Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   28.541865] ==================================================================
[   28.543327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   28.544142] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.545112] 
[   28.545579] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.545851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.545959] Hardware name: linux,dummy-virt (DT)
[   28.546110] Call trace:
[   28.546189]  show_stack+0x20/0x38 (C)
[   28.546259]  dump_stack_lvl+0x8c/0xd0
[   28.546364]  print_report+0x118/0x608
[   28.546439]  kasan_report+0xdc/0x128
[   28.546499]  kasan_check_range+0x100/0x1a8
[   28.546554]  __kasan_check_write+0x20/0x30
[   28.546611]  kasan_atomics_helper+0x6ec/0x4858
[   28.546682]  kasan_atomics+0x198/0x2e8
[   28.546742]  kunit_try_run_case+0x170/0x3f0
[   28.546799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.546873]  kthread+0x318/0x620
[   28.546963]  ret_from_fork+0x10/0x20
[   28.547027] 
[   28.556694] Allocated by task 254:
[   28.557393]  kasan_save_stack+0x3c/0x68
[   28.558352]  kasan_save_track+0x20/0x40
[   28.559304]  kasan_save_alloc_info+0x40/0x58
[   28.560058]  __kasan_kmalloc+0xd4/0xd8
[   28.560619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.561498]  kasan_atomics+0xb8/0x2e8
[   28.562105]  kunit_try_run_case+0x170/0x3f0
[   28.562579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.563417]  kthread+0x318/0x620
[   28.565415]  ret_from_fork+0x10/0x20
[   28.566606] 
[   28.566959] The buggy address belongs to the object at fff00000c65edb80
[   28.566959]  which belongs to the cache kmalloc-64 of size 64
[   28.569299] The buggy address is located 0 bytes to the right of
[   28.569299]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.570504] 
[   28.571046] The buggy address belongs to the physical page:
[   28.571923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.573340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.574137] page_type: f5(slab)
[   28.574801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.576205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.577067] page dumped because: kasan: bad access detected
[   28.577493] 
[   28.577703] Memory state around the buggy address:
[   28.578116]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.578674]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.579848] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.581023]                                      ^
[   28.581847]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.583160]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.584658] ==================================================================
[   28.066612] ==================================================================
[   28.068849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   28.071621] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.073363] 
[   28.073638] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.073835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.074555] Hardware name: linux,dummy-virt (DT)
[   28.074640] Call trace:
[   28.074698]  show_stack+0x20/0x38 (C)
[   28.074820]  dump_stack_lvl+0x8c/0xd0
[   28.074957]  print_report+0x118/0x608
[   28.075084]  kasan_report+0xdc/0x128
[   28.075202]  __asan_report_load4_noabort+0x20/0x30
[   28.075326]  kasan_atomics_helper+0x40fc/0x4858
[   28.075446]  kasan_atomics+0x198/0x2e8
[   28.075563]  kunit_try_run_case+0x170/0x3f0
[   28.075682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.075813]  kthread+0x318/0x620
[   28.075948]  ret_from_fork+0x10/0x20
[   28.076071] 
[   28.088818] Allocated by task 254:
[   28.090011]  kasan_save_stack+0x3c/0x68
[   28.091290]  kasan_save_track+0x20/0x40
[   28.092546]  kasan_save_alloc_info+0x40/0x58
[   28.094006]  __kasan_kmalloc+0xd4/0xd8
[   28.095239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.096565]  kasan_atomics+0xb8/0x2e8
[   28.097696]  kunit_try_run_case+0x170/0x3f0
[   28.098837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.100301]  kthread+0x318/0x620
[   28.100671]  ret_from_fork+0x10/0x20
[   28.102100] 
[   28.102876] The buggy address belongs to the object at fff00000c65edb80
[   28.102876]  which belongs to the cache kmalloc-64 of size 64
[   28.105673] The buggy address is located 0 bytes to the right of
[   28.105673]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.107056] 
[   28.107687] The buggy address belongs to the physical page:
[   28.108145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.109254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.110120] page_type: f5(slab)
[   28.110547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.111838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.112501] page dumped because: kasan: bad access detected
[   28.112767] 
[   28.112944] Memory state around the buggy address:
[   28.113489]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.114819]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.115381] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.115922]                                      ^
[   28.116336]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.116840]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.119037] ==================================================================
[   27.828550] ==================================================================
[   27.829361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   27.830026] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   27.830701] 
[   27.831066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   27.831632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.831705] Hardware name: linux,dummy-virt (DT)
[   27.831792] Call trace:
[   27.831857]  show_stack+0x20/0x38 (C)
[   27.832740]  dump_stack_lvl+0x8c/0xd0
[   27.832876]  print_report+0x118/0x608
[   27.835616]  kasan_report+0xdc/0x128
[   27.835742]  __asan_report_store4_noabort+0x20/0x30
[   27.836964]  kasan_atomics_helper+0x3f7c/0x4858
[   27.837106]  kasan_atomics+0x198/0x2e8
[   27.841941]  kunit_try_run_case+0x170/0x3f0
[   27.842101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.842240]  kthread+0x318/0x620
[   27.842362]  ret_from_fork+0x10/0x20
[   27.842505] 
[   27.857130] Allocated by task 254:
[   27.857958]  kasan_save_stack+0x3c/0x68
[   27.858399]  kasan_save_track+0x20/0x40
[   27.858781]  kasan_save_alloc_info+0x40/0x58
[   27.859198]  __kasan_kmalloc+0xd4/0xd8
[   27.859951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.860745]  kasan_atomics+0xb8/0x2e8
[   27.862386]  kunit_try_run_case+0x170/0x3f0
[   27.863179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.864229]  kthread+0x318/0x620
[   27.865331]  ret_from_fork+0x10/0x20
[   27.866038] 
[   27.866433] The buggy address belongs to the object at fff00000c65edb80
[   27.866433]  which belongs to the cache kmalloc-64 of size 64
[   27.869127] The buggy address is located 0 bytes to the right of
[   27.869127]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   27.871344] 
[   27.871592] The buggy address belongs to the physical page:
[   27.872226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   27.874138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.875225] page_type: f5(slab)
[   27.875849] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.876910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.877478] page dumped because: kasan: bad access detected
[   27.878702] 
[   27.879138] Memory state around the buggy address:
[   27.880250]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.881631]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.883033] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.883903]                                      ^
[   27.885122]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.885830]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.887080] ==================================================================
[   29.323462] ==================================================================
[   29.326824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   29.328342] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.331447] 
[   29.331877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.332530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.332611] Hardware name: linux,dummy-virt (DT)
[   29.332700] Call trace:
[   29.332765]  show_stack+0x20/0x38 (C)
[   29.332972]  dump_stack_lvl+0x8c/0xd0
[   29.333117]  print_report+0x118/0x608
[   29.333248]  kasan_report+0xdc/0x128
[   29.333386]  __asan_report_load4_noabort+0x20/0x30
[   29.333528]  kasan_atomics_helper+0x3dbc/0x4858
[   29.333645]  kasan_atomics+0x198/0x2e8
[   29.333749]  kunit_try_run_case+0x170/0x3f0
[   29.333868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.334034]  kthread+0x318/0x620
[   29.334152]  ret_from_fork+0x10/0x20
[   29.334296] 
[   29.346497] Allocated by task 254:
[   29.348068]  kasan_save_stack+0x3c/0x68
[   29.348829]  kasan_save_track+0x20/0x40
[   29.349285]  kasan_save_alloc_info+0x40/0x58
[   29.349703]  __kasan_kmalloc+0xd4/0xd8
[   29.351288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.351961]  kasan_atomics+0xb8/0x2e8
[   29.352416]  kunit_try_run_case+0x170/0x3f0
[   29.354263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.355323]  kthread+0x318/0x620
[   29.356413]  ret_from_fork+0x10/0x20
[   29.356870] 
[   29.357182] The buggy address belongs to the object at fff00000c65edb80
[   29.357182]  which belongs to the cache kmalloc-64 of size 64
[   29.359434] The buggy address is located 0 bytes to the right of
[   29.359434]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.362348] 
[   29.362668] The buggy address belongs to the physical page:
[   29.364496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.365415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.367021] page_type: f5(slab)
[   29.367364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.369478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.370633] page dumped because: kasan: bad access detected
[   29.371219] 
[   29.371524] Memory state around the buggy address:
[   29.372862]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.374859]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375745] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.377476]                                      ^
[   29.378306]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.379536]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.380091] ==================================================================
[   30.281525] ==================================================================
[   30.282334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.283134] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.283985] 
[   30.284355] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.284570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.284657] Hardware name: linux,dummy-virt (DT)
[   30.284783] Call trace:
[   30.284862]  show_stack+0x20/0x38 (C)
[   30.285071]  dump_stack_lvl+0x8c/0xd0
[   30.285277]  print_report+0x118/0x608
[   30.285417]  kasan_report+0xdc/0x128
[   30.285555]  kasan_check_range+0x100/0x1a8
[   30.285633]  __kasan_check_write+0x20/0x30
[   30.285691]  kasan_atomics_helper+0x1384/0x4858
[   30.285753]  kasan_atomics+0x198/0x2e8
[   30.285809]  kunit_try_run_case+0x170/0x3f0
[   30.285868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.285966]  kthread+0x318/0x620
[   30.286024]  ret_from_fork+0x10/0x20
[   30.286086] 
[   30.292834] Allocated by task 254:
[   30.293304]  kasan_save_stack+0x3c/0x68
[   30.293826]  kasan_save_track+0x20/0x40
[   30.294491]  kasan_save_alloc_info+0x40/0x58
[   30.295189]  __kasan_kmalloc+0xd4/0xd8
[   30.295691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.296402]  kasan_atomics+0xb8/0x2e8
[   30.297003]  kunit_try_run_case+0x170/0x3f0
[   30.297612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.298400]  kthread+0x318/0x620
[   30.298916]  ret_from_fork+0x10/0x20
[   30.299525] 
[   30.299837] The buggy address belongs to the object at fff00000c65edb80
[   30.299837]  which belongs to the cache kmalloc-64 of size 64
[   30.300961] The buggy address is located 0 bytes to the right of
[   30.300961]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.302328] 
[   30.302606] The buggy address belongs to the physical page:
[   30.303355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.304244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.304984] page_type: f5(slab)
[   30.305530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.306315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.307152] page dumped because: kasan: bad access detected
[   30.307730] 
[   30.308060] Memory state around the buggy address:
[   30.308463]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.309035]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.309543] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.310085]                                      ^
[   30.310695]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.311342]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.312220] ==================================================================
[   30.213828] ==================================================================
[   30.214457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   30.215423] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.216177] 
[   30.216574] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.216832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.216938] Hardware name: linux,dummy-virt (DT)
[   30.217078] Call trace:
[   30.217153]  show_stack+0x20/0x38 (C)
[   30.217293]  dump_stack_lvl+0x8c/0xd0
[   30.217441]  print_report+0x118/0x608
[   30.217620]  kasan_report+0xdc/0x128
[   30.217760]  kasan_check_range+0x100/0x1a8
[   30.217826]  __kasan_check_write+0x20/0x30
[   30.217912]  kasan_atomics_helper+0x126c/0x4858
[   30.217983]  kasan_atomics+0x198/0x2e8
[   30.218040]  kunit_try_run_case+0x170/0x3f0
[   30.218100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.218177]  kthread+0x318/0x620
[   30.218236]  ret_from_fork+0x10/0x20
[   30.218297] 
[   30.224705] Allocated by task 254:
[   30.225292]  kasan_save_stack+0x3c/0x68
[   30.225935]  kasan_save_track+0x20/0x40
[   30.226639]  kasan_save_alloc_info+0x40/0x58
[   30.227248]  __kasan_kmalloc+0xd4/0xd8
[   30.227802]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.228457]  kasan_atomics+0xb8/0x2e8
[   30.228983]  kunit_try_run_case+0x170/0x3f0
[   30.229595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.230309]  kthread+0x318/0x620
[   30.230818]  ret_from_fork+0x10/0x20
[   30.231395] 
[   30.231726] The buggy address belongs to the object at fff00000c65edb80
[   30.231726]  which belongs to the cache kmalloc-64 of size 64
[   30.232774] The buggy address is located 0 bytes to the right of
[   30.232774]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.234176] 
[   30.234511] The buggy address belongs to the physical page:
[   30.235208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.235877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.236740] page_type: f5(slab)
[   30.237358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.238225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.239041] page dumped because: kasan: bad access detected
[   30.239716] 
[   30.240093] Memory state around the buggy address:
[   30.240676]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.241428]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.242250] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.243138]                                      ^
[   30.243724]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.244488]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.245253] ==================================================================
[   30.730915] ==================================================================
[   30.732268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.732964] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.734045] 
[   30.734803] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.735129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.735227] Hardware name: linux,dummy-virt (DT)
[   30.735315] Call trace:
[   30.735386]  show_stack+0x20/0x38 (C)
[   30.735529]  dump_stack_lvl+0x8c/0xd0
[   30.735737]  print_report+0x118/0x608
[   30.735929]  kasan_report+0xdc/0x128
[   30.736155]  __asan_report_load8_noabort+0x20/0x30
[   30.736251]  kasan_atomics_helper+0x3e20/0x4858
[   30.736317]  kasan_atomics+0x198/0x2e8
[   30.736375]  kunit_try_run_case+0x170/0x3f0
[   30.736435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.736498]  kthread+0x318/0x620
[   30.736557]  ret_from_fork+0x10/0x20
[   30.736617] 
[   30.743374] Allocated by task 254:
[   30.743773]  kasan_save_stack+0x3c/0x68
[   30.744529]  kasan_save_track+0x20/0x40
[   30.745256]  kasan_save_alloc_info+0x40/0x58
[   30.745857]  __kasan_kmalloc+0xd4/0xd8
[   30.746543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.747246]  kasan_atomics+0xb8/0x2e8
[   30.747834]  kunit_try_run_case+0x170/0x3f0
[   30.748501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.749240]  kthread+0x318/0x620
[   30.749809]  ret_from_fork+0x10/0x20
[   30.750411] 
[   30.750808] The buggy address belongs to the object at fff00000c65edb80
[   30.750808]  which belongs to the cache kmalloc-64 of size 64
[   30.752115] The buggy address is located 0 bytes to the right of
[   30.752115]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.753535] 
[   30.753952] The buggy address belongs to the physical page:
[   30.754634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.755550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.756220] page_type: f5(slab)
[   30.756438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.756776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.757801] page dumped because: kasan: bad access detected
[   30.758400] 
[   30.758780] Memory state around the buggy address:
[   30.759414]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.760221]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.760990] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.761741]                                      ^
[   30.762342]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.763171]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.763942] ==================================================================
[   28.331439] ==================================================================
[   28.332159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   28.332905] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.333764] 
[   28.334195] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.334411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.334502] Hardware name: linux,dummy-virt (DT)
[   28.334600] Call trace:
[   28.334673]  show_stack+0x20/0x38 (C)
[   28.334814]  dump_stack_lvl+0x8c/0xd0
[   28.334977]  print_report+0x118/0x608
[   28.335113]  kasan_report+0xdc/0x128
[   28.335177]  kasan_check_range+0x100/0x1a8
[   28.335235]  __kasan_check_write+0x20/0x30
[   28.335294]  kasan_atomics_helper+0x4e4/0x4858
[   28.335354]  kasan_atomics+0x198/0x2e8
[   28.335410]  kunit_try_run_case+0x170/0x3f0
[   28.335469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.335531]  kthread+0x318/0x620
[   28.335588]  ret_from_fork+0x10/0x20
[   28.335647] 
[   28.344187] Allocated by task 254:
[   28.344533]  kasan_save_stack+0x3c/0x68
[   28.344984]  kasan_save_track+0x20/0x40
[   28.345362]  kasan_save_alloc_info+0x40/0x58
[   28.345753]  __kasan_kmalloc+0xd4/0xd8
[   28.350271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.353095]  kasan_atomics+0xb8/0x2e8
[   28.354547]  kunit_try_run_case+0x170/0x3f0
[   28.357273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.358647]  kthread+0x318/0x620
[   28.359257]  ret_from_fork+0x10/0x20
[   28.359807] 
[   28.360152] The buggy address belongs to the object at fff00000c65edb80
[   28.360152]  which belongs to the cache kmalloc-64 of size 64
[   28.361398] The buggy address is located 0 bytes to the right of
[   28.361398]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.362949] 
[   28.363217] The buggy address belongs to the physical page:
[   28.364020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.365370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.366239] page_type: f5(slab)
[   28.366580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.367148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.367710] page dumped because: kasan: bad access detected
[   28.368197] 
[   28.368516] Memory state around the buggy address:
[   28.369034]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.369853]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.370837] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.371680]                                      ^
[   28.372194]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.373380]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.374719] ==================================================================
[   29.010767] ==================================================================
[   29.012015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.012601] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.013841] 
[   29.016083] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.016311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.016398] Hardware name: linux,dummy-virt (DT)
[   29.016490] Call trace:
[   29.016560]  show_stack+0x20/0x38 (C)
[   29.016712]  dump_stack_lvl+0x8c/0xd0
[   29.016853]  print_report+0x118/0x608
[   29.017009]  kasan_report+0xdc/0x128
[   29.017116]  kasan_check_range+0x100/0x1a8
[   29.017217]  __kasan_check_write+0x20/0x30
[   29.017314]  kasan_atomics_helper+0xa04/0x4858
[   29.017435]  kasan_atomics+0x198/0x2e8
[   29.017560]  kunit_try_run_case+0x170/0x3f0
[   29.017686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.017827]  kthread+0x318/0x620
[   29.017993]  ret_from_fork+0x10/0x20
[   29.018129] 
[   29.028752] Allocated by task 254:
[   29.029256]  kasan_save_stack+0x3c/0x68
[   29.029744]  kasan_save_track+0x20/0x40
[   29.030523]  kasan_save_alloc_info+0x40/0x58
[   29.031404]  __kasan_kmalloc+0xd4/0xd8
[   29.032164]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.033154]  kasan_atomics+0xb8/0x2e8
[   29.034287]  kunit_try_run_case+0x170/0x3f0
[   29.035983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.036699]  kthread+0x318/0x620
[   29.037073]  ret_from_fork+0x10/0x20
[   29.037405] 
[   29.037616] The buggy address belongs to the object at fff00000c65edb80
[   29.037616]  which belongs to the cache kmalloc-64 of size 64
[   29.040618] The buggy address is located 0 bytes to the right of
[   29.040618]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.043072] 
[   29.043441] The buggy address belongs to the physical page:
[   29.044809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.046220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.047341] page_type: f5(slab)
[   29.047724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.049379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.050841] page dumped because: kasan: bad access detected
[   29.051791] 
[   29.052582] Memory state around the buggy address:
[   29.053592]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.054291]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.055485] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.057071]                                      ^
[   29.058196]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.059643]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.061038] ==================================================================
[   29.194326] ==================================================================
[   29.195763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.196790] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.197585] 
[   29.197861] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.198057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.198122] Hardware name: linux,dummy-virt (DT)
[   29.198210] Call trace:
[   29.198268]  show_stack+0x20/0x38 (C)
[   29.198409]  dump_stack_lvl+0x8c/0xd0
[   29.198545]  print_report+0x118/0x608
[   29.198680]  kasan_report+0xdc/0x128
[   29.198814]  __asan_report_load4_noabort+0x20/0x30
[   29.199447]  kasan_atomics_helper+0x3dcc/0x4858
[   29.199598]  kasan_atomics+0x198/0x2e8
[   29.199753]  kunit_try_run_case+0x170/0x3f0
[   29.199980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.200132]  kthread+0x318/0x620
[   29.200333]  ret_from_fork+0x10/0x20
[   29.200487] 
[   29.211130] Allocated by task 254:
[   29.212260]  kasan_save_stack+0x3c/0x68
[   29.213451]  kasan_save_track+0x20/0x40
[   29.214458]  kasan_save_alloc_info+0x40/0x58
[   29.215736]  __kasan_kmalloc+0xd4/0xd8
[   29.216707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.217451]  kasan_atomics+0xb8/0x2e8
[   29.217835]  kunit_try_run_case+0x170/0x3f0
[   29.219208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.220596]  kthread+0x318/0x620
[   29.222607]  ret_from_fork+0x10/0x20
[   29.223026] 
[   29.223268] The buggy address belongs to the object at fff00000c65edb80
[   29.223268]  which belongs to the cache kmalloc-64 of size 64
[   29.227565] The buggy address is located 0 bytes to the right of
[   29.227565]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.233765] 
[   29.234501] The buggy address belongs to the physical page:
[   29.237103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.239479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.240542] page_type: f5(slab)
[   29.242015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.242557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.243071] page dumped because: kasan: bad access detected
[   29.243472] 
[   29.243708] Memory state around the buggy address:
[   29.244815]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.248105]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.248634] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.249346]                                      ^
[   29.251529]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.253661]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.256031] ==================================================================
[   30.346545] ==================================================================
[   30.347333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.348038] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.349218] 
[   30.349630] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.349816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.349902] Hardware name: linux,dummy-virt (DT)
[   30.350027] Call trace:
[   30.350133]  show_stack+0x20/0x38 (C)
[   30.350350]  dump_stack_lvl+0x8c/0xd0
[   30.350555]  print_report+0x118/0x608
[   30.350755]  kasan_report+0xdc/0x128
[   30.350940]  kasan_check_range+0x100/0x1a8
[   30.351059]  __kasan_check_write+0x20/0x30
[   30.351169]  kasan_atomics_helper+0x1414/0x4858
[   30.351318]  kasan_atomics+0x198/0x2e8
[   30.351429]  kunit_try_run_case+0x170/0x3f0
[   30.351544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.351668]  kthread+0x318/0x620
[   30.351816]  ret_from_fork+0x10/0x20
[   30.351984] 
[   30.358741] Allocated by task 254:
[   30.359283]  kasan_save_stack+0x3c/0x68
[   30.359919]  kasan_save_track+0x20/0x40
[   30.360534]  kasan_save_alloc_info+0x40/0x58
[   30.361149]  __kasan_kmalloc+0xd4/0xd8
[   30.361715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.362252]  kasan_atomics+0xb8/0x2e8
[   30.362688]  kunit_try_run_case+0x170/0x3f0
[   30.363398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.364153]  kthread+0x318/0x620
[   30.364704]  ret_from_fork+0x10/0x20
[   30.365284] 
[   30.365594] The buggy address belongs to the object at fff00000c65edb80
[   30.365594]  which belongs to the cache kmalloc-64 of size 64
[   30.366714] The buggy address is located 0 bytes to the right of
[   30.366714]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.368117] 
[   30.368505] The buggy address belongs to the physical page:
[   30.369153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.370021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.371070] page_type: f5(slab)
[   30.371559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.372572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.373352] page dumped because: kasan: bad access detected
[   30.374351] 
[   30.375118] Memory state around the buggy address:
[   30.376025]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.376776]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.377532] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.378262]                                      ^
[   30.378856]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.379558]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.380571] ==================================================================
[   28.376582] ==================================================================
[   28.377444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   28.379286] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.380560] 
[   28.380952] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.381134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.381197] Hardware name: linux,dummy-virt (DT)
[   28.381271] Call trace:
[   28.381326]  show_stack+0x20/0x38 (C)
[   28.381440]  dump_stack_lvl+0x8c/0xd0
[   28.381548]  print_report+0x118/0x608
[   28.381650]  kasan_report+0xdc/0x128
[   28.381755]  kasan_check_range+0x100/0x1a8
[   28.381859]  __kasan_check_write+0x20/0x30
[   28.381999]  kasan_atomics_helper+0x54c/0x4858
[   28.382149]  kasan_atomics+0x198/0x2e8
[   28.382303]  kunit_try_run_case+0x170/0x3f0
[   28.382444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.382603]  kthread+0x318/0x620
[   28.382741]  ret_from_fork+0x10/0x20
[   28.382926] 
[   28.394376] Allocated by task 254:
[   28.394942]  kasan_save_stack+0x3c/0x68
[   28.395566]  kasan_save_track+0x20/0x40
[   28.396123]  kasan_save_alloc_info+0x40/0x58
[   28.396648]  __kasan_kmalloc+0xd4/0xd8
[   28.397730]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.398151]  kasan_atomics+0xb8/0x2e8
[   28.398509]  kunit_try_run_case+0x170/0x3f0
[   28.398878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.400519]  kthread+0x318/0x620
[   28.401426]  ret_from_fork+0x10/0x20
[   28.401847] 
[   28.402227] The buggy address belongs to the object at fff00000c65edb80
[   28.402227]  which belongs to the cache kmalloc-64 of size 64
[   28.403901] The buggy address is located 0 bytes to the right of
[   28.403901]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.405196] 
[   28.405512] The buggy address belongs to the physical page:
[   28.406416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.407298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.407989] page_type: f5(slab)
[   28.408427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.409199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.410069] page dumped because: kasan: bad access detected
[   28.410535] 
[   28.410747] Memory state around the buggy address:
[   28.411145]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.411647]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.417131] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.418563]                                      ^
[   28.419141]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.419875]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.420659] ==================================================================
[   29.664719] ==================================================================
[   29.666557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.667370] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.667943] 
[   29.668183] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.668369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.668447] Hardware name: linux,dummy-virt (DT)
[   29.668529] Call trace:
[   29.668592]  show_stack+0x20/0x38 (C)
[   29.669117]  dump_stack_lvl+0x8c/0xd0
[   29.669710]  print_report+0x118/0x608
[   29.669852]  kasan_report+0xdc/0x128
[   29.670014]  kasan_check_range+0x100/0x1a8
[   29.670078]  __kasan_check_read+0x20/0x30
[   29.670136]  kasan_atomics_helper+0xdd4/0x4858
[   29.670213]  kasan_atomics+0x198/0x2e8
[   29.670270]  kunit_try_run_case+0x170/0x3f0
[   29.670425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.670524]  kthread+0x318/0x620
[   29.670582]  ret_from_fork+0x10/0x20
[   29.670646] 
[   29.680223] Allocated by task 254:
[   29.680947]  kasan_save_stack+0x3c/0x68
[   29.682059]  kasan_save_track+0x20/0x40
[   29.682775]  kasan_save_alloc_info+0x40/0x58
[   29.683422]  __kasan_kmalloc+0xd4/0xd8
[   29.683779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.684912]  kasan_atomics+0xb8/0x2e8
[   29.685712]  kunit_try_run_case+0x170/0x3f0
[   29.686392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.687263]  kthread+0x318/0x620
[   29.687768]  ret_from_fork+0x10/0x20
[   29.688351] 
[   29.688764] The buggy address belongs to the object at fff00000c65edb80
[   29.688764]  which belongs to the cache kmalloc-64 of size 64
[   29.689592] The buggy address is located 0 bytes to the right of
[   29.689592]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.690873] 
[   29.691137] The buggy address belongs to the physical page:
[   29.691557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.692277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.693146] page_type: f5(slab)
[   29.693627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.694460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.697045] page dumped because: kasan: bad access detected
[   29.697709] 
[   29.698215] Memory state around the buggy address:
[   29.698906]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.699438]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.700234] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.701025]                                      ^
[   29.701413]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.701910]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.702396] ==================================================================
[   30.458984] ==================================================================
[   30.459844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.460449] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.461535] 
[   30.461930] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.462176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.462248] Hardware name: linux,dummy-virt (DT)
[   30.462325] Call trace:
[   30.462418]  show_stack+0x20/0x38 (C)
[   30.462562]  dump_stack_lvl+0x8c/0xd0
[   30.462698]  print_report+0x118/0x608
[   30.462838]  kasan_report+0xdc/0x128
[   30.463005]  kasan_check_range+0x100/0x1a8
[   30.463186]  __kasan_check_write+0x20/0x30
[   30.463364]  kasan_atomics_helper+0x154c/0x4858
[   30.463510]  kasan_atomics+0x198/0x2e8
[   30.463635]  kunit_try_run_case+0x170/0x3f0
[   30.463704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.463773]  kthread+0x318/0x620
[   30.463829]  ret_from_fork+0x10/0x20
[   30.463916] 
[   30.470754] Allocated by task 254:
[   30.471316]  kasan_save_stack+0x3c/0x68
[   30.471950]  kasan_save_track+0x20/0x40
[   30.472484]  kasan_save_alloc_info+0x40/0x58
[   30.473049]  __kasan_kmalloc+0xd4/0xd8
[   30.473533]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.474075]  kasan_atomics+0xb8/0x2e8
[   30.474638]  kunit_try_run_case+0x170/0x3f0
[   30.475299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.475915]  kthread+0x318/0x620
[   30.476326]  ret_from_fork+0x10/0x20
[   30.476864] 
[   30.477276] The buggy address belongs to the object at fff00000c65edb80
[   30.477276]  which belongs to the cache kmalloc-64 of size 64
[   30.478658] The buggy address is located 0 bytes to the right of
[   30.478658]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.479919] 
[   30.480236] The buggy address belongs to the physical page:
[   30.480991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.481961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.482710] page_type: f5(slab)
[   30.483237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.484054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.484830] page dumped because: kasan: bad access detected
[   30.485466] 
[   30.485783] Memory state around the buggy address:
[   30.486313]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.487205]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.487924] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.488750]                                      ^
[   30.489464]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.490235]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.491085] ==================================================================
[   28.160503] ==================================================================
[   28.161468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   28.162581] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.163931] 
[   28.164333] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.164515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.164574] Hardware name: linux,dummy-virt (DT)
[   28.164645] Call trace:
[   28.164694]  show_stack+0x20/0x38 (C)
[   28.164803]  dump_stack_lvl+0x8c/0xd0
[   28.164933]  print_report+0x118/0x608
[   28.165041]  kasan_report+0xdc/0x128
[   28.165142]  __asan_report_store4_noabort+0x20/0x30
[   28.165271]  kasan_atomics_helper+0x3f94/0x4858
[   28.165409]  kasan_atomics+0x198/0x2e8
[   28.165556]  kunit_try_run_case+0x170/0x3f0
[   28.165704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.165871]  kthread+0x318/0x620
[   28.166034]  ret_from_fork+0x10/0x20
[   28.166193] 
[   28.172472] Allocated by task 254:
[   28.172897]  kasan_save_stack+0x3c/0x68
[   28.173327]  kasan_save_track+0x20/0x40
[   28.173779]  kasan_save_alloc_info+0x40/0x58
[   28.174199]  __kasan_kmalloc+0xd4/0xd8
[   28.174568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.175016]  kasan_atomics+0xb8/0x2e8
[   28.175463]  kunit_try_run_case+0x170/0x3f0
[   28.175964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.176732]  kthread+0x318/0x620
[   28.177263]  ret_from_fork+0x10/0x20
[   28.177822] 
[   28.178142] The buggy address belongs to the object at fff00000c65edb80
[   28.178142]  which belongs to the cache kmalloc-64 of size 64
[   28.179335] The buggy address is located 0 bytes to the right of
[   28.179335]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.180113] 
[   28.180330] The buggy address belongs to the physical page:
[   28.180748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.181566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.182441] page_type: f5(slab)
[   28.182985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.183819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.184645] page dumped because: kasan: bad access detected
[   28.185196] 
[   28.185510] Memory state around the buggy address:
[   28.186214]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.186968]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.187616] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.188179]                                      ^
[   28.188585]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.189127]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.189626] ==================================================================
[   28.592093] ==================================================================
[   28.592931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   28.596515] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.597149] 
[   28.597444] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.597655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.597734] Hardware name: linux,dummy-virt (DT)
[   28.597820] Call trace:
[   28.597900]  show_stack+0x20/0x38 (C)
[   28.598040]  dump_stack_lvl+0x8c/0xd0
[   28.598184]  print_report+0x118/0x608
[   28.598313]  kasan_report+0xdc/0x128
[   28.598439]  kasan_check_range+0x100/0x1a8
[   28.598569]  __kasan_check_write+0x20/0x30
[   28.598699]  kasan_atomics_helper+0x760/0x4858
[   28.598842]  kasan_atomics+0x198/0x2e8
[   28.599643]  kunit_try_run_case+0x170/0x3f0
[   28.599768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.599928]  kthread+0x318/0x620
[   28.600050]  ret_from_fork+0x10/0x20
[   28.600185] 
[   28.616651] Allocated by task 254:
[   28.618513]  kasan_save_stack+0x3c/0x68
[   28.618971]  kasan_save_track+0x20/0x40
[   28.619354]  kasan_save_alloc_info+0x40/0x58
[   28.619759]  __kasan_kmalloc+0xd4/0xd8
[   28.621696]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.623414]  kasan_atomics+0xb8/0x2e8
[   28.625018]  kunit_try_run_case+0x170/0x3f0
[   28.626237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.627532]  kthread+0x318/0x620
[   28.629154]  ret_from_fork+0x10/0x20
[   28.631698] 
[   28.631959] The buggy address belongs to the object at fff00000c65edb80
[   28.631959]  which belongs to the cache kmalloc-64 of size 64
[   28.632803] The buggy address is located 0 bytes to the right of
[   28.632803]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.633755] 
[   28.636940] The buggy address belongs to the physical page:
[   28.637653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.639734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.640487] page_type: f5(slab)
[   28.643867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.645432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.647228] page dumped because: kasan: bad access detected
[   28.649082] 
[   28.649383] Memory state around the buggy address:
[   28.649815]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.650746]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.654640] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.656079]                                      ^
[   28.656670]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.661047]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.661943] ==================================================================
[   28.123811] ==================================================================
[   28.125608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.126640] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.127375] 
[   28.127731] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.128145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.128235] Hardware name: linux,dummy-virt (DT)
[   28.128372] Call trace:
[   28.128448]  show_stack+0x20/0x38 (C)
[   28.128608]  dump_stack_lvl+0x8c/0xd0
[   28.128791]  print_report+0x118/0x608
[   28.128864]  kasan_report+0xdc/0x128
[   28.128980]  kasan_check_range+0x100/0x1a8
[   28.129044]  __kasan_check_write+0x20/0x30
[   28.129138]  kasan_atomics_helper+0x32c/0x4858
[   28.129208]  kasan_atomics+0x198/0x2e8
[   28.129265]  kunit_try_run_case+0x170/0x3f0
[   28.129326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.129389]  kthread+0x318/0x620
[   28.129471]  ret_from_fork+0x10/0x20
[   28.129599] 
[   28.134973] Allocated by task 254:
[   28.135574]  kasan_save_stack+0x3c/0x68
[   28.136191]  kasan_save_track+0x20/0x40
[   28.136813]  kasan_save_alloc_info+0x40/0x58
[   28.137442]  __kasan_kmalloc+0xd4/0xd8
[   28.138936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.140310]  kasan_atomics+0xb8/0x2e8
[   28.141231]  kunit_try_run_case+0x170/0x3f0
[   28.141961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.142744]  kthread+0x318/0x620
[   28.143395]  ret_from_fork+0x10/0x20
[   28.144080] 
[   28.144414] The buggy address belongs to the object at fff00000c65edb80
[   28.144414]  which belongs to the cache kmalloc-64 of size 64
[   28.145653] The buggy address is located 0 bytes to the right of
[   28.145653]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.146493] 
[   28.146732] The buggy address belongs to the physical page:
[   28.147169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.147742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.149166] page_type: f5(slab)
[   28.150269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.151173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.152080] page dumped because: kasan: bad access detected
[   28.152848] 
[   28.153315] Memory state around the buggy address:
[   28.153754]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.154581]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.155495] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.156457]                                      ^
[   28.156911]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.157869]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.158562] ==================================================================
[   29.747386] ==================================================================
[   29.748083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.748660] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.749227] 
[   29.749490] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.749675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.749741] Hardware name: linux,dummy-virt (DT)
[   29.749818] Call trace:
[   29.749873]  show_stack+0x20/0x38 (C)
[   29.750042]  dump_stack_lvl+0x8c/0xd0
[   29.751322]  print_report+0x118/0x608
[   29.751454]  kasan_report+0xdc/0x128
[   29.751574]  kasan_check_range+0x100/0x1a8
[   29.751686]  __kasan_check_write+0x20/0x30
[   29.751799]  kasan_atomics_helper+0xe44/0x4858
[   29.751946]  kasan_atomics+0x198/0x2e8
[   29.752066]  kunit_try_run_case+0x170/0x3f0
[   29.752183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.752309]  kthread+0x318/0x620
[   29.752432]  ret_from_fork+0x10/0x20
[   29.752560] 
[   29.765804] Allocated by task 254:
[   29.766738]  kasan_save_stack+0x3c/0x68
[   29.767916]  kasan_save_track+0x20/0x40
[   29.769006]  kasan_save_alloc_info+0x40/0x58
[   29.770119]  __kasan_kmalloc+0xd4/0xd8
[   29.771137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.772183]  kasan_atomics+0xb8/0x2e8
[   29.772573]  kunit_try_run_case+0x170/0x3f0
[   29.773559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.774878]  kthread+0x318/0x620
[   29.775876]  ret_from_fork+0x10/0x20
[   29.776515] 
[   29.776754] The buggy address belongs to the object at fff00000c65edb80
[   29.776754]  which belongs to the cache kmalloc-64 of size 64
[   29.781491] The buggy address is located 0 bytes to the right of
[   29.781491]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.784127] 
[   29.784740] The buggy address belongs to the physical page:
[   29.785791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.786926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.787438] page_type: f5(slab)
[   29.787753] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.789481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.790290] page dumped because: kasan: bad access detected
[   29.791021] 
[   29.791373] Memory state around the buggy address:
[   29.792002]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.792798]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.793360] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.793858]                                      ^
[   29.794299]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.794816]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.795485] ==================================================================
[   30.524867] ==================================================================
[   30.525569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.526314] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.527109] 
[   30.527365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.527554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.527624] Hardware name: linux,dummy-virt (DT)
[   30.527703] Call trace:
[   30.527762]  show_stack+0x20/0x38 (C)
[   30.527907]  dump_stack_lvl+0x8c/0xd0
[   30.528026]  print_report+0x118/0x608
[   30.528170]  kasan_report+0xdc/0x128
[   30.528313]  __asan_report_load8_noabort+0x20/0x30
[   30.528454]  kasan_atomics_helper+0x3db0/0x4858
[   30.528601]  kasan_atomics+0x198/0x2e8
[   30.528718]  kunit_try_run_case+0x170/0x3f0
[   30.528834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.528977]  kthread+0x318/0x620
[   30.529078]  ret_from_fork+0x10/0x20
[   30.529187] 
[   30.538438] Allocated by task 254:
[   30.538754]  kasan_save_stack+0x3c/0x68
[   30.540371]  kasan_save_track+0x20/0x40
[   30.540944]  kasan_save_alloc_info+0x40/0x58
[   30.541592]  __kasan_kmalloc+0xd4/0xd8
[   30.542618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.543540]  kasan_atomics+0xb8/0x2e8
[   30.544222]  kunit_try_run_case+0x170/0x3f0
[   30.544689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.545321]  kthread+0x318/0x620
[   30.545742]  ret_from_fork+0x10/0x20
[   30.546300] 
[   30.546593] The buggy address belongs to the object at fff00000c65edb80
[   30.546593]  which belongs to the cache kmalloc-64 of size 64
[   30.547695] The buggy address is located 0 bytes to the right of
[   30.547695]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.548899] 
[   30.549222] The buggy address belongs to the physical page:
[   30.549842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.550633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.551306] page_type: f5(slab)
[   30.551831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.552668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.553366] page dumped because: kasan: bad access detected
[   30.554023] 
[   30.554345] Memory state around the buggy address:
[   30.554878]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.555661]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.556364] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.557181]                                      ^
[   30.557738]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.558491]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.559186] ==================================================================
[   29.465966] ==================================================================
[   29.466510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.467327] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.468551] 
[   29.469060] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.469263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.469330] Hardware name: linux,dummy-virt (DT)
[   29.469414] Call trace:
[   29.469476]  show_stack+0x20/0x38 (C)
[   29.469600]  dump_stack_lvl+0x8c/0xd0
[   29.469724]  print_report+0x118/0x608
[   29.469846]  kasan_report+0xdc/0x128
[   29.470002]  kasan_check_range+0x100/0x1a8
[   29.470144]  __kasan_check_write+0x20/0x30
[   29.470294]  kasan_atomics_helper+0xca0/0x4858
[   29.470432]  kasan_atomics+0x198/0x2e8
[   29.470571]  kunit_try_run_case+0x170/0x3f0
[   29.470706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470858]  kthread+0x318/0x620
[   29.471008]  ret_from_fork+0x10/0x20
[   29.471152] 
[   29.481593] Allocated by task 254:
[   29.482336]  kasan_save_stack+0x3c/0x68
[   29.483081]  kasan_save_track+0x20/0x40
[   29.483774]  kasan_save_alloc_info+0x40/0x58
[   29.484623]  __kasan_kmalloc+0xd4/0xd8
[   29.485407]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.486258]  kasan_atomics+0xb8/0x2e8
[   29.486949]  kunit_try_run_case+0x170/0x3f0
[   29.487775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.488822]  kthread+0x318/0x620
[   29.489475]  ret_from_fork+0x10/0x20
[   29.490186] 
[   29.490613] The buggy address belongs to the object at fff00000c65edb80
[   29.490613]  which belongs to the cache kmalloc-64 of size 64
[   29.492479] The buggy address is located 0 bytes to the right of
[   29.492479]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.494502] 
[   29.494923] The buggy address belongs to the physical page:
[   29.495789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.497029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.498209] page_type: f5(slab)
[   29.498917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.499603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.500731] page dumped because: kasan: bad access detected
[   29.501628] 
[   29.502036] Memory state around the buggy address:
[   29.502830]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.504119]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.505305] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.505833]                                      ^
[   29.506668]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.508258]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.509565] ==================================================================
[   30.180156] ==================================================================
[   30.181116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   30.182010] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.182828] 
[   30.183190] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.183412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.183538] Hardware name: linux,dummy-virt (DT)
[   30.183632] Call trace:
[   30.183706]  show_stack+0x20/0x38 (C)
[   30.183899]  dump_stack_lvl+0x8c/0xd0
[   30.184053]  print_report+0x118/0x608
[   30.184228]  kasan_report+0xdc/0x128
[   30.184374]  kasan_check_range+0x100/0x1a8
[   30.184491]  __kasan_check_write+0x20/0x30
[   30.184551]  kasan_atomics_helper+0x11f8/0x4858
[   30.184615]  kasan_atomics+0x198/0x2e8
[   30.184672]  kunit_try_run_case+0x170/0x3f0
[   30.184732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.184800]  kthread+0x318/0x620
[   30.184855]  ret_from_fork+0x10/0x20
[   30.184949] 
[   30.191728] Allocated by task 254:
[   30.192236]  kasan_save_stack+0x3c/0x68
[   30.192928]  kasan_save_track+0x20/0x40
[   30.193376]  kasan_save_alloc_info+0x40/0x58
[   30.194012]  __kasan_kmalloc+0xd4/0xd8
[   30.194613]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.195255]  kasan_atomics+0xb8/0x2e8
[   30.195829]  kunit_try_run_case+0x170/0x3f0
[   30.196436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.197083]  kthread+0x318/0x620
[   30.197494]  ret_from_fork+0x10/0x20
[   30.198102] 
[   30.198481] The buggy address belongs to the object at fff00000c65edb80
[   30.198481]  which belongs to the cache kmalloc-64 of size 64
[   30.199795] The buggy address is located 0 bytes to the right of
[   30.199795]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.201080] 
[   30.201424] The buggy address belongs to the physical page:
[   30.202024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.202720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.203573] page_type: f5(slab)
[   30.204111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.205047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.205922] page dumped because: kasan: bad access detected
[   30.206616] 
[   30.206978] Memory state around the buggy address:
[   30.207678]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.208460]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.209224] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.209985]                                      ^
[   30.210554]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.211415]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.212188] ==================================================================
[   28.500238] ==================================================================
[   28.501006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   28.501865] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.502661] 
[   28.503040] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.503271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.503359] Hardware name: linux,dummy-virt (DT)
[   28.503452] Call trace:
[   28.503539]  show_stack+0x20/0x38 (C)
[   28.503681]  dump_stack_lvl+0x8c/0xd0
[   28.503838]  print_report+0x118/0x608
[   28.503997]  kasan_report+0xdc/0x128
[   28.504145]  kasan_check_range+0x100/0x1a8
[   28.504226]  __kasan_check_write+0x20/0x30
[   28.504298]  kasan_atomics_helper+0x684/0x4858
[   28.504362]  kasan_atomics+0x198/0x2e8
[   28.504420]  kunit_try_run_case+0x170/0x3f0
[   28.504478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.504543]  kthread+0x318/0x620
[   28.504600]  ret_from_fork+0x10/0x20
[   28.504660] 
[   28.516676] Allocated by task 254:
[   28.517251]  kasan_save_stack+0x3c/0x68
[   28.517875]  kasan_save_track+0x20/0x40
[   28.518319]  kasan_save_alloc_info+0x40/0x58
[   28.518729]  __kasan_kmalloc+0xd4/0xd8
[   28.519099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.519903]  kasan_atomics+0xb8/0x2e8
[   28.520267]  kunit_try_run_case+0x170/0x3f0
[   28.520652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.521101]  kthread+0x318/0x620
[   28.522142]  ret_from_fork+0x10/0x20
[   28.522560] 
[   28.522823] The buggy address belongs to the object at fff00000c65edb80
[   28.522823]  which belongs to the cache kmalloc-64 of size 64
[   28.526133] The buggy address is located 0 bytes to the right of
[   28.526133]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.528947] 
[   28.529284] The buggy address belongs to the physical page:
[   28.529976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.530960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.531650] page_type: f5(slab)
[   28.532111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.532932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.533687] page dumped because: kasan: bad access detected
[   28.534313] 
[   28.534612] Memory state around the buggy address:
[   28.535198]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.537129]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.537636] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.538135]                                      ^
[   28.538562]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.539193]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.539669] ==================================================================
[   28.744086] ==================================================================
[   28.744710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   28.745375] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.746346] 
[   28.747243] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.748993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.749072] Hardware name: linux,dummy-virt (DT)
[   28.749153] Call trace:
[   28.749211]  show_stack+0x20/0x38 (C)
[   28.749332]  dump_stack_lvl+0x8c/0xd0
[   28.749445]  print_report+0x118/0x608
[   28.749564]  kasan_report+0xdc/0x128
[   28.749672]  kasan_check_range+0x100/0x1a8
[   28.750253]  __kasan_check_write+0x20/0x30
[   28.750370]  kasan_atomics_helper+0x894/0x4858
[   28.750485]  kasan_atomics+0x198/0x2e8
[   28.750597]  kunit_try_run_case+0x170/0x3f0
[   28.750704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.750821]  kthread+0x318/0x620
[   28.750975]  ret_from_fork+0x10/0x20
[   28.751111] 
[   28.763272] Allocated by task 254:
[   28.763621]  kasan_save_stack+0x3c/0x68
[   28.765932]  kasan_save_track+0x20/0x40
[   28.766626]  kasan_save_alloc_info+0x40/0x58
[   28.767845]  __kasan_kmalloc+0xd4/0xd8
[   28.768740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.769959]  kasan_atomics+0xb8/0x2e8
[   28.770951]  kunit_try_run_case+0x170/0x3f0
[   28.773085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.773630]  kthread+0x318/0x620
[   28.774037]  ret_from_fork+0x10/0x20
[   28.774443] 
[   28.774694] The buggy address belongs to the object at fff00000c65edb80
[   28.774694]  which belongs to the cache kmalloc-64 of size 64
[   28.779538] The buggy address is located 0 bytes to the right of
[   28.779538]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.782632] 
[   28.783130] The buggy address belongs to the physical page:
[   28.787405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.788495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.789779] page_type: f5(slab)
[   28.790762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.792973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.794209] page dumped because: kasan: bad access detected
[   28.795359] 
[   28.795667] Memory state around the buggy address:
[   28.797910]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.798747]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.799399] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.803684]                                      ^
[   28.804726]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.807326]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.807862] ==================================================================
[   28.018669] ==================================================================
[   28.020557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   28.022488] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.023719] 
[   28.024141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.024333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.024404] Hardware name: linux,dummy-virt (DT)
[   28.024483] Call trace:
[   28.024539]  show_stack+0x20/0x38 (C)
[   28.024662]  dump_stack_lvl+0x8c/0xd0
[   28.024778]  print_report+0x118/0x608
[   28.024916]  kasan_report+0xdc/0x128
[   28.025062]  kasan_check_range+0x100/0x1a8
[   28.025243]  __kasan_check_read+0x20/0x30
[   28.025392]  kasan_atomics_helper+0x2b0/0x4858
[   28.025578]  kasan_atomics+0x198/0x2e8
[   28.025722]  kunit_try_run_case+0x170/0x3f0
[   28.025920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.026082]  kthread+0x318/0x620
[   28.026216]  ret_from_fork+0x10/0x20
[   28.026343] 
[   28.035664] Allocated by task 254:
[   28.036382]  kasan_save_stack+0x3c/0x68
[   28.037265]  kasan_save_track+0x20/0x40
[   28.038185]  kasan_save_alloc_info+0x40/0x58
[   28.038968]  __kasan_kmalloc+0xd4/0xd8
[   28.039661]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.040512]  kasan_atomics+0xb8/0x2e8
[   28.041321]  kunit_try_run_case+0x170/0x3f0
[   28.042094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.043054]  kthread+0x318/0x620
[   28.043971]  ret_from_fork+0x10/0x20
[   28.044510] 
[   28.044748] The buggy address belongs to the object at fff00000c65edb80
[   28.044748]  which belongs to the cache kmalloc-64 of size 64
[   28.045565] The buggy address is located 0 bytes to the right of
[   28.045565]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.047517] 
[   28.047938] The buggy address belongs to the physical page:
[   28.048823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.050203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.051299] page_type: f5(slab)
[   28.051950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.053364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.054563] page dumped because: kasan: bad access detected
[   28.055578] 
[   28.056037] Memory state around the buggy address:
[   28.056905]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.057876]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.059181] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.060115]                                      ^
[   28.060530]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.061431]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.062684] ==================================================================
[   29.439988] ==================================================================
[   29.441180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.442390] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.443680] 
[   29.444157] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.444378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.444459] Hardware name: linux,dummy-virt (DT)
[   29.444547] Call trace:
[   29.444605]  show_stack+0x20/0x38 (C)
[   29.444737]  dump_stack_lvl+0x8c/0xd0
[   29.444860]  print_report+0x118/0x608
[   29.445015]  kasan_report+0xdc/0x128
[   29.445143]  __asan_report_load4_noabort+0x20/0x30
[   29.445278]  kasan_atomics_helper+0x3de4/0x4858
[   29.445410]  kasan_atomics+0x198/0x2e8
[   29.445535]  kunit_try_run_case+0x170/0x3f0
[   29.445667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.445800]  kthread+0x318/0x620
[   29.445952]  ret_from_fork+0x10/0x20
[   29.446097] 
[   29.451405] Allocated by task 254:
[   29.451752]  kasan_save_stack+0x3c/0x68
[   29.452149]  kasan_save_track+0x20/0x40
[   29.452519]  kasan_save_alloc_info+0x40/0x58
[   29.452925]  __kasan_kmalloc+0xd4/0xd8
[   29.453286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.453687]  kasan_atomics+0xb8/0x2e8
[   29.454064]  kunit_try_run_case+0x170/0x3f0
[   29.454457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.454928]  kthread+0x318/0x620
[   29.455266]  ret_from_fork+0x10/0x20
[   29.455619] 
[   29.455840] The buggy address belongs to the object at fff00000c65edb80
[   29.455840]  which belongs to the cache kmalloc-64 of size 64
[   29.456622] The buggy address is located 0 bytes to the right of
[   29.456622]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.457440] 
[   29.457667] The buggy address belongs to the physical page:
[   29.458103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.458690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.459220] page_type: f5(slab)
[   29.459581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.460156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.460688] page dumped because: kasan: bad access detected
[   29.461132] 
[   29.461354] Memory state around the buggy address:
[   29.461744]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462282]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462797] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.463320]                                      ^
[   29.463716]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.464251]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.464759] ==================================================================
[   29.926214] ==================================================================
[   29.927968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.928575] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.929205] 
[   29.929452] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.929650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.929720] Hardware name: linux,dummy-virt (DT)
[   29.929804] Call trace:
[   29.929869]  show_stack+0x20/0x38 (C)
[   29.930025]  dump_stack_lvl+0x8c/0xd0
[   29.930184]  print_report+0x118/0x608
[   29.930326]  kasan_report+0xdc/0x128
[   29.930464]  kasan_check_range+0x100/0x1a8
[   29.930588]  __kasan_check_write+0x20/0x30
[   29.930736]  kasan_atomics_helper+0xf88/0x4858
[   29.930905]  kasan_atomics+0x198/0x2e8
[   29.931045]  kunit_try_run_case+0x170/0x3f0
[   29.931186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.931337]  kthread+0x318/0x620
[   29.931480]  ret_from_fork+0x10/0x20
[   29.931623] 
[   29.936917] Allocated by task 254:
[   29.937441]  kasan_save_stack+0x3c/0x68
[   29.937985]  kasan_save_track+0x20/0x40
[   29.938480]  kasan_save_alloc_info+0x40/0x58
[   29.939028]  __kasan_kmalloc+0xd4/0xd8
[   29.939600]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.940243]  kasan_atomics+0xb8/0x2e8
[   29.940651]  kunit_try_run_case+0x170/0x3f0
[   29.941098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.941681]  kthread+0x318/0x620
[   29.942472]  ret_from_fork+0x10/0x20
[   29.943605] 
[   29.943986] The buggy address belongs to the object at fff00000c65edb80
[   29.943986]  which belongs to the cache kmalloc-64 of size 64
[   29.945378] The buggy address is located 0 bytes to the right of
[   29.945378]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.946234] 
[   29.946467] The buggy address belongs to the physical page:
[   29.946926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.949089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.949600] page_type: f5(slab)
[   29.949939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.950787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.951584] page dumped because: kasan: bad access detected
[   29.952221] 
[   29.952545] Memory state around the buggy address:
[   29.953495]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.956152]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.957137] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.958195]                                      ^
[   29.959205]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.960548]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.961923] ==================================================================
[   29.621533] ==================================================================
[   29.625681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.626288] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.626857] 
[   29.630053] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.630283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.630352] Hardware name: linux,dummy-virt (DT)
[   29.630422] Call trace:
[   29.630475]  show_stack+0x20/0x38 (C)
[   29.630590]  dump_stack_lvl+0x8c/0xd0
[   29.630711]  print_report+0x118/0x608
[   29.630836]  kasan_report+0xdc/0x128
[   29.630999]  __asan_report_load4_noabort+0x20/0x30
[   29.631145]  kasan_atomics_helper+0x3e04/0x4858
[   29.631288]  kasan_atomics+0x198/0x2e8
[   29.631409]  kunit_try_run_case+0x170/0x3f0
[   29.631520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.631647]  kthread+0x318/0x620
[   29.631759]  ret_from_fork+0x10/0x20
[   29.631875] 
[   29.638605] Allocated by task 254:
[   29.640333]  kasan_save_stack+0x3c/0x68
[   29.641067]  kasan_save_track+0x20/0x40
[   29.641797]  kasan_save_alloc_info+0x40/0x58
[   29.642506]  __kasan_kmalloc+0xd4/0xd8
[   29.643287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.644583]  kasan_atomics+0xb8/0x2e8
[   29.645315]  kunit_try_run_case+0x170/0x3f0
[   29.645869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.647225]  kthread+0x318/0x620
[   29.647585]  ret_from_fork+0x10/0x20
[   29.647988] 
[   29.648219] The buggy address belongs to the object at fff00000c65edb80
[   29.648219]  which belongs to the cache kmalloc-64 of size 64
[   29.649686] The buggy address is located 0 bytes to the right of
[   29.649686]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.651654] 
[   29.652017] The buggy address belongs to the physical page:
[   29.652987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.654280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.654797] page_type: f5(slab)
[   29.655297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.656458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.656981] page dumped because: kasan: bad access detected
[   29.657474] 
[   29.658002] Memory state around the buggy address:
[   29.658528]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.659824]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.660768] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.661346]                                      ^
[   29.661813]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.662381]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.663119] ==================================================================
[   30.560634] ==================================================================
[   30.561337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.562683] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.563703] 
[   30.564498] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.564732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.564790] Hardware name: linux,dummy-virt (DT)
[   30.564832] Call trace:
[   30.564864]  show_stack+0x20/0x38 (C)
[   30.564966]  dump_stack_lvl+0x8c/0xd0
[   30.565031]  print_report+0x118/0x608
[   30.565094]  kasan_report+0xdc/0x128
[   30.565154]  kasan_check_range+0x100/0x1a8
[   30.565237]  __kasan_check_write+0x20/0x30
[   30.565318]  kasan_atomics_helper+0x1644/0x4858
[   30.565406]  kasan_atomics+0x198/0x2e8
[   30.565488]  kunit_try_run_case+0x170/0x3f0
[   30.565573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.565690]  kthread+0x318/0x620
[   30.565750]  ret_from_fork+0x10/0x20
[   30.565812] 
[   30.572147] Allocated by task 254:
[   30.572684]  kasan_save_stack+0x3c/0x68
[   30.573190]  kasan_save_track+0x20/0x40
[   30.573769]  kasan_save_alloc_info+0x40/0x58
[   30.574276]  __kasan_kmalloc+0xd4/0xd8
[   30.574841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.575462]  kasan_atomics+0xb8/0x2e8
[   30.576020]  kunit_try_run_case+0x170/0x3f0
[   30.576606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.577239]  kthread+0x318/0x620
[   30.577725]  ret_from_fork+0x10/0x20
[   30.578273] 
[   30.578598] The buggy address belongs to the object at fff00000c65edb80
[   30.578598]  which belongs to the cache kmalloc-64 of size 64
[   30.579689] The buggy address is located 0 bytes to the right of
[   30.579689]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.580972] 
[   30.581274] The buggy address belongs to the physical page:
[   30.581956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.582770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.583437] page_type: f5(slab)
[   30.583948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.584805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.585571] page dumped because: kasan: bad access detected
[   30.586181] 
[   30.586463] Memory state around the buggy address:
[   30.587012]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.587693]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.588329] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.589138]                                      ^
[   30.589734]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.590521]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.591359] ==================================================================
[   28.194851] ==================================================================
[   28.195854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   28.196664] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.197363] 
[   28.197669] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.198041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.198130] Hardware name: linux,dummy-virt (DT)
[   28.198239] Call trace:
[   28.198314]  show_stack+0x20/0x38 (C)
[   28.198505]  dump_stack_lvl+0x8c/0xd0
[   28.198648]  print_report+0x118/0x608
[   28.198786]  kasan_report+0xdc/0x128
[   28.198975]  kasan_check_range+0x100/0x1a8
[   28.199142]  __kasan_check_write+0x20/0x30
[   28.199334]  kasan_atomics_helper+0x3ac/0x4858
[   28.199482]  kasan_atomics+0x198/0x2e8
[   28.199551]  kunit_try_run_case+0x170/0x3f0
[   28.199613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.199680]  kthread+0x318/0x620
[   28.199823]  ret_from_fork+0x10/0x20
[   28.199979] 
[   28.211474] Allocated by task 254:
[   28.212056]  kasan_save_stack+0x3c/0x68
[   28.212455]  kasan_save_track+0x20/0x40
[   28.212818]  kasan_save_alloc_info+0x40/0x58
[   28.213236]  __kasan_kmalloc+0xd4/0xd8
[   28.213615]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.215014]  kasan_atomics+0xb8/0x2e8
[   28.216221]  kunit_try_run_case+0x170/0x3f0
[   28.217352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.218092]  kthread+0x318/0x620
[   28.218682]  ret_from_fork+0x10/0x20
[   28.219238] 
[   28.219638] The buggy address belongs to the object at fff00000c65edb80
[   28.219638]  which belongs to the cache kmalloc-64 of size 64
[   28.221159] The buggy address is located 0 bytes to the right of
[   28.221159]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.222584] 
[   28.223037] The buggy address belongs to the physical page:
[   28.223637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.225917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.226787] page_type: f5(slab)
[   28.227923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.228777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.229582] page dumped because: kasan: bad access detected
[   28.230286] 
[   28.230620] Memory state around the buggy address:
[   28.231432]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.231760]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.232380] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.233046]                                      ^
[   28.233645]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.234404]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.235154] ==================================================================
[   29.892818] ==================================================================
[   29.893860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.895100] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.895875] 
[   29.896295] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.896513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.896643] Hardware name: linux,dummy-virt (DT)
[   29.896769] Call trace:
[   29.896868]  show_stack+0x20/0x38 (C)
[   29.897036]  dump_stack_lvl+0x8c/0xd0
[   29.897178]  print_report+0x118/0x608
[   29.897322]  kasan_report+0xdc/0x128
[   29.897447]  kasan_check_range+0x100/0x1a8
[   29.897513]  __kasan_check_write+0x20/0x30
[   29.897573]  kasan_atomics_helper+0xf20/0x4858
[   29.897632]  kasan_atomics+0x198/0x2e8
[   29.897690]  kunit_try_run_case+0x170/0x3f0
[   29.897749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.897811]  kthread+0x318/0x620
[   29.897868]  ret_from_fork+0x10/0x20
[   29.897961] 
[   29.905089] Allocated by task 254:
[   29.905584]  kasan_save_stack+0x3c/0x68
[   29.906370]  kasan_save_track+0x20/0x40
[   29.907027]  kasan_save_alloc_info+0x40/0x58
[   29.907597]  __kasan_kmalloc+0xd4/0xd8
[   29.908187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.908809]  kasan_atomics+0xb8/0x2e8
[   29.909381]  kunit_try_run_case+0x170/0x3f0
[   29.909989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.910623]  kthread+0x318/0x620
[   29.911248]  ret_from_fork+0x10/0x20
[   29.911794] 
[   29.912146] The buggy address belongs to the object at fff00000c65edb80
[   29.912146]  which belongs to the cache kmalloc-64 of size 64
[   29.913221] The buggy address is located 0 bytes to the right of
[   29.913221]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.914412] 
[   29.914771] The buggy address belongs to the physical page:
[   29.915371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.916241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.916931] page_type: f5(slab)
[   29.917403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.918107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.918649] page dumped because: kasan: bad access detected
[   29.919100] 
[   29.919318] Memory state around the buggy address:
[   29.919697]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.920303]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.920952] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.921641]                                      ^
[   29.922238]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.923025]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.923787] ==================================================================
[   30.384599] ==================================================================
[   30.387342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.389497] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.390083] 
[   30.390350] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.390547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.390618] Hardware name: linux,dummy-virt (DT)
[   30.390697] Call trace:
[   30.390751]  show_stack+0x20/0x38 (C)
[   30.390871]  dump_stack_lvl+0x8c/0xd0
[   30.392080]  print_report+0x118/0x608
[   30.392155]  kasan_report+0xdc/0x128
[   30.392216]  kasan_check_range+0x100/0x1a8
[   30.392272]  __kasan_check_write+0x20/0x30
[   30.392328]  kasan_atomics_helper+0x147c/0x4858
[   30.392387]  kasan_atomics+0x198/0x2e8
[   30.392444]  kunit_try_run_case+0x170/0x3f0
[   30.392503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.392568]  kthread+0x318/0x620
[   30.392623]  ret_from_fork+0x10/0x20
[   30.392681] 
[   30.400470] Allocated by task 254:
[   30.401120]  kasan_save_stack+0x3c/0x68
[   30.401813]  kasan_save_track+0x20/0x40
[   30.402433]  kasan_save_alloc_info+0x40/0x58
[   30.403118]  __kasan_kmalloc+0xd4/0xd8
[   30.403738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.404477]  kasan_atomics+0xb8/0x2e8
[   30.405043]  kunit_try_run_case+0x170/0x3f0
[   30.405743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.406548]  kthread+0x318/0x620
[   30.407141]  ret_from_fork+0x10/0x20
[   30.407653] 
[   30.408023] The buggy address belongs to the object at fff00000c65edb80
[   30.408023]  which belongs to the cache kmalloc-64 of size 64
[   30.409185] The buggy address is located 0 bytes to the right of
[   30.409185]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.410450] 
[   30.410756] The buggy address belongs to the physical page:
[   30.411430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.412163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.412865] page_type: f5(slab)
[   30.413442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.414255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.415152] page dumped because: kasan: bad access detected
[   30.415866] 
[   30.416233] Memory state around the buggy address:
[   30.416778]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.417624]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.418378] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.419213]                                      ^
[   30.419789]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.420538]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.421392] ==================================================================
[   28.463279] ==================================================================
[   28.464441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   28.466863] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.467651] 
[   28.467913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.468095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.468165] Hardware name: linux,dummy-virt (DT)
[   28.468236] Call trace:
[   28.468291]  show_stack+0x20/0x38 (C)
[   28.468400]  dump_stack_lvl+0x8c/0xd0
[   28.468517]  print_report+0x118/0x608
[   28.468623]  kasan_report+0xdc/0x128
[   28.468722]  kasan_check_range+0x100/0x1a8
[   28.468815]  __kasan_check_write+0x20/0x30
[   28.468955]  kasan_atomics_helper+0x61c/0x4858
[   28.469067]  kasan_atomics+0x198/0x2e8
[   28.469172]  kunit_try_run_case+0x170/0x3f0
[   28.469280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.469400]  kthread+0x318/0x620
[   28.469499]  ret_from_fork+0x10/0x20
[   28.469609] 
[   28.476765] Allocated by task 254:
[   28.477243]  kasan_save_stack+0x3c/0x68
[   28.477793]  kasan_save_track+0x20/0x40
[   28.478323]  kasan_save_alloc_info+0x40/0x58
[   28.478800]  __kasan_kmalloc+0xd4/0xd8
[   28.479317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.479836]  kasan_atomics+0xb8/0x2e8
[   28.480384]  kunit_try_run_case+0x170/0x3f0
[   28.481015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.482353]  kthread+0x318/0x620
[   28.482856]  ret_from_fork+0x10/0x20
[   28.483402] 
[   28.483745] The buggy address belongs to the object at fff00000c65edb80
[   28.483745]  which belongs to the cache kmalloc-64 of size 64
[   28.485056] The buggy address is located 0 bytes to the right of
[   28.485056]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.487957] 
[   28.488719] The buggy address belongs to the physical page:
[   28.489277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.489691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.490147] page_type: f5(slab)
[   28.490708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.491513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.492314] page dumped because: kasan: bad access detected
[   28.492928] 
[   28.493237] Memory state around the buggy address:
[   28.493851]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.494651]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.495390] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.496117]                                      ^
[   28.496691]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.497475]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.498191] ==================================================================
[   29.138473] ==================================================================
[   29.141025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.143811] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.145829] 
[   29.146802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.147029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.147112] Hardware name: linux,dummy-virt (DT)
[   29.147198] Call trace:
[   29.147264]  show_stack+0x20/0x38 (C)
[   29.147400]  dump_stack_lvl+0x8c/0xd0
[   29.147525]  print_report+0x118/0x608
[   29.147658]  kasan_report+0xdc/0x128
[   29.147781]  kasan_check_range+0x100/0x1a8
[   29.147950]  __kasan_check_write+0x20/0x30
[   29.148097]  kasan_atomics_helper+0xad4/0x4858
[   29.148249]  kasan_atomics+0x198/0x2e8
[   29.148393]  kunit_try_run_case+0x170/0x3f0
[   29.148514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.148641]  kthread+0x318/0x620
[   29.148745]  ret_from_fork+0x10/0x20
[   29.148875] 
[   29.163375] Allocated by task 254:
[   29.163872]  kasan_save_stack+0x3c/0x68
[   29.164686]  kasan_save_track+0x20/0x40
[   29.167034]  kasan_save_alloc_info+0x40/0x58
[   29.167438]  __kasan_kmalloc+0xd4/0xd8
[   29.167810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.168302]  kasan_atomics+0xb8/0x2e8
[   29.168695]  kunit_try_run_case+0x170/0x3f0
[   29.170497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.171563]  kthread+0x318/0x620
[   29.172367]  ret_from_fork+0x10/0x20
[   29.173182] 
[   29.173636] The buggy address belongs to the object at fff00000c65edb80
[   29.173636]  which belongs to the cache kmalloc-64 of size 64
[   29.175737] The buggy address is located 0 bytes to the right of
[   29.175737]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.177484] 
[   29.177762] The buggy address belongs to the physical page:
[   29.178286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.179016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.180188] page_type: f5(slab)
[   29.180949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.182403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.183726] page dumped because: kasan: bad access detected
[   29.184803] 
[   29.185263] Memory state around the buggy address:
[   29.186220]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.187510]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.188872] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.190121]                                      ^
[   29.191136]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.192401]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.193032] ==================================================================
[   27.735498] ==================================================================
[   27.744243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   27.752071] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   27.752860] 
[   27.756730] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   27.758996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.759073] Hardware name: linux,dummy-virt (DT)
[   27.759155] Call trace:
[   27.759218]  show_stack+0x20/0x38 (C)
[   27.759352]  dump_stack_lvl+0x8c/0xd0
[   27.759478]  print_report+0x118/0x608
[   27.759597]  kasan_report+0xdc/0x128
[   27.759714]  __asan_report_load4_noabort+0x20/0x30
[   27.759834]  kasan_atomics_helper+0x40a8/0x4858
[   27.759979]  kasan_atomics+0x198/0x2e8
[   27.760098]  kunit_try_run_case+0x170/0x3f0
[   27.760218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.760348]  kthread+0x318/0x620
[   27.760461]  ret_from_fork+0x10/0x20
[   27.760583] 
[   27.781187] Allocated by task 254:
[   27.784390]  kasan_save_stack+0x3c/0x68
[   27.784839]  kasan_save_track+0x20/0x40
[   27.788482]  kasan_save_alloc_info+0x40/0x58
[   27.789202]  __kasan_kmalloc+0xd4/0xd8
[   27.789632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.793268]  kasan_atomics+0xb8/0x2e8
[   27.794815]  kunit_try_run_case+0x170/0x3f0
[   27.795386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.798360]  kthread+0x318/0x620
[   27.798983]  ret_from_fork+0x10/0x20
[   27.799374] 
[   27.799625] The buggy address belongs to the object at fff00000c65edb80
[   27.799625]  which belongs to the cache kmalloc-64 of size 64
[   27.800626] The buggy address is located 0 bytes to the right of
[   27.800626]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   27.802856] 
[   27.803626] The buggy address belongs to the physical page:
[   27.804185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   27.805095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.807592] page_type: f5(slab)
[   27.810361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.811388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.814554] page dumped because: kasan: bad access detected
[   27.815063] 
[   27.815372] Memory state around the buggy address:
[   27.815851]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.818390]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.818982] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.819515]                                      ^
[   27.819964]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.822730]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.823638] ==================================================================
[   30.007812] ==================================================================
[   30.008460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   30.009214] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.009754] 
[   30.010847] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.011074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.011142] Hardware name: linux,dummy-virt (DT)
[   30.011216] Call trace:
[   30.011268]  show_stack+0x20/0x38 (C)
[   30.011389]  dump_stack_lvl+0x8c/0xd0
[   30.011495]  print_report+0x118/0x608
[   30.011595]  kasan_report+0xdc/0x128
[   30.011696]  kasan_check_range+0x100/0x1a8
[   30.011793]  __kasan_check_write+0x20/0x30
[   30.011912]  kasan_atomics_helper+0x1058/0x4858
[   30.012023]  kasan_atomics+0x198/0x2e8
[   30.012128]  kunit_try_run_case+0x170/0x3f0
[   30.012231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.012341]  kthread+0x318/0x620
[   30.012449]  ret_from_fork+0x10/0x20
[   30.012579] 
[   30.022937] Allocated by task 254:
[   30.023442]  kasan_save_stack+0x3c/0x68
[   30.024135]  kasan_save_track+0x20/0x40
[   30.024821]  kasan_save_alloc_info+0x40/0x58
[   30.025593]  __kasan_kmalloc+0xd4/0xd8
[   30.026580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.027290]  kasan_atomics+0xb8/0x2e8
[   30.027679]  kunit_try_run_case+0x170/0x3f0
[   30.028100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.028539]  kthread+0x318/0x620
[   30.028878]  ret_from_fork+0x10/0x20
[   30.029665] 
[   30.029923] The buggy address belongs to the object at fff00000c65edb80
[   30.029923]  which belongs to the cache kmalloc-64 of size 64
[   30.030698] The buggy address is located 0 bytes to the right of
[   30.030698]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.033673] 
[   30.034175] The buggy address belongs to the physical page:
[   30.034860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.035752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.036519] page_type: f5(slab)
[   30.036856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.037469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.038037] page dumped because: kasan: bad access detected
[   30.038472] 
[   30.038696] Memory state around the buggy address:
[   30.039182]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.040015]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.040727] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.041690]                                      ^
[   30.042333]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.043169]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.043995] ==================================================================
[   30.247174] ==================================================================
[   30.248169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   30.248974] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.250865] 
[   30.251262] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.251512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.251602] Hardware name: linux,dummy-virt (DT)
[   30.251686] Call trace:
[   30.251723]  show_stack+0x20/0x38 (C)
[   30.251790]  dump_stack_lvl+0x8c/0xd0
[   30.251853]  print_report+0x118/0x608
[   30.251940]  kasan_report+0xdc/0x128
[   30.252003]  kasan_check_range+0x100/0x1a8
[   30.252062]  __kasan_check_write+0x20/0x30
[   30.252119]  kasan_atomics_helper+0x12d8/0x4858
[   30.252180]  kasan_atomics+0x198/0x2e8
[   30.252235]  kunit_try_run_case+0x170/0x3f0
[   30.252294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.252359]  kthread+0x318/0x620
[   30.252414]  ret_from_fork+0x10/0x20
[   30.252475] 
[   30.259286] Allocated by task 254:
[   30.259822]  kasan_save_stack+0x3c/0x68
[   30.260467]  kasan_save_track+0x20/0x40
[   30.261189]  kasan_save_alloc_info+0x40/0x58
[   30.261691]  __kasan_kmalloc+0xd4/0xd8
[   30.262377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.263014]  kasan_atomics+0xb8/0x2e8
[   30.263622]  kunit_try_run_case+0x170/0x3f0
[   30.264206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.264980]  kthread+0x318/0x620
[   30.265540]  ret_from_fork+0x10/0x20
[   30.266223] 
[   30.266496] The buggy address belongs to the object at fff00000c65edb80
[   30.266496]  which belongs to the cache kmalloc-64 of size 64
[   30.267702] The buggy address is located 0 bytes to the right of
[   30.267702]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.268927] 
[   30.269276] The buggy address belongs to the physical page:
[   30.269830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.270663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.271352] page_type: f5(slab)
[   30.271824] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.272776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.273543] page dumped because: kasan: bad access detected
[   30.274256] 
[   30.274614] Memory state around the buggy address:
[   30.275182]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.276015]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.276826] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.277613]                                      ^
[   30.278236]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.278983]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.279778] ==================================================================
[   30.492690] ==================================================================
[   30.493597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.494493] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.495251] 
[   30.495657] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.495928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.496015] Hardware name: linux,dummy-virt (DT)
[   30.496111] Call trace:
[   30.496219]  show_stack+0x20/0x38 (C)
[   30.496374]  dump_stack_lvl+0x8c/0xd0
[   30.496558]  print_report+0x118/0x608
[   30.496705]  kasan_report+0xdc/0x128
[   30.496818]  kasan_check_range+0x100/0x1a8
[   30.496879]  __kasan_check_write+0x20/0x30
[   30.496974]  kasan_atomics_helper+0x15b4/0x4858
[   30.497036]  kasan_atomics+0x198/0x2e8
[   30.497096]  kunit_try_run_case+0x170/0x3f0
[   30.497155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.497221]  kthread+0x318/0x620
[   30.497276]  ret_from_fork+0x10/0x20
[   30.497335] 
[   30.504132] Allocated by task 254:
[   30.504671]  kasan_save_stack+0x3c/0x68
[   30.505290]  kasan_save_track+0x20/0x40
[   30.505876]  kasan_save_alloc_info+0x40/0x58
[   30.506668]  __kasan_kmalloc+0xd4/0xd8
[   30.507252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.507899]  kasan_atomics+0xb8/0x2e8
[   30.508552]  kunit_try_run_case+0x170/0x3f0
[   30.509168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.509957]  kthread+0x318/0x620
[   30.510479]  ret_from_fork+0x10/0x20
[   30.511072] 
[   30.511419] The buggy address belongs to the object at fff00000c65edb80
[   30.511419]  which belongs to the cache kmalloc-64 of size 64
[   30.512499] The buggy address is located 0 bytes to the right of
[   30.512499]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.513868] 
[   30.514127] The buggy address belongs to the physical page:
[   30.514609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.515327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.516147] page_type: f5(slab)
[   30.516543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.517216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.517983] page dumped because: kasan: bad access detected
[   30.518611] 
[   30.518938] Memory state around the buggy address:
[   30.519459]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.520180]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.520907] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.521565]                                      ^
[   30.522087]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.522878]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.523436] ==================================================================
[   29.703822] ==================================================================
[   29.705052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.705914] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.706497] 
[   29.706775] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.707033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.707104] Hardware name: linux,dummy-virt (DT)
[   29.707179] Call trace:
[   29.707238]  show_stack+0x20/0x38 (C)
[   29.707359]  dump_stack_lvl+0x8c/0xd0
[   29.707471]  print_report+0x118/0x608
[   29.707588]  kasan_report+0xdc/0x128
[   29.707704]  __asan_report_load8_noabort+0x20/0x30
[   29.707820]  kasan_atomics_helper+0x3f58/0x4858
[   29.707989]  kasan_atomics+0x198/0x2e8
[   29.708216]  kunit_try_run_case+0x170/0x3f0
[   29.708394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.708604]  kthread+0x318/0x620
[   29.708762]  ret_from_fork+0x10/0x20
[   29.708916] 
[   29.719102] Allocated by task 254:
[   29.719479]  kasan_save_stack+0x3c/0x68
[   29.719862]  kasan_save_track+0x20/0x40
[   29.721567]  kasan_save_alloc_info+0x40/0x58
[   29.722651]  __kasan_kmalloc+0xd4/0xd8
[   29.723431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.724408]  kasan_atomics+0xb8/0x2e8
[   29.725380]  kunit_try_run_case+0x170/0x3f0
[   29.726097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.726929]  kthread+0x318/0x620
[   29.727591]  ret_from_fork+0x10/0x20
[   29.728106] 
[   29.728436] The buggy address belongs to the object at fff00000c65edb80
[   29.728436]  which belongs to the cache kmalloc-64 of size 64
[   29.729962] The buggy address is located 0 bytes to the right of
[   29.729962]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.731662] 
[   29.732026] The buggy address belongs to the physical page:
[   29.732556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.733114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.733614] page_type: f5(slab)
[   29.734154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.735223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.736151] page dumped because: kasan: bad access detected
[   29.736979] 
[   29.737394] Memory state around the buggy address:
[   29.737962]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.738604]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.739576] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.741046]                                      ^
[   29.741682]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.742266]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.744407] ==================================================================
[   30.593778] ==================================================================
[   30.595131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.595792] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.596618] 
[   30.597357] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.597580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.597669] Hardware name: linux,dummy-virt (DT)
[   30.597758] Call trace:
[   30.597831]  show_stack+0x20/0x38 (C)
[   30.597995]  dump_stack_lvl+0x8c/0xd0
[   30.598074]  print_report+0x118/0x608
[   30.598135]  kasan_report+0xdc/0x128
[   30.598211]  __asan_report_load8_noabort+0x20/0x30
[   30.598273]  kasan_atomics_helper+0x3df4/0x4858
[   30.598334]  kasan_atomics+0x198/0x2e8
[   30.598393]  kunit_try_run_case+0x170/0x3f0
[   30.598451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.598516]  kthread+0x318/0x620
[   30.598575]  ret_from_fork+0x10/0x20
[   30.598635] 
[   30.604615] Allocated by task 254:
[   30.605037]  kasan_save_stack+0x3c/0x68
[   30.605579]  kasan_save_track+0x20/0x40
[   30.606246]  kasan_save_alloc_info+0x40/0x58
[   30.606833]  __kasan_kmalloc+0xd4/0xd8
[   30.607377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.608026]  kasan_atomics+0xb8/0x2e8
[   30.608538]  kunit_try_run_case+0x170/0x3f0
[   30.609064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.609718]  kthread+0x318/0x620
[   30.610293]  ret_from_fork+0x10/0x20
[   30.610777] 
[   30.611125] The buggy address belongs to the object at fff00000c65edb80
[   30.611125]  which belongs to the cache kmalloc-64 of size 64
[   30.612307] The buggy address is located 0 bytes to the right of
[   30.612307]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.613426] 
[   30.613776] The buggy address belongs to the physical page:
[   30.614448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.615167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.615940] page_type: f5(slab)
[   30.616454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.617281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.618079] page dumped because: kasan: bad access detected
[   30.618694] 
[   30.619048] Memory state around the buggy address:
[   30.619627]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.620359]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.621052] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.621860]                                      ^
[   30.622421]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.623224]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.623919] ==================================================================
[   28.422219] ==================================================================
[   28.422974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   28.423526] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.424060] 
[   28.424297] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.424510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.424606] Hardware name: linux,dummy-virt (DT)
[   28.424704] Call trace:
[   28.424775]  show_stack+0x20/0x38 (C)
[   28.424931]  dump_stack_lvl+0x8c/0xd0
[   28.425090]  print_report+0x118/0x608
[   28.425246]  kasan_report+0xdc/0x128
[   28.425390]  kasan_check_range+0x100/0x1a8
[   28.425566]  __kasan_check_write+0x20/0x30
[   28.425709]  kasan_atomics_helper+0x5b4/0x4858
[   28.425863]  kasan_atomics+0x198/0x2e8
[   28.426041]  kunit_try_run_case+0x170/0x3f0
[   28.426193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.426360]  kthread+0x318/0x620
[   28.426494]  ret_from_fork+0x10/0x20
[   28.426649] 
[   28.435944] Allocated by task 254:
[   28.436419]  kasan_save_stack+0x3c/0x68
[   28.437053]  kasan_save_track+0x20/0x40
[   28.437617]  kasan_save_alloc_info+0x40/0x58
[   28.438227]  __kasan_kmalloc+0xd4/0xd8
[   28.438653]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.439322]  kasan_atomics+0xb8/0x2e8
[   28.439810]  kunit_try_run_case+0x170/0x3f0
[   28.440380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.440991]  kthread+0x318/0x620
[   28.441325]  ret_from_fork+0x10/0x20
[   28.441675] 
[   28.443951] The buggy address belongs to the object at fff00000c65edb80
[   28.443951]  which belongs to the cache kmalloc-64 of size 64
[   28.444867] The buggy address is located 0 bytes to the right of
[   28.444867]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.445991] 
[   28.446290] The buggy address belongs to the physical page:
[   28.446970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.447874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.448698] page_type: f5(slab)
[   28.449232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.449825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.450385] page dumped because: kasan: bad access detected
[   28.450843] 
[   28.451194] Memory state around the buggy address:
[   28.451767]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.454876]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.455825] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.456618]                                      ^
[   28.457116]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.457644]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.458255] ==================================================================
[   30.313651] ==================================================================
[   30.315924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.316533] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.317296] 
[   30.317590] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.317878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.317997] Hardware name: linux,dummy-virt (DT)
[   30.318094] Call trace:
[   30.318177]  show_stack+0x20/0x38 (C)
[   30.318331]  dump_stack_lvl+0x8c/0xd0
[   30.318476]  print_report+0x118/0x608
[   30.318608]  kasan_report+0xdc/0x128
[   30.318734]  __asan_report_load8_noabort+0x20/0x30
[   30.318856]  kasan_atomics_helper+0x3f04/0x4858
[   30.319004]  kasan_atomics+0x198/0x2e8
[   30.319131]  kunit_try_run_case+0x170/0x3f0
[   30.319256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.319397]  kthread+0x318/0x620
[   30.319521]  ret_from_fork+0x10/0x20
[   30.319667] 
[   30.325319] Allocated by task 254:
[   30.325641]  kasan_save_stack+0x3c/0x68
[   30.326065]  kasan_save_track+0x20/0x40
[   30.326645]  kasan_save_alloc_info+0x40/0x58
[   30.327221]  __kasan_kmalloc+0xd4/0xd8
[   30.327795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.328417]  kasan_atomics+0xb8/0x2e8
[   30.328999]  kunit_try_run_case+0x170/0x3f0
[   30.329569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.330034]  kthread+0x318/0x620
[   30.330379]  ret_from_fork+0x10/0x20
[   30.330705] 
[   30.330941] The buggy address belongs to the object at fff00000c65edb80
[   30.330941]  which belongs to the cache kmalloc-64 of size 64
[   30.332384] The buggy address is located 0 bytes to the right of
[   30.332384]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.333802] 
[   30.334088] The buggy address belongs to the physical page:
[   30.334579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.335494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.336340] page_type: f5(slab)
[   30.336755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.337537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.338412] page dumped because: kasan: bad access detected
[   30.338984] 
[   30.339258] Memory state around the buggy address:
[   30.339827]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.340736]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.341681] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.342449]                                      ^
[   30.343189]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.344053]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.344770] ==================================================================
[   29.512393] ==================================================================
[   29.516467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.518297] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.519091] 
[   29.519449] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.519650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.519726] Hardware name: linux,dummy-virt (DT)
[   29.519807] Call trace:
[   29.519866]  show_stack+0x20/0x38 (C)
[   29.521441]  dump_stack_lvl+0x8c/0xd0
[   29.521571]  print_report+0x118/0x608
[   29.521697]  kasan_report+0xdc/0x128
[   29.521816]  __asan_report_load4_noabort+0x20/0x30
[   29.521976]  kasan_atomics_helper+0x3dd8/0x4858
[   29.522106]  kasan_atomics+0x198/0x2e8
[   29.522246]  kunit_try_run_case+0x170/0x3f0
[   29.522373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.522510]  kthread+0x318/0x620
[   29.522627]  ret_from_fork+0x10/0x20
[   29.522753] 
[   29.531419] Allocated by task 254:
[   29.533282]  kasan_save_stack+0x3c/0x68
[   29.534113]  kasan_save_track+0x20/0x40
[   29.535152]  kasan_save_alloc_info+0x40/0x58
[   29.536406]  __kasan_kmalloc+0xd4/0xd8
[   29.536818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.537267]  kasan_atomics+0xb8/0x2e8
[   29.537635]  kunit_try_run_case+0x170/0x3f0
[   29.538046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538529]  kthread+0x318/0x620
[   29.538900]  ret_from_fork+0x10/0x20
[   29.542363] 
[   29.543711] The buggy address belongs to the object at fff00000c65edb80
[   29.543711]  which belongs to the cache kmalloc-64 of size 64
[   29.546177] The buggy address is located 0 bytes to the right of
[   29.546177]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.549530] 
[   29.550350] The buggy address belongs to the physical page:
[   29.551040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.552634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.553661] page_type: f5(slab)
[   29.554135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.554680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.556562] page dumped because: kasan: bad access detected
[   29.557807] 
[   29.559163] Memory state around the buggy address:
[   29.559801]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.561929]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.562666] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.563237]                                      ^
[   29.563670]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.564841]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.566340] ==================================================================
[   30.138360] ==================================================================
[   30.138857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   30.141524] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.143324] 
[   30.144402] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.144616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.144689] Hardware name: linux,dummy-virt (DT)
[   30.144775] Call trace:
[   30.144834]  show_stack+0x20/0x38 (C)
[   30.144979]  dump_stack_lvl+0x8c/0xd0
[   30.145101]  print_report+0x118/0x608
[   30.145226]  kasan_report+0xdc/0x128
[   30.145345]  kasan_check_range+0x100/0x1a8
[   30.145467]  __kasan_check_write+0x20/0x30
[   30.145587]  kasan_atomics_helper+0x1190/0x4858
[   30.145712]  kasan_atomics+0x198/0x2e8
[   30.145829]  kunit_try_run_case+0x170/0x3f0
[   30.146255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.146399]  kthread+0x318/0x620
[   30.146516]  ret_from_fork+0x10/0x20
[   30.146630] 
[   30.154397] Allocated by task 254:
[   30.154726]  kasan_save_stack+0x3c/0x68
[   30.157300]  kasan_save_track+0x20/0x40
[   30.158670]  kasan_save_alloc_info+0x40/0x58
[   30.159653]  __kasan_kmalloc+0xd4/0xd8
[   30.160299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.161039]  kasan_atomics+0xb8/0x2e8
[   30.161757]  kunit_try_run_case+0x170/0x3f0
[   30.162498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.163305]  kthread+0x318/0x620
[   30.163999]  ret_from_fork+0x10/0x20
[   30.164638] 
[   30.164954] The buggy address belongs to the object at fff00000c65edb80
[   30.164954]  which belongs to the cache kmalloc-64 of size 64
[   30.166034] The buggy address is located 0 bytes to the right of
[   30.166034]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.167228] 
[   30.167554] The buggy address belongs to the physical page:
[   30.168309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.169234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.170082] page_type: f5(slab)
[   30.170662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.171427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.172296] page dumped because: kasan: bad access detected
[   30.172954] 
[   30.173304] Memory state around the buggy address:
[   30.173864]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.174649]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.175368] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.176117]                                      ^
[   30.176854]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177680]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178464] ==================================================================
[   28.667746] ==================================================================
[   28.668514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   28.670728] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.673051] 
[   28.675006] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.675276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.675355] Hardware name: linux,dummy-virt (DT)
[   28.675441] Call trace:
[   28.675507]  show_stack+0x20/0x38 (C)
[   28.675639]  dump_stack_lvl+0x8c/0xd0
[   28.675773]  print_report+0x118/0x608
[   28.675924]  kasan_report+0xdc/0x128
[   28.676057]  kasan_check_range+0x100/0x1a8
[   28.676184]  __kasan_check_write+0x20/0x30
[   28.676313]  kasan_atomics_helper+0x7cc/0x4858
[   28.676456]  kasan_atomics+0x198/0x2e8
[   28.676582]  kunit_try_run_case+0x170/0x3f0
[   28.676712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.676851]  kthread+0x318/0x620
[   28.677362]  ret_from_fork+0x10/0x20
[   28.677498] 
[   28.694717] Allocated by task 254:
[   28.697422]  kasan_save_stack+0x3c/0x68
[   28.698809]  kasan_save_track+0x20/0x40
[   28.699314]  kasan_save_alloc_info+0x40/0x58
[   28.699756]  __kasan_kmalloc+0xd4/0xd8
[   28.702021]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.703078]  kasan_atomics+0xb8/0x2e8
[   28.703595]  kunit_try_run_case+0x170/0x3f0
[   28.705480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.706748]  kthread+0x318/0x620
[   28.707154]  ret_from_fork+0x10/0x20
[   28.707560] 
[   28.707810] The buggy address belongs to the object at fff00000c65edb80
[   28.707810]  which belongs to the cache kmalloc-64 of size 64
[   28.710795] The buggy address is located 0 bytes to the right of
[   28.710795]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.713471] 
[   28.713784] The buggy address belongs to the physical page:
[   28.716631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.720041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.721005] page_type: f5(slab)
[   28.721488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.723183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.723771] page dumped because: kasan: bad access detected
[   28.725264] 
[   28.726206] Memory state around the buggy address:
[   28.726785]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.727577]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.731998] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.734396]                                      ^
[   28.735598]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.736366]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.738237] ==================================================================
[   29.797051] ==================================================================
[   29.798354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.799160] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.799921] 
[   29.800211] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.800402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.800467] Hardware name: linux,dummy-virt (DT)
[   29.800545] Call trace:
[   29.800598]  show_stack+0x20/0x38 (C)
[   29.800723]  dump_stack_lvl+0x8c/0xd0
[   29.800859]  print_report+0x118/0x608
[   29.801042]  kasan_report+0xdc/0x128
[   29.801179]  __asan_report_store8_noabort+0x20/0x30
[   29.801309]  kasan_atomics_helper+0x3e5c/0x4858
[   29.801452]  kasan_atomics+0x198/0x2e8
[   29.801662]  kunit_try_run_case+0x170/0x3f0
[   29.801865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.802019]  kthread+0x318/0x620
[   29.802135]  ret_from_fork+0x10/0x20
[   29.802286] 
[   29.811708] Allocated by task 254:
[   29.812228]  kasan_save_stack+0x3c/0x68
[   29.812739]  kasan_save_track+0x20/0x40
[   29.813331]  kasan_save_alloc_info+0x40/0x58
[   29.814241]  __kasan_kmalloc+0xd4/0xd8
[   29.815210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.815868]  kasan_atomics+0xb8/0x2e8
[   29.816763]  kunit_try_run_case+0x170/0x3f0
[   29.818147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.819099]  kthread+0x318/0x620
[   29.820439]  ret_from_fork+0x10/0x20
[   29.821402] 
[   29.821634] The buggy address belongs to the object at fff00000c65edb80
[   29.821634]  which belongs to the cache kmalloc-64 of size 64
[   29.823804] The buggy address is located 0 bytes to the right of
[   29.823804]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.825093] 
[   29.825708] The buggy address belongs to the physical page:
[   29.826619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.827389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.828548] page_type: f5(slab)
[   29.830368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.831456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.832133] page dumped because: kasan: bad access detected
[   29.832662] 
[   29.833476] Memory state around the buggy address:
[   29.834015]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.835246]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.835805] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.836985]                                      ^
[   29.837839]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.838764]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.839456] ==================================================================
[   30.423335] ==================================================================
[   30.423950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.424742] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.425766] 
[   30.426131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.426393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.426482] Hardware name: linux,dummy-virt (DT)
[   30.426581] Call trace:
[   30.426688]  show_stack+0x20/0x38 (C)
[   30.426916]  dump_stack_lvl+0x8c/0xd0
[   30.427060]  print_report+0x118/0x608
[   30.427205]  kasan_report+0xdc/0x128
[   30.427365]  kasan_check_range+0x100/0x1a8
[   30.427475]  __kasan_check_write+0x20/0x30
[   30.427586]  kasan_atomics_helper+0x14e4/0x4858
[   30.427708]  kasan_atomics+0x198/0x2e8
[   30.427849]  kunit_try_run_case+0x170/0x3f0
[   30.428012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.428137]  kthread+0x318/0x620
[   30.428198]  ret_from_fork+0x10/0x20
[   30.428260] 
[   30.435046] Allocated by task 254:
[   30.435629]  kasan_save_stack+0x3c/0x68
[   30.436809]  kasan_save_track+0x20/0x40
[   30.437412]  kasan_save_alloc_info+0x40/0x58
[   30.438409]  __kasan_kmalloc+0xd4/0xd8
[   30.438987]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.439742]  kasan_atomics+0xb8/0x2e8
[   30.440387]  kunit_try_run_case+0x170/0x3f0
[   30.441068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.441785]  kthread+0x318/0x620
[   30.442263]  ret_from_fork+0x10/0x20
[   30.442939] 
[   30.443415] The buggy address belongs to the object at fff00000c65edb80
[   30.443415]  which belongs to the cache kmalloc-64 of size 64
[   30.444517] The buggy address is located 0 bytes to the right of
[   30.444517]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.445799] 
[   30.446184] The buggy address belongs to the physical page:
[   30.446841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.447688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.448505] page_type: f5(slab)
[   30.449040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.449907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.450624] page dumped because: kasan: bad access detected
[   30.451250] 
[   30.451648] Memory state around the buggy address:
[   30.452261]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.453086]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.453812] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.454629]                                      ^
[   30.455296]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.456081]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.456821] ==================================================================
[   27.892397] ==================================================================
[   27.894407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   27.896932] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   27.898763] 
[   27.899463] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   27.900080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.900153] Hardware name: linux,dummy-virt (DT)
[   27.900233] Call trace:
[   27.900289]  show_stack+0x20/0x38 (C)
[   27.900421]  dump_stack_lvl+0x8c/0xd0
[   27.900534]  print_report+0x118/0x608
[   27.900652]  kasan_report+0xdc/0x128
[   27.900762]  kasan_check_range+0x100/0x1a8
[   27.900876]  __kasan_check_read+0x20/0x30
[   27.901057]  kasan_atomics_helper+0x1ec/0x4858
[   27.901181]  kasan_atomics+0x198/0x2e8
[   27.901292]  kunit_try_run_case+0x170/0x3f0
[   27.901412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.901536]  kthread+0x318/0x620
[   27.901648]  ret_from_fork+0x10/0x20
[   27.901764] 
[   27.912824] Allocated by task 254:
[   27.915713]  kasan_save_stack+0x3c/0x68
[   27.916675]  kasan_save_track+0x20/0x40
[   27.918566]  kasan_save_alloc_info+0x40/0x58
[   27.919521]  __kasan_kmalloc+0xd4/0xd8
[   27.920818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.922314]  kasan_atomics+0xb8/0x2e8
[   27.923620]  kunit_try_run_case+0x170/0x3f0
[   27.924999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.926281]  kthread+0x318/0x620
[   27.926649]  ret_from_fork+0x10/0x20
[   27.927036] 
[   27.927276] The buggy address belongs to the object at fff00000c65edb80
[   27.927276]  which belongs to the cache kmalloc-64 of size 64
[   27.929499] The buggy address is located 0 bytes to the right of
[   27.929499]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   27.933278] 
[   27.934269] The buggy address belongs to the physical page:
[   27.935958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   27.938157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.940125] page_type: f5(slab)
[   27.941269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.941859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.942442] page dumped because: kasan: bad access detected
[   27.943945] 
[   27.944465] Memory state around the buggy address:
[   27.946175]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.948417]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.950662] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.952707]                                      ^
[   27.954285]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.955778]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.957858] ==================================================================
[   28.236448] ==================================================================
[   28.236993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   28.237528] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.238618] 
[   28.239014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.239229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.239314] Hardware name: linux,dummy-virt (DT)
[   28.239410] Call trace:
[   28.239524]  show_stack+0x20/0x38 (C)
[   28.239644]  dump_stack_lvl+0x8c/0xd0
[   28.239754]  print_report+0x118/0x608
[   28.239867]  kasan_report+0xdc/0x128
[   28.239994]  kasan_check_range+0x100/0x1a8
[   28.240093]  __kasan_check_write+0x20/0x30
[   28.240194]  kasan_atomics_helper+0x414/0x4858
[   28.240301]  kasan_atomics+0x198/0x2e8
[   28.240403]  kunit_try_run_case+0x170/0x3f0
[   28.240504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.240620]  kthread+0x318/0x620
[   28.240721]  ret_from_fork+0x10/0x20
[   28.240824] 
[   28.248756] Allocated by task 254:
[   28.249200]  kasan_save_stack+0x3c/0x68
[   28.249584]  kasan_save_track+0x20/0x40
[   28.253102]  kasan_save_alloc_info+0x40/0x58
[   28.253777]  __kasan_kmalloc+0xd4/0xd8
[   28.254343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.256238]  kasan_atomics+0xb8/0x2e8
[   28.256851]  kunit_try_run_case+0x170/0x3f0
[   28.257566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.258356]  kthread+0x318/0x620
[   28.259073]  ret_from_fork+0x10/0x20
[   28.259624] 
[   28.260098] The buggy address belongs to the object at fff00000c65edb80
[   28.260098]  which belongs to the cache kmalloc-64 of size 64
[   28.261563] The buggy address is located 0 bytes to the right of
[   28.261563]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.263665] 
[   28.264389] The buggy address belongs to the physical page:
[   28.264816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.265406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.266931] page_type: f5(slab)
[   28.267718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.268611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.269534] page dumped because: kasan: bad access detected
[   28.270135] 
[   28.270435] Memory state around the buggy address:
[   28.271303]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.272169]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.272862] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.273526]                                      ^
[   28.274955]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.275976]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.276603] ==================================================================
[   30.087057] ==================================================================
[   30.087921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   30.089687] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.090301] 
[   30.090562] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.090749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.090817] Hardware name: linux,dummy-virt (DT)
[   30.090913] Call trace:
[   30.090973]  show_stack+0x20/0x38 (C)
[   30.091091]  dump_stack_lvl+0x8c/0xd0
[   30.091200]  print_report+0x118/0x608
[   30.091316]  kasan_report+0xdc/0x128
[   30.091415]  kasan_check_range+0x100/0x1a8
[   30.091515]  __kasan_check_write+0x20/0x30
[   30.091613]  kasan_atomics_helper+0x1128/0x4858
[   30.091721]  kasan_atomics+0x198/0x2e8
[   30.091819]  kunit_try_run_case+0x170/0x3f0
[   30.092709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092791]  kthread+0x318/0x620
[   30.092851]  ret_from_fork+0x10/0x20
[   30.092945] 
[   30.100879] Allocated by task 254:
[   30.101412]  kasan_save_stack+0x3c/0x68
[   30.102014]  kasan_save_track+0x20/0x40
[   30.102595]  kasan_save_alloc_info+0x40/0x58
[   30.103262]  __kasan_kmalloc+0xd4/0xd8
[   30.103803]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.104615]  kasan_atomics+0xb8/0x2e8
[   30.106149]  kunit_try_run_case+0x170/0x3f0
[   30.108048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.109458]  kthread+0x318/0x620
[   30.110420]  ret_from_fork+0x10/0x20
[   30.111284] 
[   30.112201] The buggy address belongs to the object at fff00000c65edb80
[   30.112201]  which belongs to the cache kmalloc-64 of size 64
[   30.113419] The buggy address is located 0 bytes to the right of
[   30.113419]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.116528] 
[   30.117705] The buggy address belongs to the physical page:
[   30.119492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.121337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.121867] page_type: f5(slab)
[   30.123804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.125705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.127840] page dumped because: kasan: bad access detected
[   30.128513] 
[   30.128751] Memory state around the buggy address:
[   30.130608]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.132301]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.132983] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.133600]                                      ^
[   30.134361]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135061]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135762] ==================================================================
[   29.062302] ==================================================================
[   29.065762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.068431] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.071290] 
[   29.071928] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.072137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.072215] Hardware name: linux,dummy-virt (DT)
[   29.072300] Call trace:
[   29.072366]  show_stack+0x20/0x38 (C)
[   29.072503]  dump_stack_lvl+0x8c/0xd0
[   29.072632]  print_report+0x118/0x608
[   29.072762]  kasan_report+0xdc/0x128
[   29.072915]  kasan_check_range+0x100/0x1a8
[   29.073046]  __kasan_check_write+0x20/0x30
[   29.073181]  kasan_atomics_helper+0xa6c/0x4858
[   29.073323]  kasan_atomics+0x198/0x2e8
[   29.073454]  kunit_try_run_case+0x170/0x3f0
[   29.073582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.073724]  kthread+0x318/0x620
[   29.073850]  ret_from_fork+0x10/0x20
[   29.074654] 
[   29.088924] Allocated by task 254:
[   29.089318]  kasan_save_stack+0x3c/0x68
[   29.089752]  kasan_save_track+0x20/0x40
[   29.092755]  kasan_save_alloc_info+0x40/0x58
[   29.094312]  __kasan_kmalloc+0xd4/0xd8
[   29.095384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.096877]  kasan_atomics+0xb8/0x2e8
[   29.098267]  kunit_try_run_case+0x170/0x3f0
[   29.099730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.101433]  kthread+0x318/0x620
[   29.102737]  ret_from_fork+0x10/0x20
[   29.103877] 
[   29.104156] The buggy address belongs to the object at fff00000c65edb80
[   29.104156]  which belongs to the cache kmalloc-64 of size 64
[   29.106447] The buggy address is located 0 bytes to the right of
[   29.106447]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.109680] 
[   29.110603] The buggy address belongs to the physical page:
[   29.112338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.113711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.116028] page_type: f5(slab)
[   29.117319] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.118337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.118944] page dumped because: kasan: bad access detected
[   29.119407] 
[   29.119664] Memory state around the buggy address:
[   29.122555]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.124940]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.126678] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.128612]                                      ^
[   29.130262]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.132380]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.133689] ==================================================================
[   28.945560] ==================================================================
[   28.948196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   28.948765] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.952404] 
[   28.952695] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.953281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.953367] Hardware name: linux,dummy-virt (DT)
[   28.953453] Call trace:
[   28.953519]  show_stack+0x20/0x38 (C)
[   28.953655]  dump_stack_lvl+0x8c/0xd0
[   28.953786]  print_report+0x118/0x608
[   28.953937]  kasan_report+0xdc/0x128
[   28.954080]  kasan_check_range+0x100/0x1a8
[   28.954244]  __kasan_check_write+0x20/0x30
[   28.954386]  kasan_atomics_helper+0x99c/0x4858
[   28.954534]  kasan_atomics+0x198/0x2e8
[   28.954674]  kunit_try_run_case+0x170/0x3f0
[   28.954808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.956775]  kthread+0x318/0x620
[   28.956922]  ret_from_fork+0x10/0x20
[   28.957056] 
[   28.969578] Allocated by task 254:
[   28.970535]  kasan_save_stack+0x3c/0x68
[   28.975507]  kasan_save_track+0x20/0x40
[   28.976312]  kasan_save_alloc_info+0x40/0x58
[   28.979176]  __kasan_kmalloc+0xd4/0xd8
[   28.979603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.980324]  kasan_atomics+0xb8/0x2e8
[   28.981099]  kunit_try_run_case+0x170/0x3f0
[   28.982598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.984536]  kthread+0x318/0x620
[   28.985755]  ret_from_fork+0x10/0x20
[   28.986595] 
[   28.987248] The buggy address belongs to the object at fff00000c65edb80
[   28.987248]  which belongs to the cache kmalloc-64 of size 64
[   28.991134] The buggy address is located 0 bytes to the right of
[   28.991134]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.992034] 
[   28.992276] The buggy address belongs to the physical page:
[   28.992692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.994275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.995419] page_type: f5(slab)
[   28.996086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.997489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.998694] page dumped because: kasan: bad access detected
[   28.999599] 
[   28.999991] Memory state around the buggy address:
[   29.000980]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.002111]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.003106] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.003939]                                      ^
[   29.004856]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.007957]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.008786] ==================================================================
[   29.842048] ==================================================================
[   29.842737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.843589] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.844512] 
[   29.844811] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.845507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.845579] Hardware name: linux,dummy-virt (DT)
[   29.845652] Call trace:
[   29.845711]  show_stack+0x20/0x38 (C)
[   29.845839]  dump_stack_lvl+0x8c/0xd0
[   29.846033]  print_report+0x118/0x608
[   29.846584]  kasan_report+0xdc/0x128
[   29.846716]  kasan_check_range+0x100/0x1a8
[   29.846841]  __kasan_check_write+0x20/0x30
[   29.846984]  kasan_atomics_helper+0xeb8/0x4858
[   29.847110]  kasan_atomics+0x198/0x2e8
[   29.847235]  kunit_try_run_case+0x170/0x3f0
[   29.849405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.849546]  kthread+0x318/0x620
[   29.849702]  ret_from_fork+0x10/0x20
[   29.849825] 
[   29.864211] Allocated by task 254:
[   29.864569]  kasan_save_stack+0x3c/0x68
[   29.865300]  kasan_save_track+0x20/0x40
[   29.865954]  kasan_save_alloc_info+0x40/0x58
[   29.866484]  __kasan_kmalloc+0xd4/0xd8
[   29.867096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.867615]  kasan_atomics+0xb8/0x2e8
[   29.870016]  kunit_try_run_case+0x170/0x3f0
[   29.870807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.871522]  kthread+0x318/0x620
[   29.873083]  ret_from_fork+0x10/0x20
[   29.874079] 
[   29.874436] The buggy address belongs to the object at fff00000c65edb80
[   29.874436]  which belongs to the cache kmalloc-64 of size 64
[   29.876441] The buggy address is located 0 bytes to the right of
[   29.876441]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.877701] 
[   29.878022] The buggy address belongs to the physical page:
[   29.878500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.879187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.880541] page_type: f5(slab)
[   29.881406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.882404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.883398] page dumped because: kasan: bad access detected
[   29.884214] 
[   29.884728] Memory state around the buggy address:
[   29.885121]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.885661]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.886967] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.887685]                                      ^
[   29.888552]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889420]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889990] ==================================================================
[   30.625424] ==================================================================
[   30.626119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.627078] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.627840] 
[   30.628235] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.628449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.628532] Hardware name: linux,dummy-virt (DT)
[   30.628632] Call trace:
[   30.628700]  show_stack+0x20/0x38 (C)
[   30.628845]  dump_stack_lvl+0x8c/0xd0
[   30.629008]  print_report+0x118/0x608
[   30.629235]  kasan_report+0xdc/0x128
[   30.629381]  kasan_check_range+0x100/0x1a8
[   30.629517]  __kasan_check_write+0x20/0x30
[   30.629629]  kasan_atomics_helper+0x16d0/0x4858
[   30.629694]  kasan_atomics+0x198/0x2e8
[   30.629754]  kunit_try_run_case+0x170/0x3f0
[   30.629811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.629876]  kthread+0x318/0x620
[   30.629969]  ret_from_fork+0x10/0x20
[   30.630031] 
[   30.636368] Allocated by task 254:
[   30.636832]  kasan_save_stack+0x3c/0x68
[   30.637457]  kasan_save_track+0x20/0x40
[   30.638092]  kasan_save_alloc_info+0x40/0x58
[   30.638674]  __kasan_kmalloc+0xd4/0xd8
[   30.639145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.639789]  kasan_atomics+0xb8/0x2e8
[   30.640408]  kunit_try_run_case+0x170/0x3f0
[   30.640970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641648]  kthread+0x318/0x620
[   30.642211]  ret_from_fork+0x10/0x20
[   30.643227] 
[   30.643509] The buggy address belongs to the object at fff00000c65edb80
[   30.643509]  which belongs to the cache kmalloc-64 of size 64
[   30.645646] The buggy address is located 0 bytes to the right of
[   30.645646]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.648941] 
[   30.649206] The buggy address belongs to the physical page:
[   30.649679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.652384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.654120] page_type: f5(slab)
[   30.655308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.656316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.657264] page dumped because: kasan: bad access detected
[   30.657868] 
[   30.658455] Memory state around the buggy address:
[   30.659029]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.659851]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.660571] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.661499]                                      ^
[   30.662286]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663167]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.664021] ==================================================================
[   30.765697] ==================================================================
[   30.766562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.767344] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.768254] 
[   30.768629] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.768898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.768983] Hardware name: linux,dummy-virt (DT)
[   30.769094] Call trace:
[   30.769169]  show_stack+0x20/0x38 (C)
[   30.769362]  dump_stack_lvl+0x8c/0xd0
[   30.769508]  print_report+0x118/0x608
[   30.769589]  kasan_report+0xdc/0x128
[   30.769648]  kasan_check_range+0x100/0x1a8
[   30.769706]  __kasan_check_write+0x20/0x30
[   30.769761]  kasan_atomics_helper+0x17ec/0x4858
[   30.769823]  kasan_atomics+0x198/0x2e8
[   30.769878]  kunit_try_run_case+0x170/0x3f0
[   30.769974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.770039]  kthread+0x318/0x620
[   30.770097]  ret_from_fork+0x10/0x20
[   30.770156] 
[   30.776806] Allocated by task 254:
[   30.777377]  kasan_save_stack+0x3c/0x68
[   30.777967]  kasan_save_track+0x20/0x40
[   30.778563]  kasan_save_alloc_info+0x40/0x58
[   30.779148]  __kasan_kmalloc+0xd4/0xd8
[   30.779754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.780378]  kasan_atomics+0xb8/0x2e8
[   30.781009]  kunit_try_run_case+0x170/0x3f0
[   30.781595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.782360]  kthread+0x318/0x620
[   30.782932]  ret_from_fork+0x10/0x20
[   30.783493] 
[   30.783821] The buggy address belongs to the object at fff00000c65edb80
[   30.783821]  which belongs to the cache kmalloc-64 of size 64
[   30.784973] The buggy address is located 0 bytes to the right of
[   30.784973]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.786250] 
[   30.786656] The buggy address belongs to the physical page:
[   30.787595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.788361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.789243] page_type: f5(slab)
[   30.789684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.790467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.791342] page dumped because: kasan: bad access detected
[   30.791614] 
[   30.791748] Memory state around the buggy address:
[   30.792090]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.792693]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.793874] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.794700]                                      ^
[   30.795258]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.796038]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.796788] ==================================================================
[   28.282097] ==================================================================
[   28.283484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   28.286274] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.287587] 
[   28.287859] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.288066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.288134] Hardware name: linux,dummy-virt (DT)
[   28.288214] Call trace:
[   28.288271]  show_stack+0x20/0x38 (C)
[   28.288391]  dump_stack_lvl+0x8c/0xd0
[   28.288508]  print_report+0x118/0x608
[   28.288622]  kasan_report+0xdc/0x128
[   28.288738]  kasan_check_range+0x100/0x1a8
[   28.288849]  __kasan_check_write+0x20/0x30
[   28.289633]  kasan_atomics_helper+0x47c/0x4858
[   28.289756]  kasan_atomics+0x198/0x2e8
[   28.289875]  kunit_try_run_case+0x170/0x3f0
[   28.290013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.290145]  kthread+0x318/0x620
[   28.290276]  ret_from_fork+0x10/0x20
[   28.290402] 
[   28.303990] Allocated by task 254:
[   28.304471]  kasan_save_stack+0x3c/0x68
[   28.305005]  kasan_save_track+0x20/0x40
[   28.305451]  kasan_save_alloc_info+0x40/0x58
[   28.306081]  __kasan_kmalloc+0xd4/0xd8
[   28.306657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.307209]  kasan_atomics+0xb8/0x2e8
[   28.307976]  kunit_try_run_case+0x170/0x3f0
[   28.308527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.309144]  kthread+0x318/0x620
[   28.310372]  ret_from_fork+0x10/0x20
[   28.310742] 
[   28.311098] The buggy address belongs to the object at fff00000c65edb80
[   28.311098]  which belongs to the cache kmalloc-64 of size 64
[   28.312264] The buggy address is located 0 bytes to the right of
[   28.312264]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.313393] 
[   28.313989] The buggy address belongs to the physical page:
[   28.314684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.315781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.316728] page_type: f5(slab)
[   28.317245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.318304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.319328] page dumped because: kasan: bad access detected
[   28.320013] 
[   28.320570] Memory state around the buggy address:
[   28.321544]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.322065]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.323026] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.324231]                                      ^
[   28.325298]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.326114]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.327535] ==================================================================
[   29.384857] ==================================================================
[   29.386299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.387207] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.389732] 
[   29.390026] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.390242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.390313] Hardware name: linux,dummy-virt (DT)
[   29.390392] Call trace:
[   29.390449]  show_stack+0x20/0x38 (C)
[   29.390573]  dump_stack_lvl+0x8c/0xd0
[   29.390696]  print_report+0x118/0x608
[   29.390813]  kasan_report+0xdc/0x128
[   29.391772]  kasan_check_range+0x100/0x1a8
[   29.391923]  __kasan_check_write+0x20/0x30
[   29.392042]  kasan_atomics_helper+0xc08/0x4858
[   29.392163]  kasan_atomics+0x198/0x2e8
[   29.392281]  kunit_try_run_case+0x170/0x3f0
[   29.392399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.392535]  kthread+0x318/0x620
[   29.392653]  ret_from_fork+0x10/0x20
[   29.392777] 
[   29.404183] Allocated by task 254:
[   29.404692]  kasan_save_stack+0x3c/0x68
[   29.406187]  kasan_save_track+0x20/0x40
[   29.406589]  kasan_save_alloc_info+0x40/0x58
[   29.407026]  __kasan_kmalloc+0xd4/0xd8
[   29.407431]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.407854]  kasan_atomics+0xb8/0x2e8
[   29.409188]  kunit_try_run_case+0x170/0x3f0
[   29.409819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.412379]  kthread+0x318/0x620
[   29.413650]  ret_from_fork+0x10/0x20
[   29.414150] 
[   29.414410] The buggy address belongs to the object at fff00000c65edb80
[   29.414410]  which belongs to the cache kmalloc-64 of size 64
[   29.416702] The buggy address is located 0 bytes to the right of
[   29.416702]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.417766] 
[   29.418467] The buggy address belongs to the physical page:
[   29.419957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.421672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.422598] page_type: f5(slab)
[   29.424290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.425376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.426783] page dumped because: kasan: bad access detected
[   29.427811] 
[   29.428562] Memory state around the buggy address:
[   29.429174]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.429828]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.431524] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.433809]                                      ^
[   29.434491]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.435099]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.435625] ==================================================================
[   29.260740] ==================================================================
[   29.261511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   29.265408] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.266341] 
[   29.266618] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.266816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.266911] Hardware name: linux,dummy-virt (DT)
[   29.267723] Call trace:
[   29.267790]  show_stack+0x20/0x38 (C)
[   29.267995]  dump_stack_lvl+0x8c/0xd0
[   29.268130]  print_report+0x118/0x608
[   29.268252]  kasan_report+0xdc/0x128
[   29.268367]  kasan_check_range+0x100/0x1a8
[   29.268486]  __kasan_check_write+0x20/0x30
[   29.268603]  kasan_atomics_helper+0xb70/0x4858
[   29.268723]  kasan_atomics+0x198/0x2e8
[   29.268847]  kunit_try_run_case+0x170/0x3f0
[   29.269000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.269127]  kthread+0x318/0x620
[   29.269232]  ret_from_fork+0x10/0x20
[   29.269357] 
[   29.284145] Allocated by task 254:
[   29.285254]  kasan_save_stack+0x3c/0x68
[   29.285824]  kasan_save_track+0x20/0x40
[   29.286392]  kasan_save_alloc_info+0x40/0x58
[   29.288116]  __kasan_kmalloc+0xd4/0xd8
[   29.288654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.290156]  kasan_atomics+0xb8/0x2e8
[   29.290955]  kunit_try_run_case+0x170/0x3f0
[   29.291480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.295394]  kthread+0x318/0x620
[   29.296218]  ret_from_fork+0x10/0x20
[   29.297119] 
[   29.297353] The buggy address belongs to the object at fff00000c65edb80
[   29.297353]  which belongs to the cache kmalloc-64 of size 64
[   29.298234] The buggy address is located 0 bytes to the right of
[   29.298234]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.301067] 
[   29.301932] The buggy address belongs to the physical page:
[   29.302676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.304508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.305725] page_type: f5(slab)
[   29.306809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.308481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.309682] page dumped because: kasan: bad access detected
[   29.310802] 
[   29.312099] Memory state around the buggy address:
[   29.312661]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.313335]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.313879] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.316931]                                      ^
[   29.317513]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.319806]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320467] ==================================================================
[   30.666293] ==================================================================
[   30.666977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.667733] Read of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.668469] 
[   30.668855] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.669149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.669231] Hardware name: linux,dummy-virt (DT)
[   30.669364] Call trace:
[   30.669434]  show_stack+0x20/0x38 (C)
[   30.669558]  dump_stack_lvl+0x8c/0xd0
[   30.669623]  print_report+0x118/0x608
[   30.669685]  kasan_report+0xdc/0x128
[   30.669743]  __asan_report_load8_noabort+0x20/0x30
[   30.669804]  kasan_atomics_helper+0x3e10/0x4858
[   30.669866]  kasan_atomics+0x198/0x2e8
[   30.669956]  kunit_try_run_case+0x170/0x3f0
[   30.670018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.670084]  kthread+0x318/0x620
[   30.670140]  ret_from_fork+0x10/0x20
[   30.670217] 
[   30.676816] Allocated by task 254:
[   30.677420]  kasan_save_stack+0x3c/0x68
[   30.677975]  kasan_save_track+0x20/0x40
[   30.678634]  kasan_save_alloc_info+0x40/0x58
[   30.679310]  __kasan_kmalloc+0xd4/0xd8
[   30.679841]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.680496]  kasan_atomics+0xb8/0x2e8
[   30.681113]  kunit_try_run_case+0x170/0x3f0
[   30.681671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.682434]  kthread+0x318/0x620
[   30.682958]  ret_from_fork+0x10/0x20
[   30.683532] 
[   30.683902] The buggy address belongs to the object at fff00000c65edb80
[   30.683902]  which belongs to the cache kmalloc-64 of size 64
[   30.684970] The buggy address is located 0 bytes to the right of
[   30.684970]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.686313] 
[   30.686643] The buggy address belongs to the physical page:
[   30.687382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.688332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.689085] page_type: f5(slab)
[   30.689795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.690679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.691560] page dumped because: kasan: bad access detected
[   30.692133] 
[   30.692419] Memory state around the buggy address:
[   30.692984]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.693654]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.694356] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.695115]                                      ^
[   30.695852]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.696735]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.697542] ==================================================================
[   29.567751] ==================================================================
[   29.570311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.571175] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.571811] 
[   29.574479] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.574684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.574758] Hardware name: linux,dummy-virt (DT)
[   29.574843] Call trace:
[   29.574925]  show_stack+0x20/0x38 (C)
[   29.575057]  dump_stack_lvl+0x8c/0xd0
[   29.575190]  print_report+0x118/0x608
[   29.575319]  kasan_report+0xdc/0x128
[   29.575439]  kasan_check_range+0x100/0x1a8
[   29.575562]  __kasan_check_write+0x20/0x30
[   29.575679]  kasan_atomics_helper+0xd3c/0x4858
[   29.575794]  kasan_atomics+0x198/0x2e8
[   29.575941]  kunit_try_run_case+0x170/0x3f0
[   29.576068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.576201]  kthread+0x318/0x620
[   29.576320]  ret_from_fork+0x10/0x20
[   29.576444] 
[   29.589675] Allocated by task 254:
[   29.591527]  kasan_save_stack+0x3c/0x68
[   29.592225]  kasan_save_track+0x20/0x40
[   29.592616]  kasan_save_alloc_info+0x40/0x58
[   29.594076]  __kasan_kmalloc+0xd4/0xd8
[   29.594856]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.595304]  kasan_atomics+0xb8/0x2e8
[   29.597468]  kunit_try_run_case+0x170/0x3f0
[   29.598372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.599858]  kthread+0x318/0x620
[   29.600700]  ret_from_fork+0x10/0x20
[   29.601521] 
[   29.601975] The buggy address belongs to the object at fff00000c65edb80
[   29.601975]  which belongs to the cache kmalloc-64 of size 64
[   29.604004] The buggy address is located 0 bytes to the right of
[   29.604004]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.605537] 
[   29.605798] The buggy address belongs to the physical page:
[   29.607151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.608186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.609229] page_type: f5(slab)
[   29.609714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.610609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.611415] page dumped because: kasan: bad access detected
[   29.614639] 
[   29.614975] Memory state around the buggy address:
[   29.615436]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616024]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616726] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.617691]                                      ^
[   29.618345]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.618951]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.619832] ==================================================================
[   28.873910] ==================================================================
[   28.874441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   28.877197] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.877994] 
[   28.878300] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.878460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.878518] Hardware name: linux,dummy-virt (DT)
[   28.878588] Call trace:
[   28.878634]  show_stack+0x20/0x38 (C)
[   28.878735]  dump_stack_lvl+0x8c/0xd0
[   28.878828]  print_report+0x118/0x608
[   28.881284]  kasan_report+0xdc/0x128
[   28.881407]  kasan_check_range+0x100/0x1a8
[   28.881524]  __kasan_check_write+0x20/0x30
[   28.881629]  kasan_atomics_helper+0x934/0x4858
[   28.881747]  kasan_atomics+0x198/0x2e8
[   28.881859]  kunit_try_run_case+0x170/0x3f0
[   28.881996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.882121]  kthread+0x318/0x620
[   28.882239]  ret_from_fork+0x10/0x20
[   28.882349] 
[   28.896279] Allocated by task 254:
[   28.897010]  kasan_save_stack+0x3c/0x68
[   28.899756]  kasan_save_track+0x20/0x40
[   28.901231]  kasan_save_alloc_info+0x40/0x58
[   28.901670]  __kasan_kmalloc+0xd4/0xd8
[   28.902096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.902550]  kasan_atomics+0xb8/0x2e8
[   28.903919]  kunit_try_run_case+0x170/0x3f0
[   28.904817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.906220]  kthread+0x318/0x620
[   28.908674]  ret_from_fork+0x10/0x20
[   28.909146] 
[   28.909423] The buggy address belongs to the object at fff00000c65edb80
[   28.909423]  which belongs to the cache kmalloc-64 of size 64
[   28.914560] The buggy address is located 0 bytes to the right of
[   28.914560]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.915452] 
[   28.915718] The buggy address belongs to the physical page:
[   28.916658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.918798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.921921] page_type: f5(slab)
[   28.923387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.925393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.927514] page dumped because: kasan: bad access detected
[   28.928511] 
[   28.928765] Memory state around the buggy address:
[   28.929218]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.929790]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.932606] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.935923]                                      ^
[   28.938116]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.938698]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.940934] ==================================================================
[   30.045740] ==================================================================
[   30.046806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   30.047791] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.048383] 
[   30.048654] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.048990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.049121] Hardware name: linux,dummy-virt (DT)
[   30.049196] Call trace:
[   30.049253]  show_stack+0x20/0x38 (C)
[   30.049387]  dump_stack_lvl+0x8c/0xd0
[   30.049560]  print_report+0x118/0x608
[   30.049670]  kasan_report+0xdc/0x128
[   30.049770]  kasan_check_range+0x100/0x1a8
[   30.049912]  __kasan_check_write+0x20/0x30
[   30.050032]  kasan_atomics_helper+0x10c0/0x4858
[   30.050148]  kasan_atomics+0x198/0x2e8
[   30.050271]  kunit_try_run_case+0x170/0x3f0
[   30.050389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.050516]  kthread+0x318/0x620
[   30.050627]  ret_from_fork+0x10/0x20
[   30.050741] 
[   30.063257] Allocated by task 254:
[   30.063601]  kasan_save_stack+0x3c/0x68
[   30.064247]  kasan_save_track+0x20/0x40
[   30.064647]  kasan_save_alloc_info+0x40/0x58
[   30.065033]  __kasan_kmalloc+0xd4/0xd8
[   30.065371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.065909]  kasan_atomics+0xb8/0x2e8
[   30.066921]  kunit_try_run_case+0x170/0x3f0
[   30.068617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.069350]  kthread+0x318/0x620
[   30.069980]  ret_from_fork+0x10/0x20
[   30.070346] 
[   30.070575] The buggy address belongs to the object at fff00000c65edb80
[   30.070575]  which belongs to the cache kmalloc-64 of size 64
[   30.071438] The buggy address is located 0 bytes to the right of
[   30.071438]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.073513] 
[   30.073846] The buggy address belongs to the physical page:
[   30.074515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.076059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.077311] page_type: f5(slab)
[   30.077695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.078326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.079095] page dumped because: kasan: bad access detected
[   30.079571] 
[   30.079791] Memory state around the buggy address:
[   30.080442]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.081200]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.081731] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.082262]                                      ^
[   30.082656]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083225]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083823] ==================================================================
[   29.963773] ==================================================================
[   29.964539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.965896] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   29.966576] 
[   29.966960] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   29.967168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.967249] Hardware name: linux,dummy-virt (DT)
[   29.967348] Call trace:
[   29.967482]  show_stack+0x20/0x38 (C)
[   29.967634]  dump_stack_lvl+0x8c/0xd0
[   29.967759]  print_report+0x118/0x608
[   29.967923]  kasan_report+0xdc/0x128
[   29.968044]  kasan_check_range+0x100/0x1a8
[   29.968168]  __kasan_check_write+0x20/0x30
[   29.968286]  kasan_atomics_helper+0xff0/0x4858
[   29.968403]  kasan_atomics+0x198/0x2e8
[   29.968514]  kunit_try_run_case+0x170/0x3f0
[   29.968623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.968747]  kthread+0x318/0x620
[   29.968855]  ret_from_fork+0x10/0x20
[   29.968992] 
[   29.978931] Allocated by task 254:
[   29.979320]  kasan_save_stack+0x3c/0x68
[   29.979700]  kasan_save_track+0x20/0x40
[   29.981252]  kasan_save_alloc_info+0x40/0x58
[   29.981943]  __kasan_kmalloc+0xd4/0xd8
[   29.982326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.982733]  kasan_atomics+0xb8/0x2e8
[   29.983148]  kunit_try_run_case+0x170/0x3f0
[   29.984820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.985793]  kthread+0x318/0x620
[   29.986536]  ret_from_fork+0x10/0x20
[   29.987239] 
[   29.987699] The buggy address belongs to the object at fff00000c65edb80
[   29.987699]  which belongs to the cache kmalloc-64 of size 64
[   29.990062] The buggy address is located 0 bytes to the right of
[   29.990062]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   29.991178] 
[   29.991432] The buggy address belongs to the physical page:
[   29.991848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   29.994240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.995159] page_type: f5(slab)
[   29.995592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.996343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.997371] page dumped because: kasan: bad access detected
[   29.998205] 
[   29.998606] Memory state around the buggy address:
[   29.999519]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.000595]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.001761] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.002635]                                      ^
[   30.003084]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.004432]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.005338] ==================================================================
[   30.699670] ==================================================================
[   30.700623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.701287] Write of size 8 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   30.702319] 
[   30.702668] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   30.702989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.703074] Hardware name: linux,dummy-virt (DT)
[   30.703235] Call trace:
[   30.703300]  show_stack+0x20/0x38 (C)
[   30.703412]  dump_stack_lvl+0x8c/0xd0
[   30.703527]  print_report+0x118/0x608
[   30.703648]  kasan_report+0xdc/0x128
[   30.703789]  kasan_check_range+0x100/0x1a8
[   30.703939]  __kasan_check_write+0x20/0x30
[   30.704081]  kasan_atomics_helper+0x175c/0x4858
[   30.704179]  kasan_atomics+0x198/0x2e8
[   30.704241]  kunit_try_run_case+0x170/0x3f0
[   30.704302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.704367]  kthread+0x318/0x620
[   30.704422]  ret_from_fork+0x10/0x20
[   30.704485] 
[   30.711531] Allocated by task 254:
[   30.712068]  kasan_save_stack+0x3c/0x68
[   30.712646]  kasan_save_track+0x20/0x40
[   30.713381]  kasan_save_alloc_info+0x40/0x58
[   30.714102]  __kasan_kmalloc+0xd4/0xd8
[   30.714685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.715380]  kasan_atomics+0xb8/0x2e8
[   30.716098]  kunit_try_run_case+0x170/0x3f0
[   30.716686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.717470]  kthread+0x318/0x620
[   30.718040]  ret_from_fork+0x10/0x20
[   30.718627] 
[   30.719028] The buggy address belongs to the object at fff00000c65edb80
[   30.719028]  which belongs to the cache kmalloc-64 of size 64
[   30.720308] The buggy address is located 0 bytes to the right of
[   30.720308]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   30.721542] 
[   30.721874] The buggy address belongs to the physical page:
[   30.722483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   30.723392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.724206] page_type: f5(slab)
[   30.724652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.725420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.726147] page dumped because: kasan: bad access detected
[   30.726813] 
[   30.727467] Memory state around the buggy address:
[   30.728156]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.728488]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.728802] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.729136]                                      ^
[   30.729385]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.729699]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.730033] ==================================================================
[   28.814292] ==================================================================
[   28.815605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   28.817443] Read of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   28.819692] 
[   28.820009] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   28.820216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.820287] Hardware name: linux,dummy-virt (DT)
[   28.820376] Call trace:
[   28.820439]  show_stack+0x20/0x38 (C)
[   28.820578]  dump_stack_lvl+0x8c/0xd0
[   28.820708]  print_report+0x118/0x608
[   28.820837]  kasan_report+0xdc/0x128
[   28.821715]  __asan_report_load4_noabort+0x20/0x30
[   28.821843]  kasan_atomics_helper+0x42d8/0x4858
[   28.822046]  kasan_atomics+0x198/0x2e8
[   28.822190]  kunit_try_run_case+0x170/0x3f0
[   28.822327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.822466]  kthread+0x318/0x620
[   28.822598]  ret_from_fork+0x10/0x20
[   28.822719] 
[   28.834747] Allocated by task 254:
[   28.835180]  kasan_save_stack+0x3c/0x68
[   28.835564]  kasan_save_track+0x20/0x40
[   28.836478]  kasan_save_alloc_info+0x40/0x58
[   28.838561]  __kasan_kmalloc+0xd4/0xd8
[   28.839314]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.840526]  kasan_atomics+0xb8/0x2e8
[   28.841811]  kunit_try_run_case+0x170/0x3f0
[   28.842631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.843626]  kthread+0x318/0x620
[   28.844867]  ret_from_fork+0x10/0x20
[   28.846089] 
[   28.846362] The buggy address belongs to the object at fff00000c65edb80
[   28.846362]  which belongs to the cache kmalloc-64 of size 64
[   28.848730] The buggy address is located 0 bytes to the right of
[   28.848730]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   28.850983] 
[   28.851218] The buggy address belongs to the physical page:
[   28.851616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.853687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.855714] page_type: f5(slab)
[   28.856612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.858015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.859551] page dumped because: kasan: bad access detected
[   28.861408] 
[   28.861752] Memory state around the buggy address:
[   28.863407]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.864618]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.866816] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.867686]                                      ^
[   28.869078]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.869780]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.870411] ==================================================================
[   27.963527] ==================================================================
[   27.965834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   27.968672] Write of size 4 at addr fff00000c65edbb0 by task kunit_try_catch/254
[   27.970573] 
[   27.971501] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   27.971705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.971775] Hardware name: linux,dummy-virt (DT)
[   27.971856] Call trace:
[   27.971936]  show_stack+0x20/0x38 (C)
[   27.972069]  dump_stack_lvl+0x8c/0xd0
[   27.972187]  print_report+0x118/0x608
[   27.972305]  kasan_report+0xdc/0x128
[   27.972421]  kasan_check_range+0x100/0x1a8
[   27.972535]  __kasan_check_write+0x20/0x30
[   27.972647]  kasan_atomics_helper+0x24c/0x4858
[   27.972770]  kasan_atomics+0x198/0x2e8
[   27.972901]  kunit_try_run_case+0x170/0x3f0
[   27.973085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.973234]  kthread+0x318/0x620
[   27.973353]  ret_from_fork+0x10/0x20
[   27.973478] 
[   27.985454] Allocated by task 254:
[   27.986365]  kasan_save_stack+0x3c/0x68
[   27.987163]  kasan_save_track+0x20/0x40
[   27.987867]  kasan_save_alloc_info+0x40/0x58
[   27.988640]  __kasan_kmalloc+0xd4/0xd8
[   27.989762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   27.990899]  kasan_atomics+0xb8/0x2e8
[   27.991659]  kunit_try_run_case+0x170/0x3f0
[   27.992430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.993560]  kthread+0x318/0x620
[   27.993975]  ret_from_fork+0x10/0x20
[   27.994358] 
[   27.994599] The buggy address belongs to the object at fff00000c65edb80
[   27.994599]  which belongs to the cache kmalloc-64 of size 64
[   27.996613] The buggy address is located 0 bytes to the right of
[   27.996613]  allocated 48-byte region [fff00000c65edb80, fff00000c65edbb0)
[   27.998934] 
[   27.999399] The buggy address belongs to the physical page:
[   28.000433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ed
[   28.002056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.003348] page_type: f5(slab)
[   28.004032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   28.004962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.006580] page dumped because: kasan: bad access detected
[   28.007458] 
[   28.007701] Memory state around the buggy address:
[   28.008421]  fff00000c65eda80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.010144]  fff00000c65edb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.011294] >fff00000c65edb80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.012071]                                      ^
[   28.013105]  fff00000c65edc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.014420]  fff00000c65edc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.015662] ==================================================================

[   21.494962] ==================================================================
[   21.495325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   21.496736] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.497029] 
[   21.497768] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.497903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.497939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.497992] Call Trace:
[   21.498034]  <TASK>
[   21.498074]  dump_stack_lvl+0x73/0xb0
[   21.498140]  print_report+0xd1/0x650
[   21.498175]  ? __virt_addr_valid+0x1db/0x2d0
[   21.498209]  ? kasan_atomics_helper+0x7c8/0x5450
[   21.498240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.498274]  ? kasan_atomics_helper+0x7c8/0x5450
[   21.498313]  kasan_report+0x140/0x180
[   21.498367]  ? kasan_atomics_helper+0x7c8/0x5450
[   21.498433]  kasan_check_range+0x10c/0x1c0
[   21.498493]  __kasan_check_write+0x18/0x20
[   21.498549]  kasan_atomics_helper+0x7c8/0x5450
[   21.498623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.498686]  ? kasan_save_alloc_info+0x3b/0x50
[   21.498746]  ? kasan_save_track+0x18/0x40
[   21.498813]  kasan_atomics+0x1dd/0x310
[   21.498894]  ? __pfx_kasan_atomics+0x10/0x10
[   21.498953]  ? __pfx_read_tsc+0x10/0x10
[   21.498987]  ? ktime_get_ts64+0x86/0x230
[   21.499025]  kunit_try_run_case+0x1a6/0x480
[   21.499059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.499089]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.499124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.499155]  ? __kthread_parkme+0x82/0x160
[   21.499187]  ? preempt_count_sub+0x50/0x80
[   21.499221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.499253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.499288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.499321]  kthread+0x324/0x6e0
[   21.499351]  ? trace_preempt_on+0x20/0xc0
[   21.499396]  ? __pfx_kthread+0x10/0x10
[   21.499461]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.499527]  ? calculate_sigpending+0x7b/0xa0
[   21.499577]  ? __pfx_kthread+0x10/0x10
[   21.499629]  ret_from_fork+0x41/0x80
[   21.499677]  ? __pfx_kthread+0x10/0x10
[   21.499741]  ret_from_fork_asm+0x1a/0x30
[   21.499813]  </TASK>
[   21.499840] 
[   21.516159] Allocated by task 273:
[   21.516791]  kasan_save_stack+0x45/0x70
[   21.517222]  kasan_save_track+0x18/0x40
[   21.517709]  kasan_save_alloc_info+0x3b/0x50
[   21.518173]  __kasan_kmalloc+0xb7/0xc0
[   21.519044]  __kmalloc_cache_noprof+0x18a/0x420
[   21.519583]  kasan_atomics+0x96/0x310
[   21.519872]  kunit_try_run_case+0x1a6/0x480
[   21.520406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.521090]  kthread+0x324/0x6e0
[   21.521620]  ret_from_fork+0x41/0x80
[   21.521947]  ret_from_fork_asm+0x1a/0x30
[   21.522553] 
[   21.523026] The buggy address belongs to the object at ffff888102993400
[   21.523026]  which belongs to the cache kmalloc-64 of size 64
[   21.524484] The buggy address is located 0 bytes to the right of
[   21.524484]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.525887] 
[   21.526058] The buggy address belongs to the physical page:
[   21.526415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.527927] flags: 0x200000000000000(node=0|zone=2)
[   21.528249] page_type: f5(slab)
[   21.529001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.529495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.530491] page dumped because: kasan: bad access detected
[   21.530934] 
[   21.531145] Memory state around the buggy address:
[   21.531787]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.532323]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.533102] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.534041]                                      ^
[   21.534405]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.535345]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.536079] ==================================================================
[   22.339308] ==================================================================
[   22.339839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   22.340612] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.341372] 
[   22.341627] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.341733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.341772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.341829] Call Trace:
[   22.341891]  <TASK>
[   22.341940]  dump_stack_lvl+0x73/0xb0
[   22.342017]  print_report+0xd1/0x650
[   22.342082]  ? __virt_addr_valid+0x1db/0x2d0
[   22.342156]  ? kasan_atomics_helper+0x49d0/0x5450
[   22.342233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.342304]  ? kasan_atomics_helper+0x49d0/0x5450
[   22.342366]  kasan_report+0x140/0x180
[   22.342433]  ? kasan_atomics_helper+0x49d0/0x5450
[   22.342506]  __asan_report_load4_noabort+0x18/0x20
[   22.342573]  kasan_atomics_helper+0x49d0/0x5450
[   22.342635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.342691]  ? kasan_save_alloc_info+0x3b/0x50
[   22.342739]  ? kasan_save_track+0x18/0x40
[   22.342773]  kasan_atomics+0x1dd/0x310
[   22.342806]  ? __pfx_kasan_atomics+0x10/0x10
[   22.342838]  ? __pfx_read_tsc+0x10/0x10
[   22.342891]  ? ktime_get_ts64+0x86/0x230
[   22.342929]  kunit_try_run_case+0x1a6/0x480
[   22.342962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.342991]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.343027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.343059]  ? __kthread_parkme+0x82/0x160
[   22.343091]  ? preempt_count_sub+0x50/0x80
[   22.343124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.343156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.343190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.343225]  kthread+0x324/0x6e0
[   22.343254]  ? trace_preempt_on+0x20/0xc0
[   22.343287]  ? __pfx_kthread+0x10/0x10
[   22.343331]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.343364]  ? calculate_sigpending+0x7b/0xa0
[   22.343395]  ? __pfx_kthread+0x10/0x10
[   22.343425]  ret_from_fork+0x41/0x80
[   22.343452]  ? __pfx_kthread+0x10/0x10
[   22.343482]  ret_from_fork_asm+0x1a/0x30
[   22.343525]  </TASK>
[   22.343540] 
[   22.359280] Allocated by task 273:
[   22.359657]  kasan_save_stack+0x45/0x70
[   22.360735]  kasan_save_track+0x18/0x40
[   22.361059]  kasan_save_alloc_info+0x3b/0x50
[   22.361349]  __kasan_kmalloc+0xb7/0xc0
[   22.361648]  __kmalloc_cache_noprof+0x18a/0x420
[   22.362000]  kasan_atomics+0x96/0x310
[   22.362383]  kunit_try_run_case+0x1a6/0x480
[   22.362687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.363201]  kthread+0x324/0x6e0
[   22.364123]  ret_from_fork+0x41/0x80
[   22.364336]  ret_from_fork_asm+0x1a/0x30
[   22.364912] 
[   22.365225] The buggy address belongs to the object at ffff888102993400
[   22.365225]  which belongs to the cache kmalloc-64 of size 64
[   22.366160] The buggy address is located 0 bytes to the right of
[   22.366160]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.367138] 
[   22.367620] The buggy address belongs to the physical page:
[   22.368120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.368737] flags: 0x200000000000000(node=0|zone=2)
[   22.369000] page_type: f5(slab)
[   22.369228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.370017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.370481] page dumped because: kasan: bad access detected
[   22.370935] 
[   22.371145] Memory state around the buggy address:
[   22.371558]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.372371]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.372824] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.373234]                                      ^
[   22.373726]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.374798]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.375317] ==================================================================
[   22.487833] ==================================================================
[   22.488219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   22.488980] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.489578] 
[   22.489758] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.489886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.489945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.490003] Call Trace:
[   22.490048]  <TASK>
[   22.490095]  dump_stack_lvl+0x73/0xb0
[   22.490169]  print_report+0xd1/0x650
[   22.490234]  ? __virt_addr_valid+0x1db/0x2d0
[   22.490339]  ? kasan_atomics_helper+0x50d6/0x5450
[   22.490402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.490470]  ? kasan_atomics_helper+0x50d6/0x5450
[   22.490538]  kasan_report+0x140/0x180
[   22.490624]  ? kasan_atomics_helper+0x50d6/0x5450
[   22.490692]  __asan_report_store8_noabort+0x1b/0x30
[   22.490755]  kasan_atomics_helper+0x50d6/0x5450
[   22.490816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.490917]  ? kasan_save_alloc_info+0x3b/0x50
[   22.490983]  ? kasan_save_track+0x18/0x40
[   22.491042]  kasan_atomics+0x1dd/0x310
[   22.491102]  ? __pfx_kasan_atomics+0x10/0x10
[   22.491161]  ? __pfx_read_tsc+0x10/0x10
[   22.491235]  ? ktime_get_ts64+0x86/0x230
[   22.491360]  kunit_try_run_case+0x1a6/0x480
[   22.491430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.491498]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.491585]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.491651]  ? __kthread_parkme+0x82/0x160
[   22.491718]  ? preempt_count_sub+0x50/0x80
[   22.491762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.491797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.491836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.491892]  kthread+0x324/0x6e0
[   22.491922]  ? trace_preempt_on+0x20/0xc0
[   22.491956]  ? __pfx_kthread+0x10/0x10
[   22.491986]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.492019]  ? calculate_sigpending+0x7b/0xa0
[   22.492050]  ? __pfx_kthread+0x10/0x10
[   22.492080]  ret_from_fork+0x41/0x80
[   22.492107]  ? __pfx_kthread+0x10/0x10
[   22.492136]  ret_from_fork_asm+0x1a/0x30
[   22.492180]  </TASK>
[   22.492195] 
[   22.504576] Allocated by task 273:
[   22.504900]  kasan_save_stack+0x45/0x70
[   22.505349]  kasan_save_track+0x18/0x40
[   22.505645]  kasan_save_alloc_info+0x3b/0x50
[   22.506068]  __kasan_kmalloc+0xb7/0xc0
[   22.506486]  __kmalloc_cache_noprof+0x18a/0x420
[   22.506768]  kasan_atomics+0x96/0x310
[   22.507280]  kunit_try_run_case+0x1a6/0x480
[   22.507904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.508486]  kthread+0x324/0x6e0
[   22.508819]  ret_from_fork+0x41/0x80
[   22.509118]  ret_from_fork_asm+0x1a/0x30
[   22.509450] 
[   22.509631] The buggy address belongs to the object at ffff888102993400
[   22.509631]  which belongs to the cache kmalloc-64 of size 64
[   22.510500] The buggy address is located 0 bytes to the right of
[   22.510500]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.511306] 
[   22.511465] The buggy address belongs to the physical page:
[   22.511754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.512544] flags: 0x200000000000000(node=0|zone=2)
[   22.513207] page_type: f5(slab)
[   22.513711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.514334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.514756] page dumped because: kasan: bad access detected
[   22.515205] 
[   22.515442] Memory state around the buggy address:
[   22.515921]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.516580]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.517082] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.517722]                                      ^
[   22.518086]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.518668]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.519167] ==================================================================
[   22.049893] ==================================================================
[   22.050544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   22.051011] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.051383] 
[   22.051672] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.051796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.051833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.051907] Call Trace:
[   22.051954]  <TASK>
[   22.052001]  dump_stack_lvl+0x73/0xb0
[   22.052084]  print_report+0xd1/0x650
[   22.052152]  ? __virt_addr_valid+0x1db/0x2d0
[   22.052220]  ? kasan_atomics_helper+0x4a38/0x5450
[   22.052282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.052346]  ? kasan_atomics_helper+0x4a38/0x5450
[   22.052400]  kasan_report+0x140/0x180
[   22.052462]  ? kasan_atomics_helper+0x4a38/0x5450
[   22.052533]  __asan_report_load4_noabort+0x18/0x20
[   22.052602]  kasan_atomics_helper+0x4a38/0x5450
[   22.052666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.052733]  ? kasan_save_alloc_info+0x3b/0x50
[   22.052796]  ? kasan_save_track+0x18/0x40
[   22.052881]  kasan_atomics+0x1dd/0x310
[   22.052947]  ? __pfx_kasan_atomics+0x10/0x10
[   22.053019]  ? __pfx_read_tsc+0x10/0x10
[   22.053083]  ? ktime_get_ts64+0x86/0x230
[   22.053155]  kunit_try_run_case+0x1a6/0x480
[   22.053226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.053288]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.053353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.053417]  ? __kthread_parkme+0x82/0x160
[   22.053483]  ? preempt_count_sub+0x50/0x80
[   22.053554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.053623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.053697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.053770]  kthread+0x324/0x6e0
[   22.053829]  ? trace_preempt_on+0x20/0xc0
[   22.053914]  ? __pfx_kthread+0x10/0x10
[   22.053977]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.054042]  ? calculate_sigpending+0x7b/0xa0
[   22.054108]  ? __pfx_kthread+0x10/0x10
[   22.054172]  ret_from_fork+0x41/0x80
[   22.054229]  ? __pfx_kthread+0x10/0x10
[   22.054283]  ret_from_fork_asm+0x1a/0x30
[   22.054358]  </TASK>
[   22.054390] 
[   22.072949] Allocated by task 273:
[   22.073215]  kasan_save_stack+0x45/0x70
[   22.074098]  kasan_save_track+0x18/0x40
[   22.074753]  kasan_save_alloc_info+0x3b/0x50
[   22.075160]  __kasan_kmalloc+0xb7/0xc0
[   22.075590]  __kmalloc_cache_noprof+0x18a/0x420
[   22.076266]  kasan_atomics+0x96/0x310
[   22.076658]  kunit_try_run_case+0x1a6/0x480
[   22.077208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.077735]  kthread+0x324/0x6e0
[   22.077994]  ret_from_fork+0x41/0x80
[   22.078235]  ret_from_fork_asm+0x1a/0x30
[   22.078603] 
[   22.078738] The buggy address belongs to the object at ffff888102993400
[   22.078738]  which belongs to the cache kmalloc-64 of size 64
[   22.080254] The buggy address is located 0 bytes to the right of
[   22.080254]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.081430] 
[   22.081691] The buggy address belongs to the physical page:
[   22.082204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.082973] flags: 0x200000000000000(node=0|zone=2)
[   22.083376] page_type: f5(slab)
[   22.083706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.084211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.085543] page dumped because: kasan: bad access detected
[   22.085912] 
[   22.086067] Memory state around the buggy address:
[   22.086803]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.087457]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.087913] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.088942]                                      ^
[   22.089267]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.089679]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.090100] ==================================================================
[   21.365031] ==================================================================
[   21.365405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   21.366607] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.367278] 
[   21.367522] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.367639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.367674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.367737] Call Trace:
[   21.367781]  <TASK>
[   21.367825]  dump_stack_lvl+0x73/0xb0
[   21.368293]  print_report+0xd1/0x650
[   21.368382]  ? __virt_addr_valid+0x1db/0x2d0
[   21.368446]  ? kasan_atomics_helper+0x5ff/0x5450
[   21.368504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.368568]  ? kasan_atomics_helper+0x5ff/0x5450
[   21.368629]  kasan_report+0x140/0x180
[   21.368693]  ? kasan_atomics_helper+0x5ff/0x5450
[   21.368766]  kasan_check_range+0x10c/0x1c0
[   21.368831]  __kasan_check_write+0x18/0x20
[   21.368914]  kasan_atomics_helper+0x5ff/0x5450
[   21.368951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.368984]  ? kasan_save_alloc_info+0x3b/0x50
[   21.369014]  ? kasan_save_track+0x18/0x40
[   21.369047]  kasan_atomics+0x1dd/0x310
[   21.369077]  ? __pfx_kasan_atomics+0x10/0x10
[   21.369109]  ? __pfx_read_tsc+0x10/0x10
[   21.369139]  ? ktime_get_ts64+0x86/0x230
[   21.369175]  kunit_try_run_case+0x1a6/0x480
[   21.369209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.369238]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.369271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.369314]  ? __kthread_parkme+0x82/0x160
[   21.369366]  ? preempt_count_sub+0x50/0x80
[   21.369424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.369478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.369536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.369593]  kthread+0x324/0x6e0
[   21.369641]  ? trace_preempt_on+0x20/0xc0
[   21.369699]  ? __pfx_kthread+0x10/0x10
[   21.369749]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.369805]  ? calculate_sigpending+0x7b/0xa0
[   21.369876]  ? __pfx_kthread+0x10/0x10
[   21.369912]  ret_from_fork+0x41/0x80
[   21.369940]  ? __pfx_kthread+0x10/0x10
[   21.369971]  ret_from_fork_asm+0x1a/0x30
[   21.370016]  </TASK>
[   21.370032] 
[   21.387543] Allocated by task 273:
[   21.388004]  kasan_save_stack+0x45/0x70
[   21.388744]  kasan_save_track+0x18/0x40
[   21.389608]  kasan_save_alloc_info+0x3b/0x50
[   21.390061]  __kasan_kmalloc+0xb7/0xc0
[   21.390831]  __kmalloc_cache_noprof+0x18a/0x420
[   21.391576]  kasan_atomics+0x96/0x310
[   21.392139]  kunit_try_run_case+0x1a6/0x480
[   21.392690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.393382]  kthread+0x324/0x6e0
[   21.394250]  ret_from_fork+0x41/0x80
[   21.394645]  ret_from_fork_asm+0x1a/0x30
[   21.395234] 
[   21.395463] The buggy address belongs to the object at ffff888102993400
[   21.395463]  which belongs to the cache kmalloc-64 of size 64
[   21.396583] The buggy address is located 0 bytes to the right of
[   21.396583]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.397720] 
[   21.397903] The buggy address belongs to the physical page:
[   21.398946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.399493] flags: 0x200000000000000(node=0|zone=2)
[   21.400093] page_type: f5(slab)
[   21.400520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.401276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.401939] page dumped because: kasan: bad access detected
[   21.402413] 
[   21.402989] Memory state around the buggy address:
[   21.403373]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.404423]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.404942] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.405641]                                      ^
[   21.406121]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.407132]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.407611] ==================================================================
[   22.158315] ==================================================================
[   22.159086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   22.160050] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.160698] 
[   22.160878] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.160981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.161014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.161065] Call Trace:
[   22.161106]  <TASK>
[   22.161148]  dump_stack_lvl+0x73/0xb0
[   22.161230]  print_report+0xd1/0x650
[   22.161332]  ? __virt_addr_valid+0x1db/0x2d0
[   22.161403]  ? kasan_atomics_helper+0x1149/0x5450
[   22.161464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.161527]  ? kasan_atomics_helper+0x1149/0x5450
[   22.161586]  kasan_report+0x140/0x180
[   22.161641]  ? kasan_atomics_helper+0x1149/0x5450
[   22.161712]  kasan_check_range+0x10c/0x1c0
[   22.161780]  __kasan_check_write+0x18/0x20
[   22.161844]  kasan_atomics_helper+0x1149/0x5450
[   22.161902]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.161935]  ? kasan_save_alloc_info+0x3b/0x50
[   22.161966]  ? kasan_save_track+0x18/0x40
[   22.161998]  kasan_atomics+0x1dd/0x310
[   22.162028]  ? __pfx_kasan_atomics+0x10/0x10
[   22.162060]  ? __pfx_read_tsc+0x10/0x10
[   22.162092]  ? ktime_get_ts64+0x86/0x230
[   22.162127]  kunit_try_run_case+0x1a6/0x480
[   22.162160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.162189]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.162224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.162256]  ? __kthread_parkme+0x82/0x160
[   22.162301]  ? preempt_count_sub+0x50/0x80
[   22.162348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.162381]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.162418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.162454]  kthread+0x324/0x6e0
[   22.162483]  ? trace_preempt_on+0x20/0xc0
[   22.162517]  ? __pfx_kthread+0x10/0x10
[   22.162547]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.162579]  ? calculate_sigpending+0x7b/0xa0
[   22.162610]  ? __pfx_kthread+0x10/0x10
[   22.162640]  ret_from_fork+0x41/0x80
[   22.162666]  ? __pfx_kthread+0x10/0x10
[   22.162695]  ret_from_fork_asm+0x1a/0x30
[   22.162738]  </TASK>
[   22.162753] 
[   22.178322] Allocated by task 273:
[   22.178788]  kasan_save_stack+0x45/0x70
[   22.179266]  kasan_save_track+0x18/0x40
[   22.179528]  kasan_save_alloc_info+0x3b/0x50
[   22.180189]  __kasan_kmalloc+0xb7/0xc0
[   22.180756]  __kmalloc_cache_noprof+0x18a/0x420
[   22.181103]  kasan_atomics+0x96/0x310
[   22.181602]  kunit_try_run_case+0x1a6/0x480
[   22.182260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.182630]  kthread+0x324/0x6e0
[   22.182888]  ret_from_fork+0x41/0x80
[   22.183105]  ret_from_fork_asm+0x1a/0x30
[   22.183880] 
[   22.184015] The buggy address belongs to the object at ffff888102993400
[   22.184015]  which belongs to the cache kmalloc-64 of size 64
[   22.185536] The buggy address is located 0 bytes to the right of
[   22.185536]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.186488] 
[   22.186725] The buggy address belongs to the physical page:
[   22.187055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.187751] flags: 0x200000000000000(node=0|zone=2)
[   22.188163] page_type: f5(slab)
[   22.188464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.189641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.190167] page dumped because: kasan: bad access detected
[   22.190705] 
[   22.191030] Memory state around the buggy address:
[   22.191622]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.191970]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.192623] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.193127]                                      ^
[   22.193543]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.194032]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.194606] ==================================================================
[   22.971809] ==================================================================
[   22.972263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   22.972709] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.973439] 
[   22.973727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.973838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.973893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.973948] Call Trace:
[   22.973996]  <TASK>
[   22.974040]  dump_stack_lvl+0x73/0xb0
[   22.974118]  print_report+0xd1/0x650
[   22.974183]  ? __virt_addr_valid+0x1db/0x2d0
[   22.974248]  ? kasan_atomics_helper+0x1c19/0x5450
[   22.974309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.974381]  ? kasan_atomics_helper+0x1c19/0x5450
[   22.974444]  kasan_report+0x140/0x180
[   22.974527]  ? kasan_atomics_helper+0x1c19/0x5450
[   22.974600]  kasan_check_range+0x10c/0x1c0
[   22.974668]  __kasan_check_write+0x18/0x20
[   22.974733]  kasan_atomics_helper+0x1c19/0x5450
[   22.974798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.974878]  ? kasan_save_alloc_info+0x3b/0x50
[   22.974944]  ? kasan_save_track+0x18/0x40
[   22.975009]  kasan_atomics+0x1dd/0x310
[   22.975067]  ? __pfx_kasan_atomics+0x10/0x10
[   22.975131]  ? __pfx_read_tsc+0x10/0x10
[   22.975216]  ? ktime_get_ts64+0x86/0x230
[   22.975290]  kunit_try_run_case+0x1a6/0x480
[   22.975354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.975411]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.975506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.975574]  ? __kthread_parkme+0x82/0x160
[   22.975640]  ? preempt_count_sub+0x50/0x80
[   22.975718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.975779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.975835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.975894]  kthread+0x324/0x6e0
[   22.975926]  ? trace_preempt_on+0x20/0xc0
[   22.975961]  ? __pfx_kthread+0x10/0x10
[   22.975992]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.976024]  ? calculate_sigpending+0x7b/0xa0
[   22.976054]  ? __pfx_kthread+0x10/0x10
[   22.976085]  ret_from_fork+0x41/0x80
[   22.976112]  ? __pfx_kthread+0x10/0x10
[   22.976141]  ret_from_fork_asm+0x1a/0x30
[   22.976183]  </TASK>
[   22.976199] 
[   22.990277] Allocated by task 273:
[   22.990581]  kasan_save_stack+0x45/0x70
[   22.990869]  kasan_save_track+0x18/0x40
[   22.991418]  kasan_save_alloc_info+0x3b/0x50
[   22.992070]  __kasan_kmalloc+0xb7/0xc0
[   22.992563]  __kmalloc_cache_noprof+0x18a/0x420
[   22.993117]  kasan_atomics+0x96/0x310
[   22.994036]  kunit_try_run_case+0x1a6/0x480
[   22.994410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.995094]  kthread+0x324/0x6e0
[   22.995711]  ret_from_fork+0x41/0x80
[   22.996214]  ret_from_fork_asm+0x1a/0x30
[   22.996714] 
[   22.996962] The buggy address belongs to the object at ffff888102993400
[   22.996962]  which belongs to the cache kmalloc-64 of size 64
[   22.997666] The buggy address is located 0 bytes to the right of
[   22.997666]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.999196] 
[   22.999371] The buggy address belongs to the physical page:
[   22.999634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.000598] flags: 0x200000000000000(node=0|zone=2)
[   23.001214] page_type: f5(slab)
[   23.001666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.002001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.002965] page dumped because: kasan: bad access detected
[   23.003626] 
[   23.004034] Memory state around the buggy address:
[   23.004293]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.004948]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.005664] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.006497]                                      ^
[   23.007058]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.007478]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.008154] ==================================================================
[   23.072611] ==================================================================
[   23.073272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   23.074056] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.074685] 
[   23.075007] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.075111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.075147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.075200] Call Trace:
[   23.075246]  <TASK>
[   23.075289]  dump_stack_lvl+0x73/0xb0
[   23.075364]  print_report+0xd1/0x650
[   23.075429]  ? __virt_addr_valid+0x1db/0x2d0
[   23.075494]  ? kasan_atomics_helper+0x1d7b/0x5450
[   23.075555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.075624]  ? kasan_atomics_helper+0x1d7b/0x5450
[   23.075695]  kasan_report+0x140/0x180
[   23.075761]  ? kasan_atomics_helper+0x1d7b/0x5450
[   23.075835]  kasan_check_range+0x10c/0x1c0
[   23.075922]  __kasan_check_write+0x18/0x20
[   23.075986]  kasan_atomics_helper+0x1d7b/0x5450
[   23.076051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.076116]  ? kasan_save_alloc_info+0x3b/0x50
[   23.076180]  ? kasan_save_track+0x18/0x40
[   23.076248]  kasan_atomics+0x1dd/0x310
[   23.076310]  ? __pfx_kasan_atomics+0x10/0x10
[   23.076372]  ? __pfx_read_tsc+0x10/0x10
[   23.076429]  ? ktime_get_ts64+0x86/0x230
[   23.076502]  kunit_try_run_case+0x1a6/0x480
[   23.076571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.076627]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.076698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.076763]  ? __kthread_parkme+0x82/0x160
[   23.076829]  ? preempt_count_sub+0x50/0x80
[   23.076913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.076975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.077046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.077113]  kthread+0x324/0x6e0
[   23.077169]  ? trace_preempt_on+0x20/0xc0
[   23.077230]  ? __pfx_kthread+0x10/0x10
[   23.077289]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.077358]  ? calculate_sigpending+0x7b/0xa0
[   23.077409]  ? __pfx_kthread+0x10/0x10
[   23.077463]  ret_from_fork+0x41/0x80
[   23.077514]  ? __pfx_kthread+0x10/0x10
[   23.077573]  ret_from_fork_asm+0x1a/0x30
[   23.077659]  </TASK>
[   23.077691] 
[   23.092959] Allocated by task 273:
[   23.093451]  kasan_save_stack+0x45/0x70
[   23.093951]  kasan_save_track+0x18/0x40
[   23.094380]  kasan_save_alloc_info+0x3b/0x50
[   23.094860]  __kasan_kmalloc+0xb7/0xc0
[   23.095303]  __kmalloc_cache_noprof+0x18a/0x420
[   23.095819]  kasan_atomics+0x96/0x310
[   23.096270]  kunit_try_run_case+0x1a6/0x480
[   23.096748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.097238]  kthread+0x324/0x6e0
[   23.097807]  ret_from_fork+0x41/0x80
[   23.098141]  ret_from_fork_asm+0x1a/0x30
[   23.098602] 
[   23.099114] The buggy address belongs to the object at ffff888102993400
[   23.099114]  which belongs to the cache kmalloc-64 of size 64
[   23.099925] The buggy address is located 0 bytes to the right of
[   23.099925]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.101013] 
[   23.101100] The buggy address belongs to the physical page:
[   23.101244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.101932] flags: 0x200000000000000(node=0|zone=2)
[   23.102248] page_type: f5(slab)
[   23.103145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.103971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.104583] page dumped because: kasan: bad access detected
[   23.105094] 
[   23.105618] Memory state around the buggy address:
[   23.105864]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.106096]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.106269] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.106871]                                      ^
[   23.107339]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.108197]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.108935] ==================================================================
[   23.426322] ==================================================================
[   23.426931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   23.427584] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.428011] 
[   23.428283] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.428417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.428449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.428524] Call Trace:
[   23.428592]  <TASK>
[   23.428653]  dump_stack_lvl+0x73/0xb0
[   23.428760]  print_report+0xd1/0x650
[   23.428822]  ? __virt_addr_valid+0x1db/0x2d0
[   23.428879]  ? kasan_atomics_helper+0x4fa7/0x5450
[   23.428912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.428948]  ? kasan_atomics_helper+0x4fa7/0x5450
[   23.428994]  kasan_report+0x140/0x180
[   23.429049]  ? kasan_atomics_helper+0x4fa7/0x5450
[   23.429116]  __asan_report_load8_noabort+0x18/0x20
[   23.429192]  kasan_atomics_helper+0x4fa7/0x5450
[   23.429275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.429333]  ? kasan_save_alloc_info+0x3b/0x50
[   23.429399]  ? kasan_save_track+0x18/0x40
[   23.429480]  kasan_atomics+0x1dd/0x310
[   23.429546]  ? __pfx_kasan_atomics+0x10/0x10
[   23.429613]  ? __pfx_read_tsc+0x10/0x10
[   23.429668]  ? ktime_get_ts64+0x86/0x230
[   23.429709]  kunit_try_run_case+0x1a6/0x480
[   23.429745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.429775]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.429811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.429860]  ? __kthread_parkme+0x82/0x160
[   23.429898]  ? preempt_count_sub+0x50/0x80
[   23.429932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.429964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.430000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.430035]  kthread+0x324/0x6e0
[   23.430064]  ? trace_preempt_on+0x20/0xc0
[   23.430098]  ? __pfx_kthread+0x10/0x10
[   23.430129]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.430161]  ? calculate_sigpending+0x7b/0xa0
[   23.430191]  ? __pfx_kthread+0x10/0x10
[   23.430221]  ret_from_fork+0x41/0x80
[   23.430248]  ? __pfx_kthread+0x10/0x10
[   23.430277]  ret_from_fork_asm+0x1a/0x30
[   23.430335]  </TASK>
[   23.430352] 
[   23.443409] Allocated by task 273:
[   23.443866]  kasan_save_stack+0x45/0x70
[   23.444311]  kasan_save_track+0x18/0x40
[   23.444564]  kasan_save_alloc_info+0x3b/0x50
[   23.444830]  __kasan_kmalloc+0xb7/0xc0
[   23.445109]  __kmalloc_cache_noprof+0x18a/0x420
[   23.445431]  kasan_atomics+0x96/0x310
[   23.445888]  kunit_try_run_case+0x1a6/0x480
[   23.446353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.446873]  kthread+0x324/0x6e0
[   23.447292]  ret_from_fork+0x41/0x80
[   23.447672]  ret_from_fork_asm+0x1a/0x30
[   23.448101] 
[   23.448319] The buggy address belongs to the object at ffff888102993400
[   23.448319]  which belongs to the cache kmalloc-64 of size 64
[   23.449016] The buggy address is located 0 bytes to the right of
[   23.449016]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.450143] 
[   23.450351] The buggy address belongs to the physical page:
[   23.450834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.451426] flags: 0x200000000000000(node=0|zone=2)
[   23.451739] page_type: f5(slab)
[   23.452021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.452816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.453280] page dumped because: kasan: bad access detected
[   23.453769] 
[   23.453961] Memory state around the buggy address:
[   23.454327]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.454736]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.455101] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.455562]                                      ^
[   23.456131]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.456734]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.457591] ==================================================================
[   22.091179] ==================================================================
[   22.091774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   22.092275] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.093005] 
[   22.093239] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.093410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.093441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.093483] Call Trace:
[   22.093524]  <TASK>
[   22.093560]  dump_stack_lvl+0x73/0xb0
[   22.093626]  print_report+0xd1/0x650
[   22.093675]  ? __virt_addr_valid+0x1db/0x2d0
[   22.093726]  ? kasan_atomics_helper+0x107a/0x5450
[   22.093806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.093894]  ? kasan_atomics_helper+0x107a/0x5450
[   22.093955]  kasan_report+0x140/0x180
[   22.094019]  ? kasan_atomics_helper+0x107a/0x5450
[   22.094091]  kasan_check_range+0x10c/0x1c0
[   22.094156]  __kasan_check_write+0x18/0x20
[   22.094214]  kasan_atomics_helper+0x107a/0x5450
[   22.094341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.094411]  ? kasan_save_alloc_info+0x3b/0x50
[   22.094472]  ? kasan_save_track+0x18/0x40
[   22.094540]  kasan_atomics+0x1dd/0x310
[   22.094632]  ? __pfx_kasan_atomics+0x10/0x10
[   22.094696]  ? __pfx_read_tsc+0x10/0x10
[   22.094755]  ? ktime_get_ts64+0x86/0x230
[   22.094825]  kunit_try_run_case+0x1a6/0x480
[   22.094910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.094996]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.095072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.095152]  ? __kthread_parkme+0x82/0x160
[   22.095210]  ? preempt_count_sub+0x50/0x80
[   22.095275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.095378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.095456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.095514]  kthread+0x324/0x6e0
[   22.095548]  ? trace_preempt_on+0x20/0xc0
[   22.095583]  ? __pfx_kthread+0x10/0x10
[   22.095614]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.095647]  ? calculate_sigpending+0x7b/0xa0
[   22.095688]  ? __pfx_kthread+0x10/0x10
[   22.095720]  ret_from_fork+0x41/0x80
[   22.095748]  ? __pfx_kthread+0x10/0x10
[   22.095777]  ret_from_fork_asm+0x1a/0x30
[   22.095820]  </TASK>
[   22.095836] 
[   22.108961] Allocated by task 273:
[   22.109417]  kasan_save_stack+0x45/0x70
[   22.109745]  kasan_save_track+0x18/0x40
[   22.110206]  kasan_save_alloc_info+0x3b/0x50
[   22.110665]  __kasan_kmalloc+0xb7/0xc0
[   22.111102]  __kmalloc_cache_noprof+0x18a/0x420
[   22.111546]  kasan_atomics+0x96/0x310
[   22.111974]  kunit_try_run_case+0x1a6/0x480
[   22.112478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.112914]  kthread+0x324/0x6e0
[   22.113280]  ret_from_fork+0x41/0x80
[   22.113742]  ret_from_fork_asm+0x1a/0x30
[   22.114028] 
[   22.114265] The buggy address belongs to the object at ffff888102993400
[   22.114265]  which belongs to the cache kmalloc-64 of size 64
[   22.115036] The buggy address is located 0 bytes to the right of
[   22.115036]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.115737] 
[   22.115952] The buggy address belongs to the physical page:
[   22.116492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.117240] flags: 0x200000000000000(node=0|zone=2)
[   22.117732] page_type: f5(slab)
[   22.118104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.118804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.119524] page dumped because: kasan: bad access detected
[   22.120195] 
[   22.121498] Memory state around the buggy address:
[   22.121969]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.122357]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.122698] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.123057]                                      ^
[   22.123316]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.123727]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.124323] ==================================================================
[   21.578263] ==================================================================
[   21.578935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   21.579797] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.580928] 
[   21.581141] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.581251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.581298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.581356] Call Trace:
[   21.581400]  <TASK>
[   21.581446]  dump_stack_lvl+0x73/0xb0
[   21.581527]  print_report+0xd1/0x650
[   21.581592]  ? __virt_addr_valid+0x1db/0x2d0
[   21.581657]  ? kasan_atomics_helper+0x8fa/0x5450
[   21.581717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.581786]  ? kasan_atomics_helper+0x8fa/0x5450
[   21.581984]  kasan_report+0x140/0x180
[   21.582090]  ? kasan_atomics_helper+0x8fa/0x5450
[   21.582190]  kasan_check_range+0x10c/0x1c0
[   21.582259]  __kasan_check_write+0x18/0x20
[   21.582359]  kasan_atomics_helper+0x8fa/0x5450
[   21.582414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.582478]  ? kasan_save_alloc_info+0x3b/0x50
[   21.582533]  ? kasan_save_track+0x18/0x40
[   21.582574]  kasan_atomics+0x1dd/0x310
[   21.582610]  ? __pfx_kasan_atomics+0x10/0x10
[   21.582642]  ? __pfx_read_tsc+0x10/0x10
[   21.582674]  ? ktime_get_ts64+0x86/0x230
[   21.582710]  kunit_try_run_case+0x1a6/0x480
[   21.582746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.582776]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.582810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.582843]  ? __kthread_parkme+0x82/0x160
[   21.582898]  ? preempt_count_sub+0x50/0x80
[   21.582933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.582965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.583000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.583035]  kthread+0x324/0x6e0
[   21.583064]  ? trace_preempt_on+0x20/0xc0
[   21.583097]  ? __pfx_kthread+0x10/0x10
[   21.583128]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.583159]  ? calculate_sigpending+0x7b/0xa0
[   21.583189]  ? __pfx_kthread+0x10/0x10
[   21.583218]  ret_from_fork+0x41/0x80
[   21.583245]  ? __pfx_kthread+0x10/0x10
[   21.583275]  ret_from_fork_asm+0x1a/0x30
[   21.583333]  </TASK>
[   21.583349] 
[   21.602284] Allocated by task 273:
[   21.602983]  kasan_save_stack+0x45/0x70
[   21.603414]  kasan_save_track+0x18/0x40
[   21.603846]  kasan_save_alloc_info+0x3b/0x50
[   21.604228]  __kasan_kmalloc+0xb7/0xc0
[   21.604579]  __kmalloc_cache_noprof+0x18a/0x420
[   21.605591]  kasan_atomics+0x96/0x310
[   21.605925]  kunit_try_run_case+0x1a6/0x480
[   21.606419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.607111]  kthread+0x324/0x6e0
[   21.607668]  ret_from_fork+0x41/0x80
[   21.608019]  ret_from_fork_asm+0x1a/0x30
[   21.608950] 
[   21.609169] The buggy address belongs to the object at ffff888102993400
[   21.609169]  which belongs to the cache kmalloc-64 of size 64
[   21.610197] The buggy address is located 0 bytes to the right of
[   21.610197]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.611593] 
[   21.611878] The buggy address belongs to the physical page:
[   21.612283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.613239] flags: 0x200000000000000(node=0|zone=2)
[   21.614049] page_type: f5(slab)
[   21.614618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.615223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.616059] page dumped because: kasan: bad access detected
[   21.616888] 
[   21.617026] Memory state around the buggy address:
[   21.617287]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.617863]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.618843] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.619355]                                      ^
[   21.620009]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.620933]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.621406] ==================================================================
[   22.678147] ==================================================================
[   22.678882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   22.679579] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.681010] 
[   22.681270] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.681407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.681439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.681491] Call Trace:
[   22.681529]  <TASK>
[   22.681569]  dump_stack_lvl+0x73/0xb0
[   22.681639]  print_report+0xd1/0x650
[   22.681694]  ? __virt_addr_valid+0x1db/0x2d0
[   22.681748]  ? kasan_atomics_helper+0x16e8/0x5450
[   22.681796]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.681873]  ? kasan_atomics_helper+0x16e8/0x5450
[   22.681925]  kasan_report+0x140/0x180
[   22.681977]  ? kasan_atomics_helper+0x16e8/0x5450
[   22.682037]  kasan_check_range+0x10c/0x1c0
[   22.682089]  __kasan_check_write+0x18/0x20
[   22.682140]  kasan_atomics_helper+0x16e8/0x5450
[   22.682191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.682242]  ? kasan_save_alloc_info+0x3b/0x50
[   22.682332]  ? kasan_save_track+0x18/0x40
[   22.682388]  kasan_atomics+0x1dd/0x310
[   22.682441]  ? __pfx_kasan_atomics+0x10/0x10
[   22.682491]  ? __pfx_read_tsc+0x10/0x10
[   22.682540]  ? ktime_get_ts64+0x86/0x230
[   22.682599]  kunit_try_run_case+0x1a6/0x480
[   22.682660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.682722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.682796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.682891]  ? __kthread_parkme+0x82/0x160
[   22.682957]  ? preempt_count_sub+0x50/0x80
[   22.683026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.683094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.683185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.683303]  kthread+0x324/0x6e0
[   22.683357]  ? trace_preempt_on+0x20/0xc0
[   22.683429]  ? __pfx_kthread+0x10/0x10
[   22.683495]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.683557]  ? calculate_sigpending+0x7b/0xa0
[   22.683615]  ? __pfx_kthread+0x10/0x10
[   22.683670]  ret_from_fork+0x41/0x80
[   22.683734]  ? __pfx_kthread+0x10/0x10
[   22.683790]  ret_from_fork_asm+0x1a/0x30
[   22.684843]  </TASK>
[   22.684920] 
[   22.704002] Allocated by task 273:
[   22.704494]  kasan_save_stack+0x45/0x70
[   22.704962]  kasan_save_track+0x18/0x40
[   22.705177]  kasan_save_alloc_info+0x3b/0x50
[   22.705615]  __kasan_kmalloc+0xb7/0xc0
[   22.705942]  __kmalloc_cache_noprof+0x18a/0x420
[   22.706353]  kasan_atomics+0x96/0x310
[   22.706646]  kunit_try_run_case+0x1a6/0x480
[   22.707109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.707474]  kthread+0x324/0x6e0
[   22.707875]  ret_from_fork+0x41/0x80
[   22.708281]  ret_from_fork_asm+0x1a/0x30
[   22.708766] 
[   22.708953] The buggy address belongs to the object at ffff888102993400
[   22.708953]  which belongs to the cache kmalloc-64 of size 64
[   22.709536] The buggy address is located 0 bytes to the right of
[   22.709536]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.710283] 
[   22.710564] The buggy address belongs to the physical page:
[   22.711087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.711640] flags: 0x200000000000000(node=0|zone=2)
[   22.712156] page_type: f5(slab)
[   22.712449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.713086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.713552] page dumped because: kasan: bad access detected
[   22.714048] 
[   22.714185] Memory state around the buggy address:
[   22.714863]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.715327]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.715761] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.716197]                                      ^
[   22.716576]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.717939]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718474] ==================================================================
[   23.211022] ==================================================================
[   23.211818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   23.212512] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.213055] 
[   23.213393] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.213518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.213556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.213628] Call Trace:
[   23.213676]  <TASK>
[   23.213737]  dump_stack_lvl+0x73/0xb0
[   23.213839]  print_report+0xd1/0x650
[   23.213921]  ? __virt_addr_valid+0x1db/0x2d0
[   23.213983]  ? kasan_atomics_helper+0x4f73/0x5450
[   23.214047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.214115]  ? kasan_atomics_helper+0x4f73/0x5450
[   23.214177]  kasan_report+0x140/0x180
[   23.214236]  ? kasan_atomics_helper+0x4f73/0x5450
[   23.214349]  __asan_report_load8_noabort+0x18/0x20
[   23.214424]  kasan_atomics_helper+0x4f73/0x5450
[   23.214487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.214552]  ? kasan_save_alloc_info+0x3b/0x50
[   23.214617]  ? kasan_save_track+0x18/0x40
[   23.214683]  kasan_atomics+0x1dd/0x310
[   23.214748]  ? __pfx_kasan_atomics+0x10/0x10
[   23.214814]  ? __pfx_read_tsc+0x10/0x10
[   23.214895]  ? ktime_get_ts64+0x86/0x230
[   23.214967]  kunit_try_run_case+0x1a6/0x480
[   23.215038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.215098]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.215168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.215236]  ? __kthread_parkme+0x82/0x160
[   23.215336]  ? preempt_count_sub+0x50/0x80
[   23.215411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.215484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.215557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.215630]  kthread+0x324/0x6e0
[   23.215700]  ? trace_preempt_on+0x20/0xc0
[   23.215769]  ? __pfx_kthread+0x10/0x10
[   23.215822]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.215904]  ? calculate_sigpending+0x7b/0xa0
[   23.215991]  ? __pfx_kthread+0x10/0x10
[   23.216051]  ret_from_fork+0x41/0x80
[   23.216104]  ? __pfx_kthread+0x10/0x10
[   23.216161]  ret_from_fork_asm+0x1a/0x30
[   23.216264]  </TASK>
[   23.216327] 
[   23.228808] Allocated by task 273:
[   23.229269]  kasan_save_stack+0x45/0x70
[   23.229682]  kasan_save_track+0x18/0x40
[   23.230061]  kasan_save_alloc_info+0x3b/0x50
[   23.230444]  __kasan_kmalloc+0xb7/0xc0
[   23.230896]  __kmalloc_cache_noprof+0x18a/0x420
[   23.231371]  kasan_atomics+0x96/0x310
[   23.231783]  kunit_try_run_case+0x1a6/0x480
[   23.232111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.232698]  kthread+0x324/0x6e0
[   23.233067]  ret_from_fork+0x41/0x80
[   23.233481]  ret_from_fork_asm+0x1a/0x30
[   23.233943] 
[   23.234105] The buggy address belongs to the object at ffff888102993400
[   23.234105]  which belongs to the cache kmalloc-64 of size 64
[   23.235050] The buggy address is located 0 bytes to the right of
[   23.235050]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.235839] 
[   23.236103] The buggy address belongs to the physical page:
[   23.236653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.237236] flags: 0x200000000000000(node=0|zone=2)
[   23.237582] page_type: f5(slab)
[   23.237980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.238686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.239179] page dumped because: kasan: bad access detected
[   23.240141] 
[   23.240311] Memory state around the buggy address:
[   23.240579]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.241463]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.242120] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.243579]                                      ^
[   23.244446]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.245069]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.245774] ==================================================================
[   23.009535] ==================================================================
[   23.010350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   23.010722] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.012215] 
[   23.012375] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.012465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.012494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.012536] Call Trace:
[   23.012574]  <TASK>
[   23.012611]  dump_stack_lvl+0x73/0xb0
[   23.012680]  print_report+0xd1/0x650
[   23.012742]  ? __virt_addr_valid+0x1db/0x2d0
[   23.012803]  ? kasan_atomics_helper+0x4f32/0x5450
[   23.013068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.013141]  ? kasan_atomics_helper+0x4f32/0x5450
[   23.013201]  kasan_report+0x140/0x180
[   23.013264]  ? kasan_atomics_helper+0x4f32/0x5450
[   23.013325]  __asan_report_load8_noabort+0x18/0x20
[   23.013363]  kasan_atomics_helper+0x4f32/0x5450
[   23.013395]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.013429]  ? kasan_save_alloc_info+0x3b/0x50
[   23.013460]  ? kasan_save_track+0x18/0x40
[   23.013492]  kasan_atomics+0x1dd/0x310
[   23.013523]  ? __pfx_kasan_atomics+0x10/0x10
[   23.013555]  ? __pfx_read_tsc+0x10/0x10
[   23.013584]  ? ktime_get_ts64+0x86/0x230
[   23.013620]  kunit_try_run_case+0x1a6/0x480
[   23.013654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.013683]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.013718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.013750]  ? __kthread_parkme+0x82/0x160
[   23.013781]  ? preempt_count_sub+0x50/0x80
[   23.013814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.013865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.013905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.013941]  kthread+0x324/0x6e0
[   23.013970]  ? trace_preempt_on+0x20/0xc0
[   23.014003]  ? __pfx_kthread+0x10/0x10
[   23.014033]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.014065]  ? calculate_sigpending+0x7b/0xa0
[   23.014096]  ? __pfx_kthread+0x10/0x10
[   23.014126]  ret_from_fork+0x41/0x80
[   23.014152]  ? __pfx_kthread+0x10/0x10
[   23.014182]  ret_from_fork_asm+0x1a/0x30
[   23.014225]  </TASK>
[   23.014241] 
[   23.025902] Allocated by task 273:
[   23.026248]  kasan_save_stack+0x45/0x70
[   23.026654]  kasan_save_track+0x18/0x40
[   23.026965]  kasan_save_alloc_info+0x3b/0x50
[   23.027251]  __kasan_kmalloc+0xb7/0xc0
[   23.027634]  __kmalloc_cache_noprof+0x18a/0x420
[   23.027968]  kasan_atomics+0x96/0x310
[   23.028340]  kunit_try_run_case+0x1a6/0x480
[   23.028667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.029228]  kthread+0x324/0x6e0
[   23.029572]  ret_from_fork+0x41/0x80
[   23.029837]  ret_from_fork_asm+0x1a/0x30
[   23.030212] 
[   23.030362] The buggy address belongs to the object at ffff888102993400
[   23.030362]  which belongs to the cache kmalloc-64 of size 64
[   23.031257] The buggy address is located 0 bytes to the right of
[   23.031257]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.032256] 
[   23.032434] The buggy address belongs to the physical page:
[   23.032730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.033458] flags: 0x200000000000000(node=0|zone=2)
[   23.033803] page_type: f5(slab)
[   23.034167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.034992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.035352] page dumped because: kasan: bad access detected
[   23.035630] 
[   23.035788] Memory state around the buggy address:
[   23.036306]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.037364]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.038061] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.038627]                                      ^
[   23.038965]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.039308]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.039913] ==================================================================
[   21.323218] ==================================================================
[   21.323818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   21.324578] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.325257] 
[   21.325561] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.325791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.325845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.325910] Call Trace:
[   21.325953]  <TASK>
[   21.325998]  dump_stack_lvl+0x73/0xb0
[   21.326082]  print_report+0xd1/0x650
[   21.326145]  ? __virt_addr_valid+0x1db/0x2d0
[   21.326212]  ? kasan_atomics_helper+0x566/0x5450
[   21.326274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.326338]  ? kasan_atomics_helper+0x566/0x5450
[   21.326391]  kasan_report+0x140/0x180
[   21.326430]  ? kasan_atomics_helper+0x566/0x5450
[   21.326488]  kasan_check_range+0x10c/0x1c0
[   21.326543]  __kasan_check_write+0x18/0x20
[   21.326594]  kasan_atomics_helper+0x566/0x5450
[   21.326643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.326694]  ? kasan_save_alloc_info+0x3b/0x50
[   21.326744]  ? kasan_save_track+0x18/0x40
[   21.326797]  kasan_atomics+0x1dd/0x310
[   21.326845]  ? __pfx_kasan_atomics+0x10/0x10
[   21.326901]  ? __pfx_read_tsc+0x10/0x10
[   21.326934]  ? ktime_get_ts64+0x86/0x230
[   21.326971]  kunit_try_run_case+0x1a6/0x480
[   21.327005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.327034]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.327068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.327127]  ? __kthread_parkme+0x82/0x160
[   21.327162]  ? preempt_count_sub+0x50/0x80
[   21.327198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.327231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.327267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.327302]  kthread+0x324/0x6e0
[   21.327331]  ? trace_preempt_on+0x20/0xc0
[   21.327364]  ? __pfx_kthread+0x10/0x10
[   21.327394]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.327426]  ? calculate_sigpending+0x7b/0xa0
[   21.327456]  ? __pfx_kthread+0x10/0x10
[   21.327486]  ret_from_fork+0x41/0x80
[   21.327512]  ? __pfx_kthread+0x10/0x10
[   21.327542]  ret_from_fork_asm+0x1a/0x30
[   21.327585]  </TASK>
[   21.327601] 
[   21.345975] Allocated by task 273:
[   21.346669]  kasan_save_stack+0x45/0x70
[   21.346922]  kasan_save_track+0x18/0x40
[   21.347311]  kasan_save_alloc_info+0x3b/0x50
[   21.348191]  __kasan_kmalloc+0xb7/0xc0
[   21.348787]  __kmalloc_cache_noprof+0x18a/0x420
[   21.349251]  kasan_atomics+0x96/0x310
[   21.350030]  kunit_try_run_case+0x1a6/0x480
[   21.350540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.350784]  kthread+0x324/0x6e0
[   21.350993]  ret_from_fork+0x41/0x80
[   21.351327]  ret_from_fork_asm+0x1a/0x30
[   21.351786] 
[   21.352003] The buggy address belongs to the object at ffff888102993400
[   21.352003]  which belongs to the cache kmalloc-64 of size 64
[   21.353006] The buggy address is located 0 bytes to the right of
[   21.353006]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.353874] 
[   21.354035] The buggy address belongs to the physical page:
[   21.355098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.355949] flags: 0x200000000000000(node=0|zone=2)
[   21.356345] page_type: f5(slab)
[   21.356923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.357378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.358011] page dumped because: kasan: bad access detected
[   21.358399] 
[   21.358583] Memory state around the buggy address:
[   21.359062]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.359464]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.361009] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.361799]                                      ^
[   21.362231]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.362956]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.363567] ==================================================================
[   22.627626] ==================================================================
[   22.628312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   22.630479] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.632217] 
[   22.632510] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.632624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.632662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.632718] Call Trace:
[   22.632760]  <TASK>
[   22.632800]  dump_stack_lvl+0x73/0xb0
[   22.633525]  print_report+0xd1/0x650
[   22.633601]  ? __virt_addr_valid+0x1db/0x2d0
[   22.633660]  ? kasan_atomics_helper+0x1650/0x5450
[   22.633711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.633773]  ? kasan_atomics_helper+0x1650/0x5450
[   22.633833]  kasan_report+0x140/0x180
[   22.633919]  ? kasan_atomics_helper+0x1650/0x5450
[   22.633984]  kasan_check_range+0x10c/0x1c0
[   22.634039]  __kasan_check_write+0x18/0x20
[   22.634097]  kasan_atomics_helper+0x1650/0x5450
[   22.634156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.634207]  ? kasan_save_alloc_info+0x3b/0x50
[   22.634264]  ? kasan_save_track+0x18/0x40
[   22.634375]  kasan_atomics+0x1dd/0x310
[   22.634448]  ? __pfx_kasan_atomics+0x10/0x10
[   22.634510]  ? __pfx_read_tsc+0x10/0x10
[   22.634571]  ? ktime_get_ts64+0x86/0x230
[   22.634635]  kunit_try_run_case+0x1a6/0x480
[   22.634698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.634753]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.634818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.634902]  ? __kthread_parkme+0x82/0x160
[   22.634965]  ? preempt_count_sub+0x50/0x80
[   22.635032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.635097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.635171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.635242]  kthread+0x324/0x6e0
[   22.635343]  ? trace_preempt_on+0x20/0xc0
[   22.635421]  ? __pfx_kthread+0x10/0x10
[   22.635481]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.635550]  ? calculate_sigpending+0x7b/0xa0
[   22.635612]  ? __pfx_kthread+0x10/0x10
[   22.635672]  ret_from_fork+0x41/0x80
[   22.635741]  ? __pfx_kthread+0x10/0x10
[   22.635801]  ret_from_fork_asm+0x1a/0x30
[   22.635907]  </TASK>
[   22.635939] 
[   22.655703] Allocated by task 273:
[   22.657253]  kasan_save_stack+0x45/0x70
[   22.657774]  kasan_save_track+0x18/0x40
[   22.658318]  kasan_save_alloc_info+0x3b/0x50
[   22.658588]  __kasan_kmalloc+0xb7/0xc0
[   22.658979]  __kmalloc_cache_noprof+0x18a/0x420
[   22.659308]  kasan_atomics+0x96/0x310
[   22.660368]  kunit_try_run_case+0x1a6/0x480
[   22.660668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.660988]  kthread+0x324/0x6e0
[   22.661225]  ret_from_fork+0x41/0x80
[   22.661469]  ret_from_fork_asm+0x1a/0x30
[   22.661721] 
[   22.662901] The buggy address belongs to the object at ffff888102993400
[   22.662901]  which belongs to the cache kmalloc-64 of size 64
[   22.664538] The buggy address is located 0 bytes to the right of
[   22.664538]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.665649] 
[   22.665896] The buggy address belongs to the physical page:
[   22.666461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.667872] flags: 0x200000000000000(node=0|zone=2)
[   22.668422] page_type: f5(slab)
[   22.668795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.669541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.670222] page dumped because: kasan: bad access detected
[   22.670770] 
[   22.670994] Memory state around the buggy address:
[   22.672543]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.673212]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.673916] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.674279]                                      ^
[   22.674525]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.675181]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.675896] ==================================================================
[   21.986610] ==================================================================
[   21.987266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   21.987887] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.988422] 
[   21.988612] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.988720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.988752] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.988806] Call Trace:
[   21.988867]  <TASK>
[   21.988910]  dump_stack_lvl+0x73/0xb0
[   21.988986]  print_report+0xd1/0x650
[   21.989049]  ? __virt_addr_valid+0x1db/0x2d0
[   21.989110]  ? kasan_atomics_helper+0xf11/0x5450
[   21.989170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.989234]  ? kasan_atomics_helper+0xf11/0x5450
[   21.989331]  kasan_report+0x140/0x180
[   21.989399]  ? kasan_atomics_helper+0xf11/0x5450
[   21.989470]  kasan_check_range+0x10c/0x1c0
[   21.989531]  __kasan_check_write+0x18/0x20
[   21.989592]  kasan_atomics_helper+0xf11/0x5450
[   21.989646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.989707]  ? kasan_save_alloc_info+0x3b/0x50
[   21.989765]  ? kasan_save_track+0x18/0x40
[   21.989824]  kasan_atomics+0x1dd/0x310
[   21.989902]  ? __pfx_kasan_atomics+0x10/0x10
[   21.989968]  ? __pfx_read_tsc+0x10/0x10
[   21.990031]  ? ktime_get_ts64+0x86/0x230
[   21.990105]  kunit_try_run_case+0x1a6/0x480
[   21.990167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.990227]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.990326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.990392]  ? __kthread_parkme+0x82/0x160
[   21.990453]  ? preempt_count_sub+0x50/0x80
[   21.990523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.990568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.990608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.990645]  kthread+0x324/0x6e0
[   21.990674]  ? trace_preempt_on+0x20/0xc0
[   21.990708]  ? __pfx_kthread+0x10/0x10
[   21.990738]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.990770]  ? calculate_sigpending+0x7b/0xa0
[   21.990799]  ? __pfx_kthread+0x10/0x10
[   21.990831]  ret_from_fork+0x41/0x80
[   21.990879]  ? __pfx_kthread+0x10/0x10
[   21.990910]  ret_from_fork_asm+0x1a/0x30
[   21.990954]  </TASK>
[   21.990971] 
[   22.002830] Allocated by task 273:
[   22.003235]  kasan_save_stack+0x45/0x70
[   22.003661]  kasan_save_track+0x18/0x40
[   22.004094]  kasan_save_alloc_info+0x3b/0x50
[   22.004608]  __kasan_kmalloc+0xb7/0xc0
[   22.004899]  __kmalloc_cache_noprof+0x18a/0x420
[   22.005353]  kasan_atomics+0x96/0x310
[   22.005623]  kunit_try_run_case+0x1a6/0x480
[   22.005912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.006467]  kthread+0x324/0x6e0
[   22.006787]  ret_from_fork+0x41/0x80
[   22.007090]  ret_from_fork_asm+0x1a/0x30
[   22.007502] 
[   22.007717] The buggy address belongs to the object at ffff888102993400
[   22.007717]  which belongs to the cache kmalloc-64 of size 64
[   22.008794] The buggy address is located 0 bytes to the right of
[   22.008794]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.009356] 
[   22.009508] The buggy address belongs to the physical page:
[   22.010015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.010866] flags: 0x200000000000000(node=0|zone=2)
[   22.011313] page_type: f5(slab)
[   22.011617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.012017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.012366] page dumped because: kasan: bad access detected
[   22.012783] 
[   22.013018] Memory state around the buggy address:
[   22.013536]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.014422]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.015062] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.015406]                                      ^
[   22.015670]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016394]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016940] ==================================================================
[   22.231936] ==================================================================
[   22.232445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   22.233418] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.233831] 
[   22.234094] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.234200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.234236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.234291] Call Trace:
[   22.234338]  <TASK>
[   22.234379]  dump_stack_lvl+0x73/0xb0
[   22.234455]  print_report+0xd1/0x650
[   22.234518]  ? __virt_addr_valid+0x1db/0x2d0
[   22.234581]  ? kasan_atomics_helper+0x1218/0x5450
[   22.234643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.234706]  ? kasan_atomics_helper+0x1218/0x5450
[   22.234759]  kasan_report+0x140/0x180
[   22.234818]  ? kasan_atomics_helper+0x1218/0x5450
[   22.234905]  kasan_check_range+0x10c/0x1c0
[   22.234971]  __kasan_check_write+0x18/0x20
[   22.235036]  kasan_atomics_helper+0x1218/0x5450
[   22.235101]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.235159]  ? kasan_save_alloc_info+0x3b/0x50
[   22.235197]  ? kasan_save_track+0x18/0x40
[   22.235231]  kasan_atomics+0x1dd/0x310
[   22.235263]  ? __pfx_kasan_atomics+0x10/0x10
[   22.235302]  ? __pfx_read_tsc+0x10/0x10
[   22.235344]  ? ktime_get_ts64+0x86/0x230
[   22.235380]  kunit_try_run_case+0x1a6/0x480
[   22.235415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.235444]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.235480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.235511]  ? __kthread_parkme+0x82/0x160
[   22.235543]  ? preempt_count_sub+0x50/0x80
[   22.235576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.235608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.235643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.235688]  kthread+0x324/0x6e0
[   22.235719]  ? trace_preempt_on+0x20/0xc0
[   22.235753]  ? __pfx_kthread+0x10/0x10
[   22.235784]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.235816]  ? calculate_sigpending+0x7b/0xa0
[   22.235846]  ? __pfx_kthread+0x10/0x10
[   22.235898]  ret_from_fork+0x41/0x80
[   22.235925]  ? __pfx_kthread+0x10/0x10
[   22.235955]  ret_from_fork_asm+0x1a/0x30
[   22.235997]  </TASK>
[   22.236013] 
[   22.250355] Allocated by task 273:
[   22.250642]  kasan_save_stack+0x45/0x70
[   22.251158]  kasan_save_track+0x18/0x40
[   22.251508]  kasan_save_alloc_info+0x3b/0x50
[   22.251796]  __kasan_kmalloc+0xb7/0xc0
[   22.252054]  __kmalloc_cache_noprof+0x18a/0x420
[   22.252634]  kasan_atomics+0x96/0x310
[   22.253093]  kunit_try_run_case+0x1a6/0x480
[   22.253567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.254172]  kthread+0x324/0x6e0
[   22.254632]  ret_from_fork+0x41/0x80
[   22.255083]  ret_from_fork_asm+0x1a/0x30
[   22.255522] 
[   22.255673] The buggy address belongs to the object at ffff888102993400
[   22.255673]  which belongs to the cache kmalloc-64 of size 64
[   22.256770] The buggy address is located 0 bytes to the right of
[   22.256770]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.257694] 
[   22.257980] The buggy address belongs to the physical page:
[   22.258520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.259059] flags: 0x200000000000000(node=0|zone=2)
[   22.259605] page_type: f5(slab)
[   22.260048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.260722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.261384] page dumped because: kasan: bad access detected
[   22.261733] 
[   22.261952] Memory state around the buggy address:
[   22.262490]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.263128]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.263872] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.264160]                                      ^
[   22.264724]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.265323]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.265945] ==================================================================
[   21.450969] ==================================================================
[   21.451641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   21.452490] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.453216] 
[   21.453514] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.453613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.453646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.453692] Call Trace:
[   21.453736]  <TASK>
[   21.453774]  dump_stack_lvl+0x73/0xb0
[   21.453846]  print_report+0xd1/0x650
[   21.453920]  ? __virt_addr_valid+0x1db/0x2d0
[   21.453976]  ? kasan_atomics_helper+0x730/0x5450
[   21.454033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.454132]  ? kasan_atomics_helper+0x730/0x5450
[   21.454192]  kasan_report+0x140/0x180
[   21.454275]  ? kasan_atomics_helper+0x730/0x5450
[   21.454400]  kasan_check_range+0x10c/0x1c0
[   21.454518]  __kasan_check_write+0x18/0x20
[   21.454582]  kasan_atomics_helper+0x730/0x5450
[   21.454635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.454689]  ? kasan_save_alloc_info+0x3b/0x50
[   21.454748]  ? kasan_save_track+0x18/0x40
[   21.454813]  kasan_atomics+0x1dd/0x310
[   21.454896]  ? __pfx_kasan_atomics+0x10/0x10
[   21.454963]  ? __pfx_read_tsc+0x10/0x10
[   21.455025]  ? ktime_get_ts64+0x86/0x230
[   21.455097]  kunit_try_run_case+0x1a6/0x480
[   21.455162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.455197]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.455233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.455267]  ? __kthread_parkme+0x82/0x160
[   21.455318]  ? preempt_count_sub+0x50/0x80
[   21.455359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.455392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.455433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.455492]  kthread+0x324/0x6e0
[   21.455542]  ? trace_preempt_on+0x20/0xc0
[   21.455598]  ? __pfx_kthread+0x10/0x10
[   21.455638]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.455673]  ? calculate_sigpending+0x7b/0xa0
[   21.455715]  ? __pfx_kthread+0x10/0x10
[   21.455746]  ret_from_fork+0x41/0x80
[   21.455775]  ? __pfx_kthread+0x10/0x10
[   21.455805]  ret_from_fork_asm+0x1a/0x30
[   21.455848]  </TASK>
[   21.455884] 
[   21.473711] Allocated by task 273:
[   21.474050]  kasan_save_stack+0x45/0x70
[   21.475121]  kasan_save_track+0x18/0x40
[   21.475876]  kasan_save_alloc_info+0x3b/0x50
[   21.476167]  __kasan_kmalloc+0xb7/0xc0
[   21.476801]  __kmalloc_cache_noprof+0x18a/0x420
[   21.477360]  kasan_atomics+0x96/0x310
[   21.477891]  kunit_try_run_case+0x1a6/0x480
[   21.478288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.478972]  kthread+0x324/0x6e0
[   21.479843]  ret_from_fork+0x41/0x80
[   21.480229]  ret_from_fork_asm+0x1a/0x30
[   21.480827] 
[   21.481081] The buggy address belongs to the object at ffff888102993400
[   21.481081]  which belongs to the cache kmalloc-64 of size 64
[   21.482448] The buggy address is located 0 bytes to the right of
[   21.482448]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.484057] 
[   21.484191] The buggy address belongs to the physical page:
[   21.485045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.486091] flags: 0x200000000000000(node=0|zone=2)
[   21.486471] page_type: f5(slab)
[   21.486706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.487161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.487746] page dumped because: kasan: bad access detected
[   21.489032] 
[   21.489381] Memory state around the buggy address:
[   21.489961]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.490404]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.491177] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.492134]                                      ^
[   21.492596]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493084]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493556] ==================================================================
[   22.827923] ==================================================================
[   22.828660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   22.828987] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.829905] 
[   22.830219] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.830329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.830367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.830421] Call Trace:
[   22.830467]  <TASK>
[   22.830511]  dump_stack_lvl+0x73/0xb0
[   22.830590]  print_report+0xd1/0x650
[   22.830659]  ? __virt_addr_valid+0x1db/0x2d0
[   22.830722]  ? kasan_atomics_helper+0x194b/0x5450
[   22.830781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.830887]  ? kasan_atomics_helper+0x194b/0x5450
[   22.830953]  kasan_report+0x140/0x180
[   22.831020]  ? kasan_atomics_helper+0x194b/0x5450
[   22.831088]  kasan_check_range+0x10c/0x1c0
[   22.831149]  __kasan_check_write+0x18/0x20
[   22.831210]  kasan_atomics_helper+0x194b/0x5450
[   22.831299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.831364]  ? kasan_save_alloc_info+0x3b/0x50
[   22.831428]  ? kasan_save_track+0x18/0x40
[   22.831487]  kasan_atomics+0x1dd/0x310
[   22.831549]  ? __pfx_kasan_atomics+0x10/0x10
[   22.831635]  ? __pfx_read_tsc+0x10/0x10
[   22.831708]  ? ktime_get_ts64+0x86/0x230
[   22.831780]  kunit_try_run_case+0x1a6/0x480
[   22.831861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.831919]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.832016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.832083]  ? __kthread_parkme+0x82/0x160
[   22.832144]  ? preempt_count_sub+0x50/0x80
[   22.832213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.832296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.832364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.832429]  kthread+0x324/0x6e0
[   22.832486]  ? trace_preempt_on+0x20/0xc0
[   22.832553]  ? __pfx_kthread+0x10/0x10
[   22.832611]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.832670]  ? calculate_sigpending+0x7b/0xa0
[   22.832726]  ? __pfx_kthread+0x10/0x10
[   22.832789]  ret_from_fork+0x41/0x80
[   22.832894]  ? __pfx_kthread+0x10/0x10
[   22.832958]  ret_from_fork_asm+0x1a/0x30
[   22.833046]  </TASK>
[   22.833081] 
[   22.847563] Allocated by task 273:
[   22.848069]  kasan_save_stack+0x45/0x70
[   22.848572]  kasan_save_track+0x18/0x40
[   22.849052]  kasan_save_alloc_info+0x3b/0x50
[   22.849375]  __kasan_kmalloc+0xb7/0xc0
[   22.849618]  __kmalloc_cache_noprof+0x18a/0x420
[   22.849898]  kasan_atomics+0x96/0x310
[   22.850358]  kunit_try_run_case+0x1a6/0x480
[   22.850872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.851476]  kthread+0x324/0x6e0
[   22.851869]  ret_from_fork+0x41/0x80
[   22.852351]  ret_from_fork_asm+0x1a/0x30
[   22.852834] 
[   22.853074] The buggy address belongs to the object at ffff888102993400
[   22.853074]  which belongs to the cache kmalloc-64 of size 64
[   22.854169] The buggy address is located 0 bytes to the right of
[   22.854169]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.855199] 
[   22.855507] The buggy address belongs to the physical page:
[   22.856086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.856796] flags: 0x200000000000000(node=0|zone=2)
[   22.857325] page_type: f5(slab)
[   22.857728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.858190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.858948] page dumped because: kasan: bad access detected
[   22.859527] 
[   22.859721] Memory state around the buggy address:
[   22.860231]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.860863]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.861552] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.862105]                                      ^
[   22.862615]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.863230]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.863769] ==================================================================
[   20.995998] ==================================================================
[   20.997176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   20.997515] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   20.998205] 
[   20.998509] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   20.998638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.998673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.998730] Call Trace:
[   20.998762]  <TASK>
[   20.998803]  dump_stack_lvl+0x73/0xb0
[   20.998900]  print_report+0xd1/0x650
[   20.998963]  ? __virt_addr_valid+0x1db/0x2d0
[   20.999020]  ? kasan_atomics_helper+0x4bbe/0x5450
[   20.999074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.999137]  ? kasan_atomics_helper+0x4bbe/0x5450
[   20.999194]  kasan_report+0x140/0x180
[   20.999252]  ? kasan_atomics_helper+0x4bbe/0x5450
[   20.999312]  __asan_report_load4_noabort+0x18/0x20
[   20.999380]  kasan_atomics_helper+0x4bbe/0x5450
[   20.999455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   20.999527]  ? kasan_save_alloc_info+0x3b/0x50
[   20.999581]  ? kasan_save_track+0x18/0x40
[   20.999634]  kasan_atomics+0x1dd/0x310
[   20.999708]  ? __pfx_kasan_atomics+0x10/0x10
[   20.999769]  ? __pfx_read_tsc+0x10/0x10
[   20.999828]  ? ktime_get_ts64+0x86/0x230
[   20.999920]  kunit_try_run_case+0x1a6/0x480
[   20.999990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.000045]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.000086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.000118]  ? __kthread_parkme+0x82/0x160
[   21.000151]  ? preempt_count_sub+0x50/0x80
[   21.000184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.000213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.000246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.000280]  kthread+0x324/0x6e0
[   21.000319]  ? trace_preempt_on+0x20/0xc0
[   21.000356]  ? __pfx_kthread+0x10/0x10
[   21.000385]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.000415]  ? calculate_sigpending+0x7b/0xa0
[   21.000458]  ? __pfx_kthread+0x10/0x10
[   21.000507]  ret_from_fork+0x41/0x80
[   21.000548]  ? __pfx_kthread+0x10/0x10
[   21.000580]  ret_from_fork_asm+0x1a/0x30
[   21.000621]  </TASK>
[   21.000637] 
[   21.016391] Allocated by task 273:
[   21.016991]  kasan_save_stack+0x45/0x70
[   21.017713]  kasan_save_track+0x18/0x40
[   21.018081]  kasan_save_alloc_info+0x3b/0x50
[   21.018729]  __kasan_kmalloc+0xb7/0xc0
[   21.019114]  __kmalloc_cache_noprof+0x18a/0x420
[   21.019620]  kasan_atomics+0x96/0x310
[   21.020049]  kunit_try_run_case+0x1a6/0x480
[   21.020585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.021161]  kthread+0x324/0x6e0
[   21.021670]  ret_from_fork+0x41/0x80
[   21.022128]  ret_from_fork_asm+0x1a/0x30
[   21.022438] 
[   21.022873] The buggy address belongs to the object at ffff888102993400
[   21.022873]  which belongs to the cache kmalloc-64 of size 64
[   21.023751] The buggy address is located 0 bytes to the right of
[   21.023751]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.025060] 
[   21.025309] The buggy address belongs to the physical page:
[   21.026054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.026870] flags: 0x200000000000000(node=0|zone=2)
[   21.027378] page_type: f5(slab)
[   21.027898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.028609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.029203] page dumped because: kasan: bad access detected
[   21.029870] 
[   21.030069] Memory state around the buggy address:
[   21.030445]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.031216]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.031963] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.032523]                                      ^
[   21.032824]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.033557]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.034280] ==================================================================
[   22.018256] ==================================================================
[   22.018605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   22.018996] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.019357] 
[   22.019545] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.019652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.019695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.019750] Call Trace:
[   22.019800]  <TASK>
[   22.019844]  dump_stack_lvl+0x73/0xb0
[   22.019943]  print_report+0xd1/0x650
[   22.020010]  ? __virt_addr_valid+0x1db/0x2d0
[   22.020077]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.020134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.020195]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.020248]  kasan_report+0x140/0x180
[   22.020301]  ? kasan_atomics_helper+0xfaa/0x5450
[   22.020362]  kasan_check_range+0x10c/0x1c0
[   22.020418]  __kasan_check_write+0x18/0x20
[   22.020472]  kasan_atomics_helper+0xfaa/0x5450
[   22.020525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.020580]  ? kasan_save_alloc_info+0x3b/0x50
[   22.020637]  ? kasan_save_track+0x18/0x40
[   22.020697]  kasan_atomics+0x1dd/0x310
[   22.020752]  ? __pfx_kasan_atomics+0x10/0x10
[   22.020813]  ? __pfx_read_tsc+0x10/0x10
[   22.020883]  ? ktime_get_ts64+0x86/0x230
[   22.020949]  kunit_try_run_case+0x1a6/0x480
[   22.021008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.021059]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.021121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.021176]  ? __kthread_parkme+0x82/0x160
[   22.021233]  ? preempt_count_sub+0x50/0x80
[   22.021297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.021356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.021419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.021482]  kthread+0x324/0x6e0
[   22.021539]  ? trace_preempt_on+0x20/0xc0
[   22.021606]  ? __pfx_kthread+0x10/0x10
[   22.021666]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.021735]  ? calculate_sigpending+0x7b/0xa0
[   22.021796]  ? __pfx_kthread+0x10/0x10
[   22.021876]  ret_from_fork+0x41/0x80
[   22.021930]  ? __pfx_kthread+0x10/0x10
[   22.021981]  ret_from_fork_asm+0x1a/0x30
[   22.022060]  </TASK>
[   22.022088] 
[   22.034173] Allocated by task 273:
[   22.034613]  kasan_save_stack+0x45/0x70
[   22.035050]  kasan_save_track+0x18/0x40
[   22.035521]  kasan_save_alloc_info+0x3b/0x50
[   22.035904]  __kasan_kmalloc+0xb7/0xc0
[   22.036159]  __kmalloc_cache_noprof+0x18a/0x420
[   22.036528]  kasan_atomics+0x96/0x310
[   22.036935]  kunit_try_run_case+0x1a6/0x480
[   22.037397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.037947]  kthread+0x324/0x6e0
[   22.038277]  ret_from_fork+0x41/0x80
[   22.038521]  ret_from_fork_asm+0x1a/0x30
[   22.038776] 
[   22.038979] The buggy address belongs to the object at ffff888102993400
[   22.038979]  which belongs to the cache kmalloc-64 of size 64
[   22.040387] The buggy address is located 0 bytes to the right of
[   22.040387]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.041113] 
[   22.041269] The buggy address belongs to the physical page:
[   22.041750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.042417] flags: 0x200000000000000(node=0|zone=2)
[   22.042712] page_type: f5(slab)
[   22.043078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.043610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.044070] page dumped because: kasan: bad access detected
[   22.044351] 
[   22.044544] Memory state around the buggy address:
[   22.044957]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.045880]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.046245] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.046580]                                      ^
[   22.046841]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047516]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.048169] ==================================================================
[   21.872716] ==================================================================
[   21.873281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   21.874000] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.874370] 
[   21.874575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.875174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.875237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.875294] Call Trace:
[   21.875343]  <TASK>
[   21.875390]  dump_stack_lvl+0x73/0xb0
[   21.875476]  print_report+0xd1/0x650
[   21.875547]  ? __virt_addr_valid+0x1db/0x2d0
[   21.875618]  ? kasan_atomics_helper+0xd48/0x5450
[   21.875693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.875763]  ? kasan_atomics_helper+0xd48/0x5450
[   21.875811]  kasan_report+0x140/0x180
[   21.875865]  ? kasan_atomics_helper+0xd48/0x5450
[   21.875930]  kasan_check_range+0x10c/0x1c0
[   21.875989]  __kasan_check_write+0x18/0x20
[   21.876049]  kasan_atomics_helper+0xd48/0x5450
[   21.876102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.876157]  ? kasan_save_alloc_info+0x3b/0x50
[   21.876214]  ? kasan_save_track+0x18/0x40
[   21.876268]  kasan_atomics+0x1dd/0x310
[   21.876322]  ? __pfx_kasan_atomics+0x10/0x10
[   21.876372]  ? __pfx_read_tsc+0x10/0x10
[   21.876405]  ? ktime_get_ts64+0x86/0x230
[   21.876454]  kunit_try_run_case+0x1a6/0x480
[   21.876491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.876524]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.876561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.876595]  ? __kthread_parkme+0x82/0x160
[   21.876628]  ? preempt_count_sub+0x50/0x80
[   21.876662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.876694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.876731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.876768]  kthread+0x324/0x6e0
[   21.876797]  ? trace_preempt_on+0x20/0xc0
[   21.876831]  ? __pfx_kthread+0x10/0x10
[   21.876883]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.876923]  ? calculate_sigpending+0x7b/0xa0
[   21.876955]  ? __pfx_kthread+0x10/0x10
[   21.876986]  ret_from_fork+0x41/0x80
[   21.877014]  ? __pfx_kthread+0x10/0x10
[   21.877045]  ret_from_fork_asm+0x1a/0x30
[   21.877088]  </TASK>
[   21.877103] 
[   21.890360] Allocated by task 273:
[   21.890609]  kasan_save_stack+0x45/0x70
[   21.890904]  kasan_save_track+0x18/0x40
[   21.891291]  kasan_save_alloc_info+0x3b/0x50
[   21.891817]  __kasan_kmalloc+0xb7/0xc0
[   21.892370]  __kmalloc_cache_noprof+0x18a/0x420
[   21.892910]  kasan_atomics+0x96/0x310
[   21.893362]  kunit_try_run_case+0x1a6/0x480
[   21.893906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.894548]  kthread+0x324/0x6e0
[   21.895012]  ret_from_fork+0x41/0x80
[   21.895558]  ret_from_fork_asm+0x1a/0x30
[   21.896253] 
[   21.897067] The buggy address belongs to the object at ffff888102993400
[   21.897067]  which belongs to the cache kmalloc-64 of size 64
[   21.898508] The buggy address is located 0 bytes to the right of
[   21.898508]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.899816] 
[   21.900067] The buggy address belongs to the physical page:
[   21.900518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.901053] flags: 0x200000000000000(node=0|zone=2)
[   21.901513] page_type: f5(slab)
[   21.901924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.902468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.903149] page dumped because: kasan: bad access detected
[   21.903571] 
[   21.903816] Memory state around the buggy address:
[   21.904201]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.904780]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.905283] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.905941]                                      ^
[   21.906462]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.907180]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.907774] ==================================================================
[   22.377585] ==================================================================
[   22.378109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   22.378860] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.379516] 
[   22.380027] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.380112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.380146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.380197] Call Trace:
[   22.380269]  <TASK>
[   22.380317]  dump_stack_lvl+0x73/0xb0
[   22.380387]  print_report+0xd1/0x650
[   22.380424]  ? __virt_addr_valid+0x1db/0x2d0
[   22.380458]  ? kasan_atomics_helper+0x13b6/0x5450
[   22.380489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.380523]  ? kasan_atomics_helper+0x13b6/0x5450
[   22.380552]  kasan_report+0x140/0x180
[   22.380583]  ? kasan_atomics_helper+0x13b6/0x5450
[   22.380617]  kasan_check_range+0x10c/0x1c0
[   22.380648]  __kasan_check_read+0x15/0x20
[   22.380679]  kasan_atomics_helper+0x13b6/0x5450
[   22.380709]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.380740]  ? kasan_save_alloc_info+0x3b/0x50
[   22.380769]  ? kasan_save_track+0x18/0x40
[   22.380801]  kasan_atomics+0x1dd/0x310
[   22.380831]  ? __pfx_kasan_atomics+0x10/0x10
[   22.380889]  ? __pfx_read_tsc+0x10/0x10
[   22.380935]  ? ktime_get_ts64+0x86/0x230
[   22.381002]  kunit_try_run_case+0x1a6/0x480
[   22.381069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.381105]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.381143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.381176]  ? __kthread_parkme+0x82/0x160
[   22.381208]  ? preempt_count_sub+0x50/0x80
[   22.381242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.381274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.381328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.381366]  kthread+0x324/0x6e0
[   22.381395]  ? trace_preempt_on+0x20/0xc0
[   22.381429]  ? __pfx_kthread+0x10/0x10
[   22.381460]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.381491]  ? calculate_sigpending+0x7b/0xa0
[   22.381522]  ? __pfx_kthread+0x10/0x10
[   22.381553]  ret_from_fork+0x41/0x80
[   22.381579]  ? __pfx_kthread+0x10/0x10
[   22.381608]  ret_from_fork_asm+0x1a/0x30
[   22.381650]  </TASK>
[   22.381667] 
[   22.396934] Allocated by task 273:
[   22.397218]  kasan_save_stack+0x45/0x70
[   22.397887]  kasan_save_track+0x18/0x40
[   22.398247]  kasan_save_alloc_info+0x3b/0x50
[   22.398909]  __kasan_kmalloc+0xb7/0xc0
[   22.399236]  __kmalloc_cache_noprof+0x18a/0x420
[   22.399654]  kasan_atomics+0x96/0x310
[   22.400121]  kunit_try_run_case+0x1a6/0x480
[   22.400570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.401403]  kthread+0x324/0x6e0
[   22.401721]  ret_from_fork+0x41/0x80
[   22.402017]  ret_from_fork_asm+0x1a/0x30
[   22.402290] 
[   22.402437] The buggy address belongs to the object at ffff888102993400
[   22.402437]  which belongs to the cache kmalloc-64 of size 64
[   22.403057] The buggy address is located 0 bytes to the right of
[   22.403057]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.404021] 
[   22.404180] The buggy address belongs to the physical page:
[   22.404795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.405474] flags: 0x200000000000000(node=0|zone=2)
[   22.406003] page_type: f5(slab)
[   22.406241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.406830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.407534] page dumped because: kasan: bad access detected
[   22.408425] 
[   22.408675] Memory state around the buggy address:
[   22.409131]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.409894]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.410564] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.411300]                                      ^
[   22.411815]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.412341]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.412957] ==================================================================
[   21.280295] ==================================================================
[   21.281311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   21.282119] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.282626] 
[   21.283502] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.283590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.283610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.283636] Call Trace:
[   21.283663]  <TASK>
[   21.283696]  dump_stack_lvl+0x73/0xb0
[   21.283740]  print_report+0xd1/0x650
[   21.283775]  ? __virt_addr_valid+0x1db/0x2d0
[   21.283807]  ? kasan_atomics_helper+0x4b3c/0x5450
[   21.283838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.284258]  ? kasan_atomics_helper+0x4b3c/0x5450
[   21.284291]  kasan_report+0x140/0x180
[   21.284343]  ? kasan_atomics_helper+0x4b3c/0x5450
[   21.284382]  __asan_report_store4_noabort+0x1b/0x30
[   21.284415]  kasan_atomics_helper+0x4b3c/0x5450
[   21.284463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.284516]  ? kasan_save_alloc_info+0x3b/0x50
[   21.284564]  ? kasan_save_track+0x18/0x40
[   21.284597]  kasan_atomics+0x1dd/0x310
[   21.284631]  ? __pfx_kasan_atomics+0x10/0x10
[   21.284663]  ? __pfx_read_tsc+0x10/0x10
[   21.284696]  ? ktime_get_ts64+0x86/0x230
[   21.284732]  kunit_try_run_case+0x1a6/0x480
[   21.284766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.284796]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.284831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.284884]  ? __kthread_parkme+0x82/0x160
[   21.284916]  ? preempt_count_sub+0x50/0x80
[   21.284951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.284983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.285018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.285052]  kthread+0x324/0x6e0
[   21.285081]  ? trace_preempt_on+0x20/0xc0
[   21.285115]  ? __pfx_kthread+0x10/0x10
[   21.285145]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.285176]  ? calculate_sigpending+0x7b/0xa0
[   21.285205]  ? __pfx_kthread+0x10/0x10
[   21.285236]  ret_from_fork+0x41/0x80
[   21.285262]  ? __pfx_kthread+0x10/0x10
[   21.285294]  ret_from_fork_asm+0x1a/0x30
[   21.285349]  </TASK>
[   21.285365] 
[   21.302117] Allocated by task 273:
[   21.302554]  kasan_save_stack+0x45/0x70
[   21.303166]  kasan_save_track+0x18/0x40
[   21.303582]  kasan_save_alloc_info+0x3b/0x50
[   21.304289]  __kasan_kmalloc+0xb7/0xc0
[   21.304842]  __kmalloc_cache_noprof+0x18a/0x420
[   21.305260]  kasan_atomics+0x96/0x310
[   21.305598]  kunit_try_run_case+0x1a6/0x480
[   21.306007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.306349]  kthread+0x324/0x6e0
[   21.306707]  ret_from_fork+0x41/0x80
[   21.307793]  ret_from_fork_asm+0x1a/0x30
[   21.308106] 
[   21.308320] The buggy address belongs to the object at ffff888102993400
[   21.308320]  which belongs to the cache kmalloc-64 of size 64
[   21.309575] The buggy address is located 0 bytes to the right of
[   21.309575]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.310919] 
[   21.311131] The buggy address belongs to the physical page:
[   21.311848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.312644] flags: 0x200000000000000(node=0|zone=2)
[   21.313009] page_type: f5(slab)
[   21.313238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.313668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.315147] page dumped because: kasan: bad access detected
[   21.316067] 
[   21.316286] Memory state around the buggy address:
[   21.316691]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.317215]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.318359] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.319159]                                      ^
[   21.319638]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320370]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320870] ==================================================================
[   22.759141] ==================================================================
[   22.759651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   22.760511] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.761214] 
[   22.761774] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.761898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.761938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.761993] Call Trace:
[   22.762038]  <TASK>
[   22.762075]  dump_stack_lvl+0x73/0xb0
[   22.762141]  print_report+0xd1/0x650
[   22.762198]  ? __virt_addr_valid+0x1db/0x2d0
[   22.762255]  ? kasan_atomics_helper+0x1819/0x5450
[   22.762311]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.762378]  ? kasan_atomics_helper+0x1819/0x5450
[   22.762434]  kasan_report+0x140/0x180
[   22.762492]  ? kasan_atomics_helper+0x1819/0x5450
[   22.762558]  kasan_check_range+0x10c/0x1c0
[   22.762622]  __kasan_check_write+0x18/0x20
[   22.762685]  kasan_atomics_helper+0x1819/0x5450
[   22.762749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.762815]  ? kasan_save_alloc_info+0x3b/0x50
[   22.762894]  ? kasan_save_track+0x18/0x40
[   22.762947]  kasan_atomics+0x1dd/0x310
[   22.762982]  ? __pfx_kasan_atomics+0x10/0x10
[   22.763017]  ? __pfx_read_tsc+0x10/0x10
[   22.763049]  ? ktime_get_ts64+0x86/0x230
[   22.763086]  kunit_try_run_case+0x1a6/0x480
[   22.763120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.763149]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.763184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.763215]  ? __kthread_parkme+0x82/0x160
[   22.763247]  ? preempt_count_sub+0x50/0x80
[   22.763281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.763329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.763366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.763401]  kthread+0x324/0x6e0
[   22.763431]  ? trace_preempt_on+0x20/0xc0
[   22.763463]  ? __pfx_kthread+0x10/0x10
[   22.763494]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.763524]  ? calculate_sigpending+0x7b/0xa0
[   22.763553]  ? __pfx_kthread+0x10/0x10
[   22.763583]  ret_from_fork+0x41/0x80
[   22.763609]  ? __pfx_kthread+0x10/0x10
[   22.763638]  ret_from_fork_asm+0x1a/0x30
[   22.763691]  </TASK>
[   22.763708] 
[   22.778169] Allocated by task 273:
[   22.778582]  kasan_save_stack+0x45/0x70
[   22.779032]  kasan_save_track+0x18/0x40
[   22.779524]  kasan_save_alloc_info+0x3b/0x50
[   22.780054]  __kasan_kmalloc+0xb7/0xc0
[   22.780530]  __kmalloc_cache_noprof+0x18a/0x420
[   22.780953]  kasan_atomics+0x96/0x310
[   22.781236]  kunit_try_run_case+0x1a6/0x480
[   22.781738]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.782124]  kthread+0x324/0x6e0
[   22.782553]  ret_from_fork+0x41/0x80
[   22.782888]  ret_from_fork_asm+0x1a/0x30
[   22.783234] 
[   22.783503] The buggy address belongs to the object at ffff888102993400
[   22.783503]  which belongs to the cache kmalloc-64 of size 64
[   22.784262] The buggy address is located 0 bytes to the right of
[   22.784262]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.785221] 
[   22.785486] The buggy address belongs to the physical page:
[   22.785992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.786583] flags: 0x200000000000000(node=0|zone=2)
[   22.787073] page_type: f5(slab)
[   22.787463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.787984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.788669] page dumped because: kasan: bad access detected
[   22.789162] 
[   22.789423] Memory state around the buggy address:
[   22.789735]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.790342]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.790886] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.791464]                                      ^
[   22.791826]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.792439]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.792938] ==================================================================
[   22.125264] ==================================================================
[   22.126051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   22.126459] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.127143] 
[   22.127391] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.127501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.127539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.127596] Call Trace:
[   22.127643]  <TASK>
[   22.127695]  dump_stack_lvl+0x73/0xb0
[   22.127776]  print_report+0xd1/0x650
[   22.127836]  ? __virt_addr_valid+0x1db/0x2d0
[   22.127918]  ? kasan_atomics_helper+0x4a1e/0x5450
[   22.127976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.128041]  ? kasan_atomics_helper+0x4a1e/0x5450
[   22.128095]  kasan_report+0x140/0x180
[   22.128165]  ? kasan_atomics_helper+0x4a1e/0x5450
[   22.128222]  __asan_report_load4_noabort+0x18/0x20
[   22.128282]  kasan_atomics_helper+0x4a1e/0x5450
[   22.128345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.128408]  ? kasan_save_alloc_info+0x3b/0x50
[   22.128470]  ? kasan_save_track+0x18/0x40
[   22.128535]  kasan_atomics+0x1dd/0x310
[   22.128598]  ? __pfx_kasan_atomics+0x10/0x10
[   22.128658]  ? __pfx_read_tsc+0x10/0x10
[   22.128717]  ? ktime_get_ts64+0x86/0x230
[   22.128789]  kunit_try_run_case+0x1a6/0x480
[   22.128875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.128931]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.128996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.129056]  ? __kthread_parkme+0x82/0x160
[   22.129112]  ? preempt_count_sub+0x50/0x80
[   22.129179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.129244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.129314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.129384]  kthread+0x324/0x6e0
[   22.129445]  ? trace_preempt_on+0x20/0xc0
[   22.129516]  ? __pfx_kthread+0x10/0x10
[   22.129580]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.129646]  ? calculate_sigpending+0x7b/0xa0
[   22.129710]  ? __pfx_kthread+0x10/0x10
[   22.129775]  ret_from_fork+0x41/0x80
[   22.129832]  ? __pfx_kthread+0x10/0x10
[   22.129912]  ret_from_fork_asm+0x1a/0x30
[   22.129987]  </TASK>
[   22.130004] 
[   22.142061] Allocated by task 273:
[   22.142434]  kasan_save_stack+0x45/0x70
[   22.142865]  kasan_save_track+0x18/0x40
[   22.143279]  kasan_save_alloc_info+0x3b/0x50
[   22.143823]  __kasan_kmalloc+0xb7/0xc0
[   22.144135]  __kmalloc_cache_noprof+0x18a/0x420
[   22.144735]  kasan_atomics+0x96/0x310
[   22.145026]  kunit_try_run_case+0x1a6/0x480
[   22.145407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.146054]  kthread+0x324/0x6e0
[   22.146300]  ret_from_fork+0x41/0x80
[   22.146672]  ret_from_fork_asm+0x1a/0x30
[   22.146991] 
[   22.147174] The buggy address belongs to the object at ffff888102993400
[   22.147174]  which belongs to the cache kmalloc-64 of size 64
[   22.148045] The buggy address is located 0 bytes to the right of
[   22.148045]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.149057] 
[   22.149216] The buggy address belongs to the physical page:
[   22.149491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.149880] flags: 0x200000000000000(node=0|zone=2)
[   22.150163] page_type: f5(slab)
[   22.150380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.151071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.151613] page dumped because: kasan: bad access detected
[   22.151970] 
[   22.152100] Memory state around the buggy address:
[   22.152425]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.152837]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.154680] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.155035]                                      ^
[   22.155317]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.155657]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.157054] ==================================================================
[   21.408476] ==================================================================
[   21.409201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   21.410068] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.411158] 
[   21.411403] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.411518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.411553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.411734] Call Trace:
[   21.411799]  <TASK>
[   21.411863]  dump_stack_lvl+0x73/0xb0
[   21.412012]  print_report+0xd1/0x650
[   21.412082]  ? __virt_addr_valid+0x1db/0x2d0
[   21.412148]  ? kasan_atomics_helper+0x698/0x5450
[   21.412210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.412273]  ? kasan_atomics_helper+0x698/0x5450
[   21.412326]  kasan_report+0x140/0x180
[   21.412386]  ? kasan_atomics_helper+0x698/0x5450
[   21.412644]  kasan_check_range+0x10c/0x1c0
[   21.412738]  __kasan_check_write+0x18/0x20
[   21.412834]  kasan_atomics_helper+0x698/0x5450
[   21.412914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.412977]  ? kasan_save_alloc_info+0x3b/0x50
[   21.413034]  ? kasan_save_track+0x18/0x40
[   21.413071]  kasan_atomics+0x1dd/0x310
[   21.413103]  ? __pfx_kasan_atomics+0x10/0x10
[   21.413137]  ? __pfx_read_tsc+0x10/0x10
[   21.413170]  ? ktime_get_ts64+0x86/0x230
[   21.413204]  kunit_try_run_case+0x1a6/0x480
[   21.413238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.413267]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.413308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.413353]  ? __kthread_parkme+0x82/0x160
[   21.413385]  ? preempt_count_sub+0x50/0x80
[   21.413420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.413474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.413535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.413581]  kthread+0x324/0x6e0
[   21.413613]  ? trace_preempt_on+0x20/0xc0
[   21.413648]  ? __pfx_kthread+0x10/0x10
[   21.413678]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.413711]  ? calculate_sigpending+0x7b/0xa0
[   21.413741]  ? __pfx_kthread+0x10/0x10
[   21.413771]  ret_from_fork+0x41/0x80
[   21.413798]  ? __pfx_kthread+0x10/0x10
[   21.413828]  ret_from_fork_asm+0x1a/0x30
[   21.413892]  </TASK>
[   21.413909] 
[   21.432231] Allocated by task 273:
[   21.432644]  kasan_save_stack+0x45/0x70
[   21.432999]  kasan_save_track+0x18/0x40
[   21.433739]  kasan_save_alloc_info+0x3b/0x50
[   21.434051]  __kasan_kmalloc+0xb7/0xc0
[   21.434518]  __kmalloc_cache_noprof+0x18a/0x420
[   21.434868]  kasan_atomics+0x96/0x310
[   21.435266]  kunit_try_run_case+0x1a6/0x480
[   21.435620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.436712]  kthread+0x324/0x6e0
[   21.437283]  ret_from_fork+0x41/0x80
[   21.437669]  ret_from_fork_asm+0x1a/0x30
[   21.438324] 
[   21.438536] The buggy address belongs to the object at ffff888102993400
[   21.438536]  which belongs to the cache kmalloc-64 of size 64
[   21.439872] The buggy address is located 0 bytes to the right of
[   21.439872]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.440915] 
[   21.441131] The buggy address belongs to the physical page:
[   21.441902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.442410] flags: 0x200000000000000(node=0|zone=2)
[   21.443025] page_type: f5(slab)
[   21.443385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.444199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.445104] page dumped because: kasan: bad access detected
[   21.445580] 
[   21.446005] Memory state around the buggy address:
[   21.446370]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.446981]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.447617] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.448573]                                      ^
[   21.449229]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.449620]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.450159] ==================================================================
[   23.283841] ==================================================================
[   23.284460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   23.285000] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.285676] 
[   23.286029] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.286124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.286151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.286195] Call Trace:
[   23.286234]  <TASK>
[   23.286272]  dump_stack_lvl+0x73/0xb0
[   23.286371]  print_report+0xd1/0x650
[   23.286450]  ? __virt_addr_valid+0x1db/0x2d0
[   23.286514]  ? kasan_atomics_helper+0x4f9a/0x5450
[   23.286576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.286647]  ? kasan_atomics_helper+0x4f9a/0x5450
[   23.286708]  kasan_report+0x140/0x180
[   23.286774]  ? kasan_atomics_helper+0x4f9a/0x5450
[   23.286862]  __asan_report_load8_noabort+0x18/0x20
[   23.286927]  kasan_atomics_helper+0x4f9a/0x5450
[   23.286986]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.287077]  ? kasan_save_alloc_info+0x3b/0x50
[   23.287156]  ? kasan_save_track+0x18/0x40
[   23.287222]  kasan_atomics+0x1dd/0x310
[   23.287357]  ? __pfx_kasan_atomics+0x10/0x10
[   23.287429]  ? __pfx_read_tsc+0x10/0x10
[   23.287483]  ? ktime_get_ts64+0x86/0x230
[   23.287545]  kunit_try_run_case+0x1a6/0x480
[   23.287603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.287654]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.287732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.287797]  ? __kthread_parkme+0x82/0x160
[   23.287878]  ? preempt_count_sub+0x50/0x80
[   23.287935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.287989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.288045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.288098]  kthread+0x324/0x6e0
[   23.288143]  ? trace_preempt_on+0x20/0xc0
[   23.288193]  ? __pfx_kthread+0x10/0x10
[   23.288241]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.288342]  ? calculate_sigpending+0x7b/0xa0
[   23.288409]  ? __pfx_kthread+0x10/0x10
[   23.288474]  ret_from_fork+0x41/0x80
[   23.288532]  ? __pfx_kthread+0x10/0x10
[   23.288593]  ret_from_fork_asm+0x1a/0x30
[   23.288683]  </TASK>
[   23.288715] 
[   23.301140] Allocated by task 273:
[   23.301977]  kasan_save_stack+0x45/0x70
[   23.302662]  kasan_save_track+0x18/0x40
[   23.303607]  kasan_save_alloc_info+0x3b/0x50
[   23.304408]  __kasan_kmalloc+0xb7/0xc0
[   23.304611]  __kmalloc_cache_noprof+0x18a/0x420
[   23.305102]  kasan_atomics+0x96/0x310
[   23.305663]  kunit_try_run_case+0x1a6/0x480
[   23.306266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.306978]  kthread+0x324/0x6e0
[   23.307506]  ret_from_fork+0x41/0x80
[   23.307813]  ret_from_fork_asm+0x1a/0x30
[   23.308126] 
[   23.308335] The buggy address belongs to the object at ffff888102993400
[   23.308335]  which belongs to the cache kmalloc-64 of size 64
[   23.309183] The buggy address is located 0 bytes to the right of
[   23.309183]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.310721] 
[   23.310958] The buggy address belongs to the physical page:
[   23.311204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.311933] flags: 0x200000000000000(node=0|zone=2)
[   23.312537] page_type: f5(slab)
[   23.313192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.313898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.314505] page dumped because: kasan: bad access detected
[   23.314871] 
[   23.315080] Memory state around the buggy address:
[   23.315511]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.316027]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.316376] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.316999]                                      ^
[   23.317418]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.318232]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.318838] ==================================================================
[   23.320249] ==================================================================
[   23.320960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   23.321622] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.322510] 
[   23.323022] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.323167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.323224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.323281] Call Trace:
[   23.323345]  <TASK>
[   23.323396]  dump_stack_lvl+0x73/0xb0
[   23.323513]  print_report+0xd1/0x650
[   23.323579]  ? __virt_addr_valid+0x1db/0x2d0
[   23.323643]  ? kasan_atomics_helper+0x20c9/0x5450
[   23.323716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.323787]  ? kasan_atomics_helper+0x20c9/0x5450
[   23.323876]  kasan_report+0x140/0x180
[   23.323942]  ? kasan_atomics_helper+0x20c9/0x5450
[   23.324013]  kasan_check_range+0x10c/0x1c0
[   23.324073]  __kasan_check_write+0x18/0x20
[   23.324125]  kasan_atomics_helper+0x20c9/0x5450
[   23.324186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.324279]  ? kasan_save_alloc_info+0x3b/0x50
[   23.324344]  ? kasan_save_track+0x18/0x40
[   23.324427]  kasan_atomics+0x1dd/0x310
[   23.324486]  ? __pfx_kasan_atomics+0x10/0x10
[   23.324549]  ? __pfx_read_tsc+0x10/0x10
[   23.324613]  ? ktime_get_ts64+0x86/0x230
[   23.324689]  kunit_try_run_case+0x1a6/0x480
[   23.324752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.324802]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.324842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.324903]  ? __kthread_parkme+0x82/0x160
[   23.324936]  ? preempt_count_sub+0x50/0x80
[   23.324972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.325004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.325043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.325096]  kthread+0x324/0x6e0
[   23.325138]  ? trace_preempt_on+0x20/0xc0
[   23.325184]  ? __pfx_kthread+0x10/0x10
[   23.325224]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.325270]  ? calculate_sigpending+0x7b/0xa0
[   23.325318]  ? __pfx_kthread+0x10/0x10
[   23.325362]  ret_from_fork+0x41/0x80
[   23.325393]  ? __pfx_kthread+0x10/0x10
[   23.325424]  ret_from_fork_asm+0x1a/0x30
[   23.325468]  </TASK>
[   23.325484] 
[   23.340221] Allocated by task 273:
[   23.340751]  kasan_save_stack+0x45/0x70
[   23.341117]  kasan_save_track+0x18/0x40
[   23.341641]  kasan_save_alloc_info+0x3b/0x50
[   23.342124]  __kasan_kmalloc+0xb7/0xc0
[   23.342628]  __kmalloc_cache_noprof+0x18a/0x420
[   23.343087]  kasan_atomics+0x96/0x310
[   23.343631]  kunit_try_run_case+0x1a6/0x480
[   23.344111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.344589]  kthread+0x324/0x6e0
[   23.344826]  ret_from_fork+0x41/0x80
[   23.345236]  ret_from_fork_asm+0x1a/0x30
[   23.345628] 
[   23.345819] The buggy address belongs to the object at ffff888102993400
[   23.345819]  which belongs to the cache kmalloc-64 of size 64
[   23.346520] The buggy address is located 0 bytes to the right of
[   23.346520]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.347317] 
[   23.347532] The buggy address belongs to the physical page:
[   23.348022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.348543] flags: 0x200000000000000(node=0|zone=2)
[   23.348964] page_type: f5(slab)
[   23.349334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.349878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.350348] page dumped because: kasan: bad access detected
[   23.350869] 
[   23.351093] Memory state around the buggy address:
[   23.351479]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.351949]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.352582] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.352955]                                      ^
[   23.353456]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.354028]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.354527] ==================================================================
[   22.719768] ==================================================================
[   22.720170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   22.720892] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.721957] 
[   22.722819] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.722940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.722978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.723158] Call Trace:
[   22.723206]  <TASK>
[   22.723242]  dump_stack_lvl+0x73/0xb0
[   22.723291]  print_report+0xd1/0x650
[   22.723339]  ? __virt_addr_valid+0x1db/0x2d0
[   22.723375]  ? kasan_atomics_helper+0x1780/0x5450
[   22.723406]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.723442]  ? kasan_atomics_helper+0x1780/0x5450
[   22.723471]  kasan_report+0x140/0x180
[   22.723501]  ? kasan_atomics_helper+0x1780/0x5450
[   22.723536]  kasan_check_range+0x10c/0x1c0
[   22.723567]  __kasan_check_write+0x18/0x20
[   22.723598]  kasan_atomics_helper+0x1780/0x5450
[   22.723629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.723660]  ? kasan_save_alloc_info+0x3b/0x50
[   22.723702]  ? kasan_save_track+0x18/0x40
[   22.723734]  kasan_atomics+0x1dd/0x310
[   22.723763]  ? __pfx_kasan_atomics+0x10/0x10
[   22.723795]  ? __pfx_read_tsc+0x10/0x10
[   22.723824]  ? ktime_get_ts64+0x86/0x230
[   22.723879]  kunit_try_run_case+0x1a6/0x480
[   22.723914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.723944]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.723977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.724010]  ? __kthread_parkme+0x82/0x160
[   22.724041]  ? preempt_count_sub+0x50/0x80
[   22.724089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.724125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.724162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.724206]  kthread+0x324/0x6e0
[   22.724238]  ? trace_preempt_on+0x20/0xc0
[   22.724278]  ? __pfx_kthread+0x10/0x10
[   22.724326]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.724360]  ? calculate_sigpending+0x7b/0xa0
[   22.724396]  ? __pfx_kthread+0x10/0x10
[   22.724431]  ret_from_fork+0x41/0x80
[   22.724457]  ? __pfx_kthread+0x10/0x10
[   22.724498]  ret_from_fork_asm+0x1a/0x30
[   22.724541]  </TASK>
[   22.724565] 
[   22.741980] Allocated by task 273:
[   22.742191]  kasan_save_stack+0x45/0x70
[   22.742819]  kasan_save_track+0x18/0x40
[   22.743222]  kasan_save_alloc_info+0x3b/0x50
[   22.743878]  __kasan_kmalloc+0xb7/0xc0
[   22.744396]  __kmalloc_cache_noprof+0x18a/0x420
[   22.744749]  kasan_atomics+0x96/0x310
[   22.745376]  kunit_try_run_case+0x1a6/0x480
[   22.745926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.746291]  kthread+0x324/0x6e0
[   22.746817]  ret_from_fork+0x41/0x80
[   22.747094]  ret_from_fork_asm+0x1a/0x30
[   22.747712] 
[   22.747973] The buggy address belongs to the object at ffff888102993400
[   22.747973]  which belongs to the cache kmalloc-64 of size 64
[   22.749032] The buggy address is located 0 bytes to the right of
[   22.749032]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.750119] 
[   22.750273] The buggy address belongs to the physical page:
[   22.750813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.751412] flags: 0x200000000000000(node=0|zone=2)
[   22.752223] page_type: f5(slab)
[   22.752706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.752929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.753108] page dumped because: kasan: bad access detected
[   22.753245] 
[   22.753372] Memory state around the buggy address:
[   22.753634]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.754375]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.755068] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.755754]                                      ^
[   22.756279]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756976]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.757583] ==================================================================
[   22.901931] ==================================================================
[   22.902719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   22.903522] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.904188] 
[   22.904389] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.904484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.904514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.904558] Call Trace:
[   22.904597]  <TASK>
[   22.904633]  dump_stack_lvl+0x73/0xb0
[   22.904699]  print_report+0xd1/0x650
[   22.904750]  ? __virt_addr_valid+0x1db/0x2d0
[   22.904804]  ? kasan_atomics_helper+0x1a80/0x5450
[   22.904878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.904946]  ? kasan_atomics_helper+0x1a80/0x5450
[   22.905003]  kasan_report+0x140/0x180
[   22.905067]  ? kasan_atomics_helper+0x1a80/0x5450
[   22.905133]  kasan_check_range+0x10c/0x1c0
[   22.905190]  __kasan_check_write+0x18/0x20
[   22.905252]  kasan_atomics_helper+0x1a80/0x5450
[   22.905312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.905376]  ? kasan_save_alloc_info+0x3b/0x50
[   22.905440]  ? kasan_save_track+0x18/0x40
[   22.905498]  kasan_atomics+0x1dd/0x310
[   22.905554]  ? __pfx_kasan_atomics+0x10/0x10
[   22.905588]  ? __pfx_read_tsc+0x10/0x10
[   22.905631]  ? ktime_get_ts64+0x86/0x230
[   22.905670]  kunit_try_run_case+0x1a6/0x480
[   22.905705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.905735]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.905770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.905802]  ? __kthread_parkme+0x82/0x160
[   22.905833]  ? preempt_count_sub+0x50/0x80
[   22.905887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.905920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.905956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.905991]  kthread+0x324/0x6e0
[   22.906020]  ? trace_preempt_on+0x20/0xc0
[   22.906053]  ? __pfx_kthread+0x10/0x10
[   22.906082]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.906113]  ? calculate_sigpending+0x7b/0xa0
[   22.906143]  ? __pfx_kthread+0x10/0x10
[   22.906173]  ret_from_fork+0x41/0x80
[   22.906200]  ? __pfx_kthread+0x10/0x10
[   22.906230]  ret_from_fork_asm+0x1a/0x30
[   22.906273]  </TASK>
[   22.906291] 
[   22.918315] Allocated by task 273:
[   22.918608]  kasan_save_stack+0x45/0x70
[   22.918899]  kasan_save_track+0x18/0x40
[   22.919212]  kasan_save_alloc_info+0x3b/0x50
[   22.919659]  __kasan_kmalloc+0xb7/0xc0
[   22.920055]  __kmalloc_cache_noprof+0x18a/0x420
[   22.920552]  kasan_atomics+0x96/0x310
[   22.920926]  kunit_try_run_case+0x1a6/0x480
[   22.921301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.921615]  kthread+0x324/0x6e0
[   22.921844]  ret_from_fork+0x41/0x80
[   22.922245]  ret_from_fork_asm+0x1a/0x30
[   22.922785] 
[   22.923025] The buggy address belongs to the object at ffff888102993400
[   22.923025]  which belongs to the cache kmalloc-64 of size 64
[   22.924187] The buggy address is located 0 bytes to the right of
[   22.924187]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.924770] 
[   22.925005] The buggy address belongs to the physical page:
[   22.925518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.926351] flags: 0x200000000000000(node=0|zone=2)
[   22.926745] page_type: f5(slab)
[   22.926997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.927711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.928147] page dumped because: kasan: bad access detected
[   22.928428] 
[   22.928572] Memory state around the buggy address:
[   22.928827]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.929524]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.930481] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.931181]                                      ^
[   22.932648]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934244]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934921] ==================================================================
[   22.520356] ==================================================================
[   22.520919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   22.521297] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.521966] 
[   22.522296] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.522416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.522452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.522526] Call Trace:
[   22.522571]  <TASK>
[   22.522613]  dump_stack_lvl+0x73/0xb0
[   22.522697]  print_report+0xd1/0x650
[   22.522762]  ? __virt_addr_valid+0x1db/0x2d0
[   22.522833]  ? kasan_atomics_helper+0x151e/0x5450
[   22.522913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.522985]  ? kasan_atomics_helper+0x151e/0x5450
[   22.523069]  kasan_report+0x140/0x180
[   22.523171]  ? kasan_atomics_helper+0x151e/0x5450
[   22.523262]  kasan_check_range+0x10c/0x1c0
[   22.523342]  __kasan_check_write+0x18/0x20
[   22.523425]  kasan_atomics_helper+0x151e/0x5450
[   22.523506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.523584]  ? kasan_save_alloc_info+0x3b/0x50
[   22.523647]  ? kasan_save_track+0x18/0x40
[   22.523729]  kasan_atomics+0x1dd/0x310
[   22.523784]  ? __pfx_kasan_atomics+0x10/0x10
[   22.523840]  ? __pfx_read_tsc+0x10/0x10
[   22.523915]  ? ktime_get_ts64+0x86/0x230
[   22.523989]  kunit_try_run_case+0x1a6/0x480
[   22.524075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.524139]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.524206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.524270]  ? __kthread_parkme+0x82/0x160
[   22.524352]  ? preempt_count_sub+0x50/0x80
[   22.524437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.524501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.524568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.524646]  kthread+0x324/0x6e0
[   22.524722]  ? trace_preempt_on+0x20/0xc0
[   22.524792]  ? __pfx_kthread+0x10/0x10
[   22.524865]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.524932]  ? calculate_sigpending+0x7b/0xa0
[   22.525004]  ? __pfx_kthread+0x10/0x10
[   22.525084]  ret_from_fork+0x41/0x80
[   22.525138]  ? __pfx_kthread+0x10/0x10
[   22.525197]  ret_from_fork_asm+0x1a/0x30
[   22.525286]  </TASK>
[   22.525319] 
[   22.538722] Allocated by task 273:
[   22.539110]  kasan_save_stack+0x45/0x70
[   22.539707]  kasan_save_track+0x18/0x40
[   22.540127]  kasan_save_alloc_info+0x3b/0x50
[   22.540729]  __kasan_kmalloc+0xb7/0xc0
[   22.541026]  __kmalloc_cache_noprof+0x18a/0x420
[   22.541479]  kasan_atomics+0x96/0x310
[   22.541780]  kunit_try_run_case+0x1a6/0x480
[   22.542164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.542953]  kthread+0x324/0x6e0
[   22.543255]  ret_from_fork+0x41/0x80
[   22.543597]  ret_from_fork_asm+0x1a/0x30
[   22.544014] 
[   22.544235] The buggy address belongs to the object at ffff888102993400
[   22.544235]  which belongs to the cache kmalloc-64 of size 64
[   22.544994] The buggy address is located 0 bytes to the right of
[   22.544994]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.545527] 
[   22.545675] The buggy address belongs to the physical page:
[   22.546086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.548258] flags: 0x200000000000000(node=0|zone=2)
[   22.548746] page_type: f5(slab)
[   22.548999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.549656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.550317] page dumped because: kasan: bad access detected
[   22.550570] 
[   22.550706] Memory state around the buggy address:
[   22.551121]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.552723]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.553065] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.553387]                                      ^
[   22.553637]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.553969]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556720] ==================================================================
[   21.909353] ==================================================================
[   21.909914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   21.910581] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.911038] 
[   21.911307] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.911417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.911453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.911504] Call Trace:
[   21.911545]  <TASK>
[   21.911588]  dump_stack_lvl+0x73/0xb0
[   21.911671]  print_report+0xd1/0x650
[   21.911750]  ? __virt_addr_valid+0x1db/0x2d0
[   21.911819]  ? kasan_atomics_helper+0xde1/0x5450
[   21.911930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.912001]  ? kasan_atomics_helper+0xde1/0x5450
[   21.912063]  kasan_report+0x140/0x180
[   21.912122]  ? kasan_atomics_helper+0xde1/0x5450
[   21.912177]  kasan_check_range+0x10c/0x1c0
[   21.912215]  __kasan_check_write+0x18/0x20
[   21.912248]  kasan_atomics_helper+0xde1/0x5450
[   21.912278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.912335]  ? kasan_save_alloc_info+0x3b/0x50
[   21.912368]  ? kasan_save_track+0x18/0x40
[   21.912401]  kasan_atomics+0x1dd/0x310
[   21.912431]  ? __pfx_kasan_atomics+0x10/0x10
[   21.912464]  ? __pfx_read_tsc+0x10/0x10
[   21.912495]  ? ktime_get_ts64+0x86/0x230
[   21.912531]  kunit_try_run_case+0x1a6/0x480
[   21.912566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.912595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.912631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.912663]  ? __kthread_parkme+0x82/0x160
[   21.912693]  ? preempt_count_sub+0x50/0x80
[   21.912726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.912759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.912793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.912828]  kthread+0x324/0x6e0
[   21.912876]  ? trace_preempt_on+0x20/0xc0
[   21.912910]  ? __pfx_kthread+0x10/0x10
[   21.912940]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.912971]  ? calculate_sigpending+0x7b/0xa0
[   21.913002]  ? __pfx_kthread+0x10/0x10
[   21.913033]  ret_from_fork+0x41/0x80
[   21.913058]  ? __pfx_kthread+0x10/0x10
[   21.913088]  ret_from_fork_asm+0x1a/0x30
[   21.913131]  </TASK>
[   21.913146] 
[   21.929218] Allocated by task 273:
[   21.930315]  kasan_save_stack+0x45/0x70
[   21.930875]  kasan_save_track+0x18/0x40
[   21.931185]  kasan_save_alloc_info+0x3b/0x50
[   21.931777]  __kasan_kmalloc+0xb7/0xc0
[   21.932092]  __kmalloc_cache_noprof+0x18a/0x420
[   21.932402]  kasan_atomics+0x96/0x310
[   21.933001]  kunit_try_run_case+0x1a6/0x480
[   21.933350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.933694]  kthread+0x324/0x6e0
[   21.933985]  ret_from_fork+0x41/0x80
[   21.934348]  ret_from_fork_asm+0x1a/0x30
[   21.934653] 
[   21.935500] The buggy address belongs to the object at ffff888102993400
[   21.935500]  which belongs to the cache kmalloc-64 of size 64
[   21.936275] The buggy address is located 0 bytes to the right of
[   21.936275]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.937436] 
[   21.937560] The buggy address belongs to the physical page:
[   21.938179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.938962] flags: 0x200000000000000(node=0|zone=2)
[   21.939609] page_type: f5(slab)
[   21.939961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.940768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.941225] page dumped because: kasan: bad access detected
[   21.942038] 
[   21.942254] Memory state around the buggy address:
[   21.942915]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.943341]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.943767] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.944194]                                      ^
[   21.945198]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.945976]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.946605] ==================================================================
[   21.200784] ==================================================================
[   21.201343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   21.201887] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.202340] 
[   21.202528] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.202640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.202675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.202730] Call Trace:
[   21.202772]  <TASK>
[   21.202816]  dump_stack_lvl+0x73/0xb0
[   21.202913]  print_report+0xd1/0x650
[   21.202980]  ? __virt_addr_valid+0x1db/0x2d0
[   21.203044]  ? kasan_atomics_helper+0x4b56/0x5450
[   21.203100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.203167]  ? kasan_atomics_helper+0x4b56/0x5450
[   21.203230]  kasan_report+0x140/0x180
[   21.203293]  ? kasan_atomics_helper+0x4b56/0x5450
[   21.203355]  __asan_report_load4_noabort+0x18/0x20
[   21.203420]  kasan_atomics_helper+0x4b56/0x5450
[   21.203483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.203548]  ? kasan_save_alloc_info+0x3b/0x50
[   21.203603]  ? kasan_save_track+0x18/0x40
[   21.203639]  kasan_atomics+0x1dd/0x310
[   21.203673]  ? __pfx_kasan_atomics+0x10/0x10
[   21.203718]  ? __pfx_read_tsc+0x10/0x10
[   21.203749]  ? ktime_get_ts64+0x86/0x230
[   21.203786]  kunit_try_run_case+0x1a6/0x480
[   21.203821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.203880]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.203947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.203999]  ? __kthread_parkme+0x82/0x160
[   21.204051]  ? preempt_count_sub+0x50/0x80
[   21.204106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.204155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.204213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.204269]  kthread+0x324/0x6e0
[   21.204361]  ? trace_preempt_on+0x20/0xc0
[   21.204421]  ? __pfx_kthread+0x10/0x10
[   21.204508]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.204563]  ? calculate_sigpending+0x7b/0xa0
[   21.204615]  ? __pfx_kthread+0x10/0x10
[   21.204665]  ret_from_fork+0x41/0x80
[   21.204702]  ? __pfx_kthread+0x10/0x10
[   21.204733]  ret_from_fork_asm+0x1a/0x30
[   21.204778]  </TASK>
[   21.204794] 
[   21.222562] Allocated by task 273:
[   21.223007]  kasan_save_stack+0x45/0x70
[   21.223808]  kasan_save_track+0x18/0x40
[   21.224102]  kasan_save_alloc_info+0x3b/0x50
[   21.224368]  __kasan_kmalloc+0xb7/0xc0
[   21.224801]  __kmalloc_cache_noprof+0x18a/0x420
[   21.225279]  kasan_atomics+0x96/0x310
[   21.225840]  kunit_try_run_case+0x1a6/0x480
[   21.226311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.226885]  kthread+0x324/0x6e0
[   21.227285]  ret_from_fork+0x41/0x80
[   21.228175]  ret_from_fork_asm+0x1a/0x30
[   21.228731] 
[   21.229082] The buggy address belongs to the object at ffff888102993400
[   21.229082]  which belongs to the cache kmalloc-64 of size 64
[   21.230045] The buggy address is located 0 bytes to the right of
[   21.230045]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.230974] 
[   21.231109] The buggy address belongs to the physical page:
[   21.231500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.231983] flags: 0x200000000000000(node=0|zone=2)
[   21.232265] page_type: f5(slab)
[   21.233389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.234102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.235083] page dumped because: kasan: bad access detected
[   21.235542] 
[   21.235942] Memory state around the buggy address:
[   21.236351]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.236925]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.237518] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.237875]                                      ^
[   21.238319]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.238797]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.240030] ==================================================================
[   23.356146] ==================================================================
[   23.356892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   23.357455] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.358043] 
[   23.358237] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.358390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.358425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.358482] Call Trace:
[   23.358529]  <TASK>
[   23.358576]  dump_stack_lvl+0x73/0xb0
[   23.358670]  print_report+0xd1/0x650
[   23.358733]  ? __virt_addr_valid+0x1db/0x2d0
[   23.358795]  ? kasan_atomics_helper+0x4fb4/0x5450
[   23.358868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.358936]  ? kasan_atomics_helper+0x4fb4/0x5450
[   23.358990]  kasan_report+0x140/0x180
[   23.359046]  ? kasan_atomics_helper+0x4fb4/0x5450
[   23.359110]  __asan_report_load8_noabort+0x18/0x20
[   23.359175]  kasan_atomics_helper+0x4fb4/0x5450
[   23.359231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.359330]  ? kasan_save_alloc_info+0x3b/0x50
[   23.359391]  ? kasan_save_track+0x18/0x40
[   23.359456]  kasan_atomics+0x1dd/0x310
[   23.359513]  ? __pfx_kasan_atomics+0x10/0x10
[   23.359573]  ? __pfx_read_tsc+0x10/0x10
[   23.359632]  ? ktime_get_ts64+0x86/0x230
[   23.359711]  kunit_try_run_case+0x1a6/0x480
[   23.359776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.359834]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.359921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.359986]  ? __kthread_parkme+0x82/0x160
[   23.360045]  ? preempt_count_sub+0x50/0x80
[   23.360112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.360171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.360236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.360333]  kthread+0x324/0x6e0
[   23.360397]  ? trace_preempt_on+0x20/0xc0
[   23.360452]  ? __pfx_kthread+0x10/0x10
[   23.360486]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.360522]  ? calculate_sigpending+0x7b/0xa0
[   23.360553]  ? __pfx_kthread+0x10/0x10
[   23.360584]  ret_from_fork+0x41/0x80
[   23.360610]  ? __pfx_kthread+0x10/0x10
[   23.360640]  ret_from_fork_asm+0x1a/0x30
[   23.360684]  </TASK>
[   23.360701] 
[   23.372221] Allocated by task 273:
[   23.372608]  kasan_save_stack+0x45/0x70
[   23.373018]  kasan_save_track+0x18/0x40
[   23.373411]  kasan_save_alloc_info+0x3b/0x50
[   23.373718]  __kasan_kmalloc+0xb7/0xc0
[   23.374111]  __kmalloc_cache_noprof+0x18a/0x420
[   23.374594]  kasan_atomics+0x96/0x310
[   23.374906]  kunit_try_run_case+0x1a6/0x480
[   23.375178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.375712]  kthread+0x324/0x6e0
[   23.376100]  ret_from_fork+0x41/0x80
[   23.376517]  ret_from_fork_asm+0x1a/0x30
[   23.376926] 
[   23.377108] The buggy address belongs to the object at ffff888102993400
[   23.377108]  which belongs to the cache kmalloc-64 of size 64
[   23.377717] The buggy address is located 0 bytes to the right of
[   23.377717]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.378752] 
[   23.378991] The buggy address belongs to the physical page:
[   23.379529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.379946] flags: 0x200000000000000(node=0|zone=2)
[   23.380443] page_type: f5(slab)
[   23.380796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.381479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.382123] page dumped because: kasan: bad access detected
[   23.382442] 
[   23.382593] Memory state around the buggy address:
[   23.382876]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.383543]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.384172] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.384813]                                      ^
[   23.385140]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.385529]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.386070] ==================================================================
[   22.301635] ==================================================================
[   22.302087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   22.302493] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.303469] 
[   22.303727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.303836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.303886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.303928] Call Trace:
[   22.303964]  <TASK>
[   22.303998]  dump_stack_lvl+0x73/0xb0
[   22.304060]  print_report+0xd1/0x650
[   22.304109]  ? __virt_addr_valid+0x1db/0x2d0
[   22.304155]  ? kasan_atomics_helper+0x12e7/0x5450
[   22.304201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.304277]  ? kasan_atomics_helper+0x12e7/0x5450
[   22.304354]  kasan_report+0x140/0x180
[   22.304420]  ? kasan_atomics_helper+0x12e7/0x5450
[   22.304496]  kasan_check_range+0x10c/0x1c0
[   22.304562]  __kasan_check_write+0x18/0x20
[   22.304621]  kasan_atomics_helper+0x12e7/0x5450
[   22.304681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.304740]  ? kasan_save_alloc_info+0x3b/0x50
[   22.304803]  ? kasan_save_track+0x18/0x40
[   22.304889]  kasan_atomics+0x1dd/0x310
[   22.304962]  ? __pfx_kasan_atomics+0x10/0x10
[   22.305034]  ? __pfx_read_tsc+0x10/0x10
[   22.305084]  ? ktime_get_ts64+0x86/0x230
[   22.305145]  kunit_try_run_case+0x1a6/0x480
[   22.305210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.305270]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.305332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.305410]  ? __kthread_parkme+0x82/0x160
[   22.305461]  ? preempt_count_sub+0x50/0x80
[   22.305524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.305585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.305659]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.305727]  kthread+0x324/0x6e0
[   22.305788]  ? trace_preempt_on+0x20/0xc0
[   22.305870]  ? __pfx_kthread+0x10/0x10
[   22.305930]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.305997]  ? calculate_sigpending+0x7b/0xa0
[   22.306059]  ? __pfx_kthread+0x10/0x10
[   22.306121]  ret_from_fork+0x41/0x80
[   22.306171]  ? __pfx_kthread+0x10/0x10
[   22.306241]  ret_from_fork_asm+0x1a/0x30
[   22.306343]  </TASK>
[   22.306378] 
[   22.322279] Allocated by task 273:
[   22.322726]  kasan_save_stack+0x45/0x70
[   22.323393]  kasan_save_track+0x18/0x40
[   22.323983]  kasan_save_alloc_info+0x3b/0x50
[   22.324494]  __kasan_kmalloc+0xb7/0xc0
[   22.324985]  __kmalloc_cache_noprof+0x18a/0x420
[   22.325294]  kasan_atomics+0x96/0x310
[   22.325674]  kunit_try_run_case+0x1a6/0x480
[   22.326346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.326819]  kthread+0x324/0x6e0
[   22.327287]  ret_from_fork+0x41/0x80
[   22.327662]  ret_from_fork_asm+0x1a/0x30
[   22.328165] 
[   22.328402] The buggy address belongs to the object at ffff888102993400
[   22.328402]  which belongs to the cache kmalloc-64 of size 64
[   22.329428] The buggy address is located 0 bytes to the right of
[   22.329428]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.330242] 
[   22.330463] The buggy address belongs to the physical page:
[   22.331202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.331755] flags: 0x200000000000000(node=0|zone=2)
[   22.332239] page_type: f5(slab)
[   22.332579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.332989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.333689] page dumped because: kasan: bad access detected
[   22.334115] 
[   22.334273] Memory state around the buggy address:
[   22.334706]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.335076]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.336113] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.336549]                                      ^
[   22.337010]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.337467]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.337842] ==================================================================
[   21.831530] ==================================================================
[   21.832261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   21.833355] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.833819] 
[   21.834219] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.834352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.834389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.834444] Call Trace:
[   21.834486]  <TASK>
[   21.834530]  dump_stack_lvl+0x73/0xb0
[   21.834815]  print_report+0xd1/0x650
[   21.834910]  ? __virt_addr_valid+0x1db/0x2d0
[   21.834978]  ? kasan_atomics_helper+0x4a86/0x5450
[   21.835042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.835111]  ? kasan_atomics_helper+0x4a86/0x5450
[   21.835166]  kasan_report+0x140/0x180
[   21.835203]  ? kasan_atomics_helper+0x4a86/0x5450
[   21.835238]  __asan_report_load4_noabort+0x18/0x20
[   21.835271]  kasan_atomics_helper+0x4a86/0x5450
[   21.835310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.835350]  ? kasan_save_alloc_info+0x3b/0x50
[   21.835380]  ? kasan_save_track+0x18/0x40
[   21.835413]  kasan_atomics+0x1dd/0x310
[   21.835459]  ? __pfx_kasan_atomics+0x10/0x10
[   21.835515]  ? __pfx_read_tsc+0x10/0x10
[   21.835562]  ? ktime_get_ts64+0x86/0x230
[   21.835600]  kunit_try_run_case+0x1a6/0x480
[   21.835635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.835665]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.835711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.835744]  ? __kthread_parkme+0x82/0x160
[   21.835777]  ? preempt_count_sub+0x50/0x80
[   21.835811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.835844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.835900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.835935]  kthread+0x324/0x6e0
[   21.835966]  ? trace_preempt_on+0x20/0xc0
[   21.836001]  ? __pfx_kthread+0x10/0x10
[   21.836031]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.836063]  ? calculate_sigpending+0x7b/0xa0
[   21.836093]  ? __pfx_kthread+0x10/0x10
[   21.836124]  ret_from_fork+0x41/0x80
[   21.836151]  ? __pfx_kthread+0x10/0x10
[   21.836181]  ret_from_fork_asm+0x1a/0x30
[   21.836224]  </TASK>
[   21.836240] 
[   21.853103] Allocated by task 273:
[   21.853533]  kasan_save_stack+0x45/0x70
[   21.853975]  kasan_save_track+0x18/0x40
[   21.854359]  kasan_save_alloc_info+0x3b/0x50
[   21.854805]  __kasan_kmalloc+0xb7/0xc0
[   21.855619]  __kmalloc_cache_noprof+0x18a/0x420
[   21.855986]  kasan_atomics+0x96/0x310
[   21.856943]  kunit_try_run_case+0x1a6/0x480
[   21.857364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.857977]  kthread+0x324/0x6e0
[   21.858386]  ret_from_fork+0x41/0x80
[   21.858961]  ret_from_fork_asm+0x1a/0x30
[   21.859352] 
[   21.859663] The buggy address belongs to the object at ffff888102993400
[   21.859663]  which belongs to the cache kmalloc-64 of size 64
[   21.861082] The buggy address is located 0 bytes to the right of
[   21.861082]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.862182] 
[   21.862647] The buggy address belongs to the physical page:
[   21.863052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.863744] flags: 0x200000000000000(node=0|zone=2)
[   21.864250] page_type: f5(slab)
[   21.865090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.865749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.866378] page dumped because: kasan: bad access detected
[   21.866913] 
[   21.867303] Memory state around the buggy address:
[   21.867660]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.868094]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.868488] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.869687]                                      ^
[   21.870141]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.870660]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871433] ==================================================================
[   21.241247] ==================================================================
[   21.241838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   21.242538] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.243573] 
[   21.243791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.243953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.243992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.244045] Call Trace:
[   21.244093]  <TASK>
[   21.244136]  dump_stack_lvl+0x73/0xb0
[   21.244215]  print_report+0xd1/0x650
[   21.244276]  ? __virt_addr_valid+0x1db/0x2d0
[   21.244657]  ? kasan_atomics_helper+0x4a1/0x5450
[   21.244726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.244797]  ? kasan_atomics_helper+0x4a1/0x5450
[   21.244876]  kasan_report+0x140/0x180
[   21.244933]  ? kasan_atomics_helper+0x4a1/0x5450
[   21.245004]  kasan_check_range+0x10c/0x1c0
[   21.245071]  __kasan_check_write+0x18/0x20
[   21.245130]  kasan_atomics_helper+0x4a1/0x5450
[   21.245190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.245251]  ? kasan_save_alloc_info+0x3b/0x50
[   21.245351]  ? kasan_save_track+0x18/0x40
[   21.245408]  kasan_atomics+0x1dd/0x310
[   21.245467]  ? __pfx_kasan_atomics+0x10/0x10
[   21.245501]  ? __pfx_read_tsc+0x10/0x10
[   21.245534]  ? ktime_get_ts64+0x86/0x230
[   21.245570]  kunit_try_run_case+0x1a6/0x480
[   21.245604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.245632]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.245667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.245700]  ? __kthread_parkme+0x82/0x160
[   21.245730]  ? preempt_count_sub+0x50/0x80
[   21.245764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.245795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.245829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.245890]  kthread+0x324/0x6e0
[   21.245940]  ? trace_preempt_on+0x20/0xc0
[   21.245987]  ? __pfx_kthread+0x10/0x10
[   21.246019]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.246052]  ? calculate_sigpending+0x7b/0xa0
[   21.246083]  ? __pfx_kthread+0x10/0x10
[   21.246113]  ret_from_fork+0x41/0x80
[   21.246140]  ? __pfx_kthread+0x10/0x10
[   21.246169]  ret_from_fork_asm+0x1a/0x30
[   21.246213]  </TASK>
[   21.246228] 
[   21.261248] Allocated by task 273:
[   21.261735]  kasan_save_stack+0x45/0x70
[   21.262153]  kasan_save_track+0x18/0x40
[   21.262873]  kasan_save_alloc_info+0x3b/0x50
[   21.263324]  __kasan_kmalloc+0xb7/0xc0
[   21.263879]  __kmalloc_cache_noprof+0x18a/0x420
[   21.264318]  kasan_atomics+0x96/0x310
[   21.264693]  kunit_try_run_case+0x1a6/0x480
[   21.264986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.265290]  kthread+0x324/0x6e0
[   21.265659]  ret_from_fork+0x41/0x80
[   21.266044]  ret_from_fork_asm+0x1a/0x30
[   21.266467] 
[   21.266680] The buggy address belongs to the object at ffff888102993400
[   21.266680]  which belongs to the cache kmalloc-64 of size 64
[   21.268252] The buggy address is located 0 bytes to the right of
[   21.268252]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.269281] 
[   21.269680] The buggy address belongs to the physical page:
[   21.270057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.271084] flags: 0x200000000000000(node=0|zone=2)
[   21.271560] page_type: f5(slab)
[   21.272098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.272988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.273351] page dumped because: kasan: bad access detected
[   21.273978] 
[   21.274192] Memory state around the buggy address:
[   21.275204]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.275972]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.276485] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.276883]                                      ^
[   21.277352]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.277780]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.278820] ==================================================================
[   23.387554] ==================================================================
[   23.391264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   23.391976] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.392486] 
[   23.392751] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.392887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.392925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.392976] Call Trace:
[   23.393019]  <TASK>
[   23.393064]  dump_stack_lvl+0x73/0xb0
[   23.393153]  print_report+0xd1/0x650
[   23.393222]  ? __virt_addr_valid+0x1db/0x2d0
[   23.393329]  ? kasan_atomics_helper+0x218b/0x5450
[   23.393398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.393461]  ? kasan_atomics_helper+0x218b/0x5450
[   23.393511]  kasan_report+0x140/0x180
[   23.393546]  ? kasan_atomics_helper+0x218b/0x5450
[   23.393582]  kasan_check_range+0x10c/0x1c0
[   23.393614]  __kasan_check_write+0x18/0x20
[   23.393645]  kasan_atomics_helper+0x218b/0x5450
[   23.393675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.393706]  ? kasan_save_alloc_info+0x3b/0x50
[   23.393737]  ? kasan_save_track+0x18/0x40
[   23.393768]  kasan_atomics+0x1dd/0x310
[   23.393799]  ? __pfx_kasan_atomics+0x10/0x10
[   23.393830]  ? __pfx_read_tsc+0x10/0x10
[   23.393885]  ? ktime_get_ts64+0x86/0x230
[   23.393923]  kunit_try_run_case+0x1a6/0x480
[   23.393958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.393987]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.394023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.394054]  ? __kthread_parkme+0x82/0x160
[   23.394087]  ? preempt_count_sub+0x50/0x80
[   23.394120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.394152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.394186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.394221]  kthread+0x324/0x6e0
[   23.394250]  ? trace_preempt_on+0x20/0xc0
[   23.394294]  ? __pfx_kthread+0x10/0x10
[   23.394340]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.394375]  ? calculate_sigpending+0x7b/0xa0
[   23.394406]  ? __pfx_kthread+0x10/0x10
[   23.394437]  ret_from_fork+0x41/0x80
[   23.394463]  ? __pfx_kthread+0x10/0x10
[   23.394492]  ret_from_fork_asm+0x1a/0x30
[   23.394535]  </TASK>
[   23.394552] 
[   23.409070] Allocated by task 273:
[   23.409548]  kasan_save_stack+0x45/0x70
[   23.409898]  kasan_save_track+0x18/0x40
[   23.410336]  kasan_save_alloc_info+0x3b/0x50
[   23.410814]  __kasan_kmalloc+0xb7/0xc0
[   23.411205]  __kmalloc_cache_noprof+0x18a/0x420
[   23.411487]  kasan_atomics+0x96/0x310
[   23.411734]  kunit_try_run_case+0x1a6/0x480
[   23.412186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.412763]  kthread+0x324/0x6e0
[   23.413168]  ret_from_fork+0x41/0x80
[   23.413716]  ret_from_fork_asm+0x1a/0x30
[   23.414152] 
[   23.414564] The buggy address belongs to the object at ffff888102993400
[   23.414564]  which belongs to the cache kmalloc-64 of size 64
[   23.415831] The buggy address is located 0 bytes to the right of
[   23.415831]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.416726] 
[   23.416903] The buggy address belongs to the physical page:
[   23.417180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.418017] flags: 0x200000000000000(node=0|zone=2)
[   23.418634] page_type: f5(slab)
[   23.419031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.419782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.420404] page dumped because: kasan: bad access detected
[   23.420650] 
[   23.420889] Memory state around the buggy address:
[   23.421365]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.421900]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.422491] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.423038]                                      ^
[   23.423601]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.424339]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.424791] ==================================================================
[   23.493814] ==================================================================
[   23.495610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   23.496431] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.497188] 
[   23.497518] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.497641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.497679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.497740] Call Trace:
[   23.497792]  <TASK>
[   23.497842]  dump_stack_lvl+0x73/0xb0
[   23.497987]  print_report+0xd1/0x650
[   23.498059]  ? __virt_addr_valid+0x1db/0x2d0
[   23.498141]  ? kasan_atomics_helper+0x5117/0x5450
[   23.498199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.498259]  ? kasan_atomics_helper+0x5117/0x5450
[   23.498356]  kasan_report+0x140/0x180
[   23.498424]  ? kasan_atomics_helper+0x5117/0x5450
[   23.498499]  __asan_report_load8_noabort+0x18/0x20
[   23.498565]  kasan_atomics_helper+0x5117/0x5450
[   23.498630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.498695]  ? kasan_save_alloc_info+0x3b/0x50
[   23.498759]  ? kasan_save_track+0x18/0x40
[   23.498824]  kasan_atomics+0x1dd/0x310
[   23.499127]  ? __pfx_kasan_atomics+0x10/0x10
[   23.499174]  ? __pfx_read_tsc+0x10/0x10
[   23.499209]  ? ktime_get_ts64+0x86/0x230
[   23.499245]  kunit_try_run_case+0x1a6/0x480
[   23.499297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.499342]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.499379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.499414]  ? __kthread_parkme+0x82/0x160
[   23.499446]  ? preempt_count_sub+0x50/0x80
[   23.499480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.499512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.499547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.499582]  kthread+0x324/0x6e0
[   23.499612]  ? trace_preempt_on+0x20/0xc0
[   23.499645]  ? __pfx_kthread+0x10/0x10
[   23.499691]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.499724]  ? calculate_sigpending+0x7b/0xa0
[   23.499754]  ? __pfx_kthread+0x10/0x10
[   23.499785]  ret_from_fork+0x41/0x80
[   23.499810]  ? __pfx_kthread+0x10/0x10
[   23.499840]  ret_from_fork_asm+0x1a/0x30
[   23.499904]  </TASK>
[   23.499921] 
[   23.512665] Allocated by task 273:
[   23.513003]  kasan_save_stack+0x45/0x70
[   23.513481]  kasan_save_track+0x18/0x40
[   23.513966]  kasan_save_alloc_info+0x3b/0x50
[   23.514254]  __kasan_kmalloc+0xb7/0xc0
[   23.514503]  __kmalloc_cache_noprof+0x18a/0x420
[   23.514881]  kasan_atomics+0x96/0x310
[   23.515435]  kunit_try_run_case+0x1a6/0x480
[   23.515930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.516582]  kthread+0x324/0x6e0
[   23.516955]  ret_from_fork+0x41/0x80
[   23.517291]  ret_from_fork_asm+0x1a/0x30
[   23.517560] 
[   23.517780] The buggy address belongs to the object at ffff888102993400
[   23.517780]  which belongs to the cache kmalloc-64 of size 64
[   23.518876] The buggy address is located 0 bytes to the right of
[   23.518876]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.519867] 
[   23.520076] The buggy address belongs to the physical page:
[   23.520360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.521056] flags: 0x200000000000000(node=0|zone=2)
[   23.521668] page_type: f5(slab)
[   23.522054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.522693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.523185] page dumped because: kasan: bad access detected
[   23.523467] 
[   23.523653] Memory state around the buggy address:
[   23.524179]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.525213]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.525905] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.526300]                                      ^
[   23.526822]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.527470]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.527824] ==================================================================
[   21.791768] ==================================================================
[   21.792345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   21.793909] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.794363] 
[   21.795033] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.795104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.795132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.795182] Call Trace:
[   21.795226]  <TASK>
[   21.795267]  dump_stack_lvl+0x73/0xb0
[   21.795415]  print_report+0xd1/0x650
[   21.795498]  ? __virt_addr_valid+0x1db/0x2d0
[   21.795563]  ? kasan_atomics_helper+0xc71/0x5450
[   21.795617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.795677]  ? kasan_atomics_helper+0xc71/0x5450
[   21.795731]  kasan_report+0x140/0x180
[   21.795766]  ? kasan_atomics_helper+0xc71/0x5450
[   21.795802]  kasan_check_range+0x10c/0x1c0
[   21.795834]  __kasan_check_write+0x18/0x20
[   21.795887]  kasan_atomics_helper+0xc71/0x5450
[   21.795918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.795949]  ? kasan_save_alloc_info+0x3b/0x50
[   21.795979]  ? kasan_save_track+0x18/0x40
[   21.796011]  kasan_atomics+0x1dd/0x310
[   21.796042]  ? __pfx_kasan_atomics+0x10/0x10
[   21.796074]  ? __pfx_read_tsc+0x10/0x10
[   21.796107]  ? ktime_get_ts64+0x86/0x230
[   21.796142]  kunit_try_run_case+0x1a6/0x480
[   21.796176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.796206]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.796241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.796274]  ? __kthread_parkme+0x82/0x160
[   21.796304]  ? preempt_count_sub+0x50/0x80
[   21.796338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.796370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.796405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.796440]  kthread+0x324/0x6e0
[   21.796483]  ? trace_preempt_on+0x20/0xc0
[   21.796542]  ? __pfx_kthread+0x10/0x10
[   21.796590]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.796624]  ? calculate_sigpending+0x7b/0xa0
[   21.796655]  ? __pfx_kthread+0x10/0x10
[   21.796687]  ret_from_fork+0x41/0x80
[   21.796716]  ? __pfx_kthread+0x10/0x10
[   21.796747]  ret_from_fork_asm+0x1a/0x30
[   21.796792]  </TASK>
[   21.796807] 
[   21.813029] Allocated by task 273:
[   21.813913]  kasan_save_stack+0x45/0x70
[   21.814266]  kasan_save_track+0x18/0x40
[   21.814819]  kasan_save_alloc_info+0x3b/0x50
[   21.815151]  __kasan_kmalloc+0xb7/0xc0
[   21.815780]  __kmalloc_cache_noprof+0x18a/0x420
[   21.816144]  kasan_atomics+0x96/0x310
[   21.816656]  kunit_try_run_case+0x1a6/0x480
[   21.816987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.817935]  kthread+0x324/0x6e0
[   21.818322]  ret_from_fork+0x41/0x80
[   21.818622]  ret_from_fork_asm+0x1a/0x30
[   21.819076] 
[   21.819269] The buggy address belongs to the object at ffff888102993400
[   21.819269]  which belongs to the cache kmalloc-64 of size 64
[   21.820187] The buggy address is located 0 bytes to the right of
[   21.820187]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.821096] 
[   21.821364] The buggy address belongs to the physical page:
[   21.822375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.823088] flags: 0x200000000000000(node=0|zone=2)
[   21.823792] page_type: f5(slab)
[   21.824113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.824863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.825511] page dumped because: kasan: bad access detected
[   21.825882] 
[   21.826100] Memory state around the buggy address:
[   21.826479]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.826896]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.827276] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.827829]                                      ^
[   21.828668]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.830388]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.830796] ==================================================================
[   21.709431] ==================================================================
[   21.709929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   21.710960] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.711744] 
[   21.712017] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.712186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.712223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.712282] Call Trace:
[   21.712329]  <TASK>
[   21.712373]  dump_stack_lvl+0x73/0xb0
[   21.712455]  print_report+0xd1/0x650
[   21.712518]  ? __virt_addr_valid+0x1db/0x2d0
[   21.712714]  ? kasan_atomics_helper+0xac8/0x5450
[   21.712781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.713203]  ? kasan_atomics_helper+0xac8/0x5450
[   21.713275]  kasan_report+0x140/0x180
[   21.713337]  ? kasan_atomics_helper+0xac8/0x5450
[   21.713410]  kasan_check_range+0x10c/0x1c0
[   21.713475]  __kasan_check_write+0x18/0x20
[   21.713513]  kasan_atomics_helper+0xac8/0x5450
[   21.713545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.713577]  ? kasan_save_alloc_info+0x3b/0x50
[   21.713608]  ? kasan_save_track+0x18/0x40
[   21.713640]  kasan_atomics+0x1dd/0x310
[   21.713671]  ? __pfx_kasan_atomics+0x10/0x10
[   21.713703]  ? __pfx_read_tsc+0x10/0x10
[   21.713733]  ? ktime_get_ts64+0x86/0x230
[   21.713769]  kunit_try_run_case+0x1a6/0x480
[   21.713803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.713832]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.713896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.713952]  ? __kthread_parkme+0x82/0x160
[   21.714009]  ? preempt_count_sub+0x50/0x80
[   21.714055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.714090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.714127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.714163]  kthread+0x324/0x6e0
[   21.714192]  ? trace_preempt_on+0x20/0xc0
[   21.714226]  ? __pfx_kthread+0x10/0x10
[   21.714257]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.714290]  ? calculate_sigpending+0x7b/0xa0
[   21.714336]  ? __pfx_kthread+0x10/0x10
[   21.714369]  ret_from_fork+0x41/0x80
[   21.714420]  ? __pfx_kthread+0x10/0x10
[   21.714476]  ret_from_fork_asm+0x1a/0x30
[   21.714546]  </TASK>
[   21.714567] 
[   21.731197] Allocated by task 273:
[   21.731580]  kasan_save_stack+0x45/0x70
[   21.731948]  kasan_save_track+0x18/0x40
[   21.732364]  kasan_save_alloc_info+0x3b/0x50
[   21.732678]  __kasan_kmalloc+0xb7/0xc0
[   21.733782]  __kmalloc_cache_noprof+0x18a/0x420
[   21.734168]  kasan_atomics+0x96/0x310
[   21.734703]  kunit_try_run_case+0x1a6/0x480
[   21.735166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.735603]  kthread+0x324/0x6e0
[   21.735983]  ret_from_fork+0x41/0x80
[   21.736422]  ret_from_fork_asm+0x1a/0x30
[   21.737473] 
[   21.737630] The buggy address belongs to the object at ffff888102993400
[   21.737630]  which belongs to the cache kmalloc-64 of size 64
[   21.738138] The buggy address is located 0 bytes to the right of
[   21.738138]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.740028] 
[   21.740179] The buggy address belongs to the physical page:
[   21.740602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.741390] flags: 0x200000000000000(node=0|zone=2)
[   21.742481] page_type: f5(slab)
[   21.742767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.743266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.744241] page dumped because: kasan: bad access detected
[   21.744874] 
[   21.745407] Memory state around the buggy address:
[   21.746346]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.746984]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.747663] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.748237]                                      ^
[   21.749153]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.749926]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.750357] ==================================================================
[   21.113985] ==================================================================
[   21.114811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   21.115325] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.115788] 
[   21.116746] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.116882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.116917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.116970] Call Trace:
[   21.117012]  <TASK>
[   21.117055]  dump_stack_lvl+0x73/0xb0
[   21.117129]  print_report+0xd1/0x650
[   21.117192]  ? __virt_addr_valid+0x1db/0x2d0
[   21.117253]  ? kasan_atomics_helper+0x4b70/0x5450
[   21.117309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.117366]  ? kasan_atomics_helper+0x4b70/0x5450
[   21.117420]  kasan_report+0x140/0x180
[   21.117475]  ? kasan_atomics_helper+0x4b70/0x5450
[   21.117543]  __asan_report_store4_noabort+0x1b/0x30
[   21.117604]  kasan_atomics_helper+0x4b70/0x5450
[   21.117658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.117709]  ? kasan_save_alloc_info+0x3b/0x50
[   21.117757]  ? kasan_save_track+0x18/0x40
[   21.117812]  kasan_atomics+0x1dd/0x310
[   21.117886]  ? __pfx_kasan_atomics+0x10/0x10
[   21.117952]  ? __pfx_read_tsc+0x10/0x10
[   21.118009]  ? ktime_get_ts64+0x86/0x230
[   21.118080]  kunit_try_run_case+0x1a6/0x480
[   21.118142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.118201]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.118268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.118327]  ? __kthread_parkme+0x82/0x160
[   21.118365]  ? preempt_count_sub+0x50/0x80
[   21.118398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.118429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.118465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.118499]  kthread+0x324/0x6e0
[   21.118526]  ? trace_preempt_on+0x20/0xc0
[   21.118558]  ? __pfx_kthread+0x10/0x10
[   21.118586]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.118616]  ? calculate_sigpending+0x7b/0xa0
[   21.118644]  ? __pfx_kthread+0x10/0x10
[   21.118673]  ret_from_fork+0x41/0x80
[   21.118697]  ? __pfx_kthread+0x10/0x10
[   21.118725]  ret_from_fork_asm+0x1a/0x30
[   21.118766]  </TASK>
[   21.118780] 
[   21.136366] Allocated by task 273:
[   21.137345]  kasan_save_stack+0x45/0x70
[   21.138160]  kasan_save_track+0x18/0x40
[   21.138884]  kasan_save_alloc_info+0x3b/0x50
[   21.139378]  __kasan_kmalloc+0xb7/0xc0
[   21.139623]  __kmalloc_cache_noprof+0x18a/0x420
[   21.139783]  kasan_atomics+0x96/0x310
[   21.139980]  kunit_try_run_case+0x1a6/0x480
[   21.140523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.140828]  kthread+0x324/0x6e0
[   21.141073]  ret_from_fork+0x41/0x80
[   21.141292]  ret_from_fork_asm+0x1a/0x30
[   21.142173] 
[   21.142719] The buggy address belongs to the object at ffff888102993400
[   21.142719]  which belongs to the cache kmalloc-64 of size 64
[   21.143645] The buggy address is located 0 bytes to the right of
[   21.143645]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.144952] 
[   21.145201] The buggy address belongs to the physical page:
[   21.145904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.146708] flags: 0x200000000000000(node=0|zone=2)
[   21.147186] page_type: f5(slab)
[   21.147892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.148347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.148989] page dumped because: kasan: bad access detected
[   21.149307] 
[   21.150041] Memory state around the buggy address:
[   21.150615]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.151675]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.152322] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.152816]                                      ^
[   21.153388]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153739]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.154825] ==================================================================
[   21.752140] ==================================================================
[   21.753135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   21.753530] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.754390] 
[   21.754844] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.754973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.755011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.755062] Call Trace:
[   21.755109]  <TASK>
[   21.755156]  dump_stack_lvl+0x73/0xb0
[   21.755234]  print_report+0xd1/0x650
[   21.755337]  ? __virt_addr_valid+0x1db/0x2d0
[   21.755409]  ? kasan_atomics_helper+0xb6b/0x5450
[   21.755506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.755564]  ? kasan_atomics_helper+0xb6b/0x5450
[   21.755596]  kasan_report+0x140/0x180
[   21.755629]  ? kasan_atomics_helper+0xb6b/0x5450
[   21.755666]  kasan_check_range+0x10c/0x1c0
[   21.755712]  __kasan_check_write+0x18/0x20
[   21.755744]  kasan_atomics_helper+0xb6b/0x5450
[   21.755774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.755805]  ? kasan_save_alloc_info+0x3b/0x50
[   21.755836]  ? kasan_save_track+0x18/0x40
[   21.755890]  kasan_atomics+0x1dd/0x310
[   21.755922]  ? __pfx_kasan_atomics+0x10/0x10
[   21.755955]  ? __pfx_read_tsc+0x10/0x10
[   21.755987]  ? ktime_get_ts64+0x86/0x230
[   21.756024]  kunit_try_run_case+0x1a6/0x480
[   21.756058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.756089]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.756125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.756159]  ? __kthread_parkme+0x82/0x160
[   21.756190]  ? preempt_count_sub+0x50/0x80
[   21.756226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.756258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.756296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.756344]  kthread+0x324/0x6e0
[   21.756374]  ? trace_preempt_on+0x20/0xc0
[   21.756410]  ? __pfx_kthread+0x10/0x10
[   21.756456]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.756514]  ? calculate_sigpending+0x7b/0xa0
[   21.756569]  ? __pfx_kthread+0x10/0x10
[   21.756622]  ret_from_fork+0x41/0x80
[   21.756671]  ? __pfx_kthread+0x10/0x10
[   21.756723]  ret_from_fork_asm+0x1a/0x30
[   21.756799]  </TASK>
[   21.756821] 
[   21.772249] Allocated by task 273:
[   21.772899]  kasan_save_stack+0x45/0x70
[   21.773229]  kasan_save_track+0x18/0x40
[   21.773646]  kasan_save_alloc_info+0x3b/0x50
[   21.774108]  __kasan_kmalloc+0xb7/0xc0
[   21.774999]  __kmalloc_cache_noprof+0x18a/0x420
[   21.775444]  kasan_atomics+0x96/0x310
[   21.775895]  kunit_try_run_case+0x1a6/0x480
[   21.776334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.776751]  kthread+0x324/0x6e0
[   21.777091]  ret_from_fork+0x41/0x80
[   21.777376]  ret_from_fork_asm+0x1a/0x30
[   21.777725] 
[   21.778164] The buggy address belongs to the object at ffff888102993400
[   21.778164]  which belongs to the cache kmalloc-64 of size 64
[   21.779214] The buggy address is located 0 bytes to the right of
[   21.779214]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.780558] 
[   21.780797] The buggy address belongs to the physical page:
[   21.781320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.782125] flags: 0x200000000000000(node=0|zone=2)
[   21.782982] page_type: f5(slab)
[   21.783335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.783945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.784744] page dumped because: kasan: bad access detected
[   21.785098] 
[   21.785319] Memory state around the buggy address:
[   21.785916]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.786322]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.787394] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.788268]                                      ^
[   21.789002]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.789745]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.790390] ==================================================================
[   23.041090] ==================================================================
[   23.041575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   23.041969] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.042646] 
[   23.042907] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.043016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.043054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.043111] Call Trace:
[   23.043158]  <TASK>
[   23.043199]  dump_stack_lvl+0x73/0xb0
[   23.043277]  print_report+0xd1/0x650
[   23.043343]  ? __virt_addr_valid+0x1db/0x2d0
[   23.043407]  ? kasan_atomics_helper+0x1ce2/0x5450
[   23.043469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.043541]  ? kasan_atomics_helper+0x1ce2/0x5450
[   23.043603]  kasan_report+0x140/0x180
[   23.043667]  ? kasan_atomics_helper+0x1ce2/0x5450
[   23.043752]  kasan_check_range+0x10c/0x1c0
[   23.043819]  __kasan_check_write+0x18/0x20
[   23.043899]  kasan_atomics_helper+0x1ce2/0x5450
[   23.043956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.044014]  ? kasan_save_alloc_info+0x3b/0x50
[   23.044074]  ? kasan_save_track+0x18/0x40
[   23.044143]  kasan_atomics+0x1dd/0x310
[   23.044207]  ? __pfx_kasan_atomics+0x10/0x10
[   23.044273]  ? __pfx_read_tsc+0x10/0x10
[   23.044329]  ? ktime_get_ts64+0x86/0x230
[   23.044403]  kunit_try_run_case+0x1a6/0x480
[   23.044471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.044530]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.044602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.044671]  ? __kthread_parkme+0x82/0x160
[   23.044734]  ? preempt_count_sub+0x50/0x80
[   23.044805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.044888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.044965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.045040]  kthread+0x324/0x6e0
[   23.045102]  ? trace_preempt_on+0x20/0xc0
[   23.045169]  ? __pfx_kthread+0x10/0x10
[   23.045233]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.045300]  ? calculate_sigpending+0x7b/0xa0
[   23.045362]  ? __pfx_kthread+0x10/0x10
[   23.045428]  ret_from_fork+0x41/0x80
[   23.045484]  ? __pfx_kthread+0x10/0x10
[   23.045543]  ret_from_fork_asm+0x1a/0x30
[   23.045622]  </TASK>
[   23.045654] 
[   23.057598] Allocated by task 273:
[   23.058009]  kasan_save_stack+0x45/0x70
[   23.058481]  kasan_save_track+0x18/0x40
[   23.058884]  kasan_save_alloc_info+0x3b/0x50
[   23.059210]  __kasan_kmalloc+0xb7/0xc0
[   23.059826]  __kmalloc_cache_noprof+0x18a/0x420
[   23.060204]  kasan_atomics+0x96/0x310
[   23.060687]  kunit_try_run_case+0x1a6/0x480
[   23.061077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.061609]  kthread+0x324/0x6e0
[   23.061869]  ret_from_fork+0x41/0x80
[   23.062107]  ret_from_fork_asm+0x1a/0x30
[   23.062355] 
[   23.062501] The buggy address belongs to the object at ffff888102993400
[   23.062501]  which belongs to the cache kmalloc-64 of size 64
[   23.063449] The buggy address is located 0 bytes to the right of
[   23.063449]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.064618] 
[   23.064841] The buggy address belongs to the physical page:
[   23.065253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.065668] flags: 0x200000000000000(node=0|zone=2)
[   23.066065] page_type: f5(slab)
[   23.066454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.067089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.067724] page dumped because: kasan: bad access detected
[   23.068126] 
[   23.068351] Memory state around the buggy address:
[   23.068662]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.069031]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.069391] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.070177]                                      ^
[   23.070705]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071221]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071625] ==================================================================
[   21.948209] ==================================================================
[   21.949492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   21.949812] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.950496] 
[   21.950737] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.950847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.950899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.950953] Call Trace:
[   21.950999]  <TASK>
[   21.951041]  dump_stack_lvl+0x73/0xb0
[   21.951120]  print_report+0xd1/0x650
[   21.951182]  ? __virt_addr_valid+0x1db/0x2d0
[   21.951248]  ? kasan_atomics_helper+0xe79/0x5450
[   21.951308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.951381]  ? kasan_atomics_helper+0xe79/0x5450
[   21.951444]  kasan_report+0x140/0x180
[   21.951509]  ? kasan_atomics_helper+0xe79/0x5450
[   21.951581]  kasan_check_range+0x10c/0x1c0
[   21.951642]  __kasan_check_write+0x18/0x20
[   21.951710]  kasan_atomics_helper+0xe79/0x5450
[   21.951770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.951830]  ? kasan_save_alloc_info+0x3b/0x50
[   21.951910]  ? kasan_save_track+0x18/0x40
[   21.951971]  kasan_atomics+0x1dd/0x310
[   21.952031]  ? __pfx_kasan_atomics+0x10/0x10
[   21.952087]  ? __pfx_read_tsc+0x10/0x10
[   21.952148]  ? ktime_get_ts64+0x86/0x230
[   21.952219]  kunit_try_run_case+0x1a6/0x480
[   21.952292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.952341]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.952381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.952417]  ? __kthread_parkme+0x82/0x160
[   21.952448]  ? preempt_count_sub+0x50/0x80
[   21.952482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.952514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.952551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.952586]  kthread+0x324/0x6e0
[   21.952615]  ? trace_preempt_on+0x20/0xc0
[   21.952648]  ? __pfx_kthread+0x10/0x10
[   21.952679]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.952711]  ? calculate_sigpending+0x7b/0xa0
[   21.952740]  ? __pfx_kthread+0x10/0x10
[   21.952770]  ret_from_fork+0x41/0x80
[   21.952796]  ? __pfx_kthread+0x10/0x10
[   21.952826]  ret_from_fork_asm+0x1a/0x30
[   21.952887]  </TASK>
[   21.952905] 
[   21.968490] Allocated by task 273:
[   21.968877]  kasan_save_stack+0x45/0x70
[   21.969278]  kasan_save_track+0x18/0x40
[   21.969777]  kasan_save_alloc_info+0x3b/0x50
[   21.970118]  __kasan_kmalloc+0xb7/0xc0
[   21.970935]  __kmalloc_cache_noprof+0x18a/0x420
[   21.971502]  kasan_atomics+0x96/0x310
[   21.971921]  kunit_try_run_case+0x1a6/0x480
[   21.973422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.973725]  kthread+0x324/0x6e0
[   21.974149]  ret_from_fork+0x41/0x80
[   21.974679]  ret_from_fork_asm+0x1a/0x30
[   21.975126] 
[   21.975374] The buggy address belongs to the object at ffff888102993400
[   21.975374]  which belongs to the cache kmalloc-64 of size 64
[   21.976595] The buggy address is located 0 bytes to the right of
[   21.976595]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.977623] 
[   21.977939] The buggy address belongs to the physical page:
[   21.978533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.979145] flags: 0x200000000000000(node=0|zone=2)
[   21.979448] page_type: f5(slab)
[   21.979806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.980404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.980786] page dumped because: kasan: bad access detected
[   21.981173] 
[   21.981410] Memory state around the buggy address:
[   21.981863]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.982490]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.983036] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.983529]                                      ^
[   21.983957]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.984548]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985009] ==================================================================
[   23.179585] ==================================================================
[   23.180110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   23.180561] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.180931] 
[   23.181238] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.181352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.181381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.181423] Call Trace:
[   23.181465]  <TASK>
[   23.181500]  dump_stack_lvl+0x73/0xb0
[   23.181575]  print_report+0xd1/0x650
[   23.181635]  ? __virt_addr_valid+0x1db/0x2d0
[   23.181696]  ? kasan_atomics_helper+0x1f44/0x5450
[   23.181755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.181824]  ? kasan_atomics_helper+0x1f44/0x5450
[   23.181902]  kasan_report+0x140/0x180
[   23.181965]  ? kasan_atomics_helper+0x1f44/0x5450
[   23.182037]  kasan_check_range+0x10c/0x1c0
[   23.182104]  __kasan_check_write+0x18/0x20
[   23.182170]  kasan_atomics_helper+0x1f44/0x5450
[   23.182234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.182334]  ? kasan_save_alloc_info+0x3b/0x50
[   23.182405]  ? kasan_save_track+0x18/0x40
[   23.182473]  kasan_atomics+0x1dd/0x310
[   23.182535]  ? __pfx_kasan_atomics+0x10/0x10
[   23.182595]  ? __pfx_read_tsc+0x10/0x10
[   23.182672]  ? ktime_get_ts64+0x86/0x230
[   23.182732]  kunit_try_run_case+0x1a6/0x480
[   23.182791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.182863]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.182929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.182992]  ? __kthread_parkme+0x82/0x160
[   23.183051]  ? preempt_count_sub+0x50/0x80
[   23.183118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.183186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.183263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.183379]  kthread+0x324/0x6e0
[   23.183442]  ? trace_preempt_on+0x20/0xc0
[   23.183510]  ? __pfx_kthread+0x10/0x10
[   23.183571]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.183638]  ? calculate_sigpending+0x7b/0xa0
[   23.183711]  ? __pfx_kthread+0x10/0x10
[   23.183775]  ret_from_fork+0x41/0x80
[   23.183831]  ? __pfx_kthread+0x10/0x10
[   23.183910]  ret_from_fork_asm+0x1a/0x30
[   23.183999]  </TASK>
[   23.184033] 
[   23.196431] Allocated by task 273:
[   23.196820]  kasan_save_stack+0x45/0x70
[   23.197215]  kasan_save_track+0x18/0x40
[   23.197509]  kasan_save_alloc_info+0x3b/0x50
[   23.197937]  __kasan_kmalloc+0xb7/0xc0
[   23.198372]  __kmalloc_cache_noprof+0x18a/0x420
[   23.198807]  kasan_atomics+0x96/0x310
[   23.199088]  kunit_try_run_case+0x1a6/0x480
[   23.199406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.199727]  kthread+0x324/0x6e0
[   23.200064]  ret_from_fork+0x41/0x80
[   23.200496]  ret_from_fork_asm+0x1a/0x30
[   23.200929] 
[   23.201147] The buggy address belongs to the object at ffff888102993400
[   23.201147]  which belongs to the cache kmalloc-64 of size 64
[   23.202136] The buggy address is located 0 bytes to the right of
[   23.202136]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.203202] 
[   23.203466] The buggy address belongs to the physical page:
[   23.203834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.204228] flags: 0x200000000000000(node=0|zone=2)
[   23.204720] page_type: f5(slab)
[   23.205065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.205718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.206087] page dumped because: kasan: bad access detected
[   23.206406] 
[   23.206551] Memory state around the buggy address:
[   23.206809]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.207506]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.208174] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.209017]                                      ^
[   23.209328]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.209676]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.210019] ==================================================================
[   22.937215] ==================================================================
[   22.937604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   22.938658] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.939230] 
[   22.939447] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.939583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.939624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.939688] Call Trace:
[   22.939754]  <TASK>
[   22.939801]  dump_stack_lvl+0x73/0xb0
[   22.939892]  print_report+0xd1/0x650
[   22.939958]  ? __virt_addr_valid+0x1db/0x2d0
[   22.940023]  ? kasan_atomics_helper+0x1b23/0x5450
[   22.940084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.940146]  ? kasan_atomics_helper+0x1b23/0x5450
[   22.940203]  kasan_report+0x140/0x180
[   22.940265]  ? kasan_atomics_helper+0x1b23/0x5450
[   22.940334]  kasan_check_range+0x10c/0x1c0
[   22.940400]  __kasan_check_write+0x18/0x20
[   22.940493]  kasan_atomics_helper+0x1b23/0x5450
[   22.940556]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.940621]  ? kasan_save_alloc_info+0x3b/0x50
[   22.940686]  ? kasan_save_track+0x18/0x40
[   22.940731]  kasan_atomics+0x1dd/0x310
[   22.940765]  ? __pfx_kasan_atomics+0x10/0x10
[   22.940799]  ? __pfx_read_tsc+0x10/0x10
[   22.940831]  ? ktime_get_ts64+0x86/0x230
[   22.940888]  kunit_try_run_case+0x1a6/0x480
[   22.940924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.940953]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.940990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.941022]  ? __kthread_parkme+0x82/0x160
[   22.941054]  ? preempt_count_sub+0x50/0x80
[   22.941088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.941119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.941154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.941190]  kthread+0x324/0x6e0
[   22.941218]  ? trace_preempt_on+0x20/0xc0
[   22.941252]  ? __pfx_kthread+0x10/0x10
[   22.941282]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.941330]  ? calculate_sigpending+0x7b/0xa0
[   22.941361]  ? __pfx_kthread+0x10/0x10
[   22.941391]  ret_from_fork+0x41/0x80
[   22.941418]  ? __pfx_kthread+0x10/0x10
[   22.941448]  ret_from_fork_asm+0x1a/0x30
[   22.941491]  </TASK>
[   22.941507] 
[   22.954277] Allocated by task 273:
[   22.954883]  kasan_save_stack+0x45/0x70
[   22.955160]  kasan_save_track+0x18/0x40
[   22.955836]  kasan_save_alloc_info+0x3b/0x50
[   22.956164]  __kasan_kmalloc+0xb7/0xc0
[   22.956405]  __kmalloc_cache_noprof+0x18a/0x420
[   22.956677]  kasan_atomics+0x96/0x310
[   22.956927]  kunit_try_run_case+0x1a6/0x480
[   22.957183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.957726]  kthread+0x324/0x6e0
[   22.958218]  ret_from_fork+0x41/0x80
[   22.958541]  ret_from_fork_asm+0x1a/0x30
[   22.959000] 
[   22.959188] The buggy address belongs to the object at ffff888102993400
[   22.959188]  which belongs to the cache kmalloc-64 of size 64
[   22.959986] The buggy address is located 0 bytes to the right of
[   22.959986]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.960524] 
[   22.960756] The buggy address belongs to the physical page:
[   22.961286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.962640] flags: 0x200000000000000(node=0|zone=2)
[   22.964059] page_type: f5(slab)
[   22.964408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.965231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.965914] page dumped because: kasan: bad access detected
[   22.966264] 
[   22.966515] Memory state around the buggy address:
[   22.966985]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.967361]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.967989] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.968721]                                      ^
[   22.969261]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.969628]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.970273] ==================================================================
[   22.267082] ==================================================================
[   22.267874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   22.268580] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.269061] 
[   22.269392] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.269500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.269572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.269646] Call Trace:
[   22.269698]  <TASK>
[   22.269740]  dump_stack_lvl+0x73/0xb0
[   22.269864]  print_report+0xd1/0x650
[   22.269958]  ? __virt_addr_valid+0x1db/0x2d0
[   22.270026]  ? kasan_atomics_helper+0x49ea/0x5450
[   22.270084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.270187]  ? kasan_atomics_helper+0x49ea/0x5450
[   22.270269]  kasan_report+0x140/0x180
[   22.270375]  ? kasan_atomics_helper+0x49ea/0x5450
[   22.270466]  __asan_report_load4_noabort+0x18/0x20
[   22.270572]  kasan_atomics_helper+0x49ea/0x5450
[   22.270656]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.270717]  ? kasan_save_alloc_info+0x3b/0x50
[   22.270809]  ? kasan_save_track+0x18/0x40
[   22.270900]  kasan_atomics+0x1dd/0x310
[   22.270967]  ? __pfx_kasan_atomics+0x10/0x10
[   22.271025]  ? __pfx_read_tsc+0x10/0x10
[   22.271060]  ? ktime_get_ts64+0x86/0x230
[   22.271099]  kunit_try_run_case+0x1a6/0x480
[   22.271134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.271164]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.271200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.271233]  ? __kthread_parkme+0x82/0x160
[   22.271265]  ? preempt_count_sub+0x50/0x80
[   22.271322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.271359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.271396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.271430]  kthread+0x324/0x6e0
[   22.271460]  ? trace_preempt_on+0x20/0xc0
[   22.271494]  ? __pfx_kthread+0x10/0x10
[   22.271525]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.271557]  ? calculate_sigpending+0x7b/0xa0
[   22.271588]  ? __pfx_kthread+0x10/0x10
[   22.271619]  ret_from_fork+0x41/0x80
[   22.271645]  ? __pfx_kthread+0x10/0x10
[   22.271676]  ret_from_fork_asm+0x1a/0x30
[   22.271731]  </TASK>
[   22.271747] 
[   22.285649] Allocated by task 273:
[   22.285919]  kasan_save_stack+0x45/0x70
[   22.286450]  kasan_save_track+0x18/0x40
[   22.286899]  kasan_save_alloc_info+0x3b/0x50
[   22.287454]  __kasan_kmalloc+0xb7/0xc0
[   22.287747]  __kmalloc_cache_noprof+0x18a/0x420
[   22.288044]  kasan_atomics+0x96/0x310
[   22.288287]  kunit_try_run_case+0x1a6/0x480
[   22.288752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.289440]  kthread+0x324/0x6e0
[   22.289811]  ret_from_fork+0x41/0x80
[   22.290216]  ret_from_fork_asm+0x1a/0x30
[   22.290673] 
[   22.290940] The buggy address belongs to the object at ffff888102993400
[   22.290940]  which belongs to the cache kmalloc-64 of size 64
[   22.291814] The buggy address is located 0 bytes to the right of
[   22.291814]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.292725] 
[   22.292952] The buggy address belongs to the physical page:
[   22.293522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.293991] flags: 0x200000000000000(node=0|zone=2)
[   22.294504] page_type: f5(slab)
[   22.294781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.295536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.296046] page dumped because: kasan: bad access detected
[   22.296400] 
[   22.296632] Memory state around the buggy address:
[   22.297152]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.297595]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.298258] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.298596]                                      ^
[   22.299093]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.299559]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.300156] ==================================================================
[   22.196025] ==================================================================
[   22.196552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   22.196878] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   22.197203] 
[   22.197396] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.197508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.197543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.197598] Call Trace:
[   22.197648]  <TASK>
[   22.197695]  dump_stack_lvl+0x73/0xb0
[   22.197774]  print_report+0xd1/0x650
[   22.197836]  ? __virt_addr_valid+0x1db/0x2d0
[   22.197916]  ? kasan_atomics_helper+0x4a04/0x5450
[   22.197975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.198048]  ? kasan_atomics_helper+0x4a04/0x5450
[   22.198113]  kasan_report+0x140/0x180
[   22.198178]  ? kasan_atomics_helper+0x4a04/0x5450
[   22.198254]  __asan_report_load4_noabort+0x18/0x20
[   22.198390]  kasan_atomics_helper+0x4a04/0x5450
[   22.198464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.198527]  ? kasan_save_alloc_info+0x3b/0x50
[   22.198618]  ? kasan_save_track+0x18/0x40
[   22.198698]  kasan_atomics+0x1dd/0x310
[   22.198764]  ? __pfx_kasan_atomics+0x10/0x10
[   22.198831]  ? __pfx_read_tsc+0x10/0x10
[   22.198910]  ? ktime_get_ts64+0x86/0x230
[   22.198985]  kunit_try_run_case+0x1a6/0x480
[   22.199053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.199114]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.199182]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.199246]  ? __kthread_parkme+0x82/0x160
[   22.199346]  ? preempt_count_sub+0x50/0x80
[   22.199420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.199469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.199509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.199545]  kthread+0x324/0x6e0
[   22.199575]  ? trace_preempt_on+0x20/0xc0
[   22.199609]  ? __pfx_kthread+0x10/0x10
[   22.199639]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.199672]  ? calculate_sigpending+0x7b/0xa0
[   22.199715]  ? __pfx_kthread+0x10/0x10
[   22.199745]  ret_from_fork+0x41/0x80
[   22.199772]  ? __pfx_kthread+0x10/0x10
[   22.199801]  ret_from_fork_asm+0x1a/0x30
[   22.199844]  </TASK>
[   22.199881] 
[   22.212867] Allocated by task 273:
[   22.213261]  kasan_save_stack+0x45/0x70
[   22.213715]  kasan_save_track+0x18/0x40
[   22.214146]  kasan_save_alloc_info+0x3b/0x50
[   22.215113]  __kasan_kmalloc+0xb7/0xc0
[   22.215416]  __kmalloc_cache_noprof+0x18a/0x420
[   22.215697]  kasan_atomics+0x96/0x310
[   22.216107]  kunit_try_run_case+0x1a6/0x480
[   22.216384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.216822]  kthread+0x324/0x6e0
[   22.217103]  ret_from_fork+0x41/0x80
[   22.217592]  ret_from_fork_asm+0x1a/0x30
[   22.218027] 
[   22.218195] The buggy address belongs to the object at ffff888102993400
[   22.218195]  which belongs to the cache kmalloc-64 of size 64
[   22.218820] The buggy address is located 0 bytes to the right of
[   22.218820]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.220514] 
[   22.220706] The buggy address belongs to the physical page:
[   22.221120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.221625] flags: 0x200000000000000(node=0|zone=2)
[   22.221928] page_type: f5(slab)
[   22.222149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.223634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.224684] page dumped because: kasan: bad access detected
[   22.225040] 
[   22.225172] Memory state around the buggy address:
[   22.225943]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.226881]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.227556] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.228103]                                      ^
[   22.228509]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.229209]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.229911] ==================================================================
[   23.147091] ==================================================================
[   23.148702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   23.149949] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.150817] 
[   23.151347] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.151599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.151642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.151755] Call Trace:
[   23.151792]  <TASK>
[   23.151821]  dump_stack_lvl+0x73/0xb0
[   23.151888]  print_report+0xd1/0x650
[   23.151923]  ? __virt_addr_valid+0x1db/0x2d0
[   23.151957]  ? kasan_atomics_helper+0x1eab/0x5450
[   23.151987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.152022]  ? kasan_atomics_helper+0x1eab/0x5450
[   23.152051]  kasan_report+0x140/0x180
[   23.152082]  ? kasan_atomics_helper+0x1eab/0x5450
[   23.152117]  kasan_check_range+0x10c/0x1c0
[   23.152148]  __kasan_check_write+0x18/0x20
[   23.152179]  kasan_atomics_helper+0x1eab/0x5450
[   23.152209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.152239]  ? kasan_save_alloc_info+0x3b/0x50
[   23.152268]  ? kasan_save_track+0x18/0x40
[   23.152313]  kasan_atomics+0x1dd/0x310
[   23.152350]  ? __pfx_kasan_atomics+0x10/0x10
[   23.152383]  ? __pfx_read_tsc+0x10/0x10
[   23.152415]  ? ktime_get_ts64+0x86/0x230
[   23.152450]  kunit_try_run_case+0x1a6/0x480
[   23.152484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.152515]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.152549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.152582]  ? __kthread_parkme+0x82/0x160
[   23.152613]  ? preempt_count_sub+0x50/0x80
[   23.152648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.152680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.152715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.152749]  kthread+0x324/0x6e0
[   23.152778]  ? trace_preempt_on+0x20/0xc0
[   23.152812]  ? __pfx_kthread+0x10/0x10
[   23.152842]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.152891]  ? calculate_sigpending+0x7b/0xa0
[   23.152921]  ? __pfx_kthread+0x10/0x10
[   23.152952]  ret_from_fork+0x41/0x80
[   23.152979]  ? __pfx_kthread+0x10/0x10
[   23.153009]  ret_from_fork_asm+0x1a/0x30
[   23.153051]  </TASK>
[   23.153067] 
[   23.164814] Allocated by task 273:
[   23.165181]  kasan_save_stack+0x45/0x70
[   23.165543]  kasan_save_track+0x18/0x40
[   23.165801]  kasan_save_alloc_info+0x3b/0x50
[   23.166233]  __kasan_kmalloc+0xb7/0xc0
[   23.166676]  __kmalloc_cache_noprof+0x18a/0x420
[   23.167101]  kasan_atomics+0x96/0x310
[   23.167395]  kunit_try_run_case+0x1a6/0x480
[   23.167829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.168394]  kthread+0x324/0x6e0
[   23.168752]  ret_from_fork+0x41/0x80
[   23.169046]  ret_from_fork_asm+0x1a/0x30
[   23.169481] 
[   23.169697] The buggy address belongs to the object at ffff888102993400
[   23.169697]  which belongs to the cache kmalloc-64 of size 64
[   23.170532] The buggy address is located 0 bytes to the right of
[   23.170532]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.171282] 
[   23.171537] The buggy address belongs to the physical page:
[   23.171829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.172224] flags: 0x200000000000000(node=0|zone=2)
[   23.172547] page_type: f5(slab)
[   23.172768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.173485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.174159] page dumped because: kasan: bad access detected
[   23.174658] 
[   23.174892] Memory state around the buggy address:
[   23.175366]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.175995]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.176641] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.177228]                                      ^
[   23.177509]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.177919]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.178273] ==================================================================
[   22.794929] ==================================================================
[   22.795531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   22.796037] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.796632] 
[   22.796897] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.796995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.797029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.797083] Call Trace:
[   22.797172]  <TASK>
[   22.797238]  dump_stack_lvl+0x73/0xb0
[   22.797352]  print_report+0xd1/0x650
[   22.797391]  ? __virt_addr_valid+0x1db/0x2d0
[   22.797427]  ? kasan_atomics_helper+0x18b2/0x5450
[   22.797458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.797514]  ? kasan_atomics_helper+0x18b2/0x5450
[   22.797569]  kasan_report+0x140/0x180
[   22.797629]  ? kasan_atomics_helper+0x18b2/0x5450
[   22.797702]  kasan_check_range+0x10c/0x1c0
[   22.797764]  __kasan_check_write+0x18/0x20
[   22.797833]  kasan_atomics_helper+0x18b2/0x5450
[   22.797919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.797985]  ? kasan_save_alloc_info+0x3b/0x50
[   22.798050]  ? kasan_save_track+0x18/0x40
[   22.798106]  kasan_atomics+0x1dd/0x310
[   22.798141]  ? __pfx_kasan_atomics+0x10/0x10
[   22.798175]  ? __pfx_read_tsc+0x10/0x10
[   22.798208]  ? ktime_get_ts64+0x86/0x230
[   22.798245]  kunit_try_run_case+0x1a6/0x480
[   22.798278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.798333]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.798371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.798405]  ? __kthread_parkme+0x82/0x160
[   22.798436]  ? preempt_count_sub+0x50/0x80
[   22.798469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.798501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.798535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.798570]  kthread+0x324/0x6e0
[   22.798599]  ? trace_preempt_on+0x20/0xc0
[   22.798632]  ? __pfx_kthread+0x10/0x10
[   22.798662]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.798693]  ? calculate_sigpending+0x7b/0xa0
[   22.798723]  ? __pfx_kthread+0x10/0x10
[   22.798753]  ret_from_fork+0x41/0x80
[   22.798779]  ? __pfx_kthread+0x10/0x10
[   22.798808]  ret_from_fork_asm+0x1a/0x30
[   22.798868]  </TASK>
[   22.798885] 
[   22.812336] Allocated by task 273:
[   22.812655]  kasan_save_stack+0x45/0x70
[   22.813113]  kasan_save_track+0x18/0x40
[   22.813618]  kasan_save_alloc_info+0x3b/0x50
[   22.814303]  __kasan_kmalloc+0xb7/0xc0
[   22.814685]  __kmalloc_cache_noprof+0x18a/0x420
[   22.814986]  kasan_atomics+0x96/0x310
[   22.815235]  kunit_try_run_case+0x1a6/0x480
[   22.815482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.815995]  kthread+0x324/0x6e0
[   22.816416]  ret_from_fork+0x41/0x80
[   22.816896]  ret_from_fork_asm+0x1a/0x30
[   22.817280] 
[   22.817522] The buggy address belongs to the object at ffff888102993400
[   22.817522]  which belongs to the cache kmalloc-64 of size 64
[   22.818192] The buggy address is located 0 bytes to the right of
[   22.818192]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.819033] 
[   22.819194] The buggy address belongs to the physical page:
[   22.819600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.820569] flags: 0x200000000000000(node=0|zone=2)
[   22.821064] page_type: f5(slab)
[   22.821422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.822101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.822459] page dumped because: kasan: bad access detected
[   22.823007] 
[   22.823226] Memory state around the buggy address:
[   22.823738]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.824525]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.824989] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.825490]                                      ^
[   22.825925]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.826288]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.826916] ==================================================================
[   21.537068] ==================================================================
[   21.538042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   21.539170] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.539756] 
[   21.539925] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.539988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.540006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.540035] Call Trace:
[   21.540061]  <TASK>
[   21.540087]  dump_stack_lvl+0x73/0xb0
[   21.540130]  print_report+0xd1/0x650
[   21.540163]  ? __virt_addr_valid+0x1db/0x2d0
[   21.540198]  ? kasan_atomics_helper+0x861/0x5450
[   21.540228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.540264]  ? kasan_atomics_helper+0x861/0x5450
[   21.540300]  kasan_report+0x140/0x180
[   21.540359]  ? kasan_atomics_helper+0x861/0x5450
[   21.540429]  kasan_check_range+0x10c/0x1c0
[   21.540499]  __kasan_check_write+0x18/0x20
[   21.540566]  kasan_atomics_helper+0x861/0x5450
[   21.540634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.540700]  ? kasan_save_alloc_info+0x3b/0x50
[   21.540760]  ? kasan_save_track+0x18/0x40
[   21.540819]  kasan_atomics+0x1dd/0x310
[   21.540890]  ? __pfx_kasan_atomics+0x10/0x10
[   21.540949]  ? __pfx_read_tsc+0x10/0x10
[   21.540999]  ? ktime_get_ts64+0x86/0x230
[   21.541059]  kunit_try_run_case+0x1a6/0x480
[   21.541120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.541188]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.541275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.541348]  ? __kthread_parkme+0x82/0x160
[   21.541429]  ? preempt_count_sub+0x50/0x80
[   21.541499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.541569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.541644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.541717]  kthread+0x324/0x6e0
[   21.541777]  ? trace_preempt_on+0x20/0xc0
[   21.541841]  ? __pfx_kthread+0x10/0x10
[   21.541913]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.541978]  ? calculate_sigpending+0x7b/0xa0
[   21.542036]  ? __pfx_kthread+0x10/0x10
[   21.542107]  ret_from_fork+0x41/0x80
[   21.542173]  ? __pfx_kthread+0x10/0x10
[   21.542231]  ret_from_fork_asm+0x1a/0x30
[   21.542306]  </TASK>
[   21.542335] 
[   21.560058] Allocated by task 273:
[   21.560478]  kasan_save_stack+0x45/0x70
[   21.560848]  kasan_save_track+0x18/0x40
[   21.561568]  kasan_save_alloc_info+0x3b/0x50
[   21.562072]  __kasan_kmalloc+0xb7/0xc0
[   21.562509]  __kmalloc_cache_noprof+0x18a/0x420
[   21.562830]  kasan_atomics+0x96/0x310
[   21.563245]  kunit_try_run_case+0x1a6/0x480
[   21.563569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.564730]  kthread+0x324/0x6e0
[   21.565042]  ret_from_fork+0x41/0x80
[   21.565303]  ret_from_fork_asm+0x1a/0x30
[   21.565701] 
[   21.566113] The buggy address belongs to the object at ffff888102993400
[   21.566113]  which belongs to the cache kmalloc-64 of size 64
[   21.566973] The buggy address is located 0 bytes to the right of
[   21.566973]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.567815] 
[   21.567997] The buggy address belongs to the physical page:
[   21.568891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.569491] flags: 0x200000000000000(node=0|zone=2)
[   21.569977] page_type: f5(slab)
[   21.570245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.571085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.571903] page dumped because: kasan: bad access detected
[   21.572240] 
[   21.572369] Memory state around the buggy address:
[   21.573683]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.574109]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.574672] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.574996]                                      ^
[   21.575442]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.576951]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.577433] ==================================================================
[   21.622392] ==================================================================
[   21.623236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   21.624252] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.625796] 
[   21.626055] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.626158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.626191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.626243] Call Trace:
[   21.626306]  <TASK>
[   21.626352]  dump_stack_lvl+0x73/0xb0
[   21.626433]  print_report+0xd1/0x650
[   21.626482]  ? __virt_addr_valid+0x1db/0x2d0
[   21.626518]  ? kasan_atomics_helper+0x993/0x5450
[   21.626549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.626585]  ? kasan_atomics_helper+0x993/0x5450
[   21.626630]  kasan_report+0x140/0x180
[   21.626684]  ? kasan_atomics_helper+0x993/0x5450
[   21.626743]  kasan_check_range+0x10c/0x1c0
[   21.626800]  __kasan_check_write+0x18/0x20
[   21.626875]  kasan_atomics_helper+0x993/0x5450
[   21.626941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.627005]  ? kasan_save_alloc_info+0x3b/0x50
[   21.627068]  ? kasan_save_track+0x18/0x40
[   21.627140]  kasan_atomics+0x1dd/0x310
[   21.627183]  ? __pfx_kasan_atomics+0x10/0x10
[   21.627218]  ? __pfx_read_tsc+0x10/0x10
[   21.627249]  ? ktime_get_ts64+0x86/0x230
[   21.627284]  kunit_try_run_case+0x1a6/0x480
[   21.627333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.627363]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.627399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.627439]  ? __kthread_parkme+0x82/0x160
[   21.627492]  ? preempt_count_sub+0x50/0x80
[   21.627549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.627602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.627643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.627690]  kthread+0x324/0x6e0
[   21.627720]  ? trace_preempt_on+0x20/0xc0
[   21.627754]  ? __pfx_kthread+0x10/0x10
[   21.627784]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.627817]  ? calculate_sigpending+0x7b/0xa0
[   21.627847]  ? __pfx_kthread+0x10/0x10
[   21.627896]  ret_from_fork+0x41/0x80
[   21.627924]  ? __pfx_kthread+0x10/0x10
[   21.627954]  ret_from_fork_asm+0x1a/0x30
[   21.627996]  </TASK>
[   21.628011] 
[   21.645956] Allocated by task 273:
[   21.646348]  kasan_save_stack+0x45/0x70
[   21.646789]  kasan_save_track+0x18/0x40
[   21.647600]  kasan_save_alloc_info+0x3b/0x50
[   21.648057]  __kasan_kmalloc+0xb7/0xc0
[   21.648493]  __kmalloc_cache_noprof+0x18a/0x420
[   21.648959]  kasan_atomics+0x96/0x310
[   21.649802]  kunit_try_run_case+0x1a6/0x480
[   21.650099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.650868]  kthread+0x324/0x6e0
[   21.651252]  ret_from_fork+0x41/0x80
[   21.651701]  ret_from_fork_asm+0x1a/0x30
[   21.652254] 
[   21.652450] The buggy address belongs to the object at ffff888102993400
[   21.652450]  which belongs to the cache kmalloc-64 of size 64
[   21.653737] The buggy address is located 0 bytes to the right of
[   21.653737]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.654491] 
[   21.654706] The buggy address belongs to the physical page:
[   21.655183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.655701] flags: 0x200000000000000(node=0|zone=2)
[   21.656930] page_type: f5(slab)
[   21.657295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.657812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.658355] page dumped because: kasan: bad access detected
[   21.658675] 
[   21.659138] Memory state around the buggy address:
[   21.659554]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.660168]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.660811] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.661938]                                      ^
[   21.662524]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.663178]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.663807] ==================================================================
[   23.109960] ==================================================================
[   23.110998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   23.111547] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.112050] 
[   23.112340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.112450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.112490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.112540] Call Trace:
[   23.112611]  <TASK>
[   23.112654]  dump_stack_lvl+0x73/0xb0
[   23.112735]  print_report+0xd1/0x650
[   23.112802]  ? __virt_addr_valid+0x1db/0x2d0
[   23.112880]  ? kasan_atomics_helper+0x1e13/0x5450
[   23.112969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.113038]  ? kasan_atomics_helper+0x1e13/0x5450
[   23.113121]  kasan_report+0x140/0x180
[   23.113184]  ? kasan_atomics_helper+0x1e13/0x5450
[   23.113251]  kasan_check_range+0x10c/0x1c0
[   23.113356]  __kasan_check_write+0x18/0x20
[   23.113417]  kasan_atomics_helper+0x1e13/0x5450
[   23.113478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.113520]  ? kasan_save_alloc_info+0x3b/0x50
[   23.113553]  ? kasan_save_track+0x18/0x40
[   23.113587]  kasan_atomics+0x1dd/0x310
[   23.113617]  ? __pfx_kasan_atomics+0x10/0x10
[   23.113650]  ? __pfx_read_tsc+0x10/0x10
[   23.113681]  ? ktime_get_ts64+0x86/0x230
[   23.113717]  kunit_try_run_case+0x1a6/0x480
[   23.113750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.113779]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.113814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.113866]  ? __kthread_parkme+0x82/0x160
[   23.113902]  ? preempt_count_sub+0x50/0x80
[   23.113936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.113967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.114004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.114039]  kthread+0x324/0x6e0
[   23.114067]  ? trace_preempt_on+0x20/0xc0
[   23.114101]  ? __pfx_kthread+0x10/0x10
[   23.114131]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.114162]  ? calculate_sigpending+0x7b/0xa0
[   23.114194]  ? __pfx_kthread+0x10/0x10
[   23.114224]  ret_from_fork+0x41/0x80
[   23.114250]  ? __pfx_kthread+0x10/0x10
[   23.114280]  ret_from_fork_asm+0x1a/0x30
[   23.114350]  </TASK>
[   23.114368] 
[   23.131112] Allocated by task 273:
[   23.131404]  kasan_save_stack+0x45/0x70
[   23.132085]  kasan_save_track+0x18/0x40
[   23.132515]  kasan_save_alloc_info+0x3b/0x50
[   23.132979]  __kasan_kmalloc+0xb7/0xc0
[   23.133411]  __kmalloc_cache_noprof+0x18a/0x420
[   23.133861]  kasan_atomics+0x96/0x310
[   23.134192]  kunit_try_run_case+0x1a6/0x480
[   23.134611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.135447]  kthread+0x324/0x6e0
[   23.135728]  ret_from_fork+0x41/0x80
[   23.136276]  ret_from_fork_asm+0x1a/0x30
[   23.136965] 
[   23.137137] The buggy address belongs to the object at ffff888102993400
[   23.137137]  which belongs to the cache kmalloc-64 of size 64
[   23.137986] The buggy address is located 0 bytes to the right of
[   23.137986]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.138812] 
[   23.139075] The buggy address belongs to the physical page:
[   23.139358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.140064] flags: 0x200000000000000(node=0|zone=2)
[   23.140532] page_type: f5(slab)
[   23.140874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.141471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.141866] page dumped because: kasan: bad access detected
[   23.142342] 
[   23.142555] Memory state around the buggy address:
[   23.142942]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.143292]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.143920] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.144298]                                      ^
[   23.144824]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.145310]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.145994] ==================================================================
[   22.559187] ==================================================================
[   22.559978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   22.560484] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.561072] 
[   22.561246] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.561321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.561341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.561369] Call Trace:
[   22.561399]  <TASK>
[   22.561424]  dump_stack_lvl+0x73/0xb0
[   22.561471]  print_report+0xd1/0x650
[   22.561504]  ? __virt_addr_valid+0x1db/0x2d0
[   22.561537]  ? kasan_atomics_helper+0x15b7/0x5450
[   22.561567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.561601]  ? kasan_atomics_helper+0x15b7/0x5450
[   22.561630]  kasan_report+0x140/0x180
[   22.561669]  ? kasan_atomics_helper+0x15b7/0x5450
[   22.561726]  kasan_check_range+0x10c/0x1c0
[   22.561775]  __kasan_check_write+0x18/0x20
[   22.561823]  kasan_atomics_helper+0x15b7/0x5450
[   22.561885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.561936]  ? kasan_save_alloc_info+0x3b/0x50
[   22.562001]  ? kasan_save_track+0x18/0x40
[   22.562063]  kasan_atomics+0x1dd/0x310
[   22.562119]  ? __pfx_kasan_atomics+0x10/0x10
[   22.562182]  ? __pfx_read_tsc+0x10/0x10
[   22.562238]  ? ktime_get_ts64+0x86/0x230
[   22.562301]  kunit_try_run_case+0x1a6/0x480
[   22.562363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.562416]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.562484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.562545]  ? __kthread_parkme+0x82/0x160
[   22.562601]  ? preempt_count_sub+0x50/0x80
[   22.562662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.562720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.562785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.563337]  kthread+0x324/0x6e0
[   22.563427]  ? trace_preempt_on+0x20/0xc0
[   22.563548]  ? __pfx_kthread+0x10/0x10
[   22.563606]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.563663]  ? calculate_sigpending+0x7b/0xa0
[   22.563727]  ? __pfx_kthread+0x10/0x10
[   22.563781]  ret_from_fork+0x41/0x80
[   22.563827]  ? __pfx_kthread+0x10/0x10
[   22.563903]  ret_from_fork_asm+0x1a/0x30
[   22.564006]  </TASK>
[   22.564040] 
[   22.592322] Allocated by task 273:
[   22.592608]  kasan_save_stack+0x45/0x70
[   22.594640]  kasan_save_track+0x18/0x40
[   22.595885]  kasan_save_alloc_info+0x3b/0x50
[   22.596865]  __kasan_kmalloc+0xb7/0xc0
[   22.597153]  __kmalloc_cache_noprof+0x18a/0x420
[   22.599664]  kasan_atomics+0x96/0x310
[   22.600879]  kunit_try_run_case+0x1a6/0x480
[   22.602123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.603405]  kthread+0x324/0x6e0
[   22.604135]  ret_from_fork+0x41/0x80
[   22.605328]  ret_from_fork_asm+0x1a/0x30
[   22.606084] 
[   22.606343] The buggy address belongs to the object at ffff888102993400
[   22.606343]  which belongs to the cache kmalloc-64 of size 64
[   22.608469] The buggy address is located 0 bytes to the right of
[   22.608469]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.609678] 
[   22.609825] The buggy address belongs to the physical page:
[   22.610481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.611191] flags: 0x200000000000000(node=0|zone=2)
[   22.611691] page_type: f5(slab)
[   22.612079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.613142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.613544] page dumped because: kasan: bad access detected
[   22.613826] 
[   22.614012] Memory state around the buggy address:
[   22.614268]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.614594]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.617636] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.618761]                                      ^
[   22.619064]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.620612]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.622194] ==================================================================
[   23.458934] ==================================================================
[   23.459623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   23.460665] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.461189] 
[   23.461421] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.461539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.461573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.461631] Call Trace:
[   23.461680]  <TASK>
[   23.461724]  dump_stack_lvl+0x73/0xb0
[   23.461815]  print_report+0xd1/0x650
[   23.461901]  ? __virt_addr_valid+0x1db/0x2d0
[   23.461961]  ? kasan_atomics_helper+0x224d/0x5450
[   23.462023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.462094]  ? kasan_atomics_helper+0x224d/0x5450
[   23.462149]  kasan_report+0x140/0x180
[   23.462210]  ? kasan_atomics_helper+0x224d/0x5450
[   23.462282]  kasan_check_range+0x10c/0x1c0
[   23.462348]  __kasan_check_write+0x18/0x20
[   23.462411]  kasan_atomics_helper+0x224d/0x5450
[   23.462469]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.462522]  ? kasan_save_alloc_info+0x3b/0x50
[   23.462577]  ? kasan_save_track+0x18/0x40
[   23.462653]  kasan_atomics+0x1dd/0x310
[   23.462703]  ? __pfx_kasan_atomics+0x10/0x10
[   23.462760]  ? __pfx_read_tsc+0x10/0x10
[   23.462819]  ? ktime_get_ts64+0x86/0x230
[   23.462904]  kunit_try_run_case+0x1a6/0x480
[   23.462972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.463030]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.463099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.463161]  ? __kthread_parkme+0x82/0x160
[   23.463223]  ? preempt_count_sub+0x50/0x80
[   23.463290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.463355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.463417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.463484]  kthread+0x324/0x6e0
[   23.463543]  ? trace_preempt_on+0x20/0xc0
[   23.463608]  ? __pfx_kthread+0x10/0x10
[   23.463671]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.463750]  ? calculate_sigpending+0x7b/0xa0
[   23.463800]  ? __pfx_kthread+0x10/0x10
[   23.463955]  ret_from_fork+0x41/0x80
[   23.464028]  ? __pfx_kthread+0x10/0x10
[   23.464094]  ret_from_fork_asm+0x1a/0x30
[   23.464184]  </TASK>
[   23.464216] 
[   23.477352] Allocated by task 273:
[   23.477737]  kasan_save_stack+0x45/0x70
[   23.478246]  kasan_save_track+0x18/0x40
[   23.478684]  kasan_save_alloc_info+0x3b/0x50
[   23.479135]  __kasan_kmalloc+0xb7/0xc0
[   23.479570]  __kmalloc_cache_noprof+0x18a/0x420
[   23.480060]  kasan_atomics+0x96/0x310
[   23.480510]  kunit_try_run_case+0x1a6/0x480
[   23.480968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.481564]  kthread+0x324/0x6e0
[   23.481964]  ret_from_fork+0x41/0x80
[   23.482377]  ret_from_fork_asm+0x1a/0x30
[   23.482642] 
[   23.482778] The buggy address belongs to the object at ffff888102993400
[   23.482778]  which belongs to the cache kmalloc-64 of size 64
[   23.483792] The buggy address is located 0 bytes to the right of
[   23.483792]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.484778] 
[   23.484995] The buggy address belongs to the physical page:
[   23.485422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.485827] flags: 0x200000000000000(node=0|zone=2)
[   23.486126] page_type: f5(slab)
[   23.486353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.486709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.487529] page dumped because: kasan: bad access detected
[   23.488065] 
[   23.488337] Memory state around the buggy address:
[   23.488824]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.489534]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.490200] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.490908]                                      ^
[   23.491368]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.491815]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.492171] ==================================================================
[   21.157050] ==================================================================
[   21.157403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   21.158050] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.158623] 
[   21.159087] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.159201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.159236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.159289] Call Trace:
[   21.159335]  <TASK>
[   21.159372]  dump_stack_lvl+0x73/0xb0
[   21.159596]  print_report+0xd1/0x650
[   21.159672]  ? __virt_addr_valid+0x1db/0x2d0
[   21.159749]  ? kasan_atomics_helper+0x3e0/0x5450
[   21.159815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.160139]  ? kasan_atomics_helper+0x3e0/0x5450
[   21.160225]  kasan_report+0x140/0x180
[   21.160357]  ? kasan_atomics_helper+0x3e0/0x5450
[   21.160400]  kasan_check_range+0x10c/0x1c0
[   21.160442]  __kasan_check_read+0x15/0x20
[   21.160764]  kasan_atomics_helper+0x3e0/0x5450
[   21.160799]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.160832]  ? kasan_save_alloc_info+0x3b/0x50
[   21.160888]  ? kasan_save_track+0x18/0x40
[   21.160921]  kasan_atomics+0x1dd/0x310
[   21.160954]  ? __pfx_kasan_atomics+0x10/0x10
[   21.160985]  ? __pfx_read_tsc+0x10/0x10
[   21.161016]  ? ktime_get_ts64+0x86/0x230
[   21.161052]  kunit_try_run_case+0x1a6/0x480
[   21.161086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.161116]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.161150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.161182]  ? __kthread_parkme+0x82/0x160
[   21.161212]  ? preempt_count_sub+0x50/0x80
[   21.161246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.161279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.161328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.161366]  kthread+0x324/0x6e0
[   21.161395]  ? trace_preempt_on+0x20/0xc0
[   21.161435]  ? __pfx_kthread+0x10/0x10
[   21.161487]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.161543]  ? calculate_sigpending+0x7b/0xa0
[   21.161579]  ? __pfx_kthread+0x10/0x10
[   21.161610]  ret_from_fork+0x41/0x80
[   21.161639]  ? __pfx_kthread+0x10/0x10
[   21.161669]  ret_from_fork_asm+0x1a/0x30
[   21.161712]  </TASK>
[   21.161728] 
[   21.178499] Allocated by task 273:
[   21.178939]  kasan_save_stack+0x45/0x70
[   21.179759]  kasan_save_track+0x18/0x40
[   21.180290]  kasan_save_alloc_info+0x3b/0x50
[   21.181055]  __kasan_kmalloc+0xb7/0xc0
[   21.181365]  __kmalloc_cache_noprof+0x18a/0x420
[   21.181885]  kasan_atomics+0x96/0x310
[   21.182803]  kunit_try_run_case+0x1a6/0x480
[   21.183195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.183979]  kthread+0x324/0x6e0
[   21.184539]  ret_from_fork+0x41/0x80
[   21.185070]  ret_from_fork_asm+0x1a/0x30
[   21.185649] 
[   21.185805] The buggy address belongs to the object at ffff888102993400
[   21.185805]  which belongs to the cache kmalloc-64 of size 64
[   21.187431] The buggy address is located 0 bytes to the right of
[   21.187431]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.188165] 
[   21.188754] The buggy address belongs to the physical page:
[   21.189315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.190218] flags: 0x200000000000000(node=0|zone=2)
[   21.190737] page_type: f5(slab)
[   21.190985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.192285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.192990] page dumped because: kasan: bad access detected
[   21.193814] 
[   21.194173] Memory state around the buggy address:
[   21.195164]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.195794]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.196362] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.196966]                                      ^
[   21.197320]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.197784]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.198619] ==================================================================
[   22.865769] ==================================================================
[   22.866330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   22.866954] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.867535] 
[   22.867901] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.868039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.868093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.868151] Call Trace:
[   22.868196]  <TASK>
[   22.868242]  dump_stack_lvl+0x73/0xb0
[   22.868372]  print_report+0xd1/0x650
[   22.868466]  ? __virt_addr_valid+0x1db/0x2d0
[   22.868535]  ? kasan_atomics_helper+0x19e4/0x5450
[   22.868597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.868659]  ? kasan_atomics_helper+0x19e4/0x5450
[   22.868693]  kasan_report+0x140/0x180
[   22.868727]  ? kasan_atomics_helper+0x19e4/0x5450
[   22.868762]  kasan_check_range+0x10c/0x1c0
[   22.868795]  __kasan_check_write+0x18/0x20
[   22.868826]  kasan_atomics_helper+0x19e4/0x5450
[   22.868881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.868931]  ? kasan_save_alloc_info+0x3b/0x50
[   22.868963]  ? kasan_save_track+0x18/0x40
[   22.868995]  kasan_atomics+0x1dd/0x310
[   22.869027]  ? __pfx_kasan_atomics+0x10/0x10
[   22.869059]  ? __pfx_read_tsc+0x10/0x10
[   22.869089]  ? ktime_get_ts64+0x86/0x230
[   22.869124]  kunit_try_run_case+0x1a6/0x480
[   22.869158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.869187]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.869222]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.869255]  ? __kthread_parkme+0x82/0x160
[   22.869300]  ? preempt_count_sub+0x50/0x80
[   22.869344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.869378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.869415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.869448]  kthread+0x324/0x6e0
[   22.869476]  ? trace_preempt_on+0x20/0xc0
[   22.869509]  ? __pfx_kthread+0x10/0x10
[   22.869539]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.869570]  ? calculate_sigpending+0x7b/0xa0
[   22.869600]  ? __pfx_kthread+0x10/0x10
[   22.869630]  ret_from_fork+0x41/0x80
[   22.869655]  ? __pfx_kthread+0x10/0x10
[   22.869684]  ret_from_fork_asm+0x1a/0x30
[   22.869727]  </TASK>
[   22.869743] 
[   22.884469] Allocated by task 273:
[   22.884945]  kasan_save_stack+0x45/0x70
[   22.885455]  kasan_save_track+0x18/0x40
[   22.885875]  kasan_save_alloc_info+0x3b/0x50
[   22.886402]  __kasan_kmalloc+0xb7/0xc0
[   22.886839]  __kmalloc_cache_noprof+0x18a/0x420
[   22.887328]  kasan_atomics+0x96/0x310
[   22.887623]  kunit_try_run_case+0x1a6/0x480
[   22.888151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.888742]  kthread+0x324/0x6e0
[   22.889172]  ret_from_fork+0x41/0x80
[   22.889650]  ret_from_fork_asm+0x1a/0x30
[   22.890031] 
[   22.890311] The buggy address belongs to the object at ffff888102993400
[   22.890311]  which belongs to the cache kmalloc-64 of size 64
[   22.891163] The buggy address is located 0 bytes to the right of
[   22.891163]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.891896] 
[   22.892127] The buggy address belongs to the physical page:
[   22.892503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.893117] flags: 0x200000000000000(node=0|zone=2)
[   22.893450] page_type: f5(slab)
[   22.893683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.894563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.895280] page dumped because: kasan: bad access detected
[   22.895956] 
[   22.896435] Memory state around the buggy address:
[   22.897324]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.897756]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.898432] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.898935]                                      ^
[   22.899307]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899911]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.900287] ==================================================================
[   21.035262] ==================================================================
[   21.035612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   21.036352] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.037076] 
[   21.037479] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.037588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.037621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.037709] Call Trace:
[   21.037756]  <TASK>
[   21.037877]  dump_stack_lvl+0x73/0xb0
[   21.037975]  print_report+0xd1/0x650
[   21.038055]  ? __virt_addr_valid+0x1db/0x2d0
[   21.038119]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.038179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.038243]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.038311]  kasan_report+0x140/0x180
[   21.038374]  ? kasan_atomics_helper+0x4ba4/0x5450
[   21.038440]  __asan_report_store4_noabort+0x1b/0x30
[   21.038498]  kasan_atomics_helper+0x4ba4/0x5450
[   21.038546]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.038589]  ? kasan_save_alloc_info+0x3b/0x50
[   21.038630]  ? kasan_save_track+0x18/0x40
[   21.038674]  kasan_atomics+0x1dd/0x310
[   21.038713]  ? __pfx_kasan_atomics+0x10/0x10
[   21.038759]  ? __pfx_read_tsc+0x10/0x10
[   21.038804]  ? ktime_get_ts64+0x86/0x230
[   21.038871]  kunit_try_run_case+0x1a6/0x480
[   21.038923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.038966]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.039017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.039073]  ? __kthread_parkme+0x82/0x160
[   21.039128]  ? preempt_count_sub+0x50/0x80
[   21.039190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.039248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.039317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.039426]  kthread+0x324/0x6e0
[   21.039505]  ? trace_preempt_on+0x20/0xc0
[   21.039556]  ? __pfx_kthread+0x10/0x10
[   21.039604]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.039653]  ? calculate_sigpending+0x7b/0xa0
[   21.039712]  ? __pfx_kthread+0x10/0x10
[   21.039761]  ret_from_fork+0x41/0x80
[   21.039802]  ? __pfx_kthread+0x10/0x10
[   21.039866]  ret_from_fork_asm+0x1a/0x30
[   21.039944]  </TASK>
[   21.039973] 
[   21.056274] Allocated by task 273:
[   21.056716]  kasan_save_stack+0x45/0x70
[   21.057420]  kasan_save_track+0x18/0x40
[   21.057820]  kasan_save_alloc_info+0x3b/0x50
[   21.058080]  __kasan_kmalloc+0xb7/0xc0
[   21.058626]  __kmalloc_cache_noprof+0x18a/0x420
[   21.059031]  kasan_atomics+0x96/0x310
[   21.059395]  kunit_try_run_case+0x1a6/0x480
[   21.059926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.060228]  kthread+0x324/0x6e0
[   21.060510]  ret_from_fork+0x41/0x80
[   21.060966]  ret_from_fork_asm+0x1a/0x30
[   21.061407] 
[   21.061642] The buggy address belongs to the object at ffff888102993400
[   21.061642]  which belongs to the cache kmalloc-64 of size 64
[   21.063276] The buggy address is located 0 bytes to the right of
[   21.063276]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.064736] 
[   21.064988] The buggy address belongs to the physical page:
[   21.065953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.066623] flags: 0x200000000000000(node=0|zone=2)
[   21.066966] page_type: f5(slab)
[   21.067359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.068539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.068908] page dumped because: kasan: bad access detected
[   21.069685] 
[   21.069921] Memory state around the buggy address:
[   21.070341]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.071051]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.072005] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.072441]                                      ^
[   21.072705]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.073338]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.074223] ==================================================================
[   23.246686] ==================================================================
[   23.247157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   23.247938] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   23.248635] 
[   23.248898] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.249006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.249041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.249090] Call Trace:
[   23.249135]  <TASK>
[   23.249175]  dump_stack_lvl+0x73/0xb0
[   23.249253]  print_report+0xd1/0x650
[   23.249362]  ? __virt_addr_valid+0x1db/0x2d0
[   23.249423]  ? kasan_atomics_helper+0x2007/0x5450
[   23.249477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.249544]  ? kasan_atomics_helper+0x2007/0x5450
[   23.249599]  kasan_report+0x140/0x180
[   23.249660]  ? kasan_atomics_helper+0x2007/0x5450
[   23.249735]  kasan_check_range+0x10c/0x1c0
[   23.249800]  __kasan_check_write+0x18/0x20
[   23.249879]  kasan_atomics_helper+0x2007/0x5450
[   23.249948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.250015]  ? kasan_save_alloc_info+0x3b/0x50
[   23.250053]  ? kasan_save_track+0x18/0x40
[   23.250087]  kasan_atomics+0x1dd/0x310
[   23.250118]  ? __pfx_kasan_atomics+0x10/0x10
[   23.250150]  ? __pfx_read_tsc+0x10/0x10
[   23.250182]  ? ktime_get_ts64+0x86/0x230
[   23.250217]  kunit_try_run_case+0x1a6/0x480
[   23.250251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.250279]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.250342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.250377]  ? __kthread_parkme+0x82/0x160
[   23.250409]  ? preempt_count_sub+0x50/0x80
[   23.250444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.250475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.250511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.250546]  kthread+0x324/0x6e0
[   23.250576]  ? trace_preempt_on+0x20/0xc0
[   23.250609]  ? __pfx_kthread+0x10/0x10
[   23.250639]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.250670]  ? calculate_sigpending+0x7b/0xa0
[   23.250701]  ? __pfx_kthread+0x10/0x10
[   23.250730]  ret_from_fork+0x41/0x80
[   23.250757]  ? __pfx_kthread+0x10/0x10
[   23.250786]  ret_from_fork_asm+0x1a/0x30
[   23.250830]  </TASK>
[   23.250863] 
[   23.266841] Allocated by task 273:
[   23.267313]  kasan_save_stack+0x45/0x70
[   23.267817]  kasan_save_track+0x18/0x40
[   23.268589]  kasan_save_alloc_info+0x3b/0x50
[   23.268942]  __kasan_kmalloc+0xb7/0xc0
[   23.269492]  __kmalloc_cache_noprof+0x18a/0x420
[   23.269935]  kasan_atomics+0x96/0x310
[   23.270570]  kunit_try_run_case+0x1a6/0x480
[   23.271139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.271597]  kthread+0x324/0x6e0
[   23.272018]  ret_from_fork+0x41/0x80
[   23.272294]  ret_from_fork_asm+0x1a/0x30
[   23.272759] 
[   23.273194] The buggy address belongs to the object at ffff888102993400
[   23.273194]  which belongs to the cache kmalloc-64 of size 64
[   23.274299] The buggy address is located 0 bytes to the right of
[   23.274299]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   23.274997] 
[   23.275536] The buggy address belongs to the physical page:
[   23.276132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   23.277022] flags: 0x200000000000000(node=0|zone=2)
[   23.277366] page_type: f5(slab)
[   23.277498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.277682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.277881] page dumped because: kasan: bad access detected
[   23.278354] 
[   23.278567] Memory state around the buggy address:
[   23.279086]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.279774]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.280463] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.280900]                                      ^
[   23.281258]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.281966]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.282541] ==================================================================
[   22.415056] ==================================================================
[   22.415780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   22.416452] Read of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.416928] 
[   22.417084] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.417154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.417173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.417203] Call Trace:
[   22.417228]  <TASK>
[   22.417253]  dump_stack_lvl+0x73/0xb0
[   22.417315]  print_report+0xd1/0x650
[   22.417354]  ? __virt_addr_valid+0x1db/0x2d0
[   22.417389]  ? kasan_atomics_helper+0x4eb0/0x5450
[   22.417420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.417456]  ? kasan_atomics_helper+0x4eb0/0x5450
[   22.417488]  kasan_report+0x140/0x180
[   22.417519]  ? kasan_atomics_helper+0x4eb0/0x5450
[   22.417553]  __asan_report_load8_noabort+0x18/0x20
[   22.417586]  kasan_atomics_helper+0x4eb0/0x5450
[   22.417616]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.417647]  ? kasan_save_alloc_info+0x3b/0x50
[   22.417677]  ? kasan_save_track+0x18/0x40
[   22.417709]  kasan_atomics+0x1dd/0x310
[   22.417740]  ? __pfx_kasan_atomics+0x10/0x10
[   22.417771]  ? __pfx_read_tsc+0x10/0x10
[   22.417801]  ? ktime_get_ts64+0x86/0x230
[   22.417837]  kunit_try_run_case+0x1a6/0x480
[   22.417906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.417965]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.418306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.418404]  ? __kthread_parkme+0x82/0x160
[   22.418474]  ? preempt_count_sub+0x50/0x80
[   22.418544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.418609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.418678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.418747]  kthread+0x324/0x6e0
[   22.418805]  ? trace_preempt_on+0x20/0xc0
[   22.418893]  ? __pfx_kthread+0x10/0x10
[   22.418982]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.419074]  ? calculate_sigpending+0x7b/0xa0
[   22.419141]  ? __pfx_kthread+0x10/0x10
[   22.419202]  ret_from_fork+0x41/0x80
[   22.419235]  ? __pfx_kthread+0x10/0x10
[   22.419267]  ret_from_fork_asm+0x1a/0x30
[   22.419336]  </TASK>
[   22.419353] 
[   22.435794] Allocated by task 273:
[   22.436548]  kasan_save_stack+0x45/0x70
[   22.436790]  kasan_save_track+0x18/0x40
[   22.437270]  kasan_save_alloc_info+0x3b/0x50
[   22.437775]  __kasan_kmalloc+0xb7/0xc0
[   22.438106]  __kmalloc_cache_noprof+0x18a/0x420
[   22.438598]  kasan_atomics+0x96/0x310
[   22.439096]  kunit_try_run_case+0x1a6/0x480
[   22.439503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.439947]  kthread+0x324/0x6e0
[   22.440425]  ret_from_fork+0x41/0x80
[   22.440878]  ret_from_fork_asm+0x1a/0x30
[   22.441272] 
[   22.441487] The buggy address belongs to the object at ffff888102993400
[   22.441487]  which belongs to the cache kmalloc-64 of size 64
[   22.442102] The buggy address is located 0 bytes to the right of
[   22.442102]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.443359] 
[   22.443749] The buggy address belongs to the physical page:
[   22.444023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.444874] flags: 0x200000000000000(node=0|zone=2)
[   22.445156] page_type: f5(slab)
[   22.445675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.446207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.446998] page dumped because: kasan: bad access detected
[   22.447543] 
[   22.447825] Memory state around the buggy address:
[   22.448217]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.449107]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.449656] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.450237]                                      ^
[   22.450576]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451101]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.451823] ==================================================================
[   21.076265] ==================================================================
[   21.076761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   21.077417] Read of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.078002] 
[   21.078196] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.078338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.078379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.078431] Call Trace:
[   21.078474]  <TASK>
[   21.078512]  dump_stack_lvl+0x73/0xb0
[   21.078587]  print_report+0xd1/0x650
[   21.078649]  ? __virt_addr_valid+0x1db/0x2d0
[   21.078709]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.078807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.078895]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.078953]  kasan_report+0x140/0x180
[   21.079014]  ? kasan_atomics_helper+0x4b8a/0x5450
[   21.079082]  __asan_report_load4_noabort+0x18/0x20
[   21.079140]  kasan_atomics_helper+0x4b8a/0x5450
[   21.079192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.079243]  ? kasan_save_alloc_info+0x3b/0x50
[   21.079338]  ? kasan_save_track+0x18/0x40
[   21.079401]  kasan_atomics+0x1dd/0x310
[   21.079490]  ? __pfx_kasan_atomics+0x10/0x10
[   21.079550]  ? __pfx_read_tsc+0x10/0x10
[   21.079599]  ? ktime_get_ts64+0x86/0x230
[   21.079658]  kunit_try_run_case+0x1a6/0x480
[   21.079723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.079771]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.079829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.079906]  ? __kthread_parkme+0x82/0x160
[   21.079968]  ? preempt_count_sub+0x50/0x80
[   21.080030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.080066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.080104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.080138]  kthread+0x324/0x6e0
[   21.080166]  ? trace_preempt_on+0x20/0xc0
[   21.080198]  ? __pfx_kthread+0x10/0x10
[   21.080226]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.080257]  ? calculate_sigpending+0x7b/0xa0
[   21.080285]  ? __pfx_kthread+0x10/0x10
[   21.080338]  ret_from_fork+0x41/0x80
[   21.080365]  ? __pfx_kthread+0x10/0x10
[   21.080393]  ret_from_fork_asm+0x1a/0x30
[   21.080446]  </TASK>
[   21.080470] 
[   21.095277] Allocated by task 273:
[   21.095665]  kasan_save_stack+0x45/0x70
[   21.095966]  kasan_save_track+0x18/0x40
[   21.096213]  kasan_save_alloc_info+0x3b/0x50
[   21.096650]  __kasan_kmalloc+0xb7/0xc0
[   21.097097]  __kmalloc_cache_noprof+0x18a/0x420
[   21.097756]  kasan_atomics+0x96/0x310
[   21.098730]  kunit_try_run_case+0x1a6/0x480
[   21.099197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.099886]  kthread+0x324/0x6e0
[   21.100125]  ret_from_fork+0x41/0x80
[   21.100362]  ret_from_fork_asm+0x1a/0x30
[   21.100740] 
[   21.101090] The buggy address belongs to the object at ffff888102993400
[   21.101090]  which belongs to the cache kmalloc-64 of size 64
[   21.101937] The buggy address is located 0 bytes to the right of
[   21.101937]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.102937] 
[   21.103093] The buggy address belongs to the physical page:
[   21.103361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.103743] flags: 0x200000000000000(node=0|zone=2)
[   21.104196] page_type: f5(slab)
[   21.104557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.105232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.106665] page dumped because: kasan: bad access detected
[   21.107148] 
[   21.107538] Memory state around the buggy address:
[   21.107927]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.108320]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.108665] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.109362]                                      ^
[   21.110194]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111165]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.111847] ==================================================================
[   22.453318] ==================================================================
[   22.454120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   22.455078] Write of size 8 at addr ffff888102993430 by task kunit_try_catch/273
[   22.456016] 
[   22.456220] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   22.456323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.456361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.456413] Call Trace:
[   22.456440]  <TASK>
[   22.456467]  dump_stack_lvl+0x73/0xb0
[   22.456510]  print_report+0xd1/0x650
[   22.456545]  ? __virt_addr_valid+0x1db/0x2d0
[   22.456598]  ? kasan_atomics_helper+0x1468/0x5450
[   22.456634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.456669]  ? kasan_atomics_helper+0x1468/0x5450
[   22.456699]  kasan_report+0x140/0x180
[   22.456730]  ? kasan_atomics_helper+0x1468/0x5450
[   22.456765]  kasan_check_range+0x10c/0x1c0
[   22.456797]  __kasan_check_write+0x18/0x20
[   22.456827]  kasan_atomics_helper+0x1468/0x5450
[   22.456884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.456944]  ? kasan_save_alloc_info+0x3b/0x50
[   22.457006]  ? kasan_save_track+0x18/0x40
[   22.457074]  kasan_atomics+0x1dd/0x310
[   22.457136]  ? __pfx_kasan_atomics+0x10/0x10
[   22.457201]  ? __pfx_read_tsc+0x10/0x10
[   22.457261]  ? ktime_get_ts64+0x86/0x230
[   22.457329]  kunit_try_run_case+0x1a6/0x480
[   22.457397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.457457]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.457530]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.457599]  ? __kthread_parkme+0x82/0x160
[   22.457662]  ? preempt_count_sub+0x50/0x80
[   22.457701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.457735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.457773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.457808]  kthread+0x324/0x6e0
[   22.457837]  ? trace_preempt_on+0x20/0xc0
[   22.457892]  ? __pfx_kthread+0x10/0x10
[   22.457922]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.457955]  ? calculate_sigpending+0x7b/0xa0
[   22.457986]  ? __pfx_kthread+0x10/0x10
[   22.458016]  ret_from_fork+0x41/0x80
[   22.458042]  ? __pfx_kthread+0x10/0x10
[   22.458072]  ret_from_fork_asm+0x1a/0x30
[   22.458114]  </TASK>
[   22.458129] 
[   22.471751] Allocated by task 273:
[   22.472186]  kasan_save_stack+0x45/0x70
[   22.472701]  kasan_save_track+0x18/0x40
[   22.473153]  kasan_save_alloc_info+0x3b/0x50
[   22.473497]  __kasan_kmalloc+0xb7/0xc0
[   22.473814]  __kmalloc_cache_noprof+0x18a/0x420
[   22.474348]  kasan_atomics+0x96/0x310
[   22.474787]  kunit_try_run_case+0x1a6/0x480
[   22.475315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.475839]  kthread+0x324/0x6e0
[   22.476079]  ret_from_fork+0x41/0x80
[   22.476543]  ret_from_fork_asm+0x1a/0x30
[   22.476918] 
[   22.477194] The buggy address belongs to the object at ffff888102993400
[   22.477194]  which belongs to the cache kmalloc-64 of size 64
[   22.478066] The buggy address is located 0 bytes to the right of
[   22.478066]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   22.478928] 
[   22.479181] The buggy address belongs to the physical page:
[   22.479627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   22.480221] flags: 0x200000000000000(node=0|zone=2)
[   22.480672] page_type: f5(slab)
[   22.481071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.481584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.482198] page dumped because: kasan: bad access detected
[   22.482560] 
[   22.482800] Memory state around the buggy address:
[   22.483240]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.483806]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.484402] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.485019]                                      ^
[   22.485518]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.486112]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.486662] ==================================================================
[   21.665242] ==================================================================
[   21.665773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   21.666285] Write of size 4 at addr ffff888102993430 by task kunit_try_catch/273
[   21.666919] 
[   21.667178] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   21.667294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.667327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.667380] Call Trace:
[   21.667423]  <TASK>
[   21.667463]  dump_stack_lvl+0x73/0xb0
[   21.667538]  print_report+0xd1/0x650
[   21.667595]  ? __virt_addr_valid+0x1db/0x2d0
[   21.667655]  ? kasan_atomics_helper+0xa2c/0x5450
[   21.667723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.667787]  ? kasan_atomics_helper+0xa2c/0x5450
[   21.667844]  kasan_report+0x140/0x180
[   21.667922]  ? kasan_atomics_helper+0xa2c/0x5450
[   21.667987]  kasan_check_range+0x10c/0x1c0
[   21.668054]  __kasan_check_write+0x18/0x20
[   21.668118]  kasan_atomics_helper+0xa2c/0x5450
[   21.668178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.668237]  ? kasan_save_alloc_info+0x3b/0x50
[   21.668295]  ? kasan_save_track+0x18/0x40
[   21.668357]  kasan_atomics+0x1dd/0x310
[   21.668423]  ? __pfx_kasan_atomics+0x10/0x10
[   21.668481]  ? __pfx_read_tsc+0x10/0x10
[   21.668535]  ? ktime_get_ts64+0x86/0x230
[   21.668592]  kunit_try_run_case+0x1a6/0x480
[   21.668649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.668697]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.668755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.668811]  ? __kthread_parkme+0x82/0x160
[   21.668882]  ? preempt_count_sub+0x50/0x80
[   21.668945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.669013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.669088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.669159]  kthread+0x324/0x6e0
[   21.669218]  ? trace_preempt_on+0x20/0xc0
[   21.669258]  ? __pfx_kthread+0x10/0x10
[   21.669290]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.669339]  ? calculate_sigpending+0x7b/0xa0
[   21.669371]  ? __pfx_kthread+0x10/0x10
[   21.669403]  ret_from_fork+0x41/0x80
[   21.669436]  ? __pfx_kthread+0x10/0x10
[   21.669488]  ret_from_fork_asm+0x1a/0x30
[   21.669561]  </TASK>
[   21.669590] 
[   21.688521] Allocated by task 273:
[   21.689072]  kasan_save_stack+0x45/0x70
[   21.689637]  kasan_save_track+0x18/0x40
[   21.690011]  kasan_save_alloc_info+0x3b/0x50
[   21.690749]  __kasan_kmalloc+0xb7/0xc0
[   21.691269]  __kmalloc_cache_noprof+0x18a/0x420
[   21.692316]  kasan_atomics+0x96/0x310
[   21.692670]  kunit_try_run_case+0x1a6/0x480
[   21.693332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.693896]  kthread+0x324/0x6e0
[   21.694278]  ret_from_fork+0x41/0x80
[   21.694709]  ret_from_fork_asm+0x1a/0x30
[   21.695172] 
[   21.695324] The buggy address belongs to the object at ffff888102993400
[   21.695324]  which belongs to the cache kmalloc-64 of size 64
[   21.697182] The buggy address is located 0 bytes to the right of
[   21.697182]  allocated 48-byte region [ffff888102993400, ffff888102993430)
[   21.698901] 
[   21.699051] The buggy address belongs to the physical page:
[   21.699952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102993
[   21.700397] flags: 0x200000000000000(node=0|zone=2)
[   21.700949] page_type: f5(slab)
[   21.701390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.702156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.703021] page dumped because: kasan: bad access detected
[   21.703576] 
[   21.703731] Memory state around the buggy address:
[   21.704032]  ffff888102993300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.705143]  ffff888102993380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.705715] >ffff888102993400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.706524]                                      ^
[   21.706946]  ffff888102993480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.707511]  ffff888102993500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.708138] ==================================================================