: kasan: bad access detected
[   15.995340] 
[   15.995436] Memory state around the buggy address:
[   15.995787]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996164]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.996548] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.996868]                                      ^
[   15.997091]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997422]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997676] ==================================================================
[   15.998108] ==================================================================
[   15.998377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.998716] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.999247] 
[   15.999428] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.999471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.999484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.999516] Call Trace:
[   15.999530]  <TASK>
[   15.999545]  dump_stack_lvl+0x73/0xb0
[   15.999572]  print_report+0xd1/0x650
[   15.999594]  ? __virt_addr_valid+0x1db/0x2d0
[   15.999616]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.999638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.999662]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.999685]  kasan_report+0x141/0x180
[   15.999709]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.999737]  __asan_report_load8_noabort+0x18/0x20
[   15.999759]  kasan_atomics_helper+0x4f30/0x5450
[   15.999783]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.999806]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.999828]  ? kasan_atomics+0x152/0x310
[   15.999852]  kasan_atomics+0x1dc/0x310
[   15.999872]  ? __pfx_kasan_atomics+0x10/0x10
[   15.999891]  ? trace_hardirqs_on+0x37/0xe0
[   15.999914]  ? __pfx_read_tsc+0x10/0x10
[   15.999935]  ? ktime_get_ts64+0x86/0x230
[   15.999960]  kunit_try_run_case+0x1a5/0x480
[   15.999984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.000009]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.000033]  ? __kthread_parkme+0x82/0x180
[   16.000055]  ? preempt_count_sub+0x50/0x80
[   16.000082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.000107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.000129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.000152]  kthread+0x337/0x6f0
[   16.000170]  ? trace_preempt_on+0x20/0xc0
[   16.000194]  ? __pfx_kthread+0x10/0x10
[   16.000213]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.000234]  ? calculate_sigpending+0x7b/0xa0
[   16.000256]  ? __pfx_kthread+0x10/0x10
[   16.000275]  ret_from_fork+0x41/0x80
[   16.000298]  ? __pfx_kthread+0x10/0x10
[   16.000335]  ret_from_fork_asm+0x1a/0x30
[   16.000368]  </TASK>
[   16.000379] 
[   16.011221] Allocated by task 284:
[   16.011405]  kasan_save_stack+0x45/0x70
[   16.012016]  kasan_save_track+0x18/0x40
[   16.012279]  kasan_save_alloc_info+0x3b/0x50
[   16.012660]  __kasan_kmalloc+0xb7/0xc0
[   16.012852]  __kmalloc_cache_noprof+0x189/0x420
[   16.013056]  kasan_atomics+0x95/0x310
[   16.013217]  kunit_try_run_case+0x1a5/0x480
[   16.013415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.013918]  kthread+0x337/0x6f0
[   16.014082]  ret_from_fork+0x41/0x80
[   16.014249]  ret_from_fork_asm+0x1a/0x30
[   16.014425] 
[   16.014801] The buggy address belongs to the object at ffff888102717100
[   16.014801]  which belongs to the cache kmalloc-64 of size 64
[   16.015474] The buggy address is located 0 bytes to the right of
[   16.015474]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.015849] 
[   16.015923] The buggy address belongs to the physical page:
[   16.016097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.016350] flags: 0x200000000000000(node=0|zone=2)
[   16.016515] page_type: f5(slab)
[   16.016639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.017509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.017886] page dumped because: kasan: bad access detected
[   16.018131] 
[   16.018222] Memory state around the buggy address:
[   16.018441]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.018740]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.019020] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.019292]                                      ^
[   16.020009]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.020657]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.021100] ==================================================================
[   15.416625] ==================================================================
[   15.416976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.417643] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.417923] 
[   15.418012] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.418058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.418072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.418094] Call Trace:
[   15.418111]  <TASK>
[   15.418127]  dump_stack_lvl+0x73/0xb0
[   15.418155]  print_report+0xd1/0x650
[   15.418178]  ? __virt_addr_valid+0x1db/0x2d0
[   15.418200]  ? kasan_atomics_helper+0xde0/0x5450
[   15.418223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.418246]  ? kasan_atomics_helper+0xde0/0x5450
[   15.418270]  kasan_report+0x141/0x180
[   15.418294]  ? kasan_atomics_helper+0xde0/0x5450
[   15.418335]  kasan_check_range+0x10c/0x1c0
[   15.418357]  __kasan_check_write+0x18/0x20
[   15.418378]  kasan_atomics_helper+0xde0/0x5450
[   15.418402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.418447]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.418472]  ? kasan_atomics+0x152/0x310
[   15.418496]  kasan_atomics+0x1dc/0x310
[   15.418516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.418537]  ? trace_hardirqs_on+0x37/0xe0
[   15.418561]  ? __pfx_read_tsc+0x10/0x10
[   15.418582]  ? ktime_get_ts64+0x86/0x230
[   15.418608]  kunit_try_run_case+0x1a5/0x480
[   15.418633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.418659]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.418691]  ? __kthread_parkme+0x82/0x180
[   15.418714]  ? preempt_count_sub+0x50/0x80
[   15.418739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.418764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.418787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.418812]  kthread+0x337/0x6f0
[   15.418831]  ? trace_preempt_on+0x20/0xc0
[   15.418854]  ? __pfx_kthread+0x10/0x10
[   15.418874]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.418896]  ? calculate_sigpending+0x7b/0xa0
[   15.418919]  ? __pfx_kthread+0x10/0x10
[   15.418939]  ret_from_fork+0x41/0x80
[   15.418961]  ? __pfx_kthread+0x10/0x10
[   15.418981]  ret_from_fork_asm+0x1a/0x30
[   15.419013]  </TASK>
[   15.419025] 
[   15.426389] Allocated by task 284:
[   15.426541]  kasan_save_stack+0x45/0x70
[   15.426694]  kasan_save_track+0x18/0x40
[   15.426834]  kasan_save_alloc_info+0x3b/0x50
[   15.426982]  __kasan_kmalloc+0xb7/0xc0
[   15.427118]  __kmalloc_cache_noprof+0x189/0x420
[   15.427317]  kasan_atomics+0x95/0x310
[   15.427527]  kunit_try_run_case+0x1a5/0x480
[   15.427739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427992]  kthread+0x337/0x6f0
[   15.428159]  ret_from_fork+0x41/0x80
[   15.428355]  ret_from_fork_asm+0x1a/0x30
[   15.428578] 
[   15.428674] The buggy address belongs to the object at ffff888102717100
[   15.428674]  which belongs to the cache kmalloc-64 of size 64
[   15.429197] The buggy address is located 0 bytes to the right of
[   15.429197]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.429736] 
[   15.429817] The buggy address belongs to the physical page:
[   15.429993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.430356] flags: 0x200000000000000(node=0|zone=2)
[   15.430615] page_type: f5(slab)
[   15.430798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.431140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.431490] page dumped because: kasan: bad access detected
[   15.431718] 
[   15.431814] Memory state around the buggy address:
[   15.432015]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432278]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432532] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.432843]                                      ^
[   15.433081]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433408]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433647] ==================================================================
[   15.804004] ==================================================================
[   15.804366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.804748] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.805124] 
[   15.805254] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.805324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.805338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.805360] Call Trace:
[   15.805381]  <TASK>
[   15.805412]  dump_stack_lvl+0x73/0xb0
[   15.805444]  print_report+0xd1/0x650
[   15.805468]  ? __virt_addr_valid+0x1db/0x2d0
[   15.805492]  ? kasan_atomics_helper+0x164f/0x5450
[   15.805523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.805547]  ? kasan_atomics_helper+0x164f/0x5450
[   15.805572]  kasan_report+0x141/0x180
[   15.805606]  ? kasan_atomics_helper+0x164f/0x5450
[   15.805635]  kasan_check_range+0x10c/0x1c0
[   15.805656]  __kasan_check_write+0x18/0x20
[   15.805676]  kasan_atomics_helper+0x164f/0x5450
[   15.805700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.805725]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.805758]  ? kasan_atomics+0x152/0x310
[   15.805784]  kasan_atomics+0x1dc/0x310
[   15.805804]  ? __pfx_kasan_atomics+0x10/0x10
[   15.805835]  ? trace_hardirqs_on+0x37/0xe0
[   15.805860]  ? __pfx_read_tsc+0x10/0x10
[   15.805882]  ? ktime_get_ts64+0x86/0x230
[   15.805917]  kunit_try_run_case+0x1a5/0x480
[   15.805943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805968]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.806005]  ? __kthread_parkme+0x82/0x180
[   15.806029]  ? preempt_count_sub+0x50/0x80
[   15.806065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.806148]  kthread+0x337/0x6f0
[   15.806166]  ? trace_preempt_on+0x20/0xc0
[   15.806190]  ? __pfx_kthread+0x10/0x10
[   15.806221]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.806243]  ? calculate_sigpending+0x7b/0xa0
[   15.806266]  ? __pfx_kthread+0x10/0x10
[   15.806296]  ret_from_fork+0x41/0x80
[   15.806326]  ? __pfx_kthread+0x10/0x10
[   15.806344]  ret_from_fork_asm+0x1a/0x30
[   15.806389]  </TASK>
[   15.806403] 
[   15.814105] Allocated by task 284:
[   15.814434]  kasan_save_stack+0x45/0x70
[   15.814871]  kasan_save_track+0x18/0x40
[   15.815018]  kasan_save_alloc_info+0x3b/0x50
[   15.815168]  __kasan_kmalloc+0xb7/0xc0
[   15.815312]  __kmalloc_cache_noprof+0x189/0x420
[   15.815547]  kasan_atomics+0x95/0x310
[   15.815737]  kunit_try_run_case+0x1a5/0x480
[   15.815954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.816219]  kthread+0x337/0x6f0
[   15.816408]  ret_from_fork+0x41/0x80
[   15.816589]  ret_from_fork_asm+0x1a/0x30
[   15.816780] 
[   15.816855] The buggy address belongs to the object at ffff888102717100
[   15.816855]  which belongs to the cache kmalloc-64 of size 64
[   15.817285] The buggy address is located 0 bytes to the right of
[   15.817285]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.818220] 
[   15.818298] The buggy address belongs to the physical page:
[   15.818578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.818964] flags: 0x200000000000000(node=0|zone=2)
[   15.819165] page_type: f5(slab)
[   15.819292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.819815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.820088] page dumped because: kasan: bad access detected
[   15.820362] 
[   15.820469] Memory state around the buggy address:
[   15.820700]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.820977]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.821286] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.821669]                                      ^
[   15.821890]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.822187]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.822543] ==================================================================
[   15.148784] ==================================================================
[   15.149218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.149586] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.149900] 
[   15.150017] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.150065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.150101] Call Trace:
[   15.150114]  <TASK>
[   15.150128]  dump_stack_lvl+0x73/0xb0
[   15.150156]  print_report+0xd1/0x650
[   15.150179]  ? __virt_addr_valid+0x1db/0x2d0
[   15.150201]  ? kasan_atomics_helper+0x565/0x5450
[   15.150224]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.150248]  ? kasan_atomics_helper+0x565/0x5450
[   15.150272]  kasan_report+0x141/0x180
[   15.150296]  ? kasan_atomics_helper+0x565/0x5450
[   15.150336]  kasan_check_range+0x10c/0x1c0
[   15.150359]  __kasan_check_write+0x18/0x20
[   15.150380]  kasan_atomics_helper+0x565/0x5450
[   15.150405]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.150429]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.150532]  ? kasan_atomics+0x152/0x310
[   15.150577]  kasan_atomics+0x1dc/0x310
[   15.150598]  ? __pfx_kasan_atomics+0x10/0x10
[   15.150619]  ? trace_hardirqs_on+0x37/0xe0
[   15.150642]  ? __pfx_read_tsc+0x10/0x10
[   15.150662]  ? ktime_get_ts64+0x86/0x230
[   15.150693]  kunit_try_run_case+0x1a5/0x480
[   15.150717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150742]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.150767]  ? __kthread_parkme+0x82/0x180
[   15.150790]  ? preempt_count_sub+0x50/0x80
[   15.150816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.150916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.150943]  kthread+0x337/0x6f0
[   15.150962]  ? trace_preempt_on+0x20/0xc0
[   15.150985]  ? __pfx_kthread+0x10/0x10
[   15.151025]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.151048]  ? calculate_sigpending+0x7b/0xa0
[   15.151070]  ? __pfx_kthread+0x10/0x10
[   15.151089]  ret_from_fork+0x41/0x80
[   15.151127]  ? __pfx_kthread+0x10/0x10
[   15.151146]  ret_from_fork_asm+0x1a/0x30
[   15.151179]  </TASK>
[   15.151192] 
[   15.160417] Allocated by task 284:
[   15.160608]  kasan_save_stack+0x45/0x70
[   15.160817]  kasan_save_track+0x18/0x40
[   15.161039]  kasan_save_alloc_info+0x3b/0x50
[   15.161198]  __kasan_kmalloc+0xb7/0xc0
[   15.161407]  __kmalloc_cache_noprof+0x189/0x420
[   15.161634]  kasan_atomics+0x95/0x310
[   15.161842]  kunit_try_run_case+0x1a5/0x480
[   15.162062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.162281]  kthread+0x337/0x6f0
[   15.162465]  ret_from_fork+0x41/0x80
[   15.162697]  ret_from_fork_asm+0x1a/0x30
[   15.162953] 
[   15.163040] The buggy address belongs to the object at ffff888102717100
[   15.163040]  which belongs to the cache kmalloc-64 of size 64
[   15.163502] The buggy address is located 0 bytes to the right of
[   15.163502]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.163870] 
[   15.163945] The buggy address belongs to the physical page:
[   15.164487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.164864] flags: 0x200000000000000(node=0|zone=2)
[   15.165368] page_type: f5(slab)
[   15.165619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.165871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.166257] page dumped because: kasan: bad access detected
[   15.166519] 
[   15.166617] Memory state around the buggy address:
[   15.166811]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.167186]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.167435] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.167770]                                      ^
[   15.168069]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.168321]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.168537] ==================================================================
[   15.823248] ==================================================================
[   15.823733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.823978] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.824342] 
[   15.824492] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.824543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.824556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.824580] Call Trace:
[   15.824601]  <TASK>
[   15.824620]  dump_stack_lvl+0x73/0xb0
[   15.824653]  print_report+0xd1/0x650
[   15.824678]  ? __virt_addr_valid+0x1db/0x2d0
[   15.824701]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.824724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.824747]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.824771]  kasan_report+0x141/0x180
[   15.824794]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.824823]  kasan_check_range+0x10c/0x1c0
[   15.824844]  __kasan_check_write+0x18/0x20
[   15.824876]  kasan_atomics_helper+0x16e7/0x5450
[   15.824901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.824924]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.824959]  ? kasan_atomics+0x152/0x310
[   15.824984]  kasan_atomics+0x1dc/0x310
[   15.825003]  ? __pfx_kasan_atomics+0x10/0x10
[   15.825024]  ? trace_hardirqs_on+0x37/0xe0
[   15.825050]  ? __pfx_read_tsc+0x10/0x10
[   15.825070]  ? ktime_get_ts64+0x86/0x230
[   15.825097]  kunit_try_run_case+0x1a5/0x480
[   15.825122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.825147]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.825174]  ? __kthread_parkme+0x82/0x180
[   15.825198]  ? preempt_count_sub+0x50/0x80
[   15.825224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.825249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.825272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.825296]  kthread+0x337/0x6f0
[   15.825324]  ? trace_preempt_on+0x20/0xc0
[   15.825347]  ? __pfx_kthread+0x10/0x10
[   15.825367]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.825388]  ? calculate_sigpending+0x7b/0xa0
[   15.825411]  ? __pfx_kthread+0x10/0x10
[   15.825431]  ret_from_fork+0x41/0x80
[   15.825452]  ? __pfx_kthread+0x10/0x10
[   15.825471]  ret_from_fork_asm+0x1a/0x30
[   15.825504]  </TASK>
[   15.825517] 
[   15.833008] Allocated by task 284:
[   15.833219]  kasan_save_stack+0x45/0x70
[   15.833452]  kasan_save_track+0x18/0x40
[   15.833684]  kasan_save_alloc_info+0x3b/0x50
[   15.833899]  __kasan_kmalloc+0xb7/0xc0
[   15.834115]  __kmalloc_cache_noprof+0x189/0x420
[   15.834319]  kasan_atomics+0x95/0x310
[   15.834516]  kunit_try_run_case+0x1a5/0x480
[   15.834731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834971]  kthread+0x337/0x6f0
[   15.835152]  ret_from_fork+0x41/0x80
[   15.835338]  ret_from_fork_asm+0x1a/0x30
[   15.835567] 
[   15.835651] The buggy address belongs to the object at ffff888102717100
[   15.835651]  which belongs to the cache kmalloc-64 of size 64
[   15.836130] The buggy address is located 0 bytes to the right of
[   15.836130]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.836736] 
[   15.836815] The buggy address belongs to the physical page:
[   15.837056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.837377] flags: 0x200000000000000(node=0|zone=2)
[   15.837753] page_type: f5(slab)
[   15.837957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.838634] page dumped because: kasan: bad access detected
[   15.838896] 
[   15.838969] Memory state around the buggy address:
[   15.839125]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839354]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839644] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.840011]                                      ^
[   15.840274]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840725]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840962] ==================================================================
[   15.619492] ==================================================================
[   15.619901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.620254] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.620805] 
[   15.620943] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.620990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.621004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.621025] Call Trace:
[   15.621044]  <TASK>
[   15.621063]  dump_stack_lvl+0x73/0xb0
[   15.621092]  print_report+0xd1/0x650
[   15.621116]  ? __virt_addr_valid+0x1db/0x2d0
[   15.621137]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.621160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.621183]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.621206]  kasan_report+0x141/0x180
[   15.621229]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.621258]  __asan_report_load4_noabort+0x18/0x20
[   15.621280]  kasan_atomics_helper+0x49e8/0x5450
[   15.621315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.621338]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.621361]  ? kasan_atomics+0x152/0x310
[   15.621385]  kasan_atomics+0x1dc/0x310
[   15.621405]  ? __pfx_kasan_atomics+0x10/0x10
[   15.621424]  ? trace_hardirqs_on+0x37/0xe0
[   15.621448]  ? __pfx_read_tsc+0x10/0x10
[   15.621468]  ? ktime_get_ts64+0x86/0x230
[   15.621495]  kunit_try_run_case+0x1a5/0x480
[   15.621520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.621545]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.621570]  ? __kthread_parkme+0x82/0x180
[   15.621592]  ? preempt_count_sub+0x50/0x80
[   15.621617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.621642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.621665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.621689]  kthread+0x337/0x6f0
[   15.621708]  ? trace_preempt_on+0x20/0xc0
[   15.621731]  ? __pfx_kthread+0x10/0x10
[   15.621751]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.621772]  ? calculate_sigpending+0x7b/0xa0
[   15.621794]  ? __pfx_kthread+0x10/0x10
[   15.621814]  ret_from_fork+0x41/0x80
[   15.621835]  ? __pfx_kthread+0x10/0x10
[   15.621854]  ret_from_fork_asm+0x1a/0x30
[   15.621886]  </TASK>
[   15.621897] 
[   15.629542] Allocated by task 284:
[   15.629740]  kasan_save_stack+0x45/0x70
[   15.629897]  kasan_save_track+0x18/0x40
[   15.630112]  kasan_save_alloc_info+0x3b/0x50
[   15.630260]  __kasan_kmalloc+0xb7/0xc0
[   15.631223]  __kmalloc_cache_noprof+0x189/0x420
[   15.631993]  kasan_atomics+0x95/0x310
[   15.632382]  kunit_try_run_case+0x1a5/0x480
[   15.633141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.634045]  kthread+0x337/0x6f0
[   15.634459]  ret_from_fork+0x41/0x80
[   15.634870]  ret_from_fork_asm+0x1a/0x30
[   15.635021] 
[   15.635096] The buggy address belongs to the object at ffff888102717100
[   15.635096]  which belongs to the cache kmalloc-64 of size 64
[   15.635729] The buggy address is located 0 bytes to the right of
[   15.635729]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.637234] 
[   15.637595] The buggy address belongs to the physical page:
[   15.638230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.639310] flags: 0x200000000000000(node=0|zone=2)
[   15.639787] page_type: f5(slab)
[   15.640159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.640404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.641412] page dumped because: kasan: bad access detected
[   15.642057] 
[   15.642445] Memory state around the buggy address:
[   15.642916]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643137]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643360] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.643711]                                      ^
[   15.644154]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.644883]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.645567] ==================================================================
[   15.897842] ==================================================================
[   15.898121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.898372] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.899055] 
[   15.899182] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.899240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.899254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.899276] Call Trace:
[   15.899290]  <TASK>
[   15.899320]  dump_stack_lvl+0x73/0xb0
[   15.899348]  print_report+0xd1/0x650
[   15.899371]  ? __virt_addr_valid+0x1db/0x2d0
[   15.899393]  ? kasan_atomics_helper+0x194a/0x5450
[   15.899416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.899440]  ? kasan_atomics_helper+0x194a/0x5450
[   15.899464]  kasan_report+0x141/0x180
[   15.899496]  ? kasan_atomics_helper+0x194a/0x5450
[   15.899524]  kasan_check_range+0x10c/0x1c0
[   15.899545]  __kasan_check_write+0x18/0x20
[   15.899576]  kasan_atomics_helper+0x194a/0x5450
[   15.899600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.899623]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.899646]  ? kasan_atomics+0x152/0x310
[   15.899678]  kasan_atomics+0x1dc/0x310
[   15.899698]  ? __pfx_kasan_atomics+0x10/0x10
[   15.899718]  ? trace_hardirqs_on+0x37/0xe0
[   15.899752]  ? __pfx_read_tsc+0x10/0x10
[   15.899772]  ? ktime_get_ts64+0x86/0x230
[   15.899797]  kunit_try_run_case+0x1a5/0x480
[   15.899829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.899854]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.899880]  ? __kthread_parkme+0x82/0x180
[   15.899913]  ? preempt_count_sub+0x50/0x80
[   15.899939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.899962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.899995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.900019]  kthread+0x337/0x6f0
[   15.900037]  ? trace_preempt_on+0x20/0xc0
[   15.900071]  ? __pfx_kthread+0x10/0x10
[   15.900091]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.900113]  ? calculate_sigpending+0x7b/0xa0
[   15.900143]  ? __pfx_kthread+0x10/0x10
[   15.900162]  ret_from_fork+0x41/0x80
[   15.900184]  ? __pfx_kthread+0x10/0x10
[   15.900212]  ret_from_fork_asm+0x1a/0x30
[   15.900245]  </TASK>
[   15.900258] 
[   15.908056] Allocated by task 284:
[   15.908184]  kasan_save_stack+0x45/0x70
[   15.908345]  kasan_save_track+0x18/0x40
[   15.908536]  kasan_save_alloc_info+0x3b/0x50
[   15.908762]  __kasan_kmalloc+0xb7/0xc0
[   15.908955]  __kmalloc_cache_noprof+0x189/0x420
[   15.909182]  kasan_atomics+0x95/0x310
[   15.909380]  kunit_try_run_case+0x1a5/0x480
[   15.909703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.909880]  kthread+0x337/0x6f0
[   15.910000]  ret_from_fork+0x41/0x80
[   15.910133]  ret_from_fork_asm+0x1a/0x30
[   15.910335] 
[   15.910426] The buggy address belongs to the object at ffff888102717100
[   15.910426]  which belongs to the cache kmalloc-64 of size 64
[   15.910894] The buggy address is located 0 bytes to the right of
[   15.910894]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.912334] 
[   15.912444] The buggy address belongs to the physical page:
[   15.912681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.912980] flags: 0x200000000000000(node=0|zone=2)
[   15.913185] page_type: f5(slab)
[   15.913343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.914436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.915094] page dumped because: kasan: bad access detected
[   15.915561] 
[   15.915799] Memory state around the buggy address:
[   15.916233]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.916761]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.917289] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.917941]                                      ^
[   15.918233]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.918672]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919163] ==================================================================
[   15.765767] ==================================================================
[   15.766358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.766804] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.767103] 
[   15.767189] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.767235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.767249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.767270] Call Trace:
[   15.767285]  <TASK>
[   15.767300]  dump_stack_lvl+0x73/0xb0
[   15.767341]  print_report+0xd1/0x650
[   15.767365]  ? __virt_addr_valid+0x1db/0x2d0
[   15.767387]  ? kasan_atomics_helper+0x151d/0x5450
[   15.767409]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.767433]  ? kasan_atomics_helper+0x151d/0x5450
[   15.767456]  kasan_report+0x141/0x180
[   15.767480]  ? kasan_atomics_helper+0x151d/0x5450
[   15.767508]  kasan_check_range+0x10c/0x1c0
[   15.767529]  __kasan_check_write+0x18/0x20
[   15.767550]  kasan_atomics_helper+0x151d/0x5450
[   15.767574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.767599]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.767622]  ? kasan_atomics+0x152/0x310
[   15.767646]  kasan_atomics+0x1dc/0x310
[   15.767666]  ? __pfx_kasan_atomics+0x10/0x10
[   15.767686]  ? trace_hardirqs_on+0x37/0xe0
[   15.767710]  ? __pfx_read_tsc+0x10/0x10
[   15.767741]  ? ktime_get_ts64+0x86/0x230
[   15.767767]  kunit_try_run_case+0x1a5/0x480
[   15.767792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.767828]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.767853]  ? __kthread_parkme+0x82/0x180
[   15.767876]  ? preempt_count_sub+0x50/0x80
[   15.767902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.767926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.767950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.767974]  kthread+0x337/0x6f0
[   15.767992]  ? trace_preempt_on+0x20/0xc0
[   15.768017]  ? __pfx_kthread+0x10/0x10
[   15.768036]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.768067]  ? calculate_sigpending+0x7b/0xa0
[   15.768092]  ? __pfx_kthread+0x10/0x10
[   15.768113]  ret_from_fork+0x41/0x80
[   15.768146]  ? __pfx_kthread+0x10/0x10
[   15.768166]  ret_from_fork_asm+0x1a/0x30
[   15.768200]  </TASK>
[   15.768214] 
[   15.776736] Allocated by task 284:
[   15.776918]  kasan_save_stack+0x45/0x70
[   15.777118]  kasan_save_track+0x18/0x40
[   15.777297]  kasan_save_alloc_info+0x3b/0x50
[   15.777584]  __kasan_kmalloc+0xb7/0xc0
[   15.777776]  __kmalloc_cache_noprof+0x189/0x420
[   15.778005]  kasan_atomics+0x95/0x310
[   15.778198]  kunit_try_run_case+0x1a5/0x480
[   15.778416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778681]  kthread+0x337/0x6f0
[   15.778837]  ret_from_fork+0x41/0x80
[   15.779033]  ret_from_fork_asm+0x1a/0x30
[   15.779228] 
[   15.779330] The buggy address belongs to the object at ffff888102717100
[   15.779330]  which belongs to the cache kmalloc-64 of size 64
[   15.779781] The buggy address is located 0 bytes to the right of
[   15.779781]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.780328] 
[   15.780401] The buggy address belongs to the physical page:
[   15.780652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.781015] flags: 0x200000000000000(node=0|zone=2)
[   15.781248] page_type: f5(slab)
[   15.781381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.781964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.782248] page dumped because: kasan: bad access detected
[   15.782431] 
[   15.782502] Memory state around the buggy address:
[   15.782732]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.783081]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.783333] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.783550]                                      ^
[   15.783714]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784096]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784450] ==================================================================
[   15.501831] ==================================================================
[   15.502282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.503122] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.503581] 
[   15.503682] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.503740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.503753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.503774] Call Trace:
[   15.503797]  <TASK>
[   15.503813]  dump_stack_lvl+0x73/0xb0
[   15.503841]  print_report+0xd1/0x650
[   15.503873]  ? __virt_addr_valid+0x1db/0x2d0
[   15.503895]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.503917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.503952]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.503974]  kasan_report+0x141/0x180
[   15.503997]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.504025]  __asan_report_load4_noabort+0x18/0x20
[   15.504047]  kasan_atomics_helper+0x4a36/0x5450
[   15.504070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.504095]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.504117]  ? kasan_atomics+0x152/0x310
[   15.504141]  kasan_atomics+0x1dc/0x310
[   15.504171]  ? __pfx_kasan_atomics+0x10/0x10
[   15.504190]  ? trace_hardirqs_on+0x37/0xe0
[   15.504213]  ? __pfx_read_tsc+0x10/0x10
[   15.504234]  ? ktime_get_ts64+0x86/0x230
[   15.504271]  kunit_try_run_case+0x1a5/0x480
[   15.504296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.504329]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.504362]  ? __kthread_parkme+0x82/0x180
[   15.504385]  ? preempt_count_sub+0x50/0x80
[   15.504411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.504445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.504468]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.504492]  kthread+0x337/0x6f0
[   15.504510]  ? trace_preempt_on+0x20/0xc0
[   15.504533]  ? __pfx_kthread+0x10/0x10
[   15.504552]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.504573]  ? calculate_sigpending+0x7b/0xa0
[   15.504595]  ? __pfx_kthread+0x10/0x10
[   15.504615]  ret_from_fork+0x41/0x80
[   15.504636]  ? __pfx_kthread+0x10/0x10
[   15.504655]  ret_from_fork_asm+0x1a/0x30
[   15.504687]  </TASK>
[   15.504699] 
[   15.516922] Allocated by task 284:
[   15.517106]  kasan_save_stack+0x45/0x70
[   15.517527]  kasan_save_track+0x18/0x40
[   15.517843]  kasan_save_alloc_info+0x3b/0x50
[   15.518464]  __kasan_kmalloc+0xb7/0xc0
[   15.518616]  __kmalloc_cache_noprof+0x189/0x420
[   15.518976]  kasan_atomics+0x95/0x310
[   15.519355]  kunit_try_run_case+0x1a5/0x480
[   15.519811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.520127]  kthread+0x337/0x6f0
[   15.520484]  ret_from_fork+0x41/0x80
[   15.520732]  ret_from_fork_asm+0x1a/0x30
[   15.520876] 
[   15.520949] The buggy address belongs to the object at ffff888102717100
[   15.520949]  which belongs to the cache kmalloc-64 of size 64
[   15.521314] The buggy address is located 0 bytes to the right of
[   15.521314]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.521856] 
[   15.521936] The buggy address belongs to the physical page:
[   15.522168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.522581] flags: 0x200000000000000(node=0|zone=2)
[   15.522791] page_type: f5(slab)
[   15.522969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.523213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.523687] page dumped because: kasan: bad access detected
[   15.523934] 
[   15.524016] Memory state around the buggy address:
[   15.524265]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.524517]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.524948] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.525174]                                      ^
[   15.525409]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.525756]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.526045] ==================================================================
[   16.195793] ==================================================================
[   16.196501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.197379] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.197971] 
[   16.198061] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.198109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.198122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.198145] Call Trace:
[   16.198162]  <TASK>
[   16.198178]  dump_stack_lvl+0x73/0xb0
[   16.198208]  print_report+0xd1/0x650
[   16.198231]  ? __virt_addr_valid+0x1db/0x2d0
[   16.198254]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.198276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.198300]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.198334]  kasan_report+0x141/0x180
[   16.198357]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.198385]  __asan_report_load8_noabort+0x18/0x20
[   16.198407]  kasan_atomics_helper+0x4f98/0x5450
[   16.198478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.198502]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.198525]  ? kasan_atomics+0x152/0x310
[   16.198549]  kasan_atomics+0x1dc/0x310
[   16.198570]  ? __pfx_kasan_atomics+0x10/0x10
[   16.198589]  ? trace_hardirqs_on+0x37/0xe0
[   16.198613]  ? __pfx_read_tsc+0x10/0x10
[   16.198633]  ? ktime_get_ts64+0x86/0x230
[   16.198659]  kunit_try_run_case+0x1a5/0x480
[   16.198691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.198716]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.198743]  ? __kthread_parkme+0x82/0x180
[   16.198766]  ? preempt_count_sub+0x50/0x80
[   16.198793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.198818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.198841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.198865]  kthread+0x337/0x6f0
[   16.198884]  ? trace_preempt_on+0x20/0xc0
[   16.198908]  ? __pfx_kthread+0x10/0x10
[   16.198927]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.198949]  ? calculate_sigpending+0x7b/0xa0
[   16.198972]  ? __pfx_kthread+0x10/0x10
[   16.198992]  ret_from_fork+0x41/0x80
[   16.199014]  ? __pfx_kthread+0x10/0x10
[   16.199034]  ret_from_fork_asm+0x1a/0x30
[   16.199067]  </TASK>
[   16.199079] 
[   16.210977] Allocated by task 284:
[   16.211123]  kasan_save_stack+0x45/0x70
[   16.211273]  kasan_save_track+0x18/0x40
[   16.211423]  kasan_save_alloc_info+0x3b/0x50
[   16.211826]  __kasan_kmalloc+0xb7/0xc0
[   16.212167]  __kmalloc_cache_noprof+0x189/0x420
[   16.212607]  kasan_atomics+0x95/0x310
[   16.212941]  kunit_try_run_case+0x1a5/0x480
[   16.213325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.213814]  kthread+0x337/0x6f0
[   16.214110]  ret_from_fork+0x41/0x80
[   16.214476]  ret_from_fork_asm+0x1a/0x30
[   16.214835] 
[   16.214998] The buggy address belongs to the object at ffff888102717100
[   16.214998]  which belongs to the cache kmalloc-64 of size 64
[   16.216075] The buggy address is located 0 bytes to the right of
[   16.216075]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.216562] 
[   16.216728] The buggy address belongs to the physical page:
[   16.217217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.217927] flags: 0x200000000000000(node=0|zone=2)
[   16.218117] page_type: f5(slab)
[   16.218242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.218614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.219272] page dumped because: kasan: bad access detected
[   16.219778] 
[   16.219938] Memory state around the buggy address:
[   16.220368]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.220819]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.221037] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.221252]                                      ^
[   16.221636]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222251]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222899] ==================================================================
[   16.326977] ==================================================================
[   16.327344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.327714] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.328076] 
[   16.328187] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.328230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.328244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.328264] Call Trace:
[   16.328278]  <TASK>
[   16.328293]  dump_stack_lvl+0x73/0xb0
[   16.328333]  print_report+0xd1/0x650
[   16.328355]  ? __virt_addr_valid+0x1db/0x2d0
[   16.328377]  ? kasan_atomics_helper+0x5115/0x5450
[   16.328399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.328422]  ? kasan_atomics_helper+0x5115/0x5450
[   16.328468]  kasan_report+0x141/0x180
[   16.328492]  ? kasan_atomics_helper+0x5115/0x5450
[   16.328520]  __asan_report_load8_noabort+0x18/0x20
[   16.328542]  kasan_atomics_helper+0x5115/0x5450
[   16.328566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.328589]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.328611]  ? kasan_atomics+0x152/0x310
[   16.328636]  kasan_atomics+0x1dc/0x310
[   16.328656]  ? __pfx_kasan_atomics+0x10/0x10
[   16.328676]  ? trace_hardirqs_on+0x37/0xe0
[   16.328699]  ? __pfx_read_tsc+0x10/0x10
[   16.328718]  ? ktime_get_ts64+0x86/0x230
[   16.328743]  kunit_try_run_case+0x1a5/0x480
[   16.328767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328793]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.328829]  ? __kthread_parkme+0x82/0x180
[   16.328851]  ? preempt_count_sub+0x50/0x80
[   16.328877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.328937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.328960]  kthread+0x337/0x6f0
[   16.328978]  ? trace_preempt_on+0x20/0xc0
[   16.329001]  ? __pfx_kthread+0x10/0x10
[   16.329020]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.329042]  ? calculate_sigpending+0x7b/0xa0
[   16.329065]  ? __pfx_kthread+0x10/0x10
[   16.329085]  ret_from_fork+0x41/0x80
[   16.329106]  ? __pfx_kthread+0x10/0x10
[   16.329125]  ret_from_fork_asm+0x1a/0x30
[   16.329157]  </TASK>
[   16.329169] 
[   16.336587] Allocated by task 284:
[   16.336766]  kasan_save_stack+0x45/0x70
[   16.336974]  kasan_save_track+0x18/0x40
[   16.337191]  kasan_save_alloc_info+0x3b/0x50
[   16.337401]  __kasan_kmalloc+0xb7/0xc0
[   16.337609]  __kmalloc_cache_noprof+0x189/0x420
[   16.337830]  kasan_atomics+0x95/0x310
[   16.338008]  kunit_try_run_case+0x1a5/0x480
[   16.338157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.338382]  kthread+0x337/0x6f0
[   16.338588]  ret_from_fork+0x41/0x80
[   16.338785]  ret_from_fork_asm+0x1a/0x30
[   16.338983] 
[   16.339074] The buggy address belongs to the object at ffff888102717100
[   16.339074]  which belongs to the cache kmalloc-64 of size 64
[   16.339576] The buggy address is located 0 bytes to the right of
[   16.339576]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.340102] 
[   16.340210] The buggy address belongs to the physical page:
[   16.340408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.340667] flags: 0x200000000000000(node=0|zone=2)
[   16.340829] page_type: f5(slab)
[   16.340949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.341335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.341756] page dumped because: kasan: bad access detected
[   16.342026] 
[   16.342115] Memory state around the buggy address:
[   16.342272]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.342525]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.342790] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.343126]                                      ^
[   16.343372]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.343746]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.344063] ==================================================================
[   15.285561] ==================================================================
[   15.286363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.286994] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.287371] 
[   15.287504] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.287554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.287567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.287590] Call Trace:
[   15.287610]  <TASK>
[   15.287628]  dump_stack_lvl+0x73/0xb0
[   15.287656]  print_report+0xd1/0x650
[   15.287679]  ? __virt_addr_valid+0x1db/0x2d0
[   15.287701]  ? kasan_atomics_helper+0x992/0x5450
[   15.287723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.287747]  ? kasan_atomics_helper+0x992/0x5450
[   15.287770]  kasan_report+0x141/0x180
[   15.287793]  ? kasan_atomics_helper+0x992/0x5450
[   15.287820]  kasan_check_range+0x10c/0x1c0
[   15.287841]  __kasan_check_write+0x18/0x20
[   15.287862]  kasan_atomics_helper+0x992/0x5450
[   15.287886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.287908]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.287931]  ? kasan_atomics+0x152/0x310
[   15.287955]  kasan_atomics+0x1dc/0x310
[   15.287975]  ? __pfx_kasan_atomics+0x10/0x10
[   15.287995]  ? trace_hardirqs_on+0x37/0xe0
[   15.288019]  ? __pfx_read_tsc+0x10/0x10
[   15.288039]  ? ktime_get_ts64+0x86/0x230
[   15.288065]  kunit_try_run_case+0x1a5/0x480
[   15.288090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.288115]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.288140]  ? __kthread_parkme+0x82/0x180
[   15.288162]  ? preempt_count_sub+0x50/0x80
[   15.288188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.288212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.288235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.288260]  kthread+0x337/0x6f0
[   15.288277]  ? trace_preempt_on+0x20/0xc0
[   15.288331]  ? __pfx_kthread+0x10/0x10
[   15.288353]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.288376]  ? calculate_sigpending+0x7b/0xa0
[   15.288398]  ? __pfx_kthread+0x10/0x10
[   15.288418]  ret_from_fork+0x41/0x80
[   15.288460]  ? __pfx_kthread+0x10/0x10
[   15.288479]  ret_from_fork_asm+0x1a/0x30
[   15.288512]  </TASK>
[   15.288525] 
[   15.297552] Allocated by task 284:
[   15.297739]  kasan_save_stack+0x45/0x70
[   15.297943]  kasan_save_track+0x18/0x40
[   15.298136]  kasan_save_alloc_info+0x3b/0x50
[   15.298320]  __kasan_kmalloc+0xb7/0xc0
[   15.298482]  __kmalloc_cache_noprof+0x189/0x420
[   15.298711]  kasan_atomics+0x95/0x310
[   15.298920]  kunit_try_run_case+0x1a5/0x480
[   15.299154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.299410]  kthread+0x337/0x6f0
[   15.299603]  ret_from_fork+0x41/0x80
[   15.299783]  ret_from_fork_asm+0x1a/0x30
[   15.299961] 
[   15.300077] The buggy address belongs to the object at ffff888102717100
[   15.300077]  which belongs to the cache kmalloc-64 of size 64
[   15.300585] The buggy address is located 0 bytes to the right of
[   15.300585]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.301127] 
[   15.301215] The buggy address belongs to the physical page:
[   15.301484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.301849] flags: 0x200000000000000(node=0|zone=2)
[   15.302082] page_type: f5(slab)
[   15.302276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.302643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.302967] page dumped because: kasan: bad access detected
[   15.303205] 
[   15.303291] Memory state around the buggy address:
[   15.303564]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.303889]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.304145] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.304522]                                      ^
[   15.304756]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.305066]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.305467] ==================================================================
[   16.291769] ==================================================================
[   16.292176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.292529] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.292871] 
[   16.292988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.293032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.293045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.293067] Call Trace:
[   16.293085]  <TASK>
[   16.293101]  dump_stack_lvl+0x73/0xb0
[   16.293139]  print_report+0xd1/0x650
[   16.293163]  ? __virt_addr_valid+0x1db/0x2d0
[   16.293184]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.293217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.293240]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.293263]  kasan_report+0x141/0x180
[   16.293294]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.293336]  __asan_report_load8_noabort+0x18/0x20
[   16.293359]  kasan_atomics_helper+0x4fa5/0x5450
[   16.293383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.293406]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.293446]  ? kasan_atomics+0x152/0x310
[   16.293470]  kasan_atomics+0x1dc/0x310
[   16.293490]  ? __pfx_kasan_atomics+0x10/0x10
[   16.293510]  ? trace_hardirqs_on+0x37/0xe0
[   16.293534]  ? __pfx_read_tsc+0x10/0x10
[   16.293554]  ? ktime_get_ts64+0x86/0x230
[   16.293580]  kunit_try_run_case+0x1a5/0x480
[   16.293604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.293629]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.293654]  ? __kthread_parkme+0x82/0x180
[   16.293676]  ? preempt_count_sub+0x50/0x80
[   16.293702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.293726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.293749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.293773]  kthread+0x337/0x6f0
[   16.293791]  ? trace_preempt_on+0x20/0xc0
[   16.293815]  ? __pfx_kthread+0x10/0x10
[   16.293834]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.293856]  ? calculate_sigpending+0x7b/0xa0
[   16.293887]  ? __pfx_kthread+0x10/0x10
[   16.293907]  ret_from_fork+0x41/0x80
[   16.293928]  ? __pfx_kthread+0x10/0x10
[   16.293958]  ret_from_fork_asm+0x1a/0x30
[   16.293990]  </TASK>
[   16.294002] 
[   16.301407] Allocated by task 284:
[   16.301616]  kasan_save_stack+0x45/0x70
[   16.301795]  kasan_save_track+0x18/0x40
[   16.301935]  kasan_save_alloc_info+0x3b/0x50
[   16.302083]  __kasan_kmalloc+0xb7/0xc0
[   16.302245]  __kmalloc_cache_noprof+0x189/0x420
[   16.302508]  kasan_atomics+0x95/0x310
[   16.302697]  kunit_try_run_case+0x1a5/0x480
[   16.302905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.303159]  kthread+0x337/0x6f0
[   16.303329]  ret_from_fork+0x41/0x80
[   16.303489]  ret_from_fork_asm+0x1a/0x30
[   16.303696] 
[   16.303793] The buggy address belongs to the object at ffff888102717100
[   16.303793]  which belongs to the cache kmalloc-64 of size 64
[   16.304227] The buggy address is located 0 bytes to the right of
[   16.304227]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.304628] 
[   16.304728] The buggy address belongs to the physical page:
[   16.305009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.305369] flags: 0x200000000000000(node=0|zone=2)
[   16.305628] page_type: f5(slab)
[   16.305797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.306079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.306317] page dumped because: kasan: bad access detected
[   16.306594] 
[   16.306721] Memory state around the buggy address:
[   16.306977]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.307299]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.307599] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.307936]                                      ^
[   16.308142]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.308506]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.308822] ==================================================================
[   15.669070] ==================================================================
[   15.669466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.669835] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.670385] 
[   15.670477] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.670525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.670538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.670560] Call Trace:
[   15.670574]  <TASK>
[   15.670590]  dump_stack_lvl+0x73/0xb0
[   15.670617]  print_report+0xd1/0x650
[   15.670640]  ? __virt_addr_valid+0x1db/0x2d0
[   15.670661]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.670690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.670713]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.670737]  kasan_report+0x141/0x180
[   15.670760]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.670787]  __asan_report_load4_noabort+0x18/0x20
[   15.670809]  kasan_atomics_helper+0x49ce/0x5450
[   15.670832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.670856]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.670878]  ? kasan_atomics+0x152/0x310
[   15.670902]  kasan_atomics+0x1dc/0x310
[   15.670922]  ? __pfx_kasan_atomics+0x10/0x10
[   15.670941]  ? trace_hardirqs_on+0x37/0xe0
[   15.670965]  ? __pfx_read_tsc+0x10/0x10
[   15.670984]  ? ktime_get_ts64+0x86/0x230
[   15.671010]  kunit_try_run_case+0x1a5/0x480
[   15.671034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.671058]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.671083]  ? __kthread_parkme+0x82/0x180
[   15.671105]  ? preempt_count_sub+0x50/0x80
[   15.671130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.671155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.671178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.671201]  kthread+0x337/0x6f0
[   15.671219]  ? trace_preempt_on+0x20/0xc0
[   15.671242]  ? __pfx_kthread+0x10/0x10
[   15.671261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.671282]  ? calculate_sigpending+0x7b/0xa0
[   15.671314]  ? __pfx_kthread+0x10/0x10
[   15.671335]  ret_from_fork+0x41/0x80
[   15.671356]  ? __pfx_kthread+0x10/0x10
[   15.671376]  ret_from_fork_asm+0x1a/0x30
[   15.671407]  </TASK>
[   15.671420] 
[   15.679431] Allocated by task 284:
[   15.679630]  kasan_save_stack+0x45/0x70
[   15.679872]  kasan_save_track+0x18/0x40
[   15.680144]  kasan_save_alloc_info+0x3b/0x50
[   15.680386]  __kasan_kmalloc+0xb7/0xc0
[   15.680589]  __kmalloc_cache_noprof+0x189/0x420
[   15.680741]  kasan_atomics+0x95/0x310
[   15.680870]  kunit_try_run_case+0x1a5/0x480
[   15.681030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.681298]  kthread+0x337/0x6f0
[   15.681493]  ret_from_fork+0x41/0x80
[   15.681880]  ret_from_fork_asm+0x1a/0x30
[   15.682098] 
[   15.682230] The buggy address belongs to the object at ffff888102717100
[   15.682230]  which belongs to the cache kmalloc-64 of size 64
[   15.682750] The buggy address is located 0 bytes to the right of
[   15.682750]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.683373] 
[   15.683452] The buggy address belongs to the physical page:
[   15.683816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.684204] flags: 0x200000000000000(node=0|zone=2)
[   15.684431] page_type: f5(slab)
[   15.684618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.684965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.685288] page dumped because: kasan: bad access detected
[   15.685597] 
[   15.685682] Memory state around the buggy address:
[   15.685843]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686181]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.686491] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.686863]                                      ^
[   15.687021]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687239]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687573] ==================================================================
[   15.014079] ==================================================================
[   15.014336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.014699] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.015249] 
[   15.015369] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.015413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.015425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.015446] Call Trace:
[   15.015460]  <TASK>
[   15.015474]  dump_stack_lvl+0x73/0xb0
[   15.015501]  print_report+0xd1/0x650
[   15.015522]  ? __virt_addr_valid+0x1db/0x2d0
[   15.015543]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.015564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.015587]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.015608]  kasan_report+0x141/0x180
[   15.015631]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.015658]  __asan_report_load4_noabort+0x18/0x20
[   15.015678]  kasan_atomics_helper+0x4b88/0x5450
[   15.015701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.015724]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.015745]  ? kasan_atomics+0x152/0x310
[   15.015769]  kasan_atomics+0x1dc/0x310
[   15.015787]  ? __pfx_kasan_atomics+0x10/0x10
[   15.015806]  ? trace_hardirqs_on+0x37/0xe0
[   15.015829]  ? __pfx_read_tsc+0x10/0x10
[   15.015848]  ? ktime_get_ts64+0x86/0x230
[   15.015873]  kunit_try_run_case+0x1a5/0x480
[   15.015898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015922]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.015947]  ? __kthread_parkme+0x82/0x180
[   15.015969]  ? preempt_count_sub+0x50/0x80
[   15.015993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.016016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.016061]  kthread+0x337/0x6f0
[   15.016078]  ? trace_preempt_on+0x20/0xc0
[   15.016101]  ? __pfx_kthread+0x10/0x10
[   15.016118]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.016139]  ? calculate_sigpending+0x7b/0xa0
[   15.016161]  ? __pfx_kthread+0x10/0x10
[   15.016180]  ret_from_fork+0x41/0x80
[   15.016200]  ? __pfx_kthread+0x10/0x10
[   15.016218]  ret_from_fork_asm+0x1a/0x30
[   15.016249]  </TASK>
[   15.016260] 
[   15.024561] Allocated by task 284:
[   15.024717]  kasan_save_stack+0x45/0x70
[   15.024885]  kasan_save_track+0x18/0x40
[   15.025023]  kasan_save_alloc_info+0x3b/0x50
[   15.025171]  __kasan_kmalloc+0xb7/0xc0
[   15.025320]  __kmalloc_cache_noprof+0x189/0x420
[   15.025474]  kasan_atomics+0x95/0x310
[   15.025744]  kunit_try_run_case+0x1a5/0x480
[   15.025966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026227]  kthread+0x337/0x6f0
[   15.026428]  ret_from_fork+0x41/0x80
[   15.026844]  ret_from_fork_asm+0x1a/0x30
[   15.027032] 
[   15.027107] The buggy address belongs to the object at ffff888102717100
[   15.027107]  which belongs to the cache kmalloc-64 of size 64
[   15.027479] The buggy address is located 0 bytes to the right of
[   15.027479]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.028281] 
[   15.028393] The buggy address belongs to the physical page:
[   15.029102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.029489] flags: 0x200000000000000(node=0|zone=2)
[   15.029691] page_type: f5(slab)
[   15.029846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.030233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.030480] page dumped because: kasan: bad access detected
[   15.030656] 
[   15.030736] Memory state around the buggy address:
[   15.030988]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031338]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031800] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.032281]                                      ^
[   15.032659]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032990]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.033486] ==================================================================
[   15.105131] ==================================================================
[   15.105712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.106142] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.106525] 
[   15.106615] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.106661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.106681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.106703] Call Trace:
[   15.106716]  <TASK>
[   15.106731]  dump_stack_lvl+0x73/0xb0
[   15.106784]  print_report+0xd1/0x650
[   15.106807]  ? __virt_addr_valid+0x1db/0x2d0
[   15.106846]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.106869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.106905]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.106940]  kasan_report+0x141/0x180
[   15.106964]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.106992]  kasan_check_range+0x10c/0x1c0
[   15.107013]  __kasan_check_write+0x18/0x20
[   15.107037]  kasan_atomics_helper+0x4a0/0x5450
[   15.107061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.107084]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.107107]  ? kasan_atomics+0x152/0x310
[   15.107131]  kasan_atomics+0x1dc/0x310
[   15.107152]  ? __pfx_kasan_atomics+0x10/0x10
[   15.107172]  ? trace_hardirqs_on+0x37/0xe0
[   15.107196]  ? __pfx_read_tsc+0x10/0x10
[   15.107215]  ? ktime_get_ts64+0x86/0x230
[   15.107242]  kunit_try_run_case+0x1a5/0x480
[   15.107340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107385]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.107424]  ? __kthread_parkme+0x82/0x180
[   15.107460]  ? preempt_count_sub+0x50/0x80
[   15.107486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.107586]  kthread+0x337/0x6f0
[   15.107603]  ? trace_preempt_on+0x20/0xc0
[   15.107627]  ? __pfx_kthread+0x10/0x10
[   15.107647]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.107668]  ? calculate_sigpending+0x7b/0xa0
[   15.107692]  ? __pfx_kthread+0x10/0x10
[   15.107720]  ret_from_fork+0x41/0x80
[   15.107741]  ? __pfx_kthread+0x10/0x10
[   15.107760]  ret_from_fork_asm+0x1a/0x30
[   15.107793]  </TASK>
[   15.107805] 
[   15.116928] Allocated by task 284:
[   15.117245]  kasan_save_stack+0x45/0x70
[   15.117535]  kasan_save_track+0x18/0x40
[   15.117694]  kasan_save_alloc_info+0x3b/0x50
[   15.117845]  __kasan_kmalloc+0xb7/0xc0
[   15.118288]  __kmalloc_cache_noprof+0x189/0x420
[   15.118597]  kasan_atomics+0x95/0x310
[   15.118800]  kunit_try_run_case+0x1a5/0x480
[   15.119056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119336]  kthread+0x337/0x6f0
[   15.119460]  ret_from_fork+0x41/0x80
[   15.119644]  ret_from_fork_asm+0x1a/0x30
[   15.119841] 
[   15.119976] The buggy address belongs to the object at ffff888102717100
[   15.119976]  which belongs to the cache kmalloc-64 of size 64
[   15.120640] The buggy address is located 0 bytes to the right of
[   15.120640]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.121259] 
[   15.121395] The buggy address belongs to the physical page:
[   15.121681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.122058] flags: 0x200000000000000(node=0|zone=2)
[   15.122409] page_type: f5(slab)
[   15.122547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.122790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.123474] page dumped because: kasan: bad access detected
[   15.123748] 
[   15.123870] Memory state around the buggy address:
[   15.124180]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.124538]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.124842] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.125142]                                      ^
[   15.125573]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126035]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126373] ==================================================================
[   15.434451] ==================================================================
[   15.434814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.435183] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.435552] 
[   15.435668] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.435714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.435728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.435749] Call Trace:
[   15.435765]  <TASK>
[   15.435781]  dump_stack_lvl+0x73/0xb0
[   15.435810]  print_report+0xd1/0x650
[   15.435834]  ? __virt_addr_valid+0x1db/0x2d0
[   15.435856]  ? kasan_atomics_helper+0xe78/0x5450
[   15.435879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.435903]  ? kasan_atomics_helper+0xe78/0x5450
[   15.435926]  kasan_report+0x141/0x180
[   15.435950]  ? kasan_atomics_helper+0xe78/0x5450
[   15.435979]  kasan_check_range+0x10c/0x1c0
[   15.436000]  __kasan_check_write+0x18/0x20
[   15.436021]  kasan_atomics_helper+0xe78/0x5450
[   15.436045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.436069]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.436091]  ? kasan_atomics+0x152/0x310
[   15.436116]  kasan_atomics+0x1dc/0x310
[   15.436137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.436157]  ? trace_hardirqs_on+0x37/0xe0
[   15.436181]  ? __pfx_read_tsc+0x10/0x10
[   15.436201]  ? ktime_get_ts64+0x86/0x230
[   15.436228]  kunit_try_run_case+0x1a5/0x480
[   15.436253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.436279]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.436315]  ? __kthread_parkme+0x82/0x180
[   15.436338]  ? preempt_count_sub+0x50/0x80
[   15.436364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.436389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.436412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.436456]  kthread+0x337/0x6f0
[   15.436474]  ? trace_preempt_on+0x20/0xc0
[   15.436498]  ? __pfx_kthread+0x10/0x10
[   15.436518]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.436540]  ? calculate_sigpending+0x7b/0xa0
[   15.436563]  ? __pfx_kthread+0x10/0x10
[   15.436583]  ret_from_fork+0x41/0x80
[   15.436605]  ? __pfx_kthread+0x10/0x10
[   15.436625]  ret_from_fork_asm+0x1a/0x30
[   15.436657]  </TASK>
[   15.436669] 
[   15.445354] Allocated by task 284:
[   15.445797]  kasan_save_stack+0x45/0x70
[   15.446074]  kasan_save_track+0x18/0x40
[   15.446356]  kasan_save_alloc_info+0x3b/0x50
[   15.446630]  __kasan_kmalloc+0xb7/0xc0
[   15.446828]  __kmalloc_cache_noprof+0x189/0x420
[   15.447031]  kasan_atomics+0x95/0x310
[   15.447210]  kunit_try_run_case+0x1a5/0x480
[   15.447408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.447904]  kthread+0x337/0x6f0
[   15.448080]  ret_from_fork+0x41/0x80
[   15.448417]  ret_from_fork_asm+0x1a/0x30
[   15.448727] 
[   15.448889] The buggy address belongs to the object at ffff888102717100
[   15.448889]  which belongs to the cache kmalloc-64 of size 64
[   15.449461] The buggy address is located 0 bytes to the right of
[   15.449461]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.450128] 
[   15.450227] The buggy address belongs to the physical page:
[   15.450661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.451112] flags: 0x200000000000000(node=0|zone=2)
[   15.451359] page_type: f5(slab)
[   15.451661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.452059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.452497] page dumped because: kasan: bad access detected
[   15.452703] 
[   15.452808] Memory state around the buggy address:
[   15.453180]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.453601]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.453995] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.454260]                                      ^
[   15.454635]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455014]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455337] ==================================================================
[   15.188044] ==================================================================
[   15.188384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.188882] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.189224] 
[   15.189345] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.189447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.189462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.189485] Call Trace:
[   15.189501]  <TASK>
[   15.189516]  dump_stack_lvl+0x73/0xb0
[   15.189545]  print_report+0xd1/0x650
[   15.189568]  ? __virt_addr_valid+0x1db/0x2d0
[   15.189591]  ? kasan_atomics_helper+0x697/0x5450
[   15.189613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.189637]  ? kasan_atomics_helper+0x697/0x5450
[   15.189661]  kasan_report+0x141/0x180
[   15.189685]  ? kasan_atomics_helper+0x697/0x5450
[   15.189713]  kasan_check_range+0x10c/0x1c0
[   15.189735]  __kasan_check_write+0x18/0x20
[   15.189756]  kasan_atomics_helper+0x697/0x5450
[   15.189779]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.189802]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.189825]  ? kasan_atomics+0x152/0x310
[   15.189849]  kasan_atomics+0x1dc/0x310
[   15.189869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.189889]  ? trace_hardirqs_on+0x37/0xe0
[   15.189913]  ? __pfx_read_tsc+0x10/0x10
[   15.189932]  ? ktime_get_ts64+0x86/0x230
[   15.189959]  kunit_try_run_case+0x1a5/0x480
[   15.189984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.190009]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.190033]  ? __kthread_parkme+0x82/0x180
[   15.190055]  ? preempt_count_sub+0x50/0x80
[   15.190082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.190105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.190129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.190153]  kthread+0x337/0x6f0
[   15.190171]  ? trace_preempt_on+0x20/0xc0
[   15.190194]  ? __pfx_kthread+0x10/0x10
[   15.190213]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.190234]  ? calculate_sigpending+0x7b/0xa0
[   15.190258]  ? __pfx_kthread+0x10/0x10
[   15.190277]  ret_from_fork+0x41/0x80
[   15.190311]  ? __pfx_kthread+0x10/0x10
[   15.190330]  ret_from_fork_asm+0x1a/0x30
[   15.190363]  </TASK>
[   15.190374] 
[   15.198143] Allocated by task 284:
[   15.198320]  kasan_save_stack+0x45/0x70
[   15.198552]  kasan_save_track+0x18/0x40
[   15.198704]  kasan_save_alloc_info+0x3b/0x50
[   15.198924]  __kasan_kmalloc+0xb7/0xc0
[   15.199103]  __kmalloc_cache_noprof+0x189/0x420
[   15.199262]  kasan_atomics+0x95/0x310
[   15.199475]  kunit_try_run_case+0x1a5/0x480
[   15.199691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199921]  kthread+0x337/0x6f0
[   15.200075]  ret_from_fork+0x41/0x80
[   15.200265]  ret_from_fork_asm+0x1a/0x30
[   15.200508] 
[   15.200607] The buggy address belongs to the object at ffff888102717100
[   15.200607]  which belongs to the cache kmalloc-64 of size 64
[   15.201073] The buggy address is located 0 bytes to the right of
[   15.201073]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.201590] 
[   15.201697] The buggy address belongs to the physical page:
[   15.201954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.202265] flags: 0x200000000000000(node=0|zone=2)
[   15.202534] page_type: f5(slab)
[   15.202661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.202945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.203279] page dumped because: kasan: bad access detected
[   15.203504] 
[   15.203576] Memory state around the buggy address:
[   15.203819]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.204111]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.204379] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.204595]                                      ^
[   15.204751]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204966]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.205442] ==================================================================
[   16.128405] ==================================================================
[   16.129504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.130155] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.130510] 
[   16.130692] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.130742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.130756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.130779] Call Trace:
[   16.130799]  <TASK>
[   16.130818]  dump_stack_lvl+0x73/0xb0
[   16.130845]  print_report+0xd1/0x650
[   16.130869]  ? __virt_addr_valid+0x1db/0x2d0
[   16.130891]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.130913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.130937]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.130960]  kasan_report+0x141/0x180
[   16.130984]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.131014]  __asan_report_load8_noabort+0x18/0x20
[   16.131036]  kasan_atomics_helper+0x4f71/0x5450
[   16.131060]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.131084]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.131106]  ? kasan_atomics+0x152/0x310
[   16.131131]  kasan_atomics+0x1dc/0x310
[   16.131151]  ? __pfx_kasan_atomics+0x10/0x10
[   16.131171]  ? trace_hardirqs_on+0x37/0xe0
[   16.131195]  ? __pfx_read_tsc+0x10/0x10
[   16.131215]  ? ktime_get_ts64+0x86/0x230
[   16.131241]  kunit_try_run_case+0x1a5/0x480
[   16.131267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.131292]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.131329]  ? __kthread_parkme+0x82/0x180
[   16.131352]  ? preempt_count_sub+0x50/0x80
[   16.131378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.131402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.131446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.131471]  kthread+0x337/0x6f0
[   16.131489]  ? trace_preempt_on+0x20/0xc0
[   16.131513]  ? __pfx_kthread+0x10/0x10
[   16.131533]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.131555]  ? calculate_sigpending+0x7b/0xa0
[   16.131578]  ? __pfx_kthread+0x10/0x10
[   16.131597]  ret_from_fork+0x41/0x80
[   16.131619]  ? __pfx_kthread+0x10/0x10
[   16.131638]  ret_from_fork_asm+0x1a/0x30
[   16.131670]  </TASK>
[   16.131683] 
[   16.145006] Allocated by task 284:
[   16.145574]  kasan_save_stack+0x45/0x70
[   16.146100]  kasan_save_track+0x18/0x40
[   16.146660]  kasan_save_alloc_info+0x3b/0x50
[   16.147185]  __kasan_kmalloc+0xb7/0xc0
[   16.147422]  __kmalloc_cache_noprof+0x189/0x420
[   16.147970]  kasan_atomics+0x95/0x310
[   16.148112]  kunit_try_run_case+0x1a5/0x480
[   16.148263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148479]  kthread+0x337/0x6f0
[   16.148870]  ret_from_fork+0x41/0x80
[   16.149256]  ret_from_fork_asm+0x1a/0x30
[   16.149721] 
[   16.149923] The buggy address belongs to the object at ffff888102717100
[   16.149923]  which belongs to the cache kmalloc-64 of size 64
[   16.150923] The buggy address is located 0 bytes to the right of
[   16.150923]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.151321] 
[   16.151398] The buggy address belongs to the physical page:
[   16.151890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.152675] flags: 0x200000000000000(node=0|zone=2)
[   16.153244] page_type: f5(slab)
[   16.153625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.154313] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.154743] page dumped because: kasan: bad access detected
[   16.155249] 
[   16.155455] Memory state around the buggy address:
[   16.155905]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.156142]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.156454] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.157117]                                      ^
[   16.157671]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.158391]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.158953] ==================================================================
[   15.707364] ==================================================================
[   15.707942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.708192] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.708512] 
[   15.708640] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.708699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.708712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.708747] Call Trace:
[   15.708768]  <TASK>
[   15.708788]  dump_stack_lvl+0x73/0xb0
[   15.708828]  print_report+0xd1/0x650
[   15.708851]  ? __virt_addr_valid+0x1db/0x2d0
[   15.708874]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.708908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.708932]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.708966]  kasan_report+0x141/0x180
[   15.708989]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.709028]  __asan_report_load8_noabort+0x18/0x20
[   15.709061]  kasan_atomics_helper+0x4eae/0x5450
[   15.709085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.709108]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.709140]  ? kasan_atomics+0x152/0x310
[   15.709164]  kasan_atomics+0x1dc/0x310
[   15.709183]  ? __pfx_kasan_atomics+0x10/0x10
[   15.709214]  ? trace_hardirqs_on+0x37/0xe0
[   15.709239]  ? __pfx_read_tsc+0x10/0x10
[   15.709259]  ? ktime_get_ts64+0x86/0x230
[   15.709286]  kunit_try_run_case+0x1a5/0x480
[   15.709329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709354]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.709390]  ? __kthread_parkme+0x82/0x180
[   15.709413]  ? preempt_count_sub+0x50/0x80
[   15.709449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.709473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.709520]  kthread+0x337/0x6f0
[   15.709537]  ? trace_preempt_on+0x20/0xc0
[   15.709561]  ? __pfx_kthread+0x10/0x10
[   15.709581]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.709604]  ? calculate_sigpending+0x7b/0xa0
[   15.709627]  ? __pfx_kthread+0x10/0x10
[   15.709647]  ret_from_fork+0x41/0x80
[   15.709669]  ? __pfx_kthread+0x10/0x10
[   15.709688]  ret_from_fork_asm+0x1a/0x30
[   15.709719]  </TASK>
[   15.709732] 
[   15.717457] Allocated by task 284:
[   15.717589]  kasan_save_stack+0x45/0x70
[   15.717780]  kasan_save_track+0x18/0x40
[   15.717968]  kasan_save_alloc_info+0x3b/0x50
[   15.718182]  __kasan_kmalloc+0xb7/0xc0
[   15.718397]  __kmalloc_cache_noprof+0x189/0x420
[   15.718683]  kasan_atomics+0x95/0x310
[   15.718817]  kunit_try_run_case+0x1a5/0x480
[   15.718968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719144]  kthread+0x337/0x6f0
[   15.719264]  ret_from_fork+0x41/0x80
[   15.719407]  ret_from_fork_asm+0x1a/0x30
[   15.719548] 
[   15.719621] The buggy address belongs to the object at ffff888102717100
[   15.719621]  which belongs to the cache kmalloc-64 of size 64
[   15.720228] The buggy address is located 0 bytes to the right of
[   15.720228]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.720887] 
[   15.720996] The buggy address belongs to the physical page:
[   15.721251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.721855] flags: 0x200000000000000(node=0|zone=2)
[   15.722024] page_type: f5(slab)
[   15.722148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.722390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.722891] page dumped because: kasan: bad access detected
[   15.723151] 
[   15.723266] Memory state around the buggy address:
[   15.724147]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.725621]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.725958] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.726252]                                      ^
[   15.726478]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726775]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.727110] ==================================================================
[   16.246203] ==================================================================
[   16.246781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.247626] Read of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.248423] 
[   16.248622] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.248670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.248684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.248706] Call Trace:
[   16.248721]  <TASK>
[   16.248736]  dump_stack_lvl+0x73/0xb0
[   16.248763]  print_report+0xd1/0x650
[   16.248799]  ? __virt_addr_valid+0x1db/0x2d0
[   16.248822]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.248844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.248879]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.248902]  kasan_report+0x141/0x180
[   16.248926]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.248954]  __asan_report_load8_noabort+0x18/0x20
[   16.248976]  kasan_atomics_helper+0x4fb2/0x5450
[   16.249001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.249024]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.249046]  ? kasan_atomics+0x152/0x310
[   16.249070]  kasan_atomics+0x1dc/0x310
[   16.249090]  ? __pfx_kasan_atomics+0x10/0x10
[   16.249110]  ? trace_hardirqs_on+0x37/0xe0
[   16.249133]  ? __pfx_read_tsc+0x10/0x10
[   16.249153]  ? ktime_get_ts64+0x86/0x230
[   16.249178]  kunit_try_run_case+0x1a5/0x480
[   16.249202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.249228]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.249253]  ? __kthread_parkme+0x82/0x180
[   16.249275]  ? preempt_count_sub+0x50/0x80
[   16.249301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.249335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.249359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.249383]  kthread+0x337/0x6f0
[   16.249400]  ? trace_preempt_on+0x20/0xc0
[   16.249424]  ? __pfx_kthread+0x10/0x10
[   16.249463]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.249484]  ? calculate_sigpending+0x7b/0xa0
[   16.249507]  ? __pfx_kthread+0x10/0x10
[   16.249526]  ret_from_fork+0x41/0x80
[   16.249547]  ? __pfx_kthread+0x10/0x10
[   16.249567]  ret_from_fork_asm+0x1a/0x30
[   16.249599]  </TASK>
[   16.249612] 
[   16.261198] Allocated by task 284:
[   16.261568]  kasan_save_stack+0x45/0x70
[   16.261743]  kasan_save_track+0x18/0x40
[   16.262125]  kasan_save_alloc_info+0x3b/0x50
[   16.262345]  __kasan_kmalloc+0xb7/0xc0
[   16.262749]  __kmalloc_cache_noprof+0x189/0x420
[   16.263024]  kasan_atomics+0x95/0x310
[   16.263158]  kunit_try_run_case+0x1a5/0x480
[   16.263323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.263839]  kthread+0x337/0x6f0
[   16.264157]  ret_from_fork+0x41/0x80
[   16.264602]  ret_from_fork_asm+0x1a/0x30
[   16.264994] 
[   16.265154] The buggy address belongs to the object at ffff888102717100
[   16.265154]  which belongs to the cache kmalloc-64 of size 64
[   16.265740] The buggy address is located 0 bytes to the right of
[   16.265740]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.266107] 
[   16.266180] The buggy address belongs to the physical page:
[   16.266468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.267163] flags: 0x200000000000000(node=0|zone=2)
[   16.267649] page_type: f5(slab)
[   16.267970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.268672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.269351] page dumped because: kasan: bad access detected
[   16.269876] 
[   16.270056] Memory state around the buggy address:
[   16.270532]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.270967]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.271185] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.271652]                                      ^
[   16.272122]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.272817]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.273261] ==================================================================
[   15.061489] ==================================================================
[   15.061789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.062236] Read of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.062584] 
[   15.062682] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.062730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.062744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.062766] Call Trace:
[   15.062779]  <TASK>
[   15.062794]  dump_stack_lvl+0x73/0xb0
[   15.062823]  print_report+0xd1/0x650
[   15.062847]  ? __virt_addr_valid+0x1db/0x2d0
[   15.062869]  ? kasan_atomics_helper+0x3df/0x5450
[   15.062892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.062915]  ? kasan_atomics_helper+0x3df/0x5450
[   15.062939]  kasan_report+0x141/0x180
[   15.062962]  ? kasan_atomics_helper+0x3df/0x5450
[   15.063042]  kasan_check_range+0x10c/0x1c0
[   15.063068]  __kasan_check_read+0x15/0x20
[   15.063089]  kasan_atomics_helper+0x3df/0x5450
[   15.063114]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.063138]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.063162]  ? kasan_atomics+0x152/0x310
[   15.063186]  kasan_atomics+0x1dc/0x310
[   15.063208]  ? __pfx_kasan_atomics+0x10/0x10
[   15.063227]  ? trace_hardirqs_on+0x37/0xe0
[   15.063251]  ? __pfx_read_tsc+0x10/0x10
[   15.063272]  ? ktime_get_ts64+0x86/0x230
[   15.063298]  kunit_try_run_case+0x1a5/0x480
[   15.063337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063362]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.063387]  ? __kthread_parkme+0x82/0x180
[   15.063410]  ? preempt_count_sub+0x50/0x80
[   15.063447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.063518]  kthread+0x337/0x6f0
[   15.063537]  ? trace_preempt_on+0x20/0xc0
[   15.063560]  ? __pfx_kthread+0x10/0x10
[   15.063581]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.063603]  ? calculate_sigpending+0x7b/0xa0
[   15.063626]  ? __pfx_kthread+0x10/0x10
[   15.063646]  ret_from_fork+0x41/0x80
[   15.063668]  ? __pfx_kthread+0x10/0x10
[   15.063687]  ret_from_fork_asm+0x1a/0x30
[   15.063720]  </TASK>
[   15.063732] 
[   15.072427] Allocated by task 284:
[   15.072563]  kasan_save_stack+0x45/0x70
[   15.072726]  kasan_save_track+0x18/0x40
[   15.073021]  kasan_save_alloc_info+0x3b/0x50
[   15.073264]  __kasan_kmalloc+0xb7/0xc0
[   15.073539]  __kmalloc_cache_noprof+0x189/0x420
[   15.073726]  kasan_atomics+0x95/0x310
[   15.074023]  kunit_try_run_case+0x1a5/0x480
[   15.074275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.074747]  kthread+0x337/0x6f0
[   15.074964]  ret_from_fork+0x41/0x80
[   15.075103]  ret_from_fork_asm+0x1a/0x30
[   15.075316] 
[   15.075454] The buggy address belongs to the object at ffff888102717100
[   15.075454]  which belongs to the cache kmalloc-64 of size 64
[   15.076073] The buggy address is located 0 bytes to the right of
[   15.076073]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.076698] 
[   15.076806] The buggy address belongs to the physical page:
[   15.077105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.077804] flags: 0x200000000000000(node=0|zone=2)
[   15.078056] page_type: f5(slab)
[   15.078278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.078759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.079259] page dumped because: kasan: bad access detected
[   15.079544] 
[   15.079665] Memory state around the buggy address:
[   15.079842]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.080072]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.080708] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.081421]                                      ^
[   15.081731]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.082060]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.082422] ==================================================================
[   15.245568] ==================================================================
[   15.246080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.246366] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.246881] 
[   15.246972] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.247017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.247031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.247052] Call Trace:
[   15.247067]  <TASK>
[   15.247083]  dump_stack_lvl+0x73/0xb0
[   15.247109]  print_report+0xd1/0x650
[   15.247133]  ? __virt_addr_valid+0x1db/0x2d0
[   15.247155]  ? kasan_atomics_helper+0x860/0x5450
[   15.247177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.247200]  ? kasan_atomics_helper+0x860/0x5450
[   15.247223]  kasan_report+0x141/0x180
[   15.247247]  ? kasan_atomics_helper+0x860/0x5450
[   15.247276]  kasan_check_range+0x10c/0x1c0
[   15.247297]  __kasan_check_write+0x18/0x20
[   15.247329]  kasan_atomics_helper+0x860/0x5450
[   15.247353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.247377]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.247400]  ? kasan_atomics+0x152/0x310
[   15.247425]  kasan_atomics+0x1dc/0x310
[   15.247445]  ? __pfx_kasan_atomics+0x10/0x10
[   15.247465]  ? trace_hardirqs_on+0x37/0xe0
[   15.247488]  ? __pfx_read_tsc+0x10/0x10
[   15.247509]  ? ktime_get_ts64+0x86/0x230
[   15.247535]  kunit_try_run_case+0x1a5/0x480
[   15.247560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.247584]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.247608]  ? __kthread_parkme+0x82/0x180
[   15.247630]  ? preempt_count_sub+0x50/0x80
[   15.247655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.247680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.247703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.247726]  kthread+0x337/0x6f0
[   15.247745]  ? trace_preempt_on+0x20/0xc0
[   15.247768]  ? __pfx_kthread+0x10/0x10
[   15.247788]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.247811]  ? calculate_sigpending+0x7b/0xa0
[   15.247833]  ? __pfx_kthread+0x10/0x10
[   15.247853]  ret_from_fork+0x41/0x80
[   15.247874]  ? __pfx_kthread+0x10/0x10
[   15.247894]  ret_from_fork_asm+0x1a/0x30
[   15.247926]  </TASK>
[   15.247938] 
[   15.255560] Allocated by task 284:
[   15.255706]  kasan_save_stack+0x45/0x70
[   15.255900]  kasan_save_track+0x18/0x40
[   15.256046]  kasan_save_alloc_info+0x3b/0x50
[   15.256195]  __kasan_kmalloc+0xb7/0xc0
[   15.256342]  __kmalloc_cache_noprof+0x189/0x420
[   15.256602]  kasan_atomics+0x95/0x310
[   15.256794]  kunit_try_run_case+0x1a5/0x480
[   15.257008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257215]  kthread+0x337/0x6f0
[   15.257350]  ret_from_fork+0x41/0x80
[   15.257485]  ret_from_fork_asm+0x1a/0x30
[   15.257680] 
[   15.257776] The buggy address belongs to the object at ffff888102717100
[   15.257776]  which belongs to the cache kmalloc-64 of size 64
[   15.258315] The buggy address is located 0 bytes to the right of
[   15.258315]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.258854] 
[   15.258929] The buggy address belongs to the physical page:
[   15.259102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.259378] flags: 0x200000000000000(node=0|zone=2)
[   15.259608] page_type: f5(slab)
[   15.259777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.260121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.260644] page dumped because: kasan: bad access detected
[   15.260820] 
[   15.260892] Memory state around the buggy address:
[   15.261050]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261321]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261720] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.262058]                                      ^
[   15.262453]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.262727]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263055] ==================================================================
[   16.273840] ==================================================================
[   16.274138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.274623] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   16.274930] 
[   16.275043] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   16.275100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.275114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.275155] Call Trace:
[   16.275172]  <TASK>
[   16.275189]  dump_stack_lvl+0x73/0xb0
[   16.275228]  print_report+0xd1/0x650
[   16.275252]  ? __virt_addr_valid+0x1db/0x2d0
[   16.275274]  ? kasan_atomics_helper+0x218a/0x5450
[   16.275296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.275329]  ? kasan_atomics_helper+0x218a/0x5450
[   16.275352]  kasan_report+0x141/0x180
[   16.275383]  ? kasan_atomics_helper+0x218a/0x5450
[   16.275412]  kasan_check_range+0x10c/0x1c0
[   16.275468]  __kasan_check_write+0x18/0x20
[   16.275490]  kasan_atomics_helper+0x218a/0x5450
[   16.275514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.275547]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.275570]  ? kasan_atomics+0x152/0x310
[   16.275593]  kasan_atomics+0x1dc/0x310
[   16.275613]  ? __pfx_kasan_atomics+0x10/0x10
[   16.275633]  ? trace_hardirqs_on+0x37/0xe0
[   16.275657]  ? __pfx_read_tsc+0x10/0x10
[   16.275678]  ? ktime_get_ts64+0x86/0x230
[   16.275705]  kunit_try_run_case+0x1a5/0x480
[   16.275730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.275763]  ? queued_spin_lock_slowpath+0x116/0xb40
[   16.275789]  ? __kthread_parkme+0x82/0x180
[   16.275812]  ? preempt_count_sub+0x50/0x80
[   16.275848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.275872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.275896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.275919]  kthread+0x337/0x6f0
[   16.275937]  ? trace_preempt_on+0x20/0xc0
[   16.275961]  ? __pfx_kthread+0x10/0x10
[   16.275980]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.276003]  ? calculate_sigpending+0x7b/0xa0
[   16.276026]  ? __pfx_kthread+0x10/0x10
[   16.276045]  ret_from_fork+0x41/0x80
[   16.276067]  ? __pfx_kthread+0x10/0x10
[   16.276086]  ret_from_fork_asm+0x1a/0x30
[   16.276118]  </TASK>
[   16.276139] 
[   16.283554] Allocated by task 284:
[   16.283754]  kasan_save_stack+0x45/0x70
[   16.283981]  kasan_save_track+0x18/0x40
[   16.284198]  kasan_save_alloc_info+0x3b/0x50
[   16.284417]  __kasan_kmalloc+0xb7/0xc0
[   16.284624]  __kmalloc_cache_noprof+0x189/0x420
[   16.284779]  kasan_atomics+0x95/0x310
[   16.284991]  kunit_try_run_case+0x1a5/0x480
[   16.285202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.285420]  kthread+0x337/0x6f0
[   16.285610]  ret_from_fork+0x41/0x80
[   16.285799]  ret_from_fork_asm+0x1a/0x30
[   16.286006] 
[   16.286079] The buggy address belongs to the object at ffff888102717100
[   16.286079]  which belongs to the cache kmalloc-64 of size 64
[   16.286459] The buggy address is located 0 bytes to the right of
[   16.286459]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   16.287041] 
[   16.287144] The buggy address belongs to the physical page:
[   16.287403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   16.287777] flags: 0x200000000000000(node=0|zone=2)
[   16.287973] page_type: f5(slab)
[   16.288166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.288416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.288730] page dumped because: kasan: bad access detected
[   16.289004] 
[   16.289101] Memory state around the buggy address:
[   16.289362]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.289710]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.290045] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.290359]                                      ^
[   16.290609]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.290916]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.291218] ==================================================================
[   14.994606] ==================================================================
[   14.994944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.995452] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   14.995738] 
[   14.995823] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.995865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.995878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.995898] Call Trace:
[   14.995914]  <TASK>
[   14.995927]  dump_stack_lvl+0x73/0xb0
[   14.995953]  print_report+0xd1/0x650
[   14.995975]  ? __virt_addr_valid+0x1db/0x2d0
[   14.995995]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.996016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.996038]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.996060]  kasan_report+0x141/0x180
[   14.996082]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.996110]  __asan_report_store4_noabort+0x1b/0x30
[   14.996131]  kasan_atomics_helper+0x4ba2/0x5450
[   14.996153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.996176]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.996198]  ? kasan_atomics+0x152/0x310
[   14.996221]  kasan_atomics+0x1dc/0x310
[   14.996240]  ? __pfx_kasan_atomics+0x10/0x10
[   14.996259]  ? trace_hardirqs_on+0x37/0xe0
[   14.996281]  ? __pfx_read_tsc+0x10/0x10
[   14.996313]  ? ktime_get_ts64+0x86/0x230
[   14.996337]  kunit_try_run_case+0x1a5/0x480
[   14.996361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996434]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.996463]  ? __kthread_parkme+0x82/0x180
[   14.996484]  ? preempt_count_sub+0x50/0x80
[   14.996508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.996554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.996577]  kthread+0x337/0x6f0
[   14.996594]  ? trace_preempt_on+0x20/0xc0
[   14.996615]  ? __pfx_kthread+0x10/0x10
[   14.996634]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.996654]  ? calculate_sigpending+0x7b/0xa0
[   14.996675]  ? __pfx_kthread+0x10/0x10
[   14.996694]  ret_from_fork+0x41/0x80
[   14.996715]  ? __pfx_kthread+0x10/0x10
[   14.996732]  ret_from_fork_asm+0x1a/0x30
[   14.996763]  </TASK>
[   14.996774] 
[   15.004916] Allocated by task 284:
[   15.005052]  kasan_save_stack+0x45/0x70
[   15.005200]  kasan_save_track+0x18/0x40
[   15.005361]  kasan_save_alloc_info+0x3b/0x50
[   15.005581]  __kasan_kmalloc+0xb7/0xc0
[   15.005896]  __kmalloc_cache_noprof+0x189/0x420
[   15.006114]  kasan_atomics+0x95/0x310
[   15.006307]  kunit_try_run_case+0x1a5/0x480
[   15.006561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.006807]  kthread+0x337/0x6f0
[   15.007181]  ret_from_fork+0x41/0x80
[   15.007382]  ret_from_fork_asm+0x1a/0x30
[   15.007604] 
[   15.007678] The buggy address belongs to the object at ffff888102717100
[   15.007678]  which belongs to the cache kmalloc-64 of size 64
[   15.008383] The buggy address is located 0 bytes to the right of
[   15.008383]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.008926] 
[   15.008999] The buggy address belongs to the physical page:
[   15.009169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.009421] flags: 0x200000000000000(node=0|zone=2)
[   15.009583] page_type: f5(slab)
[   15.009874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.010213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.010762] page dumped because: kasan: bad access detected
[   15.011068] 
[   15.011142] Memory state around the buggy address:
[   15.011312]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.011944]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012210] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.012547]                                      ^
[   15.012756]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013268]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013646] ==================================================================
[   15.943485] ==================================================================
[   15.943825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.944234] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.944610] 
[   15.944712] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.944759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.944772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.944805] Call Trace:
[   15.944822]  <TASK>
[   15.944838]  dump_stack_lvl+0x73/0xb0
[   15.944879]  print_report+0xd1/0x650
[   15.944903]  ? __virt_addr_valid+0x1db/0x2d0
[   15.944925]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.944956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.944980]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.945003]  kasan_report+0x141/0x180
[   15.945038]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.945066]  kasan_check_range+0x10c/0x1c0
[   15.945089]  __kasan_check_write+0x18/0x20
[   15.945109]  kasan_atomics_helper+0x1a7f/0x5450
[   15.945134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.945157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.945179]  ? kasan_atomics+0x152/0x310
[   15.945203]  kasan_atomics+0x1dc/0x310
[   15.945222]  ? __pfx_kasan_atomics+0x10/0x10
[   15.945243]  ? trace_hardirqs_on+0x37/0xe0
[   15.945266]  ? __pfx_read_tsc+0x10/0x10
[   15.945286]  ? ktime_get_ts64+0x86/0x230
[   15.945322]  kunit_try_run_case+0x1a5/0x480
[   15.945347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.945382]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.945407]  ? __kthread_parkme+0x82/0x180
[   15.945429]  ? preempt_count_sub+0x50/0x80
[   15.945465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.945498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.945522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.945555]  kthread+0x337/0x6f0
[   15.945572]  ? trace_preempt_on+0x20/0xc0
[   15.945596]  ? __pfx_kthread+0x10/0x10
[   15.945625]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.945648]  ? calculate_sigpending+0x7b/0xa0
[   15.945670]  ? __pfx_kthread+0x10/0x10
[   15.945690]  ret_from_fork+0x41/0x80
[   15.945711]  ? __pfx_kthread+0x10/0x10
[   15.945730]  ret_from_fork_asm+0x1a/0x30
[   15.945762]  </TASK>
[   15.945773] 
[   15.953646] Allocated by task 284:
[   15.953849]  kasan_save_stack+0x45/0x70
[   15.954056]  kasan_save_track+0x18/0x40
[   15.954265]  kasan_save_alloc_info+0x3b/0x50
[   15.954437]  __kasan_kmalloc+0xb7/0xc0
[   15.954599]  __kmalloc_cache_noprof+0x189/0x420
[   15.954822]  kasan_atomics+0x95/0x310
[   15.955038]  kunit_try_run_case+0x1a5/0x480
[   15.955248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.955523]  kthread+0x337/0x6f0
[   15.955643]  ret_from_fork+0x41/0x80
[   15.955827]  ret_from_fork_asm+0x1a/0x30
[   15.956027] 
[   15.956155] The buggy address belongs to the object at ffff888102717100
[   15.956155]  which belongs to the cache kmalloc-64 of size 64
[   15.956782] The buggy address is located 0 bytes to the right of
[   15.956782]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.957210] 
[   15.957286] The buggy address belongs to the physical page:
[   15.957470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.957781] flags: 0x200000000000000(node=0|zone=2)
[   15.958099] page_type: f5(slab)
[   15.958270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.958597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.958829] page dumped because: kasan: bad access detected
[   15.959001] 
[   15.959072] Memory state around the buggy address:
[   15.959361]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.960011]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.960365] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.960727]                                      ^
[   15.960981]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.961257]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.961677] ==================================================================
[   15.207008] ==================================================================
[   15.207382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.207998] Write of size 4 at addr ffff888102717130 by task kunit_try_catch/284
[   15.208332] 
[   15.208447] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.208495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.208509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.208532] Call Trace:
[   15.208550]  <TASK>
[   15.208568]  dump_stack_lvl+0x73/0xb0
[   15.208596]  print_report+0xd1/0x650
[   15.208619]  ? __virt_addr_valid+0x1db/0x2d0
[   15.208641]  ? kasan_atomics_helper+0x72f/0x5450
[   15.208663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.208687]  ? kasan_atomics_helper+0x72f/0x5450
[   15.208710]  kasan_report+0x141/0x180
[   15.208735]  ? kasan_atomics_helper+0x72f/0x5450
[   15.208762]  kasan_check_range+0x10c/0x1c0
[   15.208784]  __kasan_check_write+0x18/0x20
[   15.208805]  kasan_atomics_helper+0x72f/0x5450
[   15.208828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.208851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.208874]  ? kasan_atomics+0x152/0x310
[   15.208899]  kasan_atomics+0x1dc/0x310
[   15.208919]  ? __pfx_kasan_atomics+0x10/0x10
[   15.208939]  ? trace_hardirqs_on+0x37/0xe0
[   15.208963]  ? __pfx_read_tsc+0x10/0x10
[   15.208983]  ? ktime_get_ts64+0x86/0x230
[   15.209008]  kunit_try_run_case+0x1a5/0x480
[   15.209034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209059]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.209083]  ? __kthread_parkme+0x82/0x180
[   15.209106]  ? preempt_count_sub+0x50/0x80
[   15.209132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.209156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.209179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.209203]  kthread+0x337/0x6f0
[   15.209221]  ? trace_preempt_on+0x20/0xc0
[   15.209244]  ? __pfx_kthread+0x10/0x10
[   15.209265]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.209287]  ? calculate_sigpending+0x7b/0xa0
[   15.209320]  ? __pfx_kthread+0x10/0x10
[   15.209341]  ret_from_fork+0x41/0x80
[   15.209362]  ? __pfx_kthread+0x10/0x10
[   15.209381]  ret_from_fork_asm+0x1a/0x30
[   15.209414]  </TASK>
[   15.209425] 
[   15.216908] Allocated by task 284:
[   15.217088]  kasan_save_stack+0x45/0x70
[   15.217269]  kasan_save_track+0x18/0x40
[   15.217427]  kasan_save_alloc_info+0x3b/0x50
[   15.217578]  __kasan_kmalloc+0xb7/0xc0
[   15.217714]  __kmalloc_cache_noprof+0x189/0x420
[   15.217911]  kasan_atomics+0x95/0x310
[   15.218093]  kunit_try_run_case+0x1a5/0x480
[   15.218309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.218565]  kthread+0x337/0x6f0
[   15.218758]  ret_from_fork+0x41/0x80
[   15.218893]  ret_from_fork_asm+0x1a/0x30
[   15.219034] 
[   15.219120] The buggy address belongs to the object at ffff888102717100
[   15.219120]  which belongs to the cache kmalloc-64 of size 64
[   15.219939] The buggy address is located 0 bytes to the right of
[   15.219939]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.220432] 
[   15.220778] The buggy address belongs to the physical page:
[   15.221009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.221338] flags: 0x200000000000000(node=0|zone=2)
[   15.222243] page_type: f5(slab)
[   15.222888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.223189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.223560] page dumped because: kasan: bad access detected
[   15.223740] 
[   15.223813] Memory state around the buggy address:
[   15.224045]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.224354]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.224766] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.225017]                                      ^
[   15.225244]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.225581]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.225870] ==================================================================
[   15.785117] ==================================================================
[   15.785499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.785798] Write of size 8 at addr ffff888102717130 by task kunit_try_catch/284
[   15.786288] 
[   15.786439] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   15.786487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.786510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.786534] Call Trace:
[   15.786553]  <TASK>
[   15.786570]  dump_stack_lvl+0x73/0xb0
[   15.786608]  print_report+0xd1/0x650
[   15.786631]  ? __virt_addr_valid+0x1db/0x2d0
[   15.786654]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.786683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.786707]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.786731]  kasan_report+0x141/0x180
[   15.786755]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.786784]  kasan_check_range+0x10c/0x1c0
[   15.786808]  __kasan_check_write+0x18/0x20
[   15.786829]  kasan_atomics_helper+0x15b6/0x5450
[   15.786853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.786877]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.786900]  ? kasan_atomics+0x152/0x310
[   15.786925]  kasan_atomics+0x1dc/0x310
[   15.786945]  ? __pfx_kasan_atomics+0x10/0x10
[   15.786965]  ? trace_hardirqs_on+0x37/0xe0
[   15.786989]  ? __pfx_read_tsc+0x10/0x10
[   15.787009]  ? ktime_get_ts64+0x86/0x230
[   15.787035]  kunit_try_run_case+0x1a5/0x480
[   15.787060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.787084]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.787108]  ? __kthread_parkme+0x82/0x180
[   15.787131]  ? preempt_count_sub+0x50/0x80
[   15.787156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.787180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.787204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.787227]  kthread+0x337/0x6f0
[   15.787253]  ? trace_preempt_on+0x20/0xc0
[   15.787276]  ? __pfx_kthread+0x10/0x10
[   15.787295]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.787331]  ? calculate_sigpending+0x7b/0xa0
[   15.787353]  ? __pfx_kthread+0x10/0x10
[   15.787373]  ret_from_fork+0x41/0x80
[   15.787394]  ? __pfx_kthread+0x10/0x10
[   15.787414]  ret_from_fork_asm+0x1a/0x30
[   15.787457]  </TASK>
[   15.787469] 
[   15.795356] Allocated by task 284:
[   15.795541]  kasan_save_stack+0x45/0x70
[   15.795711]  kasan_save_track+0x18/0x40
[   15.795932]  kasan_save_alloc_info+0x3b/0x50
[   15.796084]  __kasan_kmalloc+0xb7/0xc0
[   15.796221]  __kmalloc_cache_noprof+0x189/0x420
[   15.796386]  kasan_atomics+0x95/0x310
[   15.796520]  kunit_try_run_case+0x1a5/0x480
[   15.796670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796848]  kthread+0x337/0x6f0
[   15.796997]  ret_from_fork+0x41/0x80
[   15.797230]  ret_from_fork_asm+0x1a/0x30
[   15.797458] 
[   15.797555] The buggy address belongs to the object at ffff888102717100
[   15.797555]  which belongs to the cache kmalloc-64 of size 64
[   15.798080] The buggy address is located 0 bytes to the right of
[   15.798080]  allocated 48-byte region [ffff888102717100, ffff888102717130)
[   15.798775] 
[   15.798851] The buggy address belongs to the physical page:
[   15.799024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102717
[   15.799266] flags: 0x200000000000000(node=0|zone=2)
[   15.799453] page_type: f5(slab)
[   15.799630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.800008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.800409] page dumped because: kasan: bad access detected
[   15.800736] 
[   15.800835] Memory state around the buggy address:
[   15.801101]  ffff888102717000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801456]  ffff888102717080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801762] >ffff888102717100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.801976]                                      ^
[   15.802133]  ffff888102717180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802402]  ffff888102717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.803105] ==================================================================