Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.714017] ==================================================================
[   21.714339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.714945] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.715407] 
[   21.715621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.715746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.715788] Hardware name: linux,dummy-virt (DT)
[   21.715828] Call trace:
[   21.715857]  show_stack+0x20/0x38 (C)
[   21.715916]  dump_stack_lvl+0x8c/0xd0
[   21.715990]  print_report+0x118/0x608
[   21.716044]  kasan_report+0xdc/0x128
[   21.716098]  kasan_check_range+0x100/0x1a8
[   21.716154]  __kasan_check_write+0x20/0x30
[   21.716220]  kasan_atomics_helper+0xad4/0x4858
[   21.716283]  kasan_atomics+0x198/0x2e8
[   21.716338]  kunit_try_run_case+0x170/0x3f0
[   21.716393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.716455]  kthread+0x318/0x620
[   21.716506]  ret_from_fork+0x10/0x20
[   21.716562] 
[   21.720031] Allocated by task 254:
[   21.720364]  kasan_save_stack+0x3c/0x68
[   21.720713]  kasan_save_track+0x20/0x40
[   21.720993]  kasan_save_alloc_info+0x40/0x58
[   21.721360]  __kasan_kmalloc+0xd4/0xd8
[   21.721664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.721976]  kasan_atomics+0xb8/0x2e8
[   21.722362]  kunit_try_run_case+0x170/0x3f0
[   21.722669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.723031]  kthread+0x318/0x620
[   21.723252]  ret_from_fork+0x10/0x20
[   21.723499] 
[   21.723707] The buggy address belongs to the object at fff00000c66ea700
[   21.723707]  which belongs to the cache kmalloc-64 of size 64
[   21.724321] The buggy address is located 0 bytes to the right of
[   21.724321]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.725038] 
[   21.725176] The buggy address belongs to the physical page:
[   21.725483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.726008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.726412] page_type: f5(slab)
[   21.726773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.727382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.727652] page dumped because: kasan: bad access detected
[   21.728054] 
[   21.728363] Memory state around the buggy address:
[   21.728637]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.729038]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.729455] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.730243]                                      ^
[   21.730580]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.731082]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.731456] ==================================================================
[   21.301652] ==================================================================
[   21.301993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   21.302269] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.302889] 
[   21.303141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.303248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.303286] Hardware name: linux,dummy-virt (DT)
[   21.303343] Call trace:
[   21.303376]  show_stack+0x20/0x38 (C)
[   21.303438]  dump_stack_lvl+0x8c/0xd0
[   21.303496]  print_report+0x118/0x608
[   21.303551]  kasan_report+0xdc/0x128
[   21.303606]  kasan_check_range+0x100/0x1a8
[   21.303663]  __kasan_check_write+0x20/0x30
[   21.303715]  kasan_atomics_helper+0x24c/0x4858
[   21.303785]  kasan_atomics+0x198/0x2e8
[   21.303839]  kunit_try_run_case+0x170/0x3f0
[   21.303893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.303948]  kthread+0x318/0x620
[   21.303998]  ret_from_fork+0x10/0x20
[   21.304053] 
[   21.307207] Allocated by task 254:
[   21.307505]  kasan_save_stack+0x3c/0x68
[   21.307758]  kasan_save_track+0x20/0x40
[   21.308024]  kasan_save_alloc_info+0x40/0x58
[   21.308233]  __kasan_kmalloc+0xd4/0xd8
[   21.308466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.308643]  kasan_atomics+0xb8/0x2e8
[   21.308811]  kunit_try_run_case+0x170/0x3f0
[   21.309143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.309543]  kthread+0x318/0x620
[   21.309849]  ret_from_fork+0x10/0x20
[   21.310193] 
[   21.310381] The buggy address belongs to the object at fff00000c66ea700
[   21.310381]  which belongs to the cache kmalloc-64 of size 64
[   21.311141] The buggy address is located 0 bytes to the right of
[   21.311141]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.311679] 
[   21.311870] The buggy address belongs to the physical page:
[   21.312184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.312504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.312722] page_type: f5(slab)
[   21.313019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.313487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.313976] page dumped because: kasan: bad access detected
[   21.314254] 
[   21.314392] Memory state around the buggy address:
[   21.314845]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.315229]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.315568] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.315878]                                      ^
[   21.316198]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.316611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.316993] ==================================================================
[   22.271916] ==================================================================
[   22.272593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.273083] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.273409] 
[   22.273633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.274392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.274447] Hardware name: linux,dummy-virt (DT)
[   22.274526] Call trace:
[   22.274560]  show_stack+0x20/0x38 (C)
[   22.274629]  dump_stack_lvl+0x8c/0xd0
[   22.274687]  print_report+0x118/0x608
[   22.274764]  kasan_report+0xdc/0x128
[   22.274824]  kasan_check_range+0x100/0x1a8
[   22.274880]  __kasan_check_write+0x20/0x30
[   22.274935]  kasan_atomics_helper+0x1644/0x4858
[   22.274993]  kasan_atomics+0x198/0x2e8
[   22.275040]  kunit_try_run_case+0x170/0x3f0
[   22.275093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.275149]  kthread+0x318/0x620
[   22.275195]  ret_from_fork+0x10/0x20
[   22.275249] 
[   22.279516] Allocated by task 254:
[   22.280008]  kasan_save_stack+0x3c/0x68
[   22.280381]  kasan_save_track+0x20/0x40
[   22.280720]  kasan_save_alloc_info+0x40/0x58
[   22.281009]  __kasan_kmalloc+0xd4/0xd8
[   22.281249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.281501]  kasan_atomics+0xb8/0x2e8
[   22.281743]  kunit_try_run_case+0x170/0x3f0
[   22.282001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.282366]  kthread+0x318/0x620
[   22.282591]  ret_from_fork+0x10/0x20
[   22.283291] 
[   22.283415] The buggy address belongs to the object at fff00000c66ea700
[   22.283415]  which belongs to the cache kmalloc-64 of size 64
[   22.284184] The buggy address is located 0 bytes to the right of
[   22.284184]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.284997] 
[   22.285112] The buggy address belongs to the physical page:
[   22.285516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.286092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.286479] page_type: f5(slab)
[   22.286651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.287216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.287728] page dumped because: kasan: bad access detected
[   22.288142] 
[   22.288366] Memory state around the buggy address:
[   22.288787]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.289285]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.289776] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.290249]                                      ^
[   22.290701]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.291196]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.291655] ==================================================================
[   21.384783] ==================================================================
[   21.385084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   21.385473] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.386443] 
[   21.386687] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.386865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.386904] Hardware name: linux,dummy-virt (DT)
[   21.386942] Call trace:
[   21.386973]  show_stack+0x20/0x38 (C)
[   21.387036]  dump_stack_lvl+0x8c/0xd0
[   21.387091]  print_report+0x118/0x608
[   21.387145]  kasan_report+0xdc/0x128
[   21.387196]  kasan_check_range+0x100/0x1a8
[   21.387251]  __kasan_check_write+0x20/0x30
[   21.387305]  kasan_atomics_helper+0x3ac/0x4858
[   21.387359]  kasan_atomics+0x198/0x2e8
[   21.387411]  kunit_try_run_case+0x170/0x3f0
[   21.387465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.387523]  kthread+0x318/0x620
[   21.387573]  ret_from_fork+0x10/0x20
[   21.387630] 
[   21.392601] Allocated by task 254:
[   21.392856]  kasan_save_stack+0x3c/0x68
[   21.393179]  kasan_save_track+0x20/0x40
[   21.393584]  kasan_save_alloc_info+0x40/0x58
[   21.393945]  __kasan_kmalloc+0xd4/0xd8
[   21.394193]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.394482]  kasan_atomics+0xb8/0x2e8
[   21.394734]  kunit_try_run_case+0x170/0x3f0
[   21.395441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.395855]  kthread+0x318/0x620
[   21.396105]  ret_from_fork+0x10/0x20
[   21.396394] 
[   21.396604] The buggy address belongs to the object at fff00000c66ea700
[   21.396604]  which belongs to the cache kmalloc-64 of size 64
[   21.397133] The buggy address is located 0 bytes to the right of
[   21.397133]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.397662] 
[   21.397845] The buggy address belongs to the physical page:
[   21.398196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.398951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.399301] page_type: f5(slab)
[   21.399572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.399978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.400340] page dumped because: kasan: bad access detected
[   21.400631] 
[   21.400824] Memory state around the buggy address:
[   21.401062]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.401476]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.401873] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.402175]                                      ^
[   21.402455]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.402972]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.403652] ==================================================================
[   22.292766] ==================================================================
[   22.293054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.293304] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.293537] 
[   22.293659] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.293786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.293823] Hardware name: linux,dummy-virt (DT)
[   22.293864] Call trace:
[   22.293895]  show_stack+0x20/0x38 (C)
[   22.293960]  dump_stack_lvl+0x8c/0xd0
[   22.294018]  print_report+0x118/0x608
[   22.294094]  kasan_report+0xdc/0x128
[   22.294157]  __asan_report_load8_noabort+0x20/0x30
[   22.294216]  kasan_atomics_helper+0x3df4/0x4858
[   22.294273]  kasan_atomics+0x198/0x2e8
[   22.294329]  kunit_try_run_case+0x170/0x3f0
[   22.294390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.294456]  kthread+0x318/0x620
[   22.294545]  ret_from_fork+0x10/0x20
[   22.294611] 
[   22.297922] Allocated by task 254:
[   22.298214]  kasan_save_stack+0x3c/0x68
[   22.298462]  kasan_save_track+0x20/0x40
[   22.298687]  kasan_save_alloc_info+0x40/0x58
[   22.300714]  __kasan_kmalloc+0xd4/0xd8
[   22.301075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.301499]  kasan_atomics+0xb8/0x2e8
[   22.301898]  kunit_try_run_case+0x170/0x3f0
[   22.302302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.302883]  kthread+0x318/0x620
[   22.303191]  ret_from_fork+0x10/0x20
[   22.303539] 
[   22.303775] The buggy address belongs to the object at fff00000c66ea700
[   22.303775]  which belongs to the cache kmalloc-64 of size 64
[   22.304561] The buggy address is located 0 bytes to the right of
[   22.304561]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.305106] 
[   22.305280] The buggy address belongs to the physical page:
[   22.305464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.305721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.305980] page_type: f5(slab)
[   22.306157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.306406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.306645] page dumped because: kasan: bad access detected
[   22.307013] 
[   22.307246] Memory state around the buggy address:
[   22.307648]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.308102]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.308597] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.309144]                                      ^
[   22.309373]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.309707]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.309960] ==================================================================
[   21.284090] ==================================================================
[   21.284444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   21.284984] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.285380] 
[   21.285573] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.285680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.285718] Hardware name: linux,dummy-virt (DT)
[   21.285769] Call trace:
[   21.285803]  show_stack+0x20/0x38 (C)
[   21.285865]  dump_stack_lvl+0x8c/0xd0
[   21.285924]  print_report+0x118/0x608
[   21.285980]  kasan_report+0xdc/0x128
[   21.286031]  kasan_check_range+0x100/0x1a8
[   21.286100]  __kasan_check_read+0x20/0x30
[   21.286156]  kasan_atomics_helper+0x1ec/0x4858
[   21.286214]  kasan_atomics+0x198/0x2e8
[   21.286268]  kunit_try_run_case+0x170/0x3f0
[   21.286326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.286387]  kthread+0x318/0x620
[   21.286440]  ret_from_fork+0x10/0x20
[   21.286515] 
[   21.290397] Allocated by task 254:
[   21.290827]  kasan_save_stack+0x3c/0x68
[   21.291019]  kasan_save_track+0x20/0x40
[   21.291313]  kasan_save_alloc_info+0x40/0x58
[   21.291667]  __kasan_kmalloc+0xd4/0xd8
[   21.291898]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.292127]  kasan_atomics+0xb8/0x2e8
[   21.292293]  kunit_try_run_case+0x170/0x3f0
[   21.292460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.292652]  kthread+0x318/0x620
[   21.292947]  ret_from_fork+0x10/0x20
[   21.293256] 
[   21.293431] The buggy address belongs to the object at fff00000c66ea700
[   21.293431]  which belongs to the cache kmalloc-64 of size 64
[   21.294077] The buggy address is located 0 bytes to the right of
[   21.294077]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.294821] 
[   21.295076] The buggy address belongs to the physical page:
[   21.295267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.295581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.296091] page_type: f5(slab)
[   21.296272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.296605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.297030] page dumped because: kasan: bad access detected
[   21.297325] 
[   21.297500] Memory state around the buggy address:
[   21.297755]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.298252]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.298788] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.299209]                                      ^
[   21.299561]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299864]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.300343] ==================================================================
[   21.839905] ==================================================================
[   21.840377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.841052] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.841504] 
[   21.841790] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.841893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.841928] Hardware name: linux,dummy-virt (DT)
[   21.841967] Call trace:
[   21.841996]  show_stack+0x20/0x38 (C)
[   21.842078]  dump_stack_lvl+0x8c/0xd0
[   21.842143]  print_report+0x118/0x608
[   21.842197]  kasan_report+0xdc/0x128
[   21.842253]  __asan_report_load4_noabort+0x20/0x30
[   21.842312]  kasan_atomics_helper+0x3dd8/0x4858
[   21.842366]  kasan_atomics+0x198/0x2e8
[   21.842420]  kunit_try_run_case+0x170/0x3f0
[   21.842475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.843145]  kthread+0x318/0x620
[   21.843221]  ret_from_fork+0x10/0x20
[   21.843334] 
[   21.846539] Allocated by task 254:
[   21.846840]  kasan_save_stack+0x3c/0x68
[   21.847105]  kasan_save_track+0x20/0x40
[   21.847339]  kasan_save_alloc_info+0x40/0x58
[   21.847647]  __kasan_kmalloc+0xd4/0xd8
[   21.847965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.848254]  kasan_atomics+0xb8/0x2e8
[   21.848473]  kunit_try_run_case+0x170/0x3f0
[   21.848798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.849148]  kthread+0x318/0x620
[   21.849409]  ret_from_fork+0x10/0x20
[   21.849619] 
[   21.849814] The buggy address belongs to the object at fff00000c66ea700
[   21.849814]  which belongs to the cache kmalloc-64 of size 64
[   21.850365] The buggy address is located 0 bytes to the right of
[   21.850365]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.851009] 
[   21.851122] The buggy address belongs to the physical page:
[   21.851538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.851937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.852425] page_type: f5(slab)
[   21.852592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.852862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.853101] page dumped because: kasan: bad access detected
[   21.853290] 
[   21.853393] Memory state around the buggy address:
[   21.853567]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.853873]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.854399] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.854865]                                      ^
[   21.855226]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.855638]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.855946] ==================================================================
[   21.335233] ==================================================================
[   21.335557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   21.335931] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.336281] 
[   21.336454] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.336559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.336596] Hardware name: linux,dummy-virt (DT)
[   21.336636] Call trace:
[   21.336664]  show_stack+0x20/0x38 (C)
[   21.336722]  dump_stack_lvl+0x8c/0xd0
[   21.336794]  print_report+0x118/0x608
[   21.336851]  kasan_report+0xdc/0x128
[   21.336904]  __asan_report_load4_noabort+0x20/0x30
[   21.336961]  kasan_atomics_helper+0x40fc/0x4858
[   21.337017]  kasan_atomics+0x198/0x2e8
[   21.337069]  kunit_try_run_case+0x170/0x3f0
[   21.337125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.337185]  kthread+0x318/0x620
[   21.337239]  ret_from_fork+0x10/0x20
[   21.337296] 
[   21.340553] Allocated by task 254:
[   21.340751]  kasan_save_stack+0x3c/0x68
[   21.340921]  kasan_save_track+0x20/0x40
[   21.341239]  kasan_save_alloc_info+0x40/0x58
[   21.341571]  __kasan_kmalloc+0xd4/0xd8
[   21.341769]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.341945]  kasan_atomics+0xb8/0x2e8
[   21.342208]  kunit_try_run_case+0x170/0x3f0
[   21.342698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.343136]  kthread+0x318/0x620
[   21.343300]  ret_from_fork+0x10/0x20
[   21.343601] 
[   21.343783] The buggy address belongs to the object at fff00000c66ea700
[   21.343783]  which belongs to the cache kmalloc-64 of size 64
[   21.344288] The buggy address is located 0 bytes to the right of
[   21.344288]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.344787] 
[   21.344959] The buggy address belongs to the physical page:
[   21.345310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.345831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.346194] page_type: f5(slab)
[   21.346387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.347049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.347379] page dumped because: kasan: bad access detected
[   21.347615] 
[   21.347796] Memory state around the buggy address:
[   21.348009]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.348342]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.348683] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.349056]                                      ^
[   21.349303]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349627]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349996] ==================================================================
[   21.461115] ==================================================================
[   21.461811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   21.462306] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.463118] 
[   21.463982] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.464110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.464148] Hardware name: linux,dummy-virt (DT)
[   21.464189] Call trace:
[   21.464221]  show_stack+0x20/0x38 (C)
[   21.464293]  dump_stack_lvl+0x8c/0xd0
[   21.464351]  print_report+0x118/0x608
[   21.464410]  kasan_report+0xdc/0x128
[   21.464464]  kasan_check_range+0x100/0x1a8
[   21.464521]  __kasan_check_write+0x20/0x30
[   21.464575]  kasan_atomics_helper+0x54c/0x4858
[   21.464632]  kasan_atomics+0x198/0x2e8
[   21.464686]  kunit_try_run_case+0x170/0x3f0
[   21.464766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.464830]  kthread+0x318/0x620
[   21.464883]  ret_from_fork+0x10/0x20
[   21.464939] 
[   21.468648] Allocated by task 254:
[   21.469728]  kasan_save_stack+0x3c/0x68
[   21.470122]  kasan_save_track+0x20/0x40
[   21.470707]  kasan_save_alloc_info+0x40/0x58
[   21.471126]  __kasan_kmalloc+0xd4/0xd8
[   21.471603]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.472112]  kasan_atomics+0xb8/0x2e8
[   21.472475]  kunit_try_run_case+0x170/0x3f0
[   21.472861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.473289]  kthread+0x318/0x620
[   21.473621]  ret_from_fork+0x10/0x20
[   21.474027] 
[   21.474206] The buggy address belongs to the object at fff00000c66ea700
[   21.474206]  which belongs to the cache kmalloc-64 of size 64
[   21.475370] The buggy address is located 0 bytes to the right of
[   21.475370]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.476122] 
[   21.476352] The buggy address belongs to the physical page:
[   21.476621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.476887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.477118] page_type: f5(slab)
[   21.477598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.478104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.478692] page dumped because: kasan: bad access detected
[   21.479243] 
[   21.479516] Memory state around the buggy address:
[   21.479902]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.480247]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.480785] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.481286]                                      ^
[   21.481650]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.482088]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.482723] ==================================================================
[   22.083500] ==================================================================
[   22.083820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.084205] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.084525] 
[   22.084708] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.084815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.084850] Hardware name: linux,dummy-virt (DT)
[   22.084889] Call trace:
[   22.084917]  show_stack+0x20/0x38 (C)
[   22.084975]  dump_stack_lvl+0x8c/0xd0
[   22.085029]  print_report+0x118/0x608
[   22.085084]  kasan_report+0xdc/0x128
[   22.085137]  kasan_check_range+0x100/0x1a8
[   22.085191]  __kasan_check_write+0x20/0x30
[   22.085243]  kasan_atomics_helper+0x11f8/0x4858
[   22.085299]  kasan_atomics+0x198/0x2e8
[   22.085349]  kunit_try_run_case+0x170/0x3f0
[   22.085404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085463]  kthread+0x318/0x620
[   22.085512]  ret_from_fork+0x10/0x20
[   22.085568] 
[   22.088420] Allocated by task 254:
[   22.088689]  kasan_save_stack+0x3c/0x68
[   22.088873]  kasan_save_track+0x20/0x40
[   22.089171]  kasan_save_alloc_info+0x40/0x58
[   22.089546]  __kasan_kmalloc+0xd4/0xd8
[   22.089844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.090102]  kasan_atomics+0xb8/0x2e8
[   22.090412]  kunit_try_run_case+0x170/0x3f0
[   22.090652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.091051]  kthread+0x318/0x620
[   22.091248]  ret_from_fork+0x10/0x20
[   22.091573] 
[   22.091753] The buggy address belongs to the object at fff00000c66ea700
[   22.091753]  which belongs to the cache kmalloc-64 of size 64
[   22.092287] The buggy address is located 0 bytes to the right of
[   22.092287]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.092830] 
[   22.093000] The buggy address belongs to the physical page:
[   22.093235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.093781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.094120] page_type: f5(slab)
[   22.094417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.094791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.095287] page dumped because: kasan: bad access detected
[   22.095559] 
[   22.095729] Memory state around the buggy address:
[   22.095935]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096272]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.096644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.096962]                                      ^
[   22.097238]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097623]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097939] ==================================================================
[   21.541450] ==================================================================
[   21.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   21.543063] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.543297] 
[   21.543421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.543522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.543558] Hardware name: linux,dummy-virt (DT)
[   21.543596] Call trace:
[   21.543627]  show_stack+0x20/0x38 (C)
[   21.543686]  dump_stack_lvl+0x8c/0xd0
[   21.543761]  print_report+0x118/0x608
[   21.543822]  kasan_report+0xdc/0x128
[   21.543876]  kasan_check_range+0x100/0x1a8
[   21.543933]  __kasan_check_write+0x20/0x30
[   21.543986]  kasan_atomics_helper+0x6ec/0x4858
[   21.544042]  kasan_atomics+0x198/0x2e8
[   21.544096]  kunit_try_run_case+0x170/0x3f0
[   21.544155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.544214]  kthread+0x318/0x620
[   21.544267]  ret_from_fork+0x10/0x20
[   21.544324] 
[   21.548775] Allocated by task 254:
[   21.548983]  kasan_save_stack+0x3c/0x68
[   21.549222]  kasan_save_track+0x20/0x40
[   21.549431]  kasan_save_alloc_info+0x40/0x58
[   21.549648]  __kasan_kmalloc+0xd4/0xd8
[   21.551177]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.551416]  kasan_atomics+0xb8/0x2e8
[   21.551874]  kunit_try_run_case+0x170/0x3f0
[   21.552280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.552573]  kthread+0x318/0x620
[   21.552787]  ret_from_fork+0x10/0x20
[   21.553023] 
[   21.553175] The buggy address belongs to the object at fff00000c66ea700
[   21.553175]  which belongs to the cache kmalloc-64 of size 64
[   21.553709] The buggy address is located 0 bytes to the right of
[   21.553709]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.554908] 
[   21.555080] The buggy address belongs to the physical page:
[   21.555287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.555698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.556193] page_type: f5(slab)
[   21.556513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.556774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.557406] page dumped because: kasan: bad access detected
[   21.557744] 
[   21.557952] Memory state around the buggy address:
[   21.558318]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.558727]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.559325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.559790]                                      ^
[   21.560097]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560466]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.560958] ==================================================================
[   22.129603] ==================================================================
[   22.129907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.130420] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.130815] 
[   22.130996] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.131092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.131127] Hardware name: linux,dummy-virt (DT)
[   22.131167] Call trace:
[   22.131195]  show_stack+0x20/0x38 (C)
[   22.131254]  dump_stack_lvl+0x8c/0xd0
[   22.131308]  print_report+0x118/0x608
[   22.131362]  kasan_report+0xdc/0x128
[   22.131414]  kasan_check_range+0x100/0x1a8
[   22.131467]  __kasan_check_write+0x20/0x30
[   22.131519]  kasan_atomics_helper+0x1384/0x4858
[   22.131573]  kasan_atomics+0x198/0x2e8
[   22.131623]  kunit_try_run_case+0x170/0x3f0
[   22.131677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.131735]  kthread+0x318/0x620
[   22.131800]  ret_from_fork+0x10/0x20
[   22.131855] 
[   22.134837] Allocated by task 254:
[   22.135134]  kasan_save_stack+0x3c/0x68
[   22.135323]  kasan_save_track+0x20/0x40
[   22.135574]  kasan_save_alloc_info+0x40/0x58
[   22.135882]  __kasan_kmalloc+0xd4/0xd8
[   22.136116]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.136440]  kasan_atomics+0xb8/0x2e8
[   22.136646]  kunit_try_run_case+0x170/0x3f0
[   22.136866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.137160]  kthread+0x318/0x620
[   22.137316]  ret_from_fork+0x10/0x20
[   22.137644] 
[   22.137827] The buggy address belongs to the object at fff00000c66ea700
[   22.137827]  which belongs to the cache kmalloc-64 of size 64
[   22.138300] The buggy address is located 0 bytes to the right of
[   22.138300]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.138925] 
[   22.139094] The buggy address belongs to the physical page:
[   22.139352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.139707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.140021] page_type: f5(slab)
[   22.140260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.140571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.141064] page dumped because: kasan: bad access detected
[   22.141299] 
[   22.141465] Memory state around the buggy address:
[   22.141668]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.142082]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.142468] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.142791]                                      ^
[   22.143085]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.143393]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.143733] ==================================================================
[   21.957142] ==================================================================
[   21.957599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.957917] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.958322] 
[   21.958543] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.958641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.958695] Hardware name: linux,dummy-virt (DT)
[   21.958734] Call trace:
[   21.958775]  show_stack+0x20/0x38 (C)
[   21.958849]  dump_stack_lvl+0x8c/0xd0
[   21.958902]  print_report+0x118/0x608
[   21.958955]  kasan_report+0xdc/0x128
[   21.959006]  kasan_check_range+0x100/0x1a8
[   21.959060]  __kasan_check_write+0x20/0x30
[   21.959135]  kasan_atomics_helper+0xeb8/0x4858
[   21.959189]  kasan_atomics+0x198/0x2e8
[   21.959254]  kunit_try_run_case+0x170/0x3f0
[   21.959306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.959364]  kthread+0x318/0x620
[   21.959411]  ret_from_fork+0x10/0x20
[   21.959461] 
[   21.962763] Allocated by task 254:
[   21.963087]  kasan_save_stack+0x3c/0x68
[   21.963328]  kasan_save_track+0x20/0x40
[   21.963557]  kasan_save_alloc_info+0x40/0x58
[   21.963938]  __kasan_kmalloc+0xd4/0xd8
[   21.964180]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.964411]  kasan_atomics+0xb8/0x2e8
[   21.964649]  kunit_try_run_case+0x170/0x3f0
[   21.964893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.965183]  kthread+0x318/0x620
[   21.965387]  ret_from_fork+0x10/0x20
[   21.965614] 
[   21.965731] The buggy address belongs to the object at fff00000c66ea700
[   21.965731]  which belongs to the cache kmalloc-64 of size 64
[   21.966851] The buggy address is located 0 bytes to the right of
[   21.966851]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.967279] 
[   21.967453] The buggy address belongs to the physical page:
[   21.967708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.968790] page_type: f5(slab)
[   21.969191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.969715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.970205] page dumped because: kasan: bad access detected
[   21.970619] 
[   21.970858] Memory state around the buggy address:
[   21.971262]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971751]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.972240] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.972694]                                      ^
[   21.973084]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.973447]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.973764] ==================================================================
[   21.245549] ==================================================================
[   21.246219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   21.246964] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.247804] 
[   21.247945] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.248049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.248080] Hardware name: linux,dummy-virt (DT)
[   21.248120] Call trace:
[   21.248148]  show_stack+0x20/0x38 (C)
[   21.248216]  dump_stack_lvl+0x8c/0xd0
[   21.248274]  print_report+0x118/0x608
[   21.248329]  kasan_report+0xdc/0x128
[   21.248378]  __asan_report_load4_noabort+0x20/0x30
[   21.248432]  kasan_atomics_helper+0x40a8/0x4858
[   21.248485]  kasan_atomics+0x198/0x2e8
[   21.248533]  kunit_try_run_case+0x170/0x3f0
[   21.248586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.248641]  kthread+0x318/0x620
[   21.248691]  ret_from_fork+0x10/0x20
[   21.248767] 
[   21.253605] Allocated by task 254:
[   21.253822]  kasan_save_stack+0x3c/0x68
[   21.254225]  kasan_save_track+0x20/0x40
[   21.254503]  kasan_save_alloc_info+0x40/0x58
[   21.255052]  __kasan_kmalloc+0xd4/0xd8
[   21.255289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.255559]  kasan_atomics+0xb8/0x2e8
[   21.255865]  kunit_try_run_case+0x170/0x3f0
[   21.256135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.256469]  kthread+0x318/0x620
[   21.256694]  ret_from_fork+0x10/0x20
[   21.256892] 
[   21.257087] The buggy address belongs to the object at fff00000c66ea700
[   21.257087]  which belongs to the cache kmalloc-64 of size 64
[   21.257658] The buggy address is located 0 bytes to the right of
[   21.257658]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.258332] 
[   21.258625] The buggy address belongs to the physical page:
[   21.258874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.259537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.259837] page_type: f5(slab)
[   21.260185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.260711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.261153] page dumped because: kasan: bad access detected
[   21.261486] 
[   21.261698] Memory state around the buggy address:
[   21.262073]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.262767]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.263267] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.263689]                                      ^
[   21.264001]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264475]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264909] ==================================================================
[   21.991890] ==================================================================
[   21.992294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.992825] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.993260] 
[   21.993459] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.993576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.993612] Hardware name: linux,dummy-virt (DT)
[   21.993652] Call trace:
[   21.993680]  show_stack+0x20/0x38 (C)
[   21.993746]  dump_stack_lvl+0x8c/0xd0
[   21.993808]  print_report+0x118/0x608
[   21.993877]  kasan_report+0xdc/0x128
[   21.993939]  kasan_check_range+0x100/0x1a8
[   21.993996]  __kasan_check_write+0x20/0x30
[   21.994047]  kasan_atomics_helper+0xf88/0x4858
[   21.994115]  kasan_atomics+0x198/0x2e8
[   21.994168]  kunit_try_run_case+0x170/0x3f0
[   21.994223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994280]  kthread+0x318/0x620
[   21.994329]  ret_from_fork+0x10/0x20
[   21.994386] 
[   21.997370] Allocated by task 254:
[   21.997515]  kasan_save_stack+0x3c/0x68
[   21.997700]  kasan_save_track+0x20/0x40
[   21.998072]  kasan_save_alloc_info+0x40/0x58
[   21.998387]  __kasan_kmalloc+0xd4/0xd8
[   21.998550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.998957]  kasan_atomics+0xb8/0x2e8
[   21.999313]  kunit_try_run_case+0x170/0x3f0
[   21.999510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.999876]  kthread+0x318/0x620
[   22.000180]  ret_from_fork+0x10/0x20
[   22.000479] 
[   22.000666] The buggy address belongs to the object at fff00000c66ea700
[   22.000666]  which belongs to the cache kmalloc-64 of size 64
[   22.001120] The buggy address is located 0 bytes to the right of
[   22.001120]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.001763] 
[   22.001892] The buggy address belongs to the physical page:
[   22.002348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.002775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.003083] page_type: f5(slab)
[   22.003317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.003775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.004066] page dumped because: kasan: bad access detected
[   22.004403] 
[   22.004568] Memory state around the buggy address:
[   22.004854]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.005213]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.005638] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.005968]                                      ^
[   22.006335]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.006690]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.007063] ==================================================================
[   22.160588] ==================================================================
[   22.161112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.161547] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.161870] 
[   22.162105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.162208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.162243] Hardware name: linux,dummy-virt (DT)
[   22.162283] Call trace:
[   22.162312]  show_stack+0x20/0x38 (C)
[   22.162372]  dump_stack_lvl+0x8c/0xd0
[   22.162435]  print_report+0x118/0x608
[   22.162491]  kasan_report+0xdc/0x128
[   22.162998]  kasan_check_range+0x100/0x1a8
[   22.163062]  __kasan_check_write+0x20/0x30
[   22.163118]  kasan_atomics_helper+0x1414/0x4858
[   22.163177]  kasan_atomics+0x198/0x2e8
[   22.163230]  kunit_try_run_case+0x170/0x3f0
[   22.163294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.163354]  kthread+0x318/0x620
[   22.163404]  ret_from_fork+0x10/0x20
[   22.163461] 
[   22.167878] Allocated by task 254:
[   22.168268]  kasan_save_stack+0x3c/0x68
[   22.168642]  kasan_save_track+0x20/0x40
[   22.169073]  kasan_save_alloc_info+0x40/0x58
[   22.169310]  __kasan_kmalloc+0xd4/0xd8
[   22.169537]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.169842]  kasan_atomics+0xb8/0x2e8
[   22.170084]  kunit_try_run_case+0x170/0x3f0
[   22.170343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.170617]  kthread+0x318/0x620
[   22.170847]  ret_from_fork+0x10/0x20
[   22.171017] 
[   22.171125] The buggy address belongs to the object at fff00000c66ea700
[   22.171125]  which belongs to the cache kmalloc-64 of size 64
[   22.171982] The buggy address is located 0 bytes to the right of
[   22.171982]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.172540] 
[   22.172752] The buggy address belongs to the physical page:
[   22.173268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.173755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.174171] page_type: f5(slab)
[   22.174445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.174867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.175103] page dumped because: kasan: bad access detected
[   22.175289] 
[   22.175393] Memory state around the buggy address:
[   22.175570]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.175826]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.176054] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.176274]                                      ^
[   22.176458]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.176686]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.177247] ==================================================================
[   21.749570] ==================================================================
[   21.749914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   21.750458] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.750962] 
[   21.751134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.751250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.751287] Hardware name: linux,dummy-virt (DT)
[   21.751325] Call trace:
[   21.751353]  show_stack+0x20/0x38 (C)
[   21.751410]  dump_stack_lvl+0x8c/0xd0
[   21.751465]  print_report+0x118/0x608
[   21.751517]  kasan_report+0xdc/0x128
[   21.751593]  kasan_check_range+0x100/0x1a8
[   21.751649]  __kasan_check_write+0x20/0x30
[   21.751704]  kasan_atomics_helper+0xb70/0x4858
[   21.751788]  kasan_atomics+0x198/0x2e8
[   21.751843]  kunit_try_run_case+0x170/0x3f0
[   21.751899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.751958]  kthread+0x318/0x620
[   21.752011]  ret_from_fork+0x10/0x20
[   21.752067] 
[   21.755262] Allocated by task 254:
[   21.755509]  kasan_save_stack+0x3c/0x68
[   21.755872]  kasan_save_track+0x20/0x40
[   21.756174]  kasan_save_alloc_info+0x40/0x58
[   21.756344]  __kasan_kmalloc+0xd4/0xd8
[   21.756721]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.757158]  kasan_atomics+0xb8/0x2e8
[   21.757434]  kunit_try_run_case+0x170/0x3f0
[   21.757642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.758139]  kthread+0x318/0x620
[   21.758385]  ret_from_fork+0x10/0x20
[   21.758622] 
[   21.758855] The buggy address belongs to the object at fff00000c66ea700
[   21.758855]  which belongs to the cache kmalloc-64 of size 64
[   21.759466] The buggy address is located 0 bytes to the right of
[   21.759466]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.760114] 
[   21.760303] The buggy address belongs to the physical page:
[   21.760589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.761120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.761537] page_type: f5(slab)
[   21.761781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.762243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.762731] page dumped because: kasan: bad access detected
[   21.763061] 
[   21.763211] Memory state around the buggy address:
[   21.763498]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.763897]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.764317] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.764726]                                      ^
[   21.764989]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.765349]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.765774] ==================================================================
[   21.820799] ==================================================================
[   21.821570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   21.822256] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.823023] 
[   21.823557] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.823669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.823708] Hardware name: linux,dummy-virt (DT)
[   21.823787] Call trace:
[   21.823824]  show_stack+0x20/0x38 (C)
[   21.823903]  dump_stack_lvl+0x8c/0xd0
[   21.823960]  print_report+0x118/0x608
[   21.824014]  kasan_report+0xdc/0x128
[   21.824068]  kasan_check_range+0x100/0x1a8
[   21.824123]  __kasan_check_write+0x20/0x30
[   21.824177]  kasan_atomics_helper+0xca0/0x4858
[   21.824232]  kasan_atomics+0x198/0x2e8
[   21.824284]  kunit_try_run_case+0x170/0x3f0
[   21.824340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.824402]  kthread+0x318/0x620
[   21.824454]  ret_from_fork+0x10/0x20
[   21.824509] 
[   21.828105] Allocated by task 254:
[   21.828314]  kasan_save_stack+0x3c/0x68
[   21.828537]  kasan_save_track+0x20/0x40
[   21.829460]  kasan_save_alloc_info+0x40/0x58
[   21.829831]  __kasan_kmalloc+0xd4/0xd8
[   21.830023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.830371]  kasan_atomics+0xb8/0x2e8
[   21.830619]  kunit_try_run_case+0x170/0x3f0
[   21.830991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.831332]  kthread+0x318/0x620
[   21.831556]  ret_from_fork+0x10/0x20
[   21.831784] 
[   21.831988] The buggy address belongs to the object at fff00000c66ea700
[   21.831988]  which belongs to the cache kmalloc-64 of size 64
[   21.832584] The buggy address is located 0 bytes to the right of
[   21.832584]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.833269] 
[   21.833418] The buggy address belongs to the physical page:
[   21.833684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.834170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.834660] page_type: f5(slab)
[   21.834858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.835362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.835767] page dumped because: kasan: bad access detected
[   21.836074] 
[   21.836232] Memory state around the buggy address:
[   21.836578]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.836968]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.837390] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.837817]                                      ^
[   21.838092]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.838439]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.838895] ==================================================================
[   22.198395] ==================================================================
[   22.198734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.199033] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.199288] 
[   22.199458] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.199567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.199604] Hardware name: linux,dummy-virt (DT)
[   22.199644] Call trace:
[   22.199676]  show_stack+0x20/0x38 (C)
[   22.199822]  dump_stack_lvl+0x8c/0xd0
[   22.200237]  print_report+0x118/0x608
[   22.200301]  kasan_report+0xdc/0x128
[   22.200357]  kasan_check_range+0x100/0x1a8
[   22.200414]  __kasan_check_write+0x20/0x30
[   22.200466]  kasan_atomics_helper+0x14e4/0x4858
[   22.200523]  kasan_atomics+0x198/0x2e8
[   22.200579]  kunit_try_run_case+0x170/0x3f0
[   22.200635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.200695]  kthread+0x318/0x620
[   22.200769]  ret_from_fork+0x10/0x20
[   22.200831] 
[   22.205586] Allocated by task 254:
[   22.205921]  kasan_save_stack+0x3c/0x68
[   22.206403]  kasan_save_track+0x20/0x40
[   22.206603]  kasan_save_alloc_info+0x40/0x58
[   22.207094]  __kasan_kmalloc+0xd4/0xd8
[   22.207612]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.208006]  kasan_atomics+0xb8/0x2e8
[   22.208349]  kunit_try_run_case+0x170/0x3f0
[   22.208599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209126]  kthread+0x318/0x620
[   22.209449]  ret_from_fork+0x10/0x20
[   22.209692] 
[   22.209963] The buggy address belongs to the object at fff00000c66ea700
[   22.209963]  which belongs to the cache kmalloc-64 of size 64
[   22.210804] The buggy address is located 0 bytes to the right of
[   22.210804]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.211652] 
[   22.211982] The buggy address belongs to the physical page:
[   22.212285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.212765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.213117] page_type: f5(slab)
[   22.213435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.213809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.214319] page dumped because: kasan: bad access detected
[   22.214659] 
[   22.214814] Memory state around the buggy address:
[   22.215086]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.215573]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.216043] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.216384]                                      ^
[   22.216652]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217050]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.217440] ==================================================================
[   22.329227] ==================================================================
[   22.329606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.330581] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.330947] 
[   22.331088] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.331189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.331226] Hardware name: linux,dummy-virt (DT)
[   22.331266] Call trace:
[   22.331296]  show_stack+0x20/0x38 (C)
[   22.331357]  dump_stack_lvl+0x8c/0xd0
[   22.331414]  print_report+0x118/0x608
[   22.331468]  kasan_report+0xdc/0x128
[   22.331521]  __asan_report_load8_noabort+0x20/0x30
[   22.331577]  kasan_atomics_helper+0x3e10/0x4858
[   22.331633]  kasan_atomics+0x198/0x2e8
[   22.331684]  kunit_try_run_case+0x170/0x3f0
[   22.331752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.331817]  kthread+0x318/0x620
[   22.331871]  ret_from_fork+0x10/0x20
[   22.331929] 
[   22.334935] Allocated by task 254:
[   22.335258]  kasan_save_stack+0x3c/0x68
[   22.335640]  kasan_save_track+0x20/0x40
[   22.335890]  kasan_save_alloc_info+0x40/0x58
[   22.336188]  __kasan_kmalloc+0xd4/0xd8
[   22.336538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.336724]  kasan_atomics+0xb8/0x2e8
[   22.337089]  kunit_try_run_case+0x170/0x3f0
[   22.337470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.337763]  kthread+0x318/0x620
[   22.337997]  ret_from_fork+0x10/0x20
[   22.338274] 
[   22.338462] The buggy address belongs to the object at fff00000c66ea700
[   22.338462]  which belongs to the cache kmalloc-64 of size 64
[   22.339022] The buggy address is located 0 bytes to the right of
[   22.339022]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.339700] 
[   22.339851] The buggy address belongs to the physical page:
[   22.340191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.340619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.340956] page_type: f5(slab)
[   22.341280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.341613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.342124] page dumped because: kasan: bad access detected
[   22.342496] 
[   22.342673] Memory state around the buggy address:
[   22.342982]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.343304]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.343783] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.344175]                                      ^
[   22.344451]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.344850]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.345232] ==================================================================
[   22.068029] ==================================================================
[   22.068412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.068648] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.069284] 
[   22.069405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.069497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.069534] Hardware name: linux,dummy-virt (DT)
[   22.069572] Call trace:
[   22.069600]  show_stack+0x20/0x38 (C)
[   22.069656]  dump_stack_lvl+0x8c/0xd0
[   22.069710]  print_report+0x118/0x608
[   22.069775]  kasan_report+0xdc/0x128
[   22.069831]  kasan_check_range+0x100/0x1a8
[   22.069888]  __kasan_check_write+0x20/0x30
[   22.069941]  kasan_atomics_helper+0x1190/0x4858
[   22.069996]  kasan_atomics+0x198/0x2e8
[   22.070049]  kunit_try_run_case+0x170/0x3f0
[   22.070117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.070180]  kthread+0x318/0x620
[   22.070232]  ret_from_fork+0x10/0x20
[   22.070287] 
[   22.073640] Allocated by task 254:
[   22.073842]  kasan_save_stack+0x3c/0x68
[   22.074017]  kasan_save_track+0x20/0x40
[   22.074196]  kasan_save_alloc_info+0x40/0x58
[   22.074580]  __kasan_kmalloc+0xd4/0xd8
[   22.074909]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.075087]  kasan_atomics+0xb8/0x2e8
[   22.075422]  kunit_try_run_case+0x170/0x3f0
[   22.075808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.076077]  kthread+0x318/0x620
[   22.076294]  ret_from_fork+0x10/0x20
[   22.076514] 
[   22.076681] The buggy address belongs to the object at fff00000c66ea700
[   22.076681]  which belongs to the cache kmalloc-64 of size 64
[   22.077193] The buggy address is located 0 bytes to the right of
[   22.077193]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.077616] 
[   22.077721] The buggy address belongs to the physical page:
[   22.078162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.078584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.078947] page_type: f5(slab)
[   22.079147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.079514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.079778] page dumped because: kasan: bad access detected
[   22.080148] 
[   22.080317] Memory state around the buggy address:
[   22.080623]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.080906]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.081408] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.081728]                                      ^
[   22.081984]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082417]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082719] ==================================================================
[   21.678232] ==================================================================
[   21.678824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.679250] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.679727] 
[   21.679956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.680051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.680091] Hardware name: linux,dummy-virt (DT)
[   21.680130] Call trace:
[   21.680157]  show_stack+0x20/0x38 (C)
[   21.680213]  dump_stack_lvl+0x8c/0xd0
[   21.680264]  print_report+0x118/0x608
[   21.680315]  kasan_report+0xdc/0x128
[   21.680365]  kasan_check_range+0x100/0x1a8
[   21.680416]  __kasan_check_write+0x20/0x30
[   21.680465]  kasan_atomics_helper+0xa04/0x4858
[   21.680516]  kasan_atomics+0x198/0x2e8
[   21.680563]  kunit_try_run_case+0x170/0x3f0
[   21.680613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.680666]  kthread+0x318/0x620
[   21.680748]  ret_from_fork+0x10/0x20
[   21.680806] 
[   21.684079] Allocated by task 254:
[   21.684509]  kasan_save_stack+0x3c/0x68
[   21.684734]  kasan_save_track+0x20/0x40
[   21.684909]  kasan_save_alloc_info+0x40/0x58
[   21.685324]  __kasan_kmalloc+0xd4/0xd8
[   21.685768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.685995]  kasan_atomics+0xb8/0x2e8
[   21.686214]  kunit_try_run_case+0x170/0x3f0
[   21.686611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.686954]  kthread+0x318/0x620
[   21.687224]  ret_from_fork+0x10/0x20
[   21.687561] 
[   21.687802] The buggy address belongs to the object at fff00000c66ea700
[   21.687802]  which belongs to the cache kmalloc-64 of size 64
[   21.688304] The buggy address is located 0 bytes to the right of
[   21.688304]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.689111] 
[   21.689308] The buggy address belongs to the physical page:
[   21.689681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.690297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.690826] page_type: f5(slab)
[   21.691023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.691525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.691911] page dumped because: kasan: bad access detected
[   21.692323] 
[   21.692496] Memory state around the buggy address:
[   21.692791]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.693291]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.693639] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.694024]                                      ^
[   21.694311]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.694712]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.695245] ==================================================================
[   21.483624] ==================================================================
[   21.483940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   21.484267] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.484568] 
[   21.484718] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.484929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.484969] Hardware name: linux,dummy-virt (DT)
[   21.485010] Call trace:
[   21.485042]  show_stack+0x20/0x38 (C)
[   21.485115]  dump_stack_lvl+0x8c/0xd0
[   21.485176]  print_report+0x118/0x608
[   21.485233]  kasan_report+0xdc/0x128
[   21.485286]  kasan_check_range+0x100/0x1a8
[   21.485345]  __kasan_check_write+0x20/0x30
[   21.485397]  kasan_atomics_helper+0x5b4/0x4858
[   21.485453]  kasan_atomics+0x198/0x2e8
[   21.485506]  kunit_try_run_case+0x170/0x3f0
[   21.485560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.485619]  kthread+0x318/0x620
[   21.485672]  ret_from_fork+0x10/0x20
[   21.485729] 
[   21.489535] Allocated by task 254:
[   21.489911]  kasan_save_stack+0x3c/0x68
[   21.490144]  kasan_save_track+0x20/0x40
[   21.490778]  kasan_save_alloc_info+0x40/0x58
[   21.491179]  __kasan_kmalloc+0xd4/0xd8
[   21.491417]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.491676]  kasan_atomics+0xb8/0x2e8
[   21.491908]  kunit_try_run_case+0x170/0x3f0
[   21.492158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.492446]  kthread+0x318/0x620
[   21.492660]  ret_from_fork+0x10/0x20
[   21.492991] 
[   21.493147] The buggy address belongs to the object at fff00000c66ea700
[   21.493147]  which belongs to the cache kmalloc-64 of size 64
[   21.493478] The buggy address is located 0 bytes to the right of
[   21.493478]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.493836] 
[   21.493951] The buggy address belongs to the physical page:
[   21.494159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.494436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.495328] page_type: f5(slab)
[   21.495571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.495945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.496252] page dumped because: kasan: bad access detected
[   21.496510] 
[   21.496641] Memory state around the buggy address:
[   21.497735]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.498167]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.498745] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.499142]                                      ^
[   21.499517]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.500141]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.500449] ==================================================================
[   21.561994] ==================================================================
[   21.562346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   21.564002] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.564542] 
[   21.564713] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.564867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.564905] Hardware name: linux,dummy-virt (DT)
[   21.564946] Call trace:
[   21.564977]  show_stack+0x20/0x38 (C)
[   21.565066]  dump_stack_lvl+0x8c/0xd0
[   21.565126]  print_report+0x118/0x608
[   21.565181]  kasan_report+0xdc/0x128
[   21.565235]  kasan_check_range+0x100/0x1a8
[   21.565291]  __kasan_check_write+0x20/0x30
[   21.565343]  kasan_atomics_helper+0x760/0x4858
[   21.565399]  kasan_atomics+0x198/0x2e8
[   21.565451]  kunit_try_run_case+0x170/0x3f0
[   21.565506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.565566]  kthread+0x318/0x620
[   21.565620]  ret_from_fork+0x10/0x20
[   21.565679] 
[   21.569565] Allocated by task 254:
[   21.569845]  kasan_save_stack+0x3c/0x68
[   21.570281]  kasan_save_track+0x20/0x40
[   21.570557]  kasan_save_alloc_info+0x40/0x58
[   21.570939]  __kasan_kmalloc+0xd4/0xd8
[   21.571284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.571514]  kasan_atomics+0xb8/0x2e8
[   21.572503]  kunit_try_run_case+0x170/0x3f0
[   21.572780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.573215]  kthread+0x318/0x620
[   21.573506]  ret_from_fork+0x10/0x20
[   21.573805] 
[   21.574046] The buggy address belongs to the object at fff00000c66ea700
[   21.574046]  which belongs to the cache kmalloc-64 of size 64
[   21.574966] The buggy address is located 0 bytes to the right of
[   21.574966]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.575409] 
[   21.575754] The buggy address belongs to the physical page:
[   21.576252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.576510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.577015] page_type: f5(slab)
[   21.577227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.577707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.578222] page dumped because: kasan: bad access detected
[   21.578556] 
[   21.578766] Memory state around the buggy address:
[   21.579038]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.579512]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.579905] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.580354]                                      ^
[   21.580744]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581149]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581525] ==================================================================
[   21.659312] ==================================================================
[   21.659993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.660354] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.660823] 
[   21.661065] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.661169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.661225] Hardware name: linux,dummy-virt (DT)
[   21.661270] Call trace:
[   21.661299]  show_stack+0x20/0x38 (C)
[   21.661361]  dump_stack_lvl+0x8c/0xd0
[   21.661418]  print_report+0x118/0x608
[   21.661499]  kasan_report+0xdc/0x128
[   21.661554]  kasan_check_range+0x100/0x1a8
[   21.661633]  __kasan_check_write+0x20/0x30
[   21.661689]  kasan_atomics_helper+0x99c/0x4858
[   21.661755]  kasan_atomics+0x198/0x2e8
[   21.661813]  kunit_try_run_case+0x170/0x3f0
[   21.661866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.661924]  kthread+0x318/0x620
[   21.661976]  ret_from_fork+0x10/0x20
[   21.662034] 
[   21.666853] Allocated by task 254:
[   21.667275]  kasan_save_stack+0x3c/0x68
[   21.667521]  kasan_save_track+0x20/0x40
[   21.667754]  kasan_save_alloc_info+0x40/0x58
[   21.667933]  __kasan_kmalloc+0xd4/0xd8
[   21.668091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.668517]  kasan_atomics+0xb8/0x2e8
[   21.668876]  kunit_try_run_case+0x170/0x3f0
[   21.669278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.669536]  kthread+0x318/0x620
[   21.669786]  ret_from_fork+0x10/0x20
[   21.669941] 
[   21.670106] The buggy address belongs to the object at fff00000c66ea700
[   21.670106]  which belongs to the cache kmalloc-64 of size 64
[   21.670940] The buggy address is located 0 bytes to the right of
[   21.670940]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.671399] 
[   21.671598] The buggy address belongs to the physical page:
[   21.672085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.672639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.672874] page_type: f5(slab)
[   21.673194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.673617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.674080] page dumped because: kasan: bad access detected
[   21.674421] 
[   21.674629] Memory state around the buggy address:
[   21.674923]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.675314]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.675731] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.676149]                                      ^
[   21.676429]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.676869]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.677298] ==================================================================
[   21.404753] ==================================================================
[   21.405137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   21.405491] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.405922] 
[   21.406131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.406254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.406295] Hardware name: linux,dummy-virt (DT)
[   21.406346] Call trace:
[   21.406380]  show_stack+0x20/0x38 (C)
[   21.406441]  dump_stack_lvl+0x8c/0xd0
[   21.406678]  print_report+0x118/0x608
[   21.407315]  kasan_report+0xdc/0x128
[   21.407381]  kasan_check_range+0x100/0x1a8
[   21.407439]  __kasan_check_write+0x20/0x30
[   21.407489]  kasan_atomics_helper+0x414/0x4858
[   21.407545]  kasan_atomics+0x198/0x2e8
[   21.407597]  kunit_try_run_case+0x170/0x3f0
[   21.407650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.407705]  kthread+0x318/0x620
[   21.407780]  ret_from_fork+0x10/0x20
[   21.407839] 
[   21.410868] Allocated by task 254:
[   21.411192]  kasan_save_stack+0x3c/0x68
[   21.411490]  kasan_save_track+0x20/0x40
[   21.412019]  kasan_save_alloc_info+0x40/0x58
[   21.412309]  __kasan_kmalloc+0xd4/0xd8
[   21.412578]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.412943]  kasan_atomics+0xb8/0x2e8
[   21.413257]  kunit_try_run_case+0x170/0x3f0
[   21.413544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.413813]  kthread+0x318/0x620
[   21.414130]  ret_from_fork+0x10/0x20
[   21.414400] 
[   21.414645] The buggy address belongs to the object at fff00000c66ea700
[   21.414645]  which belongs to the cache kmalloc-64 of size 64
[   21.415371] The buggy address is located 0 bytes to the right of
[   21.415371]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.415940] 
[   21.416117] The buggy address belongs to the physical page:
[   21.416427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.416873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.417237] page_type: f5(slab)
[   21.417413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.417684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.418141] page dumped because: kasan: bad access detected
[   21.418448] 
[   21.418715] Memory state around the buggy address:
[   21.419069]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.419429]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.419843] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.420213]                                      ^
[   21.420503]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.420816]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.421215] ==================================================================
[   22.022421] ==================================================================
[   22.022690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.023236] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.023493] 
[   22.023703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.023822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.023859] Hardware name: linux,dummy-virt (DT)
[   22.023898] Call trace:
[   22.023928]  show_stack+0x20/0x38 (C)
[   22.023984]  dump_stack_lvl+0x8c/0xd0
[   22.024039]  print_report+0x118/0x608
[   22.024090]  kasan_report+0xdc/0x128
[   22.024140]  kasan_check_range+0x100/0x1a8
[   22.024194]  __kasan_check_write+0x20/0x30
[   22.024247]  kasan_atomics_helper+0x1058/0x4858
[   22.024303]  kasan_atomics+0x198/0x2e8
[   22.024354]  kunit_try_run_case+0x170/0x3f0
[   22.024411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.024466]  kthread+0x318/0x620
[   22.024517]  ret_from_fork+0x10/0x20
[   22.024570] 
[   22.027697] Allocated by task 254:
[   22.027982]  kasan_save_stack+0x3c/0x68
[   22.028155]  kasan_save_track+0x20/0x40
[   22.028316]  kasan_save_alloc_info+0x40/0x58
[   22.028679]  __kasan_kmalloc+0xd4/0xd8
[   22.028992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.029159]  kasan_atomics+0xb8/0x2e8
[   22.029473]  kunit_try_run_case+0x170/0x3f0
[   22.029832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030106]  kthread+0x318/0x620
[   22.030312]  ret_from_fork+0x10/0x20
[   22.030621] 
[   22.030771] The buggy address belongs to the object at fff00000c66ea700
[   22.030771]  which belongs to the cache kmalloc-64 of size 64
[   22.031379] The buggy address is located 0 bytes to the right of
[   22.031379]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.031813] 
[   22.031982] The buggy address belongs to the physical page:
[   22.032324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.032564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.033056] page_type: f5(slab)
[   22.033288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.033731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.034136] page dumped because: kasan: bad access detected
[   22.034357] 
[   22.034601] Memory state around the buggy address:
[   22.034895]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.035379]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.035733] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.035986]                                      ^
[   22.036318]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036822] ==================================================================
[   21.601513] ==================================================================
[   21.602098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   21.602864] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.603459] 
[   21.603599] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.603719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.603767] Hardware name: linux,dummy-virt (DT)
[   21.603810] Call trace:
[   21.603841]  show_stack+0x20/0x38 (C)
[   21.603910]  dump_stack_lvl+0x8c/0xd0
[   21.603969]  print_report+0x118/0x608
[   21.604029]  kasan_report+0xdc/0x128
[   21.604084]  kasan_check_range+0x100/0x1a8
[   21.604143]  __kasan_check_write+0x20/0x30
[   21.604219]  kasan_atomics_helper+0x894/0x4858
[   21.604286]  kasan_atomics+0x198/0x2e8
[   21.604340]  kunit_try_run_case+0x170/0x3f0
[   21.604418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.604490]  kthread+0x318/0x620
[   21.604843]  ret_from_fork+0x10/0x20
[   21.604906] 
[   21.608143] Allocated by task 254:
[   21.608354]  kasan_save_stack+0x3c/0x68
[   21.608583]  kasan_save_track+0x20/0x40
[   21.609882]  kasan_save_alloc_info+0x40/0x58
[   21.610143]  __kasan_kmalloc+0xd4/0xd8
[   21.610317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.610516]  kasan_atomics+0xb8/0x2e8
[   21.610680]  kunit_try_run_case+0x170/0x3f0
[   21.610874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.611073]  kthread+0x318/0x620
[   21.611249]  ret_from_fork+0x10/0x20
[   21.611409] 
[   21.611523] The buggy address belongs to the object at fff00000c66ea700
[   21.611523]  which belongs to the cache kmalloc-64 of size 64
[   21.612040] The buggy address is located 0 bytes to the right of
[   21.612040]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.612424] 
[   21.612539] The buggy address belongs to the physical page:
[   21.612728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.613036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.613279] page_type: f5(slab)
[   21.613444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.613707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.615689] page dumped because: kasan: bad access detected
[   21.615940] 
[   21.616142] Memory state around the buggy address:
[   21.616419]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.616818]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.617174] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.617560]                                      ^
[   21.618208]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.618690]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.619279] ==================================================================
[   21.856846] ==================================================================
[   21.857260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.857555] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.857809] 
[   21.858024] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.858174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.858212] Hardware name: linux,dummy-virt (DT)
[   21.858282] Call trace:
[   21.858324]  show_stack+0x20/0x38 (C)
[   21.858386]  dump_stack_lvl+0x8c/0xd0
[   21.858465]  print_report+0x118/0x608
[   21.858555]  kasan_report+0xdc/0x128
[   21.858623]  kasan_check_range+0x100/0x1a8
[   21.858685]  __kasan_check_write+0x20/0x30
[   21.858889]  kasan_atomics_helper+0xd3c/0x4858
[   21.858950]  kasan_atomics+0x198/0x2e8
[   21.859004]  kunit_try_run_case+0x170/0x3f0
[   21.859059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.859118]  kthread+0x318/0x620
[   21.859168]  ret_from_fork+0x10/0x20
[   21.859225] 
[   21.861691] Allocated by task 254:
[   21.861888]  kasan_save_stack+0x3c/0x68
[   21.862095]  kasan_save_track+0x20/0x40
[   21.862289]  kasan_save_alloc_info+0x40/0x58
[   21.862630]  __kasan_kmalloc+0xd4/0xd8
[   21.862821]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.863014]  kasan_atomics+0xb8/0x2e8
[   21.863308]  kunit_try_run_case+0x170/0x3f0
[   21.863661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.864174]  kthread+0x318/0x620
[   21.864472]  ret_from_fork+0x10/0x20
[   21.864778] 
[   21.864950] The buggy address belongs to the object at fff00000c66ea700
[   21.864950]  which belongs to the cache kmalloc-64 of size 64
[   21.865624] The buggy address is located 0 bytes to the right of
[   21.865624]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.866370] 
[   21.866499] The buggy address belongs to the physical page:
[   21.866872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.867329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.867732] page_type: f5(slab)
[   21.868065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.868433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.868830] page dumped because: kasan: bad access detected
[   21.869150] 
[   21.869278] Memory state around the buggy address:
[   21.869470]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.869895]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.870325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.870674]                                      ^
[   21.871008]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871402]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.871779] ==================================================================
[   21.905765] ==================================================================
[   21.906171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.906692] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.906934] 
[   21.907055] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.907152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.907185] Hardware name: linux,dummy-virt (DT)
[   21.907221] Call trace:
[   21.907248]  show_stack+0x20/0x38 (C)
[   21.907307]  dump_stack_lvl+0x8c/0xd0
[   21.907360]  print_report+0x118/0x608
[   21.907413]  kasan_report+0xdc/0x128
[   21.907464]  __asan_report_load8_noabort+0x20/0x30
[   21.907516]  kasan_atomics_helper+0x3f58/0x4858
[   21.907569]  kasan_atomics+0x198/0x2e8
[   21.907618]  kunit_try_run_case+0x170/0x3f0
[   21.907670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.907726]  kthread+0x318/0x620
[   21.907791]  ret_from_fork+0x10/0x20
[   21.907847] 
[   21.911552] Allocated by task 254:
[   21.911843]  kasan_save_stack+0x3c/0x68
[   21.912195]  kasan_save_track+0x20/0x40
[   21.912529]  kasan_save_alloc_info+0x40/0x58
[   21.912911]  __kasan_kmalloc+0xd4/0xd8
[   21.913217]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.913562]  kasan_atomics+0xb8/0x2e8
[   21.913887]  kunit_try_run_case+0x170/0x3f0
[   21.914162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.914571]  kthread+0x318/0x620
[   21.914869]  ret_from_fork+0x10/0x20
[   21.915174] 
[   21.915378] The buggy address belongs to the object at fff00000c66ea700
[   21.915378]  which belongs to the cache kmalloc-64 of size 64
[   21.915896] The buggy address is located 0 bytes to the right of
[   21.915896]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.916625] 
[   21.916771] The buggy address belongs to the physical page:
[   21.917051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.917408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.918005] page_type: f5(slab)
[   21.918246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.918799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.919438] page dumped because: kasan: bad access detected
[   21.919658] 
[   21.919811] Memory state around the buggy address:
[   21.920238]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.920687]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.921021] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.921587]                                      ^
[   21.922033]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.922400]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.922772] ==================================================================
[   22.144685] ==================================================================
[   22.145119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.145471] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.145777] 
[   22.145941] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.146034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.146082] Hardware name: linux,dummy-virt (DT)
[   22.146123] Call trace:
[   22.146153]  show_stack+0x20/0x38 (C)
[   22.146214]  dump_stack_lvl+0x8c/0xd0
[   22.146270]  print_report+0x118/0x608
[   22.146325]  kasan_report+0xdc/0x128
[   22.146375]  __asan_report_load8_noabort+0x20/0x30
[   22.146427]  kasan_atomics_helper+0x3f04/0x4858
[   22.146482]  kasan_atomics+0x198/0x2e8
[   22.146532]  kunit_try_run_case+0x170/0x3f0
[   22.146588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.146647]  kthread+0x318/0x620
[   22.146697]  ret_from_fork+0x10/0x20
[   22.146763] 
[   22.149578] Allocated by task 254:
[   22.149716]  kasan_save_stack+0x3c/0x68
[   22.149887]  kasan_save_track+0x20/0x40
[   22.150211]  kasan_save_alloc_info+0x40/0x58
[   22.150595]  __kasan_kmalloc+0xd4/0xd8
[   22.150844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.151017]  kasan_atomics+0xb8/0x2e8
[   22.151252]  kunit_try_run_case+0x170/0x3f0
[   22.151563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.151940]  kthread+0x318/0x620
[   22.152231]  ret_from_fork+0x10/0x20
[   22.152418] 
[   22.152517] The buggy address belongs to the object at fff00000c66ea700
[   22.152517]  which belongs to the cache kmalloc-64 of size 64
[   22.153055] The buggy address is located 0 bytes to the right of
[   22.153055]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.153634] 
[   22.153930] The buggy address belongs to the physical page:
[   22.154680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.154957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.155247] page_type: f5(slab)
[   22.155533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.155954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.156321] page dumped because: kasan: bad access detected
[   22.156576] 
[   22.156721] Memory state around the buggy address:
[   22.157090]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.157358]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.157598] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.157859]                                      ^
[   22.158060]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158343]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.158588] ==================================================================
[   21.421899] ==================================================================
[   21.422264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   21.422749] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.423612] 
[   21.424019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.424334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.424374] Hardware name: linux,dummy-virt (DT)
[   21.424413] Call trace:
[   21.424445]  show_stack+0x20/0x38 (C)
[   21.424511]  dump_stack_lvl+0x8c/0xd0
[   21.424565]  print_report+0x118/0x608
[   21.424619]  kasan_report+0xdc/0x128
[   21.424670]  kasan_check_range+0x100/0x1a8
[   21.424723]  __kasan_check_write+0x20/0x30
[   21.424797]  kasan_atomics_helper+0x47c/0x4858
[   21.424850]  kasan_atomics+0x198/0x2e8
[   21.424898]  kunit_try_run_case+0x170/0x3f0
[   21.424950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.425004]  kthread+0x318/0x620
[   21.425052]  ret_from_fork+0x10/0x20
[   21.425105] 
[   21.428607] Allocated by task 254:
[   21.428800]  kasan_save_stack+0x3c/0x68
[   21.429070]  kasan_save_track+0x20/0x40
[   21.429227]  kasan_save_alloc_info+0x40/0x58
[   21.429598]  __kasan_kmalloc+0xd4/0xd8
[   21.429866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.430205]  kasan_atomics+0xb8/0x2e8
[   21.430454]  kunit_try_run_case+0x170/0x3f0
[   21.430797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.431288]  kthread+0x318/0x620
[   21.431444]  ret_from_fork+0x10/0x20
[   21.431781] 
[   21.431921] The buggy address belongs to the object at fff00000c66ea700
[   21.431921]  which belongs to the cache kmalloc-64 of size 64
[   21.432508] The buggy address is located 0 bytes to the right of
[   21.432508]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.433111] 
[   21.433267] The buggy address belongs to the physical page:
[   21.433579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.433947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.434407] page_type: f5(slab)
[   21.434695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.435056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.435420] page dumped because: kasan: bad access detected
[   21.435635] 
[   21.435743] Memory state around the buggy address:
[   21.435959]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.436346]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.436644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.437285]                                      ^
[   21.437670]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.438125]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.438624] ==================================================================
[   21.941137] ==================================================================
[   21.941590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.942121] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.942467] 
[   21.942653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.942767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.942808] Hardware name: linux,dummy-virt (DT)
[   21.942869] Call trace:
[   21.942917]  show_stack+0x20/0x38 (C)
[   21.942981]  dump_stack_lvl+0x8c/0xd0
[   21.943039]  print_report+0x118/0x608
[   21.943092]  kasan_report+0xdc/0x128
[   21.943158]  __asan_report_store8_noabort+0x20/0x30
[   21.943223]  kasan_atomics_helper+0x3e5c/0x4858
[   21.943279]  kasan_atomics+0x198/0x2e8
[   21.943331]  kunit_try_run_case+0x170/0x3f0
[   21.943385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.943443]  kthread+0x318/0x620
[   21.943493]  ret_from_fork+0x10/0x20
[   21.943549] 
[   21.946664] Allocated by task 254:
[   21.947000]  kasan_save_stack+0x3c/0x68
[   21.947272]  kasan_save_track+0x20/0x40
[   21.947622]  kasan_save_alloc_info+0x40/0x58
[   21.947920]  __kasan_kmalloc+0xd4/0xd8
[   21.948215]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.948467]  kasan_atomics+0xb8/0x2e8
[   21.948716]  kunit_try_run_case+0x170/0x3f0
[   21.948978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949269]  kthread+0x318/0x620
[   21.949479]  ret_from_fork+0x10/0x20
[   21.949734] 
[   21.949946] The buggy address belongs to the object at fff00000c66ea700
[   21.949946]  which belongs to the cache kmalloc-64 of size 64
[   21.950495] The buggy address is located 0 bytes to the right of
[   21.950495]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.951023] 
[   21.951224] The buggy address belongs to the physical page:
[   21.951481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.951999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.952388] page_type: f5(slab)
[   21.952563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.953029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.953428] page dumped because: kasan: bad access detected
[   21.953713] 
[   21.953900] Memory state around the buggy address:
[   21.954199]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.954489]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.954909] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.955253]                                      ^
[   21.955462]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.955942]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956388] ==================================================================
[   22.385946] ==================================================================
[   22.386732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.387313] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.387891] 
[   22.388062] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.388165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.388199] Hardware name: linux,dummy-virt (DT)
[   22.388254] Call trace:
[   22.388286]  show_stack+0x20/0x38 (C)
[   22.388343]  dump_stack_lvl+0x8c/0xd0
[   22.388396]  print_report+0x118/0x608
[   22.388445]  kasan_report+0xdc/0x128
[   22.388494]  kasan_check_range+0x100/0x1a8
[   22.388544]  __kasan_check_write+0x20/0x30
[   22.388593]  kasan_atomics_helper+0x17ec/0x4858
[   22.388643]  kasan_atomics+0x198/0x2e8
[   22.388691]  kunit_try_run_case+0x170/0x3f0
[   22.388836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.389007]  kthread+0x318/0x620
[   22.389061]  ret_from_fork+0x10/0x20
[   22.389127] 
[   22.393852] Allocated by task 254:
[   22.394234]  kasan_save_stack+0x3c/0x68
[   22.394449]  kasan_save_track+0x20/0x40
[   22.394731]  kasan_save_alloc_info+0x40/0x58
[   22.394962]  __kasan_kmalloc+0xd4/0xd8
[   22.395539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.395807]  kasan_atomics+0xb8/0x2e8
[   22.396298]  kunit_try_run_case+0x170/0x3f0
[   22.396530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.397112]  kthread+0x318/0x620
[   22.397449]  ret_from_fork+0x10/0x20
[   22.397690] 
[   22.398031] The buggy address belongs to the object at fff00000c66ea700
[   22.398031]  which belongs to the cache kmalloc-64 of size 64
[   22.398878] The buggy address is located 0 bytes to the right of
[   22.398878]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.399653] 
[   22.400044] The buggy address belongs to the physical page:
[   22.400425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.401021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.401406] page_type: f5(slab)
[   22.401601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.402080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.402392] page dumped because: kasan: bad access detected
[   22.402601] 
[   22.402713] Memory state around the buggy address:
[   22.402917]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.403162]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.403398] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.403627]                                      ^
[   22.403913]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404393]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.404913] ==================================================================
[   22.037846] ==================================================================
[   22.038292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.038731] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.038978] 
[   22.039167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.039255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.039290] Hardware name: linux,dummy-virt (DT)
[   22.039327] Call trace:
[   22.039355]  show_stack+0x20/0x38 (C)
[   22.039410]  dump_stack_lvl+0x8c/0xd0
[   22.039459]  print_report+0x118/0x608
[   22.039510]  kasan_report+0xdc/0x128
[   22.039557]  kasan_check_range+0x100/0x1a8
[   22.039608]  __kasan_check_write+0x20/0x30
[   22.039655]  kasan_atomics_helper+0x10c0/0x4858
[   22.039709]  kasan_atomics+0x198/0x2e8
[   22.039770]  kunit_try_run_case+0x170/0x3f0
[   22.039823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039880]  kthread+0x318/0x620
[   22.039926]  ret_from_fork+0x10/0x20
[   22.039979] 
[   22.043056] Allocated by task 254:
[   22.043226]  kasan_save_stack+0x3c/0x68
[   22.043506]  kasan_save_track+0x20/0x40
[   22.043819]  kasan_save_alloc_info+0x40/0x58
[   22.044151]  __kasan_kmalloc+0xd4/0xd8
[   22.044314]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.044543]  kasan_atomics+0xb8/0x2e8
[   22.044692]  kunit_try_run_case+0x170/0x3f0
[   22.045022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.045365]  kthread+0x318/0x620
[   22.045507]  ret_from_fork+0x10/0x20
[   22.045746] 
[   22.045903] The buggy address belongs to the object at fff00000c66ea700
[   22.045903]  which belongs to the cache kmalloc-64 of size 64
[   22.046634] The buggy address is located 0 bytes to the right of
[   22.046634]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.047145] 
[   22.047324] The buggy address belongs to the physical page:
[   22.047604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.048002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.048338] page_type: f5(slab)
[   22.048527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.048938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.049206] page dumped because: kasan: bad access detected
[   22.049555] 
[   22.049744] Memory state around the buggy address:
[   22.049969]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050409]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.050747] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.051203]                                      ^
[   22.051406]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.051789]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.052028] ==================================================================
[   22.098977] ==================================================================
[   22.099258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.099681] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.099952] 
[   22.100135] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.100234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.100266] Hardware name: linux,dummy-virt (DT)
[   22.100304] Call trace:
[   22.100331]  show_stack+0x20/0x38 (C)
[   22.100388]  dump_stack_lvl+0x8c/0xd0
[   22.100440]  print_report+0x118/0x608
[   22.100493]  kasan_report+0xdc/0x128
[   22.100545]  kasan_check_range+0x100/0x1a8
[   22.100598]  __kasan_check_write+0x20/0x30
[   22.100649]  kasan_atomics_helper+0x126c/0x4858
[   22.100702]  kasan_atomics+0x198/0x2e8
[   22.100764]  kunit_try_run_case+0x170/0x3f0
[   22.100822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.100880]  kthread+0x318/0x620
[   22.100929]  ret_from_fork+0x10/0x20
[   22.100983] 
[   22.104022] Allocated by task 254:
[   22.104220]  kasan_save_stack+0x3c/0x68
[   22.104545]  kasan_save_track+0x20/0x40
[   22.104781]  kasan_save_alloc_info+0x40/0x58
[   22.104966]  __kasan_kmalloc+0xd4/0xd8
[   22.105127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.105506]  kasan_atomics+0xb8/0x2e8
[   22.105854]  kunit_try_run_case+0x170/0x3f0
[   22.106145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.106418]  kthread+0x318/0x620
[   22.106604]  ret_from_fork+0x10/0x20
[   22.106895] 
[   22.107085] The buggy address belongs to the object at fff00000c66ea700
[   22.107085]  which belongs to the cache kmalloc-64 of size 64
[   22.107432] The buggy address is located 0 bytes to the right of
[   22.107432]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.108136] 
[   22.108321] The buggy address belongs to the physical page:
[   22.108612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.109010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.109285] page_type: f5(slab)
[   22.109521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.110024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.110334] page dumped because: kasan: bad access detected
[   22.110705] 
[   22.110907] Memory state around the buggy address:
[   22.111136]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111486]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.111824] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.112171]                                      ^
[   22.112446]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112817]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.113172] ==================================================================
[   21.440353] ==================================================================
[   21.440842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   21.441308] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.441931] 
[   21.442124] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.442293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.442344] Hardware name: linux,dummy-virt (DT)
[   21.442389] Call trace:
[   21.442419]  show_stack+0x20/0x38 (C)
[   21.442491]  dump_stack_lvl+0x8c/0xd0
[   21.443320]  print_report+0x118/0x608
[   21.443379]  kasan_report+0xdc/0x128
[   21.443434]  kasan_check_range+0x100/0x1a8
[   21.443489]  __kasan_check_write+0x20/0x30
[   21.443543]  kasan_atomics_helper+0x4e4/0x4858
[   21.443597]  kasan_atomics+0x198/0x2e8
[   21.443649]  kunit_try_run_case+0x170/0x3f0
[   21.443706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.443782]  kthread+0x318/0x620
[   21.443835]  ret_from_fork+0x10/0x20
[   21.443891] 
[   21.447141] Allocated by task 254:
[   21.447632]  kasan_save_stack+0x3c/0x68
[   21.448047]  kasan_save_track+0x20/0x40
[   21.448316]  kasan_save_alloc_info+0x40/0x58
[   21.448692]  __kasan_kmalloc+0xd4/0xd8
[   21.448866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.449284]  kasan_atomics+0xb8/0x2e8
[   21.449657]  kunit_try_run_case+0x170/0x3f0
[   21.449966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.450386]  kthread+0x318/0x620
[   21.450666]  ret_from_fork+0x10/0x20
[   21.450989] 
[   21.451144] The buggy address belongs to the object at fff00000c66ea700
[   21.451144]  which belongs to the cache kmalloc-64 of size 64
[   21.451779] The buggy address is located 0 bytes to the right of
[   21.451779]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.452349] 
[   21.452516] The buggy address belongs to the physical page:
[   21.453052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.453323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.453614] page_type: f5(slab)
[   21.453847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.454267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.454854] page dumped because: kasan: bad access detected
[   21.455426] 
[   21.456206] Memory state around the buggy address:
[   21.456461]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.456908]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.457614] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.458135]                                      ^
[   21.458854]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.459324]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.460074] ==================================================================
[   21.975760] ==================================================================
[   21.976057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.976522] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.977048] 
[   21.977204] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.977410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.977447] Hardware name: linux,dummy-virt (DT)
[   21.977486] Call trace:
[   21.977517]  show_stack+0x20/0x38 (C)
[   21.977578]  dump_stack_lvl+0x8c/0xd0
[   21.977635]  print_report+0x118/0x608
[   21.977688]  kasan_report+0xdc/0x128
[   21.977761]  kasan_check_range+0x100/0x1a8
[   21.977824]  __kasan_check_write+0x20/0x30
[   21.977876]  kasan_atomics_helper+0xf20/0x4858
[   21.977932]  kasan_atomics+0x198/0x2e8
[   21.977984]  kunit_try_run_case+0x170/0x3f0
[   21.978040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.978114]  kthread+0x318/0x620
[   21.978169]  ret_from_fork+0x10/0x20
[   21.978229] 
[   21.981038] Allocated by task 254:
[   21.981363]  kasan_save_stack+0x3c/0x68
[   21.981717]  kasan_save_track+0x20/0x40
[   21.981985]  kasan_save_alloc_info+0x40/0x58
[   21.982272]  __kasan_kmalloc+0xd4/0xd8
[   21.982520]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.982829]  kasan_atomics+0xb8/0x2e8
[   21.983072]  kunit_try_run_case+0x170/0x3f0
[   21.983368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.983643]  kthread+0x318/0x620
[   21.983848]  ret_from_fork+0x10/0x20
[   21.984086] 
[   21.984192] The buggy address belongs to the object at fff00000c66ea700
[   21.984192]  which belongs to the cache kmalloc-64 of size 64
[   21.984517] The buggy address is located 0 bytes to the right of
[   21.984517]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.985427] 
[   21.985611] The buggy address belongs to the physical page:
[   21.985919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.986256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.986481] page_type: f5(slab)
[   21.986815] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.987435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.987818] page dumped because: kasan: bad access detected
[   21.988271] 
[   21.988401] Memory state around the buggy address:
[   21.988717]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.989117]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.989608] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.989980]                                      ^
[   21.990190]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.990612]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.991062] ==================================================================
[   21.766879] ==================================================================
[   21.767308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   21.767704] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.768006] 
[   21.768128] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.768225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.768261] Hardware name: linux,dummy-virt (DT)
[   21.768321] Call trace:
[   21.768351]  show_stack+0x20/0x38 (C)
[   21.768409]  dump_stack_lvl+0x8c/0xd0
[   21.768464]  print_report+0x118/0x608
[   21.768517]  kasan_report+0xdc/0x128
[   21.768595]  __asan_report_load4_noabort+0x20/0x30
[   21.768650]  kasan_atomics_helper+0x3dbc/0x4858
[   21.768707]  kasan_atomics+0x198/0x2e8
[   21.768770]  kunit_try_run_case+0x170/0x3f0
[   21.768830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.768889]  kthread+0x318/0x620
[   21.768942]  ret_from_fork+0x10/0x20
[   21.768998] 
[   21.772369] Allocated by task 254:
[   21.772574]  kasan_save_stack+0x3c/0x68
[   21.772829]  kasan_save_track+0x20/0x40
[   21.773073]  kasan_save_alloc_info+0x40/0x58
[   21.773377]  __kasan_kmalloc+0xd4/0xd8
[   21.773746]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.773983]  kasan_atomics+0xb8/0x2e8
[   21.774259]  kunit_try_run_case+0x170/0x3f0
[   21.774587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.774934]  kthread+0x318/0x620
[   21.775224]  ret_from_fork+0x10/0x20
[   21.775449] 
[   21.775632] The buggy address belongs to the object at fff00000c66ea700
[   21.775632]  which belongs to the cache kmalloc-64 of size 64
[   21.776190] The buggy address is located 0 bytes to the right of
[   21.776190]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.776836] 
[   21.777009] The buggy address belongs to the physical page:
[   21.777346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.777706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.778130] page_type: f5(slab)
[   21.778318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.778804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.779098] page dumped because: kasan: bad access detected
[   21.779470] 
[   21.779602] Memory state around the buggy address:
[   21.779923]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.780230]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.780681] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.781077]                                      ^
[   21.781331]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.781760]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.782113] ==================================================================
[   21.783206] ==================================================================
[   21.783631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   21.784359] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.784777] 
[   21.785011] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.785113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.785169] Hardware name: linux,dummy-virt (DT)
[   21.785208] Call trace:
[   21.785238]  show_stack+0x20/0x38 (C)
[   21.785296]  dump_stack_lvl+0x8c/0xd0
[   21.785353]  print_report+0x118/0x608
[   21.785408]  kasan_report+0xdc/0x128
[   21.785463]  kasan_check_range+0x100/0x1a8
[   21.785545]  __kasan_check_write+0x20/0x30
[   21.785602]  kasan_atomics_helper+0xc08/0x4858
[   21.785680]  kasan_atomics+0x198/0x2e8
[   21.785751]  kunit_try_run_case+0x170/0x3f0
[   21.785812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.785874]  kthread+0x318/0x620
[   21.785927]  ret_from_fork+0x10/0x20
[   21.785982] 
[   21.789512] Allocated by task 254:
[   21.789716]  kasan_save_stack+0x3c/0x68
[   21.790033]  kasan_save_track+0x20/0x40
[   21.790377]  kasan_save_alloc_info+0x40/0x58
[   21.790669]  __kasan_kmalloc+0xd4/0xd8
[   21.791013]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.791435]  kasan_atomics+0xb8/0x2e8
[   21.791604]  kunit_try_run_case+0x170/0x3f0
[   21.791926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.792398]  kthread+0x318/0x620
[   21.792600]  ret_from_fork+0x10/0x20
[   21.792933] 
[   21.793075] The buggy address belongs to the object at fff00000c66ea700
[   21.793075]  which belongs to the cache kmalloc-64 of size 64
[   21.793635] The buggy address is located 0 bytes to the right of
[   21.793635]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.794436] 
[   21.794665] The buggy address belongs to the physical page:
[   21.795013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.795578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.796023] page_type: f5(slab)
[   21.796318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.796814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.797276] page dumped because: kasan: bad access detected
[   21.797645] 
[   21.797866] Memory state around the buggy address:
[   21.798197]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.798520]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.798921] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.799368]                                      ^
[   21.799583]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.800062]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.800462] ==================================================================
[   22.114354] ==================================================================
[   22.114732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.115256] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.115668] 
[   22.115869] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.115968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.116002] Hardware name: linux,dummy-virt (DT)
[   22.116041] Call trace:
[   22.116068]  show_stack+0x20/0x38 (C)
[   22.116127]  dump_stack_lvl+0x8c/0xd0
[   22.116180]  print_report+0x118/0x608
[   22.116234]  kasan_report+0xdc/0x128
[   22.116288]  kasan_check_range+0x100/0x1a8
[   22.116342]  __kasan_check_write+0x20/0x30
[   22.116394]  kasan_atomics_helper+0x12d8/0x4858
[   22.116449]  kasan_atomics+0x198/0x2e8
[   22.116499]  kunit_try_run_case+0x170/0x3f0
[   22.116553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.116611]  kthread+0x318/0x620
[   22.116660]  ret_from_fork+0x10/0x20
[   22.116715] 
[   22.119672] Allocated by task 254:
[   22.119850]  kasan_save_stack+0x3c/0x68
[   22.120020]  kasan_save_track+0x20/0x40
[   22.120242]  kasan_save_alloc_info+0x40/0x58
[   22.120606]  __kasan_kmalloc+0xd4/0xd8
[   22.120895]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.121193]  kasan_atomics+0xb8/0x2e8
[   22.121483]  kunit_try_run_case+0x170/0x3f0
[   22.121698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.121967]  kthread+0x318/0x620
[   22.122286]  ret_from_fork+0x10/0x20
[   22.122531] 
[   22.122697] The buggy address belongs to the object at fff00000c66ea700
[   22.122697]  which belongs to the cache kmalloc-64 of size 64
[   22.123267] The buggy address is located 0 bytes to the right of
[   22.123267]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.123802] 
[   22.123958] The buggy address belongs to the physical page:
[   22.124142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.124719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.125208] page_type: f5(slab)
[   22.125460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.125788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.126139] page dumped because: kasan: bad access detected
[   22.126329] 
[   22.126499] Memory state around the buggy address:
[   22.126827]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.127254]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.127551] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.127844]                                      ^
[   22.128207]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128526]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128838] ==================================================================
[   22.007856] ==================================================================
[   22.008234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.008487] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.008978] 
[   22.009130] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.009231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.009269] Hardware name: linux,dummy-virt (DT)
[   22.009329] Call trace:
[   22.009360]  show_stack+0x20/0x38 (C)
[   22.009420]  dump_stack_lvl+0x8c/0xd0
[   22.009495]  print_report+0x118/0x608
[   22.009553]  kasan_report+0xdc/0x128
[   22.009607]  kasan_check_range+0x100/0x1a8
[   22.009663]  __kasan_check_write+0x20/0x30
[   22.009715]  kasan_atomics_helper+0xff0/0x4858
[   22.009791]  kasan_atomics+0x198/0x2e8
[   22.009846]  kunit_try_run_case+0x170/0x3f0
[   22.009900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009957]  kthread+0x318/0x620
[   22.010009]  ret_from_fork+0x10/0x20
[   22.010070] 
[   22.012544] Allocated by task 254:
[   22.012815]  kasan_save_stack+0x3c/0x68
[   22.013142]  kasan_save_track+0x20/0x40
[   22.013400]  kasan_save_alloc_info+0x40/0x58
[   22.013699]  __kasan_kmalloc+0xd4/0xd8
[   22.013951]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.014190]  kasan_atomics+0xb8/0x2e8
[   22.014429]  kunit_try_run_case+0x170/0x3f0
[   22.014605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.015040]  kthread+0x318/0x620
[   22.015309]  ret_from_fork+0x10/0x20
[   22.015514] 
[   22.015681] The buggy address belongs to the object at fff00000c66ea700
[   22.015681]  which belongs to the cache kmalloc-64 of size 64
[   22.016156] The buggy address is located 0 bytes to the right of
[   22.016156]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.016658] 
[   22.016832] The buggy address belongs to the physical page:
[   22.017068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.017521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.017777] page_type: f5(slab)
[   22.018082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.018524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.018924] page dumped because: kasan: bad access detected
[   22.019187] 
[   22.019346] Memory state around the buggy address:
[   22.019585]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.019935]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.020268] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.020566]                                      ^
[   22.020867]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.021214]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.021596] ==================================================================
[   21.620657] ==================================================================
[   21.621090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.621649] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.622101] 
[   21.622272] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.622443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.622908] Hardware name: linux,dummy-virt (DT)
[   21.622966] Call trace:
[   21.622997]  show_stack+0x20/0x38 (C)
[   21.623071]  dump_stack_lvl+0x8c/0xd0
[   21.623129]  print_report+0x118/0x608
[   21.623186]  kasan_report+0xdc/0x128
[   21.623239]  __asan_report_load4_noabort+0x20/0x30
[   21.623297]  kasan_atomics_helper+0x42d8/0x4858
[   21.623356]  kasan_atomics+0x198/0x2e8
[   21.623409]  kunit_try_run_case+0x170/0x3f0
[   21.623468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.623529]  kthread+0x318/0x620
[   21.623582]  ret_from_fork+0x10/0x20
[   21.623642] 
[   21.628502] Allocated by task 254:
[   21.628922]  kasan_save_stack+0x3c/0x68
[   21.629220]  kasan_save_track+0x20/0x40
[   21.629611]  kasan_save_alloc_info+0x40/0x58
[   21.629953]  __kasan_kmalloc+0xd4/0xd8
[   21.630211]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.630932]  kasan_atomics+0xb8/0x2e8
[   21.631350]  kunit_try_run_case+0x170/0x3f0
[   21.631701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.632100]  kthread+0x318/0x620
[   21.632333]  ret_from_fork+0x10/0x20
[   21.632586] 
[   21.632725] The buggy address belongs to the object at fff00000c66ea700
[   21.632725]  which belongs to the cache kmalloc-64 of size 64
[   21.633218] The buggy address is located 0 bytes to the right of
[   21.633218]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.633591] 
[   21.633819] The buggy address belongs to the physical page:
[   21.634201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.634841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.635192] page_type: f5(slab)
[   21.635504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.636010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.636505] page dumped because: kasan: bad access detected
[   21.636827] 
[   21.637003] Memory state around the buggy address:
[   21.637224]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.637712]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.638104] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.638569]                                      ^
[   21.638955]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.639279]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.639810] ==================================================================
[   21.266320] ==================================================================
[   21.267106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   21.267416] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.267664] 
[   21.267818] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.267928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267960] Hardware name: linux,dummy-virt (DT)
[   21.267999] Call trace:
[   21.268027]  show_stack+0x20/0x38 (C)
[   21.268090]  dump_stack_lvl+0x8c/0xd0
[   21.268143]  print_report+0x118/0x608
[   21.268198]  kasan_report+0xdc/0x128
[   21.268255]  __asan_report_store4_noabort+0x20/0x30
[   21.268313]  kasan_atomics_helper+0x3f7c/0x4858
[   21.268369]  kasan_atomics+0x198/0x2e8
[   21.268425]  kunit_try_run_case+0x170/0x3f0
[   21.268482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.268540]  kthread+0x318/0x620
[   21.268594]  ret_from_fork+0x10/0x20
[   21.268651] 
[   21.273157] Allocated by task 254:
[   21.273421]  kasan_save_stack+0x3c/0x68
[   21.273636]  kasan_save_track+0x20/0x40
[   21.273924]  kasan_save_alloc_info+0x40/0x58
[   21.274189]  __kasan_kmalloc+0xd4/0xd8
[   21.274642]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.274884]  kasan_atomics+0xb8/0x2e8
[   21.275195]  kunit_try_run_case+0x170/0x3f0
[   21.275384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.275714]  kthread+0x318/0x620
[   21.275972]  ret_from_fork+0x10/0x20
[   21.276205] 
[   21.276319] The buggy address belongs to the object at fff00000c66ea700
[   21.276319]  which belongs to the cache kmalloc-64 of size 64
[   21.277149] The buggy address is located 0 bytes to the right of
[   21.277149]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.277658] 
[   21.277784] The buggy address belongs to the physical page:
[   21.278228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.278875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.279242] page_type: f5(slab)
[   21.279497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.279898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.280253] page dumped because: kasan: bad access detected
[   21.280609] 
[   21.280789] Memory state around the buggy address:
[   21.281018]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.281474]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.281874] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.282246]                                      ^
[   21.282660]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283006]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283430] ==================================================================
[   21.696546] ==================================================================
[   21.696853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.697413] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.697804] 
[   21.698014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.698140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.698179] Hardware name: linux,dummy-virt (DT)
[   21.698219] Call trace:
[   21.698249]  show_stack+0x20/0x38 (C)
[   21.698308]  dump_stack_lvl+0x8c/0xd0
[   21.698363]  print_report+0x118/0x608
[   21.698435]  kasan_report+0xdc/0x128
[   21.698520]  kasan_check_range+0x100/0x1a8
[   21.698581]  __kasan_check_write+0x20/0x30
[   21.698633]  kasan_atomics_helper+0xa6c/0x4858
[   21.698690]  kasan_atomics+0x198/0x2e8
[   21.698759]  kunit_try_run_case+0x170/0x3f0
[   21.698820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.698880]  kthread+0x318/0x620
[   21.698932]  ret_from_fork+0x10/0x20
[   21.698990] 
[   21.702289] Allocated by task 254:
[   21.702578]  kasan_save_stack+0x3c/0x68
[   21.702874]  kasan_save_track+0x20/0x40
[   21.703196]  kasan_save_alloc_info+0x40/0x58
[   21.703489]  __kasan_kmalloc+0xd4/0xd8
[   21.703762]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.704056]  kasan_atomics+0xb8/0x2e8
[   21.704408]  kunit_try_run_case+0x170/0x3f0
[   21.704801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.705242]  kthread+0x318/0x620
[   21.705477]  ret_from_fork+0x10/0x20
[   21.705782] 
[   21.705948] The buggy address belongs to the object at fff00000c66ea700
[   21.705948]  which belongs to the cache kmalloc-64 of size 64
[   21.706610] The buggy address is located 0 bytes to the right of
[   21.706610]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.707266] 
[   21.707464] The buggy address belongs to the physical page:
[   21.707760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.708184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.708636] page_type: f5(slab)
[   21.708863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.709302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.709775] page dumped because: kasan: bad access detected
[   21.710075] 
[   21.710281] Memory state around the buggy address:
[   21.710531]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.710974]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.711403] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.711796]                                      ^
[   21.712083]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.712445]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.712879] ==================================================================
[   22.233826] ==================================================================
[   22.234178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.234528] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.234847] 
[   22.234968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.235066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.235102] Hardware name: linux,dummy-virt (DT)
[   22.235138] Call trace:
[   22.235168]  show_stack+0x20/0x38 (C)
[   22.235226]  dump_stack_lvl+0x8c/0xd0
[   22.235281]  print_report+0x118/0x608
[   22.235337]  kasan_report+0xdc/0x128
[   22.235386]  kasan_check_range+0x100/0x1a8
[   22.235438]  __kasan_check_write+0x20/0x30
[   22.235484]  kasan_atomics_helper+0x15b4/0x4858
[   22.235537]  kasan_atomics+0x198/0x2e8
[   22.235587]  kunit_try_run_case+0x170/0x3f0
[   22.235637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.235694]  kthread+0x318/0x620
[   22.235757]  ret_from_fork+0x10/0x20
[   22.235817] 
[   22.238864] Allocated by task 254:
[   22.239171]  kasan_save_stack+0x3c/0x68
[   22.239438]  kasan_save_track+0x20/0x40
[   22.239692]  kasan_save_alloc_info+0x40/0x58
[   22.239938]  __kasan_kmalloc+0xd4/0xd8
[   22.240103]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.240465]  kasan_atomics+0xb8/0x2e8
[   22.240772]  kunit_try_run_case+0x170/0x3f0
[   22.240986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.241273]  kthread+0x318/0x620
[   22.241523]  ret_from_fork+0x10/0x20
[   22.241717] 
[   22.241907] The buggy address belongs to the object at fff00000c66ea700
[   22.241907]  which belongs to the cache kmalloc-64 of size 64
[   22.242368] The buggy address is located 0 bytes to the right of
[   22.242368]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.243411] 
[   22.243589] The buggy address belongs to the physical page:
[   22.243785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.244038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.244259] page_type: f5(slab)
[   22.244418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.244656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.245097] page dumped because: kasan: bad access detected
[   22.245428] 
[   22.245572] Memory state around the buggy address:
[   22.245875]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.246534]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.246945] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.247229]                                      ^
[   22.247462]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.247721]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.248009] ==================================================================
[   22.052848] ==================================================================
[   22.053259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.053657] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.053983] 
[   22.054165] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.054262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.054296] Hardware name: linux,dummy-virt (DT)
[   22.054333] Call trace:
[   22.054360]  show_stack+0x20/0x38 (C)
[   22.054417]  dump_stack_lvl+0x8c/0xd0
[   22.054501]  print_report+0x118/0x608
[   22.054558]  kasan_report+0xdc/0x128
[   22.054611]  kasan_check_range+0x100/0x1a8
[   22.054664]  __kasan_check_write+0x20/0x30
[   22.054715]  kasan_atomics_helper+0x1128/0x4858
[   22.054790]  kasan_atomics+0x198/0x2e8
[   22.054843]  kunit_try_run_case+0x170/0x3f0
[   22.054896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.054954]  kthread+0x318/0x620
[   22.054999]  ret_from_fork+0x10/0x20
[   22.055049] 
[   22.057650] Allocated by task 254:
[   22.057891]  kasan_save_stack+0x3c/0x68
[   22.058112]  kasan_save_track+0x20/0x40
[   22.058365]  kasan_save_alloc_info+0x40/0x58
[   22.058623]  __kasan_kmalloc+0xd4/0xd8
[   22.058856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.059031]  kasan_atomics+0xb8/0x2e8
[   22.059188]  kunit_try_run_case+0x170/0x3f0
[   22.059534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.059977]  kthread+0x318/0x620
[   22.060145]  ret_from_fork+0x10/0x20
[   22.060309] 
[   22.060413] The buggy address belongs to the object at fff00000c66ea700
[   22.060413]  which belongs to the cache kmalloc-64 of size 64
[   22.061515] The buggy address is located 0 bytes to the right of
[   22.061515]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.061922] 
[   22.062203] The buggy address belongs to the physical page:
[   22.062619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.062950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.063190] page_type: f5(slab)
[   22.063357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.063624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.064226] page dumped because: kasan: bad access detected
[   22.064417] 
[   22.064655] Memory state around the buggy address:
[   22.065053]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.065403]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.065629] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.066124]                                      ^
[   22.066456]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.066827]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.067191] ==================================================================
[   21.872534] ==================================================================
[   21.872964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.873392] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.873751] 
[   21.873920] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.874016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.874049] Hardware name: linux,dummy-virt (DT)
[   21.874096] Call trace:
[   21.874128]  show_stack+0x20/0x38 (C)
[   21.874190]  dump_stack_lvl+0x8c/0xd0
[   21.874250]  print_report+0x118/0x608
[   21.874305]  kasan_report+0xdc/0x128
[   21.874359]  __asan_report_load4_noabort+0x20/0x30
[   21.874413]  kasan_atomics_helper+0x3e04/0x4858
[   21.874471]  kasan_atomics+0x198/0x2e8
[   21.874545]  kunit_try_run_case+0x170/0x3f0
[   21.874606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.874663]  kthread+0x318/0x620
[   21.874711]  ret_from_fork+0x10/0x20
[   21.874776] 
[   21.877316] Allocated by task 254:
[   21.877620]  kasan_save_stack+0x3c/0x68
[   21.877880]  kasan_save_track+0x20/0x40
[   21.878127]  kasan_save_alloc_info+0x40/0x58
[   21.878426]  __kasan_kmalloc+0xd4/0xd8
[   21.878648]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.879036]  kasan_atomics+0xb8/0x2e8
[   21.879291]  kunit_try_run_case+0x170/0x3f0
[   21.879547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.879774]  kthread+0x318/0x620
[   21.880039]  ret_from_fork+0x10/0x20
[   21.880285] 
[   21.880385] The buggy address belongs to the object at fff00000c66ea700
[   21.880385]  which belongs to the cache kmalloc-64 of size 64
[   21.881118] The buggy address is located 0 bytes to the right of
[   21.881118]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.881693] 
[   21.881886] The buggy address belongs to the physical page:
[   21.882143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.882560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.882917] page_type: f5(slab)
[   21.883153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.883464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.884015] page dumped because: kasan: bad access detected
[   21.884394] 
[   21.884529] Memory state around the buggy address:
[   21.884711]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.885171]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.885506] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.885900]                                      ^
[   21.886160]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886475]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886986] ==================================================================
[   21.801308] ==================================================================
[   21.801702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   21.802299] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.802694] 
[   21.802866] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.802967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.803003] Hardware name: linux,dummy-virt (DT)
[   21.803062] Call trace:
[   21.803095]  show_stack+0x20/0x38 (C)
[   21.803164]  dump_stack_lvl+0x8c/0xd0
[   21.803222]  print_report+0x118/0x608
[   21.803276]  kasan_report+0xdc/0x128
[   21.803331]  __asan_report_load4_noabort+0x20/0x30
[   21.803386]  kasan_atomics_helper+0x3de4/0x4858
[   21.803442]  kasan_atomics+0x198/0x2e8
[   21.803495]  kunit_try_run_case+0x170/0x3f0
[   21.803552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.803611]  kthread+0x318/0x620
[   21.803662]  ret_from_fork+0x10/0x20
[   21.803716] 
[   21.807920] Allocated by task 254:
[   21.808103]  kasan_save_stack+0x3c/0x68
[   21.808702]  kasan_save_track+0x20/0x40
[   21.809116]  kasan_save_alloc_info+0x40/0x58
[   21.809398]  __kasan_kmalloc+0xd4/0xd8
[   21.809751]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.810104]  kasan_atomics+0xb8/0x2e8
[   21.810282]  kunit_try_run_case+0x170/0x3f0
[   21.810461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.810665]  kthread+0x318/0x620
[   21.810935]  ret_from_fork+0x10/0x20
[   21.811481] 
[   21.811596] The buggy address belongs to the object at fff00000c66ea700
[   21.811596]  which belongs to the cache kmalloc-64 of size 64
[   21.812017] The buggy address is located 0 bytes to the right of
[   21.812017]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.812373] 
[   21.812480] The buggy address belongs to the physical page:
[   21.812672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.813873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.814428] page_type: f5(slab)
[   21.814807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.815359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.815870] page dumped because: kasan: bad access detected
[   21.816163] 
[   21.816317] Memory state around the buggy address:
[   21.816592]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.816924]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.817358] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.817776]                                      ^
[   21.818092]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.818585]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819081] ==================================================================
[   21.582392] ==================================================================
[   21.583587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   21.583893] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.584341] 
[   21.584551] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.584654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.584689] Hardware name: linux,dummy-virt (DT)
[   21.584729] Call trace:
[   21.584772]  show_stack+0x20/0x38 (C)
[   21.584834]  dump_stack_lvl+0x8c/0xd0
[   21.584887]  print_report+0x118/0x608
[   21.584937]  kasan_report+0xdc/0x128
[   21.584986]  kasan_check_range+0x100/0x1a8
[   21.585037]  __kasan_check_write+0x20/0x30
[   21.585086]  kasan_atomics_helper+0x7cc/0x4858
[   21.585137]  kasan_atomics+0x198/0x2e8
[   21.585186]  kunit_try_run_case+0x170/0x3f0
[   21.585237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.585291]  kthread+0x318/0x620
[   21.585338]  ret_from_fork+0x10/0x20
[   21.585389] 
[   21.589276] Allocated by task 254:
[   21.589595]  kasan_save_stack+0x3c/0x68
[   21.589974]  kasan_save_track+0x20/0x40
[   21.590313]  kasan_save_alloc_info+0x40/0x58
[   21.590735]  __kasan_kmalloc+0xd4/0xd8
[   21.591178]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.591528]  kasan_atomics+0xb8/0x2e8
[   21.591794]  kunit_try_run_case+0x170/0x3f0
[   21.591967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.592384]  kthread+0x318/0x620
[   21.592614]  ret_from_fork+0x10/0x20
[   21.592910] 
[   21.593047] The buggy address belongs to the object at fff00000c66ea700
[   21.593047]  which belongs to the cache kmalloc-64 of size 64
[   21.593672] The buggy address is located 0 bytes to the right of
[   21.593672]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.594408] 
[   21.594690] The buggy address belongs to the physical page:
[   21.595147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.595600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.595987] page_type: f5(slab)
[   21.596176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.596528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.596995] page dumped because: kasan: bad access detected
[   21.597252] 
[   21.597360] Memory state around the buggy address:
[   21.597708]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.598052]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.598558] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.599172]                                      ^
[   21.599503]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.599834]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.600616] ==================================================================
[   21.523038] ==================================================================
[   21.523405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   21.523785] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.524363] 
[   21.524550] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.524651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.524685] Hardware name: linux,dummy-virt (DT)
[   21.524726] Call trace:
[   21.524769]  show_stack+0x20/0x38 (C)
[   21.524828]  dump_stack_lvl+0x8c/0xd0
[   21.524885]  print_report+0x118/0x608
[   21.524938]  kasan_report+0xdc/0x128
[   21.524990]  kasan_check_range+0x100/0x1a8
[   21.525044]  __kasan_check_write+0x20/0x30
[   21.525095]  kasan_atomics_helper+0x684/0x4858
[   21.525149]  kasan_atomics+0x198/0x2e8
[   21.525200]  kunit_try_run_case+0x170/0x3f0
[   21.525254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.525310]  kthread+0x318/0x620
[   21.525359]  ret_from_fork+0x10/0x20
[   21.525415] 
[   21.529963] Allocated by task 254:
[   21.530202]  kasan_save_stack+0x3c/0x68
[   21.530846]  kasan_save_track+0x20/0x40
[   21.531100]  kasan_save_alloc_info+0x40/0x58
[   21.531383]  __kasan_kmalloc+0xd4/0xd8
[   21.531734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.532093]  kasan_atomics+0xb8/0x2e8
[   21.532343]  kunit_try_run_case+0x170/0x3f0
[   21.532522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.532785]  kthread+0x318/0x620
[   21.533228]  ret_from_fork+0x10/0x20
[   21.533526] 
[   21.533643] The buggy address belongs to the object at fff00000c66ea700
[   21.533643]  which belongs to the cache kmalloc-64 of size 64
[   21.534286] The buggy address is located 0 bytes to the right of
[   21.534286]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.535049] 
[   21.535328] The buggy address belongs to the physical page:
[   21.535588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.535987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.536343] page_type: f5(slab)
[   21.536575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.537325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.537710] page dumped because: kasan: bad access detected
[   21.538118] 
[   21.538323] Memory state around the buggy address:
[   21.538839]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.539373]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.539669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.539940]                                      ^
[   21.540149]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540417]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.540676] ==================================================================
[   21.640672] ==================================================================
[   21.641166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   21.641643] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.642164] 
[   21.642416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.642573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.642612] Hardware name: linux,dummy-virt (DT)
[   21.642671] Call trace:
[   21.642701]  show_stack+0x20/0x38 (C)
[   21.642807]  dump_stack_lvl+0x8c/0xd0
[   21.642881]  print_report+0x118/0x608
[   21.642938]  kasan_report+0xdc/0x128
[   21.642993]  kasan_check_range+0x100/0x1a8
[   21.643051]  __kasan_check_write+0x20/0x30
[   21.643104]  kasan_atomics_helper+0x934/0x4858
[   21.643162]  kasan_atomics+0x198/0x2e8
[   21.643215]  kunit_try_run_case+0x170/0x3f0
[   21.643269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.643327]  kthread+0x318/0x620
[   21.643379]  ret_from_fork+0x10/0x20
[   21.643438] 
[   21.647045] Allocated by task 254:
[   21.647349]  kasan_save_stack+0x3c/0x68
[   21.647722]  kasan_save_track+0x20/0x40
[   21.648340]  kasan_save_alloc_info+0x40/0x58
[   21.648732]  __kasan_kmalloc+0xd4/0xd8
[   21.648977]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.649296]  kasan_atomics+0xb8/0x2e8
[   21.649539]  kunit_try_run_case+0x170/0x3f0
[   21.649818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.650262]  kthread+0x318/0x620
[   21.650620]  ret_from_fork+0x10/0x20
[   21.650888] 
[   21.651075] The buggy address belongs to the object at fff00000c66ea700
[   21.651075]  which belongs to the cache kmalloc-64 of size 64
[   21.651780] The buggy address is located 0 bytes to the right of
[   21.651780]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.652462] 
[   21.652669] The buggy address belongs to the physical page:
[   21.653038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.653505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.654027] page_type: f5(slab)
[   21.654277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.654829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.655282] page dumped because: kasan: bad access detected
[   21.655555] 
[   21.655703] Memory state around the buggy address:
[   21.656087]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.656464]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.656966] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.657378]                                      ^
[   21.657557]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.658030]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.658375] ==================================================================
[   21.501911] ==================================================================
[   21.502247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   21.502561] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.503202] 
[   21.503621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.503926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.503965] Hardware name: linux,dummy-virt (DT)
[   21.504004] Call trace:
[   21.504037]  show_stack+0x20/0x38 (C)
[   21.504101]  dump_stack_lvl+0x8c/0xd0
[   21.504338]  print_report+0x118/0x608
[   21.504406]  kasan_report+0xdc/0x128
[   21.504462]  kasan_check_range+0x100/0x1a8
[   21.504549]  __kasan_check_write+0x20/0x30
[   21.504606]  kasan_atomics_helper+0x61c/0x4858
[   21.504679]  kasan_atomics+0x198/0x2e8
[   21.504734]  kunit_try_run_case+0x170/0x3f0
[   21.504811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.504870]  kthread+0x318/0x620
[   21.504922]  ret_from_fork+0x10/0x20
[   21.504978] 
[   21.509106] Allocated by task 254:
[   21.509587]  kasan_save_stack+0x3c/0x68
[   21.509852]  kasan_save_track+0x20/0x40
[   21.510268]  kasan_save_alloc_info+0x40/0x58
[   21.510667]  __kasan_kmalloc+0xd4/0xd8
[   21.510998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.511264]  kasan_atomics+0xb8/0x2e8
[   21.511628]  kunit_try_run_case+0x170/0x3f0
[   21.512027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.512320]  kthread+0x318/0x620
[   21.512696]  ret_from_fork+0x10/0x20
[   21.513022] 
[   21.513224] The buggy address belongs to the object at fff00000c66ea700
[   21.513224]  which belongs to the cache kmalloc-64 of size 64
[   21.514147] The buggy address is located 0 bytes to the right of
[   21.514147]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.515466] 
[   21.515608] The buggy address belongs to the physical page:
[   21.515841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.516441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.516896] page_type: f5(slab)
[   21.517197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.517782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.518300] page dumped because: kasan: bad access detected
[   21.518640] 
[   21.518803] Memory state around the buggy address:
[   21.519007]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.519348]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.520122] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.520358]                                      ^
[   21.520539]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521119]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.521579] ==================================================================
[   22.311616] ==================================================================
[   22.312048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.312666] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.313012] 
[   22.313227] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.313329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.313366] Hardware name: linux,dummy-virt (DT)
[   22.313406] Call trace:
[   22.313435]  show_stack+0x20/0x38 (C)
[   22.313495]  dump_stack_lvl+0x8c/0xd0
[   22.313551]  print_report+0x118/0x608
[   22.313603]  kasan_report+0xdc/0x128
[   22.313655]  kasan_check_range+0x100/0x1a8
[   22.313710]  __kasan_check_write+0x20/0x30
[   22.314081]  kasan_atomics_helper+0x16d0/0x4858
[   22.314146]  kasan_atomics+0x198/0x2e8
[   22.314203]  kunit_try_run_case+0x170/0x3f0
[   22.314259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.314320]  kthread+0x318/0x620
[   22.314375]  ret_from_fork+0x10/0x20
[   22.314434] 
[   22.317917] Allocated by task 254:
[   22.318301]  kasan_save_stack+0x3c/0x68
[   22.318624]  kasan_save_track+0x20/0x40
[   22.318856]  kasan_save_alloc_info+0x40/0x58
[   22.319263]  __kasan_kmalloc+0xd4/0xd8
[   22.319535]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.319933]  kasan_atomics+0xb8/0x2e8
[   22.320267]  kunit_try_run_case+0x170/0x3f0
[   22.320539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.320802]  kthread+0x318/0x620
[   22.321046]  ret_from_fork+0x10/0x20
[   22.321309] 
[   22.321453] The buggy address belongs to the object at fff00000c66ea700
[   22.321453]  which belongs to the cache kmalloc-64 of size 64
[   22.322070] The buggy address is located 0 bytes to the right of
[   22.322070]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.322450] 
[   22.322653] The buggy address belongs to the physical page:
[   22.323159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.323768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.324138] page_type: f5(slab)
[   22.324371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.324827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.325280] page dumped because: kasan: bad access detected
[   22.325597] 
[   22.325772] Memory state around the buggy address:
[   22.326031]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.326468]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.326866] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.327278]                                      ^
[   22.327604]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328042]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328403] ==================================================================
[   22.346099] ==================================================================
[   22.346420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.346998] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.347724] 
[   22.347877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.347977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.348011] Hardware name: linux,dummy-virt (DT)
[   22.348071] Call trace:
[   22.348110]  show_stack+0x20/0x38 (C)
[   22.348172]  dump_stack_lvl+0x8c/0xd0
[   22.348225]  print_report+0x118/0x608
[   22.348278]  kasan_report+0xdc/0x128
[   22.348328]  kasan_check_range+0x100/0x1a8
[   22.348384]  __kasan_check_write+0x20/0x30
[   22.348433]  kasan_atomics_helper+0x175c/0x4858
[   22.348487]  kasan_atomics+0x198/0x2e8
[   22.348537]  kunit_try_run_case+0x170/0x3f0
[   22.348591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.348648]  kthread+0x318/0x620
[   22.348698]  ret_from_fork+0x10/0x20
[   22.348766] 
[   22.352045] Allocated by task 254:
[   22.352389]  kasan_save_stack+0x3c/0x68
[   22.352761]  kasan_save_track+0x20/0x40
[   22.352969]  kasan_save_alloc_info+0x40/0x58
[   22.353331]  __kasan_kmalloc+0xd4/0xd8
[   22.353622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.353889]  kasan_atomics+0xb8/0x2e8
[   22.354166]  kunit_try_run_case+0x170/0x3f0
[   22.354505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.354911]  kthread+0x318/0x620
[   22.355232]  ret_from_fork+0x10/0x20
[   22.355456] 
[   22.355645] The buggy address belongs to the object at fff00000c66ea700
[   22.355645]  which belongs to the cache kmalloc-64 of size 64
[   22.356086] The buggy address is located 0 bytes to the right of
[   22.356086]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.356811] 
[   22.357012] The buggy address belongs to the physical page:
[   22.357328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.357719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.358158] page_type: f5(slab)
[   22.358379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.358823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.359220] page dumped because: kasan: bad access detected
[   22.359497] 
[   22.359660] Memory state around the buggy address:
[   22.359935]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.360336]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.360712] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.361028]                                      ^
[   22.361212]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.361801]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.362083] ==================================================================
[   22.363643] ==================================================================
[   22.364322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.365138] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.366049] 
[   22.366431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.366668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.366706] Hardware name: linux,dummy-virt (DT)
[   22.366769] Call trace:
[   22.366803]  show_stack+0x20/0x38 (C)
[   22.366869]  dump_stack_lvl+0x8c/0xd0
[   22.366927]  print_report+0x118/0x608
[   22.366985]  kasan_report+0xdc/0x128
[   22.367039]  __asan_report_load8_noabort+0x20/0x30
[   22.367098]  kasan_atomics_helper+0x3e20/0x4858
[   22.367155]  kasan_atomics+0x198/0x2e8
[   22.367211]  kunit_try_run_case+0x170/0x3f0
[   22.367267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.367327]  kthread+0x318/0x620
[   22.367382]  ret_from_fork+0x10/0x20
[   22.367442] 
[   22.372157] Allocated by task 254:
[   22.372541]  kasan_save_stack+0x3c/0x68
[   22.372865]  kasan_save_track+0x20/0x40
[   22.373287]  kasan_save_alloc_info+0x40/0x58
[   22.373563]  __kasan_kmalloc+0xd4/0xd8
[   22.374003]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.374320]  kasan_atomics+0xb8/0x2e8
[   22.374731]  kunit_try_run_case+0x170/0x3f0
[   22.375130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.375466]  kthread+0x318/0x620
[   22.375852]  ret_from_fork+0x10/0x20
[   22.376220] 
[   22.376458] The buggy address belongs to the object at fff00000c66ea700
[   22.376458]  which belongs to the cache kmalloc-64 of size 64
[   22.376920] The buggy address is located 0 bytes to the right of
[   22.376920]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.377911] 
[   22.378115] The buggy address belongs to the physical page:
[   22.378485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.379259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.379648] page_type: f5(slab)
[   22.380053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.380576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.381152] page dumped because: kasan: bad access detected
[   22.381564] 
[   22.381718] Memory state around the buggy address:
[   22.382109]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.382654]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.383204] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.383612]                                      ^
[   22.383876]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384289]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384564] ==================================================================
[   22.251085] ==================================================================
[   22.251822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.252598] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.253464] 
[   22.253734] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.253943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.253981] Hardware name: linux,dummy-virt (DT)
[   22.254020] Call trace:
[   22.254052]  show_stack+0x20/0x38 (C)
[   22.254143]  dump_stack_lvl+0x8c/0xd0
[   22.254206]  print_report+0x118/0x608
[   22.254266]  kasan_report+0xdc/0x128
[   22.254321]  __asan_report_load8_noabort+0x20/0x30
[   22.254384]  kasan_atomics_helper+0x3db0/0x4858
[   22.254450]  kasan_atomics+0x198/0x2e8
[   22.254522]  kunit_try_run_case+0x170/0x3f0
[   22.254594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.254659]  kthread+0x318/0x620
[   22.254716]  ret_from_fork+0x10/0x20
[   22.254801] 
[   22.258161] Allocated by task 254:
[   22.258389]  kasan_save_stack+0x3c/0x68
[   22.258662]  kasan_save_track+0x20/0x40
[   22.259521]  kasan_save_alloc_info+0x40/0x58
[   22.259878]  __kasan_kmalloc+0xd4/0xd8
[   22.260192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.260478]  kasan_atomics+0xb8/0x2e8
[   22.260761]  kunit_try_run_case+0x170/0x3f0
[   22.261051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.261402]  kthread+0x318/0x620
[   22.261775]  ret_from_fork+0x10/0x20
[   22.262055] 
[   22.262260] The buggy address belongs to the object at fff00000c66ea700
[   22.262260]  which belongs to the cache kmalloc-64 of size 64
[   22.262824] The buggy address is located 0 bytes to the right of
[   22.262824]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.263421] 
[   22.263556] The buggy address belongs to the physical page:
[   22.264228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.264618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.265166] page_type: f5(slab)
[   22.265513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.266045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.266593] page dumped because: kasan: bad access detected
[   22.267238] 
[   22.267487] Memory state around the buggy address:
[   22.267689]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.268009]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.268332] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.268670]                                      ^
[   22.269576]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.270176]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.270724] ==================================================================
[   21.350873] ==================================================================
[   21.351207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   21.351617] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.352097] 
[   21.352264] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.352362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.352396] Hardware name: linux,dummy-virt (DT)
[   21.352435] Call trace:
[   21.352463]  show_stack+0x20/0x38 (C)
[   21.352522]  dump_stack_lvl+0x8c/0xd0
[   21.352579]  print_report+0x118/0x608
[   21.352631]  kasan_report+0xdc/0x128
[   21.352686]  kasan_check_range+0x100/0x1a8
[   21.352788]  __kasan_check_write+0x20/0x30
[   21.352846]  kasan_atomics_helper+0x32c/0x4858
[   21.352903]  kasan_atomics+0x198/0x2e8
[   21.352956]  kunit_try_run_case+0x170/0x3f0
[   21.353013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.353072]  kthread+0x318/0x620
[   21.353124]  ret_from_fork+0x10/0x20
[   21.353181] 
[   21.356233] Allocated by task 254:
[   21.356411]  kasan_save_stack+0x3c/0x68
[   21.356703]  kasan_save_track+0x20/0x40
[   21.357943]  kasan_save_alloc_info+0x40/0x58
[   21.358213]  __kasan_kmalloc+0xd4/0xd8
[   21.358436]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.358910]  kasan_atomics+0xb8/0x2e8
[   21.359127]  kunit_try_run_case+0x170/0x3f0
[   21.359368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.359706]  kthread+0x318/0x620
[   21.359981]  ret_from_fork+0x10/0x20
[   21.360204] 
[   21.360337] The buggy address belongs to the object at fff00000c66ea700
[   21.360337]  which belongs to the cache kmalloc-64 of size 64
[   21.360862] The buggy address is located 0 bytes to the right of
[   21.360862]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.361430] 
[   21.361541] The buggy address belongs to the physical page:
[   21.361819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.362196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.362549] page_type: f5(slab)
[   21.363462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.363808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.364143] page dumped because: kasan: bad access detected
[   21.364457] 
[   21.364599] Memory state around the buggy address:
[   21.364974]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.365284]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.365618] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.365941]                                      ^
[   21.366232]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.366599]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.366946] ==================================================================
[   22.218307] ==================================================================
[   22.218929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.219285] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.219646] 
[   22.219836] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.219938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.219974] Hardware name: linux,dummy-virt (DT)
[   22.220012] Call trace:
[   22.220042]  show_stack+0x20/0x38 (C)
[   22.220102]  dump_stack_lvl+0x8c/0xd0
[   22.220160]  print_report+0x118/0x608
[   22.220216]  kasan_report+0xdc/0x128
[   22.220267]  kasan_check_range+0x100/0x1a8
[   22.220321]  __kasan_check_write+0x20/0x30
[   22.220372]  kasan_atomics_helper+0x154c/0x4858
[   22.220426]  kasan_atomics+0x198/0x2e8
[   22.220478]  kunit_try_run_case+0x170/0x3f0
[   22.220532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220589]  kthread+0x318/0x620
[   22.220640]  ret_from_fork+0x10/0x20
[   22.220694] 
[   22.223638] Allocated by task 254:
[   22.223868]  kasan_save_stack+0x3c/0x68
[   22.224130]  kasan_save_track+0x20/0x40
[   22.224423]  kasan_save_alloc_info+0x40/0x58
[   22.224642]  __kasan_kmalloc+0xd4/0xd8
[   22.224914]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.225177]  kasan_atomics+0xb8/0x2e8
[   22.225415]  kunit_try_run_case+0x170/0x3f0
[   22.225682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.225946]  kthread+0x318/0x620
[   22.226179]  ret_from_fork+0x10/0x20
[   22.226401] 
[   22.226534] The buggy address belongs to the object at fff00000c66ea700
[   22.226534]  which belongs to the cache kmalloc-64 of size 64
[   22.227002] The buggy address is located 0 bytes to the right of
[   22.227002]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.227594] 
[   22.227786] The buggy address belongs to the physical page:
[   22.227997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.228436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.228807] page_type: f5(slab)
[   22.229010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.229359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.229830] page dumped because: kasan: bad access detected
[   22.230111] 
[   22.230304] Memory state around the buggy address:
[   22.230595]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.231052]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.231387] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.231679]                                      ^
[   22.232034]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232448]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.232784] ==================================================================
[   22.178304] ==================================================================
[   22.178796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.179374] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   22.179728] 
[   22.179895] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   22.180000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.180038] Hardware name: linux,dummy-virt (DT)
[   22.180076] Call trace:
[   22.180108]  show_stack+0x20/0x38 (C)
[   22.180172]  dump_stack_lvl+0x8c/0xd0
[   22.180229]  print_report+0x118/0x608
[   22.180284]  kasan_report+0xdc/0x128
[   22.180337]  kasan_check_range+0x100/0x1a8
[   22.180393]  __kasan_check_write+0x20/0x30
[   22.180445]  kasan_atomics_helper+0x147c/0x4858
[   22.180500]  kasan_atomics+0x198/0x2e8
[   22.180553]  kunit_try_run_case+0x170/0x3f0
[   22.180607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.180664]  kthread+0x318/0x620
[   22.180714]  ret_from_fork+0x10/0x20
[   22.180789] 
[   22.185345] Allocated by task 254:
[   22.185677]  kasan_save_stack+0x3c/0x68
[   22.185929]  kasan_save_track+0x20/0x40
[   22.186175]  kasan_save_alloc_info+0x40/0x58
[   22.186463]  __kasan_kmalloc+0xd4/0xd8
[   22.186695]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.186963]  kasan_atomics+0xb8/0x2e8
[   22.187190]  kunit_try_run_case+0x170/0x3f0
[   22.187462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.188327]  kthread+0x318/0x620
[   22.188570]  ret_from_fork+0x10/0x20
[   22.188760] 
[   22.189116] The buggy address belongs to the object at fff00000c66ea700
[   22.189116]  which belongs to the cache kmalloc-64 of size 64
[   22.189946] The buggy address is located 0 bytes to the right of
[   22.189946]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   22.190669] 
[   22.190864] The buggy address belongs to the physical page:
[   22.191121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   22.191462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.191781] page_type: f5(slab)
[   22.191994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.192326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.192651] page dumped because: kasan: bad access detected
[   22.193928] 
[   22.194080] Memory state around the buggy address:
[   22.194353]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.194773]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.195093] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.195547]                                      ^
[   22.195904]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.196424]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.196820] ==================================================================
[   21.732385] ==================================================================
[   21.732852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.733507] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.733944] 
[   21.734156] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.734258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.734292] Hardware name: linux,dummy-virt (DT)
[   21.734331] Call trace:
[   21.734359]  show_stack+0x20/0x38 (C)
[   21.734444]  dump_stack_lvl+0x8c/0xd0
[   21.734535]  print_report+0x118/0x608
[   21.734592]  kasan_report+0xdc/0x128
[   21.734667]  __asan_report_load4_noabort+0x20/0x30
[   21.734724]  kasan_atomics_helper+0x3dcc/0x4858
[   21.734797]  kasan_atomics+0x198/0x2e8
[   21.734854]  kunit_try_run_case+0x170/0x3f0
[   21.734913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.734976]  kthread+0x318/0x620
[   21.735029]  ret_from_fork+0x10/0x20
[   21.735118] 
[   21.738235] Allocated by task 254:
[   21.738588]  kasan_save_stack+0x3c/0x68
[   21.738907]  kasan_save_track+0x20/0x40
[   21.739278]  kasan_save_alloc_info+0x40/0x58
[   21.739572]  __kasan_kmalloc+0xd4/0xd8
[   21.739816]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.740002]  kasan_atomics+0xb8/0x2e8
[   21.740357]  kunit_try_run_case+0x170/0x3f0
[   21.740743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.741115]  kthread+0x318/0x620
[   21.741320]  ret_from_fork+0x10/0x20
[   21.741610] 
[   21.741818] The buggy address belongs to the object at fff00000c66ea700
[   21.741818]  which belongs to the cache kmalloc-64 of size 64
[   21.742382] The buggy address is located 0 bytes to the right of
[   21.742382]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.743185] 
[   21.743389] The buggy address belongs to the physical page:
[   21.743658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.744135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.744438] page_type: f5(slab)
[   21.744747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.745203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.745514] page dumped because: kasan: bad access detected
[   21.745924] 
[   21.746041] Memory state around the buggy address:
[   21.746381]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.746864]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.747189] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.747681]                                      ^
[   21.748016]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.748356]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.748758] ==================================================================
[   21.924103] ==================================================================
[   21.924531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.924916] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.925218] 
[   21.925431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.925535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.925573] Hardware name: linux,dummy-virt (DT)
[   21.925614] Call trace:
[   21.925644]  show_stack+0x20/0x38 (C)
[   21.925706]  dump_stack_lvl+0x8c/0xd0
[   21.926614]  print_report+0x118/0x608
[   21.926686]  kasan_report+0xdc/0x128
[   21.926750]  kasan_check_range+0x100/0x1a8
[   21.926811]  __kasan_check_write+0x20/0x30
[   21.926862]  kasan_atomics_helper+0xe44/0x4858
[   21.926918]  kasan_atomics+0x198/0x2e8
[   21.926970]  kunit_try_run_case+0x170/0x3f0
[   21.927023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927081]  kthread+0x318/0x620
[   21.927130]  ret_from_fork+0x10/0x20
[   21.927187] 
[   21.930577] Allocated by task 254:
[   21.930789]  kasan_save_stack+0x3c/0x68
[   21.931165]  kasan_save_track+0x20/0x40
[   21.931478]  kasan_save_alloc_info+0x40/0x58
[   21.931784]  __kasan_kmalloc+0xd4/0xd8
[   21.932117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.932392]  kasan_atomics+0xb8/0x2e8
[   21.932624]  kunit_try_run_case+0x170/0x3f0
[   21.933013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.933326]  kthread+0x318/0x620
[   21.933664]  ret_from_fork+0x10/0x20
[   21.933923] 
[   21.934060] The buggy address belongs to the object at fff00000c66ea700
[   21.934060]  which belongs to the cache kmalloc-64 of size 64
[   21.934632] The buggy address is located 0 bytes to the right of
[   21.934632]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.935365] 
[   21.935481] The buggy address belongs to the physical page:
[   21.935833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.936250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.936540] page_type: f5(slab)
[   21.936797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.937228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.937627] page dumped because: kasan: bad access detected
[   21.937892] 
[   21.938087] Memory state around the buggy address:
[   21.938359]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.938712]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.939074] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.939447]                                      ^
[   21.939700]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.939959]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.940173] ==================================================================
[   21.367825] ==================================================================
[   21.368219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   21.368622] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.370027] 
[   21.370209] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.370318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.370352] Hardware name: linux,dummy-virt (DT)
[   21.370393] Call trace:
[   21.370424]  show_stack+0x20/0x38 (C)
[   21.370506]  dump_stack_lvl+0x8c/0xd0
[   21.370565]  print_report+0x118/0x608
[   21.370621]  kasan_report+0xdc/0x128
[   21.370676]  __asan_report_store4_noabort+0x20/0x30
[   21.370734]  kasan_atomics_helper+0x3f94/0x4858
[   21.370824]  kasan_atomics+0x198/0x2e8
[   21.370878]  kunit_try_run_case+0x170/0x3f0
[   21.370935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.370994]  kthread+0x318/0x620
[   21.371046]  ret_from_fork+0x10/0x20
[   21.371103] 
[   21.374026] Allocated by task 254:
[   21.374256]  kasan_save_stack+0x3c/0x68
[   21.374439]  kasan_save_track+0x20/0x40
[   21.374798]  kasan_save_alloc_info+0x40/0x58
[   21.375050]  __kasan_kmalloc+0xd4/0xd8
[   21.375224]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.375611]  kasan_atomics+0xb8/0x2e8
[   21.375890]  kunit_try_run_case+0x170/0x3f0
[   21.376129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376519]  kthread+0x318/0x620
[   21.376683]  ret_from_fork+0x10/0x20
[   21.376855] 
[   21.377021] The buggy address belongs to the object at fff00000c66ea700
[   21.377021]  which belongs to the cache kmalloc-64 of size 64
[   21.377630] The buggy address is located 0 bytes to the right of
[   21.377630]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.378305] 
[   21.378434] The buggy address belongs to the physical page:
[   21.378859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.379153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.379547] page_type: f5(slab)
[   21.379925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.380172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.380556] page dumped because: kasan: bad access detected
[   21.380958] 
[   21.381128] Memory state around the buggy address:
[   21.381415]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.381801]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.382125] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.382491]                                      ^
[   21.382766]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383523]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383840] ==================================================================
[   21.317668] ==================================================================
[   21.317954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   21.318438] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.318681] 
[   21.318816] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.318935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.318973] Hardware name: linux,dummy-virt (DT)
[   21.319014] Call trace:
[   21.319043]  show_stack+0x20/0x38 (C)
[   21.319103]  dump_stack_lvl+0x8c/0xd0
[   21.319159]  print_report+0x118/0x608
[   21.319214]  kasan_report+0xdc/0x128
[   21.319268]  kasan_check_range+0x100/0x1a8
[   21.319324]  __kasan_check_read+0x20/0x30
[   21.319377]  kasan_atomics_helper+0x2b0/0x4858
[   21.319433]  kasan_atomics+0x198/0x2e8
[   21.319485]  kunit_try_run_case+0x170/0x3f0
[   21.319542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.319600]  kthread+0x318/0x620
[   21.319650]  ret_from_fork+0x10/0x20
[   21.319705] 
[   21.323846] Allocated by task 254:
[   21.324163]  kasan_save_stack+0x3c/0x68
[   21.324423]  kasan_save_track+0x20/0x40
[   21.324680]  kasan_save_alloc_info+0x40/0x58
[   21.324856]  __kasan_kmalloc+0xd4/0xd8
[   21.325059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.325403]  kasan_atomics+0xb8/0x2e8
[   21.325656]  kunit_try_run_case+0x170/0x3f0
[   21.325914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326235]  kthread+0x318/0x620
[   21.326637]  ret_from_fork+0x10/0x20
[   21.326874] 
[   21.327024] The buggy address belongs to the object at fff00000c66ea700
[   21.327024]  which belongs to the cache kmalloc-64 of size 64
[   21.327497] The buggy address is located 0 bytes to the right of
[   21.327497]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.328130] 
[   21.328302] The buggy address belongs to the physical page:
[   21.328656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.329007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.329401] page_type: f5(slab)
[   21.329668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.330040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.330449] page dumped because: kasan: bad access detected
[   21.330791] 
[   21.330917] Memory state around the buggy address:
[   21.331108]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.331500]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.331897] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.332160]                                      ^
[   21.332380]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332611]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.333613] ==================================================================
[   21.887666] ==================================================================
[   21.888059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.888545] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254
[   21.888926] 
[   21.889068] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   21.889161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.889194] Hardware name: linux,dummy-virt (DT)
[   21.889229] Call trace:
[   21.889256]  show_stack+0x20/0x38 (C)
[   21.889308]  dump_stack_lvl+0x8c/0xd0
[   21.889359]  print_report+0x118/0x608
[   21.889408]  kasan_report+0xdc/0x128
[   21.889457]  kasan_check_range+0x100/0x1a8
[   21.889506]  __kasan_check_read+0x20/0x30
[   21.889554]  kasan_atomics_helper+0xdd4/0x4858
[   21.889603]  kasan_atomics+0x198/0x2e8
[   21.889651]  kunit_try_run_case+0x170/0x3f0
[   21.889701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.889765]  kthread+0x318/0x620
[   21.889817]  ret_from_fork+0x10/0x20
[   21.889867] 
[   21.893897] Allocated by task 254:
[   21.894131]  kasan_save_stack+0x3c/0x68
[   21.894526]  kasan_save_track+0x20/0x40
[   21.894709]  kasan_save_alloc_info+0x40/0x58
[   21.894891]  __kasan_kmalloc+0xd4/0xd8
[   21.895327]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.895605]  kasan_atomics+0xb8/0x2e8
[   21.895791]  kunit_try_run_case+0x170/0x3f0
[   21.895967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.896447]  kthread+0x318/0x620
[   21.896777]  ret_from_fork+0x10/0x20
[   21.897059] 
[   21.897275] The buggy address belongs to the object at fff00000c66ea700
[   21.897275]  which belongs to the cache kmalloc-64 of size 64
[   21.897921] The buggy address is located 0 bytes to the right of
[   21.897921]  allocated 48-byte region [fff00000c66ea700, fff00000c66ea730)
[   21.898295] 
[   21.898483] The buggy address belongs to the physical page:
[   21.898925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   21.899468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.899835] page_type: f5(slab)
[   21.900145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.900700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.901097] page dumped because: kasan: bad access detected
[   21.901415] 
[   21.901532] Memory state around the buggy address:
[   21.901932]  fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.902311]  fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.902669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.903044]                                      ^
[   21.903292]  fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.903642]  fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904422] ==================================================================

[   15.534464] ==================================================================
[   15.534828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   15.535567] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.535916] 
[   15.536030] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.536087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.536101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.536124] Call Trace:
[   15.536146]  <TASK>
[   15.536168]  dump_stack_lvl+0x73/0xb0
[   15.536197]  print_report+0xd1/0x650
[   15.536221]  ? __virt_addr_valid+0x1db/0x2d0
[   15.536245]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.536267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.536293]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.536315]  kasan_report+0x140/0x180
[   15.536339]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.536366]  kasan_check_range+0x10c/0x1c0
[   15.536392]  __kasan_check_read+0x15/0x20
[   15.536415]  kasan_atomics_helper+0x13b6/0x5450
[   15.536438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.536460]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.536487]  ? kasan_atomics+0x153/0x310
[   15.536514]  kasan_atomics+0x1dd/0x310
[   15.536537]  ? __pfx_kasan_atomics+0x10/0x10
[   15.536562]  ? __pfx_read_tsc+0x10/0x10
[   15.536585]  ? ktime_get_ts64+0x86/0x230
[   15.536612]  kunit_try_run_case+0x1a6/0x480
[   15.536639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536661]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.536687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.536713]  ? __kthread_parkme+0x82/0x160
[   15.536737]  ? preempt_count_sub+0x50/0x80
[   15.536763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.536786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.536853]  kthread+0x324/0x6e0
[   15.536875]  ? trace_preempt_on+0x20/0xc0
[   15.536900]  ? __pfx_kthread+0x10/0x10
[   15.536923]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.536948]  ? calculate_sigpending+0x7b/0xa0
[   15.536971]  ? __pfx_kthread+0x10/0x10
[   15.536995]  ret_from_fork+0x41/0x80
[   15.537016]  ? __pfx_kthread+0x10/0x10
[   15.537038]  ret_from_fork_asm+0x1a/0x30
[   15.537082]  </TASK>
[   15.537093] 
[   15.544696] Allocated by task 273:
[   15.544885]  kasan_save_stack+0x45/0x70
[   15.545094]  kasan_save_track+0x18/0x40
[   15.545300]  kasan_save_alloc_info+0x3b/0x50
[   15.545518]  __kasan_kmalloc+0xb7/0xc0
[   15.545667]  __kmalloc_cache_noprof+0x18a/0x420
[   15.545867]  kasan_atomics+0x96/0x310
[   15.546002]  kunit_try_run_case+0x1a6/0x480
[   15.546149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.546328]  kthread+0x324/0x6e0
[   15.546455]  ret_from_fork+0x41/0x80
[   15.546585]  ret_from_fork_asm+0x1a/0x30
[   15.546726] 
[   15.546811] The buggy address belongs to the object at ffff888101b3e000
[   15.546811]  which belongs to the cache kmalloc-64 of size 64
[   15.547503] The buggy address is located 0 bytes to the right of
[   15.547503]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.548074] 
[   15.548173] The buggy address belongs to the physical page:
[   15.548425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.548778] flags: 0x200000000000000(node=0|zone=2)
[   15.549027] page_type: f5(slab)
[   15.549216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.549449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.549676] page dumped because: kasan: bad access detected
[   15.549862] 
[   15.549958] Memory state around the buggy address:
[   15.550339]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550666]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550998] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.551658]                                      ^
[   15.551864]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552189]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.552462] ==================================================================
[   15.182747] ==================================================================
[   15.183282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   15.183631] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.183955] 
[   15.184044] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.184090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184127] Call Trace:
[   15.184150]  <TASK>
[   15.184172]  dump_stack_lvl+0x73/0xb0
[   15.184201]  print_report+0xd1/0x650
[   15.184224]  ? __virt_addr_valid+0x1db/0x2d0
[   15.184248]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.184270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.184296]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.184318]  kasan_report+0x140/0x180
[   15.184341]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.184366]  kasan_check_range+0x10c/0x1c0
[   15.184392]  __kasan_check_write+0x18/0x20
[   15.184415]  kasan_atomics_helper+0xb6b/0x5450
[   15.184437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.184460]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.184487]  ? kasan_atomics+0x153/0x310
[   15.184513]  kasan_atomics+0x1dd/0x310
[   15.184535]  ? __pfx_kasan_atomics+0x10/0x10
[   15.184559]  ? __pfx_read_tsc+0x10/0x10
[   15.184583]  ? ktime_get_ts64+0x86/0x230
[   15.184610]  kunit_try_run_case+0x1a6/0x480
[   15.184634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.184657]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.184680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.184707]  ? __kthread_parkme+0x82/0x160
[   15.184731]  ? preempt_count_sub+0x50/0x80
[   15.184757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.184781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.184807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.184834]  kthread+0x324/0x6e0
[   15.184890]  ? trace_preempt_on+0x20/0xc0
[   15.184917]  ? __pfx_kthread+0x10/0x10
[   15.184940]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.184965]  ? calculate_sigpending+0x7b/0xa0
[   15.184989]  ? __pfx_kthread+0x10/0x10
[   15.185012]  ret_from_fork+0x41/0x80
[   15.185060]  ? __pfx_kthread+0x10/0x10
[   15.185084]  ret_from_fork_asm+0x1a/0x30
[   15.185117]  </TASK>
[   15.185129] 
[   15.193266] Allocated by task 273:
[   15.193449]  kasan_save_stack+0x45/0x70
[   15.193685]  kasan_save_track+0x18/0x40
[   15.193846]  kasan_save_alloc_info+0x3b/0x50
[   15.193993]  __kasan_kmalloc+0xb7/0xc0
[   15.194340]  __kmalloc_cache_noprof+0x18a/0x420
[   15.194584]  kasan_atomics+0x96/0x310
[   15.194793]  kunit_try_run_case+0x1a6/0x480
[   15.195023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.195296]  kthread+0x324/0x6e0
[   15.195440]  ret_from_fork+0x41/0x80
[   15.195570]  ret_from_fork_asm+0x1a/0x30
[   15.195707] 
[   15.195803] The buggy address belongs to the object at ffff888101b3e000
[   15.195803]  which belongs to the cache kmalloc-64 of size 64
[   15.196506] The buggy address is located 0 bytes to the right of
[   15.196506]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.196870] 
[   15.196953] The buggy address belongs to the physical page:
[   15.197396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.197779] flags: 0x200000000000000(node=0|zone=2)
[   15.198064] page_type: f5(slab)
[   15.198258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198738] page dumped because: kasan: bad access detected
[   15.198955] 
[   15.199068] Memory state around the buggy address:
[   15.199367]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199739]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200124] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.200464]                                      ^
[   15.200672]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200922]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201133] ==================================================================
[   15.696651] ==================================================================
[   15.697443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   15.700157] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.701163] 
[   15.701373] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.701428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.701443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.701466] Call Trace:
[   15.701492]  <TASK>
[   15.701514]  dump_stack_lvl+0x73/0xb0
[   15.701552]  print_report+0xd1/0x650
[   15.701577]  ? __virt_addr_valid+0x1db/0x2d0
[   15.701602]  ? kasan_atomics_helper+0x1780/0x5450
[   15.701626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.701652]  ? kasan_atomics_helper+0x1780/0x5450
[   15.701674]  kasan_report+0x140/0x180
[   15.701696]  ? kasan_atomics_helper+0x1780/0x5450
[   15.701722]  kasan_check_range+0x10c/0x1c0
[   15.701752]  __kasan_check_write+0x18/0x20
[   15.701775]  kasan_atomics_helper+0x1780/0x5450
[   15.701798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.701819]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.701855]  ? kasan_atomics+0x153/0x310
[   15.701881]  kasan_atomics+0x1dd/0x310
[   15.701903]  ? __pfx_kasan_atomics+0x10/0x10
[   15.701928]  ? __pfx_read_tsc+0x10/0x10
[   15.701951]  ? ktime_get_ts64+0x86/0x230
[   15.701977]  kunit_try_run_case+0x1a6/0x480
[   15.702002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702025]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.702058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.702085]  ? __kthread_parkme+0x82/0x160
[   15.702109]  ? preempt_count_sub+0x50/0x80
[   15.702134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.702184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.702210]  kthread+0x324/0x6e0
[   15.702232]  ? trace_preempt_on+0x20/0xc0
[   15.702257]  ? __pfx_kthread+0x10/0x10
[   15.702281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.702304]  ? calculate_sigpending+0x7b/0xa0
[   15.702328]  ? __pfx_kthread+0x10/0x10
[   15.702351]  ret_from_fork+0x41/0x80
[   15.702370]  ? __pfx_kthread+0x10/0x10
[   15.702393]  ret_from_fork_asm+0x1a/0x30
[   15.702426]  </TASK>
[   15.702437] 
[   15.716329] Allocated by task 273:
[   15.716556]  kasan_save_stack+0x45/0x70
[   15.716760]  kasan_save_track+0x18/0x40
[   15.716930]  kasan_save_alloc_info+0x3b/0x50
[   15.717083]  __kasan_kmalloc+0xb7/0xc0
[   15.717220]  __kmalloc_cache_noprof+0x18a/0x420
[   15.717443]  kasan_atomics+0x96/0x310
[   15.717645]  kunit_try_run_case+0x1a6/0x480
[   15.717804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.718008]  kthread+0x324/0x6e0
[   15.718533]  ret_from_fork+0x41/0x80
[   15.718956]  ret_from_fork_asm+0x1a/0x30
[   15.719343] 
[   15.719524] The buggy address belongs to the object at ffff888101b3e000
[   15.719524]  which belongs to the cache kmalloc-64 of size 64
[   15.720784] The buggy address is located 0 bytes to the right of
[   15.720784]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.721905] 
[   15.721986] The buggy address belongs to the physical page:
[   15.722207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.722933] flags: 0x200000000000000(node=0|zone=2)
[   15.723425] page_type: f5(slab)
[   15.723738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.724476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.724943] page dumped because: kasan: bad access detected
[   15.725300] 
[   15.725487] Memory state around the buggy address:
[   15.725942]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726659]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726905] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.727269]                                      ^
[   15.727714]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.728382]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.729110] ==================================================================
[   15.201730] ==================================================================
[   15.202121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   15.202486] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.202873] 
[   15.202986] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.203068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.203099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.203127] Call Trace:
[   15.203154]  <TASK>
[   15.203196]  dump_stack_lvl+0x73/0xb0
[   15.203250]  print_report+0xd1/0x650
[   15.203277]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203301]  ? kasan_atomics_helper+0xc71/0x5450
[   15.203323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.203351]  ? kasan_atomics_helper+0xc71/0x5450
[   15.203374]  kasan_report+0x140/0x180
[   15.203400]  ? kasan_atomics_helper+0xc71/0x5450
[   15.203442]  kasan_check_range+0x10c/0x1c0
[   15.203467]  __kasan_check_write+0x18/0x20
[   15.203491]  kasan_atomics_helper+0xc71/0x5450
[   15.203514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203536]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.203562]  ? kasan_atomics+0x153/0x310
[   15.203606]  kasan_atomics+0x1dd/0x310
[   15.203630]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203654]  ? __pfx_read_tsc+0x10/0x10
[   15.203677]  ? ktime_get_ts64+0x86/0x230
[   15.203704]  kunit_try_run_case+0x1a6/0x480
[   15.203728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203768]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.203792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203819]  ? __kthread_parkme+0x82/0x160
[   15.203856]  ? preempt_count_sub+0x50/0x80
[   15.203882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203960]  kthread+0x324/0x6e0
[   15.203983]  ? trace_preempt_on+0x20/0xc0
[   15.204008]  ? __pfx_kthread+0x10/0x10
[   15.204032]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.204068]  ? calculate_sigpending+0x7b/0xa0
[   15.204090]  ? __pfx_kthread+0x10/0x10
[   15.204114]  ret_from_fork+0x41/0x80
[   15.204135]  ? __pfx_kthread+0x10/0x10
[   15.204158]  ret_from_fork_asm+0x1a/0x30
[   15.204191]  </TASK>
[   15.204203] 
[   15.211896] Allocated by task 273:
[   15.212121]  kasan_save_stack+0x45/0x70
[   15.212364]  kasan_save_track+0x18/0x40
[   15.212570]  kasan_save_alloc_info+0x3b/0x50
[   15.212740]  __kasan_kmalloc+0xb7/0xc0
[   15.212915]  __kmalloc_cache_noprof+0x18a/0x420
[   15.213152]  kasan_atomics+0x96/0x310
[   15.213381]  kunit_try_run_case+0x1a6/0x480
[   15.213575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213903]  kthread+0x324/0x6e0
[   15.214111]  ret_from_fork+0x41/0x80
[   15.214302]  ret_from_fork_asm+0x1a/0x30
[   15.214501] 
[   15.214602] The buggy address belongs to the object at ffff888101b3e000
[   15.214602]  which belongs to the cache kmalloc-64 of size 64
[   15.215131] The buggy address is located 0 bytes to the right of
[   15.215131]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.215674] 
[   15.215877] The buggy address belongs to the physical page:
[   15.216149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.216390] flags: 0x200000000000000(node=0|zone=2)
[   15.216554] page_type: f5(slab)
[   15.216706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.217068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.217427] page dumped because: kasan: bad access detected
[   15.217699] 
[   15.217804] Memory state around the buggy address:
[   15.218048]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.218287]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.218594] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.218936]                                      ^
[   15.219176]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.219447]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.219797] ==================================================================
[   15.321166] ==================================================================
[   15.321519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   15.321895] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.322544] 
[   15.322661] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.322707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.322721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.322745] Call Trace:
[   15.322767]  <TASK>
[   15.322788]  dump_stack_lvl+0x73/0xb0
[   15.322817]  print_report+0xd1/0x650
[   15.322851]  ? __virt_addr_valid+0x1db/0x2d0
[   15.322875]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.322897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.322924]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.322946]  kasan_report+0x140/0x180
[   15.322968]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.322994]  kasan_check_range+0x10c/0x1c0
[   15.323018]  __kasan_check_write+0x18/0x20
[   15.323041]  kasan_atomics_helper+0xfaa/0x5450
[   15.323074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.323096]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.323122]  ? kasan_atomics+0x153/0x310
[   15.323149]  kasan_atomics+0x1dd/0x310
[   15.323172]  ? __pfx_kasan_atomics+0x10/0x10
[   15.323198]  ? __pfx_read_tsc+0x10/0x10
[   15.323221]  ? ktime_get_ts64+0x86/0x230
[   15.323248]  kunit_try_run_case+0x1a6/0x480
[   15.323272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.323294]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.323317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.323343]  ? __kthread_parkme+0x82/0x160
[   15.323367]  ? preempt_count_sub+0x50/0x80
[   15.323393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.323415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.323442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.323469]  kthread+0x324/0x6e0
[   15.323492]  ? trace_preempt_on+0x20/0xc0
[   15.323517]  ? __pfx_kthread+0x10/0x10
[   15.323540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.323564]  ? calculate_sigpending+0x7b/0xa0
[   15.323586]  ? __pfx_kthread+0x10/0x10
[   15.323611]  ret_from_fork+0x41/0x80
[   15.323630]  ? __pfx_kthread+0x10/0x10
[   15.323654]  ret_from_fork_asm+0x1a/0x30
[   15.323686]  </TASK>
[   15.323709] 
[   15.331466] Allocated by task 273:
[   15.331616]  kasan_save_stack+0x45/0x70
[   15.331772]  kasan_save_track+0x18/0x40
[   15.331993]  kasan_save_alloc_info+0x3b/0x50
[   15.332256]  __kasan_kmalloc+0xb7/0xc0
[   15.332444]  __kmalloc_cache_noprof+0x18a/0x420
[   15.332666]  kasan_atomics+0x96/0x310
[   15.332860]  kunit_try_run_case+0x1a6/0x480
[   15.333083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.333314]  kthread+0x324/0x6e0
[   15.333541]  ret_from_fork+0x41/0x80
[   15.333787]  ret_from_fork_asm+0x1a/0x30
[   15.334039] 
[   15.334168] The buggy address belongs to the object at ffff888101b3e000
[   15.334168]  which belongs to the cache kmalloc-64 of size 64
[   15.334729] The buggy address is located 0 bytes to the right of
[   15.334729]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.335220] 
[   15.335296] The buggy address belongs to the physical page:
[   15.335465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.335791] flags: 0x200000000000000(node=0|zone=2)
[   15.336037] page_type: f5(slab)
[   15.336295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.336676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.337018] page dumped because: kasan: bad access detected
[   15.337442] 
[   15.337520] Memory state around the buggy address:
[   15.337720]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.338077]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.338416] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.338742]                                      ^
[   15.338974]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339373]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339668] ==================================================================
[   16.034289] ==================================================================
[   16.034659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   16.035053] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.035386] 
[   16.035474] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.035524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.035537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.035560] Call Trace:
[   16.035582]  <TASK>
[   16.035604]  dump_stack_lvl+0x73/0xb0
[   16.035632]  print_report+0xd1/0x650
[   16.035655]  ? __virt_addr_valid+0x1db/0x2d0
[   16.035679]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.035700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.035726]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.035750]  kasan_report+0x140/0x180
[   16.035773]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.035799]  kasan_check_range+0x10c/0x1c0
[   16.035823]  __kasan_check_write+0x18/0x20
[   16.035858]  kasan_atomics_helper+0x20c9/0x5450
[   16.035881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.035903]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.035929]  ? kasan_atomics+0x153/0x310
[   16.035954]  kasan_atomics+0x1dd/0x310
[   16.035977]  ? __pfx_kasan_atomics+0x10/0x10
[   16.036001]  ? __pfx_read_tsc+0x10/0x10
[   16.036023]  ? ktime_get_ts64+0x86/0x230
[   16.036050]  kunit_try_run_case+0x1a6/0x480
[   16.036076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036098]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.036122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.036148]  ? __kthread_parkme+0x82/0x160
[   16.036171]  ? preempt_count_sub+0x50/0x80
[   16.036197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.036288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.036340]  kthread+0x324/0x6e0
[   16.036390]  ? trace_preempt_on+0x20/0xc0
[   16.036415]  ? __pfx_kthread+0x10/0x10
[   16.036439]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.036462]  ? calculate_sigpending+0x7b/0xa0
[   16.036485]  ? __pfx_kthread+0x10/0x10
[   16.036519]  ret_from_fork+0x41/0x80
[   16.036539]  ? __pfx_kthread+0x10/0x10
[   16.036563]  ret_from_fork_asm+0x1a/0x30
[   16.036596]  </TASK>
[   16.036608] 
[   16.048287] Allocated by task 273:
[   16.048543]  kasan_save_stack+0x45/0x70
[   16.048878]  kasan_save_track+0x18/0x40
[   16.049188]  kasan_save_alloc_info+0x3b/0x50
[   16.049501]  __kasan_kmalloc+0xb7/0xc0
[   16.049697]  __kmalloc_cache_noprof+0x18a/0x420
[   16.049927]  kasan_atomics+0x96/0x310
[   16.050374]  kunit_try_run_case+0x1a6/0x480
[   16.050670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.051142]  kthread+0x324/0x6e0
[   16.051427]  ret_from_fork+0x41/0x80
[   16.051615]  ret_from_fork_asm+0x1a/0x30
[   16.051802] 
[   16.051905] The buggy address belongs to the object at ffff888101b3e000
[   16.051905]  which belongs to the cache kmalloc-64 of size 64
[   16.052849] The buggy address is located 0 bytes to the right of
[   16.052849]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.053711] 
[   16.054005] The buggy address belongs to the physical page:
[   16.054353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.054663] flags: 0x200000000000000(node=0|zone=2)
[   16.054893] page_type: f5(slab)
[   16.055054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.055368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.055672] page dumped because: kasan: bad access detected
[   16.056254] 
[   16.056496] Memory state around the buggy address:
[   16.056978]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.057437]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.057916] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.058438]                                      ^
[   16.058832]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059341]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.059757] ==================================================================
[   15.035722] ==================================================================
[   15.036208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   15.036568] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.036869] 
[   15.036976] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.037029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.037044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.037067] Call Trace:
[   15.037089]  <TASK>
[   15.037110]  dump_stack_lvl+0x73/0xb0
[   15.037140]  print_report+0xd1/0x650
[   15.037163]  ? __virt_addr_valid+0x1db/0x2d0
[   15.037187]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.037208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.037234]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.037256]  kasan_report+0x140/0x180
[   15.037277]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.037303]  kasan_check_range+0x10c/0x1c0
[   15.037326]  __kasan_check_write+0x18/0x20
[   15.037350]  kasan_atomics_helper+0x7c8/0x5450
[   15.037372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.037394]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.037420]  ? kasan_atomics+0x153/0x310
[   15.037447]  kasan_atomics+0x1dd/0x310
[   15.037469]  ? __pfx_kasan_atomics+0x10/0x10
[   15.037494]  ? __pfx_read_tsc+0x10/0x10
[   15.037518]  ? ktime_get_ts64+0x86/0x230
[   15.037546]  kunit_try_run_case+0x1a6/0x480
[   15.037571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037594]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.037628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.037657]  ? __kthread_parkme+0x82/0x160
[   15.037680]  ? preempt_count_sub+0x50/0x80
[   15.037706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.037732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.037792]  kthread+0x324/0x6e0
[   15.037814]  ? trace_preempt_on+0x20/0xc0
[   15.037849]  ? __pfx_kthread+0x10/0x10
[   15.037873]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.037897]  ? calculate_sigpending+0x7b/0xa0
[   15.037922]  ? __pfx_kthread+0x10/0x10
[   15.037945]  ret_from_fork+0x41/0x80
[   15.037965]  ? __pfx_kthread+0x10/0x10
[   15.037988]  ret_from_fork_asm+0x1a/0x30
[   15.038021]  </TASK>
[   15.038034] 
[   15.047777] Allocated by task 273:
[   15.048007]  kasan_save_stack+0x45/0x70
[   15.048212]  kasan_save_track+0x18/0x40
[   15.048387]  kasan_save_alloc_info+0x3b/0x50
[   15.048561]  __kasan_kmalloc+0xb7/0xc0
[   15.048755]  __kmalloc_cache_noprof+0x18a/0x420
[   15.050240]  kasan_atomics+0x96/0x310
[   15.050730]  kunit_try_run_case+0x1a6/0x480
[   15.051351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.051888]  kthread+0x324/0x6e0
[   15.052545]  ret_from_fork+0x41/0x80
[   15.053166]  ret_from_fork_asm+0x1a/0x30
[   15.053798] 
[   15.054206] The buggy address belongs to the object at ffff888101b3e000
[   15.054206]  which belongs to the cache kmalloc-64 of size 64
[   15.054635] The buggy address is located 0 bytes to the right of
[   15.054635]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.055154] 
[   15.055386] The buggy address belongs to the physical page:
[   15.055929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.056666] flags: 0x200000000000000(node=0|zone=2)
[   15.057160] page_type: f5(slab)
[   15.057507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.058211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.058682] page dumped because: kasan: bad access detected
[   15.058868] 
[   15.058940] Memory state around the buggy address:
[   15.059237]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059877]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060520] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.061172]                                      ^
[   15.061577]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.061803]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062027] ==================================================================
[   15.383498] ==================================================================
[   15.383891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   15.384311] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.384661] 
[   15.384791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.384847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.384861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.384885] Call Trace:
[   15.385029]  <TASK>
[   15.385053]  dump_stack_lvl+0x73/0xb0
[   15.385090]  print_report+0xd1/0x650
[   15.385114]  ? __virt_addr_valid+0x1db/0x2d0
[   15.385138]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.385159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.385186]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.385207]  kasan_report+0x140/0x180
[   15.385230]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.385256]  __asan_report_load4_noabort+0x18/0x20
[   15.385280]  kasan_atomics_helper+0x4a1e/0x5450
[   15.385302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.385325]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.385352]  ? kasan_atomics+0x153/0x310
[   15.385379]  kasan_atomics+0x1dd/0x310
[   15.385402]  ? __pfx_kasan_atomics+0x10/0x10
[   15.385426]  ? __pfx_read_tsc+0x10/0x10
[   15.385450]  ? ktime_get_ts64+0x86/0x230
[   15.385476]  kunit_try_run_case+0x1a6/0x480
[   15.385501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.385523]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.385546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.385573]  ? __kthread_parkme+0x82/0x160
[   15.385597]  ? preempt_count_sub+0x50/0x80
[   15.385623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.385646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.385673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.385699]  kthread+0x324/0x6e0
[   15.385722]  ? trace_preempt_on+0x20/0xc0
[   15.385754]  ? __pfx_kthread+0x10/0x10
[   15.385778]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.385801]  ? calculate_sigpending+0x7b/0xa0
[   15.385824]  ? __pfx_kthread+0x10/0x10
[   15.385856]  ret_from_fork+0x41/0x80
[   15.385875]  ? __pfx_kthread+0x10/0x10
[   15.385898]  ret_from_fork_asm+0x1a/0x30
[   15.385931]  </TASK>
[   15.385942] 
[   15.394409] Allocated by task 273:
[   15.394713]  kasan_save_stack+0x45/0x70
[   15.395338]  kasan_save_track+0x18/0x40
[   15.395535]  kasan_save_alloc_info+0x3b/0x50
[   15.395681]  __kasan_kmalloc+0xb7/0xc0
[   15.395810]  __kmalloc_cache_noprof+0x18a/0x420
[   15.396119]  kasan_atomics+0x96/0x310
[   15.396413]  kunit_try_run_case+0x1a6/0x480
[   15.396850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.397220]  kthread+0x324/0x6e0
[   15.397808]  ret_from_fork+0x41/0x80
[   15.398277]  ret_from_fork_asm+0x1a/0x30
[   15.398466] 
[   15.398561] The buggy address belongs to the object at ffff888101b3e000
[   15.398561]  which belongs to the cache kmalloc-64 of size 64
[   15.399568] The buggy address is located 0 bytes to the right of
[   15.399568]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.400080] 
[   15.400160] The buggy address belongs to the physical page:
[   15.400794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.401209] flags: 0x200000000000000(node=0|zone=2)
[   15.401627] page_type: f5(slab)
[   15.401956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.402256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.402695] page dumped because: kasan: bad access detected
[   15.402931] 
[   15.403001] Memory state around the buggy address:
[   15.403336]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.403684]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.404027] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.404357]                                      ^
[   15.404574]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.404913]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405298] ==================================================================
[   15.113172] ==================================================================
[   15.113495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   15.113816] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.114200] 
[   15.114309] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.114356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114394] Call Trace:
[   15.114417]  <TASK>
[   15.114439]  dump_stack_lvl+0x73/0xb0
[   15.114473]  print_report+0xd1/0x650
[   15.114496]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114520]  ? kasan_atomics_helper+0x993/0x5450
[   15.114542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114569]  ? kasan_atomics_helper+0x993/0x5450
[   15.114590]  kasan_report+0x140/0x180
[   15.114612]  ? kasan_atomics_helper+0x993/0x5450
[   15.114638]  kasan_check_range+0x10c/0x1c0
[   15.114662]  __kasan_check_write+0x18/0x20
[   15.114685]  kasan_atomics_helper+0x993/0x5450
[   15.114707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114729]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.114755]  ? kasan_atomics+0x153/0x310
[   15.114782]  kasan_atomics+0x1dd/0x310
[   15.114804]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114830]  ? __pfx_read_tsc+0x10/0x10
[   15.114876]  ? ktime_get_ts64+0x86/0x230
[   15.114904]  kunit_try_run_case+0x1a6/0x480
[   15.114928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114950]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.114974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114999]  ? __kthread_parkme+0x82/0x160
[   15.115023]  ? preempt_count_sub+0x50/0x80
[   15.115060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.115083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.115110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.115137]  kthread+0x324/0x6e0
[   15.115159]  ? trace_preempt_on+0x20/0xc0
[   15.115184]  ? __pfx_kthread+0x10/0x10
[   15.115207]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.115231]  ? calculate_sigpending+0x7b/0xa0
[   15.115254]  ? __pfx_kthread+0x10/0x10
[   15.115278]  ret_from_fork+0x41/0x80
[   15.115297]  ? __pfx_kthread+0x10/0x10
[   15.115320]  ret_from_fork_asm+0x1a/0x30
[   15.115353]  </TASK>
[   15.115365] 
[   15.125268] Allocated by task 273:
[   15.125676]  kasan_save_stack+0x45/0x70
[   15.125920]  kasan_save_track+0x18/0x40
[   15.126335]  kasan_save_alloc_info+0x3b/0x50
[   15.126655]  __kasan_kmalloc+0xb7/0xc0
[   15.126870]  __kmalloc_cache_noprof+0x18a/0x420
[   15.127262]  kasan_atomics+0x96/0x310
[   15.127535]  kunit_try_run_case+0x1a6/0x480
[   15.127827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128179]  kthread+0x324/0x6e0
[   15.128323]  ret_from_fork+0x41/0x80
[   15.128655]  ret_from_fork_asm+0x1a/0x30
[   15.128890] 
[   15.129161] The buggy address belongs to the object at ffff888101b3e000
[   15.129161]  which belongs to the cache kmalloc-64 of size 64
[   15.129655] The buggy address is located 0 bytes to the right of
[   15.129655]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.130419] 
[   15.130522] The buggy address belongs to the physical page:
[   15.130888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.131430] flags: 0x200000000000000(node=0|zone=2)
[   15.131754] page_type: f5(slab)
[   15.132074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.132416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.132885] page dumped because: kasan: bad access detected
[   15.133219] 
[   15.133342] Memory state around the buggy address:
[   15.133669]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133993]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.134539] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.134980]                                      ^
[   15.135310]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.135617]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.136062] ==================================================================
[   16.082736] ==================================================================
[   16.083031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   16.083372] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.083615] 
[   16.083702] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.083746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.083759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.083781] Call Trace:
[   16.083804]  <TASK>
[   16.083827]  dump_stack_lvl+0x73/0xb0
[   16.083866]  print_report+0xd1/0x650
[   16.083889]  ? __virt_addr_valid+0x1db/0x2d0
[   16.083913]  ? kasan_atomics_helper+0x218b/0x5450
[   16.083934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.083960]  ? kasan_atomics_helper+0x218b/0x5450
[   16.083982]  kasan_report+0x140/0x180
[   16.084018]  ? kasan_atomics_helper+0x218b/0x5450
[   16.084056]  kasan_check_range+0x10c/0x1c0
[   16.084080]  __kasan_check_write+0x18/0x20
[   16.084104]  kasan_atomics_helper+0x218b/0x5450
[   16.084126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.084148]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.084175]  ? kasan_atomics+0x153/0x310
[   16.084200]  kasan_atomics+0x1dd/0x310
[   16.084223]  ? __pfx_kasan_atomics+0x10/0x10
[   16.084247]  ? __pfx_read_tsc+0x10/0x10
[   16.084269]  ? ktime_get_ts64+0x86/0x230
[   16.084295]  kunit_try_run_case+0x1a6/0x480
[   16.084321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084343]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.084718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.084745]  ? __kthread_parkme+0x82/0x160
[   16.084768]  ? preempt_count_sub+0x50/0x80
[   16.084794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.084855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.084882]  kthread+0x324/0x6e0
[   16.084905]  ? trace_preempt_on+0x20/0xc0
[   16.084931]  ? __pfx_kthread+0x10/0x10
[   16.084954]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.084978]  ? calculate_sigpending+0x7b/0xa0
[   16.085014]  ? __pfx_kthread+0x10/0x10
[   16.085038]  ret_from_fork+0x41/0x80
[   16.085066]  ? __pfx_kthread+0x10/0x10
[   16.085090]  ret_from_fork_asm+0x1a/0x30
[   16.085123]  </TASK>
[   16.085135] 
[   16.092369] Allocated by task 273:
[   16.092528]  kasan_save_stack+0x45/0x70
[   16.092740]  kasan_save_track+0x18/0x40
[   16.092944]  kasan_save_alloc_info+0x3b/0x50
[   16.093163]  __kasan_kmalloc+0xb7/0xc0
[   16.093358]  __kmalloc_cache_noprof+0x18a/0x420
[   16.093588]  kasan_atomics+0x96/0x310
[   16.093784]  kunit_try_run_case+0x1a6/0x480
[   16.093989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094212]  kthread+0x324/0x6e0
[   16.094358]  ret_from_fork+0x41/0x80
[   16.094490]  ret_from_fork_asm+0x1a/0x30
[   16.094651] 
[   16.094750] The buggy address belongs to the object at ffff888101b3e000
[   16.094750]  which belongs to the cache kmalloc-64 of size 64
[   16.095357] The buggy address is located 0 bytes to the right of
[   16.095357]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.095772] 
[   16.095856] The buggy address belongs to the physical page:
[   16.096034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.096277] flags: 0x200000000000000(node=0|zone=2)
[   16.096525] page_type: f5(slab)
[   16.096699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.097057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.097392] page dumped because: kasan: bad access detected
[   16.097592] 
[   16.097691] Memory state around the buggy address:
[   16.097939]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.098222]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.098441] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.098655]                                      ^
[   16.098813]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.099148]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.099469] ==================================================================
[   15.839963] ==================================================================
[   15.841103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   15.841468] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.841803] 
[   15.841911] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.841958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.841972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.841995] Call Trace:
[   15.842017]  <TASK>
[   15.842040]  dump_stack_lvl+0x73/0xb0
[   15.842068]  print_report+0xd1/0x650
[   15.842092]  ? __virt_addr_valid+0x1db/0x2d0
[   15.842116]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.842138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.842165]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.842188]  kasan_report+0x140/0x180
[   15.842210]  ? kasan_atomics_helper+0x1c19/0x5450
[   15.842236]  kasan_check_range+0x10c/0x1c0
[   15.842259]  __kasan_check_write+0x18/0x20
[   15.842283]  kasan_atomics_helper+0x1c19/0x5450
[   15.842305]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.842328]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.842353]  ? kasan_atomics+0x153/0x310
[   15.842379]  kasan_atomics+0x1dd/0x310
[   15.842402]  ? __pfx_kasan_atomics+0x10/0x10
[   15.842426]  ? __pfx_read_tsc+0x10/0x10
[   15.842449]  ? ktime_get_ts64+0x86/0x230
[   15.842476]  kunit_try_run_case+0x1a6/0x480
[   15.842502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842526]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.842552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.842578]  ? __kthread_parkme+0x82/0x160
[   15.842602]  ? preempt_count_sub+0x50/0x80
[   15.842628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.842679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.842706]  kthread+0x324/0x6e0
[   15.843106]  ? trace_preempt_on+0x20/0xc0
[   15.843133]  ? __pfx_kthread+0x10/0x10
[   15.843155]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.843180]  ? calculate_sigpending+0x7b/0xa0
[   15.843202]  ? __pfx_kthread+0x10/0x10
[   15.843225]  ret_from_fork+0x41/0x80
[   15.843246]  ? __pfx_kthread+0x10/0x10
[   15.843268]  ret_from_fork_asm+0x1a/0x30
[   15.843301]  </TASK>
[   15.843313] 
[   15.850660] Allocated by task 273:
[   15.850853]  kasan_save_stack+0x45/0x70
[   15.851061]  kasan_save_track+0x18/0x40
[   15.851251]  kasan_save_alloc_info+0x3b/0x50
[   15.851480]  __kasan_kmalloc+0xb7/0xc0
[   15.851667]  __kmalloc_cache_noprof+0x18a/0x420
[   15.851847]  kasan_atomics+0x96/0x310
[   15.852035]  kunit_try_run_case+0x1a6/0x480
[   15.852198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.852404]  kthread+0x324/0x6e0
[   15.852579]  ret_from_fork+0x41/0x80
[   15.852784]  ret_from_fork_asm+0x1a/0x30
[   15.852955] 
[   15.853027] The buggy address belongs to the object at ffff888101b3e000
[   15.853027]  which belongs to the cache kmalloc-64 of size 64
[   15.853487] The buggy address is located 0 bytes to the right of
[   15.853487]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.853963] 
[   15.854073] The buggy address belongs to the physical page:
[   15.854319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.854689] flags: 0x200000000000000(node=0|zone=2)
[   15.854891] page_type: f5(slab)
[   15.855014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.855264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.855623] page dumped because: kasan: bad access detected
[   15.855906] 
[   15.856006] Memory state around the buggy address:
[   15.856243]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.856489]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.856810] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.857164]                                      ^
[   15.857324]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.857585]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.857912] ==================================================================
[   15.955202] ==================================================================
[   15.955774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   15.956166] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.956720] 
[   15.956879] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.956926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.956940] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.956962] Call Trace:
[   15.956983]  <TASK>
[   15.957005]  dump_stack_lvl+0x73/0xb0
[   15.957034]  print_report+0xd1/0x650
[   15.957056]  ? __virt_addr_valid+0x1db/0x2d0
[   15.957080]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.957102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.957142]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.957164]  kasan_report+0x140/0x180
[   15.957224]  ? kasan_atomics_helper+0x1f44/0x5450
[   15.957251]  kasan_check_range+0x10c/0x1c0
[   15.957275]  __kasan_check_write+0x18/0x20
[   15.957298]  kasan_atomics_helper+0x1f44/0x5450
[   15.957321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.957344]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.957399]  ? kasan_atomics+0x153/0x310
[   15.957425]  kasan_atomics+0x1dd/0x310
[   15.957448]  ? __pfx_kasan_atomics+0x10/0x10
[   15.957472]  ? __pfx_read_tsc+0x10/0x10
[   15.957524]  ? ktime_get_ts64+0x86/0x230
[   15.957551]  kunit_try_run_case+0x1a6/0x480
[   15.957575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957597]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.957620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.957675]  ? __kthread_parkme+0x82/0x160
[   15.957699]  ? preempt_count_sub+0x50/0x80
[   15.957725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.957754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.957781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.957849]  kthread+0x324/0x6e0
[   15.957872]  ? trace_preempt_on+0x20/0xc0
[   15.957897]  ? __pfx_kthread+0x10/0x10
[   15.957920]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.957944]  ? calculate_sigpending+0x7b/0xa0
[   15.957999]  ? __pfx_kthread+0x10/0x10
[   15.958024]  ret_from_fork+0x41/0x80
[   15.958044]  ? __pfx_kthread+0x10/0x10
[   15.958067]  ret_from_fork_asm+0x1a/0x30
[   15.958102]  </TASK>
[   15.958116] 
[   15.966114] Allocated by task 273:
[   15.966293]  kasan_save_stack+0x45/0x70
[   15.966545]  kasan_save_track+0x18/0x40
[   15.966752]  kasan_save_alloc_info+0x3b/0x50
[   15.966995]  __kasan_kmalloc+0xb7/0xc0
[   15.967256]  __kmalloc_cache_noprof+0x18a/0x420
[   15.967505]  kasan_atomics+0x96/0x310
[   15.967701]  kunit_try_run_case+0x1a6/0x480
[   15.967908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.968221]  kthread+0x324/0x6e0
[   15.968400]  ret_from_fork+0x41/0x80
[   15.968588]  ret_from_fork_asm+0x1a/0x30
[   15.968799] 
[   15.968914] The buggy address belongs to the object at ffff888101b3e000
[   15.968914]  which belongs to the cache kmalloc-64 of size 64
[   15.969463] The buggy address is located 0 bytes to the right of
[   15.969463]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.969921] 
[   15.970021] The buggy address belongs to the physical page:
[   15.970309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.970575] flags: 0x200000000000000(node=0|zone=2)
[   15.970799] page_type: f5(slab)
[   15.970984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.971414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.971694] page dumped because: kasan: bad access detected
[   15.971989] 
[   15.972156] Memory state around the buggy address:
[   15.972315]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.972645]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.972962] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.973422]                                      ^
[   15.973657]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.973943]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.974334] ==================================================================
[   14.888955] ==================================================================
[   14.889386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   14.889667] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.889908] 
[   14.889996] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.890042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.890080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.890289] Call Trace:
[   14.890328]  <TASK>
[   14.890351]  dump_stack_lvl+0x73/0xb0
[   14.890383]  print_report+0xd1/0x650
[   14.890407]  ? __virt_addr_valid+0x1db/0x2d0
[   14.890430]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.890452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.890479]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.890501]  kasan_report+0x140/0x180
[   14.890523]  ? kasan_atomics_helper+0x4b56/0x5450
[   14.890550]  __asan_report_load4_noabort+0x18/0x20
[   14.890575]  kasan_atomics_helper+0x4b56/0x5450
[   14.890599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.890621]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.890647]  ? kasan_atomics+0x153/0x310
[   14.890673]  kasan_atomics+0x1dd/0x310
[   14.890696]  ? __pfx_kasan_atomics+0x10/0x10
[   14.890720]  ? __pfx_read_tsc+0x10/0x10
[   14.890743]  ? ktime_get_ts64+0x86/0x230
[   14.890771]  kunit_try_run_case+0x1a6/0x480
[   14.890795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.890818]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.890853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.890880]  ? __kthread_parkme+0x82/0x160
[   14.890903]  ? preempt_count_sub+0x50/0x80
[   14.890929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.890953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.890980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.891009]  kthread+0x324/0x6e0
[   14.891031]  ? trace_preempt_on+0x20/0xc0
[   14.891059]  ? __pfx_kthread+0x10/0x10
[   14.891194]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.891222]  ? calculate_sigpending+0x7b/0xa0
[   14.891245]  ? __pfx_kthread+0x10/0x10
[   14.891527]  ret_from_fork+0x41/0x80
[   14.891554]  ? __pfx_kthread+0x10/0x10
[   14.891597]  ret_from_fork_asm+0x1a/0x30
[   14.891747]  </TASK>
[   14.891808] 
[   14.903870] Allocated by task 273:
[   14.904201]  kasan_save_stack+0x45/0x70
[   14.904464]  kasan_save_track+0x18/0x40
[   14.904666]  kasan_save_alloc_info+0x3b/0x50
[   14.904868]  __kasan_kmalloc+0xb7/0xc0
[   14.905174]  __kmalloc_cache_noprof+0x18a/0x420
[   14.905402]  kasan_atomics+0x96/0x310
[   14.905580]  kunit_try_run_case+0x1a6/0x480
[   14.905779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906209]  kthread+0x324/0x6e0
[   14.906414]  ret_from_fork+0x41/0x80
[   14.906622]  ret_from_fork_asm+0x1a/0x30
[   14.906826] 
[   14.906943] The buggy address belongs to the object at ffff888101b3e000
[   14.906943]  which belongs to the cache kmalloc-64 of size 64
[   14.907712] The buggy address is located 0 bytes to the right of
[   14.907712]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.908313] 
[   14.908418] The buggy address belongs to the physical page:
[   14.908720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.909269] flags: 0x200000000000000(node=0|zone=2)
[   14.909505] page_type: f5(slab)
[   14.909641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.910193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.910495] page dumped because: kasan: bad access detected
[   14.910783] 
[   14.910883] Memory state around the buggy address:
[   14.911372]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911782]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912285] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.912600]                                      ^
[   14.912819]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913315]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913645] ==================================================================
[   15.405958] ==================================================================
[   15.406444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   15.406803] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.407175] 
[   15.407273] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.407349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.407364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.407387] Call Trace:
[   15.407435]  <TASK>
[   15.407458]  dump_stack_lvl+0x73/0xb0
[   15.407486]  print_report+0xd1/0x650
[   15.407509]  ? __virt_addr_valid+0x1db/0x2d0
[   15.407533]  ? kasan_atomics_helper+0x1149/0x5450
[   15.407554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.407581]  ? kasan_atomics_helper+0x1149/0x5450
[   15.407630]  kasan_report+0x140/0x180
[   15.407652]  ? kasan_atomics_helper+0x1149/0x5450
[   15.407678]  kasan_check_range+0x10c/0x1c0
[   15.407712]  __kasan_check_write+0x18/0x20
[   15.407736]  kasan_atomics_helper+0x1149/0x5450
[   15.407758]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.407781]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.407806]  ? kasan_atomics+0x153/0x310
[   15.407833]  kasan_atomics+0x1dd/0x310
[   15.407868]  ? __pfx_kasan_atomics+0x10/0x10
[   15.407892]  ? __pfx_read_tsc+0x10/0x10
[   15.407916]  ? ktime_get_ts64+0x86/0x230
[   15.407942]  kunit_try_run_case+0x1a6/0x480
[   15.407967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.408016]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.408040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.408067]  ? __kthread_parkme+0x82/0x160
[   15.408101]  ? preempt_count_sub+0x50/0x80
[   15.408127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.408150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.408177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.408232]  kthread+0x324/0x6e0
[   15.408254]  ? trace_preempt_on+0x20/0xc0
[   15.408305]  ? __pfx_kthread+0x10/0x10
[   15.408328]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.408352]  ? calculate_sigpending+0x7b/0xa0
[   15.408376]  ? __pfx_kthread+0x10/0x10
[   15.408399]  ret_from_fork+0x41/0x80
[   15.408419]  ? __pfx_kthread+0x10/0x10
[   15.408442]  ret_from_fork_asm+0x1a/0x30
[   15.408502]  </TASK>
[   15.408514] 
[   15.416647] Allocated by task 273:
[   15.416805]  kasan_save_stack+0x45/0x70
[   15.417027]  kasan_save_track+0x18/0x40
[   15.417275]  kasan_save_alloc_info+0x3b/0x50
[   15.417524]  __kasan_kmalloc+0xb7/0xc0
[   15.417715]  __kmalloc_cache_noprof+0x18a/0x420
[   15.417948]  kasan_atomics+0x96/0x310
[   15.418237]  kunit_try_run_case+0x1a6/0x480
[   15.418451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.418717]  kthread+0x324/0x6e0
[   15.418914]  ret_from_fork+0x41/0x80
[   15.419073]  ret_from_fork_asm+0x1a/0x30
[   15.419334] 
[   15.419441] The buggy address belongs to the object at ffff888101b3e000
[   15.419441]  which belongs to the cache kmalloc-64 of size 64
[   15.420044] The buggy address is located 0 bytes to the right of
[   15.420044]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.420590] 
[   15.420720] The buggy address belongs to the physical page:
[   15.420985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.421281] flags: 0x200000000000000(node=0|zone=2)
[   15.421444] page_type: f5(slab)
[   15.421568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.421888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.422456] page dumped because: kasan: bad access detected
[   15.422758] 
[   15.422901] Memory state around the buggy address:
[   15.423301]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423681]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423903] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.424342]                                      ^
[   15.424586]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.424913]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.425312] ==================================================================
[   15.284606] ==================================================================
[   15.285031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   15.285404] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.285718] 
[   15.285817] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.285874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.285888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.285924] Call Trace:
[   15.285946]  <TASK>
[   15.285971]  dump_stack_lvl+0x73/0xb0
[   15.286011]  print_report+0xd1/0x650
[   15.286034]  ? __virt_addr_valid+0x1db/0x2d0
[   15.286059]  ? kasan_atomics_helper+0xe79/0x5450
[   15.286081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.286107]  ? kasan_atomics_helper+0xe79/0x5450
[   15.286129]  kasan_report+0x140/0x180
[   15.286152]  ? kasan_atomics_helper+0xe79/0x5450
[   15.286177]  kasan_check_range+0x10c/0x1c0
[   15.286202]  __kasan_check_write+0x18/0x20
[   15.286225]  kasan_atomics_helper+0xe79/0x5450
[   15.286248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.286270]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.286296]  ? kasan_atomics+0x153/0x310
[   15.286323]  kasan_atomics+0x1dd/0x310
[   15.286367]  ? __pfx_kasan_atomics+0x10/0x10
[   15.286391]  ? __pfx_read_tsc+0x10/0x10
[   15.286425]  ? ktime_get_ts64+0x86/0x230
[   15.286453]  kunit_try_run_case+0x1a6/0x480
[   15.286477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286498]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.286522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.286547]  ? __kthread_parkme+0x82/0x160
[   15.286572]  ? preempt_count_sub+0x50/0x80
[   15.286598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.286683]  kthread+0x324/0x6e0
[   15.286706]  ? trace_preempt_on+0x20/0xc0
[   15.286730]  ? __pfx_kthread+0x10/0x10
[   15.286763]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.286788]  ? calculate_sigpending+0x7b/0xa0
[   15.286810]  ? __pfx_kthread+0x10/0x10
[   15.286843]  ret_from_fork+0x41/0x80
[   15.286871]  ? __pfx_kthread+0x10/0x10
[   15.286895]  ret_from_fork_asm+0x1a/0x30
[   15.286927]  </TASK>
[   15.286950] 
[   15.294645] Allocated by task 273:
[   15.294855]  kasan_save_stack+0x45/0x70
[   15.295019]  kasan_save_track+0x18/0x40
[   15.295388]  kasan_save_alloc_info+0x3b/0x50
[   15.295625]  __kasan_kmalloc+0xb7/0xc0
[   15.295805]  __kmalloc_cache_noprof+0x18a/0x420
[   15.296007]  kasan_atomics+0x96/0x310
[   15.296303]  kunit_try_run_case+0x1a6/0x480
[   15.296517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.296696]  kthread+0x324/0x6e0
[   15.296870]  ret_from_fork+0x41/0x80
[   15.297063]  ret_from_fork_asm+0x1a/0x30
[   15.297267] 
[   15.297365] The buggy address belongs to the object at ffff888101b3e000
[   15.297365]  which belongs to the cache kmalloc-64 of size 64
[   15.297897] The buggy address is located 0 bytes to the right of
[   15.297897]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.298446] 
[   15.298549] The buggy address belongs to the physical page:
[   15.298764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.299086] flags: 0x200000000000000(node=0|zone=2)
[   15.299318] page_type: f5(slab)
[   15.299449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.299780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.300110] page dumped because: kasan: bad access detected
[   15.300358] 
[   15.300466] Memory state around the buggy address:
[   15.300679]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301006]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301361] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.301671]                                      ^
[   15.301898]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302115]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302329] ==================================================================
[   14.981370] ==================================================================
[   14.981730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   14.982187] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.982521] 
[   14.982619] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.982664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.982678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.982702] Call Trace:
[   14.982752]  <TASK>
[   14.982774]  dump_stack_lvl+0x73/0xb0
[   14.982804]  print_report+0xd1/0x650
[   14.982827]  ? __virt_addr_valid+0x1db/0x2d0
[   14.982867]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.982887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.982914]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.982935]  kasan_report+0x140/0x180
[   14.982958]  ? kasan_atomics_helper+0x5ff/0x5450
[   14.982983]  kasan_check_range+0x10c/0x1c0
[   14.983007]  __kasan_check_write+0x18/0x20
[   14.983029]  kasan_atomics_helper+0x5ff/0x5450
[   14.983062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.983085]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.983111]  ? kasan_atomics+0x153/0x310
[   14.983155]  kasan_atomics+0x1dd/0x310
[   14.983191]  ? __pfx_kasan_atomics+0x10/0x10
[   14.983215]  ? __pfx_read_tsc+0x10/0x10
[   14.983252]  ? ktime_get_ts64+0x86/0x230
[   14.983305]  kunit_try_run_case+0x1a6/0x480
[   14.983343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.983378]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.983419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.983459]  ? __kthread_parkme+0x82/0x160
[   14.983483]  ? preempt_count_sub+0x50/0x80
[   14.983510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.983533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.983559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.983587]  kthread+0x324/0x6e0
[   14.983610]  ? trace_preempt_on+0x20/0xc0
[   14.983634]  ? __pfx_kthread+0x10/0x10
[   14.983658]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.983682]  ? calculate_sigpending+0x7b/0xa0
[   14.983706]  ? __pfx_kthread+0x10/0x10
[   14.983729]  ret_from_fork+0x41/0x80
[   14.983749]  ? __pfx_kthread+0x10/0x10
[   14.983772]  ret_from_fork_asm+0x1a/0x30
[   14.983805]  </TASK>
[   14.983817] 
[   14.991631] Allocated by task 273:
[   14.991793]  kasan_save_stack+0x45/0x70
[   14.991995]  kasan_save_track+0x18/0x40
[   14.992134]  kasan_save_alloc_info+0x3b/0x50
[   14.992284]  __kasan_kmalloc+0xb7/0xc0
[   14.992416]  __kmalloc_cache_noprof+0x18a/0x420
[   14.992573]  kasan_atomics+0x96/0x310
[   14.992706]  kunit_try_run_case+0x1a6/0x480
[   14.992862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.993241]  kthread+0x324/0x6e0
[   14.993420]  ret_from_fork+0x41/0x80
[   14.993730]  ret_from_fork_asm+0x1a/0x30
[   14.993964] 
[   14.994063] The buggy address belongs to the object at ffff888101b3e000
[   14.994063]  which belongs to the cache kmalloc-64 of size 64
[   14.994816] The buggy address is located 0 bytes to the right of
[   14.994816]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.995544] 
[   14.995623] The buggy address belongs to the physical page:
[   14.995832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.996087] flags: 0x200000000000000(node=0|zone=2)
[   14.996274] page_type: f5(slab)
[   14.996606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.996951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.997412] page dumped because: kasan: bad access detected
[   14.997650] 
[   14.997719] Memory state around the buggy address:
[   14.997888]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998099]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998307] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.998513]                                      ^
[   14.998663]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999033]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999573] ==================================================================
[   15.445783] ==================================================================
[   15.446297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   15.446685] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.447026] 
[   15.447176] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.447234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.447248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.447271] Call Trace:
[   15.447311]  <TASK>
[   15.447334]  dump_stack_lvl+0x73/0xb0
[   15.447363]  print_report+0xd1/0x650
[   15.447386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.447410]  ? kasan_atomics_helper+0x1218/0x5450
[   15.447431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.447481]  ? kasan_atomics_helper+0x1218/0x5450
[   15.447503]  kasan_report+0x140/0x180
[   15.447536]  ? kasan_atomics_helper+0x1218/0x5450
[   15.447562]  kasan_check_range+0x10c/0x1c0
[   15.447587]  __kasan_check_write+0x18/0x20
[   15.447639]  kasan_atomics_helper+0x1218/0x5450
[   15.447662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.447684]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.447720]  ? kasan_atomics+0x153/0x310
[   15.447746]  kasan_atomics+0x1dd/0x310
[   15.447793]  ? __pfx_kasan_atomics+0x10/0x10
[   15.447817]  ? __pfx_read_tsc+0x10/0x10
[   15.447856]  ? ktime_get_ts64+0x86/0x230
[   15.447884]  kunit_try_run_case+0x1a6/0x480
[   15.447909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.447931]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.447955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.448008]  ? __kthread_parkme+0x82/0x160
[   15.448070]  ? preempt_count_sub+0x50/0x80
[   15.448097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.448122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.448160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.448186]  kthread+0x324/0x6e0
[   15.448209]  ? trace_preempt_on+0x20/0xc0
[   15.448234]  ? __pfx_kthread+0x10/0x10
[   15.448257]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.448282]  ? calculate_sigpending+0x7b/0xa0
[   15.448305]  ? __pfx_kthread+0x10/0x10
[   15.448328]  ret_from_fork+0x41/0x80
[   15.448348]  ? __pfx_kthread+0x10/0x10
[   15.448371]  ret_from_fork_asm+0x1a/0x30
[   15.448431]  </TASK>
[   15.448444] 
[   15.457130] Allocated by task 273:
[   15.457518]  kasan_save_stack+0x45/0x70
[   15.457748]  kasan_save_track+0x18/0x40
[   15.457945]  kasan_save_alloc_info+0x3b/0x50
[   15.458092]  __kasan_kmalloc+0xb7/0xc0
[   15.458221]  __kmalloc_cache_noprof+0x18a/0x420
[   15.458395]  kasan_atomics+0x96/0x310
[   15.458703]  kunit_try_run_case+0x1a6/0x480
[   15.459095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.459410]  kthread+0x324/0x6e0
[   15.459585]  ret_from_fork+0x41/0x80
[   15.459767]  ret_from_fork_asm+0x1a/0x30
[   15.459938] 
[   15.460011] The buggy address belongs to the object at ffff888101b3e000
[   15.460011]  which belongs to the cache kmalloc-64 of size 64
[   15.460589] The buggy address is located 0 bytes to the right of
[   15.460589]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.461077] 
[   15.461218] The buggy address belongs to the physical page:
[   15.461477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.461891] flags: 0x200000000000000(node=0|zone=2)
[   15.462139] page_type: f5(slab)
[   15.462350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.462722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.463120] page dumped because: kasan: bad access detected
[   15.463421] 
[   15.463567] Memory state around the buggy address:
[   15.463816]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.464242]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.464538] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.464886]                                      ^
[   15.465227]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.465576]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.465913] ==================================================================
[   14.943150] ==================================================================
[   14.943550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   14.944036] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.944352] 
[   14.944486] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.944548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.944575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.944599] Call Trace:
[   14.944623]  <TASK>
[   14.944646]  dump_stack_lvl+0x73/0xb0
[   14.944704]  print_report+0xd1/0x650
[   14.944729]  ? __virt_addr_valid+0x1db/0x2d0
[   14.944753]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.944775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.944803]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.944825]  kasan_report+0x140/0x180
[   14.944858]  ? kasan_atomics_helper+0x4b3c/0x5450
[   14.944884]  __asan_report_store4_noabort+0x1b/0x30
[   14.944908]  kasan_atomics_helper+0x4b3c/0x5450
[   14.944931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.944953]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.944979]  ? kasan_atomics+0x153/0x310
[   14.945013]  kasan_atomics+0x1dd/0x310
[   14.945035]  ? __pfx_kasan_atomics+0x10/0x10
[   14.945070]  ? __pfx_read_tsc+0x10/0x10
[   14.945093]  ? ktime_get_ts64+0x86/0x230
[   14.945120]  kunit_try_run_case+0x1a6/0x480
[   14.945145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945167]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.945190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.945217]  ? __kthread_parkme+0x82/0x160
[   14.945240]  ? preempt_count_sub+0x50/0x80
[   14.945267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.945345]  kthread+0x324/0x6e0
[   14.945368]  ? trace_preempt_on+0x20/0xc0
[   14.945393]  ? __pfx_kthread+0x10/0x10
[   14.945426]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.945605]  ? calculate_sigpending+0x7b/0xa0
[   14.945629]  ? __pfx_kthread+0x10/0x10
[   14.945654]  ret_from_fork+0x41/0x80
[   14.945674]  ? __pfx_kthread+0x10/0x10
[   14.945697]  ret_from_fork_asm+0x1a/0x30
[   14.945730]  </TASK>
[   14.945748] 
[   14.953583] Allocated by task 273:
[   14.953791]  kasan_save_stack+0x45/0x70
[   14.954018]  kasan_save_track+0x18/0x40
[   14.954262]  kasan_save_alloc_info+0x3b/0x50
[   14.954476]  __kasan_kmalloc+0xb7/0xc0
[   14.954695]  __kmalloc_cache_noprof+0x18a/0x420
[   14.954929]  kasan_atomics+0x96/0x310
[   14.955126]  kunit_try_run_case+0x1a6/0x480
[   14.955304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.955590]  kthread+0x324/0x6e0
[   14.955824]  ret_from_fork+0x41/0x80
[   14.956030]  ret_from_fork_asm+0x1a/0x30
[   14.956230] 
[   14.956328] The buggy address belongs to the object at ffff888101b3e000
[   14.956328]  which belongs to the cache kmalloc-64 of size 64
[   14.956862] The buggy address is located 0 bytes to the right of
[   14.956862]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.957403] 
[   14.957503] The buggy address belongs to the physical page:
[   14.957679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.957928] flags: 0x200000000000000(node=0|zone=2)
[   14.958091] page_type: f5(slab)
[   14.958276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.958637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.959027] page dumped because: kasan: bad access detected
[   14.959314] 
[   14.959411] Memory state around the buggy address:
[   14.959654]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.959950]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.960410] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.960747]                                      ^
[   14.961007]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961312]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961673] ==================================================================
[   15.570603] ==================================================================
[   15.570960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   15.571253] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.571478] 
[   15.571563] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.571608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.571621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.571644] Call Trace:
[   15.571665]  <TASK>
[   15.571684]  dump_stack_lvl+0x73/0xb0
[   15.571712]  print_report+0xd1/0x650
[   15.571734]  ? __virt_addr_valid+0x1db/0x2d0
[   15.571758]  ? kasan_atomics_helper+0x1468/0x5450
[   15.571781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.571807]  ? kasan_atomics_helper+0x1468/0x5450
[   15.571829]  kasan_report+0x140/0x180
[   15.571862]  ? kasan_atomics_helper+0x1468/0x5450
[   15.571887]  kasan_check_range+0x10c/0x1c0
[   15.571929]  __kasan_check_write+0x18/0x20
[   15.571953]  kasan_atomics_helper+0x1468/0x5450
[   15.571976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.571998]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.572024]  ? kasan_atomics+0x153/0x310
[   15.572050]  kasan_atomics+0x1dd/0x310
[   15.572073]  ? __pfx_kasan_atomics+0x10/0x10
[   15.572097]  ? __pfx_read_tsc+0x10/0x10
[   15.572120]  ? ktime_get_ts64+0x86/0x230
[   15.572153]  kunit_try_run_case+0x1a6/0x480
[   15.572178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572199]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.572222]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.572248]  ? __kthread_parkme+0x82/0x160
[   15.572272]  ? preempt_count_sub+0x50/0x80
[   15.572297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.572374]  kthread+0x324/0x6e0
[   15.572396]  ? trace_preempt_on+0x20/0xc0
[   15.572421]  ? __pfx_kthread+0x10/0x10
[   15.572443]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.572468]  ? calculate_sigpending+0x7b/0xa0
[   15.572490]  ? __pfx_kthread+0x10/0x10
[   15.572514]  ret_from_fork+0x41/0x80
[   15.572533]  ? __pfx_kthread+0x10/0x10
[   15.572556]  ret_from_fork_asm+0x1a/0x30
[   15.572588]  </TASK>
[   15.572599] 
[   15.580346] Allocated by task 273:
[   15.580503]  kasan_save_stack+0x45/0x70
[   15.580662]  kasan_save_track+0x18/0x40
[   15.580833]  kasan_save_alloc_info+0x3b/0x50
[   15.581063]  __kasan_kmalloc+0xb7/0xc0
[   15.581253]  __kmalloc_cache_noprof+0x18a/0x420
[   15.581452]  kasan_atomics+0x96/0x310
[   15.581624]  kunit_try_run_case+0x1a6/0x480
[   15.581809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.582062]  kthread+0x324/0x6e0
[   15.582226]  ret_from_fork+0x41/0x80
[   15.582401]  ret_from_fork_asm+0x1a/0x30
[   15.582555] 
[   15.582632] The buggy address belongs to the object at ffff888101b3e000
[   15.582632]  which belongs to the cache kmalloc-64 of size 64
[   15.583283] The buggy address is located 0 bytes to the right of
[   15.583283]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.583690] 
[   15.583765] The buggy address belongs to the physical page:
[   15.585149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.585958] flags: 0x200000000000000(node=0|zone=2)
[   15.586535] page_type: f5(slab)
[   15.586869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.587165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.587388] page dumped because: kasan: bad access detected
[   15.587554] 
[   15.587626] Memory state around the buggy address:
[   15.587782]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.588011]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.588708] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.589402]                                      ^
[   15.589862]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590491]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591168] ==================================================================
[   14.867776] ==================================================================
[   14.868253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   14.868623] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.868860] 
[   14.868949] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.868993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.869007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.869030] Call Trace:
[   14.869051]  <TASK>
[   14.869071]  dump_stack_lvl+0x73/0xb0
[   14.869098]  print_report+0xd1/0x650
[   14.869120]  ? __virt_addr_valid+0x1db/0x2d0
[   14.869144]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.869167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.869193]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.869215]  kasan_report+0x140/0x180
[   14.869238]  ? kasan_atomics_helper+0x3e0/0x5450
[   14.869263]  kasan_check_range+0x10c/0x1c0
[   14.869287]  __kasan_check_read+0x15/0x20
[   14.869311]  kasan_atomics_helper+0x3e0/0x5450
[   14.869334]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.869356]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.869382]  ? kasan_atomics+0x153/0x310
[   14.869408]  kasan_atomics+0x1dd/0x310
[   14.869432]  ? __pfx_kasan_atomics+0x10/0x10
[   14.869456]  ? __pfx_read_tsc+0x10/0x10
[   14.869478]  ? ktime_get_ts64+0x86/0x230
[   14.869529]  kunit_try_run_case+0x1a6/0x480
[   14.869554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869577]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.869617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.869658]  ? __kthread_parkme+0x82/0x160
[   14.869695]  ? preempt_count_sub+0x50/0x80
[   14.869734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.869857]  kthread+0x324/0x6e0
[   14.869894]  ? trace_preempt_on+0x20/0xc0
[   14.869933]  ? __pfx_kthread+0x10/0x10
[   14.869969]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.870020]  ? calculate_sigpending+0x7b/0xa0
[   14.870043]  ? __pfx_kthread+0x10/0x10
[   14.870078]  ret_from_fork+0x41/0x80
[   14.870098]  ? __pfx_kthread+0x10/0x10
[   14.870121]  ret_from_fork_asm+0x1a/0x30
[   14.870153]  </TASK>
[   14.870165] 
[   14.879402] Allocated by task 273:
[   14.879649]  kasan_save_stack+0x45/0x70
[   14.879884]  kasan_save_track+0x18/0x40
[   14.880151]  kasan_save_alloc_info+0x3b/0x50
[   14.880340]  __kasan_kmalloc+0xb7/0xc0
[   14.880537]  __kmalloc_cache_noprof+0x18a/0x420
[   14.880746]  kasan_atomics+0x96/0x310
[   14.880971]  kunit_try_run_case+0x1a6/0x480
[   14.881227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.881462]  kthread+0x324/0x6e0
[   14.881632]  ret_from_fork+0x41/0x80
[   14.881782]  ret_from_fork_asm+0x1a/0x30
[   14.881987] 
[   14.882181] The buggy address belongs to the object at ffff888101b3e000
[   14.882181]  which belongs to the cache kmalloc-64 of size 64
[   14.882819] The buggy address is located 0 bytes to the right of
[   14.882819]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.883378] 
[   14.883480] The buggy address belongs to the physical page:
[   14.883749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.884126] flags: 0x200000000000000(node=0|zone=2)
[   14.884357] page_type: f5(slab)
[   14.884532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.884874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.885309] page dumped because: kasan: bad access detected
[   14.885539] 
[   14.885648] Memory state around the buggy address:
[   14.885886]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.886358]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.886740] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.887091]                                      ^
[   14.887297]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.887582]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888089] ==================================================================
[   15.635241] ==================================================================
[   15.635740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   15.636143] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.636438] 
[   15.636577] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.636627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.636640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.636664] Call Trace:
[   15.636691]  <TASK>
[   15.636718]  dump_stack_lvl+0x73/0xb0
[   15.636751]  print_report+0xd1/0x650
[   15.636775]  ? __virt_addr_valid+0x1db/0x2d0
[   15.636801]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.636823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.636861]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.636883]  kasan_report+0x140/0x180
[   15.636906]  ? kasan_atomics_helper+0x15b7/0x5450
[   15.636932]  kasan_check_range+0x10c/0x1c0
[   15.636955]  __kasan_check_write+0x18/0x20
[   15.636978]  kasan_atomics_helper+0x15b7/0x5450
[   15.637001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.637023]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.637049]  ? kasan_atomics+0x153/0x310
[   15.637075]  kasan_atomics+0x1dd/0x310
[   15.637098]  ? __pfx_kasan_atomics+0x10/0x10
[   15.637121]  ? __pfx_read_tsc+0x10/0x10
[   15.637144]  ? ktime_get_ts64+0x86/0x230
[   15.637171]  kunit_try_run_case+0x1a6/0x480
[   15.637195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.637241]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.637265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.637290]  ? __kthread_parkme+0x82/0x160
[   15.637315]  ? preempt_count_sub+0x50/0x80
[   15.637342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.637365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.637429]  kthread+0x324/0x6e0
[   15.637451]  ? trace_preempt_on+0x20/0xc0
[   15.637476]  ? __pfx_kthread+0x10/0x10
[   15.637499]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.637523]  ? calculate_sigpending+0x7b/0xa0
[   15.637547]  ? __pfx_kthread+0x10/0x10
[   15.637571]  ret_from_fork+0x41/0x80
[   15.637591]  ? __pfx_kthread+0x10/0x10
[   15.637614]  ret_from_fork_asm+0x1a/0x30
[   15.637647]  </TASK>
[   15.637659] 
[   15.645169] Allocated by task 273:
[   15.645399]  kasan_save_stack+0x45/0x70
[   15.645636]  kasan_save_track+0x18/0x40
[   15.645870]  kasan_save_alloc_info+0x3b/0x50
[   15.646133]  __kasan_kmalloc+0xb7/0xc0
[   15.646340]  __kmalloc_cache_noprof+0x18a/0x420
[   15.646498]  kasan_atomics+0x96/0x310
[   15.646632]  kunit_try_run_case+0x1a6/0x480
[   15.646850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.647244]  kthread+0x324/0x6e0
[   15.647422]  ret_from_fork+0x41/0x80
[   15.647598]  ret_from_fork_asm+0x1a/0x30
[   15.647793] 
[   15.647910] The buggy address belongs to the object at ffff888101b3e000
[   15.647910]  which belongs to the cache kmalloc-64 of size 64
[   15.648461] The buggy address is located 0 bytes to the right of
[   15.648461]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.648977] 
[   15.649100] The buggy address belongs to the physical page:
[   15.649355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.649598] flags: 0x200000000000000(node=0|zone=2)
[   15.649772] page_type: f5(slab)
[   15.649914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.650146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.650707] page dumped because: kasan: bad access detected
[   15.650968] 
[   15.651063] Memory state around the buggy address:
[   15.651286]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.651904]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.652119] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.652344]                                      ^
[   15.652498]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.652707]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.653392] ==================================================================
[   15.675205] ==================================================================
[   15.675476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   15.675829] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.676171] 
[   15.676285] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.676333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.676347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.676371] Call Trace:
[   15.676395]  <TASK>
[   15.676419]  dump_stack_lvl+0x73/0xb0
[   15.676448]  print_report+0xd1/0x650
[   15.676472]  ? __virt_addr_valid+0x1db/0x2d0
[   15.676495]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.676516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.676543]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.676564]  kasan_report+0x140/0x180
[   15.676587]  ? kasan_atomics_helper+0x16e8/0x5450
[   15.676612]  kasan_check_range+0x10c/0x1c0
[   15.676636]  __kasan_check_write+0x18/0x20
[   15.676660]  kasan_atomics_helper+0x16e8/0x5450
[   15.676682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.676704]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.676729]  ? kasan_atomics+0x153/0x310
[   15.676756]  kasan_atomics+0x1dd/0x310
[   15.676778]  ? __pfx_kasan_atomics+0x10/0x10
[   15.676802]  ? __pfx_read_tsc+0x10/0x10
[   15.676826]  ? ktime_get_ts64+0x86/0x230
[   15.676866]  kunit_try_run_case+0x1a6/0x480
[   15.676891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.676913]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.676935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.676961]  ? __kthread_parkme+0x82/0x160
[   15.676985]  ? preempt_count_sub+0x50/0x80
[   15.677014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.677037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.677075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.677102]  kthread+0x324/0x6e0
[   15.677124]  ? trace_preempt_on+0x20/0xc0
[   15.677149]  ? __pfx_kthread+0x10/0x10
[   15.677172]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.677196]  ? calculate_sigpending+0x7b/0xa0
[   15.677219]  ? __pfx_kthread+0x10/0x10
[   15.677242]  ret_from_fork+0x41/0x80
[   15.677262]  ? __pfx_kthread+0x10/0x10
[   15.677286]  ret_from_fork_asm+0x1a/0x30
[   15.677318]  </TASK>
[   15.677329] 
[   15.684439] Allocated by task 273:
[   15.684617]  kasan_save_stack+0x45/0x70
[   15.684826]  kasan_save_track+0x18/0x40
[   15.685025]  kasan_save_alloc_info+0x3b/0x50
[   15.685239]  __kasan_kmalloc+0xb7/0xc0
[   15.685425]  __kmalloc_cache_noprof+0x18a/0x420
[   15.685651]  kasan_atomics+0x96/0x310
[   15.685973]  kunit_try_run_case+0x1a6/0x480
[   15.686211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.686390]  kthread+0x324/0x6e0
[   15.686515]  ret_from_fork+0x41/0x80
[   15.686692]  ret_from_fork_asm+0x1a/0x30
[   15.686901] 
[   15.686999] The buggy address belongs to the object at ffff888101b3e000
[   15.686999]  which belongs to the cache kmalloc-64 of size 64
[   15.687820] The buggy address is located 0 bytes to the right of
[   15.687820]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.688421] 
[   15.688500] The buggy address belongs to the physical page:
[   15.688720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.689040] flags: 0x200000000000000(node=0|zone=2)
[   15.689251] page_type: f5(slab)
[   15.689424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.689759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.690066] page dumped because: kasan: bad access detected
[   15.690262] 
[   15.690333] Memory state around the buggy address:
[   15.690492]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.690710]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.692228] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.692910]                                      ^
[   15.693507]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694393]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.695063] ==================================================================
[   16.060914] ==================================================================
[   16.061387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   16.061717] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.062033] 
[   16.062363] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.062638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.062656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.062681] Call Trace:
[   16.062703]  <TASK>
[   16.062728]  dump_stack_lvl+0x73/0xb0
[   16.062804]  print_report+0xd1/0x650
[   16.062830]  ? __virt_addr_valid+0x1db/0x2d0
[   16.062864]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.062886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.062912]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.062934]  kasan_report+0x140/0x180
[   16.062957]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.062983]  __asan_report_load8_noabort+0x18/0x20
[   16.063007]  kasan_atomics_helper+0x4fb4/0x5450
[   16.063031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.063054]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.063080]  ? kasan_atomics+0x153/0x310
[   16.063106]  kasan_atomics+0x1dd/0x310
[   16.063128]  ? __pfx_kasan_atomics+0x10/0x10
[   16.063153]  ? __pfx_read_tsc+0x10/0x10
[   16.063175]  ? ktime_get_ts64+0x86/0x230
[   16.063203]  kunit_try_run_case+0x1a6/0x480
[   16.063228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063250]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.063277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.063302]  ? __kthread_parkme+0x82/0x160
[   16.063326]  ? preempt_count_sub+0x50/0x80
[   16.063353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.063404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.063430]  kthread+0x324/0x6e0
[   16.063452]  ? trace_preempt_on+0x20/0xc0
[   16.063477]  ? __pfx_kthread+0x10/0x10
[   16.063500]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.063524]  ? calculate_sigpending+0x7b/0xa0
[   16.063548]  ? __pfx_kthread+0x10/0x10
[   16.063572]  ret_from_fork+0x41/0x80
[   16.063592]  ? __pfx_kthread+0x10/0x10
[   16.063615]  ret_from_fork_asm+0x1a/0x30
[   16.063648]  </TASK>
[   16.063660] 
[   16.074351] Allocated by task 273:
[   16.074674]  kasan_save_stack+0x45/0x70
[   16.075086]  kasan_save_track+0x18/0x40
[   16.075280]  kasan_save_alloc_info+0x3b/0x50
[   16.075469]  __kasan_kmalloc+0xb7/0xc0
[   16.075638]  __kmalloc_cache_noprof+0x18a/0x420
[   16.075832]  kasan_atomics+0x96/0x310
[   16.075974]  kunit_try_run_case+0x1a6/0x480
[   16.076183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.076423]  kthread+0x324/0x6e0
[   16.076548]  ret_from_fork+0x41/0x80
[   16.076706]  ret_from_fork_asm+0x1a/0x30
[   16.076914] 
[   16.077013] The buggy address belongs to the object at ffff888101b3e000
[   16.077013]  which belongs to the cache kmalloc-64 of size 64
[   16.077489] The buggy address is located 0 bytes to the right of
[   16.077489]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.078105] 
[   16.078229] The buggy address belongs to the physical page:
[   16.078447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.078757] flags: 0x200000000000000(node=0|zone=2)
[   16.078972] page_type: f5(slab)
[   16.079144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.079460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.079740] page dumped because: kasan: bad access detected
[   16.079976] 
[   16.080046] Memory state around the buggy address:
[   16.080204]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.080479]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.080924] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.081164]                                      ^
[   16.081317]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.081628]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.081963] ==================================================================
[   15.000254] ==================================================================
[   15.000608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   15.000966] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.001309] 
[   15.001418] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.001463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.001476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.001500] Call Trace:
[   15.001521]  <TASK>
[   15.001543]  dump_stack_lvl+0x73/0xb0
[   15.001571]  print_report+0xd1/0x650
[   15.001594]  ? __virt_addr_valid+0x1db/0x2d0
[   15.001617]  ? kasan_atomics_helper+0x698/0x5450
[   15.001640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.001665]  ? kasan_atomics_helper+0x698/0x5450
[   15.001708]  kasan_report+0x140/0x180
[   15.001731]  ? kasan_atomics_helper+0x698/0x5450
[   15.001762]  kasan_check_range+0x10c/0x1c0
[   15.001786]  __kasan_check_write+0x18/0x20
[   15.001809]  kasan_atomics_helper+0x698/0x5450
[   15.001831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.001864]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.001889]  ? kasan_atomics+0x153/0x310
[   15.001915]  kasan_atomics+0x1dd/0x310
[   15.001937]  ? __pfx_kasan_atomics+0x10/0x10
[   15.001962]  ? __pfx_read_tsc+0x10/0x10
[   15.001984]  ? ktime_get_ts64+0x86/0x230
[   15.002010]  kunit_try_run_case+0x1a6/0x480
[   15.002035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.002067]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.002090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.002116]  ? __kthread_parkme+0x82/0x160
[   15.002140]  ? preempt_count_sub+0x50/0x80
[   15.002166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.002190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.002218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.002244]  kthread+0x324/0x6e0
[   15.002267]  ? trace_preempt_on+0x20/0xc0
[   15.002292]  ? __pfx_kthread+0x10/0x10
[   15.002315]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.002339]  ? calculate_sigpending+0x7b/0xa0
[   15.002362]  ? __pfx_kthread+0x10/0x10
[   15.002385]  ret_from_fork+0x41/0x80
[   15.002405]  ? __pfx_kthread+0x10/0x10
[   15.002428]  ret_from_fork_asm+0x1a/0x30
[   15.002461]  </TASK>
[   15.002473] 
[   15.009894] Allocated by task 273:
[   15.010052]  kasan_save_stack+0x45/0x70
[   15.010213]  kasan_save_track+0x18/0x40
[   15.010349]  kasan_save_alloc_info+0x3b/0x50
[   15.010498]  __kasan_kmalloc+0xb7/0xc0
[   15.010703]  __kmalloc_cache_noprof+0x18a/0x420
[   15.010941]  kasan_atomics+0x96/0x310
[   15.011128]  kunit_try_run_case+0x1a6/0x480
[   15.011339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.011602]  kthread+0x324/0x6e0
[   15.011791]  ret_from_fork+0x41/0x80
[   15.011986]  ret_from_fork_asm+0x1a/0x30
[   15.012194] 
[   15.012299] The buggy address belongs to the object at ffff888101b3e000
[   15.012299]  which belongs to the cache kmalloc-64 of size 64
[   15.012826] The buggy address is located 0 bytes to the right of
[   15.012826]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.013297] 
[   15.013373] The buggy address belongs to the physical page:
[   15.013550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.013935] flags: 0x200000000000000(node=0|zone=2)
[   15.014326] page_type: f5(slab)
[   15.014511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.014784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.015190] page dumped because: kasan: bad access detected
[   15.015405] 
[   15.015501] Memory state around the buggy address:
[   15.015694]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016005]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016307] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.016584]                                      ^
[   15.016791]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017069]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017375] ==================================================================
[   14.914266] ==================================================================
[   14.914665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   14.915226] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.915665] 
[   14.915784] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.915832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.915884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.915908] Call Trace:
[   14.915942]  <TASK>
[   14.915964]  dump_stack_lvl+0x73/0xb0
[   14.916015]  print_report+0xd1/0x650
[   14.916045]  ? __virt_addr_valid+0x1db/0x2d0
[   14.916069]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.916091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.916117]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.916139]  kasan_report+0x140/0x180
[   14.916163]  ? kasan_atomics_helper+0x4a1/0x5450
[   14.916188]  kasan_check_range+0x10c/0x1c0
[   14.916211]  __kasan_check_write+0x18/0x20
[   14.916235]  kasan_atomics_helper+0x4a1/0x5450
[   14.916258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.916280]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.916307]  ? kasan_atomics+0x153/0x310
[   14.916333]  kasan_atomics+0x1dd/0x310
[   14.916357]  ? __pfx_kasan_atomics+0x10/0x10
[   14.916381]  ? __pfx_read_tsc+0x10/0x10
[   14.916404]  ? ktime_get_ts64+0x86/0x230
[   14.916432]  kunit_try_run_case+0x1a6/0x480
[   14.916457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916480]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.916503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.916530]  ? __kthread_parkme+0x82/0x160
[   14.916554]  ? preempt_count_sub+0x50/0x80
[   14.916580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.916605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.916660]  kthread+0x324/0x6e0
[   14.916684]  ? trace_preempt_on+0x20/0xc0
[   14.916710]  ? __pfx_kthread+0x10/0x10
[   14.916734]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.916759]  ? calculate_sigpending+0x7b/0xa0
[   14.916783]  ? __pfx_kthread+0x10/0x10
[   14.916807]  ret_from_fork+0x41/0x80
[   14.916830]  ? __pfx_kthread+0x10/0x10
[   14.916868]  ret_from_fork_asm+0x1a/0x30
[   14.916902]  </TASK>
[   14.917023] 
[   14.931647] Allocated by task 273:
[   14.932240]  kasan_save_stack+0x45/0x70
[   14.932581]  kasan_save_track+0x18/0x40
[   14.932735]  kasan_save_alloc_info+0x3b/0x50
[   14.932898]  __kasan_kmalloc+0xb7/0xc0
[   14.933036]  __kmalloc_cache_noprof+0x18a/0x420
[   14.933617]  kasan_atomics+0x96/0x310
[   14.933761]  kunit_try_run_case+0x1a6/0x480
[   14.933997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.934177]  kthread+0x324/0x6e0
[   14.934525]  ret_from_fork+0x41/0x80
[   14.934938]  ret_from_fork_asm+0x1a/0x30
[   14.935452] 
[   14.935619] The buggy address belongs to the object at ffff888101b3e000
[   14.935619]  which belongs to the cache kmalloc-64 of size 64
[   14.936716] The buggy address is located 0 bytes to the right of
[   14.936716]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.937505] 
[   14.937724] The buggy address belongs to the physical page:
[   14.938263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.939053] flags: 0x200000000000000(node=0|zone=2)
[   14.939226] page_type: f5(slab)
[   14.939371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.939603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.939822] page dumped because: kasan: bad access detected
[   14.940005] 
[   14.940127] Memory state around the buggy address:
[   14.940408]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.940714]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.940937] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.941151]                                      ^
[   14.941555]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.942075]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.942470] ==================================================================
[   15.303014] ==================================================================
[   15.303374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   15.303717] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.304055] 
[   15.304165] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.304212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.304225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.304248] Call Trace:
[   15.304269]  <TASK>
[   15.304291]  dump_stack_lvl+0x73/0xb0
[   15.304319]  print_report+0xd1/0x650
[   15.304342]  ? __virt_addr_valid+0x1db/0x2d0
[   15.304366]  ? kasan_atomics_helper+0xf11/0x5450
[   15.304387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.304413]  ? kasan_atomics_helper+0xf11/0x5450
[   15.304434]  kasan_report+0x140/0x180
[   15.304457]  ? kasan_atomics_helper+0xf11/0x5450
[   15.304482]  kasan_check_range+0x10c/0x1c0
[   15.304506]  __kasan_check_write+0x18/0x20
[   15.304529]  kasan_atomics_helper+0xf11/0x5450
[   15.304571]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.304594]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.304620]  ? kasan_atomics+0x153/0x310
[   15.304646]  kasan_atomics+0x1dd/0x310
[   15.304668]  ? __pfx_kasan_atomics+0x10/0x10
[   15.304692]  ? __pfx_read_tsc+0x10/0x10
[   15.304715]  ? ktime_get_ts64+0x86/0x230
[   15.304742]  kunit_try_run_case+0x1a6/0x480
[   15.304780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.304802]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.304846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.304873]  ? __kthread_parkme+0x82/0x160
[   15.304897]  ? preempt_count_sub+0x50/0x80
[   15.304923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.304946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.304973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.305000]  kthread+0x324/0x6e0
[   15.305023]  ? trace_preempt_on+0x20/0xc0
[   15.305059]  ? __pfx_kthread+0x10/0x10
[   15.305092]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.305120]  ? calculate_sigpending+0x7b/0xa0
[   15.305143]  ? __pfx_kthread+0x10/0x10
[   15.305178]  ret_from_fork+0x41/0x80
[   15.305199]  ? __pfx_kthread+0x10/0x10
[   15.305223]  ret_from_fork_asm+0x1a/0x30
[   15.305256]  </TASK>
[   15.305268] 
[   15.312895] Allocated by task 273:
[   15.313062]  kasan_save_stack+0x45/0x70
[   15.313282]  kasan_save_track+0x18/0x40
[   15.313476]  kasan_save_alloc_info+0x3b/0x50
[   15.313701]  __kasan_kmalloc+0xb7/0xc0
[   15.313900]  __kmalloc_cache_noprof+0x18a/0x420
[   15.314166]  kasan_atomics+0x96/0x310
[   15.314354]  kunit_try_run_case+0x1a6/0x480
[   15.314573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314811]  kthread+0x324/0x6e0
[   15.315003]  ret_from_fork+0x41/0x80
[   15.315186]  ret_from_fork_asm+0x1a/0x30
[   15.315412] 
[   15.315500] The buggy address belongs to the object at ffff888101b3e000
[   15.315500]  which belongs to the cache kmalloc-64 of size 64
[   15.315984] The buggy address is located 0 bytes to the right of
[   15.315984]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.316649] 
[   15.316724] The buggy address belongs to the physical page:
[   15.316908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.317151] flags: 0x200000000000000(node=0|zone=2)
[   15.317319] page_type: f5(slab)
[   15.317444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.317736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.318172] page dumped because: kasan: bad access detected
[   15.318427] 
[   15.318521] Memory state around the buggy address:
[   15.318748]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319099]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319363] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.319577]                                      ^
[   15.319733]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.319959]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.320448] ==================================================================
[   15.654182] ==================================================================
[   15.654416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   15.654643] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.654871] 
[   15.654955] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.654999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.655013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.655106] Call Trace:
[   15.655133]  <TASK>
[   15.655154]  dump_stack_lvl+0x73/0xb0
[   15.655182]  print_report+0xd1/0x650
[   15.655204]  ? __virt_addr_valid+0x1db/0x2d0
[   15.655228]  ? kasan_atomics_helper+0x1650/0x5450
[   15.655277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.655305]  ? kasan_atomics_helper+0x1650/0x5450
[   15.655326]  kasan_report+0x140/0x180
[   15.655349]  ? kasan_atomics_helper+0x1650/0x5450
[   15.655375]  kasan_check_range+0x10c/0x1c0
[   15.655398]  __kasan_check_write+0x18/0x20
[   15.655421]  kasan_atomics_helper+0x1650/0x5450
[   15.655444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.655465]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.655491]  ? kasan_atomics+0x153/0x310
[   15.655517]  kasan_atomics+0x1dd/0x310
[   15.655541]  ? __pfx_kasan_atomics+0x10/0x10
[   15.655566]  ? __pfx_read_tsc+0x10/0x10
[   15.655588]  ? ktime_get_ts64+0x86/0x230
[   15.655615]  kunit_try_run_case+0x1a6/0x480
[   15.655641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.655663]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.655685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.655712]  ? __kthread_parkme+0x82/0x160
[   15.655735]  ? preempt_count_sub+0x50/0x80
[   15.655761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.655784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.655810]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.655849]  kthread+0x324/0x6e0
[   15.655872]  ? trace_preempt_on+0x20/0xc0
[   15.655896]  ? __pfx_kthread+0x10/0x10
[   15.655920]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.655943]  ? calculate_sigpending+0x7b/0xa0
[   15.655966]  ? __pfx_kthread+0x10/0x10
[   15.655989]  ret_from_fork+0x41/0x80
[   15.656009]  ? __pfx_kthread+0x10/0x10
[   15.656031]  ret_from_fork_asm+0x1a/0x30
[   15.656064]  </TASK>
[   15.656076] 
[   15.665101] Allocated by task 273:
[   15.665858]  kasan_save_stack+0x45/0x70
[   15.666316]  kasan_save_track+0x18/0x40
[   15.666515]  kasan_save_alloc_info+0x3b/0x50
[   15.666672]  __kasan_kmalloc+0xb7/0xc0
[   15.666990]  __kmalloc_cache_noprof+0x18a/0x420
[   15.667397]  kasan_atomics+0x96/0x310
[   15.667695]  kunit_try_run_case+0x1a6/0x480
[   15.668112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.668476]  kthread+0x324/0x6e0
[   15.668649]  ret_from_fork+0x41/0x80
[   15.668822]  ret_from_fork_asm+0x1a/0x30
[   15.668978] 
[   15.669052] The buggy address belongs to the object at ffff888101b3e000
[   15.669052]  which belongs to the cache kmalloc-64 of size 64
[   15.669697] The buggy address is located 0 bytes to the right of
[   15.669697]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.670374] 
[   15.670461] The buggy address belongs to the physical page:
[   15.670705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.670977] flags: 0x200000000000000(node=0|zone=2)
[   15.671252] page_type: f5(slab)
[   15.671462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.671805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.672185] page dumped because: kasan: bad access detected
[   15.672366] 
[   15.672439] Memory state around the buggy address:
[   15.672676]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.673010]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.673309] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.673565]                                      ^
[   15.673799]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.674066]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.674331] ==================================================================
[   15.975231] ==================================================================
[   15.975602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   15.976014] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.976353] 
[   15.976533] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.977026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.977059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.977085] Call Trace:
[   15.977122]  <TASK>
[   15.977148]  dump_stack_lvl+0x73/0xb0
[   15.977187]  print_report+0xd1/0x650
[   15.977211]  ? __virt_addr_valid+0x1db/0x2d0
[   15.977236]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.977257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.977286]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.977309]  kasan_report+0x140/0x180
[   15.977332]  ? kasan_atomics_helper+0x4f73/0x5450
[   15.977361]  __asan_report_load8_noabort+0x18/0x20
[   15.977386]  kasan_atomics_helper+0x4f73/0x5450
[   15.977410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.977432]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.977459]  ? kasan_atomics+0x153/0x310
[   15.977484]  kasan_atomics+0x1dd/0x310
[   15.977508]  ? __pfx_kasan_atomics+0x10/0x10
[   15.977532]  ? __pfx_read_tsc+0x10/0x10
[   15.977555]  ? ktime_get_ts64+0x86/0x230
[   15.977582]  kunit_try_run_case+0x1a6/0x480
[   15.977607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.977629]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.977652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.977679]  ? __kthread_parkme+0x82/0x160
[   15.977703]  ? preempt_count_sub+0x50/0x80
[   15.977729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.977759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.977786]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.977813]  kthread+0x324/0x6e0
[   15.977846]  ? trace_preempt_on+0x20/0xc0
[   15.977871]  ? __pfx_kthread+0x10/0x10
[   15.977894]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.977919]  ? calculate_sigpending+0x7b/0xa0
[   15.977982]  ? __pfx_kthread+0x10/0x10
[   15.978017]  ret_from_fork+0x41/0x80
[   15.978037]  ? __pfx_kthread+0x10/0x10
[   15.978069]  ret_from_fork_asm+0x1a/0x30
[   15.978102]  </TASK>
[   15.978114] 
[   15.985918] Allocated by task 273:
[   15.986137]  kasan_save_stack+0x45/0x70
[   15.986296]  kasan_save_track+0x18/0x40
[   15.986429]  kasan_save_alloc_info+0x3b/0x50
[   15.986574]  __kasan_kmalloc+0xb7/0xc0
[   15.986935]  __kmalloc_cache_noprof+0x18a/0x420
[   15.987289]  kasan_atomics+0x96/0x310
[   15.987474]  kunit_try_run_case+0x1a6/0x480
[   15.987669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.987960]  kthread+0x324/0x6e0
[   15.988141]  ret_from_fork+0x41/0x80
[   15.988568]  ret_from_fork_asm+0x1a/0x30
[   15.988710] 
[   15.988783] The buggy address belongs to the object at ffff888101b3e000
[   15.988783]  which belongs to the cache kmalloc-64 of size 64
[   15.989313] The buggy address is located 0 bytes to the right of
[   15.989313]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.989956] 
[   15.990054] The buggy address belongs to the physical page:
[   15.990304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.990798] flags: 0x200000000000000(node=0|zone=2)
[   15.991046] page_type: f5(slab)
[   15.991218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.991460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.991680] page dumped because: kasan: bad access detected
[   15.991856] 
[   15.991952] Memory state around the buggy address:
[   15.992332]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.992692]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.993258] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.993569]                                      ^
[   15.993796]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994202]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994520] ==================================================================
[   15.616120] ==================================================================
[   15.616536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   15.616888] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.617305] 
[   15.617446] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.617494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.617508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.617532] Call Trace:
[   15.617554]  <TASK>
[   15.617576]  dump_stack_lvl+0x73/0xb0
[   15.617606]  print_report+0xd1/0x650
[   15.617629]  ? __virt_addr_valid+0x1db/0x2d0
[   15.617653]  ? kasan_atomics_helper+0x151e/0x5450
[   15.617675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.617702]  ? kasan_atomics_helper+0x151e/0x5450
[   15.617724]  kasan_report+0x140/0x180
[   15.617753]  ? kasan_atomics_helper+0x151e/0x5450
[   15.617778]  kasan_check_range+0x10c/0x1c0
[   15.617802]  __kasan_check_write+0x18/0x20
[   15.617826]  kasan_atomics_helper+0x151e/0x5450
[   15.617858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.617880]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.617905]  ? kasan_atomics+0x153/0x310
[   15.617930]  kasan_atomics+0x1dd/0x310
[   15.617953]  ? __pfx_kasan_atomics+0x10/0x10
[   15.617977]  ? __pfx_read_tsc+0x10/0x10
[   15.618038]  ? ktime_get_ts64+0x86/0x230
[   15.618067]  kunit_try_run_case+0x1a6/0x480
[   15.618116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.618138]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.618162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.618187]  ? __kthread_parkme+0x82/0x160
[   15.618211]  ? preempt_count_sub+0x50/0x80
[   15.618237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.618260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.618287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.618346]  kthread+0x324/0x6e0
[   15.618368]  ? trace_preempt_on+0x20/0xc0
[   15.618393]  ? __pfx_kthread+0x10/0x10
[   15.618416]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.618440]  ? calculate_sigpending+0x7b/0xa0
[   15.618464]  ? __pfx_kthread+0x10/0x10
[   15.618490]  ret_from_fork+0x41/0x80
[   15.618510]  ? __pfx_kthread+0x10/0x10
[   15.618532]  ret_from_fork_asm+0x1a/0x30
[   15.618616]  </TASK>
[   15.618629] 
[   15.626135] Allocated by task 273:
[   15.626442]  kasan_save_stack+0x45/0x70
[   15.626639]  kasan_save_track+0x18/0x40
[   15.626864]  kasan_save_alloc_info+0x3b/0x50
[   15.627017]  __kasan_kmalloc+0xb7/0xc0
[   15.627344]  __kmalloc_cache_noprof+0x18a/0x420
[   15.627585]  kasan_atomics+0x96/0x310
[   15.627793]  kunit_try_run_case+0x1a6/0x480
[   15.628013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.628230]  kthread+0x324/0x6e0
[   15.628398]  ret_from_fork+0x41/0x80
[   15.628585]  ret_from_fork_asm+0x1a/0x30
[   15.628808] 
[   15.628920] The buggy address belongs to the object at ffff888101b3e000
[   15.628920]  which belongs to the cache kmalloc-64 of size 64
[   15.629409] The buggy address is located 0 bytes to the right of
[   15.629409]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.629778] 
[   15.629861] The buggy address belongs to the physical page:
[   15.630317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.630672] flags: 0x200000000000000(node=0|zone=2)
[   15.630895] page_type: f5(slab)
[   15.631028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.631390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.631720] page dumped because: kasan: bad access detected
[   15.631941] 
[   15.632012] Memory state around the buggy address:
[   15.632412]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.632631]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.633033] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.633449]                                      ^
[   15.633927]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634200]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.634413] ==================================================================
[   15.858736] ==================================================================
[   15.859087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   15.859487] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.859750] 
[   15.859873] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.859919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.859933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.859956] Call Trace:
[   15.859978]  <TASK>
[   15.860000]  dump_stack_lvl+0x73/0xb0
[   15.860029]  print_report+0xd1/0x650
[   15.860051]  ? __virt_addr_valid+0x1db/0x2d0
[   15.860086]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.860107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.860134]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.860159]  kasan_report+0x140/0x180
[   15.860182]  ? kasan_atomics_helper+0x4f32/0x5450
[   15.860207]  __asan_report_load8_noabort+0x18/0x20
[   15.860232]  kasan_atomics_helper+0x4f32/0x5450
[   15.860255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.860276]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.860302]  ? kasan_atomics+0x153/0x310
[   15.860329]  kasan_atomics+0x1dd/0x310
[   15.860351]  ? __pfx_kasan_atomics+0x10/0x10
[   15.860375]  ? __pfx_read_tsc+0x10/0x10
[   15.860399]  ? ktime_get_ts64+0x86/0x230
[   15.860426]  kunit_try_run_case+0x1a6/0x480
[   15.860453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.860475]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.860498]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.860525]  ? __kthread_parkme+0x82/0x160
[   15.860549]  ? preempt_count_sub+0x50/0x80
[   15.860575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.860598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.860625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.860652]  kthread+0x324/0x6e0
[   15.860685]  ? trace_preempt_on+0x20/0xc0
[   15.860710]  ? __pfx_kthread+0x10/0x10
[   15.860772]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.860796]  ? calculate_sigpending+0x7b/0xa0
[   15.860820]  ? __pfx_kthread+0x10/0x10
[   15.860852]  ret_from_fork+0x41/0x80
[   15.860872]  ? __pfx_kthread+0x10/0x10
[   15.860895]  ret_from_fork_asm+0x1a/0x30
[   15.860927]  </TASK>
[   15.860938] 
[   15.868206] Allocated by task 273:
[   15.868417]  kasan_save_stack+0x45/0x70
[   15.868615]  kasan_save_track+0x18/0x40
[   15.868748]  kasan_save_alloc_info+0x3b/0x50
[   15.868904]  __kasan_kmalloc+0xb7/0xc0
[   15.869037]  __kmalloc_cache_noprof+0x18a/0x420
[   15.869468]  kasan_atomics+0x96/0x310
[   15.869678]  kunit_try_run_case+0x1a6/0x480
[   15.869901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.870106]  kthread+0x324/0x6e0
[   15.870229]  ret_from_fork+0x41/0x80
[   15.870357]  ret_from_fork_asm+0x1a/0x30
[   15.870495] 
[   15.870566] The buggy address belongs to the object at ffff888101b3e000
[   15.870566]  which belongs to the cache kmalloc-64 of size 64
[   15.871660] The buggy address is located 0 bytes to the right of
[   15.871660]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.872089] 
[   15.872194] The buggy address belongs to the physical page:
[   15.872475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.872783] flags: 0x200000000000000(node=0|zone=2)
[   15.872957] page_type: f5(slab)
[   15.873081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.873659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.873968] page dumped because: kasan: bad access detected
[   15.874389] 
[   15.874489] Memory state around the buggy address:
[   15.874655]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.874892]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.875691] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.876445]                                      ^
[   15.876704]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.877013]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.877589] ==================================================================
[   15.896795] ==================================================================
[   15.897060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   15.897684] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.898059] 
[   15.898174] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.898219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.898233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.898256] Call Trace:
[   15.898278]  <TASK>
[   15.898301]  dump_stack_lvl+0x73/0xb0
[   15.898328]  print_report+0xd1/0x650
[   15.898351]  ? __virt_addr_valid+0x1db/0x2d0
[   15.898375]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.898397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.898424]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.898446]  kasan_report+0x140/0x180
[   15.898468]  ? kasan_atomics_helper+0x1d7b/0x5450
[   15.898494]  kasan_check_range+0x10c/0x1c0
[   15.898518]  __kasan_check_write+0x18/0x20
[   15.898541]  kasan_atomics_helper+0x1d7b/0x5450
[   15.898564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.898586]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.898611]  ? kasan_atomics+0x153/0x310
[   15.898637]  kasan_atomics+0x1dd/0x310
[   15.898660]  ? __pfx_kasan_atomics+0x10/0x10
[   15.898684]  ? __pfx_read_tsc+0x10/0x10
[   15.898707]  ? ktime_get_ts64+0x86/0x230
[   15.898734]  kunit_try_run_case+0x1a6/0x480
[   15.898783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.898806]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.898829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.898864]  ? __kthread_parkme+0x82/0x160
[   15.898888]  ? preempt_count_sub+0x50/0x80
[   15.898915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.898939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.898966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.898993]  kthread+0x324/0x6e0
[   15.899016]  ? trace_preempt_on+0x20/0xc0
[   15.899041]  ? __pfx_kthread+0x10/0x10
[   15.899064]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.899088]  ? calculate_sigpending+0x7b/0xa0
[   15.899111]  ? __pfx_kthread+0x10/0x10
[   15.899135]  ret_from_fork+0x41/0x80
[   15.899155]  ? __pfx_kthread+0x10/0x10
[   15.899178]  ret_from_fork_asm+0x1a/0x30
[   15.899229]  </TASK>
[   15.899240] 
[   15.906450] Allocated by task 273:
[   15.906671]  kasan_save_stack+0x45/0x70
[   15.906889]  kasan_save_track+0x18/0x40
[   15.907095]  kasan_save_alloc_info+0x3b/0x50
[   15.907291]  __kasan_kmalloc+0xb7/0xc0
[   15.907420]  __kmalloc_cache_noprof+0x18a/0x420
[   15.907572]  kasan_atomics+0x96/0x310
[   15.907707]  kunit_try_run_case+0x1a6/0x480
[   15.907859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908034]  kthread+0x324/0x6e0
[   15.908154]  ret_from_fork+0x41/0x80
[   15.908339]  ret_from_fork_asm+0x1a/0x30
[   15.908606] 
[   15.908735] The buggy address belongs to the object at ffff888101b3e000
[   15.908735]  which belongs to the cache kmalloc-64 of size 64
[   15.909440] The buggy address is located 0 bytes to the right of
[   15.909440]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.910505] 
[   15.910721] The buggy address belongs to the physical page:
[   15.911042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.911381] flags: 0x200000000000000(node=0|zone=2)
[   15.911551] page_type: f5(slab)
[   15.911677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.911946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.912343] page dumped because: kasan: bad access detected
[   15.912676] 
[   15.912902] Memory state around the buggy address:
[   15.913271]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913582]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.913798] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.914016]                                      ^
[   15.914228]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.914616]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.915204] ==================================================================
[   15.765656] ==================================================================
[   15.766021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   15.766461] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.766966] 
[   15.767079] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.767126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.767139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.767162] Call Trace:
[   15.767184]  <TASK>
[   15.767205]  dump_stack_lvl+0x73/0xb0
[   15.767235]  print_report+0xd1/0x650
[   15.767258]  ? __virt_addr_valid+0x1db/0x2d0
[   15.767281]  ? kasan_atomics_helper+0x194b/0x5450
[   15.767303]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.767329]  ? kasan_atomics_helper+0x194b/0x5450
[   15.767352]  kasan_report+0x140/0x180
[   15.767374]  ? kasan_atomics_helper+0x194b/0x5450
[   15.767401]  kasan_check_range+0x10c/0x1c0
[   15.767424]  __kasan_check_write+0x18/0x20
[   15.767447]  kasan_atomics_helper+0x194b/0x5450
[   15.767472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.767494]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.767519]  ? kasan_atomics+0x153/0x310
[   15.767545]  kasan_atomics+0x1dd/0x310
[   15.767568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.767592]  ? __pfx_read_tsc+0x10/0x10
[   15.767616]  ? ktime_get_ts64+0x86/0x230
[   15.767642]  kunit_try_run_case+0x1a6/0x480
[   15.767665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.767698]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.767720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.767747]  ? __kthread_parkme+0x82/0x160
[   15.767770]  ? preempt_count_sub+0x50/0x80
[   15.767796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.767820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.767884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.767912]  kthread+0x324/0x6e0
[   15.767934]  ? trace_preempt_on+0x20/0xc0
[   15.767960]  ? __pfx_kthread+0x10/0x10
[   15.767983]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.768008]  ? calculate_sigpending+0x7b/0xa0
[   15.768031]  ? __pfx_kthread+0x10/0x10
[   15.768054]  ret_from_fork+0x41/0x80
[   15.768074]  ? __pfx_kthread+0x10/0x10
[   15.768115]  ret_from_fork_asm+0x1a/0x30
[   15.768148]  </TASK>
[   15.768160] 
[   15.775630] Allocated by task 273:
[   15.775846]  kasan_save_stack+0x45/0x70
[   15.776080]  kasan_save_track+0x18/0x40
[   15.776273]  kasan_save_alloc_info+0x3b/0x50
[   15.776482]  __kasan_kmalloc+0xb7/0xc0
[   15.776672]  __kmalloc_cache_noprof+0x18a/0x420
[   15.776890]  kasan_atomics+0x96/0x310
[   15.777091]  kunit_try_run_case+0x1a6/0x480
[   15.777304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.777539]  kthread+0x324/0x6e0
[   15.777704]  ret_from_fork+0x41/0x80
[   15.777888]  ret_from_fork_asm+0x1a/0x30
[   15.778116] 
[   15.778219] The buggy address belongs to the object at ffff888101b3e000
[   15.778219]  which belongs to the cache kmalloc-64 of size 64
[   15.778709] The buggy address is located 0 bytes to the right of
[   15.778709]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.779254] 
[   15.779360] The buggy address belongs to the physical page:
[   15.779592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.779946] flags: 0x200000000000000(node=0|zone=2)
[   15.780145] page_type: f5(slab)
[   15.780327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.780652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.780889] page dumped because: kasan: bad access detected
[   15.781062] 
[   15.781135] Memory state around the buggy address:
[   15.781293]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781604]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781940] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.782253]                                      ^
[   15.782518]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.782845]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.783316] ==================================================================
[   15.220810] ==================================================================
[   15.221119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   15.221880] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.222286] 
[   15.222412] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.222465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.222478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.222501] Call Trace:
[   15.222524]  <TASK>
[   15.222584]  dump_stack_lvl+0x73/0xb0
[   15.222634]  print_report+0xd1/0x650
[   15.222685]  ? __virt_addr_valid+0x1db/0x2d0
[   15.222722]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.222758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.222789]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.222811]  kasan_report+0x140/0x180
[   15.222833]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.222873]  __asan_report_load4_noabort+0x18/0x20
[   15.222897]  kasan_atomics_helper+0x4a86/0x5450
[   15.222920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.222942]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.222967]  ? kasan_atomics+0x153/0x310
[   15.222994]  kasan_atomics+0x1dd/0x310
[   15.223018]  ? __pfx_kasan_atomics+0x10/0x10
[   15.223041]  ? __pfx_read_tsc+0x10/0x10
[   15.223064]  ? ktime_get_ts64+0x86/0x230
[   15.223092]  kunit_try_run_case+0x1a6/0x480
[   15.223117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.223139]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.223163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.223189]  ? __kthread_parkme+0x82/0x160
[   15.223213]  ? preempt_count_sub+0x50/0x80
[   15.223239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.223262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.223289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.223315]  kthread+0x324/0x6e0
[   15.223338]  ? trace_preempt_on+0x20/0xc0
[   15.223362]  ? __pfx_kthread+0x10/0x10
[   15.223386]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.223423]  ? calculate_sigpending+0x7b/0xa0
[   15.223447]  ? __pfx_kthread+0x10/0x10
[   15.223470]  ret_from_fork+0x41/0x80
[   15.223490]  ? __pfx_kthread+0x10/0x10
[   15.223513]  ret_from_fork_asm+0x1a/0x30
[   15.223546]  </TASK>
[   15.223558] 
[   15.230970] Allocated by task 273:
[   15.231263]  kasan_save_stack+0x45/0x70
[   15.231493]  kasan_save_track+0x18/0x40
[   15.231652]  kasan_save_alloc_info+0x3b/0x50
[   15.231892]  __kasan_kmalloc+0xb7/0xc0
[   15.232068]  __kmalloc_cache_noprof+0x18a/0x420
[   15.232260]  kasan_atomics+0x96/0x310
[   15.232448]  kunit_try_run_case+0x1a6/0x480
[   15.232634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.232877]  kthread+0x324/0x6e0
[   15.233073]  ret_from_fork+0x41/0x80
[   15.233234]  ret_from_fork_asm+0x1a/0x30
[   15.233427] 
[   15.233508] The buggy address belongs to the object at ffff888101b3e000
[   15.233508]  which belongs to the cache kmalloc-64 of size 64
[   15.234034] The buggy address is located 0 bytes to the right of
[   15.234034]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.234557] 
[   15.234635] The buggy address belongs to the physical page:
[   15.234907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.235492] flags: 0x200000000000000(node=0|zone=2)
[   15.235703] page_type: f5(slab)
[   15.235828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.236278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.236652] page dumped because: kasan: bad access detected
[   15.237050] 
[   15.237150] Memory state around the buggy address:
[   15.237414]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237772]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238231] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.238553]                                      ^
[   15.238710]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238932]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.239141] ==================================================================
[   14.826778] ==================================================================
[   14.827269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   14.827777] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.828093] 
[   14.828238] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.828299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828347] Call Trace:
[   14.828370]  <TASK>
[   14.828391]  dump_stack_lvl+0x73/0xb0
[   14.828420]  print_report+0xd1/0x650
[   14.828443]  ? __virt_addr_valid+0x1db/0x2d0
[   14.828465]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.828486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.828529]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.828550]  kasan_report+0x140/0x180
[   14.828571]  ? kasan_atomics_helper+0x4b8a/0x5450
[   14.828596]  __asan_report_load4_noabort+0x18/0x20
[   14.828619]  kasan_atomics_helper+0x4b8a/0x5450
[   14.828641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.828662]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.828688]  ? kasan_atomics+0x153/0x310
[   14.828714]  kasan_atomics+0x1dd/0x310
[   14.828735]  ? __pfx_kasan_atomics+0x10/0x10
[   14.828759]  ? __pfx_read_tsc+0x10/0x10
[   14.828781]  ? ktime_get_ts64+0x86/0x230
[   14.828808]  kunit_try_run_case+0x1a6/0x480
[   14.828871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828895]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.828918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.828943]  ? __kthread_parkme+0x82/0x160
[   14.828966]  ? preempt_count_sub+0x50/0x80
[   14.828998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829108]  kthread+0x324/0x6e0
[   14.829142]  ? trace_preempt_on+0x20/0xc0
[   14.829166]  ? __pfx_kthread+0x10/0x10
[   14.829187]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.829212]  ? calculate_sigpending+0x7b/0xa0
[   14.829234]  ? __pfx_kthread+0x10/0x10
[   14.829255]  ret_from_fork+0x41/0x80
[   14.829275]  ? __pfx_kthread+0x10/0x10
[   14.829296]  ret_from_fork_asm+0x1a/0x30
[   14.829328]  </TASK>
[   14.829339] 
[   14.837669] Allocated by task 273:
[   14.837860]  kasan_save_stack+0x45/0x70
[   14.838093]  kasan_save_track+0x18/0x40
[   14.838366]  kasan_save_alloc_info+0x3b/0x50
[   14.838569]  __kasan_kmalloc+0xb7/0xc0
[   14.838755]  __kmalloc_cache_noprof+0x18a/0x420
[   14.838965]  kasan_atomics+0x96/0x310
[   14.839186]  kunit_try_run_case+0x1a6/0x480
[   14.839361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.839638]  kthread+0x324/0x6e0
[   14.839818]  ret_from_fork+0x41/0x80
[   14.840120]  ret_from_fork_asm+0x1a/0x30
[   14.840444] 
[   14.840541] The buggy address belongs to the object at ffff888101b3e000
[   14.840541]  which belongs to the cache kmalloc-64 of size 64
[   14.841091] The buggy address is located 0 bytes to the right of
[   14.841091]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.841534] 
[   14.841650] The buggy address belongs to the physical page:
[   14.841924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.842528] flags: 0x200000000000000(node=0|zone=2)
[   14.842943] page_type: f5(slab)
[   14.843171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.843547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.843980] page dumped because: kasan: bad access detected
[   14.844300] 
[   14.844392] Memory state around the buggy address:
[   14.844612]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.844928]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.845416] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.845644]                                      ^
[   14.845902]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846302]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846556] ==================================================================
[   15.466790] ==================================================================
[   15.467417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   15.467757] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.467999] 
[   15.468088] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.468133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.468157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.468181] Call Trace:
[   15.468202]  <TASK>
[   15.468256]  dump_stack_lvl+0x73/0xb0
[   15.468286]  print_report+0xd1/0x650
[   15.468309]  ? __virt_addr_valid+0x1db/0x2d0
[   15.468345]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.468367]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.468394]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.468416]  kasan_report+0x140/0x180
[   15.468439]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.468465]  __asan_report_load4_noabort+0x18/0x20
[   15.468489]  kasan_atomics_helper+0x49ea/0x5450
[   15.468512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.468535]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.468588]  ? kasan_atomics+0x153/0x310
[   15.468614]  kasan_atomics+0x1dd/0x310
[   15.468647]  ? __pfx_kasan_atomics+0x10/0x10
[   15.468671]  ? __pfx_read_tsc+0x10/0x10
[   15.468695]  ? ktime_get_ts64+0x86/0x230
[   15.468748]  kunit_try_run_case+0x1a6/0x480
[   15.468773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.468805]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.468829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.468865]  ? __kthread_parkme+0x82/0x160
[   15.468916]  ? preempt_count_sub+0x50/0x80
[   15.468942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.468978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.469057]  kthread+0x324/0x6e0
[   15.469081]  ? trace_preempt_on+0x20/0xc0
[   15.469106]  ? __pfx_kthread+0x10/0x10
[   15.469151]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.469176]  ? calculate_sigpending+0x7b/0xa0
[   15.469199]  ? __pfx_kthread+0x10/0x10
[   15.469223]  ret_from_fork+0x41/0x80
[   15.469243]  ? __pfx_kthread+0x10/0x10
[   15.469266]  ret_from_fork_asm+0x1a/0x30
[   15.469300]  </TASK>
[   15.469311] 
[   15.477716] Allocated by task 273:
[   15.477950]  kasan_save_stack+0x45/0x70
[   15.478183]  kasan_save_track+0x18/0x40
[   15.478444]  kasan_save_alloc_info+0x3b/0x50
[   15.478743]  __kasan_kmalloc+0xb7/0xc0
[   15.478957]  __kmalloc_cache_noprof+0x18a/0x420
[   15.479361]  kasan_atomics+0x96/0x310
[   15.479550]  kunit_try_run_case+0x1a6/0x480
[   15.479757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480022]  kthread+0x324/0x6e0
[   15.480208]  ret_from_fork+0x41/0x80
[   15.480393]  ret_from_fork_asm+0x1a/0x30
[   15.480591] 
[   15.480723] The buggy address belongs to the object at ffff888101b3e000
[   15.480723]  which belongs to the cache kmalloc-64 of size 64
[   15.481372] The buggy address is located 0 bytes to the right of
[   15.481372]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.481949] 
[   15.482028] The buggy address belongs to the physical page:
[   15.482421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.482736] flags: 0x200000000000000(node=0|zone=2)
[   15.482916] page_type: f5(slab)
[   15.483045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.483347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.483691] page dumped because: kasan: bad access detected
[   15.483957] 
[   15.484083] Memory state around the buggy address:
[   15.484393]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.484814]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.485300] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.485564]                                      ^
[   15.485724]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.485953]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486541] ==================================================================
[   15.487294] ==================================================================
[   15.487719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   15.488150] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.488499] 
[   15.488648] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.488734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.488748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.488797] Call Trace:
[   15.488848]  <TASK>
[   15.488869]  dump_stack_lvl+0x73/0xb0
[   15.488912]  print_report+0xd1/0x650
[   15.488936]  ? __virt_addr_valid+0x1db/0x2d0
[   15.488979]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.489002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.489040]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.489062]  kasan_report+0x140/0x180
[   15.489085]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.489111]  kasan_check_range+0x10c/0x1c0
[   15.489135]  __kasan_check_write+0x18/0x20
[   15.489158]  kasan_atomics_helper+0x12e7/0x5450
[   15.489182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.489204]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.489230]  ? kasan_atomics+0x153/0x310
[   15.489256]  kasan_atomics+0x1dd/0x310
[   15.489279]  ? __pfx_kasan_atomics+0x10/0x10
[   15.489303]  ? __pfx_read_tsc+0x10/0x10
[   15.489326]  ? ktime_get_ts64+0x86/0x230
[   15.489353]  kunit_try_run_case+0x1a6/0x480
[   15.489379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489401]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.489424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.489451]  ? __kthread_parkme+0x82/0x160
[   15.489474]  ? preempt_count_sub+0x50/0x80
[   15.489500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.489562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.489589]  kthread+0x324/0x6e0
[   15.489611]  ? trace_preempt_on+0x20/0xc0
[   15.489663]  ? __pfx_kthread+0x10/0x10
[   15.489686]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.489711]  ? calculate_sigpending+0x7b/0xa0
[   15.489772]  ? __pfx_kthread+0x10/0x10
[   15.489796]  ret_from_fork+0x41/0x80
[   15.489816]  ? __pfx_kthread+0x10/0x10
[   15.489859]  ret_from_fork_asm+0x1a/0x30
[   15.489894]  </TASK>
[   15.489906] 
[   15.502113] Allocated by task 273:
[   15.502333]  kasan_save_stack+0x45/0x70
[   15.502799]  kasan_save_track+0x18/0x40
[   15.502968]  kasan_save_alloc_info+0x3b/0x50
[   15.503471]  __kasan_kmalloc+0xb7/0xc0
[   15.503972]  __kmalloc_cache_noprof+0x18a/0x420
[   15.504533]  kasan_atomics+0x96/0x310
[   15.504861]  kunit_try_run_case+0x1a6/0x480
[   15.505020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505199]  kthread+0x324/0x6e0
[   15.505329]  ret_from_fork+0x41/0x80
[   15.505461]  ret_from_fork_asm+0x1a/0x30
[   15.505606] 
[   15.505681] The buggy address belongs to the object at ffff888101b3e000
[   15.505681]  which belongs to the cache kmalloc-64 of size 64
[   15.507073] The buggy address is located 0 bytes to the right of
[   15.507073]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.508240] 
[   15.508446] The buggy address belongs to the physical page:
[   15.508956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.509667] flags: 0x200000000000000(node=0|zone=2)
[   15.510141] page_type: f5(slab)
[   15.510441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.511127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.511786] page dumped because: kasan: bad access detected
[   15.512295] 
[   15.512460] Memory state around the buggy address:
[   15.512624]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.512849]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.513090] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.513714]                                      ^
[   15.514196]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.514810]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.515475] ==================================================================
[   15.783985] ==================================================================
[   15.784375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   15.784659] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.784898] 
[   15.784985] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.785029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.785042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.785066] Call Trace:
[   15.785087]  <TASK>
[   15.785107]  dump_stack_lvl+0x73/0xb0
[   15.785134]  print_report+0xd1/0x650
[   15.785176]  ? __virt_addr_valid+0x1db/0x2d0
[   15.785200]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.785221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.785247]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.785272]  kasan_report+0x140/0x180
[   15.785294]  ? kasan_atomics_helper+0x19e4/0x5450
[   15.785321]  kasan_check_range+0x10c/0x1c0
[   15.785345]  __kasan_check_write+0x18/0x20
[   15.785369]  kasan_atomics_helper+0x19e4/0x5450
[   15.785392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.785414]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.785439]  ? kasan_atomics+0x153/0x310
[   15.785466]  kasan_atomics+0x1dd/0x310
[   15.785490]  ? __pfx_kasan_atomics+0x10/0x10
[   15.785515]  ? __pfx_read_tsc+0x10/0x10
[   15.785538]  ? ktime_get_ts64+0x86/0x230
[   15.785564]  kunit_try_run_case+0x1a6/0x480
[   15.785589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785612]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.785635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.785660]  ? __kthread_parkme+0x82/0x160
[   15.785684]  ? preempt_count_sub+0x50/0x80
[   15.785728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.785785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.785811]  kthread+0x324/0x6e0
[   15.785834]  ? trace_preempt_on+0x20/0xc0
[   15.785867]  ? __pfx_kthread+0x10/0x10
[   15.785891]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.785914]  ? calculate_sigpending+0x7b/0xa0
[   15.785937]  ? __pfx_kthread+0x10/0x10
[   15.785960]  ret_from_fork+0x41/0x80
[   15.785980]  ? __pfx_kthread+0x10/0x10
[   15.786003]  ret_from_fork_asm+0x1a/0x30
[   15.786035]  </TASK>
[   15.786046] 
[   15.794108] Allocated by task 273:
[   15.794310]  kasan_save_stack+0x45/0x70
[   15.794525]  kasan_save_track+0x18/0x40
[   15.794715]  kasan_save_alloc_info+0x3b/0x50
[   15.794924]  __kasan_kmalloc+0xb7/0xc0
[   15.795267]  __kmalloc_cache_noprof+0x18a/0x420
[   15.796242]  kasan_atomics+0x96/0x310
[   15.796450]  kunit_try_run_case+0x1a6/0x480
[   15.796621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796864]  kthread+0x324/0x6e0
[   15.797030]  ret_from_fork+0x41/0x80
[   15.797235]  ret_from_fork_asm+0x1a/0x30
[   15.797407] 
[   15.797524] The buggy address belongs to the object at ffff888101b3e000
[   15.797524]  which belongs to the cache kmalloc-64 of size 64
[   15.797926] The buggy address is located 0 bytes to the right of
[   15.797926]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.798523] 
[   15.798602] The buggy address belongs to the physical page:
[   15.798802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.799352] flags: 0x200000000000000(node=0|zone=2)
[   15.799554] page_type: f5(slab)
[   15.799716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.800096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.800320] page dumped because: kasan: bad access detected
[   15.800486] 
[   15.800586] Memory state around the buggy address:
[   15.800847]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801354]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.801668] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.801971]                                      ^
[   15.802239]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802553]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802772] ==================================================================
[   15.803505] ==================================================================
[   15.803847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   15.804160] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.804493] 
[   15.804606] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.804651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.804664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.804711] Call Trace:
[   15.804732]  <TASK>
[   15.804753]  dump_stack_lvl+0x73/0xb0
[   15.804783]  print_report+0xd1/0x650
[   15.804806]  ? __virt_addr_valid+0x1db/0x2d0
[   15.804829]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.804861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.804906]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.804928]  kasan_report+0x140/0x180
[   15.804951]  ? kasan_atomics_helper+0x1a80/0x5450
[   15.804977]  kasan_check_range+0x10c/0x1c0
[   15.805002]  __kasan_check_write+0x18/0x20
[   15.805025]  kasan_atomics_helper+0x1a80/0x5450
[   15.805048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.805071]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.805096]  ? kasan_atomics+0x153/0x310
[   15.805122]  kasan_atomics+0x1dd/0x310
[   15.805159]  ? __pfx_kasan_atomics+0x10/0x10
[   15.805183]  ? __pfx_read_tsc+0x10/0x10
[   15.805206]  ? ktime_get_ts64+0x86/0x230
[   15.805241]  kunit_try_run_case+0x1a6/0x480
[   15.805283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805308]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.805332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.805358]  ? __kthread_parkme+0x82/0x160
[   15.805382]  ? preempt_count_sub+0x50/0x80
[   15.805408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.805473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.805500]  kthread+0x324/0x6e0
[   15.805522]  ? trace_preempt_on+0x20/0xc0
[   15.805547]  ? __pfx_kthread+0x10/0x10
[   15.805569]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.805594]  ? calculate_sigpending+0x7b/0xa0
[   15.805617]  ? __pfx_kthread+0x10/0x10
[   15.805640]  ret_from_fork+0x41/0x80
[   15.805659]  ? __pfx_kthread+0x10/0x10
[   15.805682]  ret_from_fork_asm+0x1a/0x30
[   15.805715]  </TASK>
[   15.805726] 
[   15.813446] Allocated by task 273:
[   15.813692]  kasan_save_stack+0x45/0x70
[   15.813929]  kasan_save_track+0x18/0x40
[   15.814070]  kasan_save_alloc_info+0x3b/0x50
[   15.814222]  __kasan_kmalloc+0xb7/0xc0
[   15.814409]  __kmalloc_cache_noprof+0x18a/0x420
[   15.814740]  kasan_atomics+0x96/0x310
[   15.814939]  kunit_try_run_case+0x1a6/0x480
[   15.815177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815502]  kthread+0x324/0x6e0
[   15.815642]  ret_from_fork+0x41/0x80
[   15.815773]  ret_from_fork_asm+0x1a/0x30
[   15.815925] 
[   15.815999] The buggy address belongs to the object at ffff888101b3e000
[   15.815999]  which belongs to the cache kmalloc-64 of size 64
[   15.816401] The buggy address is located 0 bytes to the right of
[   15.816401]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.816989] 
[   15.817093] The buggy address belongs to the physical page:
[   15.817404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.817796] flags: 0x200000000000000(node=0|zone=2)
[   15.818094] page_type: f5(slab)
[   15.818230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818777] page dumped because: kasan: bad access detected
[   15.819053] 
[   15.819150] Memory state around the buggy address:
[   15.819386]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819628]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819853] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820188]                                      ^
[   15.820414]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820866]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.821081] ==================================================================
[   15.821892] ==================================================================
[   15.822215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   15.822539] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.822801] 
[   15.822900] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.822947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.822961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.822984] Call Trace:
[   15.823006]  <TASK>
[   15.823028]  dump_stack_lvl+0x73/0xb0
[   15.823055]  print_report+0xd1/0x650
[   15.823078]  ? __virt_addr_valid+0x1db/0x2d0
[   15.823132]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.823154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.823181]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.823202]  kasan_report+0x140/0x180
[   15.823225]  ? kasan_atomics_helper+0x1b23/0x5450
[   15.823251]  kasan_check_range+0x10c/0x1c0
[   15.823274]  __kasan_check_write+0x18/0x20
[   15.823298]  kasan_atomics_helper+0x1b23/0x5450
[   15.823321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.823344]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.823369]  ? kasan_atomics+0x153/0x310
[   15.823395]  kasan_atomics+0x1dd/0x310
[   15.823418]  ? __pfx_kasan_atomics+0x10/0x10
[   15.823443]  ? __pfx_read_tsc+0x10/0x10
[   15.823466]  ? ktime_get_ts64+0x86/0x230
[   15.823492]  kunit_try_run_case+0x1a6/0x480
[   15.823518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823539]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.823562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.823588]  ? __kthread_parkme+0x82/0x160
[   15.823612]  ? preempt_count_sub+0x50/0x80
[   15.823638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.823714]  kthread+0x324/0x6e0
[   15.823737]  ? trace_preempt_on+0x20/0xc0
[   15.823780]  ? __pfx_kthread+0x10/0x10
[   15.823803]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.823827]  ? calculate_sigpending+0x7b/0xa0
[   15.823862]  ? __pfx_kthread+0x10/0x10
[   15.823885]  ret_from_fork+0x41/0x80
[   15.823906]  ? __pfx_kthread+0x10/0x10
[   15.823928]  ret_from_fork_asm+0x1a/0x30
[   15.823961]  </TASK>
[   15.823973] 
[   15.831639] Allocated by task 273:
[   15.831795]  kasan_save_stack+0x45/0x70
[   15.832007]  kasan_save_track+0x18/0x40
[   15.832217]  kasan_save_alloc_info+0x3b/0x50
[   15.832506]  __kasan_kmalloc+0xb7/0xc0
[   15.832643]  __kmalloc_cache_noprof+0x18a/0x420
[   15.832800]  kasan_atomics+0x96/0x310
[   15.832945]  kunit_try_run_case+0x1a6/0x480
[   15.833094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833316]  kthread+0x324/0x6e0
[   15.833474]  ret_from_fork+0x41/0x80
[   15.833629]  ret_from_fork_asm+0x1a/0x30
[   15.833790] 
[   15.833875] The buggy address belongs to the object at ffff888101b3e000
[   15.833875]  which belongs to the cache kmalloc-64 of size 64
[   15.834478] The buggy address is located 0 bytes to the right of
[   15.834478]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.835035] 
[   15.835110] The buggy address belongs to the physical page:
[   15.835285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.835937] flags: 0x200000000000000(node=0|zone=2)
[   15.836195] page_type: f5(slab)
[   15.836371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.836717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.837034] page dumped because: kasan: bad access detected
[   15.837270] 
[   15.837343] Memory state around the buggy address:
[   15.837567]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837868]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838165] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.838484]                                      ^
[   15.838710]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.838988]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.839299] ==================================================================
[   15.916068] ==================================================================
[   15.916429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   15.916861] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.917193] 
[   15.917312] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.917394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.917408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.917431] Call Trace:
[   15.917454]  <TASK>
[   15.917476]  dump_stack_lvl+0x73/0xb0
[   15.917537]  print_report+0xd1/0x650
[   15.917560]  ? __virt_addr_valid+0x1db/0x2d0
[   15.917584]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.917606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.917631]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.917653]  kasan_report+0x140/0x180
[   15.917675]  ? kasan_atomics_helper+0x1e13/0x5450
[   15.917731]  kasan_check_range+0x10c/0x1c0
[   15.917761]  __kasan_check_write+0x18/0x20
[   15.917785]  kasan_atomics_helper+0x1e13/0x5450
[   15.917808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.917873]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.917902]  ? kasan_atomics+0x153/0x310
[   15.917928]  kasan_atomics+0x1dd/0x310
[   15.917951]  ? __pfx_kasan_atomics+0x10/0x10
[   15.918005]  ? __pfx_read_tsc+0x10/0x10
[   15.918029]  ? ktime_get_ts64+0x86/0x230
[   15.918056]  kunit_try_run_case+0x1a6/0x480
[   15.918090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918113]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.918135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.918194]  ? __kthread_parkme+0x82/0x160
[   15.918218]  ? preempt_count_sub+0x50/0x80
[   15.918244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.918267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.918321]  kthread+0x324/0x6e0
[   15.918343]  ? trace_preempt_on+0x20/0xc0
[   15.918368]  ? __pfx_kthread+0x10/0x10
[   15.918392]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.918416]  ? calculate_sigpending+0x7b/0xa0
[   15.918440]  ? __pfx_kthread+0x10/0x10
[   15.918491]  ret_from_fork+0x41/0x80
[   15.918534]  ? __pfx_kthread+0x10/0x10
[   15.918581]  ret_from_fork_asm+0x1a/0x30
[   15.918636]  </TASK>
[   15.918649] 
[   15.926699] Allocated by task 273:
[   15.926928]  kasan_save_stack+0x45/0x70
[   15.927227]  kasan_save_track+0x18/0x40
[   15.927432]  kasan_save_alloc_info+0x3b/0x50
[   15.927656]  __kasan_kmalloc+0xb7/0xc0
[   15.927869]  __kmalloc_cache_noprof+0x18a/0x420
[   15.928115]  kasan_atomics+0x96/0x310
[   15.928253]  kunit_try_run_case+0x1a6/0x480
[   15.928397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.928568]  kthread+0x324/0x6e0
[   15.928741]  ret_from_fork+0x41/0x80
[   15.928936]  ret_from_fork_asm+0x1a/0x30
[   15.929221] 
[   15.929463] The buggy address belongs to the object at ffff888101b3e000
[   15.929463]  which belongs to the cache kmalloc-64 of size 64
[   15.930088] The buggy address is located 0 bytes to the right of
[   15.930088]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.930525] 
[   15.930599] The buggy address belongs to the physical page:
[   15.930807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.931322] flags: 0x200000000000000(node=0|zone=2)
[   15.931623] page_type: f5(slab)
[   15.931750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.932108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.932467] page dumped because: kasan: bad access detected
[   15.932695] 
[   15.932767] Memory state around the buggy address:
[   15.932934]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.933438]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.933755] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.934108]                                      ^
[   15.934343]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.934659]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.934948] ==================================================================
[   16.141258] ==================================================================
[   16.142173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   16.142625] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.143182] 
[   16.143389] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.143450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.143464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.143489] Call Trace:
[   16.143511]  <TASK>
[   16.143534]  dump_stack_lvl+0x73/0xb0
[   16.143597]  print_report+0xd1/0x650
[   16.143620]  ? __virt_addr_valid+0x1db/0x2d0
[   16.143655]  ? kasan_atomics_helper+0x5117/0x5450
[   16.143678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.143704]  ? kasan_atomics_helper+0x5117/0x5450
[   16.143726]  kasan_report+0x140/0x180
[   16.143749]  ? kasan_atomics_helper+0x5117/0x5450
[   16.143774]  __asan_report_load8_noabort+0x18/0x20
[   16.143798]  kasan_atomics_helper+0x5117/0x5450
[   16.143822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.143854]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.143880]  ? kasan_atomics+0x153/0x310
[   16.143906]  kasan_atomics+0x1dd/0x310
[   16.143928]  ? __pfx_kasan_atomics+0x10/0x10
[   16.143953]  ? __pfx_read_tsc+0x10/0x10
[   16.143978]  ? ktime_get_ts64+0x86/0x230
[   16.144007]  kunit_try_run_case+0x1a6/0x480
[   16.144054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144076]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.144100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.144127]  ? __kthread_parkme+0x82/0x160
[   16.144151]  ? preempt_count_sub+0x50/0x80
[   16.144177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.144229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.144256]  kthread+0x324/0x6e0
[   16.144280]  ? trace_preempt_on+0x20/0xc0
[   16.144305]  ? __pfx_kthread+0x10/0x10
[   16.144328]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.144352]  ? calculate_sigpending+0x7b/0xa0
[   16.144375]  ? __pfx_kthread+0x10/0x10
[   16.144399]  ret_from_fork+0x41/0x80
[   16.144419]  ? __pfx_kthread+0x10/0x10
[   16.144442]  ret_from_fork_asm+0x1a/0x30
[   16.144475]  </TASK>
[   16.144487] 
[   16.153887] Allocated by task 273:
[   16.154136]  kasan_save_stack+0x45/0x70
[   16.154447]  kasan_save_track+0x18/0x40
[   16.154690]  kasan_save_alloc_info+0x3b/0x50
[   16.154912]  __kasan_kmalloc+0xb7/0xc0
[   16.155142]  __kmalloc_cache_noprof+0x18a/0x420
[   16.155374]  kasan_atomics+0x96/0x310
[   16.155567]  kunit_try_run_case+0x1a6/0x480
[   16.155764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.156044]  kthread+0x324/0x6e0
[   16.156231]  ret_from_fork+0x41/0x80
[   16.156418]  ret_from_fork_asm+0x1a/0x30
[   16.156656] 
[   16.156748] The buggy address belongs to the object at ffff888101b3e000
[   16.156748]  which belongs to the cache kmalloc-64 of size 64
[   16.157510] The buggy address is located 0 bytes to the right of
[   16.157510]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.158063] 
[   16.158185] The buggy address belongs to the physical page:
[   16.158450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.158825] flags: 0x200000000000000(node=0|zone=2)
[   16.159124] page_type: f5(slab)
[   16.159334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.159699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.160135] page dumped because: kasan: bad access detected
[   16.160383] 
[   16.160474] Memory state around the buggy address:
[   16.160754]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.161079]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.161813] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.162394]                                      ^
[   16.162606]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.162903]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.163630] ==================================================================
[   15.730197] ==================================================================
[   15.730437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   15.730674] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.730913] 
[   15.731003] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.731048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.731061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.731084] Call Trace:
[   15.731106]  <TASK>
[   15.731129]  dump_stack_lvl+0x73/0xb0
[   15.731169]  print_report+0xd1/0x650
[   15.731192]  ? __virt_addr_valid+0x1db/0x2d0
[   15.731217]  ? kasan_atomics_helper+0x1819/0x5450
[   15.731239]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.731265]  ? kasan_atomics_helper+0x1819/0x5450
[   15.731287]  kasan_report+0x140/0x180
[   15.731309]  ? kasan_atomics_helper+0x1819/0x5450
[   15.731335]  kasan_check_range+0x10c/0x1c0
[   15.731359]  __kasan_check_write+0x18/0x20
[   15.731383]  kasan_atomics_helper+0x1819/0x5450
[   15.731408]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.731430]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.731455]  ? kasan_atomics+0x153/0x310
[   15.731480]  kasan_atomics+0x1dd/0x310
[   15.731503]  ? __pfx_kasan_atomics+0x10/0x10
[   15.731527]  ? __pfx_read_tsc+0x10/0x10
[   15.731550]  ? ktime_get_ts64+0x86/0x230
[   15.731576]  kunit_try_run_case+0x1a6/0x480
[   15.731600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731622]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.731645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.731671]  ? __kthread_parkme+0x82/0x160
[   15.731694]  ? preempt_count_sub+0x50/0x80
[   15.731720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.731743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.731798]  kthread+0x324/0x6e0
[   15.731821]  ? trace_preempt_on+0x20/0xc0
[   15.731855]  ? __pfx_kthread+0x10/0x10
[   15.731879]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.731902]  ? calculate_sigpending+0x7b/0xa0
[   15.731925]  ? __pfx_kthread+0x10/0x10
[   15.731949]  ret_from_fork+0x41/0x80
[   15.731968]  ? __pfx_kthread+0x10/0x10
[   15.731993]  ret_from_fork_asm+0x1a/0x30
[   15.732025]  </TASK>
[   15.732037] 
[   15.739080] Allocated by task 273:
[   15.739224]  kasan_save_stack+0x45/0x70
[   15.739494]  kasan_save_track+0x18/0x40
[   15.739689]  kasan_save_alloc_info+0x3b/0x50
[   15.739920]  __kasan_kmalloc+0xb7/0xc0
[   15.740108]  __kmalloc_cache_noprof+0x18a/0x420
[   15.740357]  kasan_atomics+0x96/0x310
[   15.740668]  kunit_try_run_case+0x1a6/0x480
[   15.740894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.741279]  kthread+0x324/0x6e0
[   15.741455]  ret_from_fork+0x41/0x80
[   15.741629]  ret_from_fork_asm+0x1a/0x30
[   15.741798] 
[   15.741895] The buggy address belongs to the object at ffff888101b3e000
[   15.741895]  which belongs to the cache kmalloc-64 of size 64
[   15.742326] The buggy address is located 0 bytes to the right of
[   15.742326]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.742694] 
[   15.742789] The buggy address belongs to the physical page:
[   15.743051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.743408] flags: 0x200000000000000(node=0|zone=2)
[   15.743858] page_type: f5(slab)
[   15.744028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.744264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.744484] page dumped because: kasan: bad access detected
[   15.744650] 
[   15.744720] Memory state around the buggy address:
[   15.744955]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.745378]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.745693] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.746017]                                      ^
[   15.746229]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746503]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746767] ==================================================================
[   15.137154] ==================================================================
[   15.137498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   15.138320] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.138767] 
[   15.139083] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.139138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.139153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.139177] Call Trace:
[   15.139200]  <TASK>
[   15.139224]  dump_stack_lvl+0x73/0xb0
[   15.139260]  print_report+0xd1/0x650
[   15.139285]  ? __virt_addr_valid+0x1db/0x2d0
[   15.139309]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.139331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.139358]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.139380]  kasan_report+0x140/0x180
[   15.139404]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.139430]  kasan_check_range+0x10c/0x1c0
[   15.139453]  __kasan_check_write+0x18/0x20
[   15.139477]  kasan_atomics_helper+0xa2c/0x5450
[   15.139499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.139522]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.139552]  ? kasan_atomics+0x153/0x310
[   15.139578]  kasan_atomics+0x1dd/0x310
[   15.139601]  ? __pfx_kasan_atomics+0x10/0x10
[   15.139625]  ? __pfx_read_tsc+0x10/0x10
[   15.139649]  ? ktime_get_ts64+0x86/0x230
[   15.139676]  kunit_try_run_case+0x1a6/0x480
[   15.139702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.139725]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.139749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.139776]  ? __kthread_parkme+0x82/0x160
[   15.139799]  ? preempt_count_sub+0x50/0x80
[   15.139826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.139864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.139892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.139920]  kthread+0x324/0x6e0
[   15.139943]  ? trace_preempt_on+0x20/0xc0
[   15.139968]  ? __pfx_kthread+0x10/0x10
[   15.139991]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.140015]  ? calculate_sigpending+0x7b/0xa0
[   15.140038]  ? __pfx_kthread+0x10/0x10
[   15.140062]  ret_from_fork+0x41/0x80
[   15.140083]  ? __pfx_kthread+0x10/0x10
[   15.140106]  ret_from_fork_asm+0x1a/0x30
[   15.140138]  </TASK>
[   15.140150] 
[   15.150453] Allocated by task 273:
[   15.150638]  kasan_save_stack+0x45/0x70
[   15.150859]  kasan_save_track+0x18/0x40
[   15.151037]  kasan_save_alloc_info+0x3b/0x50
[   15.151585]  __kasan_kmalloc+0xb7/0xc0
[   15.151784]  __kmalloc_cache_noprof+0x18a/0x420
[   15.152199]  kasan_atomics+0x96/0x310
[   15.152470]  kunit_try_run_case+0x1a6/0x480
[   15.152682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153138]  kthread+0x324/0x6e0
[   15.153400]  ret_from_fork+0x41/0x80
[   15.153652]  ret_from_fork_asm+0x1a/0x30
[   15.153884] 
[   15.153984] The buggy address belongs to the object at ffff888101b3e000
[   15.153984]  which belongs to the cache kmalloc-64 of size 64
[   15.154731] The buggy address is located 0 bytes to the right of
[   15.154731]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.155467] 
[   15.155558] The buggy address belongs to the physical page:
[   15.155894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.156526] flags: 0x200000000000000(node=0|zone=2)
[   15.156853] page_type: f5(slab)
[   15.157109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.157438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.157901] page dumped because: kasan: bad access detected
[   15.158296] 
[   15.158419] Memory state around the buggy address:
[   15.158690]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158986]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159548] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.159929]                                      ^
[   15.160322]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160708]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.161143] ==================================================================
[   16.014569] ==================================================================
[   16.014875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   16.015275] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.015629] 
[   16.015742] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.015788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.015844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.015868] Call Trace:
[   16.015889]  <TASK>
[   16.015911]  dump_stack_lvl+0x73/0xb0
[   16.015973]  print_report+0xd1/0x650
[   16.015996]  ? __virt_addr_valid+0x1db/0x2d0
[   16.016020]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.016043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.016071]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.016092]  kasan_report+0x140/0x180
[   16.016147]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.016176]  __asan_report_load8_noabort+0x18/0x20
[   16.016201]  kasan_atomics_helper+0x4f9a/0x5450
[   16.016225]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.016248]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.016273]  ? kasan_atomics+0x153/0x310
[   16.016331]  kasan_atomics+0x1dd/0x310
[   16.016379]  ? __pfx_kasan_atomics+0x10/0x10
[   16.016432]  ? __pfx_read_tsc+0x10/0x10
[   16.016455]  ? ktime_get_ts64+0x86/0x230
[   16.016483]  kunit_try_run_case+0x1a6/0x480
[   16.016510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.016534]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.016559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.016585]  ? __kthread_parkme+0x82/0x160
[   16.016609]  ? preempt_count_sub+0x50/0x80
[   16.016636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.016660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.016687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.016714]  kthread+0x324/0x6e0
[   16.016768]  ? trace_preempt_on+0x20/0xc0
[   16.016795]  ? __pfx_kthread+0x10/0x10
[   16.016819]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.016851]  ? calculate_sigpending+0x7b/0xa0
[   16.016874]  ? __pfx_kthread+0x10/0x10
[   16.016924]  ret_from_fork+0x41/0x80
[   16.016967]  ? __pfx_kthread+0x10/0x10
[   16.017014]  ret_from_fork_asm+0x1a/0x30
[   16.017114]  </TASK>
[   16.017149] 
[   16.025160] Allocated by task 273:
[   16.025402]  kasan_save_stack+0x45/0x70
[   16.025635]  kasan_save_track+0x18/0x40
[   16.025809]  kasan_save_alloc_info+0x3b/0x50
[   16.026044]  __kasan_kmalloc+0xb7/0xc0
[   16.026245]  __kmalloc_cache_noprof+0x18a/0x420
[   16.026471]  kasan_atomics+0x96/0x310
[   16.026669]  kunit_try_run_case+0x1a6/0x480
[   16.026882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.027062]  kthread+0x324/0x6e0
[   16.027187]  ret_from_fork+0x41/0x80
[   16.027316]  ret_from_fork_asm+0x1a/0x30
[   16.027455] 
[   16.027527] The buggy address belongs to the object at ffff888101b3e000
[   16.027527]  which belongs to the cache kmalloc-64 of size 64
[   16.027977] The buggy address is located 0 bytes to the right of
[   16.027977]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.028906] 
[   16.029007] The buggy address belongs to the physical page:
[   16.029270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.029509] flags: 0x200000000000000(node=0|zone=2)
[   16.029674] page_type: f5(slab)
[   16.029805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.030058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.030394] page dumped because: kasan: bad access detected
[   16.030682] 
[   16.030810] Memory state around the buggy address:
[   16.031159]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031560]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031896] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.032493]                                      ^
[   16.032667]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.032891]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033164] ==================================================================
[   16.100094] ==================================================================
[   16.100713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   16.101054] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.101381] 
[   16.101468] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.101512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.101526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.101549] Call Trace:
[   16.101570]  <TASK>
[   16.101591]  dump_stack_lvl+0x73/0xb0
[   16.101618]  print_report+0xd1/0x650
[   16.101642]  ? __virt_addr_valid+0x1db/0x2d0
[   16.101666]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.101688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.101715]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.101736]  kasan_report+0x140/0x180
[   16.101764]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.101790]  __asan_report_load8_noabort+0x18/0x20
[   16.101814]  kasan_atomics_helper+0x4fa7/0x5450
[   16.101885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.101909]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.101935]  ? kasan_atomics+0x153/0x310
[   16.101960]  kasan_atomics+0x1dd/0x310
[   16.101983]  ? __pfx_kasan_atomics+0x10/0x10
[   16.102006]  ? __pfx_read_tsc+0x10/0x10
[   16.102029]  ? ktime_get_ts64+0x86/0x230
[   16.102055]  kunit_try_run_case+0x1a6/0x480
[   16.102080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.102102]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.102125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.102152]  ? __kthread_parkme+0x82/0x160
[   16.102175]  ? preempt_count_sub+0x50/0x80
[   16.102201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.102224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.102251]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.102277]  kthread+0x324/0x6e0
[   16.102301]  ? trace_preempt_on+0x20/0xc0
[   16.102326]  ? __pfx_kthread+0x10/0x10
[   16.102350]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.102374]  ? calculate_sigpending+0x7b/0xa0
[   16.102397]  ? __pfx_kthread+0x10/0x10
[   16.102421]  ret_from_fork+0x41/0x80
[   16.102440]  ? __pfx_kthread+0x10/0x10
[   16.102463]  ret_from_fork_asm+0x1a/0x30
[   16.102496]  </TASK>
[   16.102507] 
[   16.109918] Allocated by task 273:
[   16.110116]  kasan_save_stack+0x45/0x70
[   16.110336]  kasan_save_track+0x18/0x40
[   16.110528]  kasan_save_alloc_info+0x3b/0x50
[   16.110920]  __kasan_kmalloc+0xb7/0xc0
[   16.111091]  __kmalloc_cache_noprof+0x18a/0x420
[   16.111295]  kasan_atomics+0x96/0x310
[   16.111457]  kunit_try_run_case+0x1a6/0x480
[   16.111606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.111786]  kthread+0x324/0x6e0
[   16.111926]  ret_from_fork+0x41/0x80
[   16.112113]  ret_from_fork_asm+0x1a/0x30
[   16.112315] 
[   16.112418] The buggy address belongs to the object at ffff888101b3e000
[   16.112418]  which belongs to the cache kmalloc-64 of size 64
[   16.112963] The buggy address is located 0 bytes to the right of
[   16.112963]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.113473] 
[   16.113565] The buggy address belongs to the physical page:
[   16.113764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.114018] flags: 0x200000000000000(node=0|zone=2)
[   16.114273] page_type: f5(slab)
[   16.114449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.114796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.115242] page dumped because: kasan: bad access detected
[   16.115464] 
[   16.115536] Memory state around the buggy address:
[   16.115696]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.115926]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116207] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.116525]                                      ^
[   16.116752]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.116996]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.117212] ==================================================================
[   15.239996] ==================================================================
[   15.240519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   15.241045] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.241373] 
[   15.241484] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.241531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.241545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.241568] Call Trace:
[   15.241629]  <TASK>
[   15.241654]  dump_stack_lvl+0x73/0xb0
[   15.241684]  print_report+0xd1/0x650
[   15.241708]  ? __virt_addr_valid+0x1db/0x2d0
[   15.241734]  ? kasan_atomics_helper+0xd48/0x5450
[   15.241760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.241819]  ? kasan_atomics_helper+0xd48/0x5450
[   15.241851]  kasan_report+0x140/0x180
[   15.241874]  ? kasan_atomics_helper+0xd48/0x5450
[   15.241900]  kasan_check_range+0x10c/0x1c0
[   15.241924]  __kasan_check_write+0x18/0x20
[   15.241979]  kasan_atomics_helper+0xd48/0x5450
[   15.242002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.242024]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.242062]  ? kasan_atomics+0x153/0x310
[   15.242089]  kasan_atomics+0x1dd/0x310
[   15.242142]  ? __pfx_kasan_atomics+0x10/0x10
[   15.242167]  ? __pfx_read_tsc+0x10/0x10
[   15.242189]  ? ktime_get_ts64+0x86/0x230
[   15.242217]  kunit_try_run_case+0x1a6/0x480
[   15.242241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242293]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.242317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.242344]  ? __kthread_parkme+0x82/0x160
[   15.242367]  ? preempt_count_sub+0x50/0x80
[   15.242424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.242447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.242474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.242502]  kthread+0x324/0x6e0
[   15.242551]  ? trace_preempt_on+0x20/0xc0
[   15.242576]  ? __pfx_kthread+0x10/0x10
[   15.242599]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.242624]  ? calculate_sigpending+0x7b/0xa0
[   15.242673]  ? __pfx_kthread+0x10/0x10
[   15.242697]  ret_from_fork+0x41/0x80
[   15.242717]  ? __pfx_kthread+0x10/0x10
[   15.242740]  ret_from_fork_asm+0x1a/0x30
[   15.242804]  </TASK>
[   15.242816] 
[   15.251030] Allocated by task 273:
[   15.251273]  kasan_save_stack+0x45/0x70
[   15.251505]  kasan_save_track+0x18/0x40
[   15.251728]  kasan_save_alloc_info+0x3b/0x50
[   15.251976]  __kasan_kmalloc+0xb7/0xc0
[   15.252206]  __kmalloc_cache_noprof+0x18a/0x420
[   15.252483]  kasan_atomics+0x96/0x310
[   15.252651]  kunit_try_run_case+0x1a6/0x480
[   15.252796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.252981]  kthread+0x324/0x6e0
[   15.253287]  ret_from_fork+0x41/0x80
[   15.253564]  ret_from_fork_asm+0x1a/0x30
[   15.253862] 
[   15.253994] The buggy address belongs to the object at ffff888101b3e000
[   15.253994]  which belongs to the cache kmalloc-64 of size 64
[   15.254497] The buggy address is located 0 bytes to the right of
[   15.254497]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.255003] 
[   15.255154] The buggy address belongs to the physical page:
[   15.255435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.255758] flags: 0x200000000000000(node=0|zone=2)
[   15.255976] page_type: f5(slab)
[   15.256143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.256606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.256925] page dumped because: kasan: bad access detected
[   15.257221] 
[   15.257347] Memory state around the buggy address:
[   15.257593]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.257959]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.258315] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.258625]                                      ^
[   15.258867]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259229]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259531] ==================================================================
[   15.359893] ==================================================================
[   15.360446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   15.360975] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.361322] 
[   15.361413] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.361458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.361472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.361499] Call Trace:
[   15.361550]  <TASK>
[   15.361573]  dump_stack_lvl+0x73/0xb0
[   15.361634]  print_report+0xd1/0x650
[   15.361657]  ? __virt_addr_valid+0x1db/0x2d0
[   15.361680]  ? kasan_atomics_helper+0x107a/0x5450
[   15.361702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.361728]  ? kasan_atomics_helper+0x107a/0x5450
[   15.361756]  kasan_report+0x140/0x180
[   15.361803]  ? kasan_atomics_helper+0x107a/0x5450
[   15.361830]  kasan_check_range+0x10c/0x1c0
[   15.361871]  __kasan_check_write+0x18/0x20
[   15.361894]  kasan_atomics_helper+0x107a/0x5450
[   15.361917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.361965]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.361992]  ? kasan_atomics+0x153/0x310
[   15.362019]  kasan_atomics+0x1dd/0x310
[   15.362053]  ? __pfx_kasan_atomics+0x10/0x10
[   15.362077]  ? __pfx_read_tsc+0x10/0x10
[   15.362101]  ? ktime_get_ts64+0x86/0x230
[   15.362153]  kunit_try_run_case+0x1a6/0x480
[   15.362178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362211]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.362235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.362287]  ? __kthread_parkme+0x82/0x160
[   15.362311]  ? preempt_count_sub+0x50/0x80
[   15.362337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.362371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.362422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.362450]  kthread+0x324/0x6e0
[   15.362473]  ? trace_preempt_on+0x20/0xc0
[   15.362508]  ? __pfx_kthread+0x10/0x10
[   15.362531]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.362581]  ? calculate_sigpending+0x7b/0xa0
[   15.362604]  ? __pfx_kthread+0x10/0x10
[   15.362627]  ret_from_fork+0x41/0x80
[   15.362658]  ? __pfx_kthread+0x10/0x10
[   15.362706]  ret_from_fork_asm+0x1a/0x30
[   15.362739]  </TASK>
[   15.362751] 
[   15.374007] Allocated by task 273:
[   15.374298]  kasan_save_stack+0x45/0x70
[   15.374527]  kasan_save_track+0x18/0x40
[   15.374741]  kasan_save_alloc_info+0x3b/0x50
[   15.374970]  __kasan_kmalloc+0xb7/0xc0
[   15.375233]  __kmalloc_cache_noprof+0x18a/0x420
[   15.375496]  kasan_atomics+0x96/0x310
[   15.375678]  kunit_try_run_case+0x1a6/0x480
[   15.375918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.376196]  kthread+0x324/0x6e0
[   15.376411]  ret_from_fork+0x41/0x80
[   15.376629]  ret_from_fork_asm+0x1a/0x30
[   15.376832] 
[   15.376975] The buggy address belongs to the object at ffff888101b3e000
[   15.376975]  which belongs to the cache kmalloc-64 of size 64
[   15.377513] The buggy address is located 0 bytes to the right of
[   15.377513]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.378105] 
[   15.378205] The buggy address belongs to the physical page:
[   15.378490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.378938] flags: 0x200000000000000(node=0|zone=2)
[   15.379187] page_type: f5(slab)
[   15.379372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.379723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.379991] page dumped because: kasan: bad access detected
[   15.380177] 
[   15.380274] Memory state around the buggy address:
[   15.380503]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.380949]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381340] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.381569]                                      ^
[   15.381852]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.382319]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.382569] ==================================================================
[   15.553087] ==================================================================
[   15.553399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   15.553699] Read of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.554026] 
[   15.554130] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.554174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.554188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.554210] Call Trace:
[   15.554231]  <TASK>
[   15.554252]  dump_stack_lvl+0x73/0xb0
[   15.554279]  print_report+0xd1/0x650
[   15.554302]  ? __virt_addr_valid+0x1db/0x2d0
[   15.554326]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.554347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.554373]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.554395]  kasan_report+0x140/0x180
[   15.554418]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.554443]  __asan_report_load8_noabort+0x18/0x20
[   15.554468]  kasan_atomics_helper+0x4eb0/0x5450
[   15.554490]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.554513]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.554538]  ? kasan_atomics+0x153/0x310
[   15.554563]  kasan_atomics+0x1dd/0x310
[   15.554586]  ? __pfx_kasan_atomics+0x10/0x10
[   15.554610]  ? __pfx_read_tsc+0x10/0x10
[   15.554632]  ? ktime_get_ts64+0x86/0x230
[   15.554659]  kunit_try_run_case+0x1a6/0x480
[   15.554683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.554705]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.554729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.554757]  ? __kthread_parkme+0x82/0x160
[   15.554781]  ? preempt_count_sub+0x50/0x80
[   15.554807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.554830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.554868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.554894]  kthread+0x324/0x6e0
[   15.554916]  ? trace_preempt_on+0x20/0xc0
[   15.554941]  ? __pfx_kthread+0x10/0x10
[   15.554964]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.554988]  ? calculate_sigpending+0x7b/0xa0
[   15.555011]  ? __pfx_kthread+0x10/0x10
[   15.555034]  ret_from_fork+0x41/0x80
[   15.555064]  ? __pfx_kthread+0x10/0x10
[   15.555087]  ret_from_fork_asm+0x1a/0x30
[   15.555121]  </TASK>
[   15.555132] 
[   15.562560] Allocated by task 273:
[   15.562743]  kasan_save_stack+0x45/0x70
[   15.562941]  kasan_save_track+0x18/0x40
[   15.563078]  kasan_save_alloc_info+0x3b/0x50
[   15.563372]  __kasan_kmalloc+0xb7/0xc0
[   15.563562]  __kmalloc_cache_noprof+0x18a/0x420
[   15.563786]  kasan_atomics+0x96/0x310
[   15.563935]  kunit_try_run_case+0x1a6/0x480
[   15.564083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.564264]  kthread+0x324/0x6e0
[   15.564390]  ret_from_fork+0x41/0x80
[   15.564522]  ret_from_fork_asm+0x1a/0x30
[   15.564664] 
[   15.564736] The buggy address belongs to the object at ffff888101b3e000
[   15.564736]  which belongs to the cache kmalloc-64 of size 64
[   15.565281] The buggy address is located 0 bytes to the right of
[   15.565281]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.565938] 
[   15.566035] The buggy address belongs to the physical page:
[   15.566273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.566524] flags: 0x200000000000000(node=0|zone=2)
[   15.566692] page_type: f5(slab)
[   15.566819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.567066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.567411] page dumped because: kasan: bad access detected
[   15.567665] 
[   15.567762] Memory state around the buggy address:
[   15.568008]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.568711]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569033] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.569324]                                      ^
[   15.569501]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569718]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569998] ==================================================================
[   14.800373] ==================================================================
[   14.801295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   14.801674] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.802595] 
[   14.802715] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.802764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.802779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.802802] Call Trace:
[   14.802815]  <TASK>
[   14.802848]  dump_stack_lvl+0x73/0xb0
[   14.802882]  print_report+0xd1/0x650
[   14.802903]  ? __virt_addr_valid+0x1db/0x2d0
[   14.802927]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.802948]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.802973]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.802994]  kasan_report+0x140/0x180
[   14.803017]  ? kasan_atomics_helper+0x4ba4/0x5450
[   14.803042]  __asan_report_store4_noabort+0x1b/0x30
[   14.803066]  kasan_atomics_helper+0x4ba4/0x5450
[   14.803087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.803139]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.803164]  ? kasan_atomics+0x153/0x310
[   14.803190]  kasan_atomics+0x1dd/0x310
[   14.803212]  ? __pfx_kasan_atomics+0x10/0x10
[   14.803235]  ? __pfx_read_tsc+0x10/0x10
[   14.803258]  ? ktime_get_ts64+0x86/0x230
[   14.803283]  kunit_try_run_case+0x1a6/0x480
[   14.803307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.803328]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.803351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.803376]  ? __kthread_parkme+0x82/0x160
[   14.803398]  ? preempt_count_sub+0x50/0x80
[   14.803424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.803447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.803472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.803498]  kthread+0x324/0x6e0
[   14.803518]  ? trace_preempt_on+0x20/0xc0
[   14.803541]  ? __pfx_kthread+0x10/0x10
[   14.803563]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.803587]  ? calculate_sigpending+0x7b/0xa0
[   14.803609]  ? __pfx_kthread+0x10/0x10
[   14.803630]  ret_from_fork+0x41/0x80
[   14.803649]  ? __pfx_kthread+0x10/0x10
[   14.803670]  ret_from_fork_asm+0x1a/0x30
[   14.803702]  </TASK>
[   14.803713] 
[   14.814211] Allocated by task 273:
[   14.814409]  kasan_save_stack+0x45/0x70
[   14.814578]  kasan_save_track+0x18/0x40
[   14.814709]  kasan_save_alloc_info+0x3b/0x50
[   14.815209]  __kasan_kmalloc+0xb7/0xc0
[   14.815667]  __kmalloc_cache_noprof+0x18a/0x420
[   14.815997]  kasan_atomics+0x96/0x310
[   14.816556]  kunit_try_run_case+0x1a6/0x480
[   14.816809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.816999]  kthread+0x324/0x6e0
[   14.817529]  ret_from_fork+0x41/0x80
[   14.817972]  ret_from_fork_asm+0x1a/0x30
[   14.818489] 
[   14.818761] The buggy address belongs to the object at ffff888101b3e000
[   14.818761]  which belongs to the cache kmalloc-64 of size 64
[   14.819870] The buggy address is located 0 bytes to the right of
[   14.819870]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.820737] 
[   14.820816] The buggy address belongs to the physical page:
[   14.820998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.821663] flags: 0x200000000000000(node=0|zone=2)
[   14.822171] page_type: f5(slab)
[   14.822517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.823330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.823820] page dumped because: kasan: bad access detected
[   14.824000] 
[   14.824314] Memory state around the buggy address:
[   14.824491]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824700]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824921] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.825144]                                      ^
[   14.825571]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825936]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826250] ==================================================================
[   14.774119] ==================================================================
[   14.774792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   14.775214] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.775534] 
[   14.775659] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.775710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.775723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.775755] Call Trace:
[   14.775768]  <TASK>
[   14.775788]  dump_stack_lvl+0x73/0xb0
[   14.775818]  print_report+0xd1/0x650
[   14.775889]  ? __virt_addr_valid+0x1db/0x2d0
[   14.775913]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.775934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.775960]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.775980]  kasan_report+0x140/0x180
[   14.776002]  ? kasan_atomics_helper+0x4bbe/0x5450
[   14.776148]  __asan_report_load4_noabort+0x18/0x20
[   14.776174]  kasan_atomics_helper+0x4bbe/0x5450
[   14.776196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.776217]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.776243]  ? kasan_atomics+0x153/0x310
[   14.776268]  kasan_atomics+0x1dd/0x310
[   14.776290]  ? __pfx_kasan_atomics+0x10/0x10
[   14.776313]  ? __pfx_read_tsc+0x10/0x10
[   14.776336]  ? ktime_get_ts64+0x86/0x230
[   14.776362]  kunit_try_run_case+0x1a6/0x480
[   14.776386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.776472]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.776497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.776522]  ? __kthread_parkme+0x82/0x160
[   14.776545]  ? preempt_count_sub+0x50/0x80
[   14.776570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.776593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.776620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.776645]  kthread+0x324/0x6e0
[   14.776666]  ? trace_preempt_on+0x20/0xc0
[   14.776690]  ? __pfx_kthread+0x10/0x10
[   14.776712]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.776735]  ? calculate_sigpending+0x7b/0xa0
[   14.776757]  ? __pfx_kthread+0x10/0x10
[   14.776780]  ret_from_fork+0x41/0x80
[   14.776799]  ? __pfx_kthread+0x10/0x10
[   14.776821]  ret_from_fork_asm+0x1a/0x30
[   14.776864]  </TASK>
[   14.776875] 
[   14.785067] Allocated by task 273:
[   14.785309]  kasan_save_stack+0x45/0x70
[   14.785531]  kasan_save_track+0x18/0x40
[   14.785731]  kasan_save_alloc_info+0x3b/0x50
[   14.786132]  __kasan_kmalloc+0xb7/0xc0
[   14.786493]  __kmalloc_cache_noprof+0x18a/0x420
[   14.786657]  kasan_atomics+0x96/0x310
[   14.786906]  kunit_try_run_case+0x1a6/0x480
[   14.787897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788112]  kthread+0x324/0x6e0
[   14.788233]  ret_from_fork+0x41/0x80
[   14.788463]  ret_from_fork_asm+0x1a/0x30
[   14.788696] 
[   14.788795] The buggy address belongs to the object at ffff888101b3e000
[   14.788795]  which belongs to the cache kmalloc-64 of size 64
[   14.789849] The buggy address is located 0 bytes to the right of
[   14.789849]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.791672] 
[   14.791992] The buggy address belongs to the physical page:
[   14.792415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.792671] flags: 0x200000000000000(node=0|zone=2)
[   14.792852] page_type: f5(slab)
[   14.793561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.794588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.795418] page dumped because: kasan: bad access detected
[   14.795598] 
[   14.795670] Memory state around the buggy address:
[   14.795830]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796353]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796832] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.797359]                                      ^
[   14.797931]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.798692]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799394] ==================================================================
[   15.516579] ==================================================================
[   15.517251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   15.518036] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.518709] 
[   15.518899] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.518947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.518960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.518983] Call Trace:
[   15.519007]  <TASK>
[   15.519031]  dump_stack_lvl+0x73/0xb0
[   15.519071]  print_report+0xd1/0x650
[   15.519094]  ? __virt_addr_valid+0x1db/0x2d0
[   15.519118]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.519140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.519166]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.519189]  kasan_report+0x140/0x180
[   15.519212]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.519238]  __asan_report_load4_noabort+0x18/0x20
[   15.519262]  kasan_atomics_helper+0x49d0/0x5450
[   15.519284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.519306]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.519332]  ? kasan_atomics+0x153/0x310
[   15.519359]  kasan_atomics+0x1dd/0x310
[   15.519382]  ? __pfx_kasan_atomics+0x10/0x10
[   15.519406]  ? __pfx_read_tsc+0x10/0x10
[   15.519428]  ? ktime_get_ts64+0x86/0x230
[   15.519455]  kunit_try_run_case+0x1a6/0x480
[   15.519480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.519502]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.519526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.519552]  ? __kthread_parkme+0x82/0x160
[   15.519576]  ? preempt_count_sub+0x50/0x80
[   15.519602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.519626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.519653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.519681]  kthread+0x324/0x6e0
[   15.519704]  ? trace_preempt_on+0x20/0xc0
[   15.519729]  ? __pfx_kthread+0x10/0x10
[   15.519752]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.519776]  ? calculate_sigpending+0x7b/0xa0
[   15.519799]  ? __pfx_kthread+0x10/0x10
[   15.519823]  ret_from_fork+0x41/0x80
[   15.519855]  ? __pfx_kthread+0x10/0x10
[   15.519878]  ret_from_fork_asm+0x1a/0x30
[   15.519911]  </TASK>
[   15.519922] 
[   15.526704] Allocated by task 273:
[   15.526867]  kasan_save_stack+0x45/0x70
[   15.527099]  kasan_save_track+0x18/0x40
[   15.527295]  kasan_save_alloc_info+0x3b/0x50
[   15.527510]  __kasan_kmalloc+0xb7/0xc0
[   15.527702]  __kmalloc_cache_noprof+0x18a/0x420
[   15.527939]  kasan_atomics+0x96/0x310
[   15.528226]  kunit_try_run_case+0x1a6/0x480
[   15.528435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528659]  kthread+0x324/0x6e0
[   15.528803]  ret_from_fork+0x41/0x80
[   15.529000]  ret_from_fork_asm+0x1a/0x30
[   15.529170] 
[   15.529243] The buggy address belongs to the object at ffff888101b3e000
[   15.529243]  which belongs to the cache kmalloc-64 of size 64
[   15.529746] The buggy address is located 0 bytes to the right of
[   15.529746]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.530300] 
[   15.530384] The buggy address belongs to the physical page:
[   15.530625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.530973] flags: 0x200000000000000(node=0|zone=2)
[   15.531185] page_type: f5(slab)
[   15.531313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.531547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.531776] page dumped because: kasan: bad access detected
[   15.531987] 
[   15.532078] Memory state around the buggy address:
[   15.532303]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532618]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532920] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.533135]                                      ^
[   15.533290]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.533505]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.533734] ==================================================================
[   15.592135] ==================================================================
[   15.592849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   15.593645] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.594362] 
[   15.594559] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.594622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.594665] Call Trace:
[   15.594686]  <TASK>
[   15.594709]  dump_stack_lvl+0x73/0xb0
[   15.594741]  print_report+0xd1/0x650
[   15.594764]  ? __virt_addr_valid+0x1db/0x2d0
[   15.594788]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.594809]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.594847]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.594868]  kasan_report+0x140/0x180
[   15.594891]  ? kasan_atomics_helper+0x50d6/0x5450
[   15.594916]  __asan_report_store8_noabort+0x1b/0x30
[   15.594941]  kasan_atomics_helper+0x50d6/0x5450
[   15.594964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.594986]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.595011]  ? kasan_atomics+0x153/0x310
[   15.595038]  kasan_atomics+0x1dd/0x310
[   15.595061]  ? __pfx_kasan_atomics+0x10/0x10
[   15.595085]  ? __pfx_read_tsc+0x10/0x10
[   15.595108]  ? ktime_get_ts64+0x86/0x230
[   15.595135]  kunit_try_run_case+0x1a6/0x480
[   15.595160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595181]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.595205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.595231]  ? __kthread_parkme+0x82/0x160
[   15.595254]  ? preempt_count_sub+0x50/0x80
[   15.595280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.595330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.595356]  kthread+0x324/0x6e0
[   15.595378]  ? trace_preempt_on+0x20/0xc0
[   15.595403]  ? __pfx_kthread+0x10/0x10
[   15.595426]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.595450]  ? calculate_sigpending+0x7b/0xa0
[   15.595473]  ? __pfx_kthread+0x10/0x10
[   15.595497]  ret_from_fork+0x41/0x80
[   15.595516]  ? __pfx_kthread+0x10/0x10
[   15.595540]  ret_from_fork_asm+0x1a/0x30
[   15.595574]  </TASK>
[   15.595586] 
[   15.606996] Allocated by task 273:
[   15.607335]  kasan_save_stack+0x45/0x70
[   15.607552]  kasan_save_track+0x18/0x40
[   15.607748]  kasan_save_alloc_info+0x3b/0x50
[   15.607971]  __kasan_kmalloc+0xb7/0xc0
[   15.608188]  __kmalloc_cache_noprof+0x18a/0x420
[   15.608382]  kasan_atomics+0x96/0x310
[   15.608518]  kunit_try_run_case+0x1a6/0x480
[   15.608701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.608998]  kthread+0x324/0x6e0
[   15.609356]  ret_from_fork+0x41/0x80
[   15.609557]  ret_from_fork_asm+0x1a/0x30
[   15.609749] 
[   15.609824] The buggy address belongs to the object at ffff888101b3e000
[   15.609824]  which belongs to the cache kmalloc-64 of size 64
[   15.610545] The buggy address is located 0 bytes to the right of
[   15.610545]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.611102] 
[   15.611202] The buggy address belongs to the physical page:
[   15.611517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.611896] flags: 0x200000000000000(node=0|zone=2)
[   15.612130] page_type: f5(slab)
[   15.612307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.612652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.612926] page dumped because: kasan: bad access detected
[   15.613098] 
[   15.613184] Memory state around the buggy address:
[   15.613416]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613788]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614154] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.614464]                                      ^
[   15.614660]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614969]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.615365] ==================================================================
[   15.425962] ==================================================================
[   15.426454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   15.426858] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.427254] 
[   15.427381] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.427455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.427469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.427503] Call Trace:
[   15.427526]  <TASK>
[   15.427566]  dump_stack_lvl+0x73/0xb0
[   15.427607]  print_report+0xd1/0x650
[   15.427630]  ? __virt_addr_valid+0x1db/0x2d0
[   15.427666]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.427688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.427741]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.427763]  kasan_report+0x140/0x180
[   15.427825]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.427878]  __asan_report_load4_noabort+0x18/0x20
[   15.427903]  kasan_atomics_helper+0x4a04/0x5450
[   15.427939]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.427975]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.428014]  ? kasan_atomics+0x153/0x310
[   15.428040]  kasan_atomics+0x1dd/0x310
[   15.428084]  ? __pfx_kasan_atomics+0x10/0x10
[   15.428108]  ? __pfx_read_tsc+0x10/0x10
[   15.428131]  ? ktime_get_ts64+0x86/0x230
[   15.428169]  kunit_try_run_case+0x1a6/0x480
[   15.428194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.428216]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.428239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.428265]  ? __kthread_parkme+0x82/0x160
[   15.428289]  ? preempt_count_sub+0x50/0x80
[   15.428315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.428338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.428364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.428391]  kthread+0x324/0x6e0
[   15.428414]  ? trace_preempt_on+0x20/0xc0
[   15.428439]  ? __pfx_kthread+0x10/0x10
[   15.428462]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.428487]  ? calculate_sigpending+0x7b/0xa0
[   15.428509]  ? __pfx_kthread+0x10/0x10
[   15.428560]  ret_from_fork+0x41/0x80
[   15.428580]  ? __pfx_kthread+0x10/0x10
[   15.428603]  ret_from_fork_asm+0x1a/0x30
[   15.428648]  </TASK>
[   15.428660] 
[   15.436291] Allocated by task 273:
[   15.436521]  kasan_save_stack+0x45/0x70
[   15.436766]  kasan_save_track+0x18/0x40
[   15.437011]  kasan_save_alloc_info+0x3b/0x50
[   15.437287]  __kasan_kmalloc+0xb7/0xc0
[   15.437528]  __kmalloc_cache_noprof+0x18a/0x420
[   15.437754]  kasan_atomics+0x96/0x310
[   15.437902]  kunit_try_run_case+0x1a6/0x480
[   15.438054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.438236]  kthread+0x324/0x6e0
[   15.438408]  ret_from_fork+0x41/0x80
[   15.438602]  ret_from_fork_asm+0x1a/0x30
[   15.438945] 
[   15.439076] The buggy address belongs to the object at ffff888101b3e000
[   15.439076]  which belongs to the cache kmalloc-64 of size 64
[   15.440055] The buggy address is located 0 bytes to the right of
[   15.440055]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.440531] 
[   15.440607] The buggy address belongs to the physical page:
[   15.440809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.441277] flags: 0x200000000000000(node=0|zone=2)
[   15.441526] page_type: f5(slab)
[   15.441677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.441916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.442178] page dumped because: kasan: bad access detected
[   15.442423] 
[   15.442607] Memory state around the buggy address:
[   15.442991]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443452]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443676] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.443941]                                      ^
[   15.444314]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.444752]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.445157] ==================================================================
[   15.935448] ==================================================================
[   15.935876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   15.936498] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.936877] 
[   15.937021] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.937066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.937080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.937103] Call Trace:
[   15.937126]  <TASK>
[   15.937147]  dump_stack_lvl+0x73/0xb0
[   15.937176]  print_report+0xd1/0x650
[   15.937197]  ? __virt_addr_valid+0x1db/0x2d0
[   15.937258]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.937280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.937307]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.937329]  kasan_report+0x140/0x180
[   15.937352]  ? kasan_atomics_helper+0x1eab/0x5450
[   15.937407]  kasan_check_range+0x10c/0x1c0
[   15.937431]  __kasan_check_write+0x18/0x20
[   15.937454]  kasan_atomics_helper+0x1eab/0x5450
[   15.937477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.937499]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.937554]  ? kasan_atomics+0x153/0x310
[   15.937581]  kasan_atomics+0x1dd/0x310
[   15.937604]  ? __pfx_kasan_atomics+0x10/0x10
[   15.937628]  ? __pfx_read_tsc+0x10/0x10
[   15.937651]  ? ktime_get_ts64+0x86/0x230
[   15.937707]  kunit_try_run_case+0x1a6/0x480
[   15.937732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.937760]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.937783]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.937809]  ? __kthread_parkme+0x82/0x160
[   15.937833]  ? preempt_count_sub+0x50/0x80
[   15.937903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.937927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.937953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.937982]  kthread+0x324/0x6e0
[   15.938004]  ? trace_preempt_on+0x20/0xc0
[   15.938059]  ? __pfx_kthread+0x10/0x10
[   15.938082]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.938107]  ? calculate_sigpending+0x7b/0xa0
[   15.938138]  ? __pfx_kthread+0x10/0x10
[   15.938161]  ret_from_fork+0x41/0x80
[   15.938208]  ? __pfx_kthread+0x10/0x10
[   15.938232]  ret_from_fork_asm+0x1a/0x30
[   15.938265]  </TASK>
[   15.938277] 
[   15.946066] Allocated by task 273:
[   15.946298]  kasan_save_stack+0x45/0x70
[   15.946459]  kasan_save_track+0x18/0x40
[   15.946591]  kasan_save_alloc_info+0x3b/0x50
[   15.946737]  __kasan_kmalloc+0xb7/0xc0
[   15.946880]  __kmalloc_cache_noprof+0x18a/0x420
[   15.947033]  kasan_atomics+0x96/0x310
[   15.947161]  kunit_try_run_case+0x1a6/0x480
[   15.947342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.947636]  kthread+0x324/0x6e0
[   15.947807]  ret_from_fork+0x41/0x80
[   15.947999]  ret_from_fork_asm+0x1a/0x30
[   15.948194] 
[   15.948289] The buggy address belongs to the object at ffff888101b3e000
[   15.948289]  which belongs to the cache kmalloc-64 of size 64
[   15.948916] The buggy address is located 0 bytes to the right of
[   15.948916]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.949754] 
[   15.949966] The buggy address belongs to the physical page:
[   15.950257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.950618] flags: 0x200000000000000(node=0|zone=2)
[   15.951000] page_type: f5(slab)
[   15.951333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.951665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.951951] page dumped because: kasan: bad access detected
[   15.952293] 
[   15.952389] Memory state around the buggy address:
[   15.952655]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.952905]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.953271] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.953589]                                      ^
[   15.953933]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.954236]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.954446] ==================================================================
[   15.162256] ==================================================================
[   15.162572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   15.162898] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.164315] 
[   15.164427] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.164520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.164534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.164559] Call Trace:
[   15.164582]  <TASK>
[   15.164606]  dump_stack_lvl+0x73/0xb0
[   15.164642]  print_report+0xd1/0x650
[   15.164666]  ? __virt_addr_valid+0x1db/0x2d0
[   15.164690]  ? kasan_atomics_helper+0xac8/0x5450
[   15.164712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.164739]  ? kasan_atomics_helper+0xac8/0x5450
[   15.164761]  kasan_report+0x140/0x180
[   15.164783]  ? kasan_atomics_helper+0xac8/0x5450
[   15.164809]  kasan_check_range+0x10c/0x1c0
[   15.164833]  __kasan_check_write+0x18/0x20
[   15.164867]  kasan_atomics_helper+0xac8/0x5450
[   15.164891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.164914]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.164939]  ? kasan_atomics+0x153/0x310
[   15.164967]  kasan_atomics+0x1dd/0x310
[   15.164990]  ? __pfx_kasan_atomics+0x10/0x10
[   15.165014]  ? __pfx_read_tsc+0x10/0x10
[   15.165037]  ? ktime_get_ts64+0x86/0x230
[   15.165076]  kunit_try_run_case+0x1a6/0x480
[   15.165101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165124]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.165147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.165174]  ? __kthread_parkme+0x82/0x160
[   15.165197]  ? preempt_count_sub+0x50/0x80
[   15.165224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.165302]  kthread+0x324/0x6e0
[   15.165324]  ? trace_preempt_on+0x20/0xc0
[   15.165349]  ? __pfx_kthread+0x10/0x10
[   15.165373]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.165398]  ? calculate_sigpending+0x7b/0xa0
[   15.165421]  ? __pfx_kthread+0x10/0x10
[   15.165444]  ret_from_fork+0x41/0x80
[   15.165465]  ? __pfx_kthread+0x10/0x10
[   15.165488]  ret_from_fork_asm+0x1a/0x30
[   15.165521]  </TASK>
[   15.165534] 
[   15.173421] Allocated by task 273:
[   15.173632]  kasan_save_stack+0x45/0x70
[   15.173853]  kasan_save_track+0x18/0x40
[   15.174068]  kasan_save_alloc_info+0x3b/0x50
[   15.174258]  __kasan_kmalloc+0xb7/0xc0
[   15.174455]  __kmalloc_cache_noprof+0x18a/0x420
[   15.174660]  kasan_atomics+0x96/0x310
[   15.174791]  kunit_try_run_case+0x1a6/0x480
[   15.174966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.175445]  kthread+0x324/0x6e0
[   15.175644]  ret_from_fork+0x41/0x80
[   15.175790]  ret_from_fork_asm+0x1a/0x30
[   15.176010] 
[   15.176146] The buggy address belongs to the object at ffff888101b3e000
[   15.176146]  which belongs to the cache kmalloc-64 of size 64
[   15.176620] The buggy address is located 0 bytes to the right of
[   15.176620]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.177193] 
[   15.177278] The buggy address belongs to the physical page:
[   15.177561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.177965] flags: 0x200000000000000(node=0|zone=2)
[   15.178260] page_type: f5(slab)
[   15.178456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.178806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.179148] page dumped because: kasan: bad access detected
[   15.179476] 
[   15.179546] Memory state around the buggy address:
[   15.179699]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180092]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.180414] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.180730]                                      ^
[   15.180964]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.181548]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.181855] ==================================================================
[   14.847331] ==================================================================
[   14.847756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   14.848296] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.848614] 
[   14.848711] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.848756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.848768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.848791] Call Trace:
[   14.848812]  <TASK>
[   14.848833]  dump_stack_lvl+0x73/0xb0
[   14.848872]  print_report+0xd1/0x650
[   14.848894]  ? __virt_addr_valid+0x1db/0x2d0
[   14.848917]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.848937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.848962]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.848983]  kasan_report+0x140/0x180
[   14.849026]  ? kasan_atomics_helper+0x4b70/0x5450
[   14.849067]  __asan_report_store4_noabort+0x1b/0x30
[   14.849090]  kasan_atomics_helper+0x4b70/0x5450
[   14.849112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.849133]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.849158]  ? kasan_atomics+0x153/0x310
[   14.849183]  kasan_atomics+0x1dd/0x310
[   14.849205]  ? __pfx_kasan_atomics+0x10/0x10
[   14.849228]  ? __pfx_read_tsc+0x10/0x10
[   14.849250]  ? ktime_get_ts64+0x86/0x230
[   14.849275]  kunit_try_run_case+0x1a6/0x480
[   14.849300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.849320]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.849343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.849369]  ? __kthread_parkme+0x82/0x160
[   14.849392]  ? preempt_count_sub+0x50/0x80
[   14.849417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.849440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.849465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.849491]  kthread+0x324/0x6e0
[   14.849511]  ? trace_preempt_on+0x20/0xc0
[   14.849535]  ? __pfx_kthread+0x10/0x10
[   14.849557]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.849580]  ? calculate_sigpending+0x7b/0xa0
[   14.849602]  ? __pfx_kthread+0x10/0x10
[   14.849624]  ret_from_fork+0x41/0x80
[   14.849642]  ? __pfx_kthread+0x10/0x10
[   14.849664]  ret_from_fork_asm+0x1a/0x30
[   14.849718]  </TASK>
[   14.849729] 
[   14.858468] Allocated by task 273:
[   14.858654]  kasan_save_stack+0x45/0x70
[   14.858799]  kasan_save_track+0x18/0x40
[   14.859066]  kasan_save_alloc_info+0x3b/0x50
[   14.859306]  __kasan_kmalloc+0xb7/0xc0
[   14.859459]  __kmalloc_cache_noprof+0x18a/0x420
[   14.859611]  kasan_atomics+0x96/0x310
[   14.859738]  kunit_try_run_case+0x1a6/0x480
[   14.859894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.860214]  kthread+0x324/0x6e0
[   14.860389]  ret_from_fork+0x41/0x80
[   14.860597]  ret_from_fork_asm+0x1a/0x30
[   14.860974] 
[   14.861076] The buggy address belongs to the object at ffff888101b3e000
[   14.861076]  which belongs to the cache kmalloc-64 of size 64
[   14.861605] The buggy address is located 0 bytes to the right of
[   14.861605]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.862270] 
[   14.862371] The buggy address belongs to the physical page:
[   14.862657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.863042] flags: 0x200000000000000(node=0|zone=2)
[   14.863469] page_type: f5(slab)
[   14.863723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.864070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.864303] page dumped because: kasan: bad access detected
[   14.864474] 
[   14.864543] Memory state around the buggy address:
[   14.864700]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.865090]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.865419] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.866293]                                      ^
[   14.866557]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.866888]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.867194] ==================================================================
[   15.340347] ==================================================================
[   15.340695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   15.341061] Read of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.341431] 
[   15.341543] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.341589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.341603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.341626] Call Trace:
[   15.341647]  <TASK>
[   15.341670]  dump_stack_lvl+0x73/0xb0
[   15.341699]  print_report+0xd1/0x650
[   15.341722]  ? __virt_addr_valid+0x1db/0x2d0
[   15.341752]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.341774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.341801]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.341823]  kasan_report+0x140/0x180
[   15.341854]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.341881]  __asan_report_load4_noabort+0x18/0x20
[   15.341905]  kasan_atomics_helper+0x4a38/0x5450
[   15.341928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.341950]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.341976]  ? kasan_atomics+0x153/0x310
[   15.342001]  kasan_atomics+0x1dd/0x310
[   15.342037]  ? __pfx_kasan_atomics+0x10/0x10
[   15.342062]  ? __pfx_read_tsc+0x10/0x10
[   15.342086]  ? ktime_get_ts64+0x86/0x230
[   15.342134]  kunit_try_run_case+0x1a6/0x480
[   15.342169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342207]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.342255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.342296]  ? __kthread_parkme+0x82/0x160
[   15.342332]  ? preempt_count_sub+0x50/0x80
[   15.342359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.342405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.342432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.342469]  kthread+0x324/0x6e0
[   15.342491]  ? trace_preempt_on+0x20/0xc0
[   15.342517]  ? __pfx_kthread+0x10/0x10
[   15.342540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.342565]  ? calculate_sigpending+0x7b/0xa0
[   15.342587]  ? __pfx_kthread+0x10/0x10
[   15.342611]  ret_from_fork+0x41/0x80
[   15.342631]  ? __pfx_kthread+0x10/0x10
[   15.342655]  ret_from_fork_asm+0x1a/0x30
[   15.342687]  </TASK>
[   15.342700] 
[   15.350338] Allocated by task 273:
[   15.350565]  kasan_save_stack+0x45/0x70
[   15.350809]  kasan_save_track+0x18/0x40
[   15.351066]  kasan_save_alloc_info+0x3b/0x50
[   15.351307]  __kasan_kmalloc+0xb7/0xc0
[   15.351480]  __kmalloc_cache_noprof+0x18a/0x420
[   15.351690]  kasan_atomics+0x96/0x310
[   15.351859]  kunit_try_run_case+0x1a6/0x480
[   15.352148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352548]  kthread+0x324/0x6e0
[   15.352792]  ret_from_fork+0x41/0x80
[   15.353010]  ret_from_fork_asm+0x1a/0x30
[   15.353416] 
[   15.353512] The buggy address belongs to the object at ffff888101b3e000
[   15.353512]  which belongs to the cache kmalloc-64 of size 64
[   15.354051] The buggy address is located 0 bytes to the right of
[   15.354051]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.354655] 
[   15.354757] The buggy address belongs to the physical page:
[   15.355015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.355373] flags: 0x200000000000000(node=0|zone=2)
[   15.355606] page_type: f5(slab)
[   15.355739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.355982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.356623] page dumped because: kasan: bad access detected
[   15.356888] 
[   15.356985] Memory state around the buggy address:
[   15.357289]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.357608]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.357824] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.358176]                                      ^
[   15.358435]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.358894]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.359248] ==================================================================
[   15.018099] ==================================================================
[   15.018355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   15.018604] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.018872] 
[   15.018980] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.019040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.019054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.019077] Call Trace:
[   15.019099]  <TASK>
[   15.019121]  dump_stack_lvl+0x73/0xb0
[   15.019150]  print_report+0xd1/0x650
[   15.019173]  ? __virt_addr_valid+0x1db/0x2d0
[   15.019197]  ? kasan_atomics_helper+0x730/0x5450
[   15.019218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.019244]  ? kasan_atomics_helper+0x730/0x5450
[   15.019265]  kasan_report+0x140/0x180
[   15.019288]  ? kasan_atomics_helper+0x730/0x5450
[   15.019313]  kasan_check_range+0x10c/0x1c0
[   15.019337]  __kasan_check_write+0x18/0x20
[   15.019360]  kasan_atomics_helper+0x730/0x5450
[   15.019382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.019404]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.019430]  ? kasan_atomics+0x153/0x310
[   15.019455]  kasan_atomics+0x1dd/0x310
[   15.019478]  ? __pfx_kasan_atomics+0x10/0x10
[   15.019502]  ? __pfx_read_tsc+0x10/0x10
[   15.019524]  ? ktime_get_ts64+0x86/0x230
[   15.019551]  kunit_try_run_case+0x1a6/0x480
[   15.019575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019597]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.019620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.019647]  ? __kthread_parkme+0x82/0x160
[   15.019670]  ? preempt_count_sub+0x50/0x80
[   15.019698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.019748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.019775]  kthread+0x324/0x6e0
[   15.019797]  ? trace_preempt_on+0x20/0xc0
[   15.019822]  ? __pfx_kthread+0x10/0x10
[   15.019856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.019880]  ? calculate_sigpending+0x7b/0xa0
[   15.019903]  ? __pfx_kthread+0x10/0x10
[   15.019927]  ret_from_fork+0x41/0x80
[   15.019946]  ? __pfx_kthread+0x10/0x10
[   15.019969]  ret_from_fork_asm+0x1a/0x30
[   15.020002]  </TASK>
[   15.020014] 
[   15.027877] Allocated by task 273:
[   15.028026]  kasan_save_stack+0x45/0x70
[   15.028245]  kasan_save_track+0x18/0x40
[   15.028445]  kasan_save_alloc_info+0x3b/0x50
[   15.028668]  __kasan_kmalloc+0xb7/0xc0
[   15.028866]  __kmalloc_cache_noprof+0x18a/0x420
[   15.029066]  kasan_atomics+0x96/0x310
[   15.029225]  kunit_try_run_case+0x1a6/0x480
[   15.029416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029594]  kthread+0x324/0x6e0
[   15.029730]  ret_from_fork+0x41/0x80
[   15.029931]  ret_from_fork_asm+0x1a/0x30
[   15.030228] 
[   15.030327] The buggy address belongs to the object at ffff888101b3e000
[   15.030327]  which belongs to the cache kmalloc-64 of size 64
[   15.030785] The buggy address is located 0 bytes to the right of
[   15.030785]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.031341] 
[   15.031442] The buggy address belongs to the physical page:
[   15.031670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.031978] flags: 0x200000000000000(node=0|zone=2)
[   15.032258] page_type: f5(slab)
[   15.032410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.032697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.033017] page dumped because: kasan: bad access detected
[   15.033271] 
[   15.033355] Memory state around the buggy address:
[   15.033547]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.033857]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034154] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.034396]                                      ^
[   15.034553]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034766]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035057] ==================================================================
[   15.088779] ==================================================================
[   15.089172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   15.089535] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.089876] 
[   15.089986] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.090032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.090048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.090072] Call Trace:
[   15.090096]  <TASK>
[   15.090120]  dump_stack_lvl+0x73/0xb0
[   15.090152]  print_report+0xd1/0x650
[   15.090175]  ? __virt_addr_valid+0x1db/0x2d0
[   15.090199]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.090221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.090247]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.090269]  kasan_report+0x140/0x180
[   15.090291]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.090318]  kasan_check_range+0x10c/0x1c0
[   15.090341]  __kasan_check_write+0x18/0x20
[   15.090365]  kasan_atomics_helper+0x8fa/0x5450
[   15.090388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.090409]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.090435]  ? kasan_atomics+0x153/0x310
[   15.090461]  kasan_atomics+0x1dd/0x310
[   15.090484]  ? __pfx_kasan_atomics+0x10/0x10
[   15.090508]  ? __pfx_read_tsc+0x10/0x10
[   15.090531]  ? ktime_get_ts64+0x86/0x230
[   15.090560]  kunit_try_run_case+0x1a6/0x480
[   15.090585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090607]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.090629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.090656]  ? __kthread_parkme+0x82/0x160
[   15.090679]  ? preempt_count_sub+0x50/0x80
[   15.090705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.090781]  kthread+0x324/0x6e0
[   15.090804]  ? trace_preempt_on+0x20/0xc0
[   15.090829]  ? __pfx_kthread+0x10/0x10
[   15.091299]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.091329]  ? calculate_sigpending+0x7b/0xa0
[   15.091354]  ? __pfx_kthread+0x10/0x10
[   15.091378]  ret_from_fork+0x41/0x80
[   15.091400]  ? __pfx_kthread+0x10/0x10
[   15.091424]  ret_from_fork_asm+0x1a/0x30
[   15.091457]  </TASK>
[   15.091469] 
[   15.102383] Allocated by task 273:
[   15.102609]  kasan_save_stack+0x45/0x70
[   15.102922]  kasan_save_track+0x18/0x40
[   15.103287]  kasan_save_alloc_info+0x3b/0x50
[   15.103645]  __kasan_kmalloc+0xb7/0xc0
[   15.103851]  __kmalloc_cache_noprof+0x18a/0x420
[   15.104311]  kasan_atomics+0x96/0x310
[   15.104668]  kunit_try_run_case+0x1a6/0x480
[   15.105209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105896]  kthread+0x324/0x6e0
[   15.106444]  ret_from_fork+0x41/0x80
[   15.106847]  ret_from_fork_asm+0x1a/0x30
[   15.106999] 
[   15.107083] The buggy address belongs to the object at ffff888101b3e000
[   15.107083]  which belongs to the cache kmalloc-64 of size 64
[   15.107430] The buggy address is located 0 bytes to the right of
[   15.107430]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.107904] 
[   15.108011] The buggy address belongs to the physical page:
[   15.108246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.108611] flags: 0x200000000000000(node=0|zone=2)
[   15.109413] page_type: f5(slab)
[   15.109597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.109977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.110322] page dumped because: kasan: bad access detected
[   15.110543] 
[   15.110638] Memory state around the buggy address:
[   15.110858]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111139]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111445] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.111733]                                      ^
[   15.111948]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112229]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.112515] ==================================================================
[   15.878574] ==================================================================
[   15.878867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   15.879230] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.879583] 
[   15.879708] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.879758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.879773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.879798] Call Trace:
[   15.879821]  <TASK>
[   15.879856]  dump_stack_lvl+0x73/0xb0
[   15.879909]  print_report+0xd1/0x650
[   15.879933]  ? __virt_addr_valid+0x1db/0x2d0
[   15.879957]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.879979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.880006]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.880028]  kasan_report+0x140/0x180
[   15.880051]  ? kasan_atomics_helper+0x1ce2/0x5450
[   15.880077]  kasan_check_range+0x10c/0x1c0
[   15.880101]  __kasan_check_write+0x18/0x20
[   15.880125]  kasan_atomics_helper+0x1ce2/0x5450
[   15.880159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.880181]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.880207]  ? kasan_atomics+0x153/0x310
[   15.880234]  kasan_atomics+0x1dd/0x310
[   15.880257]  ? __pfx_kasan_atomics+0x10/0x10
[   15.880281]  ? __pfx_read_tsc+0x10/0x10
[   15.880304]  ? ktime_get_ts64+0x86/0x230
[   15.880331]  kunit_try_run_case+0x1a6/0x480
[   15.880357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.880379]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.880403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.880430]  ? __kthread_parkme+0x82/0x160
[   15.880454]  ? preempt_count_sub+0x50/0x80
[   15.880481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.880505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.880532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.880560]  kthread+0x324/0x6e0
[   15.880583]  ? trace_preempt_on+0x20/0xc0
[   15.880608]  ? __pfx_kthread+0x10/0x10
[   15.880652]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.880679]  ? calculate_sigpending+0x7b/0xa0
[   15.880701]  ? __pfx_kthread+0x10/0x10
[   15.880726]  ret_from_fork+0x41/0x80
[   15.880746]  ? __pfx_kthread+0x10/0x10
[   15.880769]  ret_from_fork_asm+0x1a/0x30
[   15.880802]  </TASK>
[   15.880813] 
[   15.888363] Allocated by task 273:
[   15.888516]  kasan_save_stack+0x45/0x70
[   15.888678]  kasan_save_track+0x18/0x40
[   15.888877]  kasan_save_alloc_info+0x3b/0x50
[   15.889087]  __kasan_kmalloc+0xb7/0xc0
[   15.889274]  __kmalloc_cache_noprof+0x18a/0x420
[   15.889636]  kasan_atomics+0x96/0x310
[   15.889806]  kunit_try_run_case+0x1a6/0x480
[   15.889963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.890187]  kthread+0x324/0x6e0
[   15.890362]  ret_from_fork+0x41/0x80
[   15.890548]  ret_from_fork_asm+0x1a/0x30
[   15.890861] 
[   15.890936] The buggy address belongs to the object at ffff888101b3e000
[   15.890936]  which belongs to the cache kmalloc-64 of size 64
[   15.891318] The buggy address is located 0 bytes to the right of
[   15.891318]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.891899] 
[   15.891986] The buggy address belongs to the physical page:
[   15.892342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.892628] flags: 0x200000000000000(node=0|zone=2)
[   15.892799] page_type: f5(slab)
[   15.892937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.893171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.893608] page dumped because: kasan: bad access detected
[   15.893888] 
[   15.894006] Memory state around the buggy address:
[   15.894236]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.894558]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.894892] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.895195]                                      ^
[   15.895355]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.895717]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.895984] ==================================================================
[   15.747445] ==================================================================
[   15.747749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   15.748037] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.748467] 
[   15.748613] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.748657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.748694] Call Trace:
[   15.748714]  <TASK>
[   15.748734]  dump_stack_lvl+0x73/0xb0
[   15.748763]  print_report+0xd1/0x650
[   15.748785]  ? __virt_addr_valid+0x1db/0x2d0
[   15.748809]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.748830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.748868]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.748890]  kasan_report+0x140/0x180
[   15.748913]  ? kasan_atomics_helper+0x18b2/0x5450
[   15.748951]  kasan_check_range+0x10c/0x1c0
[   15.748975]  __kasan_check_write+0x18/0x20
[   15.748998]  kasan_atomics_helper+0x18b2/0x5450
[   15.749020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.749042]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.749068]  ? kasan_atomics+0x153/0x310
[   15.749094]  kasan_atomics+0x1dd/0x310
[   15.749116]  ? __pfx_kasan_atomics+0x10/0x10
[   15.749139]  ? __pfx_read_tsc+0x10/0x10
[   15.749162]  ? ktime_get_ts64+0x86/0x230
[   15.749188]  kunit_try_run_case+0x1a6/0x480
[   15.749211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749233]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.749256]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.749281]  ? __kthread_parkme+0x82/0x160
[   15.749304]  ? preempt_count_sub+0x50/0x80
[   15.749331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749407]  kthread+0x324/0x6e0
[   15.749436]  ? trace_preempt_on+0x20/0xc0
[   15.749462]  ? __pfx_kthread+0x10/0x10
[   15.749485]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749508]  ? calculate_sigpending+0x7b/0xa0
[   15.749532]  ? __pfx_kthread+0x10/0x10
[   15.749555]  ret_from_fork+0x41/0x80
[   15.749575]  ? __pfx_kthread+0x10/0x10
[   15.749598]  ret_from_fork_asm+0x1a/0x30
[   15.749630]  </TASK>
[   15.749641] 
[   15.757528] Allocated by task 273:
[   15.757715]  kasan_save_stack+0x45/0x70
[   15.757955]  kasan_save_track+0x18/0x40
[   15.758148]  kasan_save_alloc_info+0x3b/0x50
[   15.758298]  __kasan_kmalloc+0xb7/0xc0
[   15.758430]  __kmalloc_cache_noprof+0x18a/0x420
[   15.758586]  kasan_atomics+0x96/0x310
[   15.758722]  kunit_try_run_case+0x1a6/0x480
[   15.758881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759058]  kthread+0x324/0x6e0
[   15.759250]  ret_from_fork+0x41/0x80
[   15.759427]  ret_from_fork_asm+0x1a/0x30
[   15.759621] 
[   15.759716] The buggy address belongs to the object at ffff888101b3e000
[   15.759716]  which belongs to the cache kmalloc-64 of size 64
[   15.760235] The buggy address is located 0 bytes to the right of
[   15.760235]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.760725] 
[   15.760799] The buggy address belongs to the physical page:
[   15.760984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.761225] flags: 0x200000000000000(node=0|zone=2)
[   15.761714] page_type: f5(slab)
[   15.761900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.762272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.762731] page dumped because: kasan: bad access detected
[   15.762929] 
[   15.763026] Memory state around the buggy address:
[   15.763379]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763650]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.763959] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764234]                                      ^
[   15.764392]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764727]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765069] ==================================================================
[   15.995123] ==================================================================
[   15.995909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   15.996335] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.996693] 
[   15.996804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.996862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.996876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.996899] Call Trace:
[   15.996922]  <TASK>
[   15.996944]  dump_stack_lvl+0x73/0xb0
[   15.996972]  print_report+0xd1/0x650
[   15.996995]  ? __virt_addr_valid+0x1db/0x2d0
[   15.997019]  ? kasan_atomics_helper+0x2007/0x5450
[   15.997041]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.997067]  ? kasan_atomics_helper+0x2007/0x5450
[   15.997089]  kasan_report+0x140/0x180
[   15.997111]  ? kasan_atomics_helper+0x2007/0x5450
[   15.997136]  kasan_check_range+0x10c/0x1c0
[   15.997160]  __kasan_check_write+0x18/0x20
[   15.997184]  kasan_atomics_helper+0x2007/0x5450
[   15.997207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.997229]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.997255]  ? kasan_atomics+0x153/0x310
[   15.997281]  kasan_atomics+0x1dd/0x310
[   15.997303]  ? __pfx_kasan_atomics+0x10/0x10
[   15.997327]  ? __pfx_read_tsc+0x10/0x10
[   15.997350]  ? ktime_get_ts64+0x86/0x230
[   15.997377]  kunit_try_run_case+0x1a6/0x480
[   15.997401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.997423]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.997446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.997473]  ? __kthread_parkme+0x82/0x160
[   15.997496]  ? preempt_count_sub+0x50/0x80
[   15.997522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.997546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.997572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.997599]  kthread+0x324/0x6e0
[   15.997622]  ? trace_preempt_on+0x20/0xc0
[   15.997647]  ? __pfx_kthread+0x10/0x10
[   15.997670]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.997694]  ? calculate_sigpending+0x7b/0xa0
[   15.997717]  ? __pfx_kthread+0x10/0x10
[   15.997787]  ret_from_fork+0x41/0x80
[   15.997833]  ? __pfx_kthread+0x10/0x10
[   15.997864]  ret_from_fork_asm+0x1a/0x30
[   15.997898]  </TASK>
[   15.997910] 
[   16.005706] Allocated by task 273:
[   16.005872]  kasan_save_stack+0x45/0x70
[   16.006025]  kasan_save_track+0x18/0x40
[   16.006259]  kasan_save_alloc_info+0x3b/0x50
[   16.006469]  __kasan_kmalloc+0xb7/0xc0
[   16.006651]  __kmalloc_cache_noprof+0x18a/0x420
[   16.006880]  kasan_atomics+0x96/0x310
[   16.007060]  kunit_try_run_case+0x1a6/0x480
[   16.007265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.007542]  kthread+0x324/0x6e0
[   16.007734]  ret_from_fork+0x41/0x80
[   16.007972]  ret_from_fork_asm+0x1a/0x30
[   16.008191] 
[   16.008288] The buggy address belongs to the object at ffff888101b3e000
[   16.008288]  which belongs to the cache kmalloc-64 of size 64
[   16.008814] The buggy address is located 0 bytes to the right of
[   16.008814]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.009393] 
[   16.009526] The buggy address belongs to the physical page:
[   16.009788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.010172] flags: 0x200000000000000(node=0|zone=2)
[   16.010430] page_type: f5(slab)
[   16.010631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.010963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.011373] page dumped because: kasan: bad access detected
[   16.011627] 
[   16.011722] Memory state around the buggy address:
[   16.011980]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.012312]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.012628] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.012978]                                      ^
[   16.013204]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.013529]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.013849] ==================================================================
[   16.118180] ==================================================================
[   16.118548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   16.118917] Write of size 8 at addr ffff888101b3e030 by task kunit_try_catch/273
[   16.119385] 
[   16.119495] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   16.119539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.119552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.119576] Call Trace:
[   16.119597]  <TASK>
[   16.119618]  dump_stack_lvl+0x73/0xb0
[   16.119645]  print_report+0xd1/0x650
[   16.119667]  ? __virt_addr_valid+0x1db/0x2d0
[   16.119691]  ? kasan_atomics_helper+0x224d/0x5450
[   16.119713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.119740]  ? kasan_atomics_helper+0x224d/0x5450
[   16.119761]  kasan_report+0x140/0x180
[   16.119783]  ? kasan_atomics_helper+0x224d/0x5450
[   16.119809]  kasan_check_range+0x10c/0x1c0
[   16.119832]  __kasan_check_write+0x18/0x20
[   16.119867]  kasan_atomics_helper+0x224d/0x5450
[   16.119889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.119912]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.119936]  ? kasan_atomics+0x153/0x310
[   16.119962]  kasan_atomics+0x1dd/0x310
[   16.119984]  ? __pfx_kasan_atomics+0x10/0x10
[   16.120008]  ? __pfx_read_tsc+0x10/0x10
[   16.120031]  ? ktime_get_ts64+0x86/0x230
[   16.120068]  kunit_try_run_case+0x1a6/0x480
[   16.120095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.120117]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.120140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.120166]  ? __kthread_parkme+0x82/0x160
[   16.120190]  ? preempt_count_sub+0x50/0x80
[   16.120215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.120238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.120265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.120291]  kthread+0x324/0x6e0
[   16.120315]  ? trace_preempt_on+0x20/0xc0
[   16.120339]  ? __pfx_kthread+0x10/0x10
[   16.120363]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.120387]  ? calculate_sigpending+0x7b/0xa0
[   16.120410]  ? __pfx_kthread+0x10/0x10
[   16.120433]  ret_from_fork+0x41/0x80
[   16.120452]  ? __pfx_kthread+0x10/0x10
[   16.120476]  ret_from_fork_asm+0x1a/0x30
[   16.120508]  </TASK>
[   16.120520] 
[   16.127819] Allocated by task 273:
[   16.128024]  kasan_save_stack+0x45/0x70
[   16.128234]  kasan_save_track+0x18/0x40
[   16.128436]  kasan_save_alloc_info+0x3b/0x50
[   16.128669]  __kasan_kmalloc+0xb7/0xc0
[   16.128874]  __kmalloc_cache_noprof+0x18a/0x420
[   16.129101]  kasan_atomics+0x96/0x310
[   16.129295]  kunit_try_run_case+0x1a6/0x480
[   16.129507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.129852]  kthread+0x324/0x6e0
[   16.130125]  ret_from_fork+0x41/0x80
[   16.130259]  ret_from_fork_asm+0x1a/0x30
[   16.130403] 
[   16.130475] The buggy address belongs to the object at ffff888101b3e000
[   16.130475]  which belongs to the cache kmalloc-64 of size 64
[   16.131015] The buggy address is located 0 bytes to the right of
[   16.131015]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   16.131528] 
[   16.131608] The buggy address belongs to the physical page:
[   16.131782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   16.132534] flags: 0x200000000000000(node=0|zone=2)
[   16.132741] page_type: f5(slab)
[   16.132914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.134499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.134755] page dumped because: kasan: bad access detected
[   16.135501] 
[   16.135952] Memory state around the buggy address:
[   16.136631]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137759]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.138337] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.138561]                                      ^
[   16.138726]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139321]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.139993] ==================================================================
[   15.260230] ==================================================================
[   15.260475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   15.260705] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.261322] 
[   15.261483] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.261536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.261552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.261577] Call Trace:
[   15.261598]  <TASK>
[   15.261620]  dump_stack_lvl+0x73/0xb0
[   15.261651]  print_report+0xd1/0x650
[   15.261676]  ? __virt_addr_valid+0x1db/0x2d0
[   15.261699]  ? kasan_atomics_helper+0xde1/0x5450
[   15.261720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.261754]  ? kasan_atomics_helper+0xde1/0x5450
[   15.261776]  kasan_report+0x140/0x180
[   15.261799]  ? kasan_atomics_helper+0xde1/0x5450
[   15.261825]  kasan_check_range+0x10c/0x1c0
[   15.261862]  __kasan_check_write+0x18/0x20
[   15.261886]  kasan_atomics_helper+0xde1/0x5450
[   15.261908]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.261930]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.261956]  ? kasan_atomics+0x153/0x310
[   15.261982]  kasan_atomics+0x1dd/0x310
[   15.262005]  ? __pfx_kasan_atomics+0x10/0x10
[   15.262029]  ? __pfx_read_tsc+0x10/0x10
[   15.262052]  ? ktime_get_ts64+0x86/0x230
[   15.262078]  kunit_try_run_case+0x1a6/0x480
[   15.262104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262126]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.262149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.262176]  ? __kthread_parkme+0x82/0x160
[   15.262199]  ? preempt_count_sub+0x50/0x80
[   15.262225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262301]  kthread+0x324/0x6e0
[   15.262323]  ? trace_preempt_on+0x20/0xc0
[   15.262348]  ? __pfx_kthread+0x10/0x10
[   15.262371]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.262395]  ? calculate_sigpending+0x7b/0xa0
[   15.262418]  ? __pfx_kthread+0x10/0x10
[   15.262442]  ret_from_fork+0x41/0x80
[   15.262462]  ? __pfx_kthread+0x10/0x10
[   15.262484]  ret_from_fork_asm+0x1a/0x30
[   15.262517]  </TASK>
[   15.262529] 
[   15.272615] Allocated by task 273:
[   15.273227]  kasan_save_stack+0x45/0x70
[   15.273861]  kasan_save_track+0x18/0x40
[   15.274465]  kasan_save_alloc_info+0x3b/0x50
[   15.275026]  __kasan_kmalloc+0xb7/0xc0
[   15.275570]  __kmalloc_cache_noprof+0x18a/0x420
[   15.275746]  kasan_atomics+0x96/0x310
[   15.275891]  kunit_try_run_case+0x1a6/0x480
[   15.276037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.276213]  kthread+0x324/0x6e0
[   15.276336]  ret_from_fork+0x41/0x80
[   15.276544]  ret_from_fork_asm+0x1a/0x30
[   15.276780] 
[   15.276908] The buggy address belongs to the object at ffff888101b3e000
[   15.276908]  which belongs to the cache kmalloc-64 of size 64
[   15.277755] The buggy address is located 0 bytes to the right of
[   15.277755]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.279061] 
[   15.279226] The buggy address belongs to the physical page:
[   15.279645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.280056] flags: 0x200000000000000(node=0|zone=2)
[   15.280603] page_type: f5(slab)
[   15.280931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.281318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.281547] page dumped because: kasan: bad access detected
[   15.281719] 
[   15.281797] Memory state around the buggy address:
[   15.281974]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.282334]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.282613] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.282927]                                      ^
[   15.283219]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283493]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283813] ==================================================================
[   14.962479] ==================================================================
[   14.962792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   14.963337] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   14.963650] 
[   14.963738] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   14.963813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.963827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.963876] Call Trace:
[   14.963898]  <TASK>
[   14.963934]  dump_stack_lvl+0x73/0xb0
[   14.963990]  print_report+0xd1/0x650
[   14.964027]  ? __virt_addr_valid+0x1db/0x2d0
[   14.964051]  ? kasan_atomics_helper+0x566/0x5450
[   14.964085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.964139]  ? kasan_atomics_helper+0x566/0x5450
[   14.964174]  kasan_report+0x140/0x180
[   14.964212]  ? kasan_atomics_helper+0x566/0x5450
[   14.964252]  kasan_check_range+0x10c/0x1c0
[   14.964289]  __kasan_check_write+0x18/0x20
[   14.964312]  kasan_atomics_helper+0x566/0x5450
[   14.964335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.964358]  ? __kmalloc_cache_noprof+0x18a/0x420
[   14.964384]  ? kasan_atomics+0x153/0x310
[   14.964410]  kasan_atomics+0x1dd/0x310
[   14.964432]  ? __pfx_kasan_atomics+0x10/0x10
[   14.964456]  ? __pfx_read_tsc+0x10/0x10
[   14.964480]  ? ktime_get_ts64+0x86/0x230
[   14.964509]  kunit_try_run_case+0x1a6/0x480
[   14.964535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.964557]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.964580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.964607]  ? __kthread_parkme+0x82/0x160
[   14.964631]  ? preempt_count_sub+0x50/0x80
[   14.964657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.964680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.964708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.964735]  kthread+0x324/0x6e0
[   14.964757]  ? trace_preempt_on+0x20/0xc0
[   14.964782]  ? __pfx_kthread+0x10/0x10
[   14.964806]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.964831]  ? calculate_sigpending+0x7b/0xa0
[   14.964864]  ? __pfx_kthread+0x10/0x10
[   14.964887]  ret_from_fork+0x41/0x80
[   14.964906]  ? __pfx_kthread+0x10/0x10
[   14.964929]  ret_from_fork_asm+0x1a/0x30
[   14.964962]  </TASK>
[   14.964974] 
[   14.972672] Allocated by task 273:
[   14.972883]  kasan_save_stack+0x45/0x70
[   14.973040]  kasan_save_track+0x18/0x40
[   14.973171]  kasan_save_alloc_info+0x3b/0x50
[   14.973317]  __kasan_kmalloc+0xb7/0xc0
[   14.973446]  __kmalloc_cache_noprof+0x18a/0x420
[   14.973729]  kasan_atomics+0x96/0x310
[   14.974116]  kunit_try_run_case+0x1a6/0x480
[   14.974324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974567]  kthread+0x324/0x6e0
[   14.974741]  ret_from_fork+0x41/0x80
[   14.974933]  ret_from_fork_asm+0x1a/0x30
[   14.975218] 
[   14.975303] The buggy address belongs to the object at ffff888101b3e000
[   14.975303]  which belongs to the cache kmalloc-64 of size 64
[   14.975644] The buggy address is located 0 bytes to the right of
[   14.975644]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   14.976004] 
[   14.976153] The buggy address belongs to the physical page:
[   14.976412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   14.976804] flags: 0x200000000000000(node=0|zone=2)
[   14.977120] page_type: f5(slab)
[   14.977328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.977716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.978144] page dumped because: kasan: bad access detected
[   14.978404] 
[   14.978513] Memory state around the buggy address:
[   14.978734]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.979113]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.979432] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.979757]                                      ^
[   14.979973]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.980383]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.980746] ==================================================================
[   15.063220] ==================================================================
[   15.063901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   15.064617] Write of size 4 at addr ffff888101b3e030 by task kunit_try_catch/273
[   15.065299] 
[   15.065504] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   15.065552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.065565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.065589] Call Trace:
[   15.065612]  <TASK>
[   15.065644]  dump_stack_lvl+0x73/0xb0
[   15.065674]  print_report+0xd1/0x650
[   15.065709]  ? __virt_addr_valid+0x1db/0x2d0
[   15.065732]  ? kasan_atomics_helper+0x861/0x5450
[   15.065758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.065785]  ? kasan_atomics_helper+0x861/0x5450
[   15.065806]  kasan_report+0x140/0x180
[   15.065829]  ? kasan_atomics_helper+0x861/0x5450
[   15.065863]  kasan_check_range+0x10c/0x1c0
[   15.065886]  __kasan_check_write+0x18/0x20
[   15.065909]  kasan_atomics_helper+0x861/0x5450
[   15.065932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.065954]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.065980]  ? kasan_atomics+0x153/0x310
[   15.066005]  kasan_atomics+0x1dd/0x310
[   15.066028]  ? __pfx_kasan_atomics+0x10/0x10
[   15.066070]  ? __pfx_read_tsc+0x10/0x10
[   15.066093]  ? ktime_get_ts64+0x86/0x230
[   15.066120]  kunit_try_run_case+0x1a6/0x480
[   15.066144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066170]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.066193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.066220]  ? __kthread_parkme+0x82/0x160
[   15.066243]  ? preempt_count_sub+0x50/0x80
[   15.066269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.066319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.066346]  kthread+0x324/0x6e0
[   15.066368]  ? trace_preempt_on+0x20/0xc0
[   15.066394]  ? __pfx_kthread+0x10/0x10
[   15.066417]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.066443]  ? calculate_sigpending+0x7b/0xa0
[   15.066465]  ? __pfx_kthread+0x10/0x10
[   15.066489]  ret_from_fork+0x41/0x80
[   15.066509]  ? __pfx_kthread+0x10/0x10
[   15.066532]  ret_from_fork_asm+0x1a/0x30
[   15.066565]  </TASK>
[   15.066577] 
[   15.077764] Allocated by task 273:
[   15.078239]  kasan_save_stack+0x45/0x70
[   15.078408]  kasan_save_track+0x18/0x40
[   15.078541]  kasan_save_alloc_info+0x3b/0x50
[   15.078686]  __kasan_kmalloc+0xb7/0xc0
[   15.078814]  __kmalloc_cache_noprof+0x18a/0x420
[   15.078984]  kasan_atomics+0x96/0x310
[   15.079280]  kunit_try_run_case+0x1a6/0x480
[   15.079512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.079763]  kthread+0x324/0x6e0
[   15.079966]  ret_from_fork+0x41/0x80
[   15.080191]  ret_from_fork_asm+0x1a/0x30
[   15.080402] 
[   15.080500] The buggy address belongs to the object at ffff888101b3e000
[   15.080500]  which belongs to the cache kmalloc-64 of size 64
[   15.080969] The buggy address is located 0 bytes to the right of
[   15.080969]  allocated 48-byte region [ffff888101b3e000, ffff888101b3e030)
[   15.081323] 
[   15.081445] The buggy address belongs to the physical page:
[   15.081727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3e
[   15.082140] flags: 0x200000000000000(node=0|zone=2)
[   15.082682] page_type: f5(slab)
[   15.083176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.083918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.084360] page dumped because: kasan: bad access detected
[   15.084735] 
[   15.084876] Memory state around the buggy address:
[   15.085246]  ffff888101b3df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.085536]  ffff888101b3df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.085967] >ffff888101b3e000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.086288]                                      ^
[   15.086634]  ffff888101b3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087039]  ffff888101b3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.087500] ==================================================================