Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   25.786671] ==================================================================
[   25.786811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   25.786917] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.787023] 
[   25.787102] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.787300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.787361] Hardware name: linux,dummy-virt (DT)
[   25.787451] Call trace:
[   25.787744]  show_stack+0x20/0x38 (C)
[   25.787890]  dump_stack_lvl+0x8c/0xd0
[   25.788001]  print_report+0x118/0x608
[   25.788314]  kasan_report+0xdc/0x128
[   25.788515]  __asan_report_load8_noabort+0x20/0x30
[   25.788648]  kasan_atomics_helper+0x3e10/0x4858
[   25.788814]  kasan_atomics+0x198/0x2e0
[   25.788935]  kunit_try_run_case+0x170/0x3f0
[   25.789112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.789516]  kthread+0x328/0x630
[   25.789988]  ret_from_fork+0x10/0x20
[   25.790187] 
[   25.790279] Allocated by task 267:
[   25.790580]  kasan_save_stack+0x3c/0x68
[   25.790908]  kasan_save_track+0x20/0x40
[   25.791075]  kasan_save_alloc_info+0x40/0x58
[   25.791189]  __kasan_kmalloc+0xd4/0xd8
[   25.791491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.791782]  kasan_atomics+0xb8/0x2e0
[   25.791886]  kunit_try_run_case+0x170/0x3f0
[   25.791988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.792103]  kthread+0x328/0x630
[   25.792281]  ret_from_fork+0x10/0x20
[   25.792382] 
[   25.792451] The buggy address belongs to the object at fff00000c78d8480
[   25.792451]  which belongs to the cache kmalloc-64 of size 64
[   25.792602] The buggy address is located 0 bytes to the right of
[   25.792602]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.792775] 
[   25.792836] The buggy address belongs to the physical page:
[   25.792925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.793066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.793200] page_type: f5(slab)
[   25.794217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.794380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.795033] page dumped because: kasan: bad access detected
[   25.795140] 
[   25.795190] Memory state around the buggy address:
[   25.795276]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.795755]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.795880] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.795987]                                      ^
[   25.796449]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.796979]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.797093] ==================================================================
[   25.410427] ==================================================================
[   25.410598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   25.410798] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.410986] 
[   25.411124] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.411414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.411523] Hardware name: linux,dummy-virt (DT)
[   25.411648] Call trace:
[   25.411712]  show_stack+0x20/0x38 (C)
[   25.412359]  dump_stack_lvl+0x8c/0xd0
[   25.412975]  print_report+0x118/0x608
[   25.413360]  kasan_report+0xdc/0x128
[   25.413610]  __asan_report_load4_noabort+0x20/0x30
[   25.414032]  kasan_atomics_helper+0x3e04/0x4858
[   25.414372]  kasan_atomics+0x198/0x2e0
[   25.414794]  kunit_try_run_case+0x170/0x3f0
[   25.414962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.415106]  kthread+0x328/0x630
[   25.415263]  ret_from_fork+0x10/0x20
[   25.415551] 
[   25.415611] Allocated by task 267:
[   25.415698]  kasan_save_stack+0x3c/0x68
[   25.415804]  kasan_save_track+0x20/0x40
[   25.415884]  kasan_save_alloc_info+0x40/0x58
[   25.415957]  __kasan_kmalloc+0xd4/0xd8
[   25.416032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.416149]  kasan_atomics+0xb8/0x2e0
[   25.416244]  kunit_try_run_case+0x170/0x3f0
[   25.416352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.416470]  kthread+0x328/0x630
[   25.417363]  ret_from_fork+0x10/0x20
[   25.418542] 
[   25.418820] The buggy address belongs to the object at fff00000c78d8480
[   25.418820]  which belongs to the cache kmalloc-64 of size 64
[   25.419011] The buggy address is located 0 bytes to the right of
[   25.419011]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.419425] 
[   25.419491] The buggy address belongs to the physical page:
[   25.419580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.419721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.420350] page_type: f5(slab)
[   25.420627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.421056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.421158] page dumped because: kasan: bad access detected
[   25.421231] 
[   25.421278] Memory state around the buggy address:
[   25.421351]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.421465]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.421558] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.421648]                                      ^
[   25.421742]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.424499]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.425034] ==================================================================
[   25.635606] ==================================================================
[   25.635761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   25.635900] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.636028] 
[   25.636129] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.636350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.636425] Hardware name: linux,dummy-virt (DT)
[   25.636508] Call trace:
[   25.636574]  show_stack+0x20/0x38 (C)
[   25.636697]  dump_stack_lvl+0x8c/0xd0
[   25.636838]  print_report+0x118/0x608
[   25.636961]  kasan_report+0xdc/0x128
[   25.637076]  kasan_check_range+0x100/0x1a8
[   25.637200]  __kasan_check_write+0x20/0x30
[   25.637311]  kasan_atomics_helper+0x12d8/0x4858
[   25.640581]  kasan_atomics+0x198/0x2e0
[   25.641449]  kunit_try_run_case+0x170/0x3f0
[   25.642178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.642433]  kthread+0x328/0x630
[   25.642890]  ret_from_fork+0x10/0x20
[   25.643535] 
[   25.643597] Allocated by task 267:
[   25.643665]  kasan_save_stack+0x3c/0x68
[   25.643760]  kasan_save_track+0x20/0x40
[   25.643845]  kasan_save_alloc_info+0x40/0x58
[   25.643939]  __kasan_kmalloc+0xd4/0xd8
[   25.645281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.645989]  kasan_atomics+0xb8/0x2e0
[   25.646162]  kunit_try_run_case+0x170/0x3f0
[   25.646491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.647235]  kthread+0x328/0x630
[   25.647720]  ret_from_fork+0x10/0x20
[   25.648214] 
[   25.648277] The buggy address belongs to the object at fff00000c78d8480
[   25.648277]  which belongs to the cache kmalloc-64 of size 64
[   25.648980] The buggy address is located 0 bytes to the right of
[   25.648980]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.649152] 
[   25.649215] The buggy address belongs to the physical page:
[   25.649298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.649458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.649595] page_type: f5(slab)
[   25.650577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.651642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.651947] page dumped because: kasan: bad access detected
[   25.652592] 
[   25.652952] Memory state around the buggy address:
[   25.653561]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.654397]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.654837] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.655034]                                      ^
[   25.655137]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.656090]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.656718] ==================================================================
[   25.524294] ==================================================================
[   25.524447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   25.524590] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.524723] 
[   25.524830] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.525051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.525129] Hardware name: linux,dummy-virt (DT)
[   25.525212] Call trace:
[   25.525274]  show_stack+0x20/0x38 (C)
[   25.526562]  dump_stack_lvl+0x8c/0xd0
[   25.527184]  print_report+0x118/0x608
[   25.527468]  kasan_report+0xdc/0x128
[   25.527722]  kasan_check_range+0x100/0x1a8
[   25.527997]  __kasan_check_write+0x20/0x30
[   25.528648]  kasan_atomics_helper+0xff0/0x4858
[   25.529373]  kasan_atomics+0x198/0x2e0
[   25.529516]  kunit_try_run_case+0x170/0x3f0
[   25.530261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.530570]  kthread+0x328/0x630
[   25.530721]  ret_from_fork+0x10/0x20
[   25.530994] 
[   25.531115] Allocated by task 267:
[   25.531695]  kasan_save_stack+0x3c/0x68
[   25.531834]  kasan_save_track+0x20/0x40
[   25.531946]  kasan_save_alloc_info+0x40/0x58
[   25.532054]  __kasan_kmalloc+0xd4/0xd8
[   25.532654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.532797]  kasan_atomics+0xb8/0x2e0
[   25.532886]  kunit_try_run_case+0x170/0x3f0
[   25.533005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.533128]  kthread+0x328/0x630
[   25.534106]  ret_from_fork+0x10/0x20
[   25.534478] 
[   25.534679] The buggy address belongs to the object at fff00000c78d8480
[   25.534679]  which belongs to the cache kmalloc-64 of size 64
[   25.535070] The buggy address is located 0 bytes to the right of
[   25.535070]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.535408] 
[   25.535466] The buggy address belongs to the physical page:
[   25.535830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.536176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.536322] page_type: f5(slab)
[   25.536781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.537670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.537798] page dumped because: kasan: bad access detected
[   25.537871] 
[   25.537912] Memory state around the buggy address:
[   25.537998]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.538109]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.539149] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.539302]                                      ^
[   25.539419]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.539831]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.539949] ==================================================================
[   25.274104] ==================================================================
[   25.274226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   25.274354] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.274462] 
[   25.274547] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.274758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.274823] Hardware name: linux,dummy-virt (DT)
[   25.274893] Call trace:
[   25.274951]  show_stack+0x20/0x38 (C)
[   25.275071]  dump_stack_lvl+0x8c/0xd0
[   25.275173]  print_report+0x118/0x608
[   25.276076]  kasan_report+0xdc/0x128
[   25.276298]  kasan_check_range+0x100/0x1a8
[   25.276412]  __kasan_check_write+0x20/0x30
[   25.276529]  kasan_atomics_helper+0xad4/0x4858
[   25.276647]  kasan_atomics+0x198/0x2e0
[   25.276747]  kunit_try_run_case+0x170/0x3f0
[   25.277042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.277176]  kthread+0x328/0x630
[   25.277286]  ret_from_fork+0x10/0x20
[   25.277389] 
[   25.277436] Allocated by task 267:
[   25.277518]  kasan_save_stack+0x3c/0x68
[   25.277621]  kasan_save_track+0x20/0x40
[   25.277805]  kasan_save_alloc_info+0x40/0x58
[   25.278077]  __kasan_kmalloc+0xd4/0xd8
[   25.279146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.279272]  kasan_atomics+0xb8/0x2e0
[   25.279366]  kunit_try_run_case+0x170/0x3f0
[   25.279537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.279804]  kthread+0x328/0x630
[   25.279915]  ret_from_fork+0x10/0x20
[   25.280299] 
[   25.280394] The buggy address belongs to the object at fff00000c78d8480
[   25.280394]  which belongs to the cache kmalloc-64 of size 64
[   25.280860] The buggy address is located 0 bytes to the right of
[   25.280860]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.281665] 
[   25.282019] The buggy address belongs to the physical page:
[   25.282239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.282477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.282617] page_type: f5(slab)
[   25.282723] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.282877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.282991] page dumped because: kasan: bad access detected
[   25.283076] 
[   25.283125] Memory state around the buggy address:
[   25.283208]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.283306]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.283397] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.283470]                                      ^
[   25.285854]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.286335]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.286906] ==================================================================
[   25.619796] ==================================================================
[   25.619942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   25.620081] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.620230] 
[   25.620329] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.620552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.620627] Hardware name: linux,dummy-virt (DT)
[   25.620708] Call trace:
[   25.621759]  show_stack+0x20/0x38 (C)
[   25.622639]  dump_stack_lvl+0x8c/0xd0
[   25.623078]  print_report+0x118/0x608
[   25.623414]  kasan_report+0xdc/0x128
[   25.623967]  kasan_check_range+0x100/0x1a8
[   25.624133]  __kasan_check_write+0x20/0x30
[   25.624607]  kasan_atomics_helper+0x126c/0x4858
[   25.625230]  kasan_atomics+0x198/0x2e0
[   25.625381]  kunit_try_run_case+0x170/0x3f0
[   25.625518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.626337]  kthread+0x328/0x630
[   25.626555]  ret_from_fork+0x10/0x20
[   25.626839] 
[   25.626897] Allocated by task 267:
[   25.626983]  kasan_save_stack+0x3c/0x68
[   25.627090]  kasan_save_track+0x20/0x40
[   25.627189]  kasan_save_alloc_info+0x40/0x58
[   25.627287]  __kasan_kmalloc+0xd4/0xd8
[   25.627419]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.627531]  kasan_atomics+0xb8/0x2e0
[   25.627626]  kunit_try_run_case+0x170/0x3f0
[   25.627740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.627873]  kthread+0x328/0x630
[   25.628007]  ret_from_fork+0x10/0x20
[   25.628134] 
[   25.628196] The buggy address belongs to the object at fff00000c78d8480
[   25.628196]  which belongs to the cache kmalloc-64 of size 64
[   25.628362] The buggy address is located 0 bytes to the right of
[   25.628362]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.628549] 
[   25.628629] The buggy address belongs to the physical page:
[   25.628720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.628878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.629931] page_type: f5(slab)
[   25.630685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.630836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.631265] page dumped because: kasan: bad access detected
[   25.631365] 
[   25.631425] Memory state around the buggy address:
[   25.632139]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.632437]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.632859] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.633242]                                      ^
[   25.633354]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.634148]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.634354] ==================================================================
[   25.583802] ==================================================================
[   25.583952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   25.584086] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.584235] 
[   25.584329] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.584544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.585588] Hardware name: linux,dummy-virt (DT)
[   25.585798] Call trace:
[   25.585891]  show_stack+0x20/0x38 (C)
[   25.586098]  dump_stack_lvl+0x8c/0xd0
[   25.586450]  print_report+0x118/0x608
[   25.586580]  kasan_report+0xdc/0x128
[   25.587556]  kasan_check_range+0x100/0x1a8
[   25.588052]  __kasan_check_write+0x20/0x30
[   25.588287]  kasan_atomics_helper+0x1190/0x4858
[   25.588439]  kasan_atomics+0x198/0x2e0
[   25.588567]  kunit_try_run_case+0x170/0x3f0
[   25.588953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.589161]  kthread+0x328/0x630
[   25.589637]  ret_from_fork+0x10/0x20
[   25.590242] 
[   25.590317] Allocated by task 267:
[   25.590409]  kasan_save_stack+0x3c/0x68
[   25.590533]  kasan_save_track+0x20/0x40
[   25.590631]  kasan_save_alloc_info+0x40/0x58
[   25.591190]  __kasan_kmalloc+0xd4/0xd8
[   25.591443]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.591696]  kasan_atomics+0xb8/0x2e0
[   25.591803]  kunit_try_run_case+0x170/0x3f0
[   25.591911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.592739]  kthread+0x328/0x630
[   25.592933]  ret_from_fork+0x10/0x20
[   25.593171] 
[   25.593260] The buggy address belongs to the object at fff00000c78d8480
[   25.593260]  which belongs to the cache kmalloc-64 of size 64
[   25.593449] The buggy address is located 0 bytes to the right of
[   25.593449]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.593915] 
[   25.593989] The buggy address belongs to the physical page:
[   25.594077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.594219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.594352] page_type: f5(slab)
[   25.594457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.594592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.594710] page dumped because: kasan: bad access detected
[   25.594811] 
[   25.597670] Memory state around the buggy address:
[   25.597912]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.598012]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.598099] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.598190]                                      ^
[   25.598283]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.599576]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.600136] ==================================================================
[   25.720554] ==================================================================
[   25.720702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   25.720844] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.720973] 
[   25.721066] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.721275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.721591] Hardware name: linux,dummy-virt (DT)
[   25.721738] Call trace:
[   25.721808]  show_stack+0x20/0x38 (C)
[   25.721993]  dump_stack_lvl+0x8c/0xd0
[   25.722337]  print_report+0x118/0x608
[   25.722525]  kasan_report+0xdc/0x128
[   25.722638]  kasan_check_range+0x100/0x1a8
[   25.722793]  __kasan_check_write+0x20/0x30
[   25.722979]  kasan_atomics_helper+0x14e4/0x4858
[   25.723130]  kasan_atomics+0x198/0x2e0
[   25.723674]  kunit_try_run_case+0x170/0x3f0
[   25.723868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.724100]  kthread+0x328/0x630
[   25.724303]  ret_from_fork+0x10/0x20
[   25.724906] 
[   25.724975] Allocated by task 267:
[   25.725074]  kasan_save_stack+0x3c/0x68
[   25.725191]  kasan_save_track+0x20/0x40
[   25.725713]  kasan_save_alloc_info+0x40/0x58
[   25.725894]  __kasan_kmalloc+0xd4/0xd8
[   25.726003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.726185]  kasan_atomics+0xb8/0x2e0
[   25.726458]  kunit_try_run_case+0x170/0x3f0
[   25.726614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.726755]  kthread+0x328/0x630
[   25.726845]  ret_from_fork+0x10/0x20
[   25.727015] 
[   25.727090] The buggy address belongs to the object at fff00000c78d8480
[   25.727090]  which belongs to the cache kmalloc-64 of size 64
[   25.727297] The buggy address is located 0 bytes to the right of
[   25.727297]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.727713] 
[   25.727797] The buggy address belongs to the physical page:
[   25.727954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.728098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.728621] page_type: f5(slab)
[   25.728765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.729139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.729369] page dumped because: kasan: bad access detected
[   25.729549] 
[   25.729582] Memory state around the buggy address:
[   25.729630]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.729694]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.729838] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.729932]                                      ^
[   25.730008]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730086]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730172] ==================================================================
[   25.817317] ==================================================================
[   25.817512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   25.817642] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.817774] 
[   25.817865] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.818107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.818243] Hardware name: linux,dummy-virt (DT)
[   25.818367] Call trace:
[   25.818455]  show_stack+0x20/0x38 (C)
[   25.818595]  dump_stack_lvl+0x8c/0xd0
[   25.818780]  print_report+0x118/0x608
[   25.818958]  kasan_report+0xdc/0x128
[   25.819137]  kasan_check_range+0x100/0x1a8
[   25.819537]  __kasan_check_write+0x20/0x30
[   25.819905]  kasan_atomics_helper+0x17ec/0x4858
[   25.820015]  kasan_atomics+0x198/0x2e0
[   25.820115]  kunit_try_run_case+0x170/0x3f0
[   25.820445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.820604]  kthread+0x328/0x630
[   25.820699]  ret_from_fork+0x10/0x20
[   25.820804] 
[   25.820866] Allocated by task 267:
[   25.820939]  kasan_save_stack+0x3c/0x68
[   25.821042]  kasan_save_track+0x20/0x40
[   25.821268]  kasan_save_alloc_info+0x40/0x58
[   25.821516]  __kasan_kmalloc+0xd4/0xd8
[   25.821806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.822120]  kasan_atomics+0xb8/0x2e0
[   25.822195]  kunit_try_run_case+0x170/0x3f0
[   25.822282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.822387]  kthread+0x328/0x630
[   25.822470]  ret_from_fork+0x10/0x20
[   25.822555] 
[   25.822603] The buggy address belongs to the object at fff00000c78d8480
[   25.822603]  which belongs to the cache kmalloc-64 of size 64
[   25.822724] The buggy address is located 0 bytes to the right of
[   25.822724]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.822880] 
[   25.822935] The buggy address belongs to the physical page:
[   25.823006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.823122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.823235] page_type: f5(slab)
[   25.823456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.823943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.824511] page dumped because: kasan: bad access detected
[   25.824720] 
[   25.824827] Memory state around the buggy address:
[   25.825355]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.825502]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.825712] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.826024]                                      ^
[   25.826121]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.826320]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.826572] ==================================================================
[   25.570662] ==================================================================
[   25.570795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   25.570925] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.571052] 
[   25.571143] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.571362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.571437] Hardware name: linux,dummy-virt (DT)
[   25.571520] Call trace:
[   25.571588]  show_stack+0x20/0x38 (C)
[   25.571708]  dump_stack_lvl+0x8c/0xd0
[   25.572050]  print_report+0x118/0x608
[   25.572178]  kasan_report+0xdc/0x128
[   25.572295]  kasan_check_range+0x100/0x1a8
[   25.572419]  __kasan_check_write+0x20/0x30
[   25.572544]  kasan_atomics_helper+0x1128/0x4858
[   25.572669]  kasan_atomics+0x198/0x2e0
[   25.572778]  kunit_try_run_case+0x170/0x3f0
[   25.572883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.573671]  kthread+0x328/0x630
[   25.573949]  ret_from_fork+0x10/0x20
[   25.574133] 
[   25.574192] Allocated by task 267:
[   25.574335]  kasan_save_stack+0x3c/0x68
[   25.574862]  kasan_save_track+0x20/0x40
[   25.574992]  kasan_save_alloc_info+0x40/0x58
[   25.575098]  __kasan_kmalloc+0xd4/0xd8
[   25.575281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.575836]  kasan_atomics+0xb8/0x2e0
[   25.576005]  kunit_try_run_case+0x170/0x3f0
[   25.576142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.576658]  kthread+0x328/0x630
[   25.576846]  ret_from_fork+0x10/0x20
[   25.577295] 
[   25.577373] The buggy address belongs to the object at fff00000c78d8480
[   25.577373]  which belongs to the cache kmalloc-64 of size 64
[   25.577542] The buggy address is located 0 bytes to the right of
[   25.577542]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.578344] 
[   25.578411] The buggy address belongs to the physical page:
[   25.578492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.578612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.578718] page_type: f5(slab)
[   25.578812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.578937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.579864] page dumped because: kasan: bad access detected
[   25.579978] 
[   25.580425] Memory state around the buggy address:
[   25.580706]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581032]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581154] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.581258]                                      ^
[   25.581353]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.582167]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.582346] ==================================================================
[   25.425891] ==================================================================
[   25.426089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   25.426210] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.426319] 
[   25.426415] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.426720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.426801] Hardware name: linux,dummy-virt (DT)
[   25.426874] Call trace:
[   25.426934]  show_stack+0x20/0x38 (C)
[   25.427047]  dump_stack_lvl+0x8c/0xd0
[   25.427160]  print_report+0x118/0x608
[   25.427265]  kasan_report+0xdc/0x128
[   25.427371]  kasan_check_range+0x100/0x1a8
[   25.427476]  __kasan_check_read+0x20/0x30
[   25.427587]  kasan_atomics_helper+0xdd4/0x4858
[   25.427697]  kasan_atomics+0x198/0x2e0
[   25.427819]  kunit_try_run_case+0x170/0x3f0
[   25.427963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.428102]  kthread+0x328/0x630
[   25.428233]  ret_from_fork+0x10/0x20
[   25.428346] 
[   25.429637] Allocated by task 267:
[   25.429771]  kasan_save_stack+0x3c/0x68
[   25.429883]  kasan_save_track+0x20/0x40
[   25.429969]  kasan_save_alloc_info+0x40/0x58
[   25.430050]  __kasan_kmalloc+0xd4/0xd8
[   25.430135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.430229]  kasan_atomics+0xb8/0x2e0
[   25.430310]  kunit_try_run_case+0x170/0x3f0
[   25.430404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.430510]  kthread+0x328/0x630
[   25.430595]  ret_from_fork+0x10/0x20
[   25.430674] 
[   25.430722] The buggy address belongs to the object at fff00000c78d8480
[   25.430722]  which belongs to the cache kmalloc-64 of size 64
[   25.430884] The buggy address is located 0 bytes to the right of
[   25.430884]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.431033] 
[   25.431083] The buggy address belongs to the physical page:
[   25.431153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.431266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.431389] page_type: f5(slab)
[   25.431477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.431581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.431661] page dumped because: kasan: bad access detected
[   25.433295] 
[   25.433372] Memory state around the buggy address:
[   25.433508]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.433697]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.434482] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.434678]                                      ^
[   25.434870]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.434986]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.435085] ==================================================================
[   25.218950] ==================================================================
[   25.219101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   25.219286] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.219451] 
[   25.219570] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.219939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.220015] Hardware name: linux,dummy-virt (DT)
[   25.220102] Call trace:
[   25.220172]  show_stack+0x20/0x38 (C)
[   25.220302]  dump_stack_lvl+0x8c/0xd0
[   25.220422]  print_report+0x118/0x608
[   25.220557]  kasan_report+0xdc/0x128
[   25.220715]  __asan_report_load4_noabort+0x20/0x30
[   25.220856]  kasan_atomics_helper+0x42d8/0x4858
[   25.220969]  kasan_atomics+0x198/0x2e0
[   25.221262]  kunit_try_run_case+0x170/0x3f0
[   25.221434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.221639]  kthread+0x328/0x630
[   25.221827]  ret_from_fork+0x10/0x20
[   25.221940] 
[   25.221978] Allocated by task 267:
[   25.222037]  kasan_save_stack+0x3c/0x68
[   25.222123]  kasan_save_track+0x20/0x40
[   25.222207]  kasan_save_alloc_info+0x40/0x58
[   25.222299]  __kasan_kmalloc+0xd4/0xd8
[   25.222388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.222810]  kthread+0x328/0x630
[   25.223384] 
[   25.223750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.223874] page_type: f5(slab)
[   25.224000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.224132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.224529]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.225312] ==================================================================
[   25.742024] ==================================================================
[   25.742161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   25.742528] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.742716] 
[   25.742835] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.743087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.743348] Hardware name: linux,dummy-virt (DT)
[   25.743441] Call trace:
[   25.743508]  show_stack+0x20/0x38 (C)
[   25.743641]  dump_stack_lvl+0x8c/0xd0
[   25.743806]  print_report+0x118/0x608
[   25.743927]  kasan_report+0xdc/0x128
[   25.744086]  kasan_check_range+0x100/0x1a8
[   25.744286]  __kasan_check_write+0x20/0x30
[   25.744417]  kasan_atomics_helper+0x15b4/0x4858
[   25.744527]  kasan_atomics+0x198/0x2e0
[   25.744640]  kunit_try_run_case+0x170/0x3f0
[   25.744775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.744973]  kthread+0x328/0x630
[   25.745105]  ret_from_fork+0x10/0x20
[   25.745234] 
[   25.745505] Allocated by task 267:
[   25.745603]  kasan_save_stack+0x3c/0x68
[   25.745883]  kasan_save_track+0x20/0x40
[   25.746248]  kasan_save_alloc_info+0x40/0x58
[   25.746453]  __kasan_kmalloc+0xd4/0xd8
[   25.746555]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.746670]  kasan_atomics+0xb8/0x2e0
[   25.746767]  kunit_try_run_case+0x170/0x3f0
[   25.746858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.746941]  kthread+0x328/0x630
[   25.747053]  ret_from_fork+0x10/0x20
[   25.747148] 
[   25.747206] The buggy address belongs to the object at fff00000c78d8480
[   25.747206]  which belongs to the cache kmalloc-64 of size 64
[   25.747365] The buggy address is located 0 bytes to the right of
[   25.747365]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.747536] 
[   25.747590] The buggy address belongs to the physical page:
[   25.747677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.747813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.747939] page_type: f5(slab)
[   25.748102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.748589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.748900] page dumped because: kasan: bad access detected
[   25.749048] 
[   25.749140] Memory state around the buggy address:
[   25.749229]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.749422]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.749538] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.749646]                                      ^
[   25.749755]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749869]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.749970] ==================================================================
[   25.678980] ==================================================================
[   25.679105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   25.679453] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.679617] 
[   25.679717] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.679941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.680012] Hardware name: linux,dummy-virt (DT)
[   25.680098] Call trace:
[   25.680212]  show_stack+0x20/0x38 (C)
[   25.680344]  dump_stack_lvl+0x8c/0xd0
[   25.680467]  print_report+0x118/0x608
[   25.680579]  kasan_report+0xdc/0x128
[   25.680694]  __asan_report_load8_noabort+0x20/0x30
[   25.680822]  kasan_atomics_helper+0x3f04/0x4858
[   25.680942]  kasan_atomics+0x198/0x2e0
[   25.681557]  kunit_try_run_case+0x170/0x3f0
[   25.681924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.682151]  kthread+0x328/0x630
[   25.682274]  ret_from_fork+0x10/0x20
[   25.682407] 
[   25.682459] Allocated by task 267:
[   25.682539]  kasan_save_stack+0x3c/0x68
[   25.682631]  kasan_save_track+0x20/0x40
[   25.682706]  kasan_save_alloc_info+0x40/0x58
[   25.682798]  __kasan_kmalloc+0xd4/0xd8
[   25.682881]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.682983]  kasan_atomics+0xb8/0x2e0
[   25.683081]  kunit_try_run_case+0x170/0x3f0
[   25.683181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.683302]  kthread+0x328/0x630
[   25.683394]  ret_from_fork+0x10/0x20
[   25.683485] 
[   25.684892] The buggy address belongs to the object at fff00000c78d8480
[   25.684892]  which belongs to the cache kmalloc-64 of size 64
[   25.686200] The buggy address is located 0 bytes to the right of
[   25.686200]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.687270] 
[   25.687339] The buggy address belongs to the physical page:
[   25.687417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.687544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.687653] page_type: f5(slab)
[   25.690130] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.690344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.690519] page dumped because: kasan: bad access detected
[   25.690597] 
[   25.690644] Memory state around the buggy address:
[   25.690724]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.690832]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.690929] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.691012]                                      ^
[   25.691085]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.691179]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.691271] ==================================================================
[   25.387910] ==================================================================
[   25.388115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   25.388303] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.388740] 
[   25.388979] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.389203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.389276] Hardware name: linux,dummy-virt (DT)
[   25.389769] Call trace:
[   25.389980]  show_stack+0x20/0x38 (C)
[   25.390591]  dump_stack_lvl+0x8c/0xd0
[   25.390746]  print_report+0x118/0x608
[   25.390961]  kasan_report+0xdc/0x128
[   25.391296]  __asan_report_load4_noabort+0x20/0x30
[   25.391761]  kasan_atomics_helper+0x3dd8/0x4858
[   25.391902]  kasan_atomics+0x198/0x2e0
[   25.392402]  kunit_try_run_case+0x170/0x3f0
[   25.392788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.393231]  kthread+0x328/0x630
[   25.393465]  ret_from_fork+0x10/0x20
[   25.393720] 
[   25.393862] Allocated by task 267:
[   25.394012]  kasan_save_stack+0x3c/0x68
[   25.394292]  kasan_save_track+0x20/0x40
[   25.394462]  kasan_save_alloc_info+0x40/0x58
[   25.394565]  __kasan_kmalloc+0xd4/0xd8
[   25.394782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.395009]  kasan_atomics+0xb8/0x2e0
[   25.395308]  kunit_try_run_case+0x170/0x3f0
[   25.395856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.396000]  kthread+0x328/0x630
[   25.396101]  ret_from_fork+0x10/0x20
[   25.396213] 
[   25.396273] The buggy address belongs to the object at fff00000c78d8480
[   25.396273]  which belongs to the cache kmalloc-64 of size 64
[   25.396440] The buggy address is located 0 bytes to the right of
[   25.396440]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.397108] 
[   25.397241] The buggy address belongs to the physical page:
[   25.397365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.397762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.398364] page_type: f5(slab)
[   25.398689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.398833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.398952] page dumped because: kasan: bad access detected
[   25.399045] 
[   25.399082] Memory state around the buggy address:
[   25.399231]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399344]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399634] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.399942]                                      ^
[   25.400268]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400441]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.400718] ==================================================================
[   25.289212] ==================================================================
[   25.290067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   25.290227] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.291000] 
[   25.291115] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.291674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.291751] Hardware name: linux,dummy-virt (DT)
[   25.291834] Call trace:
[   25.291889]  show_stack+0x20/0x38 (C)
[   25.292009]  dump_stack_lvl+0x8c/0xd0
[   25.292130]  print_report+0x118/0x608
[   25.292230]  kasan_report+0xdc/0x128
[   25.292332]  __asan_report_load4_noabort+0x20/0x30
[   25.292446]  kasan_atomics_helper+0x3dcc/0x4858
[   25.292554]  kasan_atomics+0x198/0x2e0
[   25.293939]  kunit_try_run_case+0x170/0x3f0
[   25.294189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.294738]  kthread+0x328/0x630
[   25.294884]  ret_from_fork+0x10/0x20
[   25.295391] 
[   25.295620] Allocated by task 267:
[   25.295753]  kasan_save_stack+0x3c/0x68
[   25.296188]  kasan_save_track+0x20/0x40
[   25.296334]  kasan_save_alloc_info+0x40/0x58
[   25.296452]  __kasan_kmalloc+0xd4/0xd8
[   25.297123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.297342]  kasan_atomics+0xb8/0x2e0
[   25.297640]  kunit_try_run_case+0x170/0x3f0
[   25.297783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.297905]  kthread+0x328/0x630
[   25.298753]  ret_from_fork+0x10/0x20
[   25.298980] 
[   25.299046] The buggy address belongs to the object at fff00000c78d8480
[   25.299046]  which belongs to the cache kmalloc-64 of size 64
[   25.299848] The buggy address is located 0 bytes to the right of
[   25.299848]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.300068] 
[   25.300136] The buggy address belongs to the physical page:
[   25.300217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.300361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.300497] page_type: f5(slab)
[   25.301019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.302014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.302862] page dumped because: kasan: bad access detected
[   25.303109] 
[   25.303195] Memory state around the buggy address:
[   25.303503]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.303694]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.304200] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.304591]                                      ^
[   25.304900]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.305451]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.305563] ==================================================================
[   25.548101] ==================================================================
[   25.548266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   25.548367] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.548428] 
[   25.548480] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.548583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.548616] Hardware name: linux,dummy-virt (DT)
[   25.548660] Call trace:
[   25.548690]  show_stack+0x20/0x38 (C)
[   25.548790]  dump_stack_lvl+0x8c/0xd0
[   25.548910]  print_report+0x118/0x608
[   25.549029]  kasan_report+0xdc/0x128
[   25.549510]  kasan_check_range+0x100/0x1a8
[   25.549693]  __kasan_check_write+0x20/0x30
[   25.549829]  kasan_atomics_helper+0x1058/0x4858
[   25.549926]  kasan_atomics+0x198/0x2e0
[   25.550052]  kunit_try_run_case+0x170/0x3f0
[   25.550173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.550556]  kthread+0x328/0x630
[   25.551131]  ret_from_fork+0x10/0x20
[   25.551643] 
[   25.551846] Allocated by task 267:
[   25.551978]  kasan_save_stack+0x3c/0x68
[   25.552081]  kasan_save_track+0x20/0x40
[   25.552547]  kasan_save_alloc_info+0x40/0x58
[   25.552669]  __kasan_kmalloc+0xd4/0xd8
[   25.552780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.553240]  kasan_atomics+0xb8/0x2e0
[   25.553506]  kunit_try_run_case+0x170/0x3f0
[   25.553761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.554149]  kthread+0x328/0x630
[   25.554457]  ret_from_fork+0x10/0x20
[   25.554541] 
[   25.554591] The buggy address belongs to the object at fff00000c78d8480
[   25.554591]  which belongs to the cache kmalloc-64 of size 64
[   25.554753] The buggy address is located 0 bytes to the right of
[   25.554753]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.555318] 
[   25.555559] The buggy address belongs to the physical page:
[   25.555931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.556129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.556258] page_type: f5(slab)
[   25.556711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.556967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.557081] page dumped because: kasan: bad access detected
[   25.557164] 
[   25.557216] Memory state around the buggy address:
[   25.557311]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.557432]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.557547] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.557654]                                      ^
[   25.558138]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.558357]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.558571] ==================================================================
[   25.439682] ==================================================================
[   25.439864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   25.440075] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.440276] 
[   25.440369] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.440650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.440758] Hardware name: linux,dummy-virt (DT)
[   25.440834] Call trace:
[   25.440897]  show_stack+0x20/0x38 (C)
[   25.441258]  dump_stack_lvl+0x8c/0xd0
[   25.441812]  print_report+0x118/0x608
[   25.442037]  kasan_report+0xdc/0x128
[   25.442179]  __asan_report_load8_noabort+0x20/0x30
[   25.442317]  kasan_atomics_helper+0x3f58/0x4858
[   25.442444]  kasan_atomics+0x198/0x2e0
[   25.442749]  kunit_try_run_case+0x170/0x3f0
[   25.442879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.443076]  kthread+0x328/0x630
[   25.443250]  ret_from_fork+0x10/0x20
[   25.443434] 
[   25.443509] Allocated by task 267:
[   25.443601]  kasan_save_stack+0x3c/0x68
[   25.443713]  kasan_save_track+0x20/0x40
[   25.443853]  kasan_save_alloc_info+0x40/0x58
[   25.444016]  __kasan_kmalloc+0xd4/0xd8
[   25.444122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.444237]  kasan_atomics+0xb8/0x2e0
[   25.444336]  kunit_try_run_case+0x170/0x3f0
[   25.444505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.444627]  kthread+0x328/0x630
[   25.444734]  ret_from_fork+0x10/0x20
[   25.444818] 
[   25.444865] The buggy address belongs to the object at fff00000c78d8480
[   25.444865]  which belongs to the cache kmalloc-64 of size 64
[   25.445009] The buggy address is located 0 bytes to the right of
[   25.445009]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.445186] 
[   25.445593] The buggy address belongs to the physical page:
[   25.445725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.446001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.446267] page_type: f5(slab)
[   25.446370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.446775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.446947] page dumped because: kasan: bad access detected
[   25.447073] 
[   25.447119] Memory state around the buggy address:
[   25.447192]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.447279]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.447857] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.447970]                                      ^
[   25.448072]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.448201]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.448314] ==================================================================
[   25.807877] ==================================================================
[   25.808221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   25.808355] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.808490] 
[   25.808578] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.808751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.808817] Hardware name: linux,dummy-virt (DT)
[   25.808901] Call trace:
[   25.808958]  show_stack+0x20/0x38 (C)
[   25.809076]  dump_stack_lvl+0x8c/0xd0
[   25.809196]  print_report+0x118/0x608
[   25.809347]  kasan_report+0xdc/0x128
[   25.809520]  __asan_report_load8_noabort+0x20/0x30
[   25.809701]  kasan_atomics_helper+0x3e20/0x4858
[   25.809827]  kasan_atomics+0x198/0x2e0
[   25.809937]  kunit_try_run_case+0x170/0x3f0
[   25.810051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.810262]  kthread+0x328/0x630
[   25.810377]  ret_from_fork+0x10/0x20
[   25.810486] 
[   25.810529] Allocated by task 267:
[   25.810595]  kasan_save_stack+0x3c/0x68
[   25.810688]  kasan_save_track+0x20/0x40
[   25.810770]  kasan_save_alloc_info+0x40/0x58
[   25.810858]  __kasan_kmalloc+0xd4/0xd8
[   25.810939]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.811035]  kasan_atomics+0xb8/0x2e0
[   25.811112]  kunit_try_run_case+0x170/0x3f0
[   25.811202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.811304]  kthread+0x328/0x630
[   25.811385]  ret_from_fork+0x10/0x20
[   25.811467] 
[   25.811516] The buggy address belongs to the object at fff00000c78d8480
[   25.811516]  which belongs to the cache kmalloc-64 of size 64
[   25.811650] The buggy address is located 0 bytes to the right of
[   25.811650]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.811812] 
[   25.811870] The buggy address belongs to the physical page:
[   25.811946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.812071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.812199] page_type: f5(slab)
[   25.812288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.812419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.812516] page dumped because: kasan: bad access detected
[   25.812596] 
[   25.812649] Memory state around the buggy address:
[   25.812725]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.815888]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.816015] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.816194]                                      ^
[   25.816334]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.816507]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.816634] ==================================================================
[   25.253324] ==================================================================
[   25.253632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   25.253816] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.253917] 
[   25.254001] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.254850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.254946] Hardware name: linux,dummy-virt (DT)
[   25.255043] Call trace:
[   25.255113]  show_stack+0x20/0x38 (C)
[   25.255244]  dump_stack_lvl+0x8c/0xd0
[   25.255370]  print_report+0x118/0x608
[   25.255489]  kasan_report+0xdc/0x128
[   25.255612]  kasan_check_range+0x100/0x1a8
[   25.256826]  __kasan_check_write+0x20/0x30
[   25.257572]  kasan_atomics_helper+0xa6c/0x4858
[   25.257887]  kasan_atomics+0x198/0x2e0
[   25.257980]  kunit_try_run_case+0x170/0x3f0
[   25.258799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.259411]  kthread+0x328/0x630
[   25.260169]  ret_from_fork+0x10/0x20
[   25.260971] 
[   25.261197] Allocated by task 267:
[   25.261623]  kasan_save_stack+0x3c/0x68
[   25.262125]  kasan_save_track+0x20/0x40
[   25.262217]  kasan_save_alloc_info+0x40/0x58
[   25.262544]  __kasan_kmalloc+0xd4/0xd8
[   25.262975]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.263539]  kasan_atomics+0xb8/0x2e0
[   25.264317]  kunit_try_run_case+0x170/0x3f0
[   25.264572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.264801]  kthread+0x328/0x630
[   25.265688]  ret_from_fork+0x10/0x20
[   25.266111] 
[   25.266169] The buggy address belongs to the object at fff00000c78d8480
[   25.266169]  which belongs to the cache kmalloc-64 of size 64
[   25.266525] The buggy address is located 0 bytes to the right of
[   25.266525]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.267176] 
[   25.267324] The buggy address belongs to the physical page:
[   25.267635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.268031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.268239] page_type: f5(slab)
[   25.268564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.268987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.269132] page dumped because: kasan: bad access detected
[   25.269219] 
[   25.269307] Memory state around the buggy address:
[   25.269412]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.269879]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.270248] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.271040]                                      ^
[   25.271490]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.272026]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.272432] ==================================================================
[   25.759505] ==================================================================
[   25.759668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   25.759791] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.759898] 
[   25.759976] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.760162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.760238] Hardware name: linux,dummy-virt (DT)
[   25.760318] Call trace:
[   25.760415]  show_stack+0x20/0x38 (C)
[   25.760529]  dump_stack_lvl+0x8c/0xd0
[   25.760705]  print_report+0x118/0x608
[   25.760824]  kasan_report+0xdc/0x128
[   25.760987]  kasan_check_range+0x100/0x1a8
[   25.761103]  __kasan_check_write+0x20/0x30
[   25.761300]  kasan_atomics_helper+0x1644/0x4858
[   25.761499]  kasan_atomics+0x198/0x2e0
[   25.761662]  kunit_try_run_case+0x170/0x3f0
[   25.761859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.762059]  kthread+0x328/0x630
[   25.762236]  ret_from_fork+0x10/0x20
[   25.762667] 
[   25.762779] Allocated by task 267:
[   25.762885]  kasan_save_stack+0x3c/0x68
[   25.763005]  kasan_save_track+0x20/0x40
[   25.763222]  kasan_save_alloc_info+0x40/0x58
[   25.764110]  __kasan_kmalloc+0xd4/0xd8
[   25.766121]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.766289]  kasan_atomics+0xb8/0x2e0
[   25.766842]  kunit_try_run_case+0x170/0x3f0
[   25.766943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.767053]  kthread+0x328/0x630
[   25.767136]  ret_from_fork+0x10/0x20
[   25.767220] 
[   25.767270] The buggy address belongs to the object at fff00000c78d8480
[   25.767270]  which belongs to the cache kmalloc-64 of size 64
[   25.767400] The buggy address is located 0 bytes to the right of
[   25.767400]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.767537] 
[   25.767588] The buggy address belongs to the physical page:
[   25.767660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.767801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.767950] page_type: f5(slab)
[   25.768050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.768188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.768342] page dumped because: kasan: bad access detected
[   25.768475] 
[   25.768556] Memory state around the buggy address:
[   25.768693]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.768827]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.768941] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.769047]                                      ^
[   25.769357]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.769459]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.769547] ==================================================================
[   25.559407] ==================================================================
[   25.559721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   25.560405] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.560601] 
[   25.560698] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.561026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.561109] Hardware name: linux,dummy-virt (DT)
[   25.561199] Call trace:
[   25.561262]  show_stack+0x20/0x38 (C)
[   25.561397]  dump_stack_lvl+0x8c/0xd0
[   25.561643]  print_report+0x118/0x608
[   25.562004]  kasan_report+0xdc/0x128
[   25.562493]  kasan_check_range+0x100/0x1a8
[   25.562639]  __kasan_check_write+0x20/0x30
[   25.562815]  kasan_atomics_helper+0x10c0/0x4858
[   25.562989]  kasan_atomics+0x198/0x2e0
[   25.563114]  kunit_try_run_case+0x170/0x3f0
[   25.563270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.563664]  kthread+0x328/0x630
[   25.563961]  ret_from_fork+0x10/0x20
[   25.564180] 
[   25.564245] Allocated by task 267:
[   25.564552]  kasan_save_stack+0x3c/0x68
[   25.564674]  kasan_save_track+0x20/0x40
[   25.564838]  kasan_save_alloc_info+0x40/0x58
[   25.564942]  __kasan_kmalloc+0xd4/0xd8
[   25.565086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.565266]  kasan_atomics+0xb8/0x2e0
[   25.565385]  kunit_try_run_case+0x170/0x3f0
[   25.565491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.565594]  kthread+0x328/0x630
[   25.565710]  ret_from_fork+0x10/0x20
[   25.565811] 
[   25.565864] The buggy address belongs to the object at fff00000c78d8480
[   25.565864]  which belongs to the cache kmalloc-64 of size 64
[   25.566036] The buggy address is located 0 bytes to the right of
[   25.566036]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.566229] 
[   25.566551] The buggy address belongs to the physical page:
[   25.566660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.566955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.567619] page_type: f5(slab)
[   25.567737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.567856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.567969] page dumped because: kasan: bad access detected
[   25.568059] 
[   25.568124] Memory state around the buggy address:
[   25.568219]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.568333]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.568539] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.568692]                                      ^
[   25.569095]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.570178]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.570272] ==================================================================
[   25.402323] ==================================================================
[   25.402453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   25.402591] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.402709] 
[   25.403020] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.403238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.403306] Hardware name: linux,dummy-virt (DT)
[   25.403389] Call trace:
[   25.403496]  show_stack+0x20/0x38 (C)
[   25.403629]  dump_stack_lvl+0x8c/0xd0
[   25.403752]  print_report+0x118/0x608
[   25.404161]  kasan_report+0xdc/0x128
[   25.404298]  kasan_check_range+0x100/0x1a8
[   25.404423]  __kasan_check_write+0x20/0x30
[   25.404555]  kasan_atomics_helper+0xd3c/0x4858
[   25.404681]  kasan_atomics+0x198/0x2e0
[   25.404802]  kunit_try_run_case+0x170/0x3f0
[   25.404935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.405067]  kthread+0x328/0x630
[   25.405172]  ret_from_fork+0x10/0x20
[   25.405303] 
[   25.405360] Allocated by task 267:
[   25.405438]  kasan_save_stack+0x3c/0x68
[   25.405543]  kasan_save_track+0x20/0x40
[   25.405641]  kasan_save_alloc_info+0x40/0x58
[   25.405752]  __kasan_kmalloc+0xd4/0xd8
[   25.405847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.405955]  kasan_atomics+0xb8/0x2e0
[   25.406048]  kunit_try_run_case+0x170/0x3f0
[   25.406152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.406267]  kthread+0x328/0x630
[   25.406357]  ret_from_fork+0x10/0x20
[   25.406450] 
[   25.406501] The buggy address belongs to the object at fff00000c78d8480
[   25.406501]  which belongs to the cache kmalloc-64 of size 64
[   25.406655] The buggy address is located 0 bytes to the right of
[   25.406655]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.406847] 
[   25.406907] The buggy address belongs to the physical page:
[   25.407209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.407346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.407466] page_type: f5(slab)
[   25.408079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.408261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.408554] page dumped because: kasan: bad access detected
[   25.408639] 
[   25.408702] Memory state around the buggy address:
[   25.408944]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.409112]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.409203] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.409294]                                      ^
[   25.409549]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.409652]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.409751] ==================================================================
[   25.798428] ==================================================================
[   25.798558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   25.798686] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.799441] 
[   25.799925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.800244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.800322] Hardware name: linux,dummy-virt (DT)
[   25.800609] Call trace:
[   25.800677]  show_stack+0x20/0x38 (C)
[   25.801171]  dump_stack_lvl+0x8c/0xd0
[   25.801528]  print_report+0x118/0x608
[   25.801710]  kasan_report+0xdc/0x128
[   25.802042]  kasan_check_range+0x100/0x1a8
[   25.802218]  __kasan_check_write+0x20/0x30
[   25.802582]  kasan_atomics_helper+0x175c/0x4858
[   25.802949]  kasan_atomics+0x198/0x2e0
[   25.803227]  kunit_try_run_case+0x170/0x3f0
[   25.803408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.803634]  kthread+0x328/0x630
[   25.804165]  ret_from_fork+0x10/0x20
[   25.804506] 
[   25.804564] Allocated by task 267:
[   25.804717]  kasan_save_stack+0x3c/0x68
[   25.805044]  kasan_save_track+0x20/0x40
[   25.805162]  kasan_save_alloc_info+0x40/0x58
[   25.805266]  __kasan_kmalloc+0xd4/0xd8
[   25.805371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.805470]  kasan_atomics+0xb8/0x2e0
[   25.805563]  kunit_try_run_case+0x170/0x3f0
[   25.805922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.806056]  kthread+0x328/0x630
[   25.806155]  ret_from_fork+0x10/0x20
[   25.806209] 
[   25.806258] The buggy address belongs to the object at fff00000c78d8480
[   25.806258]  which belongs to the cache kmalloc-64 of size 64
[   25.806344] The buggy address is located 0 bytes to the right of
[   25.806344]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.806417] 
[   25.806446] The buggy address belongs to the physical page:
[   25.806485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.806549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.806612] page_type: f5(slab)
[   25.806662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.806722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.806808] page dumped because: kasan: bad access detected
[   25.806864] 
[   25.806890] Memory state around the buggy address:
[   25.806931]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.806983]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.807034] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.807080]                                      ^
[   25.807121]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.807171]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.807216] ==================================================================
[   25.750601] ==================================================================
[   25.750977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   25.751208] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.751397] 
[   25.751537] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.751966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.752364] Hardware name: linux,dummy-virt (DT)
[   25.752431] Call trace:
[   25.752464]  show_stack+0x20/0x38 (C)
[   25.752538]  dump_stack_lvl+0x8c/0xd0
[   25.752660]  print_report+0x118/0x608
[   25.752865]  kasan_report+0xdc/0x128
[   25.752977]  __asan_report_load8_noabort+0x20/0x30
[   25.753103]  kasan_atomics_helper+0x3db0/0x4858
[   25.753231]  kasan_atomics+0x198/0x2e0
[   25.753445]  kunit_try_run_case+0x170/0x3f0
[   25.753847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.754254]  kthread+0x328/0x630
[   25.754412]  ret_from_fork+0x10/0x20
[   25.754560] 
[   25.754636] Allocated by task 267:
[   25.754714]  kasan_save_stack+0x3c/0x68
[   25.754872]  kasan_save_track+0x20/0x40
[   25.754978]  kasan_save_alloc_info+0x40/0x58
[   25.755104]  __kasan_kmalloc+0xd4/0xd8
[   25.755214]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.755362]  kasan_atomics+0xb8/0x2e0
[   25.755442]  kunit_try_run_case+0x170/0x3f0
[   25.755518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.755604]  kthread+0x328/0x630
[   25.755710]  ret_from_fork+0x10/0x20
[   25.755813] 
[   25.756098] The buggy address belongs to the object at fff00000c78d8480
[   25.756098]  which belongs to the cache kmalloc-64 of size 64
[   25.756279] The buggy address is located 0 bytes to the right of
[   25.756279]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.756453] 
[   25.756529] The buggy address belongs to the physical page:
[   25.756652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.756869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.757047] page_type: f5(slab)
[   25.757151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.757345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.757452] page dumped because: kasan: bad access detected
[   25.757536] 
[   25.757594] Memory state around the buggy address:
[   25.757903]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.758032]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.758193] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.758289]                                      ^
[   25.758389]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.758646]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.758815] ==================================================================
[   25.696652] ==================================================================
[   25.697539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   25.697698] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.697845] 
[   25.698282] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.698507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.698573] Hardware name: linux,dummy-virt (DT)
[   25.698640] Call trace:
[   25.698693]  show_stack+0x20/0x38 (C)
[   25.698828]  dump_stack_lvl+0x8c/0xd0
[   25.698947]  print_report+0x118/0x608
[   25.699044]  kasan_report+0xdc/0x128
[   25.699129]  kasan_check_range+0x100/0x1a8
[   25.699200]  __kasan_check_write+0x20/0x30
[   25.699253]  kasan_atomics_helper+0x1414/0x4858
[   25.699309]  kasan_atomics+0x198/0x2e0
[   25.699358]  kunit_try_run_case+0x170/0x3f0
[   25.699417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.699478]  kthread+0x328/0x630
[   25.699530]  ret_from_fork+0x10/0x20
[   25.699589] 
[   25.699613] Allocated by task 267:
[   25.699650]  kasan_save_stack+0x3c/0x68
[   25.699701]  kasan_save_track+0x20/0x40
[   25.701066]  kasan_save_alloc_info+0x40/0x58
[   25.701181]  __kasan_kmalloc+0xd4/0xd8
[   25.701265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.701350]  kasan_atomics+0xb8/0x2e0
[   25.701427]  kunit_try_run_case+0x170/0x3f0
[   25.701519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.701627]  kthread+0x328/0x630
[   25.701699]  ret_from_fork+0x10/0x20
[   25.702892] 
[   25.702953] The buggy address belongs to the object at fff00000c78d8480
[   25.702953]  which belongs to the cache kmalloc-64 of size 64
[   25.704143] The buggy address is located 0 bytes to the right of
[   25.704143]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.705089] 
[   25.705165] The buggy address belongs to the physical page:
[   25.705247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.705404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.705579] page_type: f5(slab)
[   25.705689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.706348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.706479] page dumped because: kasan: bad access detected
[   25.706564] 
[   25.706620] Memory state around the buggy address:
[   25.706705]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.706841]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.706949] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.707386]                                      ^
[   25.707518]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.707626]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.707997] ==================================================================
[   25.730702] ==================================================================
[   25.730830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   25.730989] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.731363] 
[   25.731523] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.732026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.732138] Hardware name: linux,dummy-virt (DT)
[   25.732270] Call trace:
[   25.732356]  show_stack+0x20/0x38 (C)
[   25.732492]  dump_stack_lvl+0x8c/0xd0
[   25.732608]  print_report+0x118/0x608
[   25.732722]  kasan_report+0xdc/0x128
[   25.732999]  kasan_check_range+0x100/0x1a8
[   25.733423]  __kasan_check_write+0x20/0x30
[   25.733966]  kasan_atomics_helper+0x154c/0x4858
[   25.734189]  kasan_atomics+0x198/0x2e0
[   25.734379]  kunit_try_run_case+0x170/0x3f0
[   25.734587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.734907]  kthread+0x328/0x630
[   25.735155]  ret_from_fork+0x10/0x20
[   25.735356] 
[   25.735597] Allocated by task 267:
[   25.735961]  kasan_save_stack+0x3c/0x68
[   25.736246]  kasan_save_track+0x20/0x40
[   25.736441]  kasan_save_alloc_info+0x40/0x58
[   25.736618]  __kasan_kmalloc+0xd4/0xd8
[   25.736716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.737033]  kasan_atomics+0xb8/0x2e0
[   25.737357]  kunit_try_run_case+0x170/0x3f0
[   25.737436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.737490]  kthread+0x328/0x630
[   25.737547]  ret_from_fork+0x10/0x20
[   25.737647] 
[   25.737754] The buggy address belongs to the object at fff00000c78d8480
[   25.737754]  which belongs to the cache kmalloc-64 of size 64
[   25.737928] The buggy address is located 0 bytes to the right of
[   25.737928]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.738080] 
[   25.738126] The buggy address belongs to the physical page:
[   25.738192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.738311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.738440] page_type: f5(slab)
[   25.738554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.738771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.738960] page dumped because: kasan: bad access detected
[   25.739055] 
[   25.739119] Memory state around the buggy address:
[   25.739261]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.739382]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.739501] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.739619]                                      ^
[   25.739755]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.739856]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.739987] ==================================================================
[   25.233100] ==================================================================
[   25.233285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   25.233444] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.233578] 
[   25.233678] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.233932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.234023] Hardware name: linux,dummy-virt (DT)
[   25.234141] Call trace:
[   25.234465]  show_stack+0x20/0x38 (C)
[   25.234794]  dump_stack_lvl+0x8c/0xd0
[   25.235022]  print_report+0x118/0x608
[   25.235159]  kasan_report+0xdc/0x128
[   25.235464]  kasan_check_range+0x100/0x1a8
[   25.235583]  __kasan_check_write+0x20/0x30
[   25.235815]  kasan_atomics_helper+0x99c/0x4858
[   25.236078]  kasan_atomics+0x198/0x2e0
[   25.236281]  kunit_try_run_case+0x170/0x3f0
[   25.236442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.236671]  kthread+0x328/0x630
[   25.237039]  ret_from_fork+0x10/0x20
[   25.237300] 
[   25.237440] Allocated by task 267:
[   25.237523]  kasan_save_stack+0x3c/0x68
[   25.237648]  kasan_save_track+0x20/0x40
[   25.237750]  kasan_save_alloc_info+0x40/0x58
[   25.237835]  __kasan_kmalloc+0xd4/0xd8
[   25.237904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.238265]  kasan_atomics+0xb8/0x2e0
[   25.238460]  kunit_try_run_case+0x170/0x3f0
[   25.238583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.238694]  kthread+0x328/0x630
[   25.239273]  ret_from_fork+0x10/0x20
[   25.239426] 
[   25.239490] The buggy address belongs to the object at fff00000c78d8480
[   25.239490]  which belongs to the cache kmalloc-64 of size 64
[   25.239853] The buggy address is located 0 bytes to the right of
[   25.239853]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.240021] 
[   25.240174] The buggy address belongs to the physical page:
[   25.240271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.240513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.240717] page_type: f5(slab)
[   25.240923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.241453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.241678] page dumped because: kasan: bad access detected
[   25.241820] 
[   25.241994] Memory state around the buggy address:
[   25.242093]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.242232]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.242466] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.242569]                                      ^
[   25.242642]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.242754]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.242855] ==================================================================
[   25.708811] ==================================================================
[   25.708958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   25.709088] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.709223] 
[   25.709445] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.709798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.709953] Hardware name: linux,dummy-virt (DT)
[   25.710134] Call trace:
[   25.710232]  show_stack+0x20/0x38 (C)
[   25.710379]  dump_stack_lvl+0x8c/0xd0
[   25.710499]  print_report+0x118/0x608
[   25.710593]  kasan_report+0xdc/0x128
[   25.710677]  kasan_check_range+0x100/0x1a8
[   25.710788]  __kasan_check_write+0x20/0x30
[   25.710905]  kasan_atomics_helper+0x147c/0x4858
[   25.711387]  kasan_atomics+0x198/0x2e0
[   25.711825]  kunit_try_run_case+0x170/0x3f0
[   25.712154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.712538]  kthread+0x328/0x630
[   25.712790]  ret_from_fork+0x10/0x20
[   25.713120] 
[   25.713285] Allocated by task 267:
[   25.713356]  kasan_save_stack+0x3c/0x68
[   25.713460]  kasan_save_track+0x20/0x40
[   25.713553]  kasan_save_alloc_info+0x40/0x58
[   25.713663]  __kasan_kmalloc+0xd4/0xd8
[   25.713774]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.713958]  kasan_atomics+0xb8/0x2e0
[   25.714169]  kunit_try_run_case+0x170/0x3f0
[   25.714368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.714683]  kthread+0x328/0x630
[   25.715010]  ret_from_fork+0x10/0x20
[   25.715111] 
[   25.715592] The buggy address belongs to the object at fff00000c78d8480
[   25.715592]  which belongs to the cache kmalloc-64 of size 64
[   25.715788] The buggy address is located 0 bytes to the right of
[   25.715788]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.715968] 
[   25.716026] The buggy address belongs to the physical page:
[   25.716123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.716265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.716393] page_type: f5(slab)
[   25.716492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.716618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.717336] page dumped because: kasan: bad access detected
[   25.717550] 
[   25.717609] Memory state around the buggy address:
[   25.717911]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.718375]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.718627] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.718813]                                      ^
[   25.719230]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.719549]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.719666] ==================================================================
[   25.770693] ==================================================================
[   25.770838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   25.770958] Read of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.771077] 
[   25.771172] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.771371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.771439] Hardware name: linux,dummy-virt (DT)
[   25.771512] Call trace:
[   25.771567]  show_stack+0x20/0x38 (C)
[   25.771676]  dump_stack_lvl+0x8c/0xd0
[   25.772217]  print_report+0x118/0x608
[   25.772400]  kasan_report+0xdc/0x128
[   25.772577]  __asan_report_load8_noabort+0x20/0x30
[   25.773133]  kasan_atomics_helper+0x3df4/0x4858
[   25.773327]  kasan_atomics+0x198/0x2e0
[   25.773426]  kunit_try_run_case+0x170/0x3f0
[   25.773521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.773663]  kthread+0x328/0x630
[   25.773787]  ret_from_fork+0x10/0x20
[   25.773930] 
[   25.774004] Allocated by task 267:
[   25.774089]  kasan_save_stack+0x3c/0x68
[   25.774194]  kasan_save_track+0x20/0x40
[   25.774281]  kasan_save_alloc_info+0x40/0x58
[   25.774396]  __kasan_kmalloc+0xd4/0xd8
[   25.774529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.774692]  kasan_atomics+0xb8/0x2e0
[   25.774798]  kunit_try_run_case+0x170/0x3f0
[   25.774905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.775024]  kthread+0x328/0x630
[   25.775118]  ret_from_fork+0x10/0x20
[   25.775228] 
[   25.775298] The buggy address belongs to the object at fff00000c78d8480
[   25.775298]  which belongs to the cache kmalloc-64 of size 64
[   25.775537] The buggy address is located 0 bytes to the right of
[   25.775537]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.775734] 
[   25.775800] The buggy address belongs to the physical page:
[   25.775887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.776032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.776180] page_type: f5(slab)
[   25.776286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.776423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.776538] page dumped because: kasan: bad access detected
[   25.776623] 
[   25.776675] Memory state around the buggy address:
[   25.776777]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.776902]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.777827] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.777953]                                      ^
[   25.778043]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.778162]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.778267] ==================================================================
[   25.007154] ==================================================================
[   25.008795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   25.008999] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.009634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.009713] Hardware name: linux,dummy-virt (DT)
[   25.010037]  dump_stack_lvl+0x8c/0xd0
[   25.011369]  kthread+0x328/0x630
[   25.011546] 
[   25.011763]  kasan_save_track+0x20/0x40
[   25.012002]  __kasan_kmalloc+0xd4/0xd8
[   25.012716]  kthread+0x328/0x630
[   25.013129] The buggy address is located 0 bytes to the right of
[   25.013129]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.013329] 
[   25.013387] The buggy address belongs to the physical page:
[   25.013499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.013649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.013814] page_type: f5(slab)
[   25.013909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.014118] page dumped because: kasan: bad access detected
[   25.014481]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.014583] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.014876]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.015087] ==================================================================
[   25.778975] ==================================================================
[   25.779161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   25.779285] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.779402] 
[   25.779478] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.779694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.779843] Hardware name: linux,dummy-virt (DT)
[   25.779943] Call trace:
[   25.780008]  show_stack+0x20/0x38 (C)
[   25.780137]  dump_stack_lvl+0x8c/0xd0
[   25.780254]  print_report+0x118/0x608
[   25.780383]  kasan_report+0xdc/0x128
[   25.780534]  kasan_check_range+0x100/0x1a8
[   25.780693]  __kasan_check_write+0x20/0x30
[   25.781051]  kasan_atomics_helper+0x16d0/0x4858
[   25.781219]  kasan_atomics+0x198/0x2e0
[   25.781424]  kunit_try_run_case+0x170/0x3f0
[   25.781562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.781738]  kthread+0x328/0x630
[   25.781877]  ret_from_fork+0x10/0x20
[   25.781995] 
[   25.782040] Allocated by task 267:
[   25.782098]  kasan_save_stack+0x3c/0x68
[   25.782191]  kasan_save_track+0x20/0x40
[   25.782279]  kasan_save_alloc_info+0x40/0x58
[   25.782406]  __kasan_kmalloc+0xd4/0xd8
[   25.782522]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.782663]  kasan_atomics+0xb8/0x2e0
[   25.782794]  kunit_try_run_case+0x170/0x3f0
[   25.782932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.783107]  kthread+0x328/0x630
[   25.783198]  ret_from_fork+0x10/0x20
[   25.783324] 
[   25.783392] The buggy address belongs to the object at fff00000c78d8480
[   25.783392]  which belongs to the cache kmalloc-64 of size 64
[   25.783554] The buggy address is located 0 bytes to the right of
[   25.783554]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.783743] 
[   25.783834] The buggy address belongs to the physical page:
[   25.783957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.784179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.784380] page_type: f5(slab)
[   25.784476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.784607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.784755] page dumped because: kasan: bad access detected
[   25.784840] 
[   25.784929] Memory state around the buggy address:
[   25.785029]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.785144]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.785392] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.785535]                                      ^
[   25.785640]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.785774]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.785874] ==================================================================
[   25.506485] ==================================================================
[   25.507268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   25.507576] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.507746] 
[   25.507846] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.508068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.508153] Hardware name: linux,dummy-virt (DT)
[   25.508238] Call trace:
[   25.508307]  show_stack+0x20/0x38 (C)
[   25.508432]  dump_stack_lvl+0x8c/0xd0
[   25.508557]  print_report+0x118/0x608
[   25.508671]  kasan_report+0xdc/0x128
[   25.508802]  kasan_check_range+0x100/0x1a8
[   25.508923]  __kasan_check_write+0x20/0x30
[   25.509046]  kasan_atomics_helper+0xf88/0x4858
[   25.509169]  kasan_atomics+0x198/0x2e0
[   25.509280]  kunit_try_run_case+0x170/0x3f0
[   25.511334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.511659]  kthread+0x328/0x630
[   25.511965]  ret_from_fork+0x10/0x20
[   25.512234] 
[   25.512292] Allocated by task 267:
[   25.512380]  kasan_save_stack+0x3c/0x68
[   25.512491]  kasan_save_track+0x20/0x40
[   25.513088]  kasan_save_alloc_info+0x40/0x58
[   25.513544]  __kasan_kmalloc+0xd4/0xd8
[   25.513698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.514407]  kasan_atomics+0xb8/0x2e0
[   25.514664]  kunit_try_run_case+0x170/0x3f0
[   25.515127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.515290]  kthread+0x328/0x630
[   25.515387]  ret_from_fork+0x10/0x20
[   25.515485] 
[   25.515982] The buggy address belongs to the object at fff00000c78d8480
[   25.515982]  which belongs to the cache kmalloc-64 of size 64
[   25.516188] The buggy address is located 0 bytes to the right of
[   25.516188]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.516991] 
[   25.517522] The buggy address belongs to the physical page:
[   25.518054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.518198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.518499] page_type: f5(slab)
[   25.519492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.519670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.519798] page dumped because: kasan: bad access detected
[   25.520311] 
[   25.520524] Memory state around the buggy address:
[   25.520792]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521265]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521387] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.521476]                                      ^
[   25.521843]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.522178]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.522631] ==================================================================
[   25.109620] ==================================================================
[   25.111781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   25.117113] 
[   25.119092]  kthread+0x328/0x630
[   25.125096] ==================================================================
[   25.488830] ==================================================================
[   25.489313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   25.489947] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.490085] 
[   25.490172] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.490372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.490777] Hardware name: linux,dummy-virt (DT)
[   25.491472] Call trace:
[   25.491567]  show_stack+0x20/0x38 (C)
[   25.491976]  dump_stack_lvl+0x8c/0xd0
[   25.492337]  print_report+0x118/0x608
[   25.492907]  kasan_report+0xdc/0x128
[   25.493060]  kasan_check_range+0x100/0x1a8
[   25.493177]  __kasan_check_write+0x20/0x30
[   25.493605]  kasan_atomics_helper+0xf20/0x4858
[   25.493769]  kasan_atomics+0x198/0x2e0
[   25.493896]  kunit_try_run_case+0x170/0x3f0
[   25.494557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.494700]  kthread+0x328/0x630
[   25.494819]  ret_from_fork+0x10/0x20
[   25.494938] 
[   25.495690] Allocated by task 267:
[   25.495969]  kasan_save_stack+0x3c/0x68
[   25.496264]  kasan_save_track+0x20/0x40
[   25.496378]  kasan_save_alloc_info+0x40/0x58
[   25.496481]  __kasan_kmalloc+0xd4/0xd8
[   25.497055]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.497461]  kasan_atomics+0xb8/0x2e0
[   25.497709]  kunit_try_run_case+0x170/0x3f0
[   25.497837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.497952]  kthread+0x328/0x630
[   25.498049]  ret_from_fork+0x10/0x20
[   25.498851] 
[   25.498926] The buggy address belongs to the object at fff00000c78d8480
[   25.498926]  which belongs to the cache kmalloc-64 of size 64
[   25.499079] The buggy address is located 0 bytes to the right of
[   25.499079]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.499644] 
[   25.499767] The buggy address belongs to the physical page:
[   25.500267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.500427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.501410] page_type: f5(slab)
[   25.501768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.502315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.502426] page dumped because: kasan: bad access detected
[   25.502508] 
[   25.502557] Memory state around the buggy address:
[   25.502653]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.502812]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.503791] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.504158]                                      ^
[   25.504279]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.504403]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.504918] ==================================================================
[   25.600851] ==================================================================
[   25.601963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   25.602232] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.602374] 
[   25.602722] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.603229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.603587] Hardware name: linux,dummy-virt (DT)
[   25.603686] Call trace:
[   25.604181]  show_stack+0x20/0x38 (C)
[   25.604338]  dump_stack_lvl+0x8c/0xd0
[   25.604507]  print_report+0x118/0x608
[   25.605052]  kasan_report+0xdc/0x128
[   25.605339]  kasan_check_range+0x100/0x1a8
[   25.605489]  __kasan_check_write+0x20/0x30
[   25.605617]  kasan_atomics_helper+0x11f8/0x4858
[   25.606261]  kasan_atomics+0x198/0x2e0
[   25.606399]  kunit_try_run_case+0x170/0x3f0
[   25.606503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.606623]  kthread+0x328/0x630
[   25.606744]  ret_from_fork+0x10/0x20
[   25.607767] 
[   25.607936] Allocated by task 267:
[   25.608037]  kasan_save_stack+0x3c/0x68
[   25.608168]  kasan_save_track+0x20/0x40
[   25.608693]  kasan_save_alloc_info+0x40/0x58
[   25.609030]  __kasan_kmalloc+0xd4/0xd8
[   25.609424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.609559]  kasan_atomics+0xb8/0x2e0
[   25.609660]  kunit_try_run_case+0x170/0x3f0
[   25.609758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.609853]  kthread+0x328/0x630
[   25.609932]  ret_from_fork+0x10/0x20
[   25.610019] 
[   25.610077] The buggy address belongs to the object at fff00000c78d8480
[   25.610077]  which belongs to the cache kmalloc-64 of size 64
[   25.610841] The buggy address is located 0 bytes to the right of
[   25.610841]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.611043] 
[   25.611105] The buggy address belongs to the physical page:
[   25.611190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.612583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.612987] page_type: f5(slab)
[   25.613124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.613518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.613960] page dumped because: kasan: bad access detected
[   25.614081] 
[   25.614423] Memory state around the buggy address:
[   25.614523]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.614653]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.615210] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.615581]                                      ^
[   25.615681]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.615806]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.615917] ==================================================================
[   25.661167] ==================================================================
[   25.661546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   25.661950] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.662054] 
[   25.662939] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.663191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.663263] Hardware name: linux,dummy-virt (DT)
[   25.663344] Call trace:
[   25.663415]  show_stack+0x20/0x38 (C)
[   25.663549]  dump_stack_lvl+0x8c/0xd0
[   25.663677]  print_report+0x118/0x608
[   25.664704]  kasan_report+0xdc/0x128
[   25.665624]  kasan_check_range+0x100/0x1a8
[   25.666501]  __kasan_check_write+0x20/0x30
[   25.666743]  kasan_atomics_helper+0x1384/0x4858
[   25.667070]  kasan_atomics+0x198/0x2e0
[   25.667349]  kunit_try_run_case+0x170/0x3f0
[   25.667750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.668161]  kthread+0x328/0x630
[   25.668771]  ret_from_fork+0x10/0x20
[   25.669322] 
[   25.669456] Allocated by task 267:
[   25.669678]  kasan_save_stack+0x3c/0x68
[   25.670520]  kasan_save_track+0x20/0x40
[   25.670776]  kasan_save_alloc_info+0x40/0x58
[   25.670879]  __kasan_kmalloc+0xd4/0xd8
[   25.670974]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.671515]  kasan_atomics+0xb8/0x2e0
[   25.671620]  kunit_try_run_case+0x170/0x3f0
[   25.672780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.673450]  kthread+0x328/0x630
[   25.674046]  ret_from_fork+0x10/0x20
[   25.674180] 
[   25.674239] The buggy address belongs to the object at fff00000c78d8480
[   25.674239]  which belongs to the cache kmalloc-64 of size 64
[   25.674708] The buggy address is located 0 bytes to the right of
[   25.674708]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.676862] 
[   25.676926] The buggy address belongs to the physical page:
[   25.677006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.677121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.677188] page_type: f5(slab)
[   25.677259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.677393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.677530] page dumped because: kasan: bad access detected
[   25.677623] 
[   25.677675] Memory state around the buggy address:
[   25.677779]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.677900]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.678012] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.678134]                                      ^
[   25.678228]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.678319]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.678395] ==================================================================
[   25.457211] ==================================================================
[   25.458437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   25.458643] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.458792] 
[   25.458884] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.459053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.459109] Hardware name: linux,dummy-virt (DT)
[   25.459171] Call trace:
[   25.459220]  show_stack+0x20/0x38 (C)
[   25.459342]  dump_stack_lvl+0x8c/0xd0
[   25.459496]  print_report+0x118/0x608
[   25.459671]  kasan_report+0xdc/0x128
[   25.459854]  __asan_report_store8_noabort+0x20/0x30
[   25.460046]  kasan_atomics_helper+0x3e5c/0x4858
[   25.460191]  kasan_atomics+0x198/0x2e0
[   25.460310]  kunit_try_run_case+0x170/0x3f0
[   25.460439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.460576]  kthread+0x328/0x630
[   25.460689]  ret_from_fork+0x10/0x20
[   25.460816] 
[   25.460867] Allocated by task 267:
[   25.460941]  kasan_save_stack+0x3c/0x68
[   25.461067]  kasan_save_track+0x20/0x40
[   25.461616]  kasan_save_alloc_info+0x40/0x58
[   25.461811]  __kasan_kmalloc+0xd4/0xd8
[   25.461945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.462059]  kasan_atomics+0xb8/0x2e0
[   25.462153]  kunit_try_run_case+0x170/0x3f0
[   25.462257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.462367]  kthread+0x328/0x630
[   25.462442]  ret_from_fork+0x10/0x20
[   25.463109] 
[   25.463180] The buggy address belongs to the object at fff00000c78d8480
[   25.463180]  which belongs to the cache kmalloc-64 of size 64
[   25.463339] The buggy address is located 0 bytes to the right of
[   25.463339]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.463514] 
[   25.463568] The buggy address belongs to the physical page:
[   25.463667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.463889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.464087] page_type: f5(slab)
[   25.464221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.464357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.464524] page dumped because: kasan: bad access detected
[   25.464650] 
[   25.464725] Memory state around the buggy address:
[   25.464815]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.464934]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.465104] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.465203]                                      ^
[   25.465299]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.465610]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.465848] ==================================================================
[   25.245088] ==================================================================
[   25.245169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   25.245243] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.245835] 
[   25.245960] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.246188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.246268] Hardware name: linux,dummy-virt (DT)
[   25.246354] Call trace:
[   25.246441]  show_stack+0x20/0x38 (C)
[   25.246579]  dump_stack_lvl+0x8c/0xd0
[   25.246705]  print_report+0x118/0x608
[   25.246844]  kasan_report+0xdc/0x128
[   25.246964]  kasan_check_range+0x100/0x1a8
[   25.247101]  __kasan_check_write+0x20/0x30
[   25.247250]  kasan_atomics_helper+0xa04/0x4858
[   25.247382]  kasan_atomics+0x198/0x2e0
[   25.247498]  kunit_try_run_case+0x170/0x3f0
[   25.247649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.248515]  kthread+0x328/0x630
[   25.248787]  ret_from_fork+0x10/0x20
[   25.248982] 
[   25.249041] Allocated by task 267:
[   25.249353]  kasan_save_stack+0x3c/0x68
[   25.249455]  kasan_save_track+0x20/0x40
[   25.249567]  kasan_save_alloc_info+0x40/0x58
[   25.249710]  __kasan_kmalloc+0xd4/0xd8
[   25.249837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.249947]  kasan_atomics+0xb8/0x2e0
[   25.250036]  kunit_try_run_case+0x170/0x3f0
[   25.250144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.250239]  kthread+0x328/0x630
[   25.250309]  ret_from_fork+0x10/0x20
[   25.250372] 
[   25.250413] The buggy address belongs to the object at fff00000c78d8480
[   25.250413]  which belongs to the cache kmalloc-64 of size 64
[   25.250547] The buggy address is located 0 bytes to the right of
[   25.250547]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.250720] 
[   25.250787] The buggy address belongs to the physical page:
[   25.250867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.251108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.251251] page_type: f5(slab)
[   25.251344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.251461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.251575] page dumped because: kasan: bad access detected
[   25.251662] 
[   25.251712] Memory state around the buggy address:
[   25.251814]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.251933]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.252045] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.252151]                                      ^
[   25.252237]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.252332]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.252439] ==================================================================
[   25.466707] ==================================================================
[   25.466849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   25.466975] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.467281] 
[   25.467391] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.467626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.467703] Hardware name: linux,dummy-virt (DT)
[   25.467800] Call trace:
[   25.467868]  show_stack+0x20/0x38 (C)
[   25.467988]  dump_stack_lvl+0x8c/0xd0
[   25.468121]  print_report+0x118/0x608
[   25.468243]  kasan_report+0xdc/0x128
[   25.468362]  kasan_check_range+0x100/0x1a8
[   25.468484]  __kasan_check_write+0x20/0x30
[   25.468609]  kasan_atomics_helper+0xeb8/0x4858
[   25.468743]  kasan_atomics+0x198/0x2e0
[   25.468863]  kunit_try_run_case+0x170/0x3f0
[   25.468994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.469134]  kthread+0x328/0x630
[   25.469249]  ret_from_fork+0x10/0x20
[   25.470276] 
[   25.471037] Allocated by task 267:
[   25.472251]  kasan_save_stack+0x3c/0x68
[   25.472819]  kasan_save_track+0x20/0x40
[   25.473344]  kasan_save_alloc_info+0x40/0x58
[   25.473681]  __kasan_kmalloc+0xd4/0xd8
[   25.473779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.473868]  kasan_atomics+0xb8/0x2e0
[   25.473950]  kunit_try_run_case+0x170/0x3f0
[   25.474053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.475724]  kthread+0x328/0x630
[   25.476347]  ret_from_fork+0x10/0x20
[   25.476492] 
[   25.477199] The buggy address belongs to the object at fff00000c78d8480
[   25.477199]  which belongs to the cache kmalloc-64 of size 64
[   25.477705] The buggy address is located 0 bytes to the right of
[   25.477705]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.479165] 
[   25.479566] The buggy address belongs to the physical page:
[   25.480236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.481360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.481518] page_type: f5(slab)
[   25.481630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.481753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.481841] page dumped because: kasan: bad access detected
[   25.481919] 
[   25.481967] Memory state around the buggy address:
[   25.482066]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.482188]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.482299] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.483078]                                      ^
[   25.483665]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.484158]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.484348] ==================================================================
[   25.307044] ==================================================================
[   25.308381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   25.308608] Write of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.309083] 
[   25.309295] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.310103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.310231] Hardware name: linux,dummy-virt (DT)
[   25.310324] Call trace:
[   25.310952]  show_stack+0x20/0x38 (C)
[   25.311399]  dump_stack_lvl+0x8c/0xd0
[   25.311703]  print_report+0x118/0x608
[   25.312170]  kasan_report+0xdc/0x128
[   25.312506]  kasan_check_range+0x100/0x1a8
[   25.312627]  __kasan_check_write+0x20/0x30
[   25.313891]  kasan_atomics_helper+0xb70/0x4858
[   25.314211]  kasan_atomics+0x198/0x2e0
[   25.314963]  kunit_try_run_case+0x170/0x3f0
[   25.315308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.315523]  kthread+0x328/0x630
[   25.315641]  ret_from_fork+0x10/0x20
[   25.315780] 
[   25.315839] Allocated by task 267:
[   25.315918]  kasan_save_stack+0x3c/0x68
[   25.316024]  kasan_save_track+0x20/0x40
[   25.316795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.322129] The buggy address belongs to the physical page:
[   25.325170] page dumped because: kasan: bad access detected
[   25.327156]                                      ^
[   25.329788] Read of size 4 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.330820] Call trace:
[   25.333049]  kasan_atomics+0x198/0x2e0
[   25.338130]  kasan_atomics+0xb8/0x2e0
[   25.340871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.343635] 
[   25.344453]                                      ^
[   25.350445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.354779]  kasan_save_stack+0x3c/0x68
[   25.358305] 
[   25.358869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.359956] 
[   25.361015] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.363204] 
[   25.366159]  kthread+0x328/0x630
[   25.368613]  kthread+0x328/0x630
[   25.369501] The buggy address is located 0 bytes to the right of
[   25.369501]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.373364]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.381609]  kasan_save_track+0x20/0x40
[   25.382954]  kthread+0x328/0x630
[   25.383048]  ret_from_fork+0x10/0x20
[   25.383236] 
[   25.383326] The buggy address belongs to the object at fff00000c78d8480
[   25.383326]  which belongs to the cache kmalloc-64 of size 64
[   25.383894] The buggy address is located 0 bytes to the right of
[   25.383894]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.384141] 
[   25.384460] The buggy address belongs to the physical page:
[   25.384592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.384862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.385004] page_type: f5(slab)
[   25.385110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.385244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.385348] page dumped because: kasan: bad access detected
[   25.385438] 
[   25.385495] Memory state around the buggy address:
[   25.385582]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.386130]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.386316] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.386549]                                      ^
[   25.386763]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.387055]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.387380] ==================================================================
[   25.449269] ==================================================================
[   25.449496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   25.449686] Write of size 8 at addr fff00000c78d84b0 by task kunit_try_catch/267
[   25.449852] 
[   25.449935] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   25.450151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.450217] Hardware name: linux,dummy-virt (DT)
[   25.450299] Call trace:
[   25.450363]  show_stack+0x20/0x38 (C)
[   25.450488]  dump_stack_lvl+0x8c/0xd0
[   25.450917]  print_report+0x118/0x608
[   25.451092]  kasan_report+0xdc/0x128
[   25.451212]  kasan_check_range+0x100/0x1a8
[   25.451358]  __kasan_check_write+0x20/0x30
[   25.451504]  kasan_atomics_helper+0xe44/0x4858
[   25.451672]  kasan_atomics+0x198/0x2e0
[   25.451857]  kunit_try_run_case+0x170/0x3f0
[   25.452035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.452207]  kthread+0x328/0x630
[   25.452341]  ret_from_fork+0x10/0x20
[   25.452478] 
[   25.452530] Allocated by task 267:
[   25.452605]  kasan_save_stack+0x3c/0x68
[   25.452718]  kasan_save_track+0x20/0x40
[   25.452822]  kasan_save_alloc_info+0x40/0x58
[   25.452920]  __kasan_kmalloc+0xd4/0xd8
[   25.453018]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.453137]  kasan_atomics+0xb8/0x2e0
[   25.453765]  kunit_try_run_case+0x170/0x3f0
[   25.453908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.454051]  kthread+0x328/0x630
[   25.454175]  ret_from_fork+0x10/0x20
[   25.454302] 
[   25.454373] The buggy address belongs to the object at fff00000c78d8480
[   25.454373]  which belongs to the cache kmalloc-64 of size 64
[   25.454598] The buggy address is located 0 bytes to the right of
[   25.454598]  allocated 48-byte region [fff00000c78d8480, fff00000c78d84b0)
[   25.454856] 
[   25.454948] The buggy address belongs to the physical page:
[   25.455034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078d8
[   25.455148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.455258] page_type: f5(slab)
[   25.455360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.455492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.455608] page dumped because: kasan: bad access detected
[   25.455698] 
[   25.455767] Memory state around the buggy address:
[   25.455893]  fff00000c78d8380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.456056]  fff00000c78d8400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.456226] >fff00000c78d8480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.456346]                                      ^
[   25.456455]  fff00000c78d8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456575]  fff00000c78d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.456700] ==================================================================

[   24.778703] ==================================================================
[   24.779439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   24.780276] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.780986] 
[   24.781395] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.781533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.781578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.781640] Call Trace:
[   24.781824]  <TASK>
[   24.781910]  dump_stack_lvl+0x73/0xb0
[   24.782003]  print_report+0xd1/0x650
[   24.782187]  ? __virt_addr_valid+0x1db/0x2d0
[   24.782313]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.782398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.782481]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.782637]  kasan_report+0x141/0x180
[   24.782753]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.782822]  __asan_report_load4_noabort+0x18/0x20
[   24.782860]  kasan_atomics_helper+0x4a1c/0x5450
[   24.782897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.782934]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.782971]  ? kasan_atomics+0x152/0x310
[   24.783006]  kasan_atomics+0x1dc/0x310
[   24.783059]  ? __pfx_kasan_atomics+0x10/0x10
[   24.783117]  ? __pfx_read_tsc+0x10/0x10
[   24.783155]  ? ktime_get_ts64+0x86/0x230
[   24.783196]  kunit_try_run_case+0x1a5/0x480
[   24.783236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.783271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.783336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.783378]  ? __kthread_parkme+0x82/0x180
[   24.783413]  ? preempt_count_sub+0x50/0x80
[   24.783450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.783487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.783523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.783559]  kthread+0x337/0x6f0
[   24.783585]  ? trace_preempt_on+0x20/0xc0
[   24.783623]  ? __pfx_kthread+0x10/0x10
[   24.783651]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.783685]  ? calculate_sigpending+0x7b/0xa0
[   24.783717]  ? __pfx_kthread+0x10/0x10
[   24.783745]  ret_from_fork+0x41/0x80
[   24.783780]  ? __pfx_kthread+0x10/0x10
[   24.783809]  ret_from_fork_asm+0x1a/0x30
[   24.783856]  </TASK>
[   24.783874] 
[   24.798433] Allocated by task 285:
[   24.798931]  kasan_save_stack+0x45/0x70
[   24.799546]  kasan_save_track+0x18/0x40
[   24.799986]  kasan_save_alloc_info+0x3b/0x50
[   24.800520]  __kasan_kmalloc+0xb7/0xc0
[   24.800979]  __kmalloc_cache_noprof+0x189/0x420
[   24.801517]  kasan_atomics+0x95/0x310
[   24.801929]  kunit_try_run_case+0x1a5/0x480
[   24.802589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.802982]  kthread+0x337/0x6f0
[   24.803395]  ret_from_fork+0x41/0x80
[   24.803821]  ret_from_fork_asm+0x1a/0x30
[   24.804511] 
[   24.804735] The buggy address belongs to the object at ffff888102ef1180
[   24.804735]  which belongs to the cache kmalloc-64 of size 64
[   24.805584] The buggy address is located 0 bytes to the right of
[   24.805584]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.806735] 
[   24.806984] The buggy address belongs to the physical page:
[   24.807637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.808415] flags: 0x200000000000000(node=0|zone=2)
[   24.808780] page_type: f5(slab)
[   24.809073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.809681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.810750] page dumped because: kasan: bad access detected
[   24.811490] 
[   24.811757] Memory state around the buggy address:
[   24.812400]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.813074]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.813722] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.814172]                                      ^
[   24.814539]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.814977]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.815638] ==================================================================
[   25.316147] ==================================================================
[   25.316715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   25.317555] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.318192] 
[   25.318407] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.318480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.318501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.318536] Call Trace:
[   25.318561]  <TASK>
[   25.318589]  dump_stack_lvl+0x73/0xb0
[   25.318635]  print_report+0xd1/0x650
[   25.318675]  ? __virt_addr_valid+0x1db/0x2d0
[   25.318710]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.318746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.318784]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.318819]  kasan_report+0x141/0x180
[   25.318856]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.318900]  kasan_check_range+0x10c/0x1c0
[   25.318932]  __kasan_check_write+0x18/0x20
[   25.318964]  kasan_atomics_helper+0x15b6/0x5450
[   25.319000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.319044]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.320276]  ? kasan_atomics+0x152/0x310
[   25.320373]  kasan_atomics+0x1dc/0x310
[   25.320447]  ? __pfx_kasan_atomics+0x10/0x10
[   25.320520]  ? __pfx_read_tsc+0x10/0x10
[   25.320599]  ? ktime_get_ts64+0x86/0x230
[   25.320680]  kunit_try_run_case+0x1a5/0x480
[   25.320762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.320839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.320925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.321001]  ? __kthread_parkme+0x82/0x180
[   25.321081]  ? preempt_count_sub+0x50/0x80
[   25.321170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.321251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.321342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.321385]  kthread+0x337/0x6f0
[   25.321417]  ? trace_preempt_on+0x20/0xc0
[   25.321458]  ? __pfx_kthread+0x10/0x10
[   25.321489]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.321524]  ? calculate_sigpending+0x7b/0xa0
[   25.321562]  ? __pfx_kthread+0x10/0x10
[   25.321592]  ret_from_fork+0x41/0x80
[   25.321630]  ? __pfx_kthread+0x10/0x10
[   25.321662]  ret_from_fork_asm+0x1a/0x30
[   25.321709]  </TASK>
[   25.321727] 
[   25.343090] Allocated by task 285:
[   25.343553]  kasan_save_stack+0x45/0x70
[   25.344105]  kasan_save_track+0x18/0x40
[   25.344491]  kasan_save_alloc_info+0x3b/0x50
[   25.344952]  __kasan_kmalloc+0xb7/0xc0
[   25.345352]  __kmalloc_cache_noprof+0x189/0x420
[   25.345713]  kasan_atomics+0x95/0x310
[   25.346091]  kunit_try_run_case+0x1a5/0x480
[   25.346775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.347903]  kthread+0x337/0x6f0
[   25.348313]  ret_from_fork+0x41/0x80
[   25.348671]  ret_from_fork_asm+0x1a/0x30
[   25.349065] 
[   25.350028] The buggy address belongs to the object at ffff888102ef1180
[   25.350028]  which belongs to the cache kmalloc-64 of size 64
[   25.351305] The buggy address is located 0 bytes to the right of
[   25.351305]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.352808] 
[   25.353058] The buggy address belongs to the physical page:
[   25.353545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.354137] flags: 0x200000000000000(node=0|zone=2)
[   25.355138] page_type: f5(slab)
[   25.355826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.356708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.357639] page dumped because: kasan: bad access detected
[   25.358264] 
[   25.358520] Memory state around the buggy address:
[   25.359141]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359739]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.360760] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.361225]                                      ^
[   25.361567]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.362550]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.363083] ==================================================================
[   24.513148] ==================================================================
[   24.513860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   24.514509] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.515203] 
[   24.515521] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.515691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.515735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.515827] Call Trace:
[   24.515894]  <TASK>
[   24.515980]  dump_stack_lvl+0x73/0xb0
[   24.516121]  print_report+0xd1/0x650
[   24.516208]  ? __virt_addr_valid+0x1db/0x2d0
[   24.516286]  ? kasan_atomics_helper+0xde0/0x5450
[   24.516384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.516463]  ? kasan_atomics_helper+0xde0/0x5450
[   24.516539]  kasan_report+0x141/0x180
[   24.516619]  ? kasan_atomics_helper+0xde0/0x5450
[   24.516708]  kasan_check_range+0x10c/0x1c0
[   24.516783]  __kasan_check_write+0x18/0x20
[   24.516858]  kasan_atomics_helper+0xde0/0x5450
[   24.516901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.516942]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.516981]  ? kasan_atomics+0x152/0x310
[   24.517018]  kasan_atomics+0x1dc/0x310
[   24.517091]  ? __pfx_kasan_atomics+0x10/0x10
[   24.517133]  ? __pfx_read_tsc+0x10/0x10
[   24.517172]  ? ktime_get_ts64+0x86/0x230
[   24.517215]  kunit_try_run_case+0x1a5/0x480
[   24.517258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.517321]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.517369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.517410]  ? __kthread_parkme+0x82/0x180
[   24.517447]  ? preempt_count_sub+0x50/0x80
[   24.517487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.517527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.517565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.517603]  kthread+0x337/0x6f0
[   24.517631]  ? trace_preempt_on+0x20/0xc0
[   24.517671]  ? __pfx_kthread+0x10/0x10
[   24.517701]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.517738]  ? calculate_sigpending+0x7b/0xa0
[   24.517773]  ? __pfx_kthread+0x10/0x10
[   24.517803]  ret_from_fork+0x41/0x80
[   24.517839]  ? __pfx_kthread+0x10/0x10
[   24.517871]  ret_from_fork_asm+0x1a/0x30
[   24.517919]  </TASK>
[   24.517939] 
[   24.537090] Allocated by task 285:
[   24.537788]  kasan_save_stack+0x45/0x70
[   24.538459]  kasan_save_track+0x18/0x40
[   24.538788]  kasan_save_alloc_info+0x3b/0x50
[   24.539426]  __kasan_kmalloc+0xb7/0xc0
[   24.539753]  __kmalloc_cache_noprof+0x189/0x420
[   24.540250]  kasan_atomics+0x95/0x310
[   24.540621]  kunit_try_run_case+0x1a5/0x480
[   24.540984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.541459]  kthread+0x337/0x6f0
[   24.541835]  ret_from_fork+0x41/0x80
[   24.542323]  ret_from_fork_asm+0x1a/0x30
[   24.542766] 
[   24.543010] The buggy address belongs to the object at ffff888102ef1180
[   24.543010]  which belongs to the cache kmalloc-64 of size 64
[   24.543969] The buggy address is located 0 bytes to the right of
[   24.543969]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.544962] 
[   24.545264] The buggy address belongs to the physical page:
[   24.545783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.546500] flags: 0x200000000000000(node=0|zone=2)
[   24.546973] page_type: f5(slab)
[   24.547395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.548106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.548643] page dumped because: kasan: bad access detected
[   24.549203] 
[   24.549468] Memory state around the buggy address:
[   24.549904]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.550468]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.551132] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.551703]                                      ^
[   24.552166]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.552806]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.553483] ==================================================================
[   25.232919] ==================================================================
[   25.233575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   25.234237] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.234799] 
[   25.235085] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.235221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.235262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.235347] Call Trace:
[   25.235408]  <TASK>
[   25.235474]  dump_stack_lvl+0x73/0xb0
[   25.235601]  print_report+0xd1/0x650
[   25.235688]  ? __virt_addr_valid+0x1db/0x2d0
[   25.235781]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.235873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.235980]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.236086]  kasan_report+0x141/0x180
[   25.236188]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.236289]  __asan_report_store8_noabort+0x1b/0x30
[   25.236579]  kasan_atomics_helper+0x50d4/0x5450
[   25.236684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.236751]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.236796]  ? kasan_atomics+0x152/0x310
[   25.236833]  kasan_atomics+0x1dc/0x310
[   25.236867]  ? __pfx_kasan_atomics+0x10/0x10
[   25.236901]  ? __pfx_read_tsc+0x10/0x10
[   25.236939]  ? ktime_get_ts64+0x86/0x230
[   25.236982]  kunit_try_run_case+0x1a5/0x480
[   25.237022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.237088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.237136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.237174]  ? __kthread_parkme+0x82/0x180
[   25.237211]  ? preempt_count_sub+0x50/0x80
[   25.237252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.237313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.237394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.237480]  kthread+0x337/0x6f0
[   25.237546]  ? trace_preempt_on+0x20/0xc0
[   25.237630]  ? __pfx_kthread+0x10/0x10
[   25.237697]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.237776]  ? calculate_sigpending+0x7b/0xa0
[   25.237859]  ? __pfx_kthread+0x10/0x10
[   25.237929]  ret_from_fork+0x41/0x80
[   25.238004]  ? __pfx_kthread+0x10/0x10
[   25.238094]  ret_from_fork_asm+0x1a/0x30
[   25.238151]  </TASK>
[   25.238170] 
[   25.253078] Allocated by task 285:
[   25.253494]  kasan_save_stack+0x45/0x70
[   25.253900]  kasan_save_track+0x18/0x40
[   25.254310]  kasan_save_alloc_info+0x3b/0x50
[   25.254897]  __kasan_kmalloc+0xb7/0xc0
[   25.255382]  __kmalloc_cache_noprof+0x189/0x420
[   25.255734]  kasan_atomics+0x95/0x310
[   25.256073]  kunit_try_run_case+0x1a5/0x480
[   25.256543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.257056]  kthread+0x337/0x6f0
[   25.257485]  ret_from_fork+0x41/0x80
[   25.258116]  ret_from_fork_asm+0x1a/0x30
[   25.258471] 
[   25.258660] The buggy address belongs to the object at ffff888102ef1180
[   25.258660]  which belongs to the cache kmalloc-64 of size 64
[   25.259841] The buggy address is located 0 bytes to the right of
[   25.259841]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.261023] 
[   25.261376] The buggy address belongs to the physical page:
[   25.261770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.262406] flags: 0x200000000000000(node=0|zone=2)
[   25.263061] page_type: f5(slab)
[   25.263428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.263931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.264584] page dumped because: kasan: bad access detected
[   25.265126] 
[   25.265466] Memory state around the buggy address:
[   25.265925]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.266759]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.267226] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.267863]                                      ^
[   25.269138]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.269785]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.270436] ==================================================================
[   25.364245] ==================================================================
[   25.366031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   25.366743] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.368184] 
[   25.368675] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.368956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.368980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.369014] Call Trace:
[   25.369055]  <TASK>
[   25.369101]  dump_stack_lvl+0x73/0xb0
[   25.369155]  print_report+0xd1/0x650
[   25.369197]  ? __virt_addr_valid+0x1db/0x2d0
[   25.369238]  ? kasan_atomics_helper+0x164f/0x5450
[   25.369275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.369342]  ? kasan_atomics_helper+0x164f/0x5450
[   25.369380]  kasan_report+0x141/0x180
[   25.369420]  ? kasan_atomics_helper+0x164f/0x5450
[   25.369464]  kasan_check_range+0x10c/0x1c0
[   25.369498]  __kasan_check_write+0x18/0x20
[   25.369531]  kasan_atomics_helper+0x164f/0x5450
[   25.369569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.369605]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.369644]  ? kasan_atomics+0x152/0x310
[   25.369682]  kasan_atomics+0x1dc/0x310
[   25.369716]  ? __pfx_kasan_atomics+0x10/0x10
[   25.369752]  ? __pfx_read_tsc+0x10/0x10
[   25.369791]  ? ktime_get_ts64+0x86/0x230
[   25.369836]  kunit_try_run_case+0x1a5/0x480
[   25.369879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.369918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.369960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.369998]  ? __kthread_parkme+0x82/0x180
[   25.370039]  ? preempt_count_sub+0x50/0x80
[   25.370105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.370148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.370188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.370226]  kthread+0x337/0x6f0
[   25.370255]  ? trace_preempt_on+0x20/0xc0
[   25.370315]  ? __pfx_kthread+0x10/0x10
[   25.370348]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.370385]  ? calculate_sigpending+0x7b/0xa0
[   25.370425]  ? __pfx_kthread+0x10/0x10
[   25.370455]  ret_from_fork+0x41/0x80
[   25.370494]  ? __pfx_kthread+0x10/0x10
[   25.370524]  ret_from_fork_asm+0x1a/0x30
[   25.370575]  </TASK>
[   25.370596] 
[   25.392657] Allocated by task 285:
[   25.393123]  kasan_save_stack+0x45/0x70
[   25.393541]  kasan_save_track+0x18/0x40
[   25.393961]  kasan_save_alloc_info+0x3b/0x50
[   25.394800]  __kasan_kmalloc+0xb7/0xc0
[   25.395482]  __kmalloc_cache_noprof+0x189/0x420
[   25.395786]  kasan_atomics+0x95/0x310
[   25.396049]  kunit_try_run_case+0x1a5/0x480
[   25.397557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.397998]  kthread+0x337/0x6f0
[   25.398595]  ret_from_fork+0x41/0x80
[   25.398895]  ret_from_fork_asm+0x1a/0x30
[   25.399383] 
[   25.399634] The buggy address belongs to the object at ffff888102ef1180
[   25.399634]  which belongs to the cache kmalloc-64 of size 64
[   25.400600] The buggy address is located 0 bytes to the right of
[   25.400600]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.401579] 
[   25.401769] The buggy address belongs to the physical page:
[   25.402941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.404022] flags: 0x200000000000000(node=0|zone=2)
[   25.404646] page_type: f5(slab)
[   25.404912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.405727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.406595] page dumped because: kasan: bad access detected
[   25.407012] 
[   25.407442] Memory state around the buggy address:
[   25.408415]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.408912]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.409662] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.410198]                                      ^
[   25.410821]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.411923]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.412610] ==================================================================
[   24.190661] ==================================================================
[   24.191509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   24.192612] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.194612] 
[   24.194858] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.194973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.195005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.195051] Call Trace:
[   24.195106]  <TASK>
[   24.195144]  dump_stack_lvl+0x73/0xb0
[   24.195192]  print_report+0xd1/0x650
[   24.195235]  ? __virt_addr_valid+0x1db/0x2d0
[   24.195269]  ? kasan_atomics_helper+0x992/0x5450
[   24.195365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.195451]  ? kasan_atomics_helper+0x992/0x5450
[   24.195527]  kasan_report+0x141/0x180
[   24.195607]  ? kasan_atomics_helper+0x992/0x5450
[   24.195699]  kasan_check_range+0x10c/0x1c0
[   24.195774]  __kasan_check_write+0x18/0x20
[   24.195845]  kasan_atomics_helper+0x992/0x5450
[   24.195940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.196024]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.196092]  ? kasan_atomics+0x152/0x310
[   24.196168]  kasan_atomics+0x1dc/0x310
[   24.196207]  ? __pfx_kasan_atomics+0x10/0x10
[   24.196243]  ? __pfx_read_tsc+0x10/0x10
[   24.196279]  ? ktime_get_ts64+0x86/0x230
[   24.196349]  kunit_try_run_case+0x1a5/0x480
[   24.196391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.196426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.196463]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.196499]  ? __kthread_parkme+0x82/0x180
[   24.196534]  ? preempt_count_sub+0x50/0x80
[   24.196572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.196610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.196646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.196682]  kthread+0x337/0x6f0
[   24.196709]  ? trace_preempt_on+0x20/0xc0
[   24.196746]  ? __pfx_kthread+0x10/0x10
[   24.196774]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.196807]  ? calculate_sigpending+0x7b/0xa0
[   24.196841]  ? __pfx_kthread+0x10/0x10
[   24.196869]  ret_from_fork+0x41/0x80
[   24.196903]  ? __pfx_kthread+0x10/0x10
[   24.196932]  ret_from_fork_asm+0x1a/0x30
[   24.197022]  </TASK>
[   24.197070] 
[   24.218224] Allocated by task 285:
[   24.218828]  kasan_save_stack+0x45/0x70
[   24.219435]  kasan_save_track+0x18/0x40
[   24.219890]  kasan_save_alloc_info+0x3b/0x50
[   24.220433]  __kasan_kmalloc+0xb7/0xc0
[   24.220838]  __kmalloc_cache_noprof+0x189/0x420
[   24.221383]  kasan_atomics+0x95/0x310
[   24.221842]  kunit_try_run_case+0x1a5/0x480
[   24.222377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.222938]  kthread+0x337/0x6f0
[   24.223418]  ret_from_fork+0x41/0x80
[   24.223818]  ret_from_fork_asm+0x1a/0x30
[   24.224325] 
[   24.224570] The buggy address belongs to the object at ffff888102ef1180
[   24.224570]  which belongs to the cache kmalloc-64 of size 64
[   24.225429] The buggy address is located 0 bytes to the right of
[   24.225429]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.226495] 
[   24.226750] The buggy address belongs to the physical page:
[   24.227370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.228029] flags: 0x200000000000000(node=0|zone=2)
[   24.228588] page_type: f5(slab)
[   24.228998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.229714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.230446] page dumped because: kasan: bad access detected
[   24.230930] 
[   24.231263] Memory state around the buggy address:
[   24.231722]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.232395]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.233154] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.233818]                                      ^
[   24.234348]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.234944]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.235601] ==================================================================
[   26.050821] ==================================================================
[   26.052134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.053014] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.054551] 
[   26.054860] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.055015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.055077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.055138] Call Trace:
[   26.055171]  <TASK>
[   26.055198]  dump_stack_lvl+0x73/0xb0
[   26.055246]  print_report+0xd1/0x650
[   26.055326]  ? __virt_addr_valid+0x1db/0x2d0
[   26.055387]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.055426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.055464]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.055501]  kasan_report+0x141/0x180
[   26.055539]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.055583]  kasan_check_range+0x10c/0x1c0
[   26.055616]  __kasan_check_write+0x18/0x20
[   26.055650]  kasan_atomics_helper+0x1f43/0x5450
[   26.055688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.055725]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.055761]  ? kasan_atomics+0x152/0x310
[   26.055798]  kasan_atomics+0x1dc/0x310
[   26.055830]  ? __pfx_kasan_atomics+0x10/0x10
[   26.055863]  ? __pfx_read_tsc+0x10/0x10
[   26.055920]  ? ktime_get_ts64+0x86/0x230
[   26.055965]  kunit_try_run_case+0x1a5/0x480
[   26.056007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.056087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.056126]  ? __kthread_parkme+0x82/0x180
[   26.056162]  ? preempt_count_sub+0x50/0x80
[   26.056203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.056281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.056396]  kthread+0x337/0x6f0
[   26.056469]  ? trace_preempt_on+0x20/0xc0
[   26.056556]  ? __pfx_kthread+0x10/0x10
[   26.056618]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.056656]  ? calculate_sigpending+0x7b/0xa0
[   26.056692]  ? __pfx_kthread+0x10/0x10
[   26.056720]  ret_from_fork+0x41/0x80
[   26.056756]  ? __pfx_kthread+0x10/0x10
[   26.056786]  ret_from_fork_asm+0x1a/0x30
[   26.056833]  </TASK>
[   26.056852] 
[   26.076512] Allocated by task 285:
[   26.076852]  kasan_save_stack+0x45/0x70
[   26.077952]  kasan_save_track+0x18/0x40
[   26.078259]  kasan_save_alloc_info+0x3b/0x50
[   26.078862]  __kasan_kmalloc+0xb7/0xc0
[   26.079239]  __kmalloc_cache_noprof+0x189/0x420
[   26.080079]  kasan_atomics+0x95/0x310
[   26.080528]  kunit_try_run_case+0x1a5/0x480
[   26.080938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.081807]  kthread+0x337/0x6f0
[   26.082605]  ret_from_fork+0x41/0x80
[   26.082919]  ret_from_fork_asm+0x1a/0x30
[   26.083675] 
[   26.083869] The buggy address belongs to the object at ffff888102ef1180
[   26.083869]  which belongs to the cache kmalloc-64 of size 64
[   26.085509] The buggy address is located 0 bytes to the right of
[   26.085509]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.086034] 
[   26.086167] The buggy address belongs to the physical page:
[   26.086396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.086666] flags: 0x200000000000000(node=0|zone=2)
[   26.086861] page_type: f5(slab)
[   26.087011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.088673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.089357] page dumped because: kasan: bad access detected
[   26.089772] 
[   26.090017] Memory state around the buggy address:
[   26.090545]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.091309]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.091826] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.092592]                                      ^
[   26.093154]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.093858]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.094887] ==================================================================
[   26.096164] ==================================================================
[   26.096684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.097360] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.098033] 
[   26.098350] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.098488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.098591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.098663] Call Trace:
[   26.098721]  <TASK>
[   26.098779]  dump_stack_lvl+0x73/0xb0
[   26.098933]  print_report+0xd1/0x650
[   26.099021]  ? __virt_addr_valid+0x1db/0x2d0
[   26.099103]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.099240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.099350]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.099432]  kasan_report+0x141/0x180
[   26.099513]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.099672]  __asan_report_load8_noabort+0x18/0x20
[   26.099870]  kasan_atomics_helper+0x4f71/0x5450
[   26.099974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.100054]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.100197]  ? kasan_atomics+0x152/0x310
[   26.100287]  kasan_atomics+0x1dc/0x310
[   26.100390]  ? __pfx_kasan_atomics+0x10/0x10
[   26.100466]  ? __pfx_read_tsc+0x10/0x10
[   26.100530]  ? ktime_get_ts64+0x86/0x230
[   26.100575]  kunit_try_run_case+0x1a5/0x480
[   26.100620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.100661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.100707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.100746]  ? __kthread_parkme+0x82/0x180
[   26.100783]  ? preempt_count_sub+0x50/0x80
[   26.100823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.100864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.100903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.100942]  kthread+0x337/0x6f0
[   26.100971]  ? trace_preempt_on+0x20/0xc0
[   26.101011]  ? __pfx_kthread+0x10/0x10
[   26.101048]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.101133]  ? calculate_sigpending+0x7b/0xa0
[   26.101173]  ? __pfx_kthread+0x10/0x10
[   26.101205]  ret_from_fork+0x41/0x80
[   26.101243]  ? __pfx_kthread+0x10/0x10
[   26.101275]  ret_from_fork_asm+0x1a/0x30
[   26.101368]  </TASK>
[   26.101397] 
[   26.120637] Allocated by task 285:
[   26.120825]  kasan_save_stack+0x45/0x70
[   26.121020]  kasan_save_track+0x18/0x40
[   26.121885]  kasan_save_alloc_info+0x3b/0x50
[   26.122622]  __kasan_kmalloc+0xb7/0xc0
[   26.123389]  __kmalloc_cache_noprof+0x189/0x420
[   26.124235]  kasan_atomics+0x95/0x310
[   26.124522]  kunit_try_run_case+0x1a5/0x480
[   26.125035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.125704]  kthread+0x337/0x6f0
[   26.126080]  ret_from_fork+0x41/0x80
[   26.126676]  ret_from_fork_asm+0x1a/0x30
[   26.127516] 
[   26.127706] The buggy address belongs to the object at ffff888102ef1180
[   26.127706]  which belongs to the cache kmalloc-64 of size 64
[   26.129131] The buggy address is located 0 bytes to the right of
[   26.129131]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.130040] 
[   26.130272] The buggy address belongs to the physical page:
[   26.130815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.131464] flags: 0x200000000000000(node=0|zone=2)
[   26.131828] page_type: f5(slab)
[   26.132277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.133007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.133702] page dumped because: kasan: bad access detected
[   26.134244] 
[   26.134514] Memory state around the buggy address:
[   26.134862]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.135458]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.136181] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.136896]                                      ^
[   26.137435]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137972]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.138640] ==================================================================
[   23.725707] ==================================================================
[   23.726151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   23.727041] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.728247] 
[   23.728584] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.728848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.728873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.728930] Call Trace:
[   23.728971]  <TASK>
[   23.728997]  dump_stack_lvl+0x73/0xb0
[   23.729050]  print_report+0xd1/0x650
[   23.729107]  ? __virt_addr_valid+0x1db/0x2d0
[   23.729146]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.729392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.729473]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.729603]  kasan_report+0x141/0x180
[   23.729684]  ? kasan_atomics_helper+0x4b54/0x5450
[   23.729760]  __asan_report_load4_noabort+0x18/0x20
[   23.729799]  kasan_atomics_helper+0x4b54/0x5450
[   23.729838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.729874]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.729912]  ? kasan_atomics+0x152/0x310
[   23.730004]  kasan_atomics+0x1dc/0x310
[   23.730082]  ? __pfx_kasan_atomics+0x10/0x10
[   23.730368]  ? __pfx_read_tsc+0x10/0x10
[   23.730453]  ? ktime_get_ts64+0x86/0x230
[   23.730540]  kunit_try_run_case+0x1a5/0x480
[   23.730621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.730661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.730705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.730744]  ? __kthread_parkme+0x82/0x180
[   23.730780]  ? preempt_count_sub+0x50/0x80
[   23.730819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.730859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.730896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.730935]  kthread+0x337/0x6f0
[   23.730963]  ? trace_preempt_on+0x20/0xc0
[   23.731000]  ? __pfx_kthread+0x10/0x10
[   23.731030]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.731098]  ? calculate_sigpending+0x7b/0xa0
[   23.731135]  ? __pfx_kthread+0x10/0x10
[   23.731164]  ret_from_fork+0x41/0x80
[   23.731202]  ? __pfx_kthread+0x10/0x10
[   23.731232]  ret_from_fork_asm+0x1a/0x30
[   23.731280]  </TASK>
[   23.731323] 
[   23.752125] Allocated by task 285:
[   23.752921]  kasan_save_stack+0x45/0x70
[   23.753647]  kasan_save_track+0x18/0x40
[   23.754030]  kasan_save_alloc_info+0x3b/0x50
[   23.754815]  __kasan_kmalloc+0xb7/0xc0
[   23.755416]  __kmalloc_cache_noprof+0x189/0x420
[   23.755872]  kasan_atomics+0x95/0x310
[   23.756511]  kunit_try_run_case+0x1a5/0x480
[   23.756849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.757703]  kthread+0x337/0x6f0
[   23.758077]  ret_from_fork+0x41/0x80
[   23.758473]  ret_from_fork_asm+0x1a/0x30
[   23.758843] 
[   23.759085] The buggy address belongs to the object at ffff888102ef1180
[   23.759085]  which belongs to the cache kmalloc-64 of size 64
[   23.759970] The buggy address is located 0 bytes to the right of
[   23.759970]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.761553] 
[   23.762090] The buggy address belongs to the physical page:
[   23.762757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.763344] flags: 0x200000000000000(node=0|zone=2)
[   23.763555] page_type: f5(slab)
[   23.763707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.763979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.765212] page dumped because: kasan: bad access detected
[   23.765795] 
[   23.765976] Memory state around the buggy address:
[   23.766619]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.767395]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.768147] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.768939]                                      ^
[   23.769541]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.770057]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.770925] ==================================================================
[   24.897751] ==================================================================
[   24.899379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   24.901688] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.904027] 
[   24.904283] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.904419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.904457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.904517] Call Trace:
[   24.904609]  <TASK>
[   24.904676]  dump_stack_lvl+0x73/0xb0
[   24.904782]  print_report+0xd1/0x650
[   24.904869]  ? __virt_addr_valid+0x1db/0x2d0
[   24.904940]  ? kasan_atomics_helper+0x1217/0x5450
[   24.905018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.905104]  ? kasan_atomics_helper+0x1217/0x5450
[   24.905188]  kasan_report+0x141/0x180
[   24.905273]  ? kasan_atomics_helper+0x1217/0x5450
[   24.905392]  kasan_check_range+0x10c/0x1c0
[   24.906088]  __kasan_check_write+0x18/0x20
[   24.906140]  kasan_atomics_helper+0x1217/0x5450
[   24.906183]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.906224]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.906264]  ? kasan_atomics+0x152/0x310
[   24.906326]  kasan_atomics+0x1dc/0x310
[   24.906362]  ? __pfx_kasan_atomics+0x10/0x10
[   24.906399]  ? __pfx_read_tsc+0x10/0x10
[   24.906437]  ? ktime_get_ts64+0x86/0x230
[   24.906480]  kunit_try_run_case+0x1a5/0x480
[   24.906523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.906561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.906602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.906641]  ? __kthread_parkme+0x82/0x180
[   24.906677]  ? preempt_count_sub+0x50/0x80
[   24.906719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.906761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.906802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.906839]  kthread+0x337/0x6f0
[   24.906867]  ? trace_preempt_on+0x20/0xc0
[   24.906906]  ? __pfx_kthread+0x10/0x10
[   24.906936]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.906973]  ? calculate_sigpending+0x7b/0xa0
[   24.907009]  ? __pfx_kthread+0x10/0x10
[   24.907048]  ret_from_fork+0x41/0x80
[   24.907105]  ? __pfx_kthread+0x10/0x10
[   24.907139]  ret_from_fork_asm+0x1a/0x30
[   24.907188]  </TASK>
[   24.907207] 
[   24.926766] Allocated by task 285:
[   24.927223]  kasan_save_stack+0x45/0x70
[   24.927614]  kasan_save_track+0x18/0x40
[   24.929668]  kasan_save_alloc_info+0x3b/0x50
[   24.930591]  __kasan_kmalloc+0xb7/0xc0
[   24.930865]  __kmalloc_cache_noprof+0x189/0x420
[   24.931191]  kasan_atomics+0x95/0x310
[   24.933585]  kunit_try_run_case+0x1a5/0x480
[   24.935011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.936122]  kthread+0x337/0x6f0
[   24.936674]  ret_from_fork+0x41/0x80
[   24.937205]  ret_from_fork_asm+0x1a/0x30
[   24.937557] 
[   24.938739] The buggy address belongs to the object at ffff888102ef1180
[   24.938739]  which belongs to the cache kmalloc-64 of size 64
[   24.939793] The buggy address is located 0 bytes to the right of
[   24.939793]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.941975] 
[   24.942659] The buggy address belongs to the physical page:
[   24.944499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.944998] flags: 0x200000000000000(node=0|zone=2)
[   24.946060] page_type: f5(slab)
[   24.946721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.948397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.949366] page dumped because: kasan: bad access detected
[   24.950242] 
[   24.950438] Memory state around the buggy address:
[   24.950825]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.952259]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.952915] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.953807]                                      ^
[   24.954099]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.954532]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.954925] ==================================================================
[   24.816916] ==================================================================
[   24.817736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   24.818782] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.819584] 
[   24.819924] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.820067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.820132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.820219] Call Trace:
[   24.820277]  <TASK>
[   24.820349]  dump_stack_lvl+0x73/0xb0
[   24.820441]  print_report+0xd1/0x650
[   24.820524]  ? __virt_addr_valid+0x1db/0x2d0
[   24.820599]  ? kasan_atomics_helper+0x1148/0x5450
[   24.820675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.820751]  ? kasan_atomics_helper+0x1148/0x5450
[   24.820829]  kasan_report+0x141/0x180
[   24.820911]  ? kasan_atomics_helper+0x1148/0x5450
[   24.821002]  kasan_check_range+0x10c/0x1c0
[   24.821083]  __kasan_check_write+0x18/0x20
[   24.821160]  kasan_atomics_helper+0x1148/0x5450
[   24.821247]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.821390]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.821497]  ? kasan_atomics+0x152/0x310
[   24.821558]  kasan_atomics+0x1dc/0x310
[   24.821629]  ? __pfx_kasan_atomics+0x10/0x10
[   24.821705]  ? __pfx_read_tsc+0x10/0x10
[   24.821807]  ? ktime_get_ts64+0x86/0x230
[   24.821918]  kunit_try_run_case+0x1a5/0x480
[   24.822009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.822099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.822191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.822321]  ? __kthread_parkme+0x82/0x180
[   24.822406]  ? preempt_count_sub+0x50/0x80
[   24.822494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.822572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.822653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.822739]  kthread+0x337/0x6f0
[   24.822806]  ? trace_preempt_on+0x20/0xc0
[   24.822888]  ? __pfx_kthread+0x10/0x10
[   24.822959]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.823030]  ? calculate_sigpending+0x7b/0xa0
[   24.823129]  ? __pfx_kthread+0x10/0x10
[   24.823227]  ret_from_fork+0x41/0x80
[   24.823326]  ? __pfx_kthread+0x10/0x10
[   24.823400]  ret_from_fork_asm+0x1a/0x30
[   24.823499]  </TASK>
[   24.823538] 
[   24.839096] Allocated by task 285:
[   24.839534]  kasan_save_stack+0x45/0x70
[   24.840033]  kasan_save_track+0x18/0x40
[   24.840456]  kasan_save_alloc_info+0x3b/0x50
[   24.840926]  __kasan_kmalloc+0xb7/0xc0
[   24.841475]  __kmalloc_cache_noprof+0x189/0x420
[   24.841832]  kasan_atomics+0x95/0x310
[   24.842180]  kunit_try_run_case+0x1a5/0x480
[   24.842700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.843358]  kthread+0x337/0x6f0
[   24.843724]  ret_from_fork+0x41/0x80
[   24.844172]  ret_from_fork_asm+0x1a/0x30
[   24.844633] 
[   24.844887] The buggy address belongs to the object at ffff888102ef1180
[   24.844887]  which belongs to the cache kmalloc-64 of size 64
[   24.845904] The buggy address is located 0 bytes to the right of
[   24.845904]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.846990] 
[   24.847253] The buggy address belongs to the physical page:
[   24.847793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.848520] flags: 0x200000000000000(node=0|zone=2)
[   24.849023] page_type: f5(slab)
[   24.849475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.850179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.850842] page dumped because: kasan: bad access detected
[   24.851448] 
[   24.851730] Memory state around the buggy address:
[   24.852204]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.852877]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.853548] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.854079]                                      ^
[   24.854443]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.854895]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.855356] ==================================================================
[   24.048542] ==================================================================
[   24.051260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   24.051831] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.052624] 
[   24.052923] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.053060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.053103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.053165] Call Trace:
[   24.053223]  <TASK>
[   24.053277]  dump_stack_lvl+0x73/0xb0
[   24.053389]  print_report+0xd1/0x650
[   24.053510]  ? __virt_addr_valid+0x1db/0x2d0
[   24.053594]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.053672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.053751]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.053833]  kasan_report+0x141/0x180
[   24.053917]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.054010]  kasan_check_range+0x10c/0x1c0
[   24.054109]  __kasan_check_write+0x18/0x20
[   24.054187]  kasan_atomics_helper+0x7c7/0x5450
[   24.054274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.054382]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.054462]  ? kasan_atomics+0x152/0x310
[   24.054545]  kasan_atomics+0x1dc/0x310
[   24.054617]  ? __pfx_kasan_atomics+0x10/0x10
[   24.054695]  ? __pfx_read_tsc+0x10/0x10
[   24.054774]  ? ktime_get_ts64+0x86/0x230
[   24.054870]  kunit_try_run_case+0x1a5/0x480
[   24.054960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.055041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.055129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.055214]  ? __kthread_parkme+0x82/0x180
[   24.055312]  ? preempt_count_sub+0x50/0x80
[   24.055404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.055485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.055574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.055661]  kthread+0x337/0x6f0
[   24.055733]  ? trace_preempt_on+0x20/0xc0
[   24.055821]  ? __pfx_kthread+0x10/0x10
[   24.055902]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.055983]  ? calculate_sigpending+0x7b/0xa0
[   24.056086]  ? __pfx_kthread+0x10/0x10
[   24.056164]  ret_from_fork+0x41/0x80
[   24.056217]  ? __pfx_kthread+0x10/0x10
[   24.056249]  ret_from_fork_asm+0x1a/0x30
[   24.056321]  </TASK>
[   24.056342] 
[   24.070827] Allocated by task 285:
[   24.071377]  kasan_save_stack+0x45/0x70
[   24.071848]  kasan_save_track+0x18/0x40
[   24.072332]  kasan_save_alloc_info+0x3b/0x50
[   24.072723]  __kasan_kmalloc+0xb7/0xc0
[   24.073099]  __kmalloc_cache_noprof+0x189/0x420
[   24.073523]  kasan_atomics+0x95/0x310
[   24.073935]  kunit_try_run_case+0x1a5/0x480
[   24.074348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.074733]  kthread+0x337/0x6f0
[   24.075012]  ret_from_fork+0x41/0x80
[   24.075436]  ret_from_fork_asm+0x1a/0x30
[   24.075867] 
[   24.076118] The buggy address belongs to the object at ffff888102ef1180
[   24.076118]  which belongs to the cache kmalloc-64 of size 64
[   24.077419] The buggy address is located 0 bytes to the right of
[   24.077419]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.078153] 
[   24.078419] The buggy address belongs to the physical page:
[   24.079099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.080595] flags: 0x200000000000000(node=0|zone=2)
[   24.081103] page_type: f5(slab)
[   24.081510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.082232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.084282] page dumped because: kasan: bad access detected
[   24.084858] 
[   24.085669] Memory state around the buggy address:
[   24.086571]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.087158]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.087687] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.088824]                                      ^
[   24.089219]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.089773]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.090797] ==================================================================
[   25.604990] ==================================================================
[   25.605726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   25.606751] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.607658] 
[   25.607989] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.608123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.608221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.608489] Call Trace:
[   25.608552]  <TASK>
[   25.608612]  dump_stack_lvl+0x73/0xb0
[   25.609149]  print_report+0xd1/0x650
[   25.609248]  ? __virt_addr_valid+0x1db/0x2d0
[   25.609331]  ? kasan_atomics_helper+0x194a/0x5450
[   25.609374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.609415]  ? kasan_atomics_helper+0x194a/0x5450
[   25.609453]  kasan_report+0x141/0x180
[   25.609493]  ? kasan_atomics_helper+0x194a/0x5450
[   25.609537]  kasan_check_range+0x10c/0x1c0
[   25.609573]  __kasan_check_write+0x18/0x20
[   25.609608]  kasan_atomics_helper+0x194a/0x5450
[   25.609646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.609683]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.609721]  ? kasan_atomics+0x152/0x310
[   25.609758]  kasan_atomics+0x1dc/0x310
[   25.609789]  ? __pfx_kasan_atomics+0x10/0x10
[   25.609823]  ? __pfx_read_tsc+0x10/0x10
[   25.609860]  ? ktime_get_ts64+0x86/0x230
[   25.609901]  kunit_try_run_case+0x1a5/0x480
[   25.609942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.609981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.610022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.610141]  ? __kthread_parkme+0x82/0x180
[   25.610223]  ? preempt_count_sub+0x50/0x80
[   25.610327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.610390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.610431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.610469]  kthread+0x337/0x6f0
[   25.610496]  ? trace_preempt_on+0x20/0xc0
[   25.610533]  ? __pfx_kthread+0x10/0x10
[   25.610560]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.610594]  ? calculate_sigpending+0x7b/0xa0
[   25.610628]  ? __pfx_kthread+0x10/0x10
[   25.610656]  ret_from_fork+0x41/0x80
[   25.610690]  ? __pfx_kthread+0x10/0x10
[   25.610719]  ret_from_fork_asm+0x1a/0x30
[   25.610764]  </TASK>
[   25.610782] 
[   25.627612] Allocated by task 285:
[   25.628229]  kasan_save_stack+0x45/0x70
[   25.628788]  kasan_save_track+0x18/0x40
[   25.629360]  kasan_save_alloc_info+0x3b/0x50
[   25.629867]  __kasan_kmalloc+0xb7/0xc0
[   25.630289]  __kmalloc_cache_noprof+0x189/0x420
[   25.630927]  kasan_atomics+0x95/0x310
[   25.631455]  kunit_try_run_case+0x1a5/0x480
[   25.631951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.632589]  kthread+0x337/0x6f0
[   25.633019]  ret_from_fork+0x41/0x80
[   25.633517]  ret_from_fork_asm+0x1a/0x30
[   25.633977] 
[   25.634261] The buggy address belongs to the object at ffff888102ef1180
[   25.634261]  which belongs to the cache kmalloc-64 of size 64
[   25.635344] The buggy address is located 0 bytes to the right of
[   25.635344]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.636452] 
[   25.636670] The buggy address belongs to the physical page:
[   25.637412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.638247] flags: 0x200000000000000(node=0|zone=2)
[   25.638852] page_type: f5(slab)
[   25.639392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.639968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.640867] page dumped because: kasan: bad access detected
[   25.641312] 
[   25.641596] Memory state around the buggy address:
[   25.642118]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.642815]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.643506] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.644117]                                      ^
[   25.644700]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.645352]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.645991] ==================================================================
[   26.188787] ==================================================================
[   26.190650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.191285] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.192512] 
[   26.192740] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.193216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.193239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.193272] Call Trace:
[   26.193322]  <TASK>
[   26.193354]  dump_stack_lvl+0x73/0xb0
[   26.193399]  print_report+0xd1/0x650
[   26.193440]  ? __virt_addr_valid+0x1db/0x2d0
[   26.193480]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.193517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.193555]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.193592]  kasan_report+0x141/0x180
[   26.193631]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.193675]  __asan_report_load8_noabort+0x18/0x20
[   26.193709]  kasan_atomics_helper+0x4f98/0x5450
[   26.193748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.193787]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.193824]  ? kasan_atomics+0x152/0x310
[   26.193861]  kasan_atomics+0x1dc/0x310
[   26.193893]  ? __pfx_kasan_atomics+0x10/0x10
[   26.193927]  ? __pfx_read_tsc+0x10/0x10
[   26.193962]  ? ktime_get_ts64+0x86/0x230
[   26.194004]  kunit_try_run_case+0x1a5/0x480
[   26.194058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.194113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.194156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.194195]  ? __kthread_parkme+0x82/0x180
[   26.194232]  ? preempt_count_sub+0x50/0x80
[   26.194272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.194334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.194375]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.194414]  kthread+0x337/0x6f0
[   26.194442]  ? trace_preempt_on+0x20/0xc0
[   26.194482]  ? __pfx_kthread+0x10/0x10
[   26.194512]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.194546]  ? calculate_sigpending+0x7b/0xa0
[   26.194584]  ? __pfx_kthread+0x10/0x10
[   26.194613]  ret_from_fork+0x41/0x80
[   26.194650]  ? __pfx_kthread+0x10/0x10
[   26.194680]  ret_from_fork_asm+0x1a/0x30
[   26.194729]  </TASK>
[   26.194747] 
[   26.214274] Allocated by task 285:
[   26.215395]  kasan_save_stack+0x45/0x70
[   26.215995]  kasan_save_track+0x18/0x40
[   26.216520]  kasan_save_alloc_info+0x3b/0x50
[   26.217262]  __kasan_kmalloc+0xb7/0xc0
[   26.217861]  __kmalloc_cache_noprof+0x189/0x420
[   26.218445]  kasan_atomics+0x95/0x310
[   26.218902]  kunit_try_run_case+0x1a5/0x480
[   26.219637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.220363]  kthread+0x337/0x6f0
[   26.220703]  ret_from_fork+0x41/0x80
[   26.221056]  ret_from_fork_asm+0x1a/0x30
[   26.221499] 
[   26.221741] The buggy address belongs to the object at ffff888102ef1180
[   26.221741]  which belongs to the cache kmalloc-64 of size 64
[   26.222886] The buggy address is located 0 bytes to the right of
[   26.222886]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.224318] 
[   26.224564] The buggy address belongs to the physical page:
[   26.225609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.226524] flags: 0x200000000000000(node=0|zone=2)
[   26.226916] page_type: f5(slab)
[   26.227776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.228620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.229263] page dumped because: kasan: bad access detected
[   26.229627] 
[   26.230258] Memory state around the buggy address:
[   26.230743]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.231815]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.232813] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.233728]                                      ^
[   26.234139]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235032]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.235837] ==================================================================
[   25.136420] ==================================================================
[   25.137482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   25.137988] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.138969] 
[   25.139892] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.140234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.140278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.140660] Call Trace:
[   25.140721]  <TASK>
[   25.140774]  dump_stack_lvl+0x73/0xb0
[   25.140865]  print_report+0xd1/0x650
[   25.140942]  ? __virt_addr_valid+0x1db/0x2d0
[   25.141091]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.141199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.141276]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.141372]  kasan_report+0x141/0x180
[   25.141451]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.141532]  __asan_report_load8_noabort+0x18/0x20
[   25.141613]  kasan_atomics_helper+0x4eae/0x5450
[   25.141680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.141750]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.141789]  ? kasan_atomics+0x152/0x310
[   25.141827]  kasan_atomics+0x1dc/0x310
[   25.141858]  ? __pfx_kasan_atomics+0x10/0x10
[   25.141893]  ? __pfx_read_tsc+0x10/0x10
[   25.141928]  ? ktime_get_ts64+0x86/0x230
[   25.142012]  kunit_try_run_case+0x1a5/0x480
[   25.142090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.142132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.142173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.142209]  ? __kthread_parkme+0x82/0x180
[   25.142243]  ? preempt_count_sub+0x50/0x80
[   25.142281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.142347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.142385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.142420]  kthread+0x337/0x6f0
[   25.142446]  ? trace_preempt_on+0x20/0xc0
[   25.142483]  ? __pfx_kthread+0x10/0x10
[   25.142513]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.142547]  ? calculate_sigpending+0x7b/0xa0
[   25.142581]  ? __pfx_kthread+0x10/0x10
[   25.142609]  ret_from_fork+0x41/0x80
[   25.142643]  ? __pfx_kthread+0x10/0x10
[   25.142670]  ret_from_fork_asm+0x1a/0x30
[   25.142716]  </TASK>
[   25.142732] 
[   25.158421] Allocated by task 285:
[   25.159101]  kasan_save_stack+0x45/0x70
[   25.159593]  kasan_save_track+0x18/0x40
[   25.160071]  kasan_save_alloc_info+0x3b/0x50
[   25.160561]  __kasan_kmalloc+0xb7/0xc0
[   25.160878]  __kmalloc_cache_noprof+0x189/0x420
[   25.161225]  kasan_atomics+0x95/0x310
[   25.161766]  kunit_try_run_case+0x1a5/0x480
[   25.162229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.162838]  kthread+0x337/0x6f0
[   25.163390]  ret_from_fork+0x41/0x80
[   25.163845]  ret_from_fork_asm+0x1a/0x30
[   25.164234] 
[   25.164452] The buggy address belongs to the object at ffff888102ef1180
[   25.164452]  which belongs to the cache kmalloc-64 of size 64
[   25.165352] The buggy address is located 0 bytes to the right of
[   25.165352]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.166959] 
[   25.167331] The buggy address belongs to the physical page:
[   25.167724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.168331] flags: 0x200000000000000(node=0|zone=2)
[   25.168943] page_type: f5(slab)
[   25.169426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.170101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.170774] page dumped because: kasan: bad access detected
[   25.171904] 
[   25.172109] Memory state around the buggy address:
[   25.172619]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.173155]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.173851] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.174554]                                      ^
[   25.175066]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.175704]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.176399] ==================================================================
[   25.647469] ==================================================================
[   25.648075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   25.648730] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.649496] 
[   25.649768] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.649903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.649946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.650011] Call Trace:
[   25.650126]  <TASK>
[   25.650183]  dump_stack_lvl+0x73/0xb0
[   25.650260]  print_report+0xd1/0x650
[   25.650350]  ? __virt_addr_valid+0x1db/0x2d0
[   25.650422]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.650495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.650562]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.650628]  kasan_report+0x141/0x180
[   25.650732]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.650855]  kasan_check_range+0x10c/0x1c0
[   25.650930]  __kasan_check_write+0x18/0x20
[   25.651084]  kasan_atomics_helper+0x19e3/0x5450
[   25.651178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.651278]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.651397]  ? kasan_atomics+0x152/0x310
[   25.651483]  kasan_atomics+0x1dc/0x310
[   25.651542]  ? __pfx_kasan_atomics+0x10/0x10
[   25.651605]  ? __pfx_read_tsc+0x10/0x10
[   25.651681]  ? ktime_get_ts64+0x86/0x230
[   25.651799]  kunit_try_run_case+0x1a5/0x480
[   25.651928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.652011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.652188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.652272]  ? __kthread_parkme+0x82/0x180
[   25.652376]  ? preempt_count_sub+0x50/0x80
[   25.652466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.652606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.652693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.652778]  kthread+0x337/0x6f0
[   25.652849]  ? trace_preempt_on+0x20/0xc0
[   25.652933]  ? __pfx_kthread+0x10/0x10
[   25.653022]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.653157]  ? calculate_sigpending+0x7b/0xa0
[   25.653236]  ? __pfx_kthread+0x10/0x10
[   25.653324]  ret_from_fork+0x41/0x80
[   25.653401]  ? __pfx_kthread+0x10/0x10
[   25.653474]  ret_from_fork_asm+0x1a/0x30
[   25.653541]  </TASK>
[   25.653561] 
[   25.669343] Allocated by task 285:
[   25.669811]  kasan_save_stack+0x45/0x70
[   25.670897]  kasan_save_track+0x18/0x40
[   25.671908]  kasan_save_alloc_info+0x3b/0x50
[   25.672273]  __kasan_kmalloc+0xb7/0xc0
[   25.673032]  __kmalloc_cache_noprof+0x189/0x420
[   25.673545]  kasan_atomics+0x95/0x310
[   25.674006]  kunit_try_run_case+0x1a5/0x480
[   25.674605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.675362]  kthread+0x337/0x6f0
[   25.675727]  ret_from_fork+0x41/0x80
[   25.676318]  ret_from_fork_asm+0x1a/0x30
[   25.676682] 
[   25.677003] The buggy address belongs to the object at ffff888102ef1180
[   25.677003]  which belongs to the cache kmalloc-64 of size 64
[   25.678070] The buggy address is located 0 bytes to the right of
[   25.678070]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.679143] 
[   25.679531] The buggy address belongs to the physical page:
[   25.680162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.680977] flags: 0x200000000000000(node=0|zone=2)
[   25.681533] page_type: f5(slab)
[   25.682000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.682629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.683402] page dumped because: kasan: bad access detected
[   25.683948] 
[   25.684264] Memory state around the buggy address:
[   25.684768]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.685265]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.685920] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.686591]                                      ^
[   25.687063]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.687702]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.688520] ==================================================================
[   25.873273] ==================================================================
[   25.873830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   25.874634] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.875281] 
[   25.875582] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.875723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.875768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.875829] Call Trace:
[   25.875860]  <TASK>
[   25.875916]  dump_stack_lvl+0x73/0xb0
[   25.875964]  print_report+0xd1/0x650
[   25.876045]  ? __virt_addr_valid+0x1db/0x2d0
[   25.876406]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.876467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.876507]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.876543]  kasan_report+0x141/0x180
[   25.876580]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.876624]  kasan_check_range+0x10c/0x1c0
[   25.876657]  __kasan_check_write+0x18/0x20
[   25.876690]  kasan_atomics_helper+0x1ce1/0x5450
[   25.876729]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.876767]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.876804]  ? kasan_atomics+0x152/0x310
[   25.876841]  kasan_atomics+0x1dc/0x310
[   25.876871]  ? __pfx_kasan_atomics+0x10/0x10
[   25.876902]  ? __pfx_read_tsc+0x10/0x10
[   25.876938]  ? ktime_get_ts64+0x86/0x230
[   25.876978]  kunit_try_run_case+0x1a5/0x480
[   25.877020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.877095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.877140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.877177]  ? __kthread_parkme+0x82/0x180
[   25.877211]  ? preempt_count_sub+0x50/0x80
[   25.877249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.877286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.877353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.877392]  kthread+0x337/0x6f0
[   25.877419]  ? trace_preempt_on+0x20/0xc0
[   25.877460]  ? __pfx_kthread+0x10/0x10
[   25.877488]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.877522]  ? calculate_sigpending+0x7b/0xa0
[   25.877556]  ? __pfx_kthread+0x10/0x10
[   25.877584]  ret_from_fork+0x41/0x80
[   25.877619]  ? __pfx_kthread+0x10/0x10
[   25.877647]  ret_from_fork_asm+0x1a/0x30
[   25.877693]  </TASK>
[   25.877710] 
[   25.892468] Allocated by task 285:
[   25.892858]  kasan_save_stack+0x45/0x70
[   25.893366]  kasan_save_track+0x18/0x40
[   25.893799]  kasan_save_alloc_info+0x3b/0x50
[   25.894200]  __kasan_kmalloc+0xb7/0xc0
[   25.894539]  __kmalloc_cache_noprof+0x189/0x420
[   25.895026]  kasan_atomics+0x95/0x310
[   25.895524]  kunit_try_run_case+0x1a5/0x480
[   25.896013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.896609]  kthread+0x337/0x6f0
[   25.896955]  ret_from_fork+0x41/0x80
[   25.897332]  ret_from_fork_asm+0x1a/0x30
[   25.897732] 
[   25.897967] The buggy address belongs to the object at ffff888102ef1180
[   25.897967]  which belongs to the cache kmalloc-64 of size 64
[   25.899012] The buggy address is located 0 bytes to the right of
[   25.899012]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.900002] 
[   25.900279] The buggy address belongs to the physical page:
[   25.900765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.901366] flags: 0x200000000000000(node=0|zone=2)
[   25.901734] page_type: f5(slab)
[   25.902073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.902729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.903501] page dumped because: kasan: bad access detected
[   25.904091] 
[   25.904348] Memory state around the buggy address:
[   25.904823]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.905454]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.905902] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.906548]                                      ^
[   25.907071]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.907731]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.908433] ==================================================================
[   26.476909] ==================================================================
[   26.477552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   26.478364] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.479246] 
[   26.479715] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.480016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.480055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.480103] Call Trace:
[   26.480131]  <TASK>
[   26.480160]  dump_stack_lvl+0x73/0xb0
[   26.480205]  print_report+0xd1/0x650
[   26.480246]  ? __virt_addr_valid+0x1db/0x2d0
[   26.480284]  ? kasan_atomics_helper+0x5115/0x5450
[   26.480348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.480387]  ? kasan_atomics_helper+0x5115/0x5450
[   26.480425]  kasan_report+0x141/0x180
[   26.480465]  ? kasan_atomics_helper+0x5115/0x5450
[   26.480510]  __asan_report_load8_noabort+0x18/0x20
[   26.480548]  kasan_atomics_helper+0x5115/0x5450
[   26.480586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.480625]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.480663]  ? kasan_atomics+0x152/0x310
[   26.480702]  kasan_atomics+0x1dc/0x310
[   26.480738]  ? __pfx_kasan_atomics+0x10/0x10
[   26.480775]  ? __pfx_read_tsc+0x10/0x10
[   26.480814]  ? ktime_get_ts64+0x86/0x230
[   26.480855]  kunit_try_run_case+0x1a5/0x480
[   26.480898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.480937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.480978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.481018]  ? __kthread_parkme+0x82/0x180
[   26.481079]  ? preempt_count_sub+0x50/0x80
[   26.481125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.481165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.481206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.481246]  kthread+0x337/0x6f0
[   26.481274]  ? trace_preempt_on+0x20/0xc0
[   26.481338]  ? __pfx_kthread+0x10/0x10
[   26.481369]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.481407]  ? calculate_sigpending+0x7b/0xa0
[   26.481444]  ? __pfx_kthread+0x10/0x10
[   26.481475]  ret_from_fork+0x41/0x80
[   26.481512]  ? __pfx_kthread+0x10/0x10
[   26.481545]  ret_from_fork_asm+0x1a/0x30
[   26.481597]  </TASK>
[   26.481616] 
[   26.501074] Allocated by task 285:
[   26.501681]  kasan_save_stack+0x45/0x70
[   26.502343]  kasan_save_track+0x18/0x40
[   26.502903]  kasan_save_alloc_info+0x3b/0x50
[   26.503519]  __kasan_kmalloc+0xb7/0xc0
[   26.503936]  __kmalloc_cache_noprof+0x189/0x420
[   26.504684]  kasan_atomics+0x95/0x310
[   26.505289]  kunit_try_run_case+0x1a5/0x480
[   26.505905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.506616]  kthread+0x337/0x6f0
[   26.507171]  ret_from_fork+0x41/0x80
[   26.507625]  ret_from_fork_asm+0x1a/0x30
[   26.508357] 
[   26.508594] The buggy address belongs to the object at ffff888102ef1180
[   26.508594]  which belongs to the cache kmalloc-64 of size 64
[   26.509886] The buggy address is located 0 bytes to the right of
[   26.509886]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.511380] 
[   26.511629] The buggy address belongs to the physical page:
[   26.512158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.512771] flags: 0x200000000000000(node=0|zone=2)
[   26.513610] page_type: f5(slab)
[   26.513931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.514900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.515609] page dumped because: kasan: bad access detected
[   26.516115] 
[   26.516357] Memory state around the buggy address:
[   26.516823]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.517498]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.518248] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.518979]                                      ^
[   26.519480]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.520118]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.520770] ==================================================================
[   23.966199] ==================================================================
[   23.966804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   23.968397] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.969698] 
[   23.970150] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.971063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.971098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.971133] Call Trace:
[   23.971160]  <TASK>
[   23.971187]  dump_stack_lvl+0x73/0xb0
[   23.971240]  print_report+0xd1/0x650
[   23.971284]  ? __virt_addr_valid+0x1db/0x2d0
[   23.971348]  ? kasan_atomics_helper+0x697/0x5450
[   23.971388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.971426]  ? kasan_atomics_helper+0x697/0x5450
[   23.971463]  kasan_report+0x141/0x180
[   23.971503]  ? kasan_atomics_helper+0x697/0x5450
[   23.971547]  kasan_check_range+0x10c/0x1c0
[   23.971581]  __kasan_check_write+0x18/0x20
[   23.971615]  kasan_atomics_helper+0x697/0x5450
[   23.971657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.971696]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.971734]  ? kasan_atomics+0x152/0x310
[   23.971772]  kasan_atomics+0x1dc/0x310
[   23.971804]  ? __pfx_kasan_atomics+0x10/0x10
[   23.971839]  ? __pfx_read_tsc+0x10/0x10
[   23.971874]  ? ktime_get_ts64+0x86/0x230
[   23.971928]  kunit_try_run_case+0x1a5/0x480
[   23.971971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.972009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.972080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.972126]  ? __kthread_parkme+0x82/0x180
[   23.972165]  ? preempt_count_sub+0x50/0x80
[   23.972206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.972246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.972286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.972349]  kthread+0x337/0x6f0
[   23.972379]  ? trace_preempt_on+0x20/0xc0
[   23.972418]  ? __pfx_kthread+0x10/0x10
[   23.972447]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.972483]  ? calculate_sigpending+0x7b/0xa0
[   23.972519]  ? __pfx_kthread+0x10/0x10
[   23.972549]  ret_from_fork+0x41/0x80
[   23.972584]  ? __pfx_kthread+0x10/0x10
[   23.972614]  ret_from_fork_asm+0x1a/0x30
[   23.972663]  </TASK>
[   23.972682] 
[   23.992563] Allocated by task 285:
[   23.993105]  kasan_save_stack+0x45/0x70
[   23.993486]  kasan_save_track+0x18/0x40
[   23.993798]  kasan_save_alloc_info+0x3b/0x50
[   23.994238]  __kasan_kmalloc+0xb7/0xc0
[   23.994717]  __kmalloc_cache_noprof+0x189/0x420
[   23.995315]  kasan_atomics+0x95/0x310
[   23.995779]  kunit_try_run_case+0x1a5/0x480
[   23.996320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.996829]  kthread+0x337/0x6f0
[   23.997339]  ret_from_fork+0x41/0x80
[   23.997678]  ret_from_fork_asm+0x1a/0x30
[   23.998193] 
[   23.998487] The buggy address belongs to the object at ffff888102ef1180
[   23.998487]  which belongs to the cache kmalloc-64 of size 64
[   23.999338] The buggy address is located 0 bytes to the right of
[   23.999338]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.000511] 
[   24.000782] The buggy address belongs to the physical page:
[   24.001412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.001925] flags: 0x200000000000000(node=0|zone=2)
[   24.002528] page_type: f5(slab)
[   24.002973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.003683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.004329] page dumped because: kasan: bad access detected
[   24.004843] 
[   24.005170] Memory state around the buggy address:
[   24.005548]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.006234]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.006978] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.007666]                                      ^
[   24.008104]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.008827]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.009480] ==================================================================
[   26.004550] ==================================================================
[   26.005601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   26.008400] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.009752] 
[   26.010100] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.010240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.010283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.010381] Call Trace:
[   26.010482]  <TASK>
[   26.010542]  dump_stack_lvl+0x73/0xb0
[   26.010636]  print_report+0xd1/0x650
[   26.010713]  ? __virt_addr_valid+0x1db/0x2d0
[   26.010750]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.010788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.010827]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.010864]  kasan_report+0x141/0x180
[   26.010903]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.010949]  kasan_check_range+0x10c/0x1c0
[   26.010982]  __kasan_check_write+0x18/0x20
[   26.011016]  kasan_atomics_helper+0x1eaa/0x5450
[   26.011091]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.011136]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.011174]  ? kasan_atomics+0x152/0x310
[   26.011211]  kasan_atomics+0x1dc/0x310
[   26.011243]  ? __pfx_kasan_atomics+0x10/0x10
[   26.011279]  ? __pfx_read_tsc+0x10/0x10
[   26.011345]  ? ktime_get_ts64+0x86/0x230
[   26.011387]  kunit_try_run_case+0x1a5/0x480
[   26.011430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.011467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.011508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.011546]  ? __kthread_parkme+0x82/0x180
[   26.011583]  ? preempt_count_sub+0x50/0x80
[   26.011622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.011661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.011698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.011737]  kthread+0x337/0x6f0
[   26.011764]  ? trace_preempt_on+0x20/0xc0
[   26.011803]  ? __pfx_kthread+0x10/0x10
[   26.011833]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.011867]  ? calculate_sigpending+0x7b/0xa0
[   26.011917]  ? __pfx_kthread+0x10/0x10
[   26.011949]  ret_from_fork+0x41/0x80
[   26.011985]  ? __pfx_kthread+0x10/0x10
[   26.012015]  ret_from_fork_asm+0x1a/0x30
[   26.012088]  </TASK>
[   26.012112] 
[   26.031804] Allocated by task 285:
[   26.032274]  kasan_save_stack+0x45/0x70
[   26.032666]  kasan_save_track+0x18/0x40
[   26.033050]  kasan_save_alloc_info+0x3b/0x50
[   26.033543]  __kasan_kmalloc+0xb7/0xc0
[   26.033964]  __kmalloc_cache_noprof+0x189/0x420
[   26.034508]  kasan_atomics+0x95/0x310
[   26.034828]  kunit_try_run_case+0x1a5/0x480
[   26.035265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.035836]  kthread+0x337/0x6f0
[   26.036285]  ret_from_fork+0x41/0x80
[   26.036797]  ret_from_fork_asm+0x1a/0x30
[   26.037213] 
[   26.037567] The buggy address belongs to the object at ffff888102ef1180
[   26.037567]  which belongs to the cache kmalloc-64 of size 64
[   26.038623] The buggy address is located 0 bytes to the right of
[   26.038623]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.039734] 
[   26.039958] The buggy address belongs to the physical page:
[   26.040692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.041534] flags: 0x200000000000000(node=0|zone=2)
[   26.042132] page_type: f5(slab)
[   26.042477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.043157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.043764] page dumped because: kasan: bad access detected
[   26.044420] 
[   26.044698] Memory state around the buggy address:
[   26.045231]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.045885]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.046820] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.047529]                                      ^
[   26.048056]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.048698]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.049245] ==================================================================
[   23.913158] ==================================================================
[   23.914732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   23.915662] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.915932] 
[   23.916063] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.916132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.916151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.916183] Call Trace:
[   23.916209]  <TASK>
[   23.916234]  dump_stack_lvl+0x73/0xb0
[   23.916277]  print_report+0xd1/0x650
[   23.916343]  ? __virt_addr_valid+0x1db/0x2d0
[   23.916379]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.916413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.916448]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.916482]  kasan_report+0x141/0x180
[   23.916518]  ? kasan_atomics_helper+0x5fe/0x5450
[   23.916560]  kasan_check_range+0x10c/0x1c0
[   23.916593]  __kasan_check_write+0x18/0x20
[   23.916625]  kasan_atomics_helper+0x5fe/0x5450
[   23.916661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.916696]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.916731]  ? kasan_atomics+0x152/0x310
[   23.916769]  kasan_atomics+0x1dc/0x310
[   23.916799]  ? __pfx_kasan_atomics+0x10/0x10
[   23.916831]  ? __pfx_read_tsc+0x10/0x10
[   23.916865]  ? ktime_get_ts64+0x86/0x230
[   23.916907]  kunit_try_run_case+0x1a5/0x480
[   23.916946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.916981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.917019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.917056]  ? __kthread_parkme+0x82/0x180
[   23.917090]  ? preempt_count_sub+0x50/0x80
[   23.917128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.917165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.917200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.917236]  kthread+0x337/0x6f0
[   23.917261]  ? trace_preempt_on+0x20/0xc0
[   23.917710]  ? __pfx_kthread+0x10/0x10
[   23.918378]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.918424]  ? calculate_sigpending+0x7b/0xa0
[   23.918464]  ? __pfx_kthread+0x10/0x10
[   23.918493]  ret_from_fork+0x41/0x80
[   23.918532]  ? __pfx_kthread+0x10/0x10
[   23.918562]  ret_from_fork_asm+0x1a/0x30
[   23.918609]  </TASK>
[   23.918629] 
[   23.945322] Allocated by task 285:
[   23.945771]  kasan_save_stack+0x45/0x70
[   23.946622]  kasan_save_track+0x18/0x40
[   23.946938]  kasan_save_alloc_info+0x3b/0x50
[   23.947791]  __kasan_kmalloc+0xb7/0xc0
[   23.948217]  __kmalloc_cache_noprof+0x189/0x420
[   23.948693]  kasan_atomics+0x95/0x310
[   23.949049]  kunit_try_run_case+0x1a5/0x480
[   23.949894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.950746]  kthread+0x337/0x6f0
[   23.951082]  ret_from_fork+0x41/0x80
[   23.951663]  ret_from_fork_asm+0x1a/0x30
[   23.952350] 
[   23.952538] The buggy address belongs to the object at ffff888102ef1180
[   23.952538]  which belongs to the cache kmalloc-64 of size 64
[   23.953827] The buggy address is located 0 bytes to the right of
[   23.953827]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.955158] 
[   23.955357] The buggy address belongs to the physical page:
[   23.955750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.956551] flags: 0x200000000000000(node=0|zone=2)
[   23.956911] page_type: f5(slab)
[   23.957270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.958303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.958891] page dumped because: kasan: bad access detected
[   23.959729] 
[   23.960126] Memory state around the buggy address:
[   23.960800]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.961540]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.962100] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.962728]                                      ^
[   23.963259]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.963902]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.964551] ==================================================================
[   24.370710] ==================================================================
[   24.371724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   24.372686] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.373474] 
[   24.373806] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.373969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.374013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.374097] Call Trace:
[   24.374157]  <TASK>
[   24.374263]  dump_stack_lvl+0x73/0xb0
[   24.374442]  print_report+0xd1/0x650
[   24.374556]  ? __virt_addr_valid+0x1db/0x2d0
[   24.374635]  ? kasan_atomics_helper+0xc70/0x5450
[   24.374712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.374790]  ? kasan_atomics_helper+0xc70/0x5450
[   24.374865]  kasan_report+0x141/0x180
[   24.374928]  ? kasan_atomics_helper+0xc70/0x5450
[   24.375010]  kasan_check_range+0x10c/0x1c0
[   24.375100]  __kasan_check_write+0x18/0x20
[   24.375239]  kasan_atomics_helper+0xc70/0x5450
[   24.375370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.375487]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.375617]  ? kasan_atomics+0x152/0x310
[   24.375710]  kasan_atomics+0x1dc/0x310
[   24.375842]  ? __pfx_kasan_atomics+0x10/0x10
[   24.375963]  ? __pfx_read_tsc+0x10/0x10
[   24.376043]  ? ktime_get_ts64+0x86/0x230
[   24.376207]  kunit_try_run_case+0x1a5/0x480
[   24.376341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.376419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.376562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.376675]  ? __kthread_parkme+0x82/0x180
[   24.376758]  ? preempt_count_sub+0x50/0x80
[   24.376889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.376970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.377049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.377135]  kthread+0x337/0x6f0
[   24.377170]  ? trace_preempt_on+0x20/0xc0
[   24.377210]  ? __pfx_kthread+0x10/0x10
[   24.377239]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.377272]  ? calculate_sigpending+0x7b/0xa0
[   24.377332]  ? __pfx_kthread+0x10/0x10
[   24.377364]  ret_from_fork+0x41/0x80
[   24.377400]  ? __pfx_kthread+0x10/0x10
[   24.377430]  ret_from_fork_asm+0x1a/0x30
[   24.377477]  </TASK>
[   24.377495] 
[   24.392842] Allocated by task 285:
[   24.393315]  kasan_save_stack+0x45/0x70
[   24.393795]  kasan_save_track+0x18/0x40
[   24.394258]  kasan_save_alloc_info+0x3b/0x50
[   24.394610]  __kasan_kmalloc+0xb7/0xc0
[   24.395008]  __kmalloc_cache_noprof+0x189/0x420
[   24.395548]  kasan_atomics+0x95/0x310
[   24.400079]  kunit_try_run_case+0x1a5/0x480
[   24.401331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.403236]  kthread+0x337/0x6f0
[   24.403502]  ret_from_fork+0x41/0x80
[   24.403756]  ret_from_fork_asm+0x1a/0x30
[   24.404056] 
[   24.404239] The buggy address belongs to the object at ffff888102ef1180
[   24.404239]  which belongs to the cache kmalloc-64 of size 64
[   24.408341] The buggy address is located 0 bytes to the right of
[   24.408341]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.411812] 
[   24.411946] The buggy address belongs to the physical page:
[   24.412865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.413960] flags: 0x200000000000000(node=0|zone=2)
[   24.414450] page_type: f5(slab)
[   24.414842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.415687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.416591] page dumped because: kasan: bad access detected
[   24.417426] 
[   24.417611] Memory state around the buggy address:
[   24.418248]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.418863]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.419818] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.420458]                                      ^
[   24.420922]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.421474]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.422203] ==================================================================
[   24.957064] ==================================================================
[   24.957928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   24.958744] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.960364] 
[   24.960600] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.961052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.961093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.961129] Call Trace:
[   24.961159]  <TASK>
[   24.961187]  dump_stack_lvl+0x73/0xb0
[   24.961236]  print_report+0xd1/0x650
[   24.961278]  ? __virt_addr_valid+0x1db/0x2d0
[   24.961343]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.961381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.961418]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.961454]  kasan_report+0x141/0x180
[   24.961492]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.961535]  __asan_report_load4_noabort+0x18/0x20
[   24.961570]  kasan_atomics_helper+0x49e8/0x5450
[   24.961607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.961643]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.961681]  ? kasan_atomics+0x152/0x310
[   24.961717]  kasan_atomics+0x1dc/0x310
[   24.961749]  ? __pfx_kasan_atomics+0x10/0x10
[   24.961783]  ? __pfx_read_tsc+0x10/0x10
[   24.961817]  ? ktime_get_ts64+0x86/0x230
[   24.961859]  kunit_try_run_case+0x1a5/0x480
[   24.961901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.961938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.961980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.962019]  ? __kthread_parkme+0x82/0x180
[   24.962081]  ? preempt_count_sub+0x50/0x80
[   24.962125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.962165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.962205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.962244]  kthread+0x337/0x6f0
[   24.962273]  ? trace_preempt_on+0x20/0xc0
[   24.962337]  ? __pfx_kthread+0x10/0x10
[   24.962370]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.962406]  ? calculate_sigpending+0x7b/0xa0
[   24.962443]  ? __pfx_kthread+0x10/0x10
[   24.962472]  ret_from_fork+0x41/0x80
[   24.962511]  ? __pfx_kthread+0x10/0x10
[   24.962540]  ret_from_fork_asm+0x1a/0x30
[   24.962591]  </TASK>
[   24.962610] 
[   24.980690] Allocated by task 285:
[   24.981022]  kasan_save_stack+0x45/0x70
[   24.981552]  kasan_save_track+0x18/0x40
[   24.981980]  kasan_save_alloc_info+0x3b/0x50
[   24.982598]  __kasan_kmalloc+0xb7/0xc0
[   24.983261]  __kmalloc_cache_noprof+0x189/0x420
[   24.983951]  kasan_atomics+0x95/0x310
[   24.984323]  kunit_try_run_case+0x1a5/0x480
[   24.984702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.985541]  kthread+0x337/0x6f0
[   24.986008]  ret_from_fork+0x41/0x80
[   24.986604]  ret_from_fork_asm+0x1a/0x30
[   24.987018] 
[   24.987395] The buggy address belongs to the object at ffff888102ef1180
[   24.987395]  which belongs to the cache kmalloc-64 of size 64
[   24.988639] The buggy address is located 0 bytes to the right of
[   24.988639]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.989707] 
[   24.990140] The buggy address belongs to the physical page:
[   24.990758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.991572] flags: 0x200000000000000(node=0|zone=2)
[   24.992163] page_type: f5(slab)
[   24.992635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.993455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.994194] page dumped because: kasan: bad access detected
[   24.994662] 
[   24.994916] Memory state around the buggy address:
[   24.995444]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.996063]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.996745] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.997317]                                      ^
[   24.997921]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.998642]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.999382] ==================================================================
[   25.825372] ==================================================================
[   25.825924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   25.826794] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.827456] 
[   25.827737] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.828133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.828200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.828265] Call Trace:
[   25.828334]  <TASK>
[   25.828389]  dump_stack_lvl+0x73/0xb0
[   25.828479]  print_report+0xd1/0x650
[   25.828561]  ? __virt_addr_valid+0x1db/0x2d0
[   25.828635]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.828708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.828785]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.828864]  kasan_report+0x141/0x180
[   25.829024]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.829252]  __asan_report_load8_noabort+0x18/0x20
[   25.829350]  kasan_atomics_helper+0x4f30/0x5450
[   25.829419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.829464]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.829505]  ? kasan_atomics+0x152/0x310
[   25.829543]  kasan_atomics+0x1dc/0x310
[   25.829576]  ? __pfx_kasan_atomics+0x10/0x10
[   25.829609]  ? __pfx_read_tsc+0x10/0x10
[   25.829644]  ? ktime_get_ts64+0x86/0x230
[   25.829686]  kunit_try_run_case+0x1a5/0x480
[   25.829727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.829765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.829804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.829844]  ? __kthread_parkme+0x82/0x180
[   25.829882]  ? preempt_count_sub+0x50/0x80
[   25.829922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.829962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.830001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.830067]  kthread+0x337/0x6f0
[   25.830115]  ? trace_preempt_on+0x20/0xc0
[   25.830157]  ? __pfx_kthread+0x10/0x10
[   25.830189]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.830227]  ? calculate_sigpending+0x7b/0xa0
[   25.830268]  ? __pfx_kthread+0x10/0x10
[   25.830323]  ret_from_fork+0x41/0x80
[   25.830365]  ? __pfx_kthread+0x10/0x10
[   25.830397]  ret_from_fork_asm+0x1a/0x30
[   25.830446]  </TASK>
[   25.830464] 
[   25.850921] Allocated by task 285:
[   25.851959]  kasan_save_stack+0x45/0x70
[   25.852620]  kasan_save_track+0x18/0x40
[   25.853028]  kasan_save_alloc_info+0x3b/0x50
[   25.853715]  __kasan_kmalloc+0xb7/0xc0
[   25.854104]  __kmalloc_cache_noprof+0x189/0x420
[   25.854684]  kasan_atomics+0x95/0x310
[   25.855037]  kunit_try_run_case+0x1a5/0x480
[   25.855820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.856561]  kthread+0x337/0x6f0
[   25.857037]  ret_from_fork+0x41/0x80
[   25.857427]  ret_from_fork_asm+0x1a/0x30
[   25.858051] 
[   25.858313] The buggy address belongs to the object at ffff888102ef1180
[   25.858313]  which belongs to the cache kmalloc-64 of size 64
[   25.859170] The buggy address is located 0 bytes to the right of
[   25.859170]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.860519] 
[   25.860898] The buggy address belongs to the physical page:
[   25.861448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.862582] flags: 0x200000000000000(node=0|zone=2)
[   25.862974] page_type: f5(slab)
[   25.863426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.864461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.865168] page dumped because: kasan: bad access detected
[   25.865684] 
[   25.866311] Memory state around the buggy address:
[   25.866816]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.867590]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.868338] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.868994]                                      ^
[   25.869697]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870264]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.870853] ==================================================================
[   25.460636] ==================================================================
[   25.461868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   25.463418] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.463819] 
[   25.464097] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.464224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.465641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.465696] Call Trace:
[   25.465740]  <TASK>
[   25.465783]  dump_stack_lvl+0x73/0xb0
[   25.465857]  print_report+0xd1/0x650
[   25.465919]  ? __virt_addr_valid+0x1db/0x2d0
[   25.465973]  ? kasan_atomics_helper+0x177f/0x5450
[   25.466029]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.466146]  ? kasan_atomics_helper+0x177f/0x5450
[   25.466219]  kasan_report+0x141/0x180
[   25.466281]  ? kasan_atomics_helper+0x177f/0x5450
[   25.466393]  kasan_check_range+0x10c/0x1c0
[   25.466452]  __kasan_check_write+0x18/0x20
[   25.466506]  kasan_atomics_helper+0x177f/0x5450
[   25.466568]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.466625]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.466684]  ? kasan_atomics+0x152/0x310
[   25.466744]  kasan_atomics+0x1dc/0x310
[   25.466793]  ? __pfx_kasan_atomics+0x10/0x10
[   25.466849]  ? __pfx_read_tsc+0x10/0x10
[   25.466911]  ? ktime_get_ts64+0x86/0x230
[   25.466974]  kunit_try_run_case+0x1a5/0x480
[   25.467071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.467140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.467217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.467286]  ? __kthread_parkme+0x82/0x180
[   25.467374]  ? preempt_count_sub+0x50/0x80
[   25.467445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.467521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.467600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.467672]  kthread+0x337/0x6f0
[   25.467733]  ? trace_preempt_on+0x20/0xc0
[   25.467816]  ? __pfx_kthread+0x10/0x10
[   25.467896]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.467965]  ? calculate_sigpending+0x7b/0xa0
[   25.468031]  ? __pfx_kthread+0x10/0x10
[   25.468143]  ret_from_fork+0x41/0x80
[   25.468218]  ? __pfx_kthread+0x10/0x10
[   25.468280]  ret_from_fork_asm+0x1a/0x30
[   25.468402]  </TASK>
[   25.468442] 
[   25.491223] Allocated by task 285:
[   25.492567]  kasan_save_stack+0x45/0x70
[   25.492935]  kasan_save_track+0x18/0x40
[   25.494468]  kasan_save_alloc_info+0x3b/0x50
[   25.495085]  __kasan_kmalloc+0xb7/0xc0
[   25.495550]  __kmalloc_cache_noprof+0x189/0x420
[   25.496070]  kasan_atomics+0x95/0x310
[   25.496802]  kunit_try_run_case+0x1a5/0x480
[   25.497732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.498260]  kthread+0x337/0x6f0
[   25.498651]  ret_from_fork+0x41/0x80
[   25.498973]  ret_from_fork_asm+0x1a/0x30
[   25.499822] 
[   25.500482] The buggy address belongs to the object at ffff888102ef1180
[   25.500482]  which belongs to the cache kmalloc-64 of size 64
[   25.501348] The buggy address is located 0 bytes to the right of
[   25.501348]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.502365] 
[   25.502627] The buggy address belongs to the physical page:
[   25.503070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.504216] flags: 0x200000000000000(node=0|zone=2)
[   25.505379] page_type: f5(slab)
[   25.505742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.506652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.507621] page dumped because: kasan: bad access detected
[   25.508089] 
[   25.508262] Memory state around the buggy address:
[   25.508590]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.509888]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.510670] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.511418]                                      ^
[   25.511958]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.512835]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.513878] ==================================================================
[   24.327462] ==================================================================
[   24.328085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   24.328670] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.329986] 
[   24.330364] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.330572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.330616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.330678] Call Trace:
[   24.330729]  <TASK>
[   24.330782]  dump_stack_lvl+0x73/0xb0
[   24.330869]  print_report+0xd1/0x650
[   24.330951]  ? __virt_addr_valid+0x1db/0x2d0
[   24.331028]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.331154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.331235]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.331331]  kasan_report+0x141/0x180
[   24.331399]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.331444]  kasan_check_range+0x10c/0x1c0
[   24.331477]  __kasan_check_write+0x18/0x20
[   24.331508]  kasan_atomics_helper+0xb6a/0x5450
[   24.331543]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.331577]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.331615]  ? kasan_atomics+0x152/0x310
[   24.331648]  kasan_atomics+0x1dc/0x310
[   24.331677]  ? __pfx_kasan_atomics+0x10/0x10
[   24.331711]  ? __pfx_read_tsc+0x10/0x10
[   24.331745]  ? ktime_get_ts64+0x86/0x230
[   24.331785]  kunit_try_run_case+0x1a5/0x480
[   24.331825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.331862]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.331925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.331962]  ? __kthread_parkme+0x82/0x180
[   24.331997]  ? preempt_count_sub+0x50/0x80
[   24.332053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.332117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.332156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.332192]  kthread+0x337/0x6f0
[   24.332218]  ? trace_preempt_on+0x20/0xc0
[   24.332256]  ? __pfx_kthread+0x10/0x10
[   24.332282]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.332361]  ? calculate_sigpending+0x7b/0xa0
[   24.332416]  ? __pfx_kthread+0x10/0x10
[   24.332447]  ret_from_fork+0x41/0x80
[   24.332484]  ? __pfx_kthread+0x10/0x10
[   24.332511]  ret_from_fork_asm+0x1a/0x30
[   24.332560]  </TASK>
[   24.332577] 
[   24.349771] Allocated by task 285:
[   24.350270]  kasan_save_stack+0x45/0x70
[   24.350913]  kasan_save_track+0x18/0x40
[   24.351412]  kasan_save_alloc_info+0x3b/0x50
[   24.351922]  __kasan_kmalloc+0xb7/0xc0
[   24.352375]  __kmalloc_cache_noprof+0x189/0x420
[   24.352982]  kasan_atomics+0x95/0x310
[   24.353506]  kunit_try_run_case+0x1a5/0x480
[   24.353969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.354537]  kthread+0x337/0x6f0
[   24.354929]  ret_from_fork+0x41/0x80
[   24.355505]  ret_from_fork_asm+0x1a/0x30
[   24.355831] 
[   24.356049] The buggy address belongs to the object at ffff888102ef1180
[   24.356049]  which belongs to the cache kmalloc-64 of size 64
[   24.357228] The buggy address is located 0 bytes to the right of
[   24.357228]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.358399] 
[   24.358726] The buggy address belongs to the physical page:
[   24.359379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.359994] flags: 0x200000000000000(node=0|zone=2)
[   24.360789] page_type: f5(slab)
[   24.361265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.362096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.362970] page dumped because: kasan: bad access detected
[   24.363550] 
[   24.363757] Memory state around the buggy address:
[   24.364449]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.364901]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.365741] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.366565]                                      ^
[   24.367091]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.367797]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.368459] ==================================================================
[   23.528474] ==================================================================
[   23.529165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   23.529970] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.530725] 
[   23.530931] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.531163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.531206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.531264] Call Trace:
[   23.531332]  <TASK>
[   23.531384]  dump_stack_lvl+0x73/0xb0
[   23.531469]  print_report+0xd1/0x650
[   23.531610]  ? __virt_addr_valid+0x1db/0x2d0
[   23.531788]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.531867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.531954]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.532029]  kasan_report+0x141/0x180
[   23.532271]  ? kasan_atomics_helper+0x4ba2/0x5450
[   23.532396]  __asan_report_store4_noabort+0x1b/0x30
[   23.532473]  kasan_atomics_helper+0x4ba2/0x5450
[   23.532551]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.532626]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.532759]  ? kasan_atomics+0x152/0x310
[   23.532869]  kasan_atomics+0x1dc/0x310
[   23.532942]  ? __pfx_kasan_atomics+0x10/0x10
[   23.533130]  ? __pfx_read_tsc+0x10/0x10
[   23.533207]  ? ktime_get_ts64+0x86/0x230
[   23.533275]  kunit_try_run_case+0x1a5/0x480
[   23.533348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.533386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.533424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.533461]  ? __kthread_parkme+0x82/0x180
[   23.533495]  ? preempt_count_sub+0x50/0x80
[   23.533533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.533569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.533602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.533637]  kthread+0x337/0x6f0
[   23.533661]  ? trace_preempt_on+0x20/0xc0
[   23.533698]  ? __pfx_kthread+0x10/0x10
[   23.533724]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.533757]  ? calculate_sigpending+0x7b/0xa0
[   23.533792]  ? __pfx_kthread+0x10/0x10
[   23.533817]  ret_from_fork+0x41/0x80
[   23.533850]  ? __pfx_kthread+0x10/0x10
[   23.533877]  ret_from_fork_asm+0x1a/0x30
[   23.533921]  </TASK>
[   23.533937] 
[   23.553937] Allocated by task 285:
[   23.554574]  kasan_save_stack+0x45/0x70
[   23.554966]  kasan_save_track+0x18/0x40
[   23.555713]  kasan_save_alloc_info+0x3b/0x50
[   23.556371]  __kasan_kmalloc+0xb7/0xc0
[   23.556708]  __kmalloc_cache_noprof+0x189/0x420
[   23.557081]  kasan_atomics+0x95/0x310
[   23.557427]  kunit_try_run_case+0x1a5/0x480
[   23.557911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.558491]  kthread+0x337/0x6f0
[   23.558891]  ret_from_fork+0x41/0x80
[   23.559357]  ret_from_fork_asm+0x1a/0x30
[   23.559764] 
[   23.560028] The buggy address belongs to the object at ffff888102ef1180
[   23.560028]  which belongs to the cache kmalloc-64 of size 64
[   23.560933] The buggy address is located 0 bytes to the right of
[   23.560933]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.561911] 
[   23.562786] The buggy address belongs to the physical page:
[   23.563391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.564114] flags: 0x200000000000000(node=0|zone=2)
[   23.564593] page_type: f5(slab)
[   23.564987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.567560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.568401] page dumped because: kasan: bad access detected
[   23.568744] 
[   23.568877] Memory state around the buggy address:
[   23.569256]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.570441]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.571007] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.571709]                                      ^
[   23.572287]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.572890]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.573610] ==================================================================
[   26.290162] ==================================================================
[   26.290735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   26.291776] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.292371] 
[   26.292659] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.292866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.292914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.292978] Call Trace:
[   26.293090]  <TASK>
[   26.293150]  dump_stack_lvl+0x73/0xb0
[   26.293239]  print_report+0xd1/0x650
[   26.293360]  ? __virt_addr_valid+0x1db/0x2d0
[   26.293441]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.293516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.293650]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.293790]  kasan_report+0x141/0x180
[   26.293939]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.294039]  __asan_report_load8_noabort+0x18/0x20
[   26.294156]  kasan_atomics_helper+0x4fb2/0x5450
[   26.294246]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.294322]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.294368]  ? kasan_atomics+0x152/0x310
[   26.294406]  kasan_atomics+0x1dc/0x310
[   26.294436]  ? __pfx_kasan_atomics+0x10/0x10
[   26.294470]  ? __pfx_read_tsc+0x10/0x10
[   26.294505]  ? ktime_get_ts64+0x86/0x230
[   26.294545]  kunit_try_run_case+0x1a5/0x480
[   26.294585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.294622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.294661]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.294698]  ? __kthread_parkme+0x82/0x180
[   26.294733]  ? preempt_count_sub+0x50/0x80
[   26.294770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.294809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.294845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.294882]  kthread+0x337/0x6f0
[   26.294909]  ? trace_preempt_on+0x20/0xc0
[   26.294954]  ? __pfx_kthread+0x10/0x10
[   26.295023]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.295137]  ? calculate_sigpending+0x7b/0xa0
[   26.295221]  ? __pfx_kthread+0x10/0x10
[   26.295311]  ret_from_fork+0x41/0x80
[   26.295380]  ? __pfx_kthread+0x10/0x10
[   26.295452]  ret_from_fork_asm+0x1a/0x30
[   26.295550]  </TASK>
[   26.295579] 
[   26.311886] Allocated by task 285:
[   26.312503]  kasan_save_stack+0x45/0x70
[   26.313021]  kasan_save_track+0x18/0x40
[   26.313573]  kasan_save_alloc_info+0x3b/0x50
[   26.313939]  __kasan_kmalloc+0xb7/0xc0
[   26.314317]  __kmalloc_cache_noprof+0x189/0x420
[   26.314763]  kasan_atomics+0x95/0x310
[   26.315079]  kunit_try_run_case+0x1a5/0x480
[   26.315583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.316194]  kthread+0x337/0x6f0
[   26.316642]  ret_from_fork+0x41/0x80
[   26.317147]  ret_from_fork_asm+0x1a/0x30
[   26.317664] 
[   26.317978] The buggy address belongs to the object at ffff888102ef1180
[   26.317978]  which belongs to the cache kmalloc-64 of size 64
[   26.318961] The buggy address is located 0 bytes to the right of
[   26.318961]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.320130] 
[   26.320517] The buggy address belongs to the physical page:
[   26.321093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.321889] flags: 0x200000000000000(node=0|zone=2)
[   26.322516] page_type: f5(slab)
[   26.322965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.323750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.325289] page dumped because: kasan: bad access detected
[   26.326245] 
[   26.326426] Memory state around the buggy address:
[   26.327168]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.327727]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.328526] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.329500]                                      ^
[   26.330161]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.330819]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.331623] ==================================================================
[   25.177599] ==================================================================
[   25.178689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   25.179582] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.180110] 
[   25.180435] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.180574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.180618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.180680] Call Trace:
[   25.180737]  <TASK>
[   25.180785]  dump_stack_lvl+0x73/0xb0
[   25.180864]  print_report+0xd1/0x650
[   25.180938]  ? __virt_addr_valid+0x1db/0x2d0
[   25.181009]  ? kasan_atomics_helper+0x1467/0x5450
[   25.181090]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.181239]  ? kasan_atomics_helper+0x1467/0x5450
[   25.181346]  kasan_report+0x141/0x180
[   25.181432]  ? kasan_atomics_helper+0x1467/0x5450
[   25.181524]  kasan_check_range+0x10c/0x1c0
[   25.181654]  __kasan_check_write+0x18/0x20
[   25.181739]  kasan_atomics_helper+0x1467/0x5450
[   25.181841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.181927]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.182058]  ? kasan_atomics+0x152/0x310
[   25.182160]  kasan_atomics+0x1dc/0x310
[   25.182252]  ? __pfx_kasan_atomics+0x10/0x10
[   25.182362]  ? __pfx_read_tsc+0x10/0x10
[   25.182482]  ? ktime_get_ts64+0x86/0x230
[   25.182575]  kunit_try_run_case+0x1a5/0x480
[   25.182665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.182743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.182871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.182967]  ? __kthread_parkme+0x82/0x180
[   25.183055]  ? preempt_count_sub+0x50/0x80
[   25.183150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.183272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.183386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.183516]  kthread+0x337/0x6f0
[   25.183626]  ? trace_preempt_on+0x20/0xc0
[   25.183745]  ? __pfx_kthread+0x10/0x10
[   25.183814]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.183903]  ? calculate_sigpending+0x7b/0xa0
[   25.183988]  ? __pfx_kthread+0x10/0x10
[   25.184076]  ret_from_fork+0x41/0x80
[   25.184157]  ? __pfx_kthread+0x10/0x10
[   25.184225]  ret_from_fork_asm+0x1a/0x30
[   25.184346]  </TASK>
[   25.184391] 
[   25.210869] Allocated by task 285:
[   25.211063]  kasan_save_stack+0x45/0x70
[   25.211253]  kasan_save_track+0x18/0x40
[   25.212862]  kasan_save_alloc_info+0x3b/0x50
[   25.213702]  __kasan_kmalloc+0xb7/0xc0
[   25.214414]  __kmalloc_cache_noprof+0x189/0x420
[   25.214976]  kasan_atomics+0x95/0x310
[   25.215462]  kunit_try_run_case+0x1a5/0x480
[   25.216160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.216843]  kthread+0x337/0x6f0
[   25.217283]  ret_from_fork+0x41/0x80
[   25.217692]  ret_from_fork_asm+0x1a/0x30
[   25.218035] 
[   25.218933] The buggy address belongs to the object at ffff888102ef1180
[   25.218933]  which belongs to the cache kmalloc-64 of size 64
[   25.220338] The buggy address is located 0 bytes to the right of
[   25.220338]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.220902] 
[   25.221010] The buggy address belongs to the physical page:
[   25.221881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.223226] flags: 0x200000000000000(node=0|zone=2)
[   25.223933] page_type: f5(slab)
[   25.224240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.224972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.225804] page dumped because: kasan: bad access detected
[   25.226808] 
[   25.227028] Memory state around the buggy address:
[   25.227690]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.228582]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.229039] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.229710]                                      ^
[   25.230069]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.230734]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.231405] ==================================================================
[   26.378750] ==================================================================
[   26.379844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   26.381274] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.383004] 
[   26.383492] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.383603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.383626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.383661] Call Trace:
[   26.383686]  <TASK>
[   26.383742]  dump_stack_lvl+0x73/0xb0
[   26.383814]  print_report+0xd1/0x650
[   26.383859]  ? __virt_addr_valid+0x1db/0x2d0
[   26.383911]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.383949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.383986]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.384022]  kasan_report+0x141/0x180
[   26.384356]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.384416]  __asan_report_load8_noabort+0x18/0x20
[   26.384456]  kasan_atomics_helper+0x4fa5/0x5450
[   26.384496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.384533]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.384572]  ? kasan_atomics+0x152/0x310
[   26.384607]  kasan_atomics+0x1dc/0x310
[   26.384637]  ? __pfx_kasan_atomics+0x10/0x10
[   26.384668]  ? __pfx_read_tsc+0x10/0x10
[   26.384703]  ? ktime_get_ts64+0x86/0x230
[   26.384745]  kunit_try_run_case+0x1a5/0x480
[   26.384785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.384820]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.384858]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.384896]  ? __kthread_parkme+0x82/0x180
[   26.384931]  ? preempt_count_sub+0x50/0x80
[   26.384970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.385009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.385088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.385136]  kthread+0x337/0x6f0
[   26.385167]  ? trace_preempt_on+0x20/0xc0
[   26.385208]  ? __pfx_kthread+0x10/0x10
[   26.385236]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.385270]  ? calculate_sigpending+0x7b/0xa0
[   26.385330]  ? __pfx_kthread+0x10/0x10
[   26.385364]  ret_from_fork+0x41/0x80
[   26.385401]  ? __pfx_kthread+0x10/0x10
[   26.385428]  ret_from_fork_asm+0x1a/0x30
[   26.385476]  </TASK>
[   26.385494] 
[   26.404975] Allocated by task 285:
[   26.405997]  kasan_save_stack+0x45/0x70
[   26.406522]  kasan_save_track+0x18/0x40
[   26.407838]  kasan_save_alloc_info+0x3b/0x50
[   26.408381]  __kasan_kmalloc+0xb7/0xc0
[   26.408794]  __kmalloc_cache_noprof+0x189/0x420
[   26.409473]  kasan_atomics+0x95/0x310
[   26.410030]  kunit_try_run_case+0x1a5/0x480
[   26.410643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.411395]  kthread+0x337/0x6f0
[   26.412041]  ret_from_fork+0x41/0x80
[   26.412411]  ret_from_fork_asm+0x1a/0x30
[   26.413118] 
[   26.413345] The buggy address belongs to the object at ffff888102ef1180
[   26.413345]  which belongs to the cache kmalloc-64 of size 64
[   26.414786] The buggy address is located 0 bytes to the right of
[   26.414786]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.416018] 
[   26.416481] The buggy address belongs to the physical page:
[   26.416827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.417827] flags: 0x200000000000000(node=0|zone=2)
[   26.418226] page_type: f5(slab)
[   26.418660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.419516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.420350] page dumped because: kasan: bad access detected
[   26.420715] 
[   26.421260] Memory state around the buggy address:
[   26.421687]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.422611]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.423145] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.423902]                                      ^
[   26.424830]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.425668]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.426314] ==================================================================
[   24.092127] ==================================================================
[   24.093097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   24.094023] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.095359] 
[   24.095645] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.095781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.095824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.095897] Call Trace:
[   24.096521]  <TASK>
[   24.096584]  dump_stack_lvl+0x73/0xb0
[   24.096672]  print_report+0xd1/0x650
[   24.096733]  ? __virt_addr_valid+0x1db/0x2d0
[   24.096770]  ? kasan_atomics_helper+0x860/0x5450
[   24.096806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.096841]  ? kasan_atomics_helper+0x860/0x5450
[   24.096877]  kasan_report+0x141/0x180
[   24.096912]  ? kasan_atomics_helper+0x860/0x5450
[   24.096955]  kasan_check_range+0x10c/0x1c0
[   24.096987]  __kasan_check_write+0x18/0x20
[   24.097018]  kasan_atomics_helper+0x860/0x5450
[   24.097093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.097133]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.097169]  ? kasan_atomics+0x152/0x310
[   24.097204]  kasan_atomics+0x1dc/0x310
[   24.097235]  ? __pfx_kasan_atomics+0x10/0x10
[   24.097267]  ? __pfx_read_tsc+0x10/0x10
[   24.097327]  ? ktime_get_ts64+0x86/0x230
[   24.097374]  kunit_try_run_case+0x1a5/0x480
[   24.097413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.097448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.097486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.097523]  ? __kthread_parkme+0x82/0x180
[   24.097557]  ? preempt_count_sub+0x50/0x80
[   24.097595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.097632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.097668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.097703]  kthread+0x337/0x6f0
[   24.097729]  ? trace_preempt_on+0x20/0xc0
[   24.097766]  ? __pfx_kthread+0x10/0x10
[   24.097794]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.097826]  ? calculate_sigpending+0x7b/0xa0
[   24.097862]  ? __pfx_kthread+0x10/0x10
[   24.097890]  ret_from_fork+0x41/0x80
[   24.097925]  ? __pfx_kthread+0x10/0x10
[   24.097955]  ret_from_fork_asm+0x1a/0x30
[   24.098000]  </TASK>
[   24.098018] 
[   24.112329] Allocated by task 285:
[   24.112765]  kasan_save_stack+0x45/0x70
[   24.113345]  kasan_save_track+0x18/0x40
[   24.113693]  kasan_save_alloc_info+0x3b/0x50
[   24.114092]  __kasan_kmalloc+0xb7/0xc0
[   24.114514]  __kmalloc_cache_noprof+0x189/0x420
[   24.114996]  kasan_atomics+0x95/0x310
[   24.115405]  kunit_try_run_case+0x1a5/0x480
[   24.115826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.116399]  kthread+0x337/0x6f0
[   24.116714]  ret_from_fork+0x41/0x80
[   24.117115]  ret_from_fork_asm+0x1a/0x30
[   24.117557] 
[   24.117798] The buggy address belongs to the object at ffff888102ef1180
[   24.117798]  which belongs to the cache kmalloc-64 of size 64
[   24.118709] The buggy address is located 0 bytes to the right of
[   24.118709]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.119847] 
[   24.120107] The buggy address belongs to the physical page:
[   24.120573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.121172] flags: 0x200000000000000(node=0|zone=2)
[   24.121722] page_type: f5(slab)
[   24.122031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.123497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.124406] page dumped because: kasan: bad access detected
[   24.124910] 
[   24.125140] Memory state around the buggy address:
[   24.125623]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.126167]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.128276] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.129410]                                      ^
[   24.129605]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.129848]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.130461] ==================================================================
[   23.485997] ==================================================================
[   23.487153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   23.487949] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.488622] 
[   23.488894] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.489108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.489172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.489239] Call Trace:
[   23.489285]  <TASK>
[   23.489408]  dump_stack_lvl+0x73/0xb0
[   23.489544]  print_report+0xd1/0x650
[   23.489622]  ? __virt_addr_valid+0x1db/0x2d0
[   23.489750]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.489853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.489938]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.490067]  kasan_report+0x141/0x180
[   23.490176]  ? kasan_atomics_helper+0x4bbc/0x5450
[   23.490262]  __asan_report_load4_noabort+0x18/0x20
[   23.490340]  kasan_atomics_helper+0x4bbc/0x5450
[   23.490379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.490416]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.490451]  ? kasan_atomics+0x152/0x310
[   23.490486]  kasan_atomics+0x1dc/0x310
[   23.490513]  ? __pfx_kasan_atomics+0x10/0x10
[   23.490544]  ? __pfx_read_tsc+0x10/0x10
[   23.490577]  ? ktime_get_ts64+0x86/0x230
[   23.490616]  kunit_try_run_case+0x1a5/0x480
[   23.490655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.490689]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.490727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.490762]  ? __kthread_parkme+0x82/0x180
[   23.490797]  ? preempt_count_sub+0x50/0x80
[   23.490835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.490871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.490907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.490941]  kthread+0x337/0x6f0
[   23.490964]  ? trace_preempt_on+0x20/0xc0
[   23.491002]  ? __pfx_kthread+0x10/0x10
[   23.491027]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.491088]  ? calculate_sigpending+0x7b/0xa0
[   23.491124]  ? __pfx_kthread+0x10/0x10
[   23.491150]  ret_from_fork+0x41/0x80
[   23.491185]  ? __pfx_kthread+0x10/0x10
[   23.491212]  ret_from_fork_asm+0x1a/0x30
[   23.491258]  </TASK>
[   23.491274] 
[   23.508967] Allocated by task 285:
[   23.509511]  kasan_save_stack+0x45/0x70
[   23.510039]  kasan_save_track+0x18/0x40
[   23.510535]  kasan_save_alloc_info+0x3b/0x50
[   23.511008]  __kasan_kmalloc+0xb7/0xc0
[   23.511440]  __kmalloc_cache_noprof+0x189/0x420
[   23.511890]  kasan_atomics+0x95/0x310
[   23.512452]  kunit_try_run_case+0x1a5/0x480
[   23.512966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.513587]  kthread+0x337/0x6f0
[   23.513950]  ret_from_fork+0x41/0x80
[   23.514468]  ret_from_fork_asm+0x1a/0x30
[   23.515015] 
[   23.515346] The buggy address belongs to the object at ffff888102ef1180
[   23.515346]  which belongs to the cache kmalloc-64 of size 64
[   23.516493] The buggy address is located 0 bytes to the right of
[   23.516493]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.517388] 
[   23.517633] The buggy address belongs to the physical page:
[   23.518023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.518831] flags: 0x200000000000000(node=0|zone=2)
[   23.519490] page_type: f5(slab)
[   23.519955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.520684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.521140] page dumped because: kasan: bad access detected
[   23.521522] 
[   23.521752] Memory state around the buggy address:
[   23.522402]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.523190]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.523921] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.524656]                                      ^
[   23.525146]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.526086]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.526549] ==================================================================
[   23.859474] ==================================================================
[   23.859936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   23.861584] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.862080] 
[   23.862381] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.862500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.862534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.862588] Call Trace:
[   23.862636]  <TASK>
[   23.862688]  dump_stack_lvl+0x73/0xb0
[   23.862770]  print_report+0xd1/0x650
[   23.862849]  ? __virt_addr_valid+0x1db/0x2d0
[   23.862926]  ? kasan_atomics_helper+0x565/0x5450
[   23.862999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.863120]  ? kasan_atomics_helper+0x565/0x5450
[   23.863196]  kasan_report+0x141/0x180
[   23.863273]  ? kasan_atomics_helper+0x565/0x5450
[   23.863379]  kasan_check_range+0x10c/0x1c0
[   23.863450]  __kasan_check_write+0x18/0x20
[   23.863510]  kasan_atomics_helper+0x565/0x5450
[   23.863573]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.863640]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.863706]  ? kasan_atomics+0x152/0x310
[   23.863772]  kasan_atomics+0x1dc/0x310
[   23.863828]  ? __pfx_kasan_atomics+0x10/0x10
[   23.863903]  ? __pfx_read_tsc+0x10/0x10
[   23.863961]  ? ktime_get_ts64+0x86/0x230
[   23.864074]  kunit_try_run_case+0x1a5/0x480
[   23.864154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.864218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.864311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.864397]  ? __kthread_parkme+0x82/0x180
[   23.864475]  ? preempt_count_sub+0x50/0x80
[   23.864561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.864650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.864731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.864810]  kthread+0x337/0x6f0
[   23.864874]  ? trace_preempt_on+0x20/0xc0
[   23.864951]  ? __pfx_kthread+0x10/0x10
[   23.865020]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.865145]  ? calculate_sigpending+0x7b/0xa0
[   23.865224]  ? __pfx_kthread+0x10/0x10
[   23.865326]  ret_from_fork+0x41/0x80
[   23.865412]  ? __pfx_kthread+0x10/0x10
[   23.865488]  ret_from_fork_asm+0x1a/0x30
[   23.865590]  </TASK>
[   23.865633] 
[   23.891242] Allocated by task 285:
[   23.891975]  kasan_save_stack+0x45/0x70
[   23.892645]  kasan_save_track+0x18/0x40
[   23.893182]  kasan_save_alloc_info+0x3b/0x50
[   23.893621]  __kasan_kmalloc+0xb7/0xc0
[   23.893972]  __kmalloc_cache_noprof+0x189/0x420
[   23.894773]  kasan_atomics+0x95/0x310
[   23.895159]  kunit_try_run_case+0x1a5/0x480
[   23.895905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.896799]  kthread+0x337/0x6f0
[   23.897175]  ret_from_fork+0x41/0x80
[   23.897823]  ret_from_fork_asm+0x1a/0x30
[   23.898233] 
[   23.898460] The buggy address belongs to the object at ffff888102ef1180
[   23.898460]  which belongs to the cache kmalloc-64 of size 64
[   23.899400] The buggy address is located 0 bytes to the right of
[   23.899400]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.901203] 
[   23.901478] The buggy address belongs to the physical page:
[   23.902149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.902923] flags: 0x200000000000000(node=0|zone=2)
[   23.903587] page_type: f5(slab)
[   23.904142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.904879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.905729] page dumped because: kasan: bad access detected
[   23.906239] 
[   23.906558] Memory state around the buggy address:
[   23.906895]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.908017]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.908753] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.909551]                                      ^
[   23.909980]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.910840]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.911571] ==================================================================
[   24.857130] ==================================================================
[   24.858640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   24.859961] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.860521] 
[   24.860764] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.860921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.860993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.861087] Call Trace:
[   24.861172]  <TASK>
[   24.861244]  dump_stack_lvl+0x73/0xb0
[   24.861375]  print_report+0xd1/0x650
[   24.861464]  ? __virt_addr_valid+0x1db/0x2d0
[   24.861544]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.861622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.861703]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.861775]  kasan_report+0x141/0x180
[   24.861854]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.861944]  __asan_report_load4_noabort+0x18/0x20
[   24.862020]  kasan_atomics_helper+0x4a02/0x5450
[   24.862103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.862165]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.862237]  ? kasan_atomics+0x152/0x310
[   24.862339]  kasan_atomics+0x1dc/0x310
[   24.862421]  ? __pfx_kasan_atomics+0x10/0x10
[   24.862501]  ? __pfx_read_tsc+0x10/0x10
[   24.862578]  ? ktime_get_ts64+0x86/0x230
[   24.862666]  kunit_try_run_case+0x1a5/0x480
[   24.862754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.862832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.862919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.863022]  ? __kthread_parkme+0x82/0x180
[   24.863127]  ? preempt_count_sub+0x50/0x80
[   24.863213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.863311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.863397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.863475]  kthread+0x337/0x6f0
[   24.863539]  ? trace_preempt_on+0x20/0xc0
[   24.863619]  ? __pfx_kthread+0x10/0x10
[   24.863688]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.863760]  ? calculate_sigpending+0x7b/0xa0
[   24.863837]  ? __pfx_kthread+0x10/0x10
[   24.863921]  ret_from_fork+0x41/0x80
[   24.863993]  ? __pfx_kthread+0x10/0x10
[   24.864086]  ret_from_fork_asm+0x1a/0x30
[   24.864193]  </TASK>
[   24.864232] 
[   24.880010] Allocated by task 285:
[   24.880580]  kasan_save_stack+0x45/0x70
[   24.881069]  kasan_save_track+0x18/0x40
[   24.881547]  kasan_save_alloc_info+0x3b/0x50
[   24.881998]  __kasan_kmalloc+0xb7/0xc0
[   24.882436]  __kmalloc_cache_noprof+0x189/0x420
[   24.883005]  kasan_atomics+0x95/0x310
[   24.883432]  kunit_try_run_case+0x1a5/0x480
[   24.883929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.884745]  kthread+0x337/0x6f0
[   24.885147]  ret_from_fork+0x41/0x80
[   24.885524]  ret_from_fork_asm+0x1a/0x30
[   24.885860] 
[   24.886059] The buggy address belongs to the object at ffff888102ef1180
[   24.886059]  which belongs to the cache kmalloc-64 of size 64
[   24.886780] The buggy address is located 0 bytes to the right of
[   24.886780]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.887930] 
[   24.888176] The buggy address belongs to the physical page:
[   24.888823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.889677] flags: 0x200000000000000(node=0|zone=2)
[   24.890200] page_type: f5(slab)
[   24.890546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.891028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.891454] page dumped because: kasan: bad access detected
[   24.891778] 
[   24.891964] Memory state around the buggy address:
[   24.892269]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.892703]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.893554] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.894033]                                      ^
[   24.894668]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.895488]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.896159] ==================================================================
[   25.515626] ==================================================================
[   25.517550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   25.518407] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.519037] 
[   25.519478] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.519612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.519652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.519715] Call Trace:
[   25.519770]  <TASK>
[   25.519825]  dump_stack_lvl+0x73/0xb0
[   25.520034]  print_report+0xd1/0x650
[   25.520153]  ? __virt_addr_valid+0x1db/0x2d0
[   25.520265]  ? kasan_atomics_helper+0x1818/0x5450
[   25.520385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.520467]  ? kasan_atomics_helper+0x1818/0x5450
[   25.520599]  kasan_report+0x141/0x180
[   25.520764]  ? kasan_atomics_helper+0x1818/0x5450
[   25.520891]  kasan_check_range+0x10c/0x1c0
[   25.520969]  __kasan_check_write+0x18/0x20
[   25.521048]  kasan_atomics_helper+0x1818/0x5450
[   25.521185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.521358]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.521473]  ? kasan_atomics+0x152/0x310
[   25.521556]  kasan_atomics+0x1dc/0x310
[   25.521629]  ? __pfx_kasan_atomics+0x10/0x10
[   25.521685]  ? __pfx_read_tsc+0x10/0x10
[   25.521733]  ? ktime_get_ts64+0x86/0x230
[   25.521823]  kunit_try_run_case+0x1a5/0x480
[   25.521896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.521964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.522008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.522056]  ? __kthread_parkme+0x82/0x180
[   25.522120]  ? preempt_count_sub+0x50/0x80
[   25.522160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.522199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.522238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.522276]  kthread+0x337/0x6f0
[   25.522334]  ? trace_preempt_on+0x20/0xc0
[   25.522377]  ? __pfx_kthread+0x10/0x10
[   25.522407]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.522440]  ? calculate_sigpending+0x7b/0xa0
[   25.522475]  ? __pfx_kthread+0x10/0x10
[   25.522503]  ret_from_fork+0x41/0x80
[   25.522539]  ? __pfx_kthread+0x10/0x10
[   25.522567]  ret_from_fork_asm+0x1a/0x30
[   25.522614]  </TASK>
[   25.522631] 
[   25.539423] Allocated by task 285:
[   25.540054]  kasan_save_stack+0x45/0x70
[   25.540532]  kasan_save_track+0x18/0x40
[   25.540890]  kasan_save_alloc_info+0x3b/0x50
[   25.541232]  __kasan_kmalloc+0xb7/0xc0
[   25.541560]  __kmalloc_cache_noprof+0x189/0x420
[   25.541992]  kasan_atomics+0x95/0x310
[   25.542588]  kunit_try_run_case+0x1a5/0x480
[   25.543409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.544058]  kthread+0x337/0x6f0
[   25.544534]  ret_from_fork+0x41/0x80
[   25.544942]  ret_from_fork_asm+0x1a/0x30
[   25.545507] 
[   25.545802] The buggy address belongs to the object at ffff888102ef1180
[   25.545802]  which belongs to the cache kmalloc-64 of size 64
[   25.547106] The buggy address is located 0 bytes to the right of
[   25.547106]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.548268] 
[   25.548810] The buggy address belongs to the physical page:
[   25.549527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.550043] flags: 0x200000000000000(node=0|zone=2)
[   25.552219] page_type: f5(slab)
[   25.552622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.553227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.553838] page dumped because: kasan: bad access detected
[   25.554921] 
[   25.555145] Memory state around the buggy address:
[   25.556037]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.556510]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.557352] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.558072]                                      ^
[   25.558566]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.559379]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.560004] ==================================================================
[   24.686585] ==================================================================
[   24.687639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   24.688481] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.689271] 
[   24.689631] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.689768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.689811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.689941] Call Trace:
[   24.689999]  <TASK>
[   24.690141]  dump_stack_lvl+0x73/0xb0
[   24.690236]  print_report+0xd1/0x650
[   24.690337]  ? __virt_addr_valid+0x1db/0x2d0
[   24.690416]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.690560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.690648]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.690733]  kasan_report+0x141/0x180
[   24.690780]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.690827]  __asan_report_load4_noabort+0x18/0x20
[   24.690865]  kasan_atomics_helper+0x4a36/0x5450
[   24.690905]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.690944]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.690983]  ? kasan_atomics+0x152/0x310
[   24.691020]  kasan_atomics+0x1dc/0x310
[   24.691092]  ? __pfx_kasan_atomics+0x10/0x10
[   24.691129]  ? __pfx_read_tsc+0x10/0x10
[   24.691167]  ? ktime_get_ts64+0x86/0x230
[   24.691208]  kunit_try_run_case+0x1a5/0x480
[   24.691250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.691306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.691358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.691396]  ? __kthread_parkme+0x82/0x180
[   24.691433]  ? preempt_count_sub+0x50/0x80
[   24.691473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.691515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.691552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.691592]  kthread+0x337/0x6f0
[   24.691620]  ? trace_preempt_on+0x20/0xc0
[   24.691657]  ? __pfx_kthread+0x10/0x10
[   24.691687]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.691722]  ? calculate_sigpending+0x7b/0xa0
[   24.691760]  ? __pfx_kthread+0x10/0x10
[   24.691790]  ret_from_fork+0x41/0x80
[   24.691827]  ? __pfx_kthread+0x10/0x10
[   24.691860]  ret_from_fork_asm+0x1a/0x30
[   24.691923]  </TASK>
[   24.691943] 
[   24.711365] Allocated by task 285:
[   24.711912]  kasan_save_stack+0x45/0x70
[   24.712619]  kasan_save_track+0x18/0x40
[   24.713052]  kasan_save_alloc_info+0x3b/0x50
[   24.713784]  __kasan_kmalloc+0xb7/0xc0
[   24.714231]  __kmalloc_cache_noprof+0x189/0x420
[   24.714720]  kasan_atomics+0x95/0x310
[   24.715120]  kunit_try_run_case+0x1a5/0x480
[   24.715982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.716484]  kthread+0x337/0x6f0
[   24.717279]  ret_from_fork+0x41/0x80
[   24.717799]  ret_from_fork_asm+0x1a/0x30
[   24.718192] 
[   24.718521] The buggy address belongs to the object at ffff888102ef1180
[   24.718521]  which belongs to the cache kmalloc-64 of size 64
[   24.719369] The buggy address is located 0 bytes to the right of
[   24.719369]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.721092] 
[   24.721266] The buggy address belongs to the physical page:
[   24.722000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.722656] flags: 0x200000000000000(node=0|zone=2)
[   24.723107] page_type: f5(slab)
[   24.723544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.724174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.724838] page dumped because: kasan: bad access detected
[   24.725337] 
[   24.725846] Memory state around the buggy address:
[   24.726393]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.726904]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.728028] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.728663]                                      ^
[   24.729176]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.730085]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.730657] ==================================================================
[   24.284787] ==================================================================
[   24.285803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   24.286615] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.287265] 
[   24.287634] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.287771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.287817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.287894] Call Trace:
[   24.287995]  <TASK>
[   24.288076]  dump_stack_lvl+0x73/0xb0
[   24.288245]  print_report+0xd1/0x650
[   24.288351]  ? __virt_addr_valid+0x1db/0x2d0
[   24.288429]  ? kasan_atomics_helper+0xac7/0x5450
[   24.288499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.288540]  ? kasan_atomics_helper+0xac7/0x5450
[   24.288577]  kasan_report+0x141/0x180
[   24.288616]  ? kasan_atomics_helper+0xac7/0x5450
[   24.288657]  kasan_check_range+0x10c/0x1c0
[   24.288688]  __kasan_check_write+0x18/0x20
[   24.288721]  kasan_atomics_helper+0xac7/0x5450
[   24.288756]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.288791]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.288826]  ? kasan_atomics+0x152/0x310
[   24.288860]  kasan_atomics+0x1dc/0x310
[   24.288891]  ? __pfx_kasan_atomics+0x10/0x10
[   24.288921]  ? __pfx_read_tsc+0x10/0x10
[   24.288956]  ? ktime_get_ts64+0x86/0x230
[   24.288998]  kunit_try_run_case+0x1a5/0x480
[   24.289046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.289111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.289153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.289191]  ? __kthread_parkme+0x82/0x180
[   24.289225]  ? preempt_count_sub+0x50/0x80
[   24.289263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.289325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.289368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.289405]  kthread+0x337/0x6f0
[   24.289431]  ? trace_preempt_on+0x20/0xc0
[   24.289467]  ? __pfx_kthread+0x10/0x10
[   24.289495]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.289529]  ? calculate_sigpending+0x7b/0xa0
[   24.289562]  ? __pfx_kthread+0x10/0x10
[   24.289589]  ret_from_fork+0x41/0x80
[   24.289623]  ? __pfx_kthread+0x10/0x10
[   24.289650]  ret_from_fork_asm+0x1a/0x30
[   24.289696]  </TASK>
[   24.289713] 
[   24.306704] Allocated by task 285:
[   24.307315]  kasan_save_stack+0x45/0x70
[   24.307763]  kasan_save_track+0x18/0x40
[   24.308323]  kasan_save_alloc_info+0x3b/0x50
[   24.308889]  __kasan_kmalloc+0xb7/0xc0
[   24.309413]  __kmalloc_cache_noprof+0x189/0x420
[   24.309760]  kasan_atomics+0x95/0x310
[   24.310356]  kunit_try_run_case+0x1a5/0x480
[   24.310823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.311480]  kthread+0x337/0x6f0
[   24.311921]  ret_from_fork+0x41/0x80
[   24.312427]  ret_from_fork_asm+0x1a/0x30
[   24.312958] 
[   24.313349] The buggy address belongs to the object at ffff888102ef1180
[   24.313349]  which belongs to the cache kmalloc-64 of size 64
[   24.314448] The buggy address is located 0 bytes to the right of
[   24.314448]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.315594] 
[   24.315888] The buggy address belongs to the physical page:
[   24.316522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.317369] flags: 0x200000000000000(node=0|zone=2)
[   24.317897] page_type: f5(slab)
[   24.318373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.319137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.319818] page dumped because: kasan: bad access detected
[   24.320361] 
[   24.320550] Memory state around the buggy address:
[   24.321130]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.321876]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.322615] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.323415]                                      ^
[   24.323839]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.324406]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.325359] ==================================================================
[   25.561440] ==================================================================
[   25.561933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   25.563014] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.563955] 
[   25.564407] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.564543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.564588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.564912] Call Trace:
[   25.564946]  <TASK>
[   25.564975]  dump_stack_lvl+0x73/0xb0
[   25.565020]  print_report+0xd1/0x650
[   25.565092]  ? __virt_addr_valid+0x1db/0x2d0
[   25.565131]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.565167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.565208]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.565246]  kasan_report+0x141/0x180
[   25.565285]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.565356]  kasan_check_range+0x10c/0x1c0
[   25.565392]  __kasan_check_write+0x18/0x20
[   25.565426]  kasan_atomics_helper+0x18b1/0x5450
[   25.565464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.565504]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.565541]  ? kasan_atomics+0x152/0x310
[   25.565579]  kasan_atomics+0x1dc/0x310
[   25.565610]  ? __pfx_kasan_atomics+0x10/0x10
[   25.565645]  ? __pfx_read_tsc+0x10/0x10
[   25.565680]  ? ktime_get_ts64+0x86/0x230
[   25.565722]  kunit_try_run_case+0x1a5/0x480
[   25.565763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.565800]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.565839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.565877]  ? __kthread_parkme+0x82/0x180
[   25.565913]  ? preempt_count_sub+0x50/0x80
[   25.565953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.565991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.566029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.566091]  kthread+0x337/0x6f0
[   25.566123]  ? trace_preempt_on+0x20/0xc0
[   25.566164]  ? __pfx_kthread+0x10/0x10
[   25.566193]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.566228]  ? calculate_sigpending+0x7b/0xa0
[   25.566264]  ? __pfx_kthread+0x10/0x10
[   25.566314]  ret_from_fork+0x41/0x80
[   25.566357]  ? __pfx_kthread+0x10/0x10
[   25.566389]  ret_from_fork_asm+0x1a/0x30
[   25.566437]  </TASK>
[   25.566455] 
[   25.584630] Allocated by task 285:
[   25.585098]  kasan_save_stack+0x45/0x70
[   25.585685]  kasan_save_track+0x18/0x40
[   25.586099]  kasan_save_alloc_info+0x3b/0x50
[   25.586740]  __kasan_kmalloc+0xb7/0xc0
[   25.587197]  __kmalloc_cache_noprof+0x189/0x420
[   25.587754]  kasan_atomics+0x95/0x310
[   25.588419]  kunit_try_run_case+0x1a5/0x480
[   25.589042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.589607]  kthread+0x337/0x6f0
[   25.589977]  ret_from_fork+0x41/0x80
[   25.590516]  ret_from_fork_asm+0x1a/0x30
[   25.590980] 
[   25.591174] The buggy address belongs to the object at ffff888102ef1180
[   25.591174]  which belongs to the cache kmalloc-64 of size 64
[   25.592220] The buggy address is located 0 bytes to the right of
[   25.592220]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.593418] 
[   25.593617] The buggy address belongs to the physical page:
[   25.594227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.595072] flags: 0x200000000000000(node=0|zone=2)
[   25.595628] page_type: f5(slab)
[   25.596096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.596851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.597764] page dumped because: kasan: bad access detected
[   25.598484] 
[   25.598780] Memory state around the buggy address:
[   25.599289]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.600024]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.600767] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.601594]                                      ^
[   25.602250]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.602886]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.603462] ==================================================================
[   26.427708] ==================================================================
[   26.429105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   26.429856] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.430476] 
[   26.431160] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.431459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.431497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.431533] Call Trace:
[   26.431563]  <TASK>
[   26.431590]  dump_stack_lvl+0x73/0xb0
[   26.431636]  print_report+0xd1/0x650
[   26.431678]  ? __virt_addr_valid+0x1db/0x2d0
[   26.431714]  ? kasan_atomics_helper+0x224c/0x5450
[   26.431751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.431788]  ? kasan_atomics_helper+0x224c/0x5450
[   26.431824]  kasan_report+0x141/0x180
[   26.431862]  ? kasan_atomics_helper+0x224c/0x5450
[   26.431917]  kasan_check_range+0x10c/0x1c0
[   26.431951]  __kasan_check_write+0x18/0x20
[   26.431985]  kasan_atomics_helper+0x224c/0x5450
[   26.432023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.432087]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.432130]  ? kasan_atomics+0x152/0x310
[   26.432170]  kasan_atomics+0x1dc/0x310
[   26.432203]  ? __pfx_kasan_atomics+0x10/0x10
[   26.432238]  ? __pfx_read_tsc+0x10/0x10
[   26.432273]  ? ktime_get_ts64+0x86/0x230
[   26.432340]  kunit_try_run_case+0x1a5/0x480
[   26.432385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.432424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.432467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.432507]  ? __kthread_parkme+0x82/0x180
[   26.432544]  ? preempt_count_sub+0x50/0x80
[   26.432584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.432625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.432663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.432702]  kthread+0x337/0x6f0
[   26.432730]  ? trace_preempt_on+0x20/0xc0
[   26.432769]  ? __pfx_kthread+0x10/0x10
[   26.432798]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.432833]  ? calculate_sigpending+0x7b/0xa0
[   26.432869]  ? __pfx_kthread+0x10/0x10
[   26.432900]  ret_from_fork+0x41/0x80
[   26.432934]  ? __pfx_kthread+0x10/0x10
[   26.432965]  ret_from_fork_asm+0x1a/0x30
[   26.433013]  </TASK>
[   26.433031] 
[   26.453910] Allocated by task 285:
[   26.454777]  kasan_save_stack+0x45/0x70
[   26.455129]  kasan_save_track+0x18/0x40
[   26.455917]  kasan_save_alloc_info+0x3b/0x50
[   26.456470]  __kasan_kmalloc+0xb7/0xc0
[   26.457050]  __kmalloc_cache_noprof+0x189/0x420
[   26.457513]  kasan_atomics+0x95/0x310
[   26.457883]  kunit_try_run_case+0x1a5/0x480
[   26.458738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.459134]  kthread+0x337/0x6f0
[   26.459694]  ret_from_fork+0x41/0x80
[   26.460086]  ret_from_fork_asm+0x1a/0x30
[   26.460505] 
[   26.460737] The buggy address belongs to the object at ffff888102ef1180
[   26.460737]  which belongs to the cache kmalloc-64 of size 64
[   26.462070] The buggy address is located 0 bytes to the right of
[   26.462070]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.463216] 
[   26.463485] The buggy address belongs to the physical page:
[   26.463910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.465030] flags: 0x200000000000000(node=0|zone=2)
[   26.465708] page_type: f5(slab)
[   26.466669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.467203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.468009] page dumped because: kasan: bad access detected
[   26.468739] 
[   26.469124] Memory state around the buggy address:
[   26.469631]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.470620]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.471149] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.472025]                                      ^
[   26.472765]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.473817]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.475076] ==================================================================
[   24.424360] ==================================================================
[   24.425093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   24.425787] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.426614] 
[   24.426974] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.427142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.427202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.427308] Call Trace:
[   24.427370]  <TASK>
[   24.427424]  dump_stack_lvl+0x73/0xb0
[   24.427519]  print_report+0xd1/0x650
[   24.427655]  ? __virt_addr_valid+0x1db/0x2d0
[   24.427767]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.427847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.427925]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.427964]  kasan_report+0x141/0x180
[   24.428002]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.428059]  __asan_report_load4_noabort+0x18/0x20
[   24.428117]  kasan_atomics_helper+0x4a84/0x5450
[   24.428156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.428194]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.428231]  ? kasan_atomics+0x152/0x310
[   24.428268]  kasan_atomics+0x1dc/0x310
[   24.428323]  ? __pfx_kasan_atomics+0x10/0x10
[   24.428361]  ? __pfx_read_tsc+0x10/0x10
[   24.428397]  ? ktime_get_ts64+0x86/0x230
[   24.428437]  kunit_try_run_case+0x1a5/0x480
[   24.428477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.428511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.428550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.428587]  ? __kthread_parkme+0x82/0x180
[   24.428622]  ? preempt_count_sub+0x50/0x80
[   24.428660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.428697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.428733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.428770]  kthread+0x337/0x6f0
[   24.428796]  ? trace_preempt_on+0x20/0xc0
[   24.428835]  ? __pfx_kthread+0x10/0x10
[   24.428862]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.428895]  ? calculate_sigpending+0x7b/0xa0
[   24.428928]  ? __pfx_kthread+0x10/0x10
[   24.428954]  ret_from_fork+0x41/0x80
[   24.428989]  ? __pfx_kthread+0x10/0x10
[   24.429016]  ret_from_fork_asm+0x1a/0x30
[   24.429101]  </TASK>
[   24.429121] 
[   24.445959] Allocated by task 285:
[   24.446502]  kasan_save_stack+0x45/0x70
[   24.447058]  kasan_save_track+0x18/0x40
[   24.447559]  kasan_save_alloc_info+0x3b/0x50
[   24.448088]  __kasan_kmalloc+0xb7/0xc0
[   24.448531]  __kmalloc_cache_noprof+0x189/0x420
[   24.449112]  kasan_atomics+0x95/0x310
[   24.449524]  kunit_try_run_case+0x1a5/0x480
[   24.450061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.450855]  kthread+0x337/0x6f0
[   24.451515]  ret_from_fork+0x41/0x80
[   24.451844]  ret_from_fork_asm+0x1a/0x30
[   24.452495] 
[   24.452836] The buggy address belongs to the object at ffff888102ef1180
[   24.452836]  which belongs to the cache kmalloc-64 of size 64
[   24.454880] The buggy address is located 0 bytes to the right of
[   24.454880]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.456916] 
[   24.457241] The buggy address belongs to the physical page:
[   24.457841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.458589] flags: 0x200000000000000(node=0|zone=2)
[   24.459097] page_type: f5(slab)
[   24.459543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.460326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.460998] page dumped because: kasan: bad access detected
[   24.461462] 
[   24.461698] Memory state around the buggy address:
[   24.462098]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.462702]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.463489] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.464164]                                      ^
[   24.464622]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.465279]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.465893] ==================================================================
[   24.133450] ==================================================================
[   24.136105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   24.137933] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.138348] 
[   24.138563] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.138686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.138726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.138783] Call Trace:
[   24.138838]  <TASK>
[   24.138888]  dump_stack_lvl+0x73/0xb0
[   24.138973]  print_report+0xd1/0x650
[   24.140163]  ? __virt_addr_valid+0x1db/0x2d0
[   24.140393]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.140466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.140538]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.140611]  kasan_report+0x141/0x180
[   24.140974]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.141102]  kasan_check_range+0x10c/0x1c0
[   24.141176]  __kasan_check_write+0x18/0x20
[   24.141235]  kasan_atomics_helper+0x8f9/0x5450
[   24.141326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.141395]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.141462]  ? kasan_atomics+0x152/0x310
[   24.141531]  kasan_atomics+0x1dc/0x310
[   24.141588]  ? __pfx_kasan_atomics+0x10/0x10
[   24.141646]  ? __pfx_read_tsc+0x10/0x10
[   24.141709]  ? ktime_get_ts64+0x86/0x230
[   24.141780]  kunit_try_run_case+0x1a5/0x480
[   24.141853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.141923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.141999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.142122]  ? __kthread_parkme+0x82/0x180
[   24.142196]  ? preempt_count_sub+0x50/0x80
[   24.142268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.142431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.142512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.142575]  kthread+0x337/0x6f0
[   24.142621]  ? trace_preempt_on+0x20/0xc0
[   24.142682]  ? __pfx_kthread+0x10/0x10
[   24.142732]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.142787]  ? calculate_sigpending+0x7b/0xa0
[   24.142845]  ? __pfx_kthread+0x10/0x10
[   24.142895]  ret_from_fork+0x41/0x80
[   24.142951]  ? __pfx_kthread+0x10/0x10
[   24.143002]  ret_from_fork_asm+0x1a/0x30
[   24.143104]  </TASK>
[   24.143140] 
[   24.166719] Allocated by task 285:
[   24.167199]  kasan_save_stack+0x45/0x70
[   24.167622]  kasan_save_track+0x18/0x40
[   24.168608]  kasan_save_alloc_info+0x3b/0x50
[   24.169089]  __kasan_kmalloc+0xb7/0xc0
[   24.169552]  __kmalloc_cache_noprof+0x189/0x420
[   24.169953]  kasan_atomics+0x95/0x310
[   24.170910]  kunit_try_run_case+0x1a5/0x480
[   24.171838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.172391]  kthread+0x337/0x6f0
[   24.172680]  ret_from_fork+0x41/0x80
[   24.172992]  ret_from_fork_asm+0x1a/0x30
[   24.173988] 
[   24.174206] The buggy address belongs to the object at ffff888102ef1180
[   24.174206]  which belongs to the cache kmalloc-64 of size 64
[   24.175941] The buggy address is located 0 bytes to the right of
[   24.175941]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.177479] 
[   24.177664] The buggy address belongs to the physical page:
[   24.178496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.179508] flags: 0x200000000000000(node=0|zone=2)
[   24.180192] page_type: f5(slab)
[   24.180592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.181511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.182390] page dumped because: kasan: bad access detected
[   24.182819] 
[   24.182984] Memory state around the buggy address:
[   24.184104]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.184717]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.185531] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.186331]                                      ^
[   24.186664]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.187275]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.188405] ==================================================================
[   25.274526] ==================================================================
[   25.275242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   25.276418] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.277695] 
[   25.277992] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.278138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.278179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.278213] Call Trace:
[   25.278241]  <TASK>
[   25.278270]  dump_stack_lvl+0x73/0xb0
[   25.278375]  print_report+0xd1/0x650
[   25.278426]  ? __virt_addr_valid+0x1db/0x2d0
[   25.278464]  ? kasan_atomics_helper+0x151d/0x5450
[   25.278501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.278540]  ? kasan_atomics_helper+0x151d/0x5450
[   25.278576]  kasan_report+0x141/0x180
[   25.278613]  ? kasan_atomics_helper+0x151d/0x5450
[   25.278656]  kasan_check_range+0x10c/0x1c0
[   25.278690]  __kasan_check_write+0x18/0x20
[   25.278724]  kasan_atomics_helper+0x151d/0x5450
[   25.278763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.278802]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.278839]  ? kasan_atomics+0x152/0x310
[   25.278877]  kasan_atomics+0x1dc/0x310
[   25.278908]  ? __pfx_kasan_atomics+0x10/0x10
[   25.278942]  ? __pfx_read_tsc+0x10/0x10
[   25.278976]  ? ktime_get_ts64+0x86/0x230
[   25.279018]  kunit_try_run_case+0x1a5/0x480
[   25.279186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.279307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.279392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.279472]  ? __kthread_parkme+0x82/0x180
[   25.279548]  ? preempt_count_sub+0x50/0x80
[   25.279633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.279717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.279799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.279895]  kthread+0x337/0x6f0
[   25.279964]  ? trace_preempt_on+0x20/0xc0
[   25.280024]  ? __pfx_kthread+0x10/0x10
[   25.280097]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.280136]  ? calculate_sigpending+0x7b/0xa0
[   25.280172]  ? __pfx_kthread+0x10/0x10
[   25.280200]  ret_from_fork+0x41/0x80
[   25.280236]  ? __pfx_kthread+0x10/0x10
[   25.280266]  ret_from_fork_asm+0x1a/0x30
[   25.280339]  </TASK>
[   25.280359] 
[   25.295521] Allocated by task 285:
[   25.295989]  kasan_save_stack+0x45/0x70
[   25.296578]  kasan_save_track+0x18/0x40
[   25.297080]  kasan_save_alloc_info+0x3b/0x50
[   25.297601]  __kasan_kmalloc+0xb7/0xc0
[   25.298093]  __kmalloc_cache_noprof+0x189/0x420
[   25.298605]  kasan_atomics+0x95/0x310
[   25.298952]  kunit_try_run_case+0x1a5/0x480
[   25.299464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.300100]  kthread+0x337/0x6f0
[   25.300457]  ret_from_fork+0x41/0x80
[   25.300792]  ret_from_fork_asm+0x1a/0x30
[   25.301173] 
[   25.301402] The buggy address belongs to the object at ffff888102ef1180
[   25.301402]  which belongs to the cache kmalloc-64 of size 64
[   25.302540] The buggy address is located 0 bytes to the right of
[   25.302540]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.303709] 
[   25.303922] The buggy address belongs to the physical page:
[   25.304356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.304850] flags: 0x200000000000000(node=0|zone=2)
[   25.305247] page_type: f5(slab)
[   25.305620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.306263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.306920] page dumped because: kasan: bad access detected
[   25.307524] 
[   25.307793] Memory state around the buggy address:
[   25.308350]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.309073]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.309738] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.310813]                                      ^
[   25.311249]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.312875]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.313573] ==================================================================
[   25.094099] ==================================================================
[   25.095140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   25.096085] Read of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.096658] 
[   25.096976] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.097109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.097152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.097216] Call Trace:
[   25.097272]  <TASK>
[   25.097349]  dump_stack_lvl+0x73/0xb0
[   25.097474]  print_report+0xd1/0x650
[   25.097565]  ? __virt_addr_valid+0x1db/0x2d0
[   25.097646]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.097722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.097799]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.097875]  kasan_report+0x141/0x180
[   25.097955]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.098048]  kasan_check_range+0x10c/0x1c0
[   25.098254]  __kasan_check_read+0x15/0x20
[   25.098353]  kasan_atomics_helper+0x13b5/0x5450
[   25.098412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.098453]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.098496]  ? kasan_atomics+0x152/0x310
[   25.098533]  kasan_atomics+0x1dc/0x310
[   25.098566]  ? __pfx_kasan_atomics+0x10/0x10
[   25.098603]  ? __pfx_read_tsc+0x10/0x10
[   25.098642]  ? ktime_get_ts64+0x86/0x230
[   25.098686]  kunit_try_run_case+0x1a5/0x480
[   25.098729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.098766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.098808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.098847]  ? __kthread_parkme+0x82/0x180
[   25.098882]  ? preempt_count_sub+0x50/0x80
[   25.098921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.098959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.098997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.099039]  kthread+0x337/0x6f0
[   25.099096]  ? trace_preempt_on+0x20/0xc0
[   25.099139]  ? __pfx_kthread+0x10/0x10
[   25.099169]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.099204]  ? calculate_sigpending+0x7b/0xa0
[   25.099241]  ? __pfx_kthread+0x10/0x10
[   25.099270]  ret_from_fork+0x41/0x80
[   25.099346]  ? __pfx_kthread+0x10/0x10
[   25.099417]  ret_from_fork_asm+0x1a/0x30
[   25.099517]  </TASK>
[   25.099606] 
[   25.117149] Allocated by task 285:
[   25.117684]  kasan_save_stack+0x45/0x70
[   25.118229]  kasan_save_track+0x18/0x40
[   25.118711]  kasan_save_alloc_info+0x3b/0x50
[   25.119245]  __kasan_kmalloc+0xb7/0xc0
[   25.119707]  __kmalloc_cache_noprof+0x189/0x420
[   25.120242]  kasan_atomics+0x95/0x310
[   25.120730]  kunit_try_run_case+0x1a5/0x480
[   25.121266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.121806]  kthread+0x337/0x6f0
[   25.122240]  ret_from_fork+0x41/0x80
[   25.122672]  ret_from_fork_asm+0x1a/0x30
[   25.123216] 
[   25.123494] The buggy address belongs to the object at ffff888102ef1180
[   25.123494]  which belongs to the cache kmalloc-64 of size 64
[   25.124535] The buggy address is located 0 bytes to the right of
[   25.124535]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.125636] 
[   25.125895] The buggy address belongs to the physical page:
[   25.126282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.127115] flags: 0x200000000000000(node=0|zone=2)
[   25.127668] page_type: f5(slab)
[   25.128027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.128803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.129540] page dumped because: kasan: bad access detected
[   25.130121] 
[   25.130417] Memory state around the buggy address:
[   25.130830]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.131352]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.132188] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.132876]                                      ^
[   25.133443]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.133946]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.134539] ==================================================================
[   25.413778] ==================================================================
[   25.414814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   25.415923] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.416994] 
[   25.417493] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.417610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.417632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.417665] Call Trace:
[   25.417694]  <TASK>
[   25.417723]  dump_stack_lvl+0x73/0xb0
[   25.417772]  print_report+0xd1/0x650
[   25.417815]  ? __virt_addr_valid+0x1db/0x2d0
[   25.417851]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.417887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.417924]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.417962]  kasan_report+0x141/0x180
[   25.418003]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.418062]  kasan_check_range+0x10c/0x1c0
[   25.418118]  __kasan_check_write+0x18/0x20
[   25.418152]  kasan_atomics_helper+0x16e7/0x5450
[   25.418192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.418231]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.418270]  ? kasan_atomics+0x152/0x310
[   25.418358]  kasan_atomics+0x1dc/0x310
[   25.418450]  ? __pfx_kasan_atomics+0x10/0x10
[   25.418549]  ? __pfx_read_tsc+0x10/0x10
[   25.418635]  ? ktime_get_ts64+0x86/0x230
[   25.418731]  kunit_try_run_case+0x1a5/0x480
[   25.418821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.418885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.418932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.418971]  ? __kthread_parkme+0x82/0x180
[   25.419007]  ? preempt_count_sub+0x50/0x80
[   25.419088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.419136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.419177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.419214]  kthread+0x337/0x6f0
[   25.419241]  ? trace_preempt_on+0x20/0xc0
[   25.419280]  ? __pfx_kthread+0x10/0x10
[   25.419335]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.419372]  ? calculate_sigpending+0x7b/0xa0
[   25.419408]  ? __pfx_kthread+0x10/0x10
[   25.419439]  ret_from_fork+0x41/0x80
[   25.419474]  ? __pfx_kthread+0x10/0x10
[   25.419505]  ret_from_fork_asm+0x1a/0x30
[   25.419553]  </TASK>
[   25.419570] 
[   25.440630] Allocated by task 285:
[   25.441475]  kasan_save_stack+0x45/0x70
[   25.441860]  kasan_save_track+0x18/0x40
[   25.442706]  kasan_save_alloc_info+0x3b/0x50
[   25.443027]  __kasan_kmalloc+0xb7/0xc0
[   25.443725]  __kmalloc_cache_noprof+0x189/0x420
[   25.444159]  kasan_atomics+0x95/0x310
[   25.444925]  kunit_try_run_case+0x1a5/0x480
[   25.445527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.446206]  kthread+0x337/0x6f0
[   25.446511]  ret_from_fork+0x41/0x80
[   25.446827]  ret_from_fork_asm+0x1a/0x30
[   25.447226] 
[   25.447409] The buggy address belongs to the object at ffff888102ef1180
[   25.447409]  which belongs to the cache kmalloc-64 of size 64
[   25.448551] The buggy address is located 0 bytes to the right of
[   25.448551]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.449410] 
[   25.449662] The buggy address belongs to the physical page:
[   25.450192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.451520] flags: 0x200000000000000(node=0|zone=2)
[   25.452376] page_type: f5(slab)
[   25.452648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.453433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.454112] page dumped because: kasan: bad access detected
[   25.454668] 
[   25.454915] Memory state around the buggy address:
[   25.455417]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.456122]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.456755] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.457449]                                      ^
[   25.457917]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.458615]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.459250] ==================================================================
[   23.677708] ==================================================================
[   23.678744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   23.680202] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.681143] 
[   23.681398] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.681520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.681542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.681572] Call Trace:
[   23.681597]  <TASK>
[   23.681622]  dump_stack_lvl+0x73/0xb0
[   23.681665]  print_report+0xd1/0x650
[   23.681706]  ? __virt_addr_valid+0x1db/0x2d0
[   23.681740]  ? kasan_atomics_helper+0x3df/0x5450
[   23.681774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.681809]  ? kasan_atomics_helper+0x3df/0x5450
[   23.681843]  kasan_report+0x141/0x180
[   23.681879]  ? kasan_atomics_helper+0x3df/0x5450
[   23.681919]  kasan_check_range+0x10c/0x1c0
[   23.681949]  __kasan_check_read+0x15/0x20
[   23.681983]  kasan_atomics_helper+0x3df/0x5450
[   23.682022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.682089]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.682128]  ? kasan_atomics+0x152/0x310
[   23.682164]  kasan_atomics+0x1dc/0x310
[   23.682194]  ? __pfx_kasan_atomics+0x10/0x10
[   23.682225]  ? __pfx_read_tsc+0x10/0x10
[   23.682260]  ? ktime_get_ts64+0x86/0x230
[   23.682330]  kunit_try_run_case+0x1a5/0x480
[   23.682423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.682502]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.682588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.682667]  ? __kthread_parkme+0x82/0x180
[   23.682745]  ? preempt_count_sub+0x50/0x80
[   23.682829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.682911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.682997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.683078]  kthread+0x337/0x6f0
[   23.683159]  ? trace_preempt_on+0x20/0xc0
[   23.683210]  ? __pfx_kthread+0x10/0x10
[   23.683240]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.683274]  ? calculate_sigpending+0x7b/0xa0
[   23.683336]  ? __pfx_kthread+0x10/0x10
[   23.683366]  ret_from_fork+0x41/0x80
[   23.683403]  ? __pfx_kthread+0x10/0x10
[   23.683433]  ret_from_fork_asm+0x1a/0x30
[   23.683480]  </TASK>
[   23.683498] 
[   23.703865] Allocated by task 285:
[   23.704717]  kasan_save_stack+0x45/0x70
[   23.705165]  kasan_save_track+0x18/0x40
[   23.705539]  kasan_save_alloc_info+0x3b/0x50
[   23.705969]  __kasan_kmalloc+0xb7/0xc0
[   23.706373]  __kmalloc_cache_noprof+0x189/0x420
[   23.706804]  kasan_atomics+0x95/0x310
[   23.707137]  kunit_try_run_case+0x1a5/0x480
[   23.708156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.708637]  kthread+0x337/0x6f0
[   23.709287]  ret_from_fork+0x41/0x80
[   23.709818]  ret_from_fork_asm+0x1a/0x30
[   23.710479] 
[   23.710706] The buggy address belongs to the object at ffff888102ef1180
[   23.710706]  which belongs to the cache kmalloc-64 of size 64
[   23.711999] The buggy address is located 0 bytes to the right of
[   23.711999]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.713020] 
[   23.713717] The buggy address belongs to the physical page:
[   23.714208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.714804] flags: 0x200000000000000(node=0|zone=2)
[   23.715460] page_type: f5(slab)
[   23.715638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.715915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.716951] page dumped because: kasan: bad access detected
[   23.717891] 
[   23.718125] Memory state around the buggy address:
[   23.718605]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.719119]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.720221] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.720794]                                      ^
[   23.721601]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.722281]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.723109] ==================================================================
[   24.010883] ==================================================================
[   24.011386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   24.011958] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.012869] 
[   24.013246] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.013398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.013443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.013506] Call Trace:
[   24.013561]  <TASK>
[   24.013616]  dump_stack_lvl+0x73/0xb0
[   24.013704]  print_report+0xd1/0x650
[   24.013794]  ? __virt_addr_valid+0x1db/0x2d0
[   24.013874]  ? kasan_atomics_helper+0x72f/0x5450
[   24.013950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.014027]  ? kasan_atomics_helper+0x72f/0x5450
[   24.014850]  kasan_report+0x141/0x180
[   24.014934]  ? kasan_atomics_helper+0x72f/0x5450
[   24.015095]  kasan_check_range+0x10c/0x1c0
[   24.015141]  __kasan_check_write+0x18/0x20
[   24.015176]  kasan_atomics_helper+0x72f/0x5450
[   24.015214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.015252]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.015311]  ? kasan_atomics+0x152/0x310
[   24.015357]  kasan_atomics+0x1dc/0x310
[   24.015392]  ? __pfx_kasan_atomics+0x10/0x10
[   24.015427]  ? __pfx_read_tsc+0x10/0x10
[   24.015461]  ? ktime_get_ts64+0x86/0x230
[   24.015503]  kunit_try_run_case+0x1a5/0x480
[   24.015544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.015579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.015618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.015655]  ? __kthread_parkme+0x82/0x180
[   24.015689]  ? preempt_count_sub+0x50/0x80
[   24.015728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.015766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.015803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.015839]  kthread+0x337/0x6f0
[   24.015866]  ? trace_preempt_on+0x20/0xc0
[   24.015917]  ? __pfx_kthread+0x10/0x10
[   24.015944]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.015978]  ? calculate_sigpending+0x7b/0xa0
[   24.016012]  ? __pfx_kthread+0x10/0x10
[   24.016051]  ret_from_fork+0x41/0x80
[   24.016106]  ? __pfx_kthread+0x10/0x10
[   24.016138]  ret_from_fork_asm+0x1a/0x30
[   24.016183]  </TASK>
[   24.016202] 
[   24.030569] Allocated by task 285:
[   24.031023]  kasan_save_stack+0x45/0x70
[   24.031560]  kasan_save_track+0x18/0x40
[   24.031905]  kasan_save_alloc_info+0x3b/0x50
[   24.032247]  __kasan_kmalloc+0xb7/0xc0
[   24.032772]  __kmalloc_cache_noprof+0x189/0x420
[   24.033397]  kasan_atomics+0x95/0x310
[   24.033823]  kunit_try_run_case+0x1a5/0x480
[   24.034421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.034830]  kthread+0x337/0x6f0
[   24.035125]  ret_from_fork+0x41/0x80
[   24.035571]  ret_from_fork_asm+0x1a/0x30
[   24.036030] 
[   24.036325] The buggy address belongs to the object at ffff888102ef1180
[   24.036325]  which belongs to the cache kmalloc-64 of size 64
[   24.037060] The buggy address is located 0 bytes to the right of
[   24.037060]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.037792] 
[   24.037993] The buggy address belongs to the physical page:
[   24.038462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.039236] flags: 0x200000000000000(node=0|zone=2)
[   24.039759] page_type: f5(slab)
[   24.040135] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.040867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.041814] page dumped because: kasan: bad access detected
[   24.042386] 
[   24.042621] Memory state around the buggy address:
[   24.043078]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.043671]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.044342] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.044893]                                      ^
[   24.045396]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.045896]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.046665] ==================================================================
[   25.690208] ==================================================================
[   25.690671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   25.691534] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.692073] 
[   25.692442] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.692582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.692626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.692688] Call Trace:
[   25.692754]  <TASK>
[   25.692816]  dump_stack_lvl+0x73/0xb0
[   25.692941]  print_report+0xd1/0x650
[   25.693100]  ? __virt_addr_valid+0x1db/0x2d0
[   25.693191]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.693330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.693415]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.693466]  kasan_report+0x141/0x180
[   25.693510]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.693553]  kasan_check_range+0x10c/0x1c0
[   25.693622]  __kasan_check_write+0x18/0x20
[   25.693701]  kasan_atomics_helper+0x1a7f/0x5450
[   25.693814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.693925]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.694013]  ? kasan_atomics+0x152/0x310
[   25.694185]  kasan_atomics+0x1dc/0x310
[   25.694265]  ? __pfx_kasan_atomics+0x10/0x10
[   25.694357]  ? __pfx_read_tsc+0x10/0x10
[   25.694402]  ? ktime_get_ts64+0x86/0x230
[   25.694445]  kunit_try_run_case+0x1a5/0x480
[   25.694487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.694524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.694565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.694603]  ? __kthread_parkme+0x82/0x180
[   25.694637]  ? preempt_count_sub+0x50/0x80
[   25.694675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.694714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.694749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.694785]  kthread+0x337/0x6f0
[   25.694811]  ? trace_preempt_on+0x20/0xc0
[   25.694849]  ? __pfx_kthread+0x10/0x10
[   25.694877]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.694910]  ? calculate_sigpending+0x7b/0xa0
[   25.694945]  ? __pfx_kthread+0x10/0x10
[   25.694972]  ret_from_fork+0x41/0x80
[   25.695006]  ? __pfx_kthread+0x10/0x10
[   25.695054]  ret_from_fork_asm+0x1a/0x30
[   25.695126]  </TASK>
[   25.695145] 
[   25.715604] Allocated by task 285:
[   25.716074]  kasan_save_stack+0x45/0x70
[   25.716964]  kasan_save_track+0x18/0x40
[   25.717406]  kasan_save_alloc_info+0x3b/0x50
[   25.717756]  __kasan_kmalloc+0xb7/0xc0
[   25.718496]  __kmalloc_cache_noprof+0x189/0x420
[   25.718863]  kasan_atomics+0x95/0x310
[   25.719272]  kunit_try_run_case+0x1a5/0x480
[   25.719715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.720221]  kthread+0x337/0x6f0
[   25.720786]  ret_from_fork+0x41/0x80
[   25.721166]  ret_from_fork_asm+0x1a/0x30
[   25.721577] 
[   25.721806] The buggy address belongs to the object at ffff888102ef1180
[   25.721806]  which belongs to the cache kmalloc-64 of size 64
[   25.723112] The buggy address is located 0 bytes to the right of
[   25.723112]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.723973] 
[   25.724177] The buggy address belongs to the physical page:
[   25.725458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.725961] flags: 0x200000000000000(node=0|zone=2)
[   25.726996] page_type: f5(slab)
[   25.727342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.727863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.728311] page dumped because: kasan: bad access detected
[   25.728622] 
[   25.728775] Memory state around the buggy address:
[   25.729075]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.729844]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.731859] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.732801]                                      ^
[   25.734075]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.734643]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.735040] ==================================================================
[   23.817217] ==================================================================
[   23.818658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   23.819278] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.820346] 
[   23.820622] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.820766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.820811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.820875] Call Trace:
[   23.820934]  <TASK>
[   23.820990]  dump_stack_lvl+0x73/0xb0
[   23.821128]  print_report+0xd1/0x650
[   23.821209]  ? __virt_addr_valid+0x1db/0x2d0
[   23.821284]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.821380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.821459]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.821538]  kasan_report+0x141/0x180
[   23.821595]  ? kasan_atomics_helper+0x4b3a/0x5450
[   23.821640]  __asan_report_store4_noabort+0x1b/0x30
[   23.821674]  kasan_atomics_helper+0x4b3a/0x5450
[   23.821711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.821746]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.821782]  ? kasan_atomics+0x152/0x310
[   23.821819]  kasan_atomics+0x1dc/0x310
[   23.821849]  ? __pfx_kasan_atomics+0x10/0x10
[   23.821881]  ? __pfx_read_tsc+0x10/0x10
[   23.821916]  ? ktime_get_ts64+0x86/0x230
[   23.821958]  kunit_try_run_case+0x1a5/0x480
[   23.821998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.822051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.822132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.822171]  ? __kthread_parkme+0x82/0x180
[   23.822206]  ? preempt_count_sub+0x50/0x80
[   23.822245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.822282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.822351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.822389]  kthread+0x337/0x6f0
[   23.822415]  ? trace_preempt_on+0x20/0xc0
[   23.822454]  ? __pfx_kthread+0x10/0x10
[   23.822482]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.822515]  ? calculate_sigpending+0x7b/0xa0
[   23.822549]  ? __pfx_kthread+0x10/0x10
[   23.822576]  ret_from_fork+0x41/0x80
[   23.822610]  ? __pfx_kthread+0x10/0x10
[   23.822637]  ret_from_fork_asm+0x1a/0x30
[   23.822682]  </TASK>
[   23.822698] 
[   23.841622] Allocated by task 285:
[   23.842106]  kasan_save_stack+0x45/0x70
[   23.842605]  kasan_save_track+0x18/0x40
[   23.843005]  kasan_save_alloc_info+0x3b/0x50
[   23.843485]  __kasan_kmalloc+0xb7/0xc0
[   23.843837]  __kmalloc_cache_noprof+0x189/0x420
[   23.844376]  kasan_atomics+0x95/0x310
[   23.844762]  kunit_try_run_case+0x1a5/0x480
[   23.845259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.845769]  kthread+0x337/0x6f0
[   23.846183]  ret_from_fork+0x41/0x80
[   23.846568]  ret_from_fork_asm+0x1a/0x30
[   23.847012] 
[   23.847309] The buggy address belongs to the object at ffff888102ef1180
[   23.847309]  which belongs to the cache kmalloc-64 of size 64
[   23.848262] The buggy address is located 0 bytes to the right of
[   23.848262]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.849201] 
[   23.849435] The buggy address belongs to the physical page:
[   23.849905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.850612] flags: 0x200000000000000(node=0|zone=2)
[   23.851160] page_type: f5(slab)
[   23.851571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.852206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.852833] page dumped because: kasan: bad access detected
[   23.853384] 
[   23.853605] Memory state around the buggy address:
[   23.854014]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.854572]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.855236] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.855857]                                      ^
[   23.856379]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.856884]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.857563] ==================================================================
[   26.139906] ==================================================================
[   26.140675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.141242] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.141930] 
[   26.142252] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.142403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.142443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.142505] Call Trace:
[   26.142558]  <TASK>
[   26.142601]  dump_stack_lvl+0x73/0xb0
[   26.142649]  print_report+0xd1/0x650
[   26.142692]  ? __virt_addr_valid+0x1db/0x2d0
[   26.142748]  ? kasan_atomics_helper+0x2006/0x5450
[   26.142830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.142911]  ? kasan_atomics_helper+0x2006/0x5450
[   26.142996]  kasan_report+0x141/0x180
[   26.143167]  ? kasan_atomics_helper+0x2006/0x5450
[   26.143268]  kasan_check_range+0x10c/0x1c0
[   26.143364]  __kasan_check_write+0x18/0x20
[   26.143439]  kasan_atomics_helper+0x2006/0x5450
[   26.143521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.143599]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.143681]  ? kasan_atomics+0x152/0x310
[   26.143802]  kasan_atomics+0x1dc/0x310
[   26.143896]  ? __pfx_kasan_atomics+0x10/0x10
[   26.144012]  ? __pfx_read_tsc+0x10/0x10
[   26.144129]  ? ktime_get_ts64+0x86/0x230
[   26.144220]  kunit_try_run_case+0x1a5/0x480
[   26.144327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.144403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.144451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.144492]  ? __kthread_parkme+0x82/0x180
[   26.144529]  ? preempt_count_sub+0x50/0x80
[   26.144571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.144613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.144653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.144693]  kthread+0x337/0x6f0
[   26.144724]  ? trace_preempt_on+0x20/0xc0
[   26.144764]  ? __pfx_kthread+0x10/0x10
[   26.144794]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.144830]  ? calculate_sigpending+0x7b/0xa0
[   26.144866]  ? __pfx_kthread+0x10/0x10
[   26.144896]  ret_from_fork+0x41/0x80
[   26.144933]  ? __pfx_kthread+0x10/0x10
[   26.144965]  ret_from_fork_asm+0x1a/0x30
[   26.145015]  </TASK>
[   26.145052] 
[   26.165979] Allocated by task 285:
[   26.166419]  kasan_save_stack+0x45/0x70
[   26.166984]  kasan_save_track+0x18/0x40
[   26.167544]  kasan_save_alloc_info+0x3b/0x50
[   26.168151]  __kasan_kmalloc+0xb7/0xc0
[   26.168721]  __kmalloc_cache_noprof+0x189/0x420
[   26.169433]  kasan_atomics+0x95/0x310
[   26.169957]  kunit_try_run_case+0x1a5/0x480
[   26.170873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.171412]  kthread+0x337/0x6f0
[   26.171951]  ret_from_fork+0x41/0x80
[   26.172462]  ret_from_fork_asm+0x1a/0x30
[   26.173042] 
[   26.173516] The buggy address belongs to the object at ffff888102ef1180
[   26.173516]  which belongs to the cache kmalloc-64 of size 64
[   26.174940] The buggy address is located 0 bytes to the right of
[   26.174940]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.176239] 
[   26.176491] The buggy address belongs to the physical page:
[   26.177410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.178272] flags: 0x200000000000000(node=0|zone=2)
[   26.178968] page_type: f5(slab)
[   26.179312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.179997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.180632] page dumped because: kasan: bad access detected
[   26.181095] 
[   26.181335] Memory state around the buggy address:
[   26.181761]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.182797]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.183606] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.184349]                                      ^
[   26.184667]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.185912]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.187207] ==================================================================
[   26.333266] ==================================================================
[   26.333822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   26.335033] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.336455] 
[   26.336743] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.336834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.336856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.336890] Call Trace:
[   26.336931]  <TASK>
[   26.336985]  dump_stack_lvl+0x73/0xb0
[   26.337035]  print_report+0xd1/0x650
[   26.337104]  ? __virt_addr_valid+0x1db/0x2d0
[   26.337141]  ? kasan_atomics_helper+0x218a/0x5450
[   26.337176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.337213]  ? kasan_atomics_helper+0x218a/0x5450
[   26.337251]  kasan_report+0x141/0x180
[   26.337288]  ? kasan_atomics_helper+0x218a/0x5450
[   26.337411]  kasan_check_range+0x10c/0x1c0
[   26.337463]  __kasan_check_write+0x18/0x20
[   26.337504]  kasan_atomics_helper+0x218a/0x5450
[   26.337544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.337582]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.337620]  ? kasan_atomics+0x152/0x310
[   26.337656]  kasan_atomics+0x1dc/0x310
[   26.337688]  ? __pfx_kasan_atomics+0x10/0x10
[   26.337721]  ? __pfx_read_tsc+0x10/0x10
[   26.337757]  ? ktime_get_ts64+0x86/0x230
[   26.337799]  kunit_try_run_case+0x1a5/0x480
[   26.337842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.337879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.337918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.337958]  ? __kthread_parkme+0x82/0x180
[   26.337994]  ? preempt_count_sub+0x50/0x80
[   26.338037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.338102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.338143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.338182]  kthread+0x337/0x6f0
[   26.338210]  ? trace_preempt_on+0x20/0xc0
[   26.338249]  ? __pfx_kthread+0x10/0x10
[   26.338279]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.338531]  ? calculate_sigpending+0x7b/0xa0
[   26.338575]  ? __pfx_kthread+0x10/0x10
[   26.338608]  ret_from_fork+0x41/0x80
[   26.338648]  ? __pfx_kthread+0x10/0x10
[   26.338680]  ret_from_fork_asm+0x1a/0x30
[   26.338730]  </TASK>
[   26.338750] 
[   26.359754] Allocated by task 285:
[   26.360167]  kasan_save_stack+0x45/0x70
[   26.360691]  kasan_save_track+0x18/0x40
[   26.361109]  kasan_save_alloc_info+0x3b/0x50
[   26.361610]  __kasan_kmalloc+0xb7/0xc0
[   26.362001]  __kmalloc_cache_noprof+0x189/0x420
[   26.362520]  kasan_atomics+0x95/0x310
[   26.362902]  kunit_try_run_case+0x1a5/0x480
[   26.363394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.364002]  kthread+0x337/0x6f0
[   26.364532]  ret_from_fork+0x41/0x80
[   26.364873]  ret_from_fork_asm+0x1a/0x30
[   26.365451] 
[   26.365659] The buggy address belongs to the object at ffff888102ef1180
[   26.365659]  which belongs to the cache kmalloc-64 of size 64
[   26.366664] The buggy address is located 0 bytes to the right of
[   26.366664]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.367868] 
[   26.368189] The buggy address belongs to the physical page:
[   26.368623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.369423] flags: 0x200000000000000(node=0|zone=2)
[   26.369901] page_type: f5(slab)
[   26.370508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.371121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.371705] page dumped because: kasan: bad access detected
[   26.372210] 
[   26.372447] Memory state around the buggy address:
[   26.372856]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.374030]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.374566] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.375766]                                      ^
[   26.376163]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.376847]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.377528] ==================================================================
[   23.630040] ==================================================================
[   23.630658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   23.631038] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.631994] 
[   23.632169] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.632269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.632313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.632358] Call Trace:
[   23.632396]  <TASK>
[   23.632431]  dump_stack_lvl+0x73/0xb0
[   23.632489]  print_report+0xd1/0x650
[   23.632541]  ? __virt_addr_valid+0x1db/0x2d0
[   23.632590]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.632640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.632688]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.632736]  kasan_report+0x141/0x180
[   23.632787]  ? kasan_atomics_helper+0x4b6e/0x5450
[   23.632847]  __asan_report_store4_noabort+0x1b/0x30
[   23.632893]  kasan_atomics_helper+0x4b6e/0x5450
[   23.632944]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.632994]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.633042]  ? kasan_atomics+0x152/0x310
[   23.633097]  kasan_atomics+0x1dc/0x310
[   23.633182]  ? __pfx_kasan_atomics+0x10/0x10
[   23.633260]  ? __pfx_read_tsc+0x10/0x10
[   23.633356]  ? ktime_get_ts64+0x86/0x230
[   23.633446]  kunit_try_run_case+0x1a5/0x480
[   23.633865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.633954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.634042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.634119]  ? __kthread_parkme+0x82/0x180
[   23.634195]  ? preempt_count_sub+0x50/0x80
[   23.634275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.634378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.635035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.635128]  kthread+0x337/0x6f0
[   23.635188]  ? trace_preempt_on+0x20/0xc0
[   23.635260]  ? __pfx_kthread+0x10/0x10
[   23.635320]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.635371]  ? calculate_sigpending+0x7b/0xa0
[   23.635421]  ? __pfx_kthread+0x10/0x10
[   23.635467]  ret_from_fork+0x41/0x80
[   23.635507]  ? __pfx_kthread+0x10/0x10
[   23.635539]  ret_from_fork_asm+0x1a/0x30
[   23.635588]  </TASK>
[   23.635604] 
[   23.654613] Allocated by task 285:
[   23.655054]  kasan_save_stack+0x45/0x70
[   23.655734]  kasan_save_track+0x18/0x40
[   23.655990]  kasan_save_alloc_info+0x3b/0x50
[   23.656279]  __kasan_kmalloc+0xb7/0xc0
[   23.656570]  __kmalloc_cache_noprof+0x189/0x420
[   23.656887]  kasan_atomics+0x95/0x310
[   23.657162]  kunit_try_run_case+0x1a5/0x480
[   23.659580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.660191]  kthread+0x337/0x6f0
[   23.660850]  ret_from_fork+0x41/0x80
[   23.661670]  ret_from_fork_asm+0x1a/0x30
[   23.662519] 
[   23.662776] The buggy address belongs to the object at ffff888102ef1180
[   23.662776]  which belongs to the cache kmalloc-64 of size 64
[   23.663939] The buggy address is located 0 bytes to the right of
[   23.663939]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.666063] 
[   23.666237] The buggy address belongs to the physical page:
[   23.666783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.667522] flags: 0x200000000000000(node=0|zone=2)
[   23.668042] page_type: f5(slab)
[   23.668392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.669320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.669962] page dumped because: kasan: bad access detected
[   23.670969] 
[   23.671257] Memory state around the buggy address:
[   23.671688]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.672105]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.673427] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.674354]                                      ^
[   23.674833]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.675585]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.676173] ==================================================================
[   25.954288] ==================================================================
[   25.954874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   25.955633] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.956205] 
[   25.956467] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.956602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.956647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.956711] Call Trace:
[   25.956766]  <TASK>
[   25.956817]  dump_stack_lvl+0x73/0xb0
[   25.956905]  print_report+0xd1/0x650
[   25.956983]  ? __virt_addr_valid+0x1db/0x2d0
[   25.957104]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.957188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.957270]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.957373]  kasan_report+0x141/0x180
[   25.957462]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.957558]  kasan_check_range+0x10c/0x1c0
[   25.957641]  __kasan_check_write+0x18/0x20
[   25.957716]  kasan_atomics_helper+0x1e12/0x5450
[   25.957802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.957883]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.957967]  ? kasan_atomics+0x152/0x310
[   25.958089]  kasan_atomics+0x1dc/0x310
[   25.958171]  ? __pfx_kasan_atomics+0x10/0x10
[   25.958247]  ? __pfx_read_tsc+0x10/0x10
[   25.958347]  ? ktime_get_ts64+0x86/0x230
[   25.958433]  kunit_try_run_case+0x1a5/0x480
[   25.958518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.958583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.958628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.958669]  ? __kthread_parkme+0x82/0x180
[   25.958706]  ? preempt_count_sub+0x50/0x80
[   25.958748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.958786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.958826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.958866]  kthread+0x337/0x6f0
[   25.958896]  ? trace_preempt_on+0x20/0xc0
[   25.958935]  ? __pfx_kthread+0x10/0x10
[   25.958964]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.958999]  ? calculate_sigpending+0x7b/0xa0
[   25.959058]  ? __pfx_kthread+0x10/0x10
[   25.959116]  ret_from_fork+0x41/0x80
[   25.959156]  ? __pfx_kthread+0x10/0x10
[   25.959190]  ret_from_fork_asm+0x1a/0x30
[   25.959240]  </TASK>
[   25.959260] 
[   25.979622] Allocated by task 285:
[   25.979959]  kasan_save_stack+0x45/0x70
[   25.980966]  kasan_save_track+0x18/0x40
[   25.981314]  kasan_save_alloc_info+0x3b/0x50
[   25.982044]  __kasan_kmalloc+0xb7/0xc0
[   25.982721]  __kmalloc_cache_noprof+0x189/0x420
[   25.983122]  kasan_atomics+0x95/0x310
[   25.983447]  kunit_try_run_case+0x1a5/0x480
[   25.984342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.984947]  kthread+0x337/0x6f0
[   25.985518]  ret_from_fork+0x41/0x80
[   25.985857]  ret_from_fork_asm+0x1a/0x30
[   25.986795] 
[   25.987071] The buggy address belongs to the object at ffff888102ef1180
[   25.987071]  which belongs to the cache kmalloc-64 of size 64
[   25.987954] The buggy address is located 0 bytes to the right of
[   25.987954]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.989703] 
[   25.989888] The buggy address belongs to the physical page:
[   25.990709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.991167] flags: 0x200000000000000(node=0|zone=2)
[   25.992569] page_type: f5(slab)
[   25.993154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.993627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.994038] page dumped because: kasan: bad access detected
[   25.994820] 
[   25.995471] Memory state around the buggy address:
[   25.995942]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.997503]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.997889] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.998995]                                      ^
[   26.001073]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.001379]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.001623] ==================================================================
[   24.554913] ==================================================================
[   24.556625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   24.557415] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.558546] 
[   24.558984] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.559093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.559137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.559393] Call Trace:
[   24.559430]  <TASK>
[   24.559460]  dump_stack_lvl+0x73/0xb0
[   24.559506]  print_report+0xd1/0x650
[   24.559546]  ? __virt_addr_valid+0x1db/0x2d0
[   24.559584]  ? kasan_atomics_helper+0xe78/0x5450
[   24.559619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.559655]  ? kasan_atomics_helper+0xe78/0x5450
[   24.559692]  kasan_report+0x141/0x180
[   24.559729]  ? kasan_atomics_helper+0xe78/0x5450
[   24.559769]  kasan_check_range+0x10c/0x1c0
[   24.559802]  __kasan_check_write+0x18/0x20
[   24.559834]  kasan_atomics_helper+0xe78/0x5450
[   24.559873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.559921]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.559957]  ? kasan_atomics+0x152/0x310
[   24.559992]  kasan_atomics+0x1dc/0x310
[   24.560023]  ? __pfx_kasan_atomics+0x10/0x10
[   24.560086]  ? __pfx_read_tsc+0x10/0x10
[   24.560125]  ? ktime_get_ts64+0x86/0x230
[   24.560166]  kunit_try_run_case+0x1a5/0x480
[   24.560209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.560248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.560288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.560354]  ? __kthread_parkme+0x82/0x180
[   24.560391]  ? preempt_count_sub+0x50/0x80
[   24.560430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.560470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.560507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.560545]  kthread+0x337/0x6f0
[   24.560573]  ? trace_preempt_on+0x20/0xc0
[   24.560612]  ? __pfx_kthread+0x10/0x10
[   24.560642]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.560678]  ? calculate_sigpending+0x7b/0xa0
[   24.560715]  ? __pfx_kthread+0x10/0x10
[   24.560746]  ret_from_fork+0x41/0x80
[   24.560781]  ? __pfx_kthread+0x10/0x10
[   24.560812]  ret_from_fork_asm+0x1a/0x30
[   24.560860]  </TASK>
[   24.560878] 
[   24.576562] Allocated by task 285:
[   24.577080]  kasan_save_stack+0x45/0x70
[   24.577620]  kasan_save_track+0x18/0x40
[   24.578008]  kasan_save_alloc_info+0x3b/0x50
[   24.578416]  __kasan_kmalloc+0xb7/0xc0
[   24.578899]  __kmalloc_cache_noprof+0x189/0x420
[   24.579447]  kasan_atomics+0x95/0x310
[   24.579862]  kunit_try_run_case+0x1a5/0x480
[   24.580394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.580915]  kthread+0x337/0x6f0
[   24.581379]  ret_from_fork+0x41/0x80
[   24.581726]  ret_from_fork_asm+0x1a/0x30
[   24.582258] 
[   24.582516] The buggy address belongs to the object at ffff888102ef1180
[   24.582516]  which belongs to the cache kmalloc-64 of size 64
[   24.583509] The buggy address is located 0 bytes to the right of
[   24.583509]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.584307] 
[   24.584567] The buggy address belongs to the physical page:
[   24.585192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.585977] flags: 0x200000000000000(node=0|zone=2)
[   24.586581] page_type: f5(slab)
[   24.586986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.587628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.588166] page dumped because: kasan: bad access detected
[   24.588710] 
[   24.588989] Memory state around the buggy address:
[   24.589509]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.590237]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.590883] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.591466]                                      ^
[   24.591959]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.592620]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.593214] ==================================================================
[   24.237341] ==================================================================
[   24.237772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   24.238580] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.239262] 
[   24.239566] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.239751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.239813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.239918] Call Trace:
[   24.239978]  <TASK>
[   24.240071]  dump_stack_lvl+0x73/0xb0
[   24.240155]  print_report+0xd1/0x650
[   24.240216]  ? __virt_addr_valid+0x1db/0x2d0
[   24.240310]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.240415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.240527]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.240608]  kasan_report+0x141/0x180
[   24.240689]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.240799]  kasan_check_range+0x10c/0x1c0
[   24.240910]  __kasan_check_write+0x18/0x20
[   24.240966]  kasan_atomics_helper+0xa2b/0x5450
[   24.241007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.241094]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.241138]  ? kasan_atomics+0x152/0x310
[   24.241176]  kasan_atomics+0x1dc/0x310
[   24.241206]  ? __pfx_kasan_atomics+0x10/0x10
[   24.241241]  ? __pfx_read_tsc+0x10/0x10
[   24.241275]  ? ktime_get_ts64+0x86/0x230
[   24.241345]  kunit_try_run_case+0x1a5/0x480
[   24.241387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.241422]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.241460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.241497]  ? __kthread_parkme+0x82/0x180
[   24.241530]  ? preempt_count_sub+0x50/0x80
[   24.241568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.241603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.241639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.241675]  kthread+0x337/0x6f0
[   24.241700]  ? trace_preempt_on+0x20/0xc0
[   24.241735]  ? __pfx_kthread+0x10/0x10
[   24.241762]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.241795]  ? calculate_sigpending+0x7b/0xa0
[   24.241827]  ? __pfx_kthread+0x10/0x10
[   24.241855]  ret_from_fork+0x41/0x80
[   24.241889]  ? __pfx_kthread+0x10/0x10
[   24.241917]  ret_from_fork_asm+0x1a/0x30
[   24.241965]  </TASK>
[   24.241981] 
[   24.263578] Allocated by task 285:
[   24.263954]  kasan_save_stack+0x45/0x70
[   24.264407]  kasan_save_track+0x18/0x40
[   24.264794]  kasan_save_alloc_info+0x3b/0x50
[   24.265687]  __kasan_kmalloc+0xb7/0xc0
[   24.265993]  __kmalloc_cache_noprof+0x189/0x420
[   24.266822]  kasan_atomics+0x95/0x310
[   24.267494]  kunit_try_run_case+0x1a5/0x480
[   24.268098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.269191]  kthread+0x337/0x6f0
[   24.269536]  ret_from_fork+0x41/0x80
[   24.270046]  ret_from_fork_asm+0x1a/0x30
[   24.270502] 
[   24.270739] The buggy address belongs to the object at ffff888102ef1180
[   24.270739]  which belongs to the cache kmalloc-64 of size 64
[   24.272131] The buggy address is located 0 bytes to the right of
[   24.272131]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.273112] 
[   24.273527] The buggy address belongs to the physical page:
[   24.274030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.274856] flags: 0x200000000000000(node=0|zone=2)
[   24.275421] page_type: f5(slab)
[   24.275888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.276700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.277419] page dumped because: kasan: bad access detected
[   24.277892] 
[   24.278178] Memory state around the buggy address:
[   24.278696]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.279488]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.280165] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.280814]                                      ^
[   24.281531]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.282362]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.282894] ==================================================================
[   24.732721] ==================================================================
[   24.733624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   24.734323] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.735332] 
[   24.735594] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.735996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.736025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.736081] Call Trace:
[   24.736113]  <TASK>
[   24.736142]  dump_stack_lvl+0x73/0xb0
[   24.736191]  print_report+0xd1/0x650
[   24.736232]  ? __virt_addr_valid+0x1db/0x2d0
[   24.736267]  ? kasan_atomics_helper+0x1079/0x5450
[   24.736329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.736371]  ? kasan_atomics_helper+0x1079/0x5450
[   24.736408]  kasan_report+0x141/0x180
[   24.736446]  ? kasan_atomics_helper+0x1079/0x5450
[   24.736489]  kasan_check_range+0x10c/0x1c0
[   24.736522]  __kasan_check_write+0x18/0x20
[   24.736557]  kasan_atomics_helper+0x1079/0x5450
[   24.736639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.736714]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.736785]  ? kasan_atomics+0x152/0x310
[   24.736825]  kasan_atomics+0x1dc/0x310
[   24.736857]  ? __pfx_kasan_atomics+0x10/0x10
[   24.736891]  ? __pfx_read_tsc+0x10/0x10
[   24.736928]  ? ktime_get_ts64+0x86/0x230
[   24.736971]  kunit_try_run_case+0x1a5/0x480
[   24.737012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.737060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.737121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.737162]  ? __kthread_parkme+0x82/0x180
[   24.737200]  ? preempt_count_sub+0x50/0x80
[   24.737239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.737279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.737343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.737384]  kthread+0x337/0x6f0
[   24.737412]  ? trace_preempt_on+0x20/0xc0
[   24.737453]  ? __pfx_kthread+0x10/0x10
[   24.737482]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.737517]  ? calculate_sigpending+0x7b/0xa0
[   24.737552]  ? __pfx_kthread+0x10/0x10
[   24.737583]  ret_from_fork+0x41/0x80
[   24.737618]  ? __pfx_kthread+0x10/0x10
[   24.737649]  ret_from_fork_asm+0x1a/0x30
[   24.737697]  </TASK>
[   24.737715] 
[   24.757166] Allocated by task 285:
[   24.758132]  kasan_save_stack+0x45/0x70
[   24.758757]  kasan_save_track+0x18/0x40
[   24.759403]  kasan_save_alloc_info+0x3b/0x50
[   24.760001]  __kasan_kmalloc+0xb7/0xc0
[   24.760704]  __kmalloc_cache_noprof+0x189/0x420
[   24.761381]  kasan_atomics+0x95/0x310
[   24.761701]  kunit_try_run_case+0x1a5/0x480
[   24.762078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.762511]  kthread+0x337/0x6f0
[   24.762790]  ret_from_fork+0x41/0x80
[   24.764134]  ret_from_fork_asm+0x1a/0x30
[   24.764728] 
[   24.765111] The buggy address belongs to the object at ffff888102ef1180
[   24.765111]  which belongs to the cache kmalloc-64 of size 64
[   24.766389] The buggy address is located 0 bytes to the right of
[   24.766389]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.767349] 
[   24.767600] The buggy address belongs to the physical page:
[   24.768260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.768878] flags: 0x200000000000000(node=0|zone=2)
[   24.769800] page_type: f5(slab)
[   24.770215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.771055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.771870] page dumped because: kasan: bad access detected
[   24.772621] 
[   24.772861] Memory state around the buggy address:
[   24.773307]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.773834]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.774515] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.775515]                                      ^
[   24.775950]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.776638]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.777263] ==================================================================
[   24.468175] ==================================================================
[   24.469489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   24.470232] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.470706] 
[   24.470993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.471134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.471174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.471211] Call Trace:
[   24.471239]  <TASK>
[   24.471265]  dump_stack_lvl+0x73/0xb0
[   24.471361]  print_report+0xd1/0x650
[   24.471414]  ? __virt_addr_valid+0x1db/0x2d0
[   24.471451]  ? kasan_atomics_helper+0xd47/0x5450
[   24.471488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.471524]  ? kasan_atomics_helper+0xd47/0x5450
[   24.471560]  kasan_report+0x141/0x180
[   24.471597]  ? kasan_atomics_helper+0xd47/0x5450
[   24.471638]  kasan_check_range+0x10c/0x1c0
[   24.471671]  __kasan_check_write+0x18/0x20
[   24.471703]  kasan_atomics_helper+0xd47/0x5450
[   24.471740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.471778]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.471815]  ? kasan_atomics+0x152/0x310
[   24.471853]  kasan_atomics+0x1dc/0x310
[   24.471902]  ? __pfx_kasan_atomics+0x10/0x10
[   24.471941]  ? __pfx_read_tsc+0x10/0x10
[   24.471978]  ? ktime_get_ts64+0x86/0x230
[   24.472021]  kunit_try_run_case+0x1a5/0x480
[   24.472091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.472133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.472175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.472215]  ? __kthread_parkme+0x82/0x180
[   24.472252]  ? preempt_count_sub+0x50/0x80
[   24.472357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.472462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.472542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.472621]  kthread+0x337/0x6f0
[   24.472689]  ? trace_preempt_on+0x20/0xc0
[   24.472770]  ? __pfx_kthread+0x10/0x10
[   24.472839]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.472914]  ? calculate_sigpending+0x7b/0xa0
[   24.472991]  ? __pfx_kthread+0x10/0x10
[   24.473082]  ret_from_fork+0x41/0x80
[   24.473173]  ? __pfx_kthread+0x10/0x10
[   24.473218]  ret_from_fork_asm+0x1a/0x30
[   24.473268]  </TASK>
[   24.473287] 
[   24.493527] Allocated by task 285:
[   24.493720]  kasan_save_stack+0x45/0x70
[   24.493912]  kasan_save_track+0x18/0x40
[   24.494223]  kasan_save_alloc_info+0x3b/0x50
[   24.495031]  __kasan_kmalloc+0xb7/0xc0
[   24.495847]  __kmalloc_cache_noprof+0x189/0x420
[   24.496445]  kasan_atomics+0x95/0x310
[   24.496835]  kunit_try_run_case+0x1a5/0x480
[   24.497286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.497878]  kthread+0x337/0x6f0
[   24.498267]  ret_from_fork+0x41/0x80
[   24.498845]  ret_from_fork_asm+0x1a/0x30
[   24.499430] 
[   24.499662] The buggy address belongs to the object at ffff888102ef1180
[   24.499662]  which belongs to the cache kmalloc-64 of size 64
[   24.500899] The buggy address is located 0 bytes to the right of
[   24.500899]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.502363] 
[   24.503013] The buggy address belongs to the physical page:
[   24.503598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.504353] flags: 0x200000000000000(node=0|zone=2)
[   24.504755] page_type: f5(slab)
[   24.505123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.505746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.506424] page dumped because: kasan: bad access detected
[   24.506942] 
[   24.507173] Memory state around the buggy address:
[   24.507576]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.508222]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.509136] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.509669]                                      ^
[   24.510130]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.510725]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.511181] ==================================================================
[   23.772522] ==================================================================
[   23.773795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   23.774740] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.775988] 
[   23.776268] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.776409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.776453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.776728] Call Trace:
[   23.776788]  <TASK>
[   23.776843]  dump_stack_lvl+0x73/0xb0
[   23.776927]  print_report+0xd1/0x650
[   23.776971]  ? __virt_addr_valid+0x1db/0x2d0
[   23.777009]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.777056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.777112]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.777149]  kasan_report+0x141/0x180
[   23.777186]  ? kasan_atomics_helper+0x4a0/0x5450
[   23.777229]  kasan_check_range+0x10c/0x1c0
[   23.777264]  __kasan_check_write+0x18/0x20
[   23.777320]  kasan_atomics_helper+0x4a0/0x5450
[   23.777361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.777399]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.777437]  ? kasan_atomics+0x152/0x310
[   23.777474]  kasan_atomics+0x1dc/0x310
[   23.777505]  ? __pfx_kasan_atomics+0x10/0x10
[   23.777539]  ? __pfx_read_tsc+0x10/0x10
[   23.777576]  ? ktime_get_ts64+0x86/0x230
[   23.777618]  kunit_try_run_case+0x1a5/0x480
[   23.777661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.777697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.777770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.777812]  ? __kthread_parkme+0x82/0x180
[   23.777848]  ? preempt_count_sub+0x50/0x80
[   23.777889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.777929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.777968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.778007]  kthread+0x337/0x6f0
[   23.778039]  ? trace_preempt_on+0x20/0xc0
[   23.778103]  ? __pfx_kthread+0x10/0x10
[   23.778135]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.778173]  ? calculate_sigpending+0x7b/0xa0
[   23.778210]  ? __pfx_kthread+0x10/0x10
[   23.778239]  ret_from_fork+0x41/0x80
[   23.778284]  ? __pfx_kthread+0x10/0x10
[   23.778348]  ret_from_fork_asm+0x1a/0x30
[   23.778414]  </TASK>
[   23.778436] 
[   23.798080] Allocated by task 285:
[   23.798521]  kasan_save_stack+0x45/0x70
[   23.799013]  kasan_save_track+0x18/0x40
[   23.799447]  kasan_save_alloc_info+0x3b/0x50
[   23.799947]  __kasan_kmalloc+0xb7/0xc0
[   23.800398]  __kmalloc_cache_noprof+0x189/0x420
[   23.800841]  kasan_atomics+0x95/0x310
[   23.801443]  kunit_try_run_case+0x1a5/0x480
[   23.801898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.802458]  kthread+0x337/0x6f0
[   23.802984]  ret_from_fork+0x41/0x80
[   23.803375]  ret_from_fork_asm+0x1a/0x30
[   23.803853] 
[   23.804085] The buggy address belongs to the object at ffff888102ef1180
[   23.804085]  which belongs to the cache kmalloc-64 of size 64
[   23.804928] The buggy address is located 0 bytes to the right of
[   23.804928]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.805954] 
[   23.806153] The buggy address belongs to the physical page:
[   23.806776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.807554] flags: 0x200000000000000(node=0|zone=2)
[   23.808100] page_type: f5(slab)
[   23.808490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.809010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.809727] page dumped because: kasan: bad access detected
[   23.810314] 
[   23.810586] Memory state around the buggy address:
[   23.811001]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.811603]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.812204] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.812906]                                      ^
[   23.813548]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.814219]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.815798] ==================================================================
[   26.236927] ==================================================================
[   26.237499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   26.238592] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   26.239945] 
[   26.240562] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   26.241140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.241163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.241197] Call Trace:
[   26.241225]  <TASK>
[   26.241250]  dump_stack_lvl+0x73/0xb0
[   26.241321]  print_report+0xd1/0x650
[   26.241368]  ? __virt_addr_valid+0x1db/0x2d0
[   26.241404]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.241439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.241478]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.241514]  kasan_report+0x141/0x180
[   26.241551]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.241592]  kasan_check_range+0x10c/0x1c0
[   26.241625]  __kasan_check_write+0x18/0x20
[   26.241658]  kasan_atomics_helper+0x20c8/0x5450
[   26.241695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.241732]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.241768]  ? kasan_atomics+0x152/0x310
[   26.241804]  kasan_atomics+0x1dc/0x310
[   26.241835]  ? __pfx_kasan_atomics+0x10/0x10
[   26.241869]  ? __pfx_read_tsc+0x10/0x10
[   26.241903]  ? ktime_get_ts64+0x86/0x230
[   26.241944]  kunit_try_run_case+0x1a5/0x480
[   26.241985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.242025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.242095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.242139]  ? __kthread_parkme+0x82/0x180
[   26.242177]  ? preempt_count_sub+0x50/0x80
[   26.242217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.242258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.242317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.242360]  kthread+0x337/0x6f0
[   26.242390]  ? trace_preempt_on+0x20/0xc0
[   26.242429]  ? __pfx_kthread+0x10/0x10
[   26.242461]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.242497]  ? calculate_sigpending+0x7b/0xa0
[   26.242532]  ? __pfx_kthread+0x10/0x10
[   26.242564]  ret_from_fork+0x41/0x80
[   26.242600]  ? __pfx_kthread+0x10/0x10
[   26.242631]  ret_from_fork_asm+0x1a/0x30
[   26.242680]  </TASK>
[   26.242698] 
[   26.264691] Allocated by task 285:
[   26.264984]  kasan_save_stack+0x45/0x70
[   26.267713]  kasan_save_track+0x18/0x40
[   26.268719]  kasan_save_alloc_info+0x3b/0x50
[   26.269795]  __kasan_kmalloc+0xb7/0xc0
[   26.271213]  __kmalloc_cache_noprof+0x189/0x420
[   26.272280]  kasan_atomics+0x95/0x310
[   26.273518]  kunit_try_run_case+0x1a5/0x480
[   26.274201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.274716]  kthread+0x337/0x6f0
[   26.275120]  ret_from_fork+0x41/0x80
[   26.275545]  ret_from_fork_asm+0x1a/0x30
[   26.275947] 
[   26.276386] The buggy address belongs to the object at ffff888102ef1180
[   26.276386]  which belongs to the cache kmalloc-64 of size 64
[   26.277254] The buggy address is located 0 bytes to the right of
[   26.277254]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   26.278434] 
[   26.278706] The buggy address belongs to the physical page:
[   26.279320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   26.280073] flags: 0x200000000000000(node=0|zone=2)
[   26.280645] page_type: f5(slab)
[   26.281026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.281863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.282541] page dumped because: kasan: bad access detected
[   26.283095] 
[   26.283418] Memory state around the buggy address:
[   26.283794]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.284537]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.285265] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.285836]                                      ^
[   26.286397]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.287123]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.287803] ==================================================================
[   24.595920] ==================================================================
[   24.596667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   24.597557] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.598316] 
[   24.598629] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.598767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.598808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.598871] Call Trace:
[   24.598947]  <TASK>
[   24.599026]  dump_stack_lvl+0x73/0xb0
[   24.599156]  print_report+0xd1/0x650
[   24.599237]  ? __virt_addr_valid+0x1db/0x2d0
[   24.599332]  ? kasan_atomics_helper+0xf10/0x5450
[   24.599411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.599478]  ? kasan_atomics_helper+0xf10/0x5450
[   24.599538]  kasan_report+0x141/0x180
[   24.599619]  ? kasan_atomics_helper+0xf10/0x5450
[   24.599710]  kasan_check_range+0x10c/0x1c0
[   24.599789]  __kasan_check_write+0x18/0x20
[   24.599864]  kasan_atomics_helper+0xf10/0x5450
[   24.599960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.600084]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.600177]  ? kasan_atomics+0x152/0x310
[   24.600263]  kasan_atomics+0x1dc/0x310
[   24.600374]  ? __pfx_kasan_atomics+0x10/0x10
[   24.600479]  ? __pfx_read_tsc+0x10/0x10
[   24.600561]  ? ktime_get_ts64+0x86/0x230
[   24.600647]  kunit_try_run_case+0x1a5/0x480
[   24.600735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.600813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.600899]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.600978]  ? __kthread_parkme+0x82/0x180
[   24.601093]  ? preempt_count_sub+0x50/0x80
[   24.601143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.601184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.601221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.601259]  kthread+0x337/0x6f0
[   24.601286]  ? trace_preempt_on+0x20/0xc0
[   24.601354]  ? __pfx_kthread+0x10/0x10
[   24.601383]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.601417]  ? calculate_sigpending+0x7b/0xa0
[   24.601451]  ? __pfx_kthread+0x10/0x10
[   24.601478]  ret_from_fork+0x41/0x80
[   24.601513]  ? __pfx_kthread+0x10/0x10
[   24.601542]  ret_from_fork_asm+0x1a/0x30
[   24.601587]  </TASK>
[   24.601605] 
[   24.616896] Allocated by task 285:
[   24.617456]  kasan_save_stack+0x45/0x70
[   24.617987]  kasan_save_track+0x18/0x40
[   24.618508]  kasan_save_alloc_info+0x3b/0x50
[   24.618960]  __kasan_kmalloc+0xb7/0xc0
[   24.619446]  __kmalloc_cache_noprof+0x189/0x420
[   24.619986]  kasan_atomics+0x95/0x310
[   24.620462]  kunit_try_run_case+0x1a5/0x480
[   24.620953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.621539]  kthread+0x337/0x6f0
[   24.621956]  ret_from_fork+0x41/0x80
[   24.622480]  ret_from_fork_asm+0x1a/0x30
[   24.622799] 
[   24.623103] The buggy address belongs to the object at ffff888102ef1180
[   24.623103]  which belongs to the cache kmalloc-64 of size 64
[   24.623949] The buggy address is located 0 bytes to the right of
[   24.623949]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.624728] 
[   24.624981] The buggy address belongs to the physical page:
[   24.625618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.626411] flags: 0x200000000000000(node=0|zone=2)
[   24.626918] page_type: f5(slab)
[   24.627374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.628029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.628752] page dumped because: kasan: bad access detected
[   24.629218] 
[   24.629454] Memory state around the buggy address:
[   24.629974]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.630753]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.631471] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.631927]                                      ^
[   24.632459]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.633205]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.633868] ==================================================================
[   23.577536] ==================================================================
[   23.578112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   23.578826] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   23.579218] 
[   23.579410] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   23.579517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.579544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.579587] Call Trace:
[   23.579613]  <TASK>
[   23.579653]  dump_stack_lvl+0x73/0xb0
[   23.579714]  print_report+0xd1/0x650
[   23.579772]  ? __virt_addr_valid+0x1db/0x2d0
[   23.579822]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.579870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.579939]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.579990]  kasan_report+0x141/0x180
[   23.580041]  ? kasan_atomics_helper+0x4b88/0x5450
[   23.580106]  __asan_report_load4_noabort+0x18/0x20
[   23.580156]  kasan_atomics_helper+0x4b88/0x5450
[   23.580211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.580265]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.580336]  ? kasan_atomics+0x152/0x310
[   23.580392]  kasan_atomics+0x1dc/0x310
[   23.580437]  ? __pfx_kasan_atomics+0x10/0x10
[   23.580485]  ? __pfx_read_tsc+0x10/0x10
[   23.580533]  ? ktime_get_ts64+0x86/0x230
[   23.580592]  kunit_try_run_case+0x1a5/0x480
[   23.580651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.580700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.580758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.580812]  ? __kthread_parkme+0x82/0x180
[   23.580866]  ? preempt_count_sub+0x50/0x80
[   23.580925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.580984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.581038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.581090]  kthread+0x337/0x6f0
[   23.581132]  ? trace_preempt_on+0x20/0xc0
[   23.581186]  ? __pfx_kthread+0x10/0x10
[   23.581237]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.581478]  ? calculate_sigpending+0x7b/0xa0
[   23.581559]  ? __pfx_kthread+0x10/0x10
[   23.581623]  ret_from_fork+0x41/0x80
[   23.581665]  ? __pfx_kthread+0x10/0x10
[   23.581696]  ret_from_fork_asm+0x1a/0x30
[   23.581744]  </TASK>
[   23.581763] 
[   23.606772] Allocated by task 285:
[   23.607389]  kasan_save_stack+0x45/0x70
[   23.609261]  kasan_save_track+0x18/0x40
[   23.609716]  kasan_save_alloc_info+0x3b/0x50
[   23.610158]  __kasan_kmalloc+0xb7/0xc0
[   23.610573]  __kmalloc_cache_noprof+0x189/0x420
[   23.611032]  kasan_atomics+0x95/0x310
[   23.611279]  kunit_try_run_case+0x1a5/0x480
[   23.613473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.614170]  kthread+0x337/0x6f0
[   23.614941]  ret_from_fork+0x41/0x80
[   23.615401]  ret_from_fork_asm+0x1a/0x30
[   23.615979] 
[   23.616128] The buggy address belongs to the object at ffff888102ef1180
[   23.616128]  which belongs to the cache kmalloc-64 of size 64
[   23.616759] The buggy address is located 0 bytes to the right of
[   23.616759]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   23.617346] 
[   23.617487] The buggy address belongs to the physical page:
[   23.617771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   23.619227] flags: 0x200000000000000(node=0|zone=2)
[   23.619839] page_type: f5(slab)
[   23.620336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.621419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.622114] page dumped because: kasan: bad access detected
[   23.622721] 
[   23.623146] Memory state around the buggy address:
[   23.623554]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.624563]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.625088] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.625800]                                      ^
[   23.626368]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.627155]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.628231] ==================================================================
[   25.910246] ==================================================================
[   25.910875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   25.911751] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.913237] 
[   25.913493] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.913605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.913649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.913712] Call Trace:
[   25.913767]  <TASK>
[   25.913825]  dump_stack_lvl+0x73/0xb0
[   25.913910]  print_report+0xd1/0x650
[   25.913992]  ? __virt_addr_valid+0x1db/0x2d0
[   25.914072]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.914144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.914224]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.914358]  kasan_report+0x141/0x180
[   25.914482]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.914582]  kasan_check_range+0x10c/0x1c0
[   25.914660]  __kasan_check_write+0x18/0x20
[   25.914771]  kasan_atomics_helper+0x1d7a/0x5450
[   25.914863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.914949]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.915030]  ? kasan_atomics+0x152/0x310
[   25.915199]  kasan_atomics+0x1dc/0x310
[   25.915281]  ? __pfx_kasan_atomics+0x10/0x10
[   25.915381]  ? __pfx_read_tsc+0x10/0x10
[   25.915500]  ? ktime_get_ts64+0x86/0x230
[   25.915598]  kunit_try_run_case+0x1a5/0x480
[   25.915691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.915772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.915913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.916003]  ? __kthread_parkme+0x82/0x180
[   25.916130]  ? preempt_count_sub+0x50/0x80
[   25.916262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.916367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.916492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.916575]  kthread+0x337/0x6f0
[   25.916626]  ? trace_preempt_on+0x20/0xc0
[   25.916697]  ? __pfx_kthread+0x10/0x10
[   25.916767]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.916888]  ? calculate_sigpending+0x7b/0xa0
[   25.916977]  ? __pfx_kthread+0x10/0x10
[   25.917091]  ret_from_fork+0x41/0x80
[   25.917174]  ? __pfx_kthread+0x10/0x10
[   25.917242]  ret_from_fork_asm+0x1a/0x30
[   25.917364]  </TASK>
[   25.917447] 
[   25.933116] Allocated by task 285:
[   25.933640]  kasan_save_stack+0x45/0x70
[   25.934187]  kasan_save_track+0x18/0x40
[   25.934668]  kasan_save_alloc_info+0x3b/0x50
[   25.935150]  __kasan_kmalloc+0xb7/0xc0
[   25.935644]  __kmalloc_cache_noprof+0x189/0x420
[   25.936162]  kasan_atomics+0x95/0x310
[   25.936648]  kunit_try_run_case+0x1a5/0x480
[   25.937143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.937690]  kthread+0x337/0x6f0
[   25.938103]  ret_from_fork+0x41/0x80
[   25.938590]  ret_from_fork_asm+0x1a/0x30
[   25.939011] 
[   25.939550] The buggy address belongs to the object at ffff888102ef1180
[   25.939550]  which belongs to the cache kmalloc-64 of size 64
[   25.941248] The buggy address is located 0 bytes to the right of
[   25.941248]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.944258] 
[   25.944827] The buggy address belongs to the physical page:
[   25.945599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.946227] flags: 0x200000000000000(node=0|zone=2)
[   25.946654] page_type: f5(slab)
[   25.947008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.947698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.948375] page dumped because: kasan: bad access detected
[   25.948813] 
[   25.949079] Memory state around the buggy address:
[   25.949554]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.950175]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.950740] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.951356]                                      ^
[   25.951790]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.952363]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.953001] ==================================================================
[   25.781226] ==================================================================
[   25.781890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   25.783280] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.784413] 
[   25.784654] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.784797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.784841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.784903] Call Trace:
[   25.784963]  <TASK>
[   25.785019]  dump_stack_lvl+0x73/0xb0
[   25.785431]  print_report+0xd1/0x650
[   25.785519]  ? __virt_addr_valid+0x1db/0x2d0
[   25.785599]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.785655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.785699]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.785737]  kasan_report+0x141/0x180
[   25.785775]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.785819]  kasan_check_range+0x10c/0x1c0
[   25.785853]  __kasan_check_write+0x18/0x20
[   25.785888]  kasan_atomics_helper+0x1c18/0x5450
[   25.785927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.785965]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.786002]  ? kasan_atomics+0x152/0x310
[   25.786066]  kasan_atomics+0x1dc/0x310
[   25.786121]  ? __pfx_kasan_atomics+0x10/0x10
[   25.786156]  ? __pfx_read_tsc+0x10/0x10
[   25.786194]  ? ktime_get_ts64+0x86/0x230
[   25.786236]  kunit_try_run_case+0x1a5/0x480
[   25.786279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.786344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.786387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.786427]  ? __kthread_parkme+0x82/0x180
[   25.786464]  ? preempt_count_sub+0x50/0x80
[   25.786506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.786545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.786587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.786624]  kthread+0x337/0x6f0
[   25.786653]  ? trace_preempt_on+0x20/0xc0
[   25.786694]  ? __pfx_kthread+0x10/0x10
[   25.786724]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.786762]  ? calculate_sigpending+0x7b/0xa0
[   25.786801]  ? __pfx_kthread+0x10/0x10
[   25.786832]  ret_from_fork+0x41/0x80
[   25.786869]  ? __pfx_kthread+0x10/0x10
[   25.786899]  ret_from_fork_asm+0x1a/0x30
[   25.786946]  </TASK>
[   25.786965] 
[   25.804736] Allocated by task 285:
[   25.805132]  kasan_save_stack+0x45/0x70
[   25.805836]  kasan_save_track+0x18/0x40
[   25.806449]  kasan_save_alloc_info+0x3b/0x50
[   25.807004]  __kasan_kmalloc+0xb7/0xc0
[   25.807584]  __kmalloc_cache_noprof+0x189/0x420
[   25.808120]  kasan_atomics+0x95/0x310
[   25.808728]  kunit_try_run_case+0x1a5/0x480
[   25.809205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.809610]  kthread+0x337/0x6f0
[   25.809968]  ret_from_fork+0x41/0x80
[   25.810770]  ret_from_fork_asm+0x1a/0x30
[   25.811334] 
[   25.811568] The buggy address belongs to the object at ffff888102ef1180
[   25.811568]  which belongs to the cache kmalloc-64 of size 64
[   25.812827] The buggy address is located 0 bytes to the right of
[   25.812827]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.813798] 
[   25.814074] The buggy address belongs to the physical page:
[   25.814842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.815718] flags: 0x200000000000000(node=0|zone=2)
[   25.816283] page_type: f5(slab)
[   25.816817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.817769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.818458] page dumped because: kasan: bad access detected
[   25.819001] 
[   25.819277] Memory state around the buggy address:
[   25.820003]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820683]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.821404] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.822086]                                      ^
[   25.822646]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823342]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.824001] ==================================================================
[   24.635556] ==================================================================
[   24.636283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   24.637110] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   24.637847] 
[   24.638190] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   24.638364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.638408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.638466] Call Trace:
[   24.638546]  <TASK>
[   24.638627]  dump_stack_lvl+0x73/0xb0
[   24.638720]  print_report+0xd1/0x650
[   24.638806]  ? __virt_addr_valid+0x1db/0x2d0
[   24.638887]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.638964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.639100]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.639216]  kasan_report+0x141/0x180
[   24.639317]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.639413]  kasan_check_range+0x10c/0x1c0
[   24.639517]  __kasan_check_write+0x18/0x20
[   24.639618]  kasan_atomics_helper+0xfa9/0x5450
[   24.639694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.639750]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.639790]  ? kasan_atomics+0x152/0x310
[   24.639863]  kasan_atomics+0x1dc/0x310
[   24.639926]  ? __pfx_kasan_atomics+0x10/0x10
[   24.639995]  ? __pfx_read_tsc+0x10/0x10
[   24.640133]  ? ktime_get_ts64+0x86/0x230
[   24.640251]  kunit_try_run_case+0x1a5/0x480
[   24.640356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.640437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.640572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.640680]  ? __kthread_parkme+0x82/0x180
[   24.640781]  ? preempt_count_sub+0x50/0x80
[   24.640900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.641016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.641143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.641224]  kthread+0x337/0x6f0
[   24.641310]  ? trace_preempt_on+0x20/0xc0
[   24.641398]  ? __pfx_kthread+0x10/0x10
[   24.641490]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.641598]  ? calculate_sigpending+0x7b/0xa0
[   24.641678]  ? __pfx_kthread+0x10/0x10
[   24.641747]  ret_from_fork+0x41/0x80
[   24.641819]  ? __pfx_kthread+0x10/0x10
[   24.641865]  ret_from_fork_asm+0x1a/0x30
[   24.641915]  </TASK>
[   24.641932] 
[   24.659378] Allocated by task 285:
[   24.659833]  kasan_save_stack+0x45/0x70
[   24.660959]  kasan_save_track+0x18/0x40
[   24.661264]  kasan_save_alloc_info+0x3b/0x50
[   24.661741]  __kasan_kmalloc+0xb7/0xc0
[   24.662130]  __kmalloc_cache_noprof+0x189/0x420
[   24.662603]  kasan_atomics+0x95/0x310
[   24.664014]  kunit_try_run_case+0x1a5/0x480
[   24.664708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.665063]  kthread+0x337/0x6f0
[   24.665320]  ret_from_fork+0x41/0x80
[   24.665593]  ret_from_fork_asm+0x1a/0x30
[   24.665890] 
[   24.666051] The buggy address belongs to the object at ffff888102ef1180
[   24.666051]  which belongs to the cache kmalloc-64 of size 64
[   24.669183] The buggy address is located 0 bytes to the right of
[   24.669183]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   24.672408] 
[   24.673272] The buggy address belongs to the physical page:
[   24.674502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   24.676231] flags: 0x200000000000000(node=0|zone=2)
[   24.677791] page_type: f5(slab)
[   24.678263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.679121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.679997] page dumped because: kasan: bad access detected
[   24.680600] 
[   24.680842] Memory state around the buggy address:
[   24.681395]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.682093]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.682757] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.683461]                                      ^
[   24.683845]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.684563]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.685200] ==================================================================
[   25.047873] ==================================================================
[   25.048694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   25.049471] Read of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.050229] 
[   25.050582] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.050804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.050847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.050909] Call Trace:
[   25.050966]  <TASK>
[   25.051024]  dump_stack_lvl+0x73/0xb0
[   25.051316]  print_report+0xd1/0x650
[   25.051406]  ? __virt_addr_valid+0x1db/0x2d0
[   25.051488]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.051624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.051739]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.051821]  kasan_report+0x141/0x180
[   25.051923]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.052111]  __asan_report_load4_noabort+0x18/0x20
[   25.052242]  kasan_atomics_helper+0x49ce/0x5450
[   25.052329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.052373]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.052419]  ? kasan_atomics+0x152/0x310
[   25.052456]  kasan_atomics+0x1dc/0x310
[   25.052487]  ? __pfx_kasan_atomics+0x10/0x10
[   25.052523]  ? __pfx_read_tsc+0x10/0x10
[   25.052557]  ? ktime_get_ts64+0x86/0x230
[   25.052597]  kunit_try_run_case+0x1a5/0x480
[   25.052637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.052674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.052713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.052751]  ? __kthread_parkme+0x82/0x180
[   25.052785]  ? preempt_count_sub+0x50/0x80
[   25.052824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.052861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.052898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.052936]  kthread+0x337/0x6f0
[   25.052961]  ? trace_preempt_on+0x20/0xc0
[   25.052999]  ? __pfx_kthread+0x10/0x10
[   25.053026]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.053106]  ? calculate_sigpending+0x7b/0xa0
[   25.053145]  ? __pfx_kthread+0x10/0x10
[   25.053174]  ret_from_fork+0x41/0x80
[   25.053210]  ? __pfx_kthread+0x10/0x10
[   25.053238]  ret_from_fork_asm+0x1a/0x30
[   25.053287]  </TASK>
[   25.053333] 
[   25.073762] Allocated by task 285:
[   25.074715]  kasan_save_stack+0x45/0x70
[   25.075106]  kasan_save_track+0x18/0x40
[   25.075528]  kasan_save_alloc_info+0x3b/0x50
[   25.076199]  __kasan_kmalloc+0xb7/0xc0
[   25.076618]  __kmalloc_cache_noprof+0x189/0x420
[   25.077057]  kasan_atomics+0x95/0x310
[   25.077442]  kunit_try_run_case+0x1a5/0x480
[   25.077885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.078845]  kthread+0x337/0x6f0
[   25.079100]  ret_from_fork+0x41/0x80
[   25.079854]  ret_from_fork_asm+0x1a/0x30
[   25.080437] 
[   25.080624] The buggy address belongs to the object at ffff888102ef1180
[   25.080624]  which belongs to the cache kmalloc-64 of size 64
[   25.082149] The buggy address is located 0 bytes to the right of
[   25.082149]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.083730] 
[   25.083953] The buggy address belongs to the physical page:
[   25.084591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.085457] flags: 0x200000000000000(node=0|zone=2)
[   25.085927] page_type: f5(slab)
[   25.086353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.087094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.087745] page dumped because: kasan: bad access detected
[   25.088378] 
[   25.088625] Memory state around the buggy address:
[   25.089137]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.089710]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.090430] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.091084]                                      ^
[   25.091565]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.092202]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.092840] ==================================================================
[   25.001338] ==================================================================
[   25.001923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   25.002783] Write of size 4 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.003491] 
[   25.003993] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.004168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.004206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.004257] Call Trace:
[   25.004319]  <TASK>
[   25.004369]  dump_stack_lvl+0x73/0xb0
[   25.004484]  print_report+0xd1/0x650
[   25.004559]  ? __virt_addr_valid+0x1db/0x2d0
[   25.004641]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.004735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.004824]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.004883]  kasan_report+0x141/0x180
[   25.004924]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.005100]  kasan_check_range+0x10c/0x1c0
[   25.005201]  __kasan_check_write+0x18/0x20
[   25.005315]  kasan_atomics_helper+0x12e6/0x5450
[   25.005415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.005497]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.005580]  ? kasan_atomics+0x152/0x310
[   25.005663]  kasan_atomics+0x1dc/0x310
[   25.005737]  ? __pfx_kasan_atomics+0x10/0x10
[   25.005815]  ? __pfx_read_tsc+0x10/0x10
[   25.006161]  ? ktime_get_ts64+0x86/0x230
[   25.006211]  kunit_try_run_case+0x1a5/0x480
[   25.006257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.006326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.006374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.006413]  ? __kthread_parkme+0x82/0x180
[   25.006448]  ? preempt_count_sub+0x50/0x80
[   25.006490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.006530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.006569]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.006609]  kthread+0x337/0x6f0
[   25.006639]  ? trace_preempt_on+0x20/0xc0
[   25.006680]  ? __pfx_kthread+0x10/0x10
[   25.006709]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.006745]  ? calculate_sigpending+0x7b/0xa0
[   25.006782]  ? __pfx_kthread+0x10/0x10
[   25.006811]  ret_from_fork+0x41/0x80
[   25.006847]  ? __pfx_kthread+0x10/0x10
[   25.006876]  ret_from_fork_asm+0x1a/0x30
[   25.006926]  </TASK>
[   25.006944] 
[   25.028094] Allocated by task 285:
[   25.028608]  kasan_save_stack+0x45/0x70
[   25.028982]  kasan_save_track+0x18/0x40
[   25.029638]  kasan_save_alloc_info+0x3b/0x50
[   25.030272]  __kasan_kmalloc+0xb7/0xc0
[   25.030779]  __kmalloc_cache_noprof+0x189/0x420
[   25.031254]  kasan_atomics+0x95/0x310
[   25.031931]  kunit_try_run_case+0x1a5/0x480
[   25.032402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.033177]  kthread+0x337/0x6f0
[   25.033589]  ret_from_fork+0x41/0x80
[   25.033932]  ret_from_fork_asm+0x1a/0x30
[   25.034539] 
[   25.034796] The buggy address belongs to the object at ffff888102ef1180
[   25.034796]  which belongs to the cache kmalloc-64 of size 64
[   25.036363] The buggy address is located 0 bytes to the right of
[   25.036363]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.037502] 
[   25.037705] The buggy address belongs to the physical page:
[   25.038340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.038950] flags: 0x200000000000000(node=0|zone=2)
[   25.039565] page_type: f5(slab)
[   25.039894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.040719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.041425] page dumped because: kasan: bad access detected
[   25.041997] 
[   25.042372] Memory state around the buggy address:
[   25.042843]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.043597]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.044191] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.044725]                                      ^
[   25.045171]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.045763]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.046373] ==================================================================
[   25.738584] ==================================================================
[   25.739873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   25.740640] Write of size 8 at addr ffff888102ef11b0 by task kunit_try_catch/285
[   25.741827] 
[   25.742182] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   25.742403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.742448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.742510] Call Trace:
[   25.742566]  <TASK>
[   25.742617]  dump_stack_lvl+0x73/0xb0
[   25.742668]  print_report+0xd1/0x650
[   25.742709]  ? __virt_addr_valid+0x1db/0x2d0
[   25.742745]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.742782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.742823]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.742861]  kasan_report+0x141/0x180
[   25.742899]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.742943]  kasan_check_range+0x10c/0x1c0
[   25.742977]  __kasan_check_write+0x18/0x20
[   25.743010]  kasan_atomics_helper+0x1b22/0x5450
[   25.743063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.743119]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.743156]  ? kasan_atomics+0x152/0x310
[   25.743194]  kasan_atomics+0x1dc/0x310
[   25.743225]  ? __pfx_kasan_atomics+0x10/0x10
[   25.743259]  ? __pfx_read_tsc+0x10/0x10
[   25.743323]  ? ktime_get_ts64+0x86/0x230
[   25.743374]  kunit_try_run_case+0x1a5/0x480
[   25.743417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.743454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.743495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.743535]  ? __kthread_parkme+0x82/0x180
[   25.743572]  ? preempt_count_sub+0x50/0x80
[   25.743613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.743651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.743692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.743731]  kthread+0x337/0x6f0
[   25.743759]  ? trace_preempt_on+0x20/0xc0
[   25.743797]  ? __pfx_kthread+0x10/0x10
[   25.743827]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.743862]  ? calculate_sigpending+0x7b/0xa0
[   25.743912]  ? __pfx_kthread+0x10/0x10
[   25.743942]  ret_from_fork+0x41/0x80
[   25.743979]  ? __pfx_kthread+0x10/0x10
[   25.744010]  ret_from_fork_asm+0x1a/0x30
[   25.744094]  </TASK>
[   25.744117] 
[   25.759717] Allocated by task 285:
[   25.760208]  kasan_save_stack+0x45/0x70
[   25.760800]  kasan_save_track+0x18/0x40
[   25.761356]  kasan_save_alloc_info+0x3b/0x50
[   25.761803]  __kasan_kmalloc+0xb7/0xc0
[   25.762403]  __kmalloc_cache_noprof+0x189/0x420
[   25.762877]  kasan_atomics+0x95/0x310
[   25.763187]  kunit_try_run_case+0x1a5/0x480
[   25.763544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.764375]  kthread+0x337/0x6f0
[   25.764827]  ret_from_fork+0x41/0x80
[   25.765436]  ret_from_fork_asm+0x1a/0x30
[   25.766022] 
[   25.766232] The buggy address belongs to the object at ffff888102ef1180
[   25.766232]  which belongs to the cache kmalloc-64 of size 64
[   25.767216] The buggy address is located 0 bytes to the right of
[   25.767216]  allocated 48-byte region [ffff888102ef1180, ffff888102ef11b0)
[   25.768417] 
[   25.768746] The buggy address belongs to the physical page:
[   25.769376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ef1
[   25.770083] flags: 0x200000000000000(node=0|zone=2)
[   25.770660] page_type: f5(slab)
[   25.771083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.771777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.772590] page dumped because: kasan: bad access detected
[   25.773099] 
[   25.773431] Memory state around the buggy address:
[   25.774362]  ffff888102ef1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.774948]  ffff888102ef1100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.776025] >ffff888102ef1180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.777740]                                      ^
[   25.778372]  ffff888102ef1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.779043]  ffff888102ef1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.779748] ==================================================================