Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-x86_64

[   16.480495] ==================================================================
[   16.481358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   16.481738] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.482059] 
[   16.482170] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.482211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.482225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.482247] Call Trace:
[   16.482262]  <TASK>
[   16.482278]  dump_stack_lvl+0x73/0xb0
[   16.482315]  print_report+0xd1/0x650
[   16.482337]  ? __virt_addr_valid+0x1db/0x2d0
[   16.482371]  ? kasan_atomics_helper+0x2007/0x5450
[   16.482392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.482419]  ? kasan_atomics_helper+0x2007/0x5450
[   16.482441]  kasan_report+0x140/0x180
[   16.482463]  ? kasan_atomics_helper+0x2007/0x5450
[   16.482489]  kasan_check_range+0x10c/0x1c0
[   16.482513]  __kasan_check_write+0x18/0x20
[   16.482536]  kasan_atomics_helper+0x2007/0x5450
[   16.482559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.482581]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.482616]  ? kasan_atomics+0x153/0x310
[   16.482642]  kasan_atomics+0x1dd/0x310
[   16.482674]  ? __pfx_kasan_atomics+0x10/0x10
[   16.482699]  ? __pfx_read_tsc+0x10/0x10
[   16.482721]  ? ktime_get_ts64+0x86/0x230
[   16.482747]  kunit_try_run_case+0x1a6/0x480
[   16.482770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.482792]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.482826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.482850]  ? __kthread_parkme+0x82/0x160
[   16.482883]  ? preempt_count_sub+0x50/0x80
[   16.482908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.482932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.482959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.482986]  kthread+0x324/0x6e0
[   16.483008]  ? trace_preempt_on+0x20/0xc0
[   16.483040]  ? __pfx_kthread+0x10/0x10
[   16.483063]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.483086]  ? calculate_sigpending+0x7b/0xa0
[   16.483108]  ? __pfx_kthread+0x10/0x10
[   16.483132]  ret_from_fork+0x41/0x80
[   16.483152]  ? __pfx_kthread+0x10/0x10
[   16.483175]  ret_from_fork_asm+0x1a/0x30
[   16.483206]  </TASK>
[   16.483217] 
[   16.490979] Allocated by task 273:
[   16.491152]  kasan_save_stack+0x45/0x70
[   16.491369]  kasan_save_track+0x18/0x40
[   16.491563]  kasan_save_alloc_info+0x3b/0x50
[   16.491773]  __kasan_kmalloc+0xb7/0xc0
[   16.491958]  __kmalloc_cache_noprof+0x18a/0x420
[   16.492192]  kasan_atomics+0x96/0x310
[   16.492328]  kunit_try_run_case+0x1a6/0x480
[   16.492542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.492802]  kthread+0x324/0x6e0
[   16.492978]  ret_from_fork+0x41/0x80
[   16.493173]  ret_from_fork_asm+0x1a/0x30
[   16.493373] 
[   16.493474] The buggy address belongs to the object at ffff888101bf3e00
[   16.493474]  which belongs to the cache kmalloc-64 of size 64
[   16.493988] The buggy address is located 0 bytes to the right of
[   16.493988]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.494515] 
[   16.494643] The buggy address belongs to the physical page:
[   16.494880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.495244] flags: 0x200000000000000(node=0|zone=2)
[   16.495458] page_type: f5(slab)
[   16.495657] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.495901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.496138] page dumped because: kasan: bad access detected
[   16.496311] 
[   16.496382] Memory state around the buggy address:
[   16.496629]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497003]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497332] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.497623]                                      ^
[   16.497800]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498026]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498237] ==================================================================
[   15.186845] ==================================================================
[   15.187141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   15.187505] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.187895] 
[   15.188026] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.188065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.188087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.188108] Call Trace:
[   15.188125]  <TASK>
[   15.188140]  dump_stack_lvl+0x73/0xb0
[   15.188164]  print_report+0xd1/0x650
[   15.188184]  ? __virt_addr_valid+0x1db/0x2d0
[   15.188206]  ? kasan_atomics_helper+0x4b8a/0x5450
[   15.188226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.188251]  ? kasan_atomics_helper+0x4b8a/0x5450
[   15.188271]  kasan_report+0x140/0x180
[   15.188292]  ? kasan_atomics_helper+0x4b8a/0x5450
[   15.188317]  __asan_report_load4_noabort+0x18/0x20
[   15.188340]  kasan_atomics_helper+0x4b8a/0x5450
[   15.188372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.188393]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.188415]  ? kasan_atomics+0x153/0x310
[   15.188451]  kasan_atomics+0x1dd/0x310
[   15.188472]  ? __pfx_kasan_atomics+0x10/0x10
[   15.188496]  ? __pfx_read_tsc+0x10/0x10
[   15.188517]  ? ktime_get_ts64+0x86/0x230
[   15.188541]  kunit_try_run_case+0x1a6/0x480
[   15.188563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188583]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.188607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.188630]  ? __kthread_parkme+0x82/0x160
[   15.188652]  ? preempt_count_sub+0x50/0x80
[   15.188675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.188723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.188749]  kthread+0x324/0x6e0
[   15.188770]  ? trace_preempt_on+0x20/0xc0
[   15.188792]  ? __pfx_kthread+0x10/0x10
[   15.188814]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.188835]  ? calculate_sigpending+0x7b/0xa0
[   15.188911]  ? __pfx_kthread+0x10/0x10
[   15.188947]  ret_from_fork+0x41/0x80
[   15.188966]  ? __pfx_kthread+0x10/0x10
[   15.188987]  ret_from_fork_asm+0x1a/0x30
[   15.189026]  </TASK>
[   15.189037] 
[   15.199285] Allocated by task 273:
[   15.199769]  kasan_save_stack+0x45/0x70
[   15.200055]  kasan_save_track+0x18/0x40
[   15.200429]  kasan_save_alloc_info+0x3b/0x50
[   15.200900]  __kasan_kmalloc+0xb7/0xc0
[   15.201232]  __kmalloc_cache_noprof+0x18a/0x420
[   15.201781]  kasan_atomics+0x96/0x310
[   15.202192]  kunit_try_run_case+0x1a6/0x480
[   15.202554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.202999]  kthread+0x324/0x6e0
[   15.203392]  ret_from_fork+0x41/0x80
[   15.203713]  ret_from_fork_asm+0x1a/0x30
[   15.204129] 
[   15.204358] The buggy address belongs to the object at ffff888101bf3e00
[   15.204358]  which belongs to the cache kmalloc-64 of size 64
[   15.205146] The buggy address is located 0 bytes to the right of
[   15.205146]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.205945] 
[   15.206198] The buggy address belongs to the physical page:
[   15.206783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.207434] flags: 0x200000000000000(node=0|zone=2)
[   15.208080] page_type: f5(slab)
[   15.208255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.208550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.208835] page dumped because: kasan: bad access detected
[   15.209055] 
[   15.209128] Memory state around the buggy address:
[   15.209287]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.209723]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.210084] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.210364]                                      ^
[   15.210628]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.210964]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.211490] ==================================================================
[   16.187274] ==================================================================
[   16.187704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   16.188662] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.188915] 
[   16.189000] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.189052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.189065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.189087] Call Trace:
[   16.189104]  <TASK>
[   16.189120]  dump_stack_lvl+0x73/0xb0
[   16.189146]  print_report+0xd1/0x650
[   16.189168]  ? __virt_addr_valid+0x1db/0x2d0
[   16.189191]  ? kasan_atomics_helper+0x18b2/0x5450
[   16.189213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.189239]  ? kasan_atomics_helper+0x18b2/0x5450
[   16.189261]  kasan_report+0x140/0x180
[   16.189283]  ? kasan_atomics_helper+0x18b2/0x5450
[   16.189309]  kasan_check_range+0x10c/0x1c0
[   16.189333]  __kasan_check_write+0x18/0x20
[   16.189356]  kasan_atomics_helper+0x18b2/0x5450
[   16.189379]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.189401]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.189426]  ? kasan_atomics+0x153/0x310
[   16.189454]  kasan_atomics+0x1dd/0x310
[   16.189477]  ? __pfx_kasan_atomics+0x10/0x10
[   16.189500]  ? __pfx_read_tsc+0x10/0x10
[   16.189522]  ? ktime_get_ts64+0x86/0x230
[   16.189548]  kunit_try_run_case+0x1a6/0x480
[   16.189571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.189593]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.189617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.189653]  ? __kthread_parkme+0x82/0x160
[   16.189676]  ? preempt_count_sub+0x50/0x80
[   16.189701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.189742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.189770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.189798]  kthread+0x324/0x6e0
[   16.189820]  ? trace_preempt_on+0x20/0xc0
[   16.189853]  ? __pfx_kthread+0x10/0x10
[   16.189876]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.189899]  ? calculate_sigpending+0x7b/0xa0
[   16.189932]  ? __pfx_kthread+0x10/0x10
[   16.189955]  ret_from_fork+0x41/0x80
[   16.189975]  ? __pfx_kthread+0x10/0x10
[   16.189998]  ret_from_fork_asm+0x1a/0x30
[   16.190038]  </TASK>
[   16.190050] 
[   16.200732] Allocated by task 273:
[   16.201097]  kasan_save_stack+0x45/0x70
[   16.201487]  kasan_save_track+0x18/0x40
[   16.201918]  kasan_save_alloc_info+0x3b/0x50
[   16.202335]  __kasan_kmalloc+0xb7/0xc0
[   16.202709]  __kmalloc_cache_noprof+0x18a/0x420
[   16.203064]  kasan_atomics+0x96/0x310
[   16.203312]  kunit_try_run_case+0x1a6/0x480
[   16.203616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.203798]  kthread+0x324/0x6e0
[   16.203920]  ret_from_fork+0x41/0x80
[   16.204062]  ret_from_fork_asm+0x1a/0x30
[   16.204205] 
[   16.204277] The buggy address belongs to the object at ffff888101bf3e00
[   16.204277]  which belongs to the cache kmalloc-64 of size 64
[   16.204667] The buggy address is located 0 bytes to the right of
[   16.204667]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.205184] 
[   16.205281] The buggy address belongs to the physical page:
[   16.205530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.205805] flags: 0x200000000000000(node=0|zone=2)
[   16.206060] page_type: f5(slab)
[   16.206255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.206589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.206906] page dumped because: kasan: bad access detected
[   16.207167] 
[   16.207274] Memory state around the buggy address:
[   16.207475]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.207791]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.208031] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.208373]                                      ^
[   16.208591]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.208811]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.209146] ==================================================================
[   15.531888] ==================================================================
[   15.532249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   15.532736] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.533103] 
[   15.533190] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.533228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.533242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.533264] Call Trace:
[   15.533278]  <TASK>
[   15.533292]  dump_stack_lvl+0x73/0xb0
[   15.533317]  print_report+0xd1/0x650
[   15.533339]  ? __virt_addr_valid+0x1db/0x2d0
[   15.533362]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.533383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.533410]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.533455]  kasan_report+0x140/0x180
[   15.533478]  ? kasan_atomics_helper+0xa2c/0x5450
[   15.533504]  kasan_check_range+0x10c/0x1c0
[   15.533528]  __kasan_check_write+0x18/0x20
[   15.533551]  kasan_atomics_helper+0xa2c/0x5450
[   15.533623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.533666]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.533691]  ? kasan_atomics+0x153/0x310
[   15.533718]  kasan_atomics+0x1dd/0x310
[   15.533746]  ? __pfx_kasan_atomics+0x10/0x10
[   15.533771]  ? __pfx_read_tsc+0x10/0x10
[   15.533793]  ? ktime_get_ts64+0x86/0x230
[   15.533819]  kunit_try_run_case+0x1a6/0x480
[   15.533843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.533865]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.533890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.533914]  ? __kthread_parkme+0x82/0x160
[   15.533936]  ? preempt_count_sub+0x50/0x80
[   15.533962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.533985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.534011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.534048]  kthread+0x324/0x6e0
[   15.534089]  ? trace_preempt_on+0x20/0xc0
[   15.534113]  ? __pfx_kthread+0x10/0x10
[   15.534137]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.534160]  ? calculate_sigpending+0x7b/0xa0
[   15.534182]  ? __pfx_kthread+0x10/0x10
[   15.534206]  ret_from_fork+0x41/0x80
[   15.534225]  ? __pfx_kthread+0x10/0x10
[   15.534248]  ret_from_fork_asm+0x1a/0x30
[   15.534279]  </TASK>
[   15.534290] 
[   15.542822] Allocated by task 273:
[   15.543191]  kasan_save_stack+0x45/0x70
[   15.543407]  kasan_save_track+0x18/0x40
[   15.543746]  kasan_save_alloc_info+0x3b/0x50
[   15.543908]  __kasan_kmalloc+0xb7/0xc0
[   15.544114]  __kmalloc_cache_noprof+0x18a/0x420
[   15.544340]  kasan_atomics+0x96/0x310
[   15.544533]  kunit_try_run_case+0x1a6/0x480
[   15.544793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.545158]  kthread+0x324/0x6e0
[   15.545350]  ret_from_fork+0x41/0x80
[   15.545534]  ret_from_fork_asm+0x1a/0x30
[   15.545800] 
[   15.545890] The buggy address belongs to the object at ffff888101bf3e00
[   15.545890]  which belongs to the cache kmalloc-64 of size 64
[   15.546242] The buggy address is located 0 bytes to the right of
[   15.546242]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.546786] 
[   15.546882] The buggy address belongs to the physical page:
[   15.547137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.547572] flags: 0x200000000000000(node=0|zone=2)
[   15.547728] page_type: f5(slab)
[   15.547847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.548200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.548821] page dumped because: kasan: bad access detected
[   15.549088] 
[   15.549173] Memory state around the buggy address:
[   15.549327]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.549841]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.550147] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.550357]                                      ^
[   15.550593]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.550905]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.551214] ==================================================================
[   15.748937] ==================================================================
[   15.749326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   15.749847] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.750204] 
[   15.750432] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.750637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.750653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.750675] Call Trace:
[   15.750690]  <TASK>
[   15.750706]  dump_stack_lvl+0x73/0xb0
[   15.750735]  print_report+0xd1/0x650
[   15.750757]  ? __virt_addr_valid+0x1db/0x2d0
[   15.750780]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.750826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.750852]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.750876]  kasan_report+0x140/0x180
[   15.751060]  ? kasan_atomics_helper+0x4a38/0x5450
[   15.751096]  __asan_report_load4_noabort+0x18/0x20
[   15.751139]  kasan_atomics_helper+0x4a38/0x5450
[   15.751164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.751203]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.751228]  ? kasan_atomics+0x153/0x310
[   15.751255]  kasan_atomics+0x1dd/0x310
[   15.751277]  ? __pfx_kasan_atomics+0x10/0x10
[   15.751301]  ? __pfx_read_tsc+0x10/0x10
[   15.751324]  ? ktime_get_ts64+0x86/0x230
[   15.751349]  kunit_try_run_case+0x1a6/0x480
[   15.751373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.751397]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.751422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.751446]  ? __kthread_parkme+0x82/0x160
[   15.751468]  ? preempt_count_sub+0x50/0x80
[   15.751494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.751517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.751544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.751571]  kthread+0x324/0x6e0
[   15.751593]  ? trace_preempt_on+0x20/0xc0
[   15.751617]  ? __pfx_kthread+0x10/0x10
[   15.751640]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.751662]  ? calculate_sigpending+0x7b/0xa0
[   15.751685]  ? __pfx_kthread+0x10/0x10
[   15.751707]  ret_from_fork+0x41/0x80
[   15.751727]  ? __pfx_kthread+0x10/0x10
[   15.751749]  ret_from_fork_asm+0x1a/0x30
[   15.751782]  </TASK>
[   15.751792] 
[   15.762750] Allocated by task 273:
[   15.762977]  kasan_save_stack+0x45/0x70
[   15.763361]  kasan_save_track+0x18/0x40
[   15.763677]  kasan_save_alloc_info+0x3b/0x50
[   15.763847]  __kasan_kmalloc+0xb7/0xc0
[   15.764047]  __kmalloc_cache_noprof+0x18a/0x420
[   15.764294]  kasan_atomics+0x96/0x310
[   15.764551]  kunit_try_run_case+0x1a6/0x480
[   15.765063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.765366]  kthread+0x324/0x6e0
[   15.765553]  ret_from_fork+0x41/0x80
[   15.765758]  ret_from_fork_asm+0x1a/0x30
[   15.765962] 
[   15.766295] The buggy address belongs to the object at ffff888101bf3e00
[   15.766295]  which belongs to the cache kmalloc-64 of size 64
[   15.766965] The buggy address is located 0 bytes to the right of
[   15.766965]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.767798] 
[   15.767904] The buggy address belongs to the physical page:
[   15.768143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.768749] flags: 0x200000000000000(node=0|zone=2)
[   15.769056] page_type: f5(slab)
[   15.769222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.769521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.769989] page dumped because: kasan: bad access detected
[   15.770461] 
[   15.770552] Memory state around the buggy address:
[   15.770774]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.771232]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.771730] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.772137]                                      ^
[   15.772433]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.772988]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.773449] ==================================================================
[   15.398334] ==================================================================
[   15.398691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   15.399228] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.399632] 
[   15.399883] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.399928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.399942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.399965] Call Trace:
[   15.399981]  <TASK>
[   15.399996]  dump_stack_lvl+0x73/0xb0
[   15.400037]  print_report+0xd1/0x650
[   15.400059]  ? __virt_addr_valid+0x1db/0x2d0
[   15.400082]  ? kasan_atomics_helper+0x698/0x5450
[   15.400104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.400131]  ? kasan_atomics_helper+0x698/0x5450
[   15.400153]  kasan_report+0x140/0x180
[   15.400177]  ? kasan_atomics_helper+0x698/0x5450
[   15.400204]  kasan_check_range+0x10c/0x1c0
[   15.400228]  __kasan_check_write+0x18/0x20
[   15.400252]  kasan_atomics_helper+0x698/0x5450
[   15.400275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.400297]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.400322]  ? kasan_atomics+0x153/0x310
[   15.400348]  kasan_atomics+0x1dd/0x310
[   15.400371]  ? __pfx_kasan_atomics+0x10/0x10
[   15.400395]  ? __pfx_read_tsc+0x10/0x10
[   15.400417]  ? ktime_get_ts64+0x86/0x230
[   15.400443]  kunit_try_run_case+0x1a6/0x480
[   15.400467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.400489]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.400514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.400538]  ? __kthread_parkme+0x82/0x160
[   15.400561]  ? preempt_count_sub+0x50/0x80
[   15.400586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.400611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.400638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.400665]  kthread+0x324/0x6e0
[   15.400687]  ? trace_preempt_on+0x20/0xc0
[   15.400711]  ? __pfx_kthread+0x10/0x10
[   15.400734]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.400758]  ? calculate_sigpending+0x7b/0xa0
[   15.400781]  ? __pfx_kthread+0x10/0x10
[   15.400804]  ret_from_fork+0x41/0x80
[   15.400824]  ? __pfx_kthread+0x10/0x10
[   15.400846]  ret_from_fork_asm+0x1a/0x30
[   15.400878]  </TASK>
[   15.400889] 
[   15.409286] Allocated by task 273:
[   15.409450]  kasan_save_stack+0x45/0x70
[   15.409951]  kasan_save_track+0x18/0x40
[   15.410396]  kasan_save_alloc_info+0x3b/0x50
[   15.410782]  __kasan_kmalloc+0xb7/0xc0
[   15.411163]  __kmalloc_cache_noprof+0x18a/0x420
[   15.411535]  kasan_atomics+0x96/0x310
[   15.411869]  kunit_try_run_case+0x1a6/0x480
[   15.412054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.412275]  kthread+0x324/0x6e0
[   15.412429]  ret_from_fork+0x41/0x80
[   15.412852]  ret_from_fork_asm+0x1a/0x30
[   15.413298] 
[   15.413570] The buggy address belongs to the object at ffff888101bf3e00
[   15.413570]  which belongs to the cache kmalloc-64 of size 64
[   15.414283] The buggy address is located 0 bytes to the right of
[   15.414283]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.415197] 
[   15.415290] The buggy address belongs to the physical page:
[   15.415715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.416246] flags: 0x200000000000000(node=0|zone=2)
[   15.416462] page_type: f5(slab)
[   15.416815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.417355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.417946] page dumped because: kasan: bad access detected
[   15.418209] 
[   15.418301] Memory state around the buggy address:
[   15.418501]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.418805]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.419519] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.420059]                                      ^
[   15.420435]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.420946]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.421261] ==================================================================
[   16.246409] ==================================================================
[   16.246719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   16.246958] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.247303] 
[   16.247471] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.247510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.247523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.247545] Call Trace:
[   16.247559]  <TASK>
[   16.247574]  dump_stack_lvl+0x73/0xb0
[   16.247599]  print_report+0xd1/0x650
[   16.247621]  ? __virt_addr_valid+0x1db/0x2d0
[   16.247644]  ? kasan_atomics_helper+0x1a80/0x5450
[   16.247665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.247692]  ? kasan_atomics_helper+0x1a80/0x5450
[   16.247714]  kasan_report+0x140/0x180
[   16.247737]  ? kasan_atomics_helper+0x1a80/0x5450
[   16.247775]  kasan_check_range+0x10c/0x1c0
[   16.247798]  __kasan_check_write+0x18/0x20
[   16.247829]  kasan_atomics_helper+0x1a80/0x5450
[   16.247851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.247873]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.247898]  ? kasan_atomics+0x153/0x310
[   16.247924]  kasan_atomics+0x1dd/0x310
[   16.247947]  ? __pfx_kasan_atomics+0x10/0x10
[   16.247971]  ? __pfx_read_tsc+0x10/0x10
[   16.247992]  ? ktime_get_ts64+0x86/0x230
[   16.248027]  kunit_try_run_case+0x1a6/0x480
[   16.248050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.248073]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.248097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.248122]  ? __kthread_parkme+0x82/0x160
[   16.248146]  ? preempt_count_sub+0x50/0x80
[   16.248171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.248194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.248222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.248249]  kthread+0x324/0x6e0
[   16.248271]  ? trace_preempt_on+0x20/0xc0
[   16.248295]  ? __pfx_kthread+0x10/0x10
[   16.248317]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.248340]  ? calculate_sigpending+0x7b/0xa0
[   16.248363]  ? __pfx_kthread+0x10/0x10
[   16.248385]  ret_from_fork+0x41/0x80
[   16.248405]  ? __pfx_kthread+0x10/0x10
[   16.248427]  ret_from_fork_asm+0x1a/0x30
[   16.248460]  </TASK>
[   16.248470] 
[   16.256199] Allocated by task 273:
[   16.256344]  kasan_save_stack+0x45/0x70
[   16.256488]  kasan_save_track+0x18/0x40
[   16.256668]  kasan_save_alloc_info+0x3b/0x50
[   16.257416]  __kasan_kmalloc+0xb7/0xc0
[   16.257706]  __kmalloc_cache_noprof+0x18a/0x420
[   16.257878]  kasan_atomics+0x96/0x310
[   16.258008]  kunit_try_run_case+0x1a6/0x480
[   16.258165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.258341]  kthread+0x324/0x6e0
[   16.258460]  ret_from_fork+0x41/0x80
[   16.258586]  ret_from_fork_asm+0x1a/0x30
[   16.258724] 
[   16.258796] The buggy address belongs to the object at ffff888101bf3e00
[   16.258796]  which belongs to the cache kmalloc-64 of size 64
[   16.259149] The buggy address is located 0 bytes to the right of
[   16.259149]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.260361] 
[   16.260441] The buggy address belongs to the physical page:
[   16.260609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.260846] flags: 0x200000000000000(node=0|zone=2)
[   16.261003] page_type: f5(slab)
[   16.261179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.261407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.261792] page dumped because: kasan: bad access detected
[   16.262073] 
[   16.262172] Memory state around the buggy address:
[   16.262435]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.262952]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.263184] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.263389]                                      ^
[   16.263540]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.264479]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.264853] ==================================================================
[   15.773939] ==================================================================
[   15.774304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   15.774646] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.774926] 
[   15.775012] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.775063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.775076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.775098] Call Trace:
[   15.775115]  <TASK>
[   15.775132]  dump_stack_lvl+0x73/0xb0
[   15.775156]  print_report+0xd1/0x650
[   15.775178]  ? __virt_addr_valid+0x1db/0x2d0
[   15.775201]  ? kasan_atomics_helper+0x107a/0x5450
[   15.775222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.775248]  ? kasan_atomics_helper+0x107a/0x5450
[   15.775272]  kasan_report+0x140/0x180
[   15.775295]  ? kasan_atomics_helper+0x107a/0x5450
[   15.775321]  kasan_check_range+0x10c/0x1c0
[   15.775345]  __kasan_check_write+0x18/0x20
[   15.775368]  kasan_atomics_helper+0x107a/0x5450
[   15.775390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.775413]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.775437]  ? kasan_atomics+0x153/0x310
[   15.775463]  kasan_atomics+0x1dd/0x310
[   15.775486]  ? __pfx_kasan_atomics+0x10/0x10
[   15.775510]  ? __pfx_read_tsc+0x10/0x10
[   15.775532]  ? ktime_get_ts64+0x86/0x230
[   15.775558]  kunit_try_run_case+0x1a6/0x480
[   15.775581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.775603]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.775627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.775651]  ? __kthread_parkme+0x82/0x160
[   15.775674]  ? preempt_count_sub+0x50/0x80
[   15.775699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.775723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775749]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.775776]  kthread+0x324/0x6e0
[   15.775798]  ? trace_preempt_on+0x20/0xc0
[   15.775821]  ? __pfx_kthread+0x10/0x10
[   15.775844]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.775866]  ? calculate_sigpending+0x7b/0xa0
[   15.775889]  ? __pfx_kthread+0x10/0x10
[   15.775912]  ret_from_fork+0x41/0x80
[   15.775932]  ? __pfx_kthread+0x10/0x10
[   15.775955]  ret_from_fork_asm+0x1a/0x30
[   15.775986]  </TASK>
[   15.775998] 
[   15.783730] Allocated by task 273:
[   15.783956]  kasan_save_stack+0x45/0x70
[   15.784162]  kasan_save_track+0x18/0x40
[   15.784474]  kasan_save_alloc_info+0x3b/0x50
[   15.784626]  __kasan_kmalloc+0xb7/0xc0
[   15.784810]  __kmalloc_cache_noprof+0x18a/0x420
[   15.785092]  kasan_atomics+0x96/0x310
[   15.785251]  kunit_try_run_case+0x1a6/0x480
[   15.785395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.785569]  kthread+0x324/0x6e0
[   15.785690]  ret_from_fork+0x41/0x80
[   15.785937]  ret_from_fork_asm+0x1a/0x30
[   15.786276] 
[   15.786373] The buggy address belongs to the object at ffff888101bf3e00
[   15.786373]  which belongs to the cache kmalloc-64 of size 64
[   15.787060] The buggy address is located 0 bytes to the right of
[   15.787060]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.787427] 
[   15.787499] The buggy address belongs to the physical page:
[   15.787872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.788234] flags: 0x200000000000000(node=0|zone=2)
[   15.788520] page_type: f5(slab)
[   15.788844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.789153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.789377] page dumped because: kasan: bad access detected
[   15.789546] 
[   15.789615] Memory state around the buggy address:
[   15.789770]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.790433]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.790879] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.791162]                                      ^
[   15.791316]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.791527]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.791736] ==================================================================
[   16.600467] ==================================================================
[   16.601137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   16.601366] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.601601] 
[   16.601706] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.601773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.601785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.601806] Call Trace:
[   16.601821]  <TASK>
[   16.601854]  dump_stack_lvl+0x73/0xb0
[   16.601878]  print_report+0xd1/0x650
[   16.601914]  ? __virt_addr_valid+0x1db/0x2d0
[   16.601950]  ? kasan_atomics_helper+0x224d/0x5450
[   16.601971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.601998]  ? kasan_atomics_helper+0x224d/0x5450
[   16.602029]  kasan_report+0x140/0x180
[   16.602053]  ? kasan_atomics_helper+0x224d/0x5450
[   16.602080]  kasan_check_range+0x10c/0x1c0
[   16.602103]  __kasan_check_write+0x18/0x20
[   16.602126]  kasan_atomics_helper+0x224d/0x5450
[   16.602149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.602171]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.602196]  ? kasan_atomics+0x153/0x310
[   16.602238]  kasan_atomics+0x1dd/0x310
[   16.602273]  ? __pfx_kasan_atomics+0x10/0x10
[   16.602311]  ? __pfx_read_tsc+0x10/0x10
[   16.602346]  ? ktime_get_ts64+0x86/0x230
[   16.602384]  kunit_try_run_case+0x1a6/0x480
[   16.602421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.602468]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.602506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.602544]  ? __kthread_parkme+0x82/0x160
[   16.602579]  ? preempt_count_sub+0x50/0x80
[   16.602616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.602652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.602706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.602748]  kthread+0x324/0x6e0
[   16.602796]  ? trace_preempt_on+0x20/0xc0
[   16.602833]  ? __pfx_kthread+0x10/0x10
[   16.602856]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.602880]  ? calculate_sigpending+0x7b/0xa0
[   16.602902]  ? __pfx_kthread+0x10/0x10
[   16.602925]  ret_from_fork+0x41/0x80
[   16.602944]  ? __pfx_kthread+0x10/0x10
[   16.602969]  ret_from_fork_asm+0x1a/0x30
[   16.603002]  </TASK>
[   16.603023] 
[   16.610756] Allocated by task 273:
[   16.611028]  kasan_save_stack+0x45/0x70
[   16.611256]  kasan_save_track+0x18/0x40
[   16.611489]  kasan_save_alloc_info+0x3b/0x50
[   16.611800]  __kasan_kmalloc+0xb7/0xc0
[   16.611984]  __kmalloc_cache_noprof+0x18a/0x420
[   16.612212]  kasan_atomics+0x96/0x310
[   16.612371]  kunit_try_run_case+0x1a6/0x480
[   16.612512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.613032]  kthread+0x324/0x6e0
[   16.613173]  ret_from_fork+0x41/0x80
[   16.613384]  ret_from_fork_asm+0x1a/0x30
[   16.613617] 
[   16.613744] The buggy address belongs to the object at ffff888101bf3e00
[   16.613744]  which belongs to the cache kmalloc-64 of size 64
[   16.614282] The buggy address is located 0 bytes to the right of
[   16.614282]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.615010] 
[   16.615108] The buggy address belongs to the physical page:
[   16.615350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.615641] flags: 0x200000000000000(node=0|zone=2)
[   16.615881] page_type: f5(slab)
[   16.616750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.617396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.617640] page dumped because: kasan: bad access detected
[   16.617819] 
[   16.617892] Memory state around the buggy address:
[   16.618108]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618794]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.619456] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.619969]                                      ^
[   16.620386]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620965]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621361] ==================================================================
[   15.722799] ==================================================================
[   15.723157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   15.723489] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.723712] 
[   15.723791] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.723831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.723844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.723864] Call Trace:
[   15.723964]  <TASK>
[   15.723983]  dump_stack_lvl+0x73/0xb0
[   15.724009]  print_report+0xd1/0x650
[   15.724045]  ? __virt_addr_valid+0x1db/0x2d0
[   15.724067]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.724089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.724115]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.724136]  kasan_report+0x140/0x180
[   15.724158]  ? kasan_atomics_helper+0xfaa/0x5450
[   15.724184]  kasan_check_range+0x10c/0x1c0
[   15.724207]  __kasan_check_write+0x18/0x20
[   15.724230]  kasan_atomics_helper+0xfaa/0x5450
[   15.724254]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.724277]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.724302]  ? kasan_atomics+0x153/0x310
[   15.724328]  kasan_atomics+0x1dd/0x310
[   15.724351]  ? __pfx_kasan_atomics+0x10/0x10
[   15.724374]  ? __pfx_read_tsc+0x10/0x10
[   15.724397]  ? ktime_get_ts64+0x86/0x230
[   15.724421]  kunit_try_run_case+0x1a6/0x480
[   15.724445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.724467]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.724492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.724516]  ? __kthread_parkme+0x82/0x160
[   15.724538]  ? preempt_count_sub+0x50/0x80
[   15.724563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.724587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.724613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.724640]  kthread+0x324/0x6e0
[   15.724662]  ? trace_preempt_on+0x20/0xc0
[   15.724685]  ? __pfx_kthread+0x10/0x10
[   15.724708]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.724730]  ? calculate_sigpending+0x7b/0xa0
[   15.724752]  ? __pfx_kthread+0x10/0x10
[   15.724776]  ret_from_fork+0x41/0x80
[   15.724796]  ? __pfx_kthread+0x10/0x10
[   15.724818]  ret_from_fork_asm+0x1a/0x30
[   15.724850]  </TASK>
[   15.724861] 
[   15.732933] Allocated by task 273:
[   15.733267]  kasan_save_stack+0x45/0x70
[   15.733518]  kasan_save_track+0x18/0x40
[   15.733789]  kasan_save_alloc_info+0x3b/0x50
[   15.734180]  __kasan_kmalloc+0xb7/0xc0
[   15.734351]  __kmalloc_cache_noprof+0x18a/0x420
[   15.734511]  kasan_atomics+0x96/0x310
[   15.734644]  kunit_try_run_case+0x1a6/0x480
[   15.734958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.735295]  kthread+0x324/0x6e0
[   15.735502]  ret_from_fork+0x41/0x80
[   15.735691]  ret_from_fork_asm+0x1a/0x30
[   15.735826] 
[   15.735897] The buggy address belongs to the object at ffff888101bf3e00
[   15.735897]  which belongs to the cache kmalloc-64 of size 64
[   15.736529] The buggy address is located 0 bytes to the right of
[   15.736529]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.737106] 
[   15.737181] The buggy address belongs to the physical page:
[   15.737347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.737631] flags: 0x200000000000000(node=0|zone=2)
[   15.740714] page_type: f5(slab)
[   15.741715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.743415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.744935] page dumped because: kasan: bad access detected
[   15.745563] 
[   15.745847] Memory state around the buggy address:
[   15.746147]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.746609]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.747300] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.747595]                                      ^
[   15.747821]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.748130]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.748424] ==================================================================
[   16.042905] ==================================================================
[   16.043256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   16.043590] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.043952] 
[   16.044080] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.044118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.044131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.044152] Call Trace:
[   16.044167]  <TASK>
[   16.044182]  dump_stack_lvl+0x73/0xb0
[   16.044206]  print_report+0xd1/0x650
[   16.044228]  ? __virt_addr_valid+0x1db/0x2d0
[   16.044250]  ? kasan_atomics_helper+0x151e/0x5450
[   16.044271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.044297]  ? kasan_atomics_helper+0x151e/0x5450
[   16.044319]  kasan_report+0x140/0x180
[   16.044341]  ? kasan_atomics_helper+0x151e/0x5450
[   16.044367]  kasan_check_range+0x10c/0x1c0
[   16.044392]  __kasan_check_write+0x18/0x20
[   16.044415]  kasan_atomics_helper+0x151e/0x5450
[   16.044438]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.044461]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.044486]  ? kasan_atomics+0x153/0x310
[   16.044512]  kasan_atomics+0x1dd/0x310
[   16.044534]  ? __pfx_kasan_atomics+0x10/0x10
[   16.044558]  ? __pfx_read_tsc+0x10/0x10
[   16.044581]  ? ktime_get_ts64+0x86/0x230
[   16.044606]  kunit_try_run_case+0x1a6/0x480
[   16.044630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.044652]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.044676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.044701]  ? __kthread_parkme+0x82/0x160
[   16.044725]  ? preempt_count_sub+0x50/0x80
[   16.044750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.044774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.044827]  kthread+0x324/0x6e0
[   16.044848]  ? trace_preempt_on+0x20/0xc0
[   16.044872]  ? __pfx_kthread+0x10/0x10
[   16.044895]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.044918]  ? calculate_sigpending+0x7b/0xa0
[   16.044941]  ? __pfx_kthread+0x10/0x10
[   16.044964]  ret_from_fork+0x41/0x80
[   16.044984]  ? __pfx_kthread+0x10/0x10
[   16.045007]  ret_from_fork_asm+0x1a/0x30
[   16.045049]  </TASK>
[   16.045060] 
[   16.053101] Allocated by task 273:
[   16.053294]  kasan_save_stack+0x45/0x70
[   16.053488]  kasan_save_track+0x18/0x40
[   16.053795]  kasan_save_alloc_info+0x3b/0x50
[   16.054004]  __kasan_kmalloc+0xb7/0xc0
[   16.054157]  __kmalloc_cache_noprof+0x18a/0x420
[   16.054313]  kasan_atomics+0x96/0x310
[   16.054501]  kunit_try_run_case+0x1a6/0x480
[   16.054897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.055169]  kthread+0x324/0x6e0
[   16.055327]  ret_from_fork+0x41/0x80
[   16.055497]  ret_from_fork_asm+0x1a/0x30
[   16.055783] 
[   16.055869] The buggy address belongs to the object at ffff888101bf3e00
[   16.055869]  which belongs to the cache kmalloc-64 of size 64
[   16.056346] The buggy address is located 0 bytes to the right of
[   16.056346]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.056808] 
[   16.056882] The buggy address belongs to the physical page:
[   16.057134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.057481] flags: 0x200000000000000(node=0|zone=2)
[   16.057727] page_type: f5(slab)
[   16.057860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.058169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.058481] page dumped because: kasan: bad access detected
[   16.058726] 
[   16.058859] Memory state around the buggy address:
[   16.059077]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.059354]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.059778] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.060048]                                      ^
[   16.060268]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.060577]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.060907] ==================================================================
[   16.402820] ==================================================================
[   16.403148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   16.403396] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.403747] 
[   16.403840] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.403880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.403893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.403914] Call Trace:
[   16.403927]  <TASK>
[   16.403942]  dump_stack_lvl+0x73/0xb0
[   16.403967]  print_report+0xd1/0x650
[   16.403989]  ? __virt_addr_valid+0x1db/0x2d0
[   16.404011]  ? kasan_atomics_helper+0x1eab/0x5450
[   16.404042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.404069]  ? kasan_atomics_helper+0x1eab/0x5450
[   16.404091]  kasan_report+0x140/0x180
[   16.404114]  ? kasan_atomics_helper+0x1eab/0x5450
[   16.404140]  kasan_check_range+0x10c/0x1c0
[   16.404164]  __kasan_check_write+0x18/0x20
[   16.404187]  kasan_atomics_helper+0x1eab/0x5450
[   16.404210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.404232]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.404279]  ? kasan_atomics+0x153/0x310
[   16.404315]  kasan_atomics+0x1dd/0x310
[   16.404353]  ? __pfx_kasan_atomics+0x10/0x10
[   16.404404]  ? __pfx_read_tsc+0x10/0x10
[   16.404441]  ? ktime_get_ts64+0x86/0x230
[   16.404492]  kunit_try_run_case+0x1a6/0x480
[   16.404516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.404551]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.404598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.404623]  ? __kthread_parkme+0x82/0x160
[   16.404646]  ? preempt_count_sub+0x50/0x80
[   16.404682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.404706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.404734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.404761]  kthread+0x324/0x6e0
[   16.404783]  ? trace_preempt_on+0x20/0xc0
[   16.404808]  ? __pfx_kthread+0x10/0x10
[   16.404831]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.404854]  ? calculate_sigpending+0x7b/0xa0
[   16.404877]  ? __pfx_kthread+0x10/0x10
[   16.404900]  ret_from_fork+0x41/0x80
[   16.404920]  ? __pfx_kthread+0x10/0x10
[   16.404943]  ret_from_fork_asm+0x1a/0x30
[   16.404975]  </TASK>
[   16.404985] 
[   16.413238] Allocated by task 273:
[   16.413369]  kasan_save_stack+0x45/0x70
[   16.413507]  kasan_save_track+0x18/0x40
[   16.413869]  kasan_save_alloc_info+0x3b/0x50
[   16.414100]  __kasan_kmalloc+0xb7/0xc0
[   16.414289]  __kmalloc_cache_noprof+0x18a/0x420
[   16.414509]  kasan_atomics+0x96/0x310
[   16.414800]  kunit_try_run_case+0x1a6/0x480
[   16.415136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.415387]  kthread+0x324/0x6e0
[   16.415520]  ret_from_fork+0x41/0x80
[   16.415732]  ret_from_fork_asm+0x1a/0x30
[   16.415994] 
[   16.416173] The buggy address belongs to the object at ffff888101bf3e00
[   16.416173]  which belongs to the cache kmalloc-64 of size 64
[   16.416621] The buggy address is located 0 bytes to the right of
[   16.416621]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.417210] 
[   16.417317] The buggy address belongs to the physical page:
[   16.417483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.417712] flags: 0x200000000000000(node=0|zone=2)
[   16.417874] page_type: f5(slab)
[   16.418081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.418564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.418945] page dumped because: kasan: bad access detected
[   16.419213] 
[   16.419309] Memory state around the buggy address:
[   16.419690]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.420098]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.420419] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.420791]                                      ^
[   16.421114]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.421846]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422320] ==================================================================
[   15.159528] ==================================================================
[   15.160220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   15.160526] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.161395] 
[   15.161801] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.161847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.161859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.161880] Call Trace:
[   15.161894]  <TASK>
[   15.161909]  dump_stack_lvl+0x73/0xb0
[   15.161935]  print_report+0xd1/0x650
[   15.161956]  ? __virt_addr_valid+0x1db/0x2d0
[   15.161977]  ? kasan_atomics_helper+0x4ba4/0x5450
[   15.161997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.162032]  ? kasan_atomics_helper+0x4ba4/0x5450
[   15.162054]  kasan_report+0x140/0x180
[   15.162076]  ? kasan_atomics_helper+0x4ba4/0x5450
[   15.162100]  __asan_report_store4_noabort+0x1b/0x30
[   15.162123]  kasan_atomics_helper+0x4ba4/0x5450
[   15.162145]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.162166]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.162189]  ? kasan_atomics+0x153/0x310
[   15.162214]  kasan_atomics+0x1dd/0x310
[   15.162235]  ? __pfx_kasan_atomics+0x10/0x10
[   15.162258]  ? __pfx_read_tsc+0x10/0x10
[   15.162279]  ? ktime_get_ts64+0x86/0x230
[   15.162303]  kunit_try_run_case+0x1a6/0x480
[   15.162326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.162346]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.162369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.162393]  ? __kthread_parkme+0x82/0x160
[   15.162415]  ? preempt_count_sub+0x50/0x80
[   15.162438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.162461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.162486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.162512]  kthread+0x324/0x6e0
[   15.162532]  ? trace_preempt_on+0x20/0xc0
[   15.162555]  ? __pfx_kthread+0x10/0x10
[   15.162630]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.162652]  ? calculate_sigpending+0x7b/0xa0
[   15.162673]  ? __pfx_kthread+0x10/0x10
[   15.162695]  ret_from_fork+0x41/0x80
[   15.162715]  ? __pfx_kthread+0x10/0x10
[   15.162736]  ret_from_fork_asm+0x1a/0x30
[   15.162767]  </TASK>
[   15.162777] 
[   15.175098] Allocated by task 273:
[   15.175374]  kasan_save_stack+0x45/0x70
[   15.175734]  kasan_save_track+0x18/0x40
[   15.176034]  kasan_save_alloc_info+0x3b/0x50
[   15.176332]  __kasan_kmalloc+0xb7/0xc0
[   15.176528]  __kmalloc_cache_noprof+0x18a/0x420
[   15.176969]  kasan_atomics+0x96/0x310
[   15.177279]  kunit_try_run_case+0x1a6/0x480
[   15.177575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.178140]  kthread+0x324/0x6e0
[   15.178443]  ret_from_fork+0x41/0x80
[   15.178811]  ret_from_fork_asm+0x1a/0x30
[   15.179196] 
[   15.179421] The buggy address belongs to the object at ffff888101bf3e00
[   15.179421]  which belongs to the cache kmalloc-64 of size 64
[   15.180207] The buggy address is located 0 bytes to the right of
[   15.180207]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.180978] 
[   15.181069] The buggy address belongs to the physical page:
[   15.181334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.181996] flags: 0x200000000000000(node=0|zone=2)
[   15.182279] page_type: f5(slab)
[   15.182450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.182810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.183389] page dumped because: kasan: bad access detected
[   15.183791] 
[   15.183908] Memory state around the buggy address:
[   15.184144]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.184420]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.184680] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.185101]                                      ^
[   15.185455]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.185939]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.186298] ==================================================================
[   16.382511] ==================================================================
[   16.383168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   16.383496] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.383927] 
[   16.384073] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.384126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.384139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.384160] Call Trace:
[   16.384176]  <TASK>
[   16.384191]  dump_stack_lvl+0x73/0xb0
[   16.384217]  print_report+0xd1/0x650
[   16.384241]  ? __virt_addr_valid+0x1db/0x2d0
[   16.384263]  ? kasan_atomics_helper+0x1e13/0x5450
[   16.384284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.384341]  ? kasan_atomics_helper+0x1e13/0x5450
[   16.384364]  kasan_report+0x140/0x180
[   16.384404]  ? kasan_atomics_helper+0x1e13/0x5450
[   16.384442]  kasan_check_range+0x10c/0x1c0
[   16.384466]  __kasan_check_write+0x18/0x20
[   16.384489]  kasan_atomics_helper+0x1e13/0x5450
[   16.384512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.384535]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.384560]  ? kasan_atomics+0x153/0x310
[   16.384586]  kasan_atomics+0x1dd/0x310
[   16.384609]  ? __pfx_kasan_atomics+0x10/0x10
[   16.384633]  ? __pfx_read_tsc+0x10/0x10
[   16.384655]  ? ktime_get_ts64+0x86/0x230
[   16.384680]  kunit_try_run_case+0x1a6/0x480
[   16.384731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.384754]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.384791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.384816]  ? __kthread_parkme+0x82/0x160
[   16.384839]  ? preempt_count_sub+0x50/0x80
[   16.384889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.384914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.384941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.384979]  kthread+0x324/0x6e0
[   16.385002]  ? trace_preempt_on+0x20/0xc0
[   16.385060]  ? __pfx_kthread+0x10/0x10
[   16.385084]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.385134]  ? calculate_sigpending+0x7b/0xa0
[   16.385156]  ? __pfx_kthread+0x10/0x10
[   16.385194]  ret_from_fork+0x41/0x80
[   16.385227]  ? __pfx_kthread+0x10/0x10
[   16.385251]  ret_from_fork_asm+0x1a/0x30
[   16.385282]  </TASK>
[   16.385293] 
[   16.393421] Allocated by task 273:
[   16.393665]  kasan_save_stack+0x45/0x70
[   16.393888]  kasan_save_track+0x18/0x40
[   16.394120]  kasan_save_alloc_info+0x3b/0x50
[   16.394314]  __kasan_kmalloc+0xb7/0xc0
[   16.394535]  __kmalloc_cache_noprof+0x18a/0x420
[   16.394760]  kasan_atomics+0x96/0x310
[   16.394961]  kunit_try_run_case+0x1a6/0x480
[   16.395170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.395452]  kthread+0x324/0x6e0
[   16.395667]  ret_from_fork+0x41/0x80
[   16.395878]  ret_from_fork_asm+0x1a/0x30
[   16.396142] 
[   16.396236] The buggy address belongs to the object at ffff888101bf3e00
[   16.396236]  which belongs to the cache kmalloc-64 of size 64
[   16.396766] The buggy address is located 0 bytes to the right of
[   16.396766]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.397345] 
[   16.397421] The buggy address belongs to the physical page:
[   16.397777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.398197] flags: 0x200000000000000(node=0|zone=2)
[   16.398465] page_type: f5(slab)
[   16.398697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.399034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.399393] page dumped because: kasan: bad access detected
[   16.399619] 
[   16.399822] Memory state around the buggy address:
[   16.400081]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.400408]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.400722] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.401106]                                      ^
[   16.401322]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.401722]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.402055] ==================================================================
[   16.308593] ==================================================================
[   16.308827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   16.309615] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.310368] 
[   16.310620] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.310663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.310676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.310697] Call Trace:
[   16.310712]  <TASK>
[   16.310729]  dump_stack_lvl+0x73/0xb0
[   16.310757]  print_report+0xd1/0x650
[   16.310778]  ? __virt_addr_valid+0x1db/0x2d0
[   16.310801]  ? kasan_atomics_helper+0x4f32/0x5450
[   16.310823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.310853]  ? kasan_atomics_helper+0x4f32/0x5450
[   16.310876]  kasan_report+0x140/0x180
[   16.310899]  ? kasan_atomics_helper+0x4f32/0x5450
[   16.310925]  __asan_report_load8_noabort+0x18/0x20
[   16.310950]  kasan_atomics_helper+0x4f32/0x5450
[   16.310973]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.310996]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.311035]  ? kasan_atomics+0x153/0x310
[   16.311100]  kasan_atomics+0x1dd/0x310
[   16.311126]  ? __pfx_kasan_atomics+0x10/0x10
[   16.311162]  ? __pfx_read_tsc+0x10/0x10
[   16.311185]  ? ktime_get_ts64+0x86/0x230
[   16.311211]  kunit_try_run_case+0x1a6/0x480
[   16.311235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.311258]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.311283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.311307]  ? __kthread_parkme+0x82/0x160
[   16.311328]  ? preempt_count_sub+0x50/0x80
[   16.311353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.311376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.311404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.311431]  kthread+0x324/0x6e0
[   16.311453]  ? trace_preempt_on+0x20/0xc0
[   16.311476]  ? __pfx_kthread+0x10/0x10
[   16.311500]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.311523]  ? calculate_sigpending+0x7b/0xa0
[   16.311565]  ? __pfx_kthread+0x10/0x10
[   16.311590]  ret_from_fork+0x41/0x80
[   16.311609]  ? __pfx_kthread+0x10/0x10
[   16.311632]  ret_from_fork_asm+0x1a/0x30
[   16.311663]  </TASK>
[   16.311676] 
[   16.323882] Allocated by task 273:
[   16.324254]  kasan_save_stack+0x45/0x70
[   16.324651]  kasan_save_track+0x18/0x40
[   16.325024]  kasan_save_alloc_info+0x3b/0x50
[   16.325434]  __kasan_kmalloc+0xb7/0xc0
[   16.325758]  __kmalloc_cache_noprof+0x18a/0x420
[   16.326092]  kasan_atomics+0x96/0x310
[   16.326286]  kunit_try_run_case+0x1a6/0x480
[   16.326693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.326871]  kthread+0x324/0x6e0
[   16.326993]  ret_from_fork+0x41/0x80
[   16.327131]  ret_from_fork_asm+0x1a/0x30
[   16.327270] 
[   16.327341] The buggy address belongs to the object at ffff888101bf3e00
[   16.327341]  which belongs to the cache kmalloc-64 of size 64
[   16.328086] The buggy address is located 0 bytes to the right of
[   16.328086]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.329217] 
[   16.329396] The buggy address belongs to the physical page:
[   16.329916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.330416] flags: 0x200000000000000(node=0|zone=2)
[   16.330676] page_type: f5(slab)
[   16.331000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.331698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.332138] page dumped because: kasan: bad access detected
[   16.332310] 
[   16.332380] Memory state around the buggy address:
[   16.332532]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.333193]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.333852] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.334485]                                      ^
[   16.334954]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335432]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335902] ==================================================================
[   16.582076] ==================================================================
[   16.582431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   16.582917] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.583174] 
[   16.583277] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.583316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.583328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.583349] Call Trace:
[   16.583389]  <TASK>
[   16.583404]  dump_stack_lvl+0x73/0xb0
[   16.583429]  print_report+0xd1/0x650
[   16.583468]  ? __virt_addr_valid+0x1db/0x2d0
[   16.583490]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.583511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.583538]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.583560]  kasan_report+0x140/0x180
[   16.583582]  ? kasan_atomics_helper+0x4fa7/0x5450
[   16.583608]  __asan_report_load8_noabort+0x18/0x20
[   16.583632]  kasan_atomics_helper+0x4fa7/0x5450
[   16.583654]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.583676]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.583701]  ? kasan_atomics+0x153/0x310
[   16.583743]  kasan_atomics+0x1dd/0x310
[   16.583766]  ? __pfx_kasan_atomics+0x10/0x10
[   16.583790]  ? __pfx_read_tsc+0x10/0x10
[   16.583812]  ? ktime_get_ts64+0x86/0x230
[   16.583837]  kunit_try_run_case+0x1a6/0x480
[   16.583860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.583882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.583906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.583931]  ? __kthread_parkme+0x82/0x160
[   16.583955]  ? preempt_count_sub+0x50/0x80
[   16.583980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.584003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.584038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.584064]  kthread+0x324/0x6e0
[   16.584087]  ? trace_preempt_on+0x20/0xc0
[   16.584129]  ? __pfx_kthread+0x10/0x10
[   16.584152]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.584175]  ? calculate_sigpending+0x7b/0xa0
[   16.584214]  ? __pfx_kthread+0x10/0x10
[   16.584238]  ret_from_fork+0x41/0x80
[   16.584256]  ? __pfx_kthread+0x10/0x10
[   16.584279]  ret_from_fork_asm+0x1a/0x30
[   16.584312]  </TASK>
[   16.584323] 
[   16.591821] Allocated by task 273:
[   16.592035]  kasan_save_stack+0x45/0x70
[   16.592223]  kasan_save_track+0x18/0x40
[   16.592405]  kasan_save_alloc_info+0x3b/0x50
[   16.592713]  __kasan_kmalloc+0xb7/0xc0
[   16.592902]  __kmalloc_cache_noprof+0x18a/0x420
[   16.593083]  kasan_atomics+0x96/0x310
[   16.593276]  kunit_try_run_case+0x1a6/0x480
[   16.593454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.593673]  kthread+0x324/0x6e0
[   16.593809]  ret_from_fork+0x41/0x80
[   16.593938]  ret_from_fork_asm+0x1a/0x30
[   16.594117] 
[   16.594212] The buggy address belongs to the object at ffff888101bf3e00
[   16.594212]  which belongs to the cache kmalloc-64 of size 64
[   16.594721] The buggy address is located 0 bytes to the right of
[   16.594721]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.595287] 
[   16.595381] The buggy address belongs to the physical page:
[   16.595580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.595809] flags: 0x200000000000000(node=0|zone=2)
[   16.595966] page_type: f5(slab)
[   16.596091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.596311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.596775] page dumped because: kasan: bad access detected
[   16.597057] 
[   16.597175] Memory state around the buggy address:
[   16.597420]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.598035]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.598407] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.598955]                                      ^
[   16.599208]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599436]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599877] ==================================================================
[   16.562523] ==================================================================
[   16.563009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   16.563637] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.563956] 
[   16.564071] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.564110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.564123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.564144] Call Trace:
[   16.564158]  <TASK>
[   16.564173]  dump_stack_lvl+0x73/0xb0
[   16.564197]  print_report+0xd1/0x650
[   16.564218]  ? __virt_addr_valid+0x1db/0x2d0
[   16.564240]  ? kasan_atomics_helper+0x218b/0x5450
[   16.564262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.564287]  ? kasan_atomics_helper+0x218b/0x5450
[   16.564309]  kasan_report+0x140/0x180
[   16.564332]  ? kasan_atomics_helper+0x218b/0x5450
[   16.564357]  kasan_check_range+0x10c/0x1c0
[   16.564380]  __kasan_check_write+0x18/0x20
[   16.564403]  kasan_atomics_helper+0x218b/0x5450
[   16.564425]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.564448]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.564472]  ? kasan_atomics+0x153/0x310
[   16.564497]  kasan_atomics+0x1dd/0x310
[   16.564520]  ? __pfx_kasan_atomics+0x10/0x10
[   16.564545]  ? __pfx_read_tsc+0x10/0x10
[   16.564567]  ? ktime_get_ts64+0x86/0x230
[   16.564613]  kunit_try_run_case+0x1a6/0x480
[   16.564649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.564672]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.564709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.564746]  ? __kthread_parkme+0x82/0x160
[   16.564782]  ? preempt_count_sub+0x50/0x80
[   16.564820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.564846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.564872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.564899]  kthread+0x324/0x6e0
[   16.564921]  ? trace_preempt_on+0x20/0xc0
[   16.564945]  ? __pfx_kthread+0x10/0x10
[   16.564968]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.564991]  ? calculate_sigpending+0x7b/0xa0
[   16.565022]  ? __pfx_kthread+0x10/0x10
[   16.565046]  ret_from_fork+0x41/0x80
[   16.565081]  ? __pfx_kthread+0x10/0x10
[   16.565117]  ret_from_fork_asm+0x1a/0x30
[   16.565162]  </TASK>
[   16.565172] 
[   16.572943] Allocated by task 273:
[   16.573263]  kasan_save_stack+0x45/0x70
[   16.573513]  kasan_save_track+0x18/0x40
[   16.573934]  kasan_save_alloc_info+0x3b/0x50
[   16.574118]  __kasan_kmalloc+0xb7/0xc0
[   16.574248]  __kmalloc_cache_noprof+0x18a/0x420
[   16.574397]  kasan_atomics+0x96/0x310
[   16.574523]  kunit_try_run_case+0x1a6/0x480
[   16.574697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.574973]  kthread+0x324/0x6e0
[   16.575239]  ret_from_fork+0x41/0x80
[   16.575426]  ret_from_fork_asm+0x1a/0x30
[   16.575698] 
[   16.575796] The buggy address belongs to the object at ffff888101bf3e00
[   16.575796]  which belongs to the cache kmalloc-64 of size 64
[   16.576336] The buggy address is located 0 bytes to the right of
[   16.576336]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.576923] 
[   16.577026] The buggy address belongs to the physical page:
[   16.577279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.577824] flags: 0x200000000000000(node=0|zone=2)
[   16.578061] page_type: f5(slab)
[   16.578226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.578486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.578700] page dumped because: kasan: bad access detected
[   16.578864] 
[   16.578932] Memory state around the buggy address:
[   16.579427]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.579976]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.580319] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.580666]                                      ^
[   16.580906]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581223]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.581526] ==================================================================
[   15.641206] ==================================================================
[   15.641677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   15.641908] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.642141] 
[   15.642222] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.642263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.642275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.642296] Call Trace:
[   15.642312]  <TASK>
[   15.642326]  dump_stack_lvl+0x73/0xb0
[   15.642350]  print_report+0xd1/0x650
[   15.642372]  ? __virt_addr_valid+0x1db/0x2d0
[   15.642394]  ? kasan_atomics_helper+0xd48/0x5450
[   15.642415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.642457]  ? kasan_atomics_helper+0xd48/0x5450
[   15.642480]  kasan_report+0x140/0x180
[   15.642502]  ? kasan_atomics_helper+0xd48/0x5450
[   15.642528]  kasan_check_range+0x10c/0x1c0
[   15.642552]  __kasan_check_write+0x18/0x20
[   15.642576]  kasan_atomics_helper+0xd48/0x5450
[   15.642600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.642622]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.642647]  ? kasan_atomics+0x153/0x310
[   15.642674]  kasan_atomics+0x1dd/0x310
[   15.642697]  ? __pfx_kasan_atomics+0x10/0x10
[   15.642721]  ? __pfx_read_tsc+0x10/0x10
[   15.642743]  ? ktime_get_ts64+0x86/0x230
[   15.642768]  kunit_try_run_case+0x1a6/0x480
[   15.642792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.642815]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.642839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.642864]  ? __kthread_parkme+0x82/0x160
[   15.642887]  ? preempt_count_sub+0x50/0x80
[   15.642912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.642936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.642963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.642990]  kthread+0x324/0x6e0
[   15.643012]  ? trace_preempt_on+0x20/0xc0
[   15.643047]  ? __pfx_kthread+0x10/0x10
[   15.643071]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.643094]  ? calculate_sigpending+0x7b/0xa0
[   15.643116]  ? __pfx_kthread+0x10/0x10
[   15.643140]  ret_from_fork+0x41/0x80
[   15.643159]  ? __pfx_kthread+0x10/0x10
[   15.643182]  ret_from_fork_asm+0x1a/0x30
[   15.643214]  </TASK>
[   15.643225] 
[   15.651923] Allocated by task 273:
[   15.652110]  kasan_save_stack+0x45/0x70
[   15.652308]  kasan_save_track+0x18/0x40
[   15.652471]  kasan_save_alloc_info+0x3b/0x50
[   15.652770]  __kasan_kmalloc+0xb7/0xc0
[   15.652941]  __kmalloc_cache_noprof+0x18a/0x420
[   15.653171]  kasan_atomics+0x96/0x310
[   15.653308]  kunit_try_run_case+0x1a6/0x480
[   15.653454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.653994]  kthread+0x324/0x6e0
[   15.654181]  ret_from_fork+0x41/0x80
[   15.654368]  ret_from_fork_asm+0x1a/0x30
[   15.654552] 
[   15.654626] The buggy address belongs to the object at ffff888101bf3e00
[   15.654626]  which belongs to the cache kmalloc-64 of size 64
[   15.654974] The buggy address is located 0 bytes to the right of
[   15.654974]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.655346] 
[   15.655418] The buggy address belongs to the physical page:
[   15.655589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.656161] flags: 0x200000000000000(node=0|zone=2)
[   15.656612] page_type: f5(slab)
[   15.656943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.657327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.657554] page dumped because: kasan: bad access detected
[   15.658083] 
[   15.658179] Memory state around the buggy address:
[   15.658358]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.658572]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.658784] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.658994]                                      ^
[   15.659226]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.659542]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660261] ==================================================================
[   15.512267] ==================================================================
[   15.512525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   15.512984] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.513316] 
[   15.513418] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.513478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.513491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.513514] Call Trace:
[   15.513530]  <TASK>
[   15.513546]  dump_stack_lvl+0x73/0xb0
[   15.513620]  print_report+0xd1/0x650
[   15.513667]  ? __virt_addr_valid+0x1db/0x2d0
[   15.513690]  ? kasan_atomics_helper+0x993/0x5450
[   15.513711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.513742]  ? kasan_atomics_helper+0x993/0x5450
[   15.513764]  kasan_report+0x140/0x180
[   15.513787]  ? kasan_atomics_helper+0x993/0x5450
[   15.513831]  kasan_check_range+0x10c/0x1c0
[   15.513856]  __kasan_check_write+0x18/0x20
[   15.513879]  kasan_atomics_helper+0x993/0x5450
[   15.513901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.513924]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.513950]  ? kasan_atomics+0x153/0x310
[   15.513976]  kasan_atomics+0x1dd/0x310
[   15.513999]  ? __pfx_kasan_atomics+0x10/0x10
[   15.514037]  ? __pfx_read_tsc+0x10/0x10
[   15.514059]  ? ktime_get_ts64+0x86/0x230
[   15.514085]  kunit_try_run_case+0x1a6/0x480
[   15.514108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514149]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.514174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.514198]  ? __kthread_parkme+0x82/0x160
[   15.514221]  ? preempt_count_sub+0x50/0x80
[   15.514246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.514270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.514297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.514324]  kthread+0x324/0x6e0
[   15.514346]  ? trace_preempt_on+0x20/0xc0
[   15.514369]  ? __pfx_kthread+0x10/0x10
[   15.514393]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.514416]  ? calculate_sigpending+0x7b/0xa0
[   15.514440]  ? __pfx_kthread+0x10/0x10
[   15.514464]  ret_from_fork+0x41/0x80
[   15.514483]  ? __pfx_kthread+0x10/0x10
[   15.514505]  ret_from_fork_asm+0x1a/0x30
[   15.514554]  </TASK>
[   15.514567] 
[   15.522728] Allocated by task 273:
[   15.522859]  kasan_save_stack+0x45/0x70
[   15.523002]  kasan_save_track+0x18/0x40
[   15.523503]  kasan_save_alloc_info+0x3b/0x50
[   15.523732]  __kasan_kmalloc+0xb7/0xc0
[   15.524169]  __kmalloc_cache_noprof+0x18a/0x420
[   15.524399]  kasan_atomics+0x96/0x310
[   15.524601]  kunit_try_run_case+0x1a6/0x480
[   15.524895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.525165]  kthread+0x324/0x6e0
[   15.525306]  ret_from_fork+0x41/0x80
[   15.525491]  ret_from_fork_asm+0x1a/0x30
[   15.525761] 
[   15.525860] The buggy address belongs to the object at ffff888101bf3e00
[   15.525860]  which belongs to the cache kmalloc-64 of size 64
[   15.526343] The buggy address is located 0 bytes to the right of
[   15.526343]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.527033] 
[   15.527163] The buggy address belongs to the physical page:
[   15.527408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.527860] flags: 0x200000000000000(node=0|zone=2)
[   15.528113] page_type: f5(slab)
[   15.528287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.528543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.528921] page dumped because: kasan: bad access detected
[   15.529134] 
[   15.529231] Memory state around the buggy address:
[   15.529456]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.529665]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.530206] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.530541]                                      ^
[   15.530965]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531294]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.531505] ==================================================================
[   15.212069] ==================================================================
[   15.212361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   15.212843] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.213138] 
[   15.213220] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.213261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.213273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.213293] Call Trace:
[   15.213307]  <TASK>
[   15.213339]  dump_stack_lvl+0x73/0xb0
[   15.213362]  print_report+0xd1/0x650
[   15.213383]  ? __virt_addr_valid+0x1db/0x2d0
[   15.213404]  ? kasan_atomics_helper+0x4b70/0x5450
[   15.213424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.213449]  ? kasan_atomics_helper+0x4b70/0x5450
[   15.213469]  kasan_report+0x140/0x180
[   15.213491]  ? kasan_atomics_helper+0x4b70/0x5450
[   15.213516]  __asan_report_store4_noabort+0x1b/0x30
[   15.213540]  kasan_atomics_helper+0x4b70/0x5450
[   15.213667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.213690]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.213776]  ? kasan_atomics+0x153/0x310
[   15.213804]  kasan_atomics+0x1dd/0x310
[   15.213840]  ? __pfx_kasan_atomics+0x10/0x10
[   15.213865]  ? __pfx_read_tsc+0x10/0x10
[   15.213888]  ? ktime_get_ts64+0x86/0x230
[   15.213914]  kunit_try_run_case+0x1a6/0x480
[   15.213937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.213959]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.213983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.214007]  ? __kthread_parkme+0x82/0x160
[   15.214039]  ? preempt_count_sub+0x50/0x80
[   15.214064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.214119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.214146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.214184]  kthread+0x324/0x6e0
[   15.214206]  ? trace_preempt_on+0x20/0xc0
[   15.214229]  ? __pfx_kthread+0x10/0x10
[   15.214253]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.214277]  ? calculate_sigpending+0x7b/0xa0
[   15.214300]  ? __pfx_kthread+0x10/0x10
[   15.214323]  ret_from_fork+0x41/0x80
[   15.214343]  ? __pfx_kthread+0x10/0x10
[   15.214366]  ret_from_fork_asm+0x1a/0x30
[   15.214397]  </TASK>
[   15.214409] 
[   15.229481] Allocated by task 273:
[   15.230241]  kasan_save_stack+0x45/0x70
[   15.230426]  kasan_save_track+0x18/0x40
[   15.230725]  kasan_save_alloc_info+0x3b/0x50
[   15.231136]  __kasan_kmalloc+0xb7/0xc0
[   15.231332]  __kmalloc_cache_noprof+0x18a/0x420
[   15.231733]  kasan_atomics+0x96/0x310
[   15.231973]  kunit_try_run_case+0x1a6/0x480
[   15.232268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.232640]  kthread+0x324/0x6e0
[   15.232787]  ret_from_fork+0x41/0x80
[   15.232973]  ret_from_fork_asm+0x1a/0x30
[   15.233168] 
[   15.233266] The buggy address belongs to the object at ffff888101bf3e00
[   15.233266]  which belongs to the cache kmalloc-64 of size 64
[   15.233768] The buggy address is located 0 bytes to the right of
[   15.233768]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.234731] 
[   15.235080] The buggy address belongs to the physical page:
[   15.235402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.235856] flags: 0x200000000000000(node=0|zone=2)
[   15.236123] page_type: f5(slab)
[   15.236264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.236889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.237194] page dumped because: kasan: bad access detected
[   15.237524] 
[   15.238051] Memory state around the buggy address:
[   15.238265]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.238559]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.239048] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.239356]                                      ^
[   15.239745]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240210]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240619] ==================================================================
[   15.660686] ==================================================================
[   15.661043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   15.661343] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.661703] 
[   15.661810] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.661847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.661859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.661880] Call Trace:
[   15.661895]  <TASK>
[   15.661910]  dump_stack_lvl+0x73/0xb0
[   15.661934]  print_report+0xd1/0x650
[   15.661956]  ? __virt_addr_valid+0x1db/0x2d0
[   15.661979]  ? kasan_atomics_helper+0xde1/0x5450
[   15.662000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.662038]  ? kasan_atomics_helper+0xde1/0x5450
[   15.662059]  kasan_report+0x140/0x180
[   15.662081]  ? kasan_atomics_helper+0xde1/0x5450
[   15.662107]  kasan_check_range+0x10c/0x1c0
[   15.662132]  __kasan_check_write+0x18/0x20
[   15.662156]  kasan_atomics_helper+0xde1/0x5450
[   15.662178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.662200]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.662224]  ? kasan_atomics+0x153/0x310
[   15.662250]  kasan_atomics+0x1dd/0x310
[   15.662273]  ? __pfx_kasan_atomics+0x10/0x10
[   15.662297]  ? __pfx_read_tsc+0x10/0x10
[   15.662319]  ? ktime_get_ts64+0x86/0x230
[   15.662346]  kunit_try_run_case+0x1a6/0x480
[   15.662370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662392]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.662417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.662441]  ? __kthread_parkme+0x82/0x160
[   15.662464]  ? preempt_count_sub+0x50/0x80
[   15.662490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.662514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.662541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.662567]  kthread+0x324/0x6e0
[   15.662590]  ? trace_preempt_on+0x20/0xc0
[   15.662614]  ? __pfx_kthread+0x10/0x10
[   15.662637]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.662660]  ? calculate_sigpending+0x7b/0xa0
[   15.662682]  ? __pfx_kthread+0x10/0x10
[   15.662706]  ret_from_fork+0x41/0x80
[   15.662725]  ? __pfx_kthread+0x10/0x10
[   15.662748]  ret_from_fork_asm+0x1a/0x30
[   15.662780]  </TASK>
[   15.662791] 
[   15.674111] Allocated by task 273:
[   15.674441]  kasan_save_stack+0x45/0x70
[   15.674851]  kasan_save_track+0x18/0x40
[   15.675249]  kasan_save_alloc_info+0x3b/0x50
[   15.675699]  __kasan_kmalloc+0xb7/0xc0
[   15.676258]  __kmalloc_cache_noprof+0x18a/0x420
[   15.676689]  kasan_atomics+0x96/0x310
[   15.677119]  kunit_try_run_case+0x1a6/0x480
[   15.677440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.677924]  kthread+0x324/0x6e0
[   15.678302]  ret_from_fork+0x41/0x80
[   15.678696]  ret_from_fork_asm+0x1a/0x30
[   15.678973] 
[   15.679062] The buggy address belongs to the object at ffff888101bf3e00
[   15.679062]  which belongs to the cache kmalloc-64 of size 64
[   15.679412] The buggy address is located 0 bytes to the right of
[   15.679412]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.679974] 
[   15.680108] The buggy address belongs to the physical page:
[   15.680375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.680838] flags: 0x200000000000000(node=0|zone=2)
[   15.681010] page_type: f5(slab)
[   15.681188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.681531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.681926] page dumped because: kasan: bad access detected
[   15.682152] 
[   15.682254] Memory state around the buggy address:
[   15.682430]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.682890]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.683193] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.683431]                                      ^
[   15.683658]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.684154]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.684455] ==================================================================
[   15.133376] ==================================================================
[   15.133973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   15.134335] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.134679] 
[   15.134859] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.134917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.134930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.134962] Call Trace:
[   15.134987]  <TASK>
[   15.135011]  dump_stack_lvl+0x73/0xb0
[   15.135046]  print_report+0xd1/0x650
[   15.135079]  ? __virt_addr_valid+0x1db/0x2d0
[   15.135101]  ? kasan_atomics_helper+0x4bbe/0x5450
[   15.135121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.135145]  ? kasan_atomics_helper+0x4bbe/0x5450
[   15.135165]  kasan_report+0x140/0x180
[   15.135187]  ? kasan_atomics_helper+0x4bbe/0x5450
[   15.135212]  __asan_report_load4_noabort+0x18/0x20
[   15.135235]  kasan_atomics_helper+0x4bbe/0x5450
[   15.135256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.135278]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.135302]  ? kasan_atomics+0x153/0x310
[   15.135327]  kasan_atomics+0x1dd/0x310
[   15.135348]  ? __pfx_kasan_atomics+0x10/0x10
[   15.135371]  ? __pfx_read_tsc+0x10/0x10
[   15.135413]  ? ktime_get_ts64+0x86/0x230
[   15.135447]  kunit_try_run_case+0x1a6/0x480
[   15.135470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.135519]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.135542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.135565]  ? __kthread_parkme+0x82/0x160
[   15.135586]  ? preempt_count_sub+0x50/0x80
[   15.135610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.135631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.135657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.135684]  kthread+0x324/0x6e0
[   15.135704]  ? trace_preempt_on+0x20/0xc0
[   15.135726]  ? __pfx_kthread+0x10/0x10
[   15.135748]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.135770]  ? calculate_sigpending+0x7b/0xa0
[   15.135791]  ? __pfx_kthread+0x10/0x10
[   15.135813]  ret_from_fork+0x41/0x80
[   15.135831]  ? __pfx_kthread+0x10/0x10
[   15.135853]  ret_from_fork_asm+0x1a/0x30
[   15.135884]  </TASK>
[   15.135894] 
[   15.147113] Allocated by task 273:
[   15.147447]  kasan_save_stack+0x45/0x70
[   15.147830]  kasan_save_track+0x18/0x40
[   15.147979]  kasan_save_alloc_info+0x3b/0x50
[   15.148209]  __kasan_kmalloc+0xb7/0xc0
[   15.148403]  __kmalloc_cache_noprof+0x18a/0x420
[   15.148643]  kasan_atomics+0x96/0x310
[   15.149167]  kunit_try_run_case+0x1a6/0x480
[   15.149363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.149616]  kthread+0x324/0x6e0
[   15.150062]  ret_from_fork+0x41/0x80
[   15.150350]  ret_from_fork_asm+0x1a/0x30
[   15.150511] 
[   15.150701] The buggy address belongs to the object at ffff888101bf3e00
[   15.150701]  which belongs to the cache kmalloc-64 of size 64
[   15.151489] The buggy address is located 0 bytes to the right of
[   15.151489]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.152336] 
[   15.152441] The buggy address belongs to the physical page:
[   15.152869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.153522] flags: 0x200000000000000(node=0|zone=2)
[   15.153892] page_type: f5(slab)
[   15.154226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.154805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.155198] page dumped because: kasan: bad access detected
[   15.155541] 
[   15.155675] Memory state around the buggy address:
[   15.156064]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.156551]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.156957] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.157579]                                      ^
[   15.157977]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158397]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158929] ==================================================================
[   15.325560] ==================================================================
[   15.326220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   15.326962] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.327198] 
[   15.327278] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.327317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.327329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.327350] Call Trace:
[   15.327365]  <TASK>
[   15.327381]  dump_stack_lvl+0x73/0xb0
[   15.327406]  print_report+0xd1/0x650
[   15.327428]  ? __virt_addr_valid+0x1db/0x2d0
[   15.327451]  ? kasan_atomics_helper+0x4b3c/0x5450
[   15.327472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.327499]  ? kasan_atomics_helper+0x4b3c/0x5450
[   15.327520]  kasan_report+0x140/0x180
[   15.327543]  ? kasan_atomics_helper+0x4b3c/0x5450
[   15.327570]  __asan_report_store4_noabort+0x1b/0x30
[   15.327594]  kasan_atomics_helper+0x4b3c/0x5450
[   15.327617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.327640]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.327666]  ? kasan_atomics+0x153/0x310
[   15.327692]  kasan_atomics+0x1dd/0x310
[   15.327715]  ? __pfx_kasan_atomics+0x10/0x10
[   15.327739]  ? __pfx_read_tsc+0x10/0x10
[   15.327762]  ? ktime_get_ts64+0x86/0x230
[   15.327787]  kunit_try_run_case+0x1a6/0x480
[   15.327811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.327834]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.327859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.327884]  ? __kthread_parkme+0x82/0x160
[   15.327907]  ? preempt_count_sub+0x50/0x80
[   15.327933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.327957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.327984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.328011]  kthread+0x324/0x6e0
[   15.328044]  ? trace_preempt_on+0x20/0xc0
[   15.328069]  ? __pfx_kthread+0x10/0x10
[   15.328093]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.328116]  ? calculate_sigpending+0x7b/0xa0
[   15.328138]  ? __pfx_kthread+0x10/0x10
[   15.328162]  ret_from_fork+0x41/0x80
[   15.328182]  ? __pfx_kthread+0x10/0x10
[   15.328205]  ret_from_fork_asm+0x1a/0x30
[   15.328237]  </TASK>
[   15.328247] 
[   15.335747] Allocated by task 273:
[   15.335904]  kasan_save_stack+0x45/0x70
[   15.336115]  kasan_save_track+0x18/0x40
[   15.336288]  kasan_save_alloc_info+0x3b/0x50
[   15.336543]  __kasan_kmalloc+0xb7/0xc0
[   15.336764]  __kmalloc_cache_noprof+0x18a/0x420
[   15.336966]  kasan_atomics+0x96/0x310
[   15.337161]  kunit_try_run_case+0x1a6/0x480
[   15.337363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.337541]  kthread+0x324/0x6e0
[   15.337663]  ret_from_fork+0x41/0x80
[   15.337800]  ret_from_fork_asm+0x1a/0x30
[   15.338050] 
[   15.338143] The buggy address belongs to the object at ffff888101bf3e00
[   15.338143]  which belongs to the cache kmalloc-64 of size 64
[   15.338770] The buggy address is located 0 bytes to the right of
[   15.338770]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.339179] 
[   15.339305] The buggy address belongs to the physical page:
[   15.339565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.340033] flags: 0x200000000000000(node=0|zone=2)
[   15.340312] page_type: f5(slab)
[   15.340473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.340830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.341110] page dumped because: kasan: bad access detected
[   15.341363] 
[   15.341435] Memory state around the buggy address:
[   15.341706]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342040]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342335] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.342545]                                      ^
[   15.342782]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343151]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343499] ==================================================================
[   15.703619] ==================================================================
[   15.704225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   15.704455] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.705042] 
[   15.705153] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.705191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.705204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.705225] Call Trace:
[   15.705239]  <TASK>
[   15.705253]  dump_stack_lvl+0x73/0xb0
[   15.705277]  print_report+0xd1/0x650
[   15.705298]  ? __virt_addr_valid+0x1db/0x2d0
[   15.705320]  ? kasan_atomics_helper+0xf11/0x5450
[   15.705343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.705370]  ? kasan_atomics_helper+0xf11/0x5450
[   15.705391]  kasan_report+0x140/0x180
[   15.705414]  ? kasan_atomics_helper+0xf11/0x5450
[   15.705439]  kasan_check_range+0x10c/0x1c0
[   15.705463]  __kasan_check_write+0x18/0x20
[   15.705486]  kasan_atomics_helper+0xf11/0x5450
[   15.705509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.705531]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.705558]  ? kasan_atomics+0x153/0x310
[   15.705584]  kasan_atomics+0x1dd/0x310
[   15.705606]  ? __pfx_kasan_atomics+0x10/0x10
[   15.705631]  ? __pfx_read_tsc+0x10/0x10
[   15.705652]  ? ktime_get_ts64+0x86/0x230
[   15.705677]  kunit_try_run_case+0x1a6/0x480
[   15.705700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.705722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.705752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.705777]  ? __kthread_parkme+0x82/0x160
[   15.705799]  ? preempt_count_sub+0x50/0x80
[   15.705824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.705847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.705873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.705900]  kthread+0x324/0x6e0
[   15.705922]  ? trace_preempt_on+0x20/0xc0
[   15.705945]  ? __pfx_kthread+0x10/0x10
[   15.705968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.705991]  ? calculate_sigpending+0x7b/0xa0
[   15.706024]  ? __pfx_kthread+0x10/0x10
[   15.706048]  ret_from_fork+0x41/0x80
[   15.706066]  ? __pfx_kthread+0x10/0x10
[   15.706089]  ret_from_fork_asm+0x1a/0x30
[   15.706121]  </TASK>
[   15.706133] 
[   15.714112] Allocated by task 273:
[   15.714278]  kasan_save_stack+0x45/0x70
[   15.714460]  kasan_save_track+0x18/0x40
[   15.714733]  kasan_save_alloc_info+0x3b/0x50
[   15.714943]  __kasan_kmalloc+0xb7/0xc0
[   15.715112]  __kmalloc_cache_noprof+0x18a/0x420
[   15.715306]  kasan_atomics+0x96/0x310
[   15.715437]  kunit_try_run_case+0x1a6/0x480
[   15.715579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.715752]  kthread+0x324/0x6e0
[   15.716049]  ret_from_fork+0x41/0x80
[   15.716242]  ret_from_fork_asm+0x1a/0x30
[   15.716443] 
[   15.716541] The buggy address belongs to the object at ffff888101bf3e00
[   15.716541]  which belongs to the cache kmalloc-64 of size 64
[   15.716976] The buggy address is located 0 bytes to the right of
[   15.716976]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.717343] 
[   15.717416] The buggy address belongs to the physical page:
[   15.718141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.718512] flags: 0x200000000000000(node=0|zone=2)
[   15.719008] page_type: f5(slab)
[   15.719189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.719484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.719769] page dumped because: kasan: bad access detected
[   15.719941] 
[   15.720012] Memory state around the buggy address:
[   15.720176]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.720444]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.720758] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.721090]                                      ^
[   15.721473]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.721880]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.722337] ==================================================================
[   15.818414] ==================================================================
[   15.818648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   15.819723] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.819988] 
[   15.820228] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.820273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.820288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.820386] Call Trace:
[   15.820463]  <TASK>
[   15.820480]  dump_stack_lvl+0x73/0xb0
[   15.820508]  print_report+0xd1/0x650
[   15.820530]  ? __virt_addr_valid+0x1db/0x2d0
[   15.820555]  ? kasan_atomics_helper+0x1149/0x5450
[   15.820576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.820603]  ? kasan_atomics_helper+0x1149/0x5450
[   15.820625]  kasan_report+0x140/0x180
[   15.820647]  ? kasan_atomics_helper+0x1149/0x5450
[   15.820674]  kasan_check_range+0x10c/0x1c0
[   15.820697]  __kasan_check_write+0x18/0x20
[   15.820720]  kasan_atomics_helper+0x1149/0x5450
[   15.820743]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.820765]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.820791]  ? kasan_atomics+0x153/0x310
[   15.820817]  kasan_atomics+0x1dd/0x310
[   15.820839]  ? __pfx_kasan_atomics+0x10/0x10
[   15.820864]  ? __pfx_read_tsc+0x10/0x10
[   15.820887]  ? ktime_get_ts64+0x86/0x230
[   15.820912]  kunit_try_run_case+0x1a6/0x480
[   15.820936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.820958]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.820983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.821007]  ? __kthread_parkme+0x82/0x160
[   15.821042]  ? preempt_count_sub+0x50/0x80
[   15.821067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.821091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.821117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.821144]  kthread+0x324/0x6e0
[   15.821166]  ? trace_preempt_on+0x20/0xc0
[   15.821189]  ? __pfx_kthread+0x10/0x10
[   15.821212]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.821235]  ? calculate_sigpending+0x7b/0xa0
[   15.821257]  ? __pfx_kthread+0x10/0x10
[   15.821280]  ret_from_fork+0x41/0x80
[   15.821300]  ? __pfx_kthread+0x10/0x10
[   15.821323]  ret_from_fork_asm+0x1a/0x30
[   15.821355]  </TASK>
[   15.821365] 
[   15.831626] Allocated by task 273:
[   15.832436]  kasan_save_stack+0x45/0x70
[   15.832590]  kasan_save_track+0x18/0x40
[   15.832946]  kasan_save_alloc_info+0x3b/0x50
[   15.833236]  __kasan_kmalloc+0xb7/0xc0
[   15.833392]  __kmalloc_cache_noprof+0x18a/0x420
[   15.833610]  kasan_atomics+0x96/0x310
[   15.833908]  kunit_try_run_case+0x1a6/0x480
[   15.834128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.834366]  kthread+0x324/0x6e0
[   15.834522]  ret_from_fork+0x41/0x80
[   15.834713]  ret_from_fork_asm+0x1a/0x30
[   15.835284] 
[   15.835365] The buggy address belongs to the object at ffff888101bf3e00
[   15.835365]  which belongs to the cache kmalloc-64 of size 64
[   15.836107] The buggy address is located 0 bytes to the right of
[   15.836107]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.836612] 
[   15.836686] The buggy address belongs to the physical page:
[   15.837106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.837451] flags: 0x200000000000000(node=0|zone=2)
[   15.838009] page_type: f5(slab)
[   15.838170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.838623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.839088] page dumped because: kasan: bad access detected
[   15.839308] 
[   15.839408] Memory state around the buggy address:
[   15.839860]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840125]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840439] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.841001]                                      ^
[   15.841225]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841743]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842211] ==================================================================
[   15.864541] ==================================================================
[   15.864876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   15.865186] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.865480] 
[   15.865575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.865613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.865626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.865652] Call Trace:
[   15.865669]  <TASK>
[   15.865684]  dump_stack_lvl+0x73/0xb0
[   15.865708]  print_report+0xd1/0x650
[   15.865730]  ? __virt_addr_valid+0x1db/0x2d0
[   15.865759]  ? kasan_atomics_helper+0x1218/0x5450
[   15.865781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.865808]  ? kasan_atomics_helper+0x1218/0x5450
[   15.865830]  kasan_report+0x140/0x180
[   15.865852]  ? kasan_atomics_helper+0x1218/0x5450
[   15.865878]  kasan_check_range+0x10c/0x1c0
[   15.865902]  __kasan_check_write+0x18/0x20
[   15.865925]  kasan_atomics_helper+0x1218/0x5450
[   15.865948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.865970]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.865995]  ? kasan_atomics+0x153/0x310
[   15.866031]  kasan_atomics+0x1dd/0x310
[   15.866054]  ? __pfx_kasan_atomics+0x10/0x10
[   15.866078]  ? __pfx_read_tsc+0x10/0x10
[   15.866100]  ? ktime_get_ts64+0x86/0x230
[   15.866126]  kunit_try_run_case+0x1a6/0x480
[   15.866150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866173]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.866197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.866222]  ? __kthread_parkme+0x82/0x160
[   15.866245]  ? preempt_count_sub+0x50/0x80
[   15.866270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.866320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.866347]  kthread+0x324/0x6e0
[   15.866369]  ? trace_preempt_on+0x20/0xc0
[   15.866392]  ? __pfx_kthread+0x10/0x10
[   15.866416]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.866438]  ? calculate_sigpending+0x7b/0xa0
[   15.866460]  ? __pfx_kthread+0x10/0x10
[   15.866483]  ret_from_fork+0x41/0x80
[   15.866502]  ? __pfx_kthread+0x10/0x10
[   15.866525]  ret_from_fork_asm+0x1a/0x30
[   15.866557]  </TASK>
[   15.866567] 
[   15.874528] Allocated by task 273:
[   15.874717]  kasan_save_stack+0x45/0x70
[   15.874925]  kasan_save_track+0x18/0x40
[   15.875324]  kasan_save_alloc_info+0x3b/0x50
[   15.875522]  __kasan_kmalloc+0xb7/0xc0
[   15.875805]  __kmalloc_cache_noprof+0x18a/0x420
[   15.875969]  kasan_atomics+0x96/0x310
[   15.876118]  kunit_try_run_case+0x1a6/0x480
[   15.876333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.876586]  kthread+0x324/0x6e0
[   15.876779]  ret_from_fork+0x41/0x80
[   15.876946]  ret_from_fork_asm+0x1a/0x30
[   15.877152] 
[   15.877238] The buggy address belongs to the object at ffff888101bf3e00
[   15.877238]  which belongs to the cache kmalloc-64 of size 64
[   15.877949] The buggy address is located 0 bytes to the right of
[   15.877949]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.878440] 
[   15.878537] The buggy address belongs to the physical page:
[   15.878937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.879199] flags: 0x200000000000000(node=0|zone=2)
[   15.879371] page_type: f5(slab)
[   15.879542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.880111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.880446] page dumped because: kasan: bad access detected
[   15.880885] 
[   15.880984] Memory state around the buggy address:
[   15.881178]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881395]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881842] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.882143]                                      ^
[   15.882351]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882594]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882908] ==================================================================
[   15.958344] ==================================================================
[   15.958569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   15.958793] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.959452] 
[   15.959555] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.959591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.959604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.959626] Call Trace:
[   15.959639]  <TASK>
[   15.959653]  dump_stack_lvl+0x73/0xb0
[   15.959690]  print_report+0xd1/0x650
[   15.959712]  ? __virt_addr_valid+0x1db/0x2d0
[   15.959734]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.959755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.959783]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.959805]  kasan_report+0x140/0x180
[   15.959828]  ? kasan_atomics_helper+0x4eb0/0x5450
[   15.959854]  __asan_report_load8_noabort+0x18/0x20
[   15.959878]  kasan_atomics_helper+0x4eb0/0x5450
[   15.959901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.959923]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.959947]  ? kasan_atomics+0x153/0x310
[   15.959974]  kasan_atomics+0x1dd/0x310
[   15.959996]  ? __pfx_kasan_atomics+0x10/0x10
[   15.960030]  ? __pfx_read_tsc+0x10/0x10
[   15.960051]  ? ktime_get_ts64+0x86/0x230
[   15.960077]  kunit_try_run_case+0x1a6/0x480
[   15.960101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.960122]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.960146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.960171]  ? __kthread_parkme+0x82/0x160
[   15.960192]  ? preempt_count_sub+0x50/0x80
[   15.960218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.960241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.960269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.960296]  kthread+0x324/0x6e0
[   15.960317]  ? trace_preempt_on+0x20/0xc0
[   15.960341]  ? __pfx_kthread+0x10/0x10
[   15.960364]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.960386]  ? calculate_sigpending+0x7b/0xa0
[   15.960409]  ? __pfx_kthread+0x10/0x10
[   15.960431]  ret_from_fork+0x41/0x80
[   15.960451]  ? __pfx_kthread+0x10/0x10
[   15.960473]  ret_from_fork_asm+0x1a/0x30
[   15.960505]  </TASK>
[   15.960516] 
[   15.969211] Allocated by task 273:
[   15.969398]  kasan_save_stack+0x45/0x70
[   15.969884]  kasan_save_track+0x18/0x40
[   15.970160]  kasan_save_alloc_info+0x3b/0x50
[   15.970558]  __kasan_kmalloc+0xb7/0xc0
[   15.970907]  __kmalloc_cache_noprof+0x18a/0x420
[   15.971110]  kasan_atomics+0x96/0x310
[   15.971247]  kunit_try_run_case+0x1a6/0x480
[   15.971396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.971835]  kthread+0x324/0x6e0
[   15.972295]  ret_from_fork+0x41/0x80
[   15.972617]  ret_from_fork_asm+0x1a/0x30
[   15.973010] 
[   15.973242] The buggy address belongs to the object at ffff888101bf3e00
[   15.973242]  which belongs to the cache kmalloc-64 of size 64
[   15.974224] The buggy address is located 0 bytes to the right of
[   15.974224]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.975497] 
[   15.975771] The buggy address belongs to the physical page:
[   15.975997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.976327] flags: 0x200000000000000(node=0|zone=2)
[   15.976544] page_type: f5(slab)
[   15.977029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.977470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.977936] page dumped because: kasan: bad access detected
[   15.978357] 
[   15.978454] Memory state around the buggy address:
[   15.978835]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.979317]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.979833] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.980302]                                      ^
[   15.980777]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.981080]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.981363] ==================================================================
[   15.684948] ==================================================================
[   15.685310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   15.685567] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.685896] 
[   15.685979] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.686026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.686039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.686061] Call Trace:
[   15.686079]  <TASK>
[   15.686096]  dump_stack_lvl+0x73/0xb0
[   15.686208]  print_report+0xd1/0x650
[   15.686232]  ? __virt_addr_valid+0x1db/0x2d0
[   15.686256]  ? kasan_atomics_helper+0xe79/0x5450
[   15.686278]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.686304]  ? kasan_atomics_helper+0xe79/0x5450
[   15.686326]  kasan_report+0x140/0x180
[   15.686348]  ? kasan_atomics_helper+0xe79/0x5450
[   15.686374]  kasan_check_range+0x10c/0x1c0
[   15.686398]  __kasan_check_write+0x18/0x20
[   15.686421]  kasan_atomics_helper+0xe79/0x5450
[   15.686444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.686466]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.686491]  ? kasan_atomics+0x153/0x310
[   15.686516]  kasan_atomics+0x1dd/0x310
[   15.686541]  ? __pfx_kasan_atomics+0x10/0x10
[   15.686565]  ? __pfx_read_tsc+0x10/0x10
[   15.686587]  ? ktime_get_ts64+0x86/0x230
[   15.686613]  kunit_try_run_case+0x1a6/0x480
[   15.686636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.686658]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.686682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.686708]  ? __kthread_parkme+0x82/0x160
[   15.686731]  ? preempt_count_sub+0x50/0x80
[   15.686757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.686780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.686806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.686834]  kthread+0x324/0x6e0
[   15.686855]  ? trace_preempt_on+0x20/0xc0
[   15.686879]  ? __pfx_kthread+0x10/0x10
[   15.686902]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.686925]  ? calculate_sigpending+0x7b/0xa0
[   15.686948]  ? __pfx_kthread+0x10/0x10
[   15.686971]  ret_from_fork+0x41/0x80
[   15.686990]  ? __pfx_kthread+0x10/0x10
[   15.687026]  ret_from_fork_asm+0x1a/0x30
[   15.687059]  </TASK>
[   15.687070] 
[   15.694813] Allocated by task 273:
[   15.694995]  kasan_save_stack+0x45/0x70
[   15.695216]  kasan_save_track+0x18/0x40
[   15.695408]  kasan_save_alloc_info+0x3b/0x50
[   15.695626]  __kasan_kmalloc+0xb7/0xc0
[   15.695819]  __kmalloc_cache_noprof+0x18a/0x420
[   15.696314]  kasan_atomics+0x96/0x310
[   15.696519]  kunit_try_run_case+0x1a6/0x480
[   15.696671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.696850]  kthread+0x324/0x6e0
[   15.697091]  ret_from_fork+0x41/0x80
[   15.697282]  ret_from_fork_asm+0x1a/0x30
[   15.697481] 
[   15.697577] The buggy address belongs to the object at ffff888101bf3e00
[   15.697577]  which belongs to the cache kmalloc-64 of size 64
[   15.698156] The buggy address is located 0 bytes to the right of
[   15.698156]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.698553] 
[   15.698656] The buggy address belongs to the physical page:
[   15.698913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.699374] flags: 0x200000000000000(node=0|zone=2)
[   15.699773] page_type: f5(slab)
[   15.699937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.700247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.700659] page dumped because: kasan: bad access detected
[   15.700882] 
[   15.700981] Memory state around the buggy address:
[   15.701151]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.701430]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.701747] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.702366]                                      ^
[   15.702630]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.702926]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.703194] ==================================================================
[   16.138933] ==================================================================
[   16.139994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   16.140445] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.140869] 
[   16.141074] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.141126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.141139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.141160] Call Trace:
[   16.141177]  <TASK>
[   16.141213]  dump_stack_lvl+0x73/0xb0
[   16.141239]  print_report+0xd1/0x650
[   16.141260]  ? __virt_addr_valid+0x1db/0x2d0
[   16.141293]  ? kasan_atomics_helper+0x1780/0x5450
[   16.141315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.141340]  ? kasan_atomics_helper+0x1780/0x5450
[   16.141362]  kasan_report+0x140/0x180
[   16.141384]  ? kasan_atomics_helper+0x1780/0x5450
[   16.141411]  kasan_check_range+0x10c/0x1c0
[   16.141433]  __kasan_check_write+0x18/0x20
[   16.141457]  kasan_atomics_helper+0x1780/0x5450
[   16.141479]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.141501]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.141526]  ? kasan_atomics+0x153/0x310
[   16.141551]  kasan_atomics+0x1dd/0x310
[   16.141574]  ? __pfx_kasan_atomics+0x10/0x10
[   16.141598]  ? __pfx_read_tsc+0x10/0x10
[   16.141620]  ? ktime_get_ts64+0x86/0x230
[   16.141645]  kunit_try_run_case+0x1a6/0x480
[   16.141669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141690]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.141715]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.141746]  ? __kthread_parkme+0x82/0x160
[   16.141767]  ? preempt_count_sub+0x50/0x80
[   16.141793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.141843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.141871]  kthread+0x324/0x6e0
[   16.141892]  ? trace_preempt_on+0x20/0xc0
[   16.141916]  ? __pfx_kthread+0x10/0x10
[   16.141939]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.141962]  ? calculate_sigpending+0x7b/0xa0
[   16.141986]  ? __pfx_kthread+0x10/0x10
[   16.142009]  ret_from_fork+0x41/0x80
[   16.142038]  ? __pfx_kthread+0x10/0x10
[   16.142061]  ret_from_fork_asm+0x1a/0x30
[   16.142093]  </TASK>
[   16.142103] 
[   16.155034] Allocated by task 273:
[   16.155167]  kasan_save_stack+0x45/0x70
[   16.155312]  kasan_save_track+0x18/0x40
[   16.155445]  kasan_save_alloc_info+0x3b/0x50
[   16.155680]  __kasan_kmalloc+0xb7/0xc0
[   16.156034]  __kmalloc_cache_noprof+0x18a/0x420
[   16.156454]  kasan_atomics+0x96/0x310
[   16.156883]  kunit_try_run_case+0x1a6/0x480
[   16.157328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.157984]  kthread+0x324/0x6e0
[   16.158328]  ret_from_fork+0x41/0x80
[   16.158671]  ret_from_fork_asm+0x1a/0x30
[   16.159087] 
[   16.159249] The buggy address belongs to the object at ffff888101bf3e00
[   16.159249]  which belongs to the cache kmalloc-64 of size 64
[   16.160349] The buggy address is located 0 bytes to the right of
[   16.160349]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.160969] 
[   16.161139] The buggy address belongs to the physical page:
[   16.161519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.162148] flags: 0x200000000000000(node=0|zone=2)
[   16.162314] page_type: f5(slab)
[   16.162436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.162916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.163585] page dumped because: kasan: bad access detected
[   16.164132] 
[   16.164314] Memory state around the buggy address:
[   16.164874]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.165350]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.165581] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.165976]                                      ^
[   16.166142]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166356]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.166578] ==================================================================
[   15.344083] ==================================================================
[   15.344355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   15.344584] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.344813] 
[   15.344893] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.344932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.344946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.344968] Call Trace:
[   15.344985]  <TASK>
[   15.345002]  dump_stack_lvl+0x73/0xb0
[   15.345038]  print_report+0xd1/0x650
[   15.345060]  ? __virt_addr_valid+0x1db/0x2d0
[   15.345083]  ? kasan_atomics_helper+0x566/0x5450
[   15.345105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.345131]  ? kasan_atomics_helper+0x566/0x5450
[   15.345168]  kasan_report+0x140/0x180
[   15.345191]  ? kasan_atomics_helper+0x566/0x5450
[   15.345217]  kasan_check_range+0x10c/0x1c0
[   15.345240]  __kasan_check_write+0x18/0x20
[   15.345264]  kasan_atomics_helper+0x566/0x5450
[   15.345286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.345309]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.345334]  ? kasan_atomics+0x153/0x310
[   15.345359]  kasan_atomics+0x1dd/0x310
[   15.345382]  ? __pfx_kasan_atomics+0x10/0x10
[   15.345406]  ? __pfx_read_tsc+0x10/0x10
[   15.345429]  ? ktime_get_ts64+0x86/0x230
[   15.345454]  kunit_try_run_case+0x1a6/0x480
[   15.345478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.345501]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.345525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.345550]  ? __kthread_parkme+0x82/0x160
[   15.345573]  ? preempt_count_sub+0x50/0x80
[   15.345598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.345622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.345649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.345676]  kthread+0x324/0x6e0
[   15.345698]  ? trace_preempt_on+0x20/0xc0
[   15.345721]  ? __pfx_kthread+0x10/0x10
[   15.345751]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.345774]  ? calculate_sigpending+0x7b/0xa0
[   15.345797]  ? __pfx_kthread+0x10/0x10
[   15.345820]  ret_from_fork+0x41/0x80
[   15.345840]  ? __pfx_kthread+0x10/0x10
[   15.345863]  ret_from_fork_asm+0x1a/0x30
[   15.345895]  </TASK>
[   15.345906] 
[   15.358896] Allocated by task 273:
[   15.359297]  kasan_save_stack+0x45/0x70
[   15.359510]  kasan_save_track+0x18/0x40
[   15.360104]  kasan_save_alloc_info+0x3b/0x50
[   15.360399]  __kasan_kmalloc+0xb7/0xc0
[   15.360812]  __kmalloc_cache_noprof+0x18a/0x420
[   15.360972]  kasan_atomics+0x96/0x310
[   15.361117]  kunit_try_run_case+0x1a6/0x480
[   15.361259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.361431]  kthread+0x324/0x6e0
[   15.361576]  ret_from_fork+0x41/0x80
[   15.362172]  ret_from_fork_asm+0x1a/0x30
[   15.362665] 
[   15.362841] The buggy address belongs to the object at ffff888101bf3e00
[   15.362841]  which belongs to the cache kmalloc-64 of size 64
[   15.364082] The buggy address is located 0 bytes to the right of
[   15.364082]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.365318] 
[   15.365486] The buggy address belongs to the physical page:
[   15.366118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.366844] flags: 0x200000000000000(node=0|zone=2)
[   15.367011] page_type: f5(slab)
[   15.367146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.367372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.367727] page dumped because: kasan: bad access detected
[   15.368271] 
[   15.368435] Memory state around the buggy address:
[   15.368996]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.369869]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.370551] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.371250]                                      ^
[   15.371771]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.372333]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.372557] ==================================================================
[   16.453895] ==================================================================
[   16.454594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   16.455324] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.456137] 
[   16.456339] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.456379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.456391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.456415] Call Trace:
[   16.456432]  <TASK>
[   16.456449]  dump_stack_lvl+0x73/0xb0
[   16.456474]  print_report+0xd1/0x650
[   16.456496]  ? __virt_addr_valid+0x1db/0x2d0
[   16.456518]  ? kasan_atomics_helper+0x4f73/0x5450
[   16.456539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.456565]  ? kasan_atomics_helper+0x4f73/0x5450
[   16.456587]  kasan_report+0x140/0x180
[   16.456610]  ? kasan_atomics_helper+0x4f73/0x5450
[   16.456636]  __asan_report_load8_noabort+0x18/0x20
[   16.456661]  kasan_atomics_helper+0x4f73/0x5450
[   16.456684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.456705]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.456730]  ? kasan_atomics+0x153/0x310
[   16.456756]  kasan_atomics+0x1dd/0x310
[   16.456779]  ? __pfx_kasan_atomics+0x10/0x10
[   16.456803]  ? __pfx_read_tsc+0x10/0x10
[   16.456825]  ? ktime_get_ts64+0x86/0x230
[   16.456851]  kunit_try_run_case+0x1a6/0x480
[   16.456875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.456897]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.456921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.456946]  ? __kthread_parkme+0x82/0x160
[   16.456969]  ? preempt_count_sub+0x50/0x80
[   16.456994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.457032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.457070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.457097]  kthread+0x324/0x6e0
[   16.457125]  ? trace_preempt_on+0x20/0xc0
[   16.457149]  ? __pfx_kthread+0x10/0x10
[   16.457172]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.457195]  ? calculate_sigpending+0x7b/0xa0
[   16.457218]  ? __pfx_kthread+0x10/0x10
[   16.457242]  ret_from_fork+0x41/0x80
[   16.457261]  ? __pfx_kthread+0x10/0x10
[   16.457284]  ret_from_fork_asm+0x1a/0x30
[   16.457316]  </TASK>
[   16.457327] 
[   16.468153] Allocated by task 273:
[   16.468344]  kasan_save_stack+0x45/0x70
[   16.468565]  kasan_save_track+0x18/0x40
[   16.468854]  kasan_save_alloc_info+0x3b/0x50
[   16.469024]  __kasan_kmalloc+0xb7/0xc0
[   16.469160]  __kmalloc_cache_noprof+0x18a/0x420
[   16.469387]  kasan_atomics+0x96/0x310
[   16.469573]  kunit_try_run_case+0x1a6/0x480
[   16.469783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.470546]  kthread+0x324/0x6e0
[   16.470969]  ret_from_fork+0x41/0x80
[   16.471279]  ret_from_fork_asm+0x1a/0x30
[   16.471754] 
[   16.471990] The buggy address belongs to the object at ffff888101bf3e00
[   16.471990]  which belongs to the cache kmalloc-64 of size 64
[   16.472509] The buggy address is located 0 bytes to the right of
[   16.472509]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.473524] 
[   16.473792] The buggy address belongs to the physical page:
[   16.474235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.474859] flags: 0x200000000000000(node=0|zone=2)
[   16.475235] page_type: f5(slab)
[   16.475675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.476214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.476884] page dumped because: kasan: bad access detected
[   16.477279] 
[   16.477373] Memory state around the buggy address:
[   16.477790]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.478251]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.478541] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.478821]                                      ^
[   16.479036]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.479255]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.479586] ==================================================================
[   16.517228] ==================================================================
[   16.517582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   16.517921] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.518247] 
[   16.518353] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.518392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.518405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.518436] Call Trace:
[   16.518451]  <TASK>
[   16.518467]  dump_stack_lvl+0x73/0xb0
[   16.518491]  print_report+0xd1/0x650
[   16.518525]  ? __virt_addr_valid+0x1db/0x2d0
[   16.518546]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.518568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.518594]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.518616]  kasan_report+0x140/0x180
[   16.518647]  ? kasan_atomics_helper+0x20c9/0x5450
[   16.518673]  kasan_check_range+0x10c/0x1c0
[   16.518696]  __kasan_check_write+0x18/0x20
[   16.518731]  kasan_atomics_helper+0x20c9/0x5450
[   16.518754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.518776]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.518810]  ? kasan_atomics+0x153/0x310
[   16.518835]  kasan_atomics+0x1dd/0x310
[   16.518857]  ? __pfx_kasan_atomics+0x10/0x10
[   16.518892]  ? __pfx_read_tsc+0x10/0x10
[   16.518915]  ? ktime_get_ts64+0x86/0x230
[   16.518940]  kunit_try_run_case+0x1a6/0x480
[   16.518971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.518993]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.519414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.519454]  ? __kthread_parkme+0x82/0x160
[   16.519478]  ? preempt_count_sub+0x50/0x80
[   16.519504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.519528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.519558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.519586]  kthread+0x324/0x6e0
[   16.519621]  ? trace_preempt_on+0x20/0xc0
[   16.519645]  ? __pfx_kthread+0x10/0x10
[   16.519668]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.520070]  ? calculate_sigpending+0x7b/0xa0
[   16.520098]  ? __pfx_kthread+0x10/0x10
[   16.520135]  ret_from_fork+0x41/0x80
[   16.520156]  ? __pfx_kthread+0x10/0x10
[   16.520179]  ret_from_fork_asm+0x1a/0x30
[   16.521605]  </TASK>
[   16.521623] 
[   16.535278] Allocated by task 273:
[   16.535525]  kasan_save_stack+0x45/0x70
[   16.535961]  kasan_save_track+0x18/0x40
[   16.536396]  kasan_save_alloc_info+0x3b/0x50
[   16.536792]  __kasan_kmalloc+0xb7/0xc0
[   16.536928]  __kmalloc_cache_noprof+0x18a/0x420
[   16.537097]  kasan_atomics+0x96/0x310
[   16.537233]  kunit_try_run_case+0x1a6/0x480
[   16.537379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.537556]  kthread+0x324/0x6e0
[   16.537716]  ret_from_fork+0x41/0x80
[   16.537884]  ret_from_fork_asm+0x1a/0x30
[   16.538091] 
[   16.538189] The buggy address belongs to the object at ffff888101bf3e00
[   16.538189]  which belongs to the cache kmalloc-64 of size 64
[   16.538659] The buggy address is located 0 bytes to the right of
[   16.538659]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.539282] 
[   16.539359] The buggy address belongs to the physical page:
[   16.539530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.539907] flags: 0x200000000000000(node=0|zone=2)
[   16.540269] page_type: f5(slab)
[   16.540482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.540893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.541263] page dumped because: kasan: bad access detected
[   16.541486] 
[   16.541600] Memory state around the buggy address:
[   16.541796]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542050]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542418] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.542744]                                      ^
[   16.543078]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543356]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543731] ==================================================================
[   15.842685] ==================================================================
[   15.842936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   15.843247] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.843556] 
[   15.843720] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.843775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.843788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.843809] Call Trace:
[   15.843825]  <TASK>
[   15.843842]  dump_stack_lvl+0x73/0xb0
[   15.843867]  print_report+0xd1/0x650
[   15.843890]  ? __virt_addr_valid+0x1db/0x2d0
[   15.843912]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.843933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.843960]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.843982]  kasan_report+0x140/0x180
[   15.844004]  ? kasan_atomics_helper+0x4a04/0x5450
[   15.844039]  __asan_report_load4_noabort+0x18/0x20
[   15.844064]  kasan_atomics_helper+0x4a04/0x5450
[   15.844087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.844109]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.844134]  ? kasan_atomics+0x153/0x310
[   15.844160]  kasan_atomics+0x1dd/0x310
[   15.844183]  ? __pfx_kasan_atomics+0x10/0x10
[   15.844207]  ? __pfx_read_tsc+0x10/0x10
[   15.844229]  ? ktime_get_ts64+0x86/0x230
[   15.844254]  kunit_try_run_case+0x1a6/0x480
[   15.844278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844300]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.844324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.844349]  ? __kthread_parkme+0x82/0x160
[   15.844370]  ? preempt_count_sub+0x50/0x80
[   15.844395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.844446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.844473]  kthread+0x324/0x6e0
[   15.844494]  ? trace_preempt_on+0x20/0xc0
[   15.844518]  ? __pfx_kthread+0x10/0x10
[   15.844540]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.844564]  ? calculate_sigpending+0x7b/0xa0
[   15.844586]  ? __pfx_kthread+0x10/0x10
[   15.844609]  ret_from_fork+0x41/0x80
[   15.844628]  ? __pfx_kthread+0x10/0x10
[   15.844651]  ret_from_fork_asm+0x1a/0x30
[   15.844683]  </TASK>
[   15.844693] 
[   15.854507] Allocated by task 273:
[   15.855190]  kasan_save_stack+0x45/0x70
[   15.855375]  kasan_save_track+0x18/0x40
[   15.855651]  kasan_save_alloc_info+0x3b/0x50
[   15.856069]  __kasan_kmalloc+0xb7/0xc0
[   15.856272]  __kmalloc_cache_noprof+0x18a/0x420
[   15.856482]  kasan_atomics+0x96/0x310
[   15.856946]  kunit_try_run_case+0x1a6/0x480
[   15.857218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.857536]  kthread+0x324/0x6e0
[   15.857831]  ret_from_fork+0x41/0x80
[   15.857979]  ret_from_fork_asm+0x1a/0x30
[   15.858204] 
[   15.858306] The buggy address belongs to the object at ffff888101bf3e00
[   15.858306]  which belongs to the cache kmalloc-64 of size 64
[   15.859058] The buggy address is located 0 bytes to the right of
[   15.859058]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.859536] 
[   15.859619] The buggy address belongs to the physical page:
[   15.859959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.860305] flags: 0x200000000000000(node=0|zone=2)
[   15.860524] page_type: f5(slab)
[   15.860851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.861159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.861414] page dumped because: kasan: bad access detected
[   15.861661] 
[   15.861763] Memory state around the buggy address:
[   15.862008]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862382]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862653] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.863192]                                      ^
[   15.863434]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863732]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864088] ==================================================================
[   15.241299] ==================================================================
[   15.242031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   15.242364] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.242802] 
[   15.242896] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.242938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.242951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.242973] Call Trace:
[   15.242987]  <TASK>
[   15.243003]  dump_stack_lvl+0x73/0xb0
[   15.243041]  print_report+0xd1/0x650
[   15.243064]  ? __virt_addr_valid+0x1db/0x2d0
[   15.243086]  ? kasan_atomics_helper+0x3e0/0x5450
[   15.243108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.243134]  ? kasan_atomics_helper+0x3e0/0x5450
[   15.243156]  kasan_report+0x140/0x180
[   15.243404]  ? kasan_atomics_helper+0x3e0/0x5450
[   15.243435]  kasan_check_range+0x10c/0x1c0
[   15.243460]  __kasan_check_read+0x15/0x20
[   15.243482]  kasan_atomics_helper+0x3e0/0x5450
[   15.243505]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.243527]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.243552]  ? kasan_atomics+0x153/0x310
[   15.243577]  kasan_atomics+0x1dd/0x310
[   15.243600]  ? __pfx_kasan_atomics+0x10/0x10
[   15.243624]  ? __pfx_read_tsc+0x10/0x10
[   15.243646]  ? ktime_get_ts64+0x86/0x230
[   15.243671]  kunit_try_run_case+0x1a6/0x480
[   15.243695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243718]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.243741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.243767]  ? __kthread_parkme+0x82/0x160
[   15.243790]  ? preempt_count_sub+0x50/0x80
[   15.243815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.243892]  kthread+0x324/0x6e0
[   15.243915]  ? trace_preempt_on+0x20/0xc0
[   15.243938]  ? __pfx_kthread+0x10/0x10
[   15.243961]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.243985]  ? calculate_sigpending+0x7b/0xa0
[   15.244007]  ? __pfx_kthread+0x10/0x10
[   15.244041]  ret_from_fork+0x41/0x80
[   15.244061]  ? __pfx_kthread+0x10/0x10
[   15.244084]  ret_from_fork_asm+0x1a/0x30
[   15.244115]  </TASK>
[   15.244127] 
[   15.254717] Allocated by task 273:
[   15.254847]  kasan_save_stack+0x45/0x70
[   15.255251]  kasan_save_track+0x18/0x40
[   15.255443]  kasan_save_alloc_info+0x3b/0x50
[   15.255638]  __kasan_kmalloc+0xb7/0xc0
[   15.256003]  __kmalloc_cache_noprof+0x18a/0x420
[   15.256407]  kasan_atomics+0x96/0x310
[   15.256604]  kunit_try_run_case+0x1a6/0x480
[   15.256973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257327]  kthread+0x324/0x6e0
[   15.257468]  ret_from_fork+0x41/0x80
[   15.257833]  ret_from_fork_asm+0x1a/0x30
[   15.258134] 
[   15.258237] The buggy address belongs to the object at ffff888101bf3e00
[   15.258237]  which belongs to the cache kmalloc-64 of size 64
[   15.258905] The buggy address is located 0 bytes to the right of
[   15.258905]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.259728] 
[   15.259834] The buggy address belongs to the physical page:
[   15.260393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.260838] flags: 0x200000000000000(node=0|zone=2)
[   15.261155] page_type: f5(slab)
[   15.261337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.262034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.262465] page dumped because: kasan: bad access detected
[   15.262671] 
[   15.262980] Memory state around the buggy address:
[   15.263508]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.264419]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.265088] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.265850]                                      ^
[   15.266134]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.266894]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.267121] ==================================================================
[   15.421951] ==================================================================
[   15.422281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   15.423002] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.423504] 
[   15.423728] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.423776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.423885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.423909] Call Trace:
[   15.423926]  <TASK>
[   15.423943]  dump_stack_lvl+0x73/0xb0
[   15.423971]  print_report+0xd1/0x650
[   15.423993]  ? __virt_addr_valid+0x1db/0x2d0
[   15.424030]  ? kasan_atomics_helper+0x730/0x5450
[   15.424052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.424079]  ? kasan_atomics_helper+0x730/0x5450
[   15.424101]  kasan_report+0x140/0x180
[   15.424125]  ? kasan_atomics_helper+0x730/0x5450
[   15.424152]  kasan_check_range+0x10c/0x1c0
[   15.424176]  __kasan_check_write+0x18/0x20
[   15.424200]  kasan_atomics_helper+0x730/0x5450
[   15.424223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.424246]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.424270]  ? kasan_atomics+0x153/0x310
[   15.424296]  kasan_atomics+0x1dd/0x310
[   15.424319]  ? __pfx_kasan_atomics+0x10/0x10
[   15.424343]  ? __pfx_read_tsc+0x10/0x10
[   15.424365]  ? ktime_get_ts64+0x86/0x230
[   15.424391]  kunit_try_run_case+0x1a6/0x480
[   15.424415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.424437]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.424462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.424486]  ? __kthread_parkme+0x82/0x160
[   15.424509]  ? preempt_count_sub+0x50/0x80
[   15.424535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.424611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.424638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.424666]  kthread+0x324/0x6e0
[   15.424688]  ? trace_preempt_on+0x20/0xc0
[   15.424712]  ? __pfx_kthread+0x10/0x10
[   15.424735]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.424759]  ? calculate_sigpending+0x7b/0xa0
[   15.424781]  ? __pfx_kthread+0x10/0x10
[   15.424804]  ret_from_fork+0x41/0x80
[   15.424824]  ? __pfx_kthread+0x10/0x10
[   15.424851]  ret_from_fork_asm+0x1a/0x30
[   15.424884]  </TASK>
[   15.424896] 
[   15.435689] Allocated by task 273:
[   15.435872]  kasan_save_stack+0x45/0x70
[   15.436656]  kasan_save_track+0x18/0x40
[   15.436988]  kasan_save_alloc_info+0x3b/0x50
[   15.437420]  __kasan_kmalloc+0xb7/0xc0
[   15.437932]  __kmalloc_cache_noprof+0x18a/0x420
[   15.438338]  kasan_atomics+0x96/0x310
[   15.438800]  kunit_try_run_case+0x1a6/0x480
[   15.439075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.439329]  kthread+0x324/0x6e0
[   15.439492]  ret_from_fork+0x41/0x80
[   15.439994]  ret_from_fork_asm+0x1a/0x30
[   15.440448] 
[   15.440704] The buggy address belongs to the object at ffff888101bf3e00
[   15.440704]  which belongs to the cache kmalloc-64 of size 64
[   15.441637] The buggy address is located 0 bytes to the right of
[   15.441637]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.442617] 
[   15.442842] The buggy address belongs to the physical page:
[   15.443322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.443802] flags: 0x200000000000000(node=0|zone=2)
[   15.444036] page_type: f5(slab)
[   15.444200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.444493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.445140] page dumped because: kasan: bad access detected
[   15.445973] 
[   15.446092] Memory state around the buggy address:
[   15.446475]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.447145]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.447665] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.448168]                                      ^
[   15.448654]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449097]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449594] ==================================================================
[   16.361011] ==================================================================
[   16.361465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   16.361960] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.362515] 
[   16.362605] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.362645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362682] Call Trace:
[   16.362699]  <TASK>
[   16.362716]  dump_stack_lvl+0x73/0xb0
[   16.362740]  print_report+0xd1/0x650
[   16.363077]  ? __virt_addr_valid+0x1db/0x2d0
[   16.363109]  ? kasan_atomics_helper+0x1d7b/0x5450
[   16.363131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.363158]  ? kasan_atomics_helper+0x1d7b/0x5450
[   16.363179]  kasan_report+0x140/0x180
[   16.363203]  ? kasan_atomics_helper+0x1d7b/0x5450
[   16.363229]  kasan_check_range+0x10c/0x1c0
[   16.363253]  __kasan_check_write+0x18/0x20
[   16.363276]  kasan_atomics_helper+0x1d7b/0x5450
[   16.363299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.363322]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.363348]  ? kasan_atomics+0x153/0x310
[   16.363374]  kasan_atomics+0x1dd/0x310
[   16.363397]  ? __pfx_kasan_atomics+0x10/0x10
[   16.363421]  ? __pfx_read_tsc+0x10/0x10
[   16.363444]  ? ktime_get_ts64+0x86/0x230
[   16.363470]  kunit_try_run_case+0x1a6/0x480
[   16.363494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363517]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.363542]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.363566]  ? __kthread_parkme+0x82/0x160
[   16.363589]  ? preempt_count_sub+0x50/0x80
[   16.363614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.363693]  kthread+0x324/0x6e0
[   16.363714]  ? trace_preempt_on+0x20/0xc0
[   16.363738]  ? __pfx_kthread+0x10/0x10
[   16.363762]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.363785]  ? calculate_sigpending+0x7b/0xa0
[   16.363807]  ? __pfx_kthread+0x10/0x10
[   16.363831]  ret_from_fork+0x41/0x80
[   16.363850]  ? __pfx_kthread+0x10/0x10
[   16.363874]  ret_from_fork_asm+0x1a/0x30
[   16.363906]  </TASK>
[   16.363918] 
[   16.372944] Allocated by task 273:
[   16.373111]  kasan_save_stack+0x45/0x70
[   16.373259]  kasan_save_track+0x18/0x40
[   16.373452]  kasan_save_alloc_info+0x3b/0x50
[   16.373795]  __kasan_kmalloc+0xb7/0xc0
[   16.374028]  __kmalloc_cache_noprof+0x18a/0x420
[   16.374194]  kasan_atomics+0x96/0x310
[   16.374465]  kunit_try_run_case+0x1a6/0x480
[   16.374817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375121]  kthread+0x324/0x6e0
[   16.375283]  ret_from_fork+0x41/0x80
[   16.375510]  ret_from_fork_asm+0x1a/0x30
[   16.375713] 
[   16.375814] The buggy address belongs to the object at ffff888101bf3e00
[   16.375814]  which belongs to the cache kmalloc-64 of size 64
[   16.376386] The buggy address is located 0 bytes to the right of
[   16.376386]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.376999] 
[   16.377131] The buggy address belongs to the physical page:
[   16.377425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.377840] flags: 0x200000000000000(node=0|zone=2)
[   16.378134] page_type: f5(slab)
[   16.378326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.378647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.379040] page dumped because: kasan: bad access detected
[   16.379266] 
[   16.379394] Memory state around the buggy address:
[   16.379653]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.380034]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.380363] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.380655]                                      ^
[   16.380911]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.381267]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.381591] ==================================================================
[   16.622334] ==================================================================
[   16.622807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   16.623501] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.624002] 
[   16.624097] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.624136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.624150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.624172] Call Trace:
[   16.624188]  <TASK>
[   16.624202]  dump_stack_lvl+0x73/0xb0
[   16.624227]  print_report+0xd1/0x650
[   16.624248]  ? __virt_addr_valid+0x1db/0x2d0
[   16.624271]  ? kasan_atomics_helper+0x5117/0x5450
[   16.624292]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.624318]  ? kasan_atomics_helper+0x5117/0x5450
[   16.624339]  kasan_report+0x140/0x180
[   16.624362]  ? kasan_atomics_helper+0x5117/0x5450
[   16.624387]  __asan_report_load8_noabort+0x18/0x20
[   16.624411]  kasan_atomics_helper+0x5117/0x5450
[   16.624434]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.624456]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.624480]  ? kasan_atomics+0x153/0x310
[   16.624506]  kasan_atomics+0x1dd/0x310
[   16.624528]  ? __pfx_kasan_atomics+0x10/0x10
[   16.624578]  ? __pfx_read_tsc+0x10/0x10
[   16.624601]  ? ktime_get_ts64+0x86/0x230
[   16.624626]  kunit_try_run_case+0x1a6/0x480
[   16.624660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.624682]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.624706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.624742]  ? __kthread_parkme+0x82/0x160
[   16.624766]  ? preempt_count_sub+0x50/0x80
[   16.624790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.624814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.624850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.624878]  kthread+0x324/0x6e0
[   16.624900]  ? trace_preempt_on+0x20/0xc0
[   16.624934]  ? __pfx_kthread+0x10/0x10
[   16.624957]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.624980]  ? calculate_sigpending+0x7b/0xa0
[   16.625003]  ? __pfx_kthread+0x10/0x10
[   16.625035]  ret_from_fork+0x41/0x80
[   16.625054]  ? __pfx_kthread+0x10/0x10
[   16.625078]  ret_from_fork_asm+0x1a/0x30
[   16.625109]  </TASK>
[   16.625120] 
[   16.637742] Allocated by task 273:
[   16.638108]  kasan_save_stack+0x45/0x70
[   16.638495]  kasan_save_track+0x18/0x40
[   16.638826]  kasan_save_alloc_info+0x3b/0x50
[   16.639095]  __kasan_kmalloc+0xb7/0xc0
[   16.639391]  __kmalloc_cache_noprof+0x18a/0x420
[   16.639570]  kasan_atomics+0x96/0x310
[   16.639948]  kunit_try_run_case+0x1a6/0x480
[   16.640359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.640810]  kthread+0x324/0x6e0
[   16.640964]  ret_from_fork+0x41/0x80
[   16.641194]  ret_from_fork_asm+0x1a/0x30
[   16.641611] 
[   16.641778] The buggy address belongs to the object at ffff888101bf3e00
[   16.641778]  which belongs to the cache kmalloc-64 of size 64
[   16.642292] The buggy address is located 0 bytes to the right of
[   16.642292]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.642926] 
[   16.643107] The buggy address belongs to the physical page:
[   16.643633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.644330] flags: 0x200000000000000(node=0|zone=2)
[   16.644794] page_type: f5(slab)
[   16.645104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.645521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.646476] page dumped because: kasan: bad access detected
[   16.646843] 
[   16.647004] Memory state around the buggy address:
[   16.647309]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.647747]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.647963] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.648188]                                      ^
[   16.648344]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648582]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.649250] ==================================================================
[   16.014223] ==================================================================
[   16.014961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   16.015953] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.016282] 
[   16.016369] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.016410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.016423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.016445] Call Trace:
[   16.016463]  <TASK>
[   16.016480]  dump_stack_lvl+0x73/0xb0
[   16.016507]  print_report+0xd1/0x650
[   16.016529]  ? __virt_addr_valid+0x1db/0x2d0
[   16.016559]  ? kasan_atomics_helper+0x50d6/0x5450
[   16.016581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.016607]  ? kasan_atomics_helper+0x50d6/0x5450
[   16.016629]  kasan_report+0x140/0x180
[   16.016653]  ? kasan_atomics_helper+0x50d6/0x5450
[   16.016679]  __asan_report_store8_noabort+0x1b/0x30
[   16.016703]  kasan_atomics_helper+0x50d6/0x5450
[   16.016725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.016748]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.016772]  ? kasan_atomics+0x153/0x310
[   16.016800]  kasan_atomics+0x1dd/0x310
[   16.016824]  ? __pfx_kasan_atomics+0x10/0x10
[   16.016848]  ? __pfx_read_tsc+0x10/0x10
[   16.016871]  ? ktime_get_ts64+0x86/0x230
[   16.016897]  kunit_try_run_case+0x1a6/0x480
[   16.016921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.016943]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.016969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.016993]  ? __kthread_parkme+0x82/0x160
[   16.017210]  ? preempt_count_sub+0x50/0x80
[   16.017245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.017270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.017325]  kthread+0x324/0x6e0
[   16.017378]  ? trace_preempt_on+0x20/0xc0
[   16.017404]  ? __pfx_kthread+0x10/0x10
[   16.017427]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.017450]  ? calculate_sigpending+0x7b/0xa0
[   16.017473]  ? __pfx_kthread+0x10/0x10
[   16.017496]  ret_from_fork+0x41/0x80
[   16.017515]  ? __pfx_kthread+0x10/0x10
[   16.017538]  ret_from_fork_asm+0x1a/0x30
[   16.017570]  </TASK>
[   16.017582] 
[   16.033247] Allocated by task 273:
[   16.033597]  kasan_save_stack+0x45/0x70
[   16.034006]  kasan_save_track+0x18/0x40
[   16.034421]  kasan_save_alloc_info+0x3b/0x50
[   16.034891]  __kasan_kmalloc+0xb7/0xc0
[   16.035280]  __kmalloc_cache_noprof+0x18a/0x420
[   16.035710]  kasan_atomics+0x96/0x310
[   16.035979]  kunit_try_run_case+0x1a6/0x480
[   16.036137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.036318]  kthread+0x324/0x6e0
[   16.036443]  ret_from_fork+0x41/0x80
[   16.036574]  ret_from_fork_asm+0x1a/0x30
[   16.036800] 
[   16.036872] The buggy address belongs to the object at ffff888101bf3e00
[   16.036872]  which belongs to the cache kmalloc-64 of size 64
[   16.037487] The buggy address is located 0 bytes to the right of
[   16.037487]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.038086] 
[   16.038205] The buggy address belongs to the physical page:
[   16.038455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.038874] flags: 0x200000000000000(node=0|zone=2)
[   16.039131] page_type: f5(slab)
[   16.039259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.039565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.039941] page dumped because: kasan: bad access detected
[   16.040191] 
[   16.040272] Memory state around the buggy address:
[   16.040428]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.040996]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.041299] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.041511]                                      ^
[   16.041795]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.042279]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.042495] ==================================================================
[   15.940706] ==================================================================
[   15.941071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   15.941351] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.941773] 
[   15.941860] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.941901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.941914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.941938] Call Trace:
[   15.941956]  <TASK>
[   15.941973]  dump_stack_lvl+0x73/0xb0
[   15.941998]  print_report+0xd1/0x650
[   15.942032]  ? __virt_addr_valid+0x1db/0x2d0
[   15.942056]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.942077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.942103]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.942125]  kasan_report+0x140/0x180
[   15.942148]  ? kasan_atomics_helper+0x13b6/0x5450
[   15.942174]  kasan_check_range+0x10c/0x1c0
[   15.942198]  __kasan_check_read+0x15/0x20
[   15.942221]  kasan_atomics_helper+0x13b6/0x5450
[   15.942246]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.942268]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.942293]  ? kasan_atomics+0x153/0x310
[   15.942320]  kasan_atomics+0x1dd/0x310
[   15.942343]  ? __pfx_kasan_atomics+0x10/0x10
[   15.942368]  ? __pfx_read_tsc+0x10/0x10
[   15.942390]  ? ktime_get_ts64+0x86/0x230
[   15.942416]  kunit_try_run_case+0x1a6/0x480
[   15.942439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942462]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.942486]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.942510]  ? __kthread_parkme+0x82/0x160
[   15.942533]  ? preempt_count_sub+0x50/0x80
[   15.942558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.942635]  kthread+0x324/0x6e0
[   15.942656]  ? trace_preempt_on+0x20/0xc0
[   15.942680]  ? __pfx_kthread+0x10/0x10
[   15.942702]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.942725]  ? calculate_sigpending+0x7b/0xa0
[   15.942747]  ? __pfx_kthread+0x10/0x10
[   15.942771]  ret_from_fork+0x41/0x80
[   15.942790]  ? __pfx_kthread+0x10/0x10
[   15.942814]  ret_from_fork_asm+0x1a/0x30
[   15.942845]  </TASK>
[   15.942857] 
[   15.950541] Allocated by task 273:
[   15.950737]  kasan_save_stack+0x45/0x70
[   15.950905]  kasan_save_track+0x18/0x40
[   15.951084]  kasan_save_alloc_info+0x3b/0x50
[   15.951236]  __kasan_kmalloc+0xb7/0xc0
[   15.951370]  __kmalloc_cache_noprof+0x18a/0x420
[   15.951525]  kasan_atomics+0x96/0x310
[   15.951657]  kunit_try_run_case+0x1a6/0x480
[   15.951814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.952197]  kthread+0x324/0x6e0
[   15.952367]  ret_from_fork+0x41/0x80
[   15.952546]  ret_from_fork_asm+0x1a/0x30
[   15.952740] 
[   15.952843] The buggy address belongs to the object at ffff888101bf3e00
[   15.952843]  which belongs to the cache kmalloc-64 of size 64
[   15.953370] The buggy address is located 0 bytes to the right of
[   15.953370]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.953934] 
[   15.954039] The buggy address belongs to the physical page:
[   15.954282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.954522] flags: 0x200000000000000(node=0|zone=2)
[   15.955027] page_type: f5(slab)
[   15.955201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.955540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.955874] page dumped because: kasan: bad access detected
[   15.956083] 
[   15.956154] Memory state around the buggy address:
[   15.956306]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.956522]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.956834] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.957158]                                      ^
[   15.957530]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.957829]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.958052] ==================================================================
[   16.228538] ==================================================================
[   16.228885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   16.229130] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.229585] 
[   16.229767] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.229833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.229846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.229894] Call Trace:
[   16.229910]  <TASK>
[   16.229925]  dump_stack_lvl+0x73/0xb0
[   16.229963]  print_report+0xd1/0x650
[   16.229985]  ? __virt_addr_valid+0x1db/0x2d0
[   16.230007]  ? kasan_atomics_helper+0x19e4/0x5450
[   16.230037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.230063]  ? kasan_atomics_helper+0x19e4/0x5450
[   16.230085]  kasan_report+0x140/0x180
[   16.230107]  ? kasan_atomics_helper+0x19e4/0x5450
[   16.230132]  kasan_check_range+0x10c/0x1c0
[   16.230156]  __kasan_check_write+0x18/0x20
[   16.230179]  kasan_atomics_helper+0x19e4/0x5450
[   16.230202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.230224]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.230249]  ? kasan_atomics+0x153/0x310
[   16.230275]  kasan_atomics+0x1dd/0x310
[   16.230297]  ? __pfx_kasan_atomics+0x10/0x10
[   16.230321]  ? __pfx_read_tsc+0x10/0x10
[   16.230342]  ? ktime_get_ts64+0x86/0x230
[   16.230368]  kunit_try_run_case+0x1a6/0x480
[   16.230391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230414]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.230441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.230475]  ? __kthread_parkme+0x82/0x160
[   16.230496]  ? preempt_count_sub+0x50/0x80
[   16.230532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.230556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.230582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.230609]  kthread+0x324/0x6e0
[   16.230631]  ? trace_preempt_on+0x20/0xc0
[   16.230654]  ? __pfx_kthread+0x10/0x10
[   16.230677]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.230700]  ? calculate_sigpending+0x7b/0xa0
[   16.230731]  ? __pfx_kthread+0x10/0x10
[   16.230754]  ret_from_fork+0x41/0x80
[   16.230773]  ? __pfx_kthread+0x10/0x10
[   16.230795]  ret_from_fork_asm+0x1a/0x30
[   16.230838]  </TASK>
[   16.230849] 
[   16.238360] Allocated by task 273:
[   16.238539]  kasan_save_stack+0x45/0x70
[   16.238732]  kasan_save_track+0x18/0x40
[   16.238918]  kasan_save_alloc_info+0x3b/0x50
[   16.239124]  __kasan_kmalloc+0xb7/0xc0
[   16.239252]  __kmalloc_cache_noprof+0x18a/0x420
[   16.239399]  kasan_atomics+0x96/0x310
[   16.239527]  kunit_try_run_case+0x1a6/0x480
[   16.239667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.239924]  kthread+0x324/0x6e0
[   16.240106]  ret_from_fork+0x41/0x80
[   16.240315]  ret_from_fork_asm+0x1a/0x30
[   16.240517] 
[   16.240621] The buggy address belongs to the object at ffff888101bf3e00
[   16.240621]  which belongs to the cache kmalloc-64 of size 64
[   16.241252] The buggy address is located 0 bytes to the right of
[   16.241252]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.241649] 
[   16.241770] The buggy address belongs to the physical page:
[   16.242028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.242306] flags: 0x200000000000000(node=0|zone=2)
[   16.242462] page_type: f5(slab)
[   16.242580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.242861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.243233] page dumped because: kasan: bad access detected
[   16.243491] 
[   16.243593] Memory state around the buggy address:
[   16.243967]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.244320]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.244656] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.244927]                                      ^
[   16.245088]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245394]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245803] ==================================================================
[   16.422878] ==================================================================
[   16.423678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   16.424450] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.425202] 
[   16.425433] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.425473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.425486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.425506] Call Trace:
[   16.425520]  <TASK>
[   16.425583]  dump_stack_lvl+0x73/0xb0
[   16.425610]  print_report+0xd1/0x650
[   16.425644]  ? __virt_addr_valid+0x1db/0x2d0
[   16.425667]  ? kasan_atomics_helper+0x1f44/0x5450
[   16.425689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.425716]  ? kasan_atomics_helper+0x1f44/0x5450
[   16.425743]  kasan_report+0x140/0x180
[   16.425766]  ? kasan_atomics_helper+0x1f44/0x5450
[   16.425792]  kasan_check_range+0x10c/0x1c0
[   16.425816]  __kasan_check_write+0x18/0x20
[   16.425839]  kasan_atomics_helper+0x1f44/0x5450
[   16.425862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.425885]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.425909]  ? kasan_atomics+0x153/0x310
[   16.425936]  kasan_atomics+0x1dd/0x310
[   16.425958]  ? __pfx_kasan_atomics+0x10/0x10
[   16.425982]  ? __pfx_read_tsc+0x10/0x10
[   16.426005]  ? ktime_get_ts64+0x86/0x230
[   16.426041]  kunit_try_run_case+0x1a6/0x480
[   16.426065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426088]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.426112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.426137]  ? __kthread_parkme+0x82/0x160
[   16.426160]  ? preempt_count_sub+0x50/0x80
[   16.426186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.426209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.426236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.426263]  kthread+0x324/0x6e0
[   16.426285]  ? trace_preempt_on+0x20/0xc0
[   16.426309]  ? __pfx_kthread+0x10/0x10
[   16.426333]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.426357]  ? calculate_sigpending+0x7b/0xa0
[   16.426379]  ? __pfx_kthread+0x10/0x10
[   16.426403]  ret_from_fork+0x41/0x80
[   16.426422]  ? __pfx_kthread+0x10/0x10
[   16.426446]  ret_from_fork_asm+0x1a/0x30
[   16.426478]  </TASK>
[   16.426488] 
[   16.439623] Allocated by task 273:
[   16.440048]  kasan_save_stack+0x45/0x70
[   16.440445]  kasan_save_track+0x18/0x40
[   16.440888]  kasan_save_alloc_info+0x3b/0x50
[   16.441322]  __kasan_kmalloc+0xb7/0xc0
[   16.441709]  __kmalloc_cache_noprof+0x18a/0x420
[   16.442229]  kasan_atomics+0x96/0x310
[   16.442683]  kunit_try_run_case+0x1a6/0x480
[   16.443194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.443379]  kthread+0x324/0x6e0
[   16.443503]  ret_from_fork+0x41/0x80
[   16.443837]  ret_from_fork_asm+0x1a/0x30
[   16.444251] 
[   16.444440] The buggy address belongs to the object at ffff888101bf3e00
[   16.444440]  which belongs to the cache kmalloc-64 of size 64
[   16.445803] The buggy address is located 0 bytes to the right of
[   16.445803]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.446184] 
[   16.446259] The buggy address belongs to the physical page:
[   16.446432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.446961] flags: 0x200000000000000(node=0|zone=2)
[   16.447437] page_type: f5(slab)
[   16.447788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.448512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.449207] page dumped because: kasan: bad access detected
[   16.449762] 
[   16.449922] Memory state around the buggy address:
[   16.450426]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.451086]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.451762] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.452034]                                      ^
[   16.452479]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.453110]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.453325] ==================================================================
[   15.467538] ==================================================================
[   15.468230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   15.468605] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.468942] 
[   15.469060] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.469100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.469112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.469133] Call Trace:
[   15.469147]  <TASK>
[   15.469162]  dump_stack_lvl+0x73/0xb0
[   15.469186]  print_report+0xd1/0x650
[   15.469208]  ? __virt_addr_valid+0x1db/0x2d0
[   15.469230]  ? kasan_atomics_helper+0x861/0x5450
[   15.469251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.469278]  ? kasan_atomics_helper+0x861/0x5450
[   15.469300]  kasan_report+0x140/0x180
[   15.469322]  ? kasan_atomics_helper+0x861/0x5450
[   15.469348]  kasan_check_range+0x10c/0x1c0
[   15.469372]  __kasan_check_write+0x18/0x20
[   15.469397]  kasan_atomics_helper+0x861/0x5450
[   15.469420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.469444]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.469470]  ? kasan_atomics+0x153/0x310
[   15.469496]  kasan_atomics+0x1dd/0x310
[   15.469519]  ? __pfx_kasan_atomics+0x10/0x10
[   15.469576]  ? __pfx_read_tsc+0x10/0x10
[   15.469600]  ? ktime_get_ts64+0x86/0x230
[   15.469625]  kunit_try_run_case+0x1a6/0x480
[   15.469649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469671]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.469697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.469721]  ? __kthread_parkme+0x82/0x160
[   15.469750]  ? preempt_count_sub+0x50/0x80
[   15.469775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.469798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.469825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.469853]  kthread+0x324/0x6e0
[   15.469875]  ? trace_preempt_on+0x20/0xc0
[   15.469899]  ? __pfx_kthread+0x10/0x10
[   15.469922]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.469945]  ? calculate_sigpending+0x7b/0xa0
[   15.469967]  ? __pfx_kthread+0x10/0x10
[   15.469991]  ret_from_fork+0x41/0x80
[   15.470011]  ? __pfx_kthread+0x10/0x10
[   15.470043]  ret_from_fork_asm+0x1a/0x30
[   15.470075]  </TASK>
[   15.470086] 
[   15.478497] Allocated by task 273:
[   15.478659]  kasan_save_stack+0x45/0x70
[   15.478807]  kasan_save_track+0x18/0x40
[   15.478943]  kasan_save_alloc_info+0x3b/0x50
[   15.479244]  __kasan_kmalloc+0xb7/0xc0
[   15.479505]  __kmalloc_cache_noprof+0x18a/0x420
[   15.479728]  kasan_atomics+0x96/0x310
[   15.479864]  kunit_try_run_case+0x1a6/0x480
[   15.480056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480316]  kthread+0x324/0x6e0
[   15.480489]  ret_from_fork+0x41/0x80
[   15.481111]  ret_from_fork_asm+0x1a/0x30
[   15.481730] 
[   15.481844] The buggy address belongs to the object at ffff888101bf3e00
[   15.481844]  which belongs to the cache kmalloc-64 of size 64
[   15.483330] The buggy address is located 0 bytes to the right of
[   15.483330]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.484413] 
[   15.484519] The buggy address belongs to the physical page:
[   15.487303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.487811] flags: 0x200000000000000(node=0|zone=2)
[   15.488165] page_type: f5(slab)
[   15.488342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.488671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.488986] page dumped because: kasan: bad access detected
[   15.489279] 
[   15.489356] Memory state around the buggy address:
[   15.489702]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.490034]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.490340] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.490755]                                      ^
[   15.490985]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.491318]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.491597] ==================================================================
[   16.336818] ==================================================================
[   16.337231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   16.337892] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.338132] 
[   16.338215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.338254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.338268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.338289] Call Trace:
[   16.338304]  <TASK>
[   16.338319]  dump_stack_lvl+0x73/0xb0
[   16.338346]  print_report+0xd1/0x650
[   16.338368]  ? __virt_addr_valid+0x1db/0x2d0
[   16.338391]  ? kasan_atomics_helper+0x1ce2/0x5450
[   16.338413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.338440]  ? kasan_atomics_helper+0x1ce2/0x5450
[   16.338461]  kasan_report+0x140/0x180
[   16.338484]  ? kasan_atomics_helper+0x1ce2/0x5450
[   16.338510]  kasan_check_range+0x10c/0x1c0
[   16.338534]  __kasan_check_write+0x18/0x20
[   16.338588]  kasan_atomics_helper+0x1ce2/0x5450
[   16.338614]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.338636]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.338672]  ? kasan_atomics+0x153/0x310
[   16.338698]  kasan_atomics+0x1dd/0x310
[   16.338721]  ? __pfx_kasan_atomics+0x10/0x10
[   16.338757]  ? __pfx_read_tsc+0x10/0x10
[   16.338779]  ? ktime_get_ts64+0x86/0x230
[   16.338805]  kunit_try_run_case+0x1a6/0x480
[   16.338838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.338861]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.338888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.338923]  ? __kthread_parkme+0x82/0x160
[   16.338946]  ? preempt_count_sub+0x50/0x80
[   16.338972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.339045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.339072]  kthread+0x324/0x6e0
[   16.339094]  ? trace_preempt_on+0x20/0xc0
[   16.339118]  ? __pfx_kthread+0x10/0x10
[   16.339142]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.339165]  ? calculate_sigpending+0x7b/0xa0
[   16.339187]  ? __pfx_kthread+0x10/0x10
[   16.339210]  ret_from_fork+0x41/0x80
[   16.339229]  ? __pfx_kthread+0x10/0x10
[   16.339252]  ret_from_fork_asm+0x1a/0x30
[   16.339285]  </TASK>
[   16.339295] 
[   16.351906] Allocated by task 273:
[   16.352258]  kasan_save_stack+0x45/0x70
[   16.352630]  kasan_save_track+0x18/0x40
[   16.352983]  kasan_save_alloc_info+0x3b/0x50
[   16.353380]  __kasan_kmalloc+0xb7/0xc0
[   16.353769]  __kmalloc_cache_noprof+0x18a/0x420
[   16.354189]  kasan_atomics+0x96/0x310
[   16.354534]  kunit_try_run_case+0x1a6/0x480
[   16.354928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.355158]  kthread+0x324/0x6e0
[   16.355282]  ret_from_fork+0x41/0x80
[   16.355410]  ret_from_fork_asm+0x1a/0x30
[   16.355552] 
[   16.355631] The buggy address belongs to the object at ffff888101bf3e00
[   16.355631]  which belongs to the cache kmalloc-64 of size 64
[   16.356108] The buggy address is located 0 bytes to the right of
[   16.356108]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.356543] 
[   16.356639] The buggy address belongs to the physical page:
[   16.356944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.357239] flags: 0x200000000000000(node=0|zone=2)
[   16.357475] page_type: f5(slab)
[   16.357684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.357989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.358272] page dumped because: kasan: bad access detected
[   16.358458] 
[   16.358552] Memory state around the buggy address:
[   16.358777]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359071]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359324] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.359638]                                      ^
[   16.359857]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360158]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360420] ==================================================================
[   15.570584] ==================================================================
[   15.570825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   15.571212] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.571546] 
[   15.571646] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.571684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.571697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.571719] Call Trace:
[   15.571731]  <TASK>
[   15.571746]  dump_stack_lvl+0x73/0xb0
[   15.571770]  print_report+0xd1/0x650
[   15.571792]  ? __virt_addr_valid+0x1db/0x2d0
[   15.571814]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.571835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.571861]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.571883]  kasan_report+0x140/0x180
[   15.571906]  ? kasan_atomics_helper+0xb6b/0x5450
[   15.571932]  kasan_check_range+0x10c/0x1c0
[   15.571956]  __kasan_check_write+0x18/0x20
[   15.571980]  kasan_atomics_helper+0xb6b/0x5450
[   15.572002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.572055]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.572079]  ? kasan_atomics+0x153/0x310
[   15.572106]  kasan_atomics+0x1dd/0x310
[   15.572129]  ? __pfx_kasan_atomics+0x10/0x10
[   15.572154]  ? __pfx_read_tsc+0x10/0x10
[   15.572176]  ? ktime_get_ts64+0x86/0x230
[   15.572202]  kunit_try_run_case+0x1a6/0x480
[   15.572226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.572273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.572298]  ? __kthread_parkme+0x82/0x160
[   15.572321]  ? preempt_count_sub+0x50/0x80
[   15.572347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.572427]  kthread+0x324/0x6e0
[   15.572448]  ? trace_preempt_on+0x20/0xc0
[   15.572471]  ? __pfx_kthread+0x10/0x10
[   15.572495]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.572517]  ? calculate_sigpending+0x7b/0xa0
[   15.572540]  ? __pfx_kthread+0x10/0x10
[   15.572563]  ret_from_fork+0x41/0x80
[   15.572582]  ? __pfx_kthread+0x10/0x10
[   15.572606]  ret_from_fork_asm+0x1a/0x30
[   15.572638]  </TASK>
[   15.572649] 
[   15.583317] Allocated by task 273:
[   15.583488]  kasan_save_stack+0x45/0x70
[   15.584041]  kasan_save_track+0x18/0x40
[   15.584267]  kasan_save_alloc_info+0x3b/0x50
[   15.584639]  __kasan_kmalloc+0xb7/0xc0
[   15.584961]  __kmalloc_cache_noprof+0x18a/0x420
[   15.585350]  kasan_atomics+0x96/0x310
[   15.585692]  kunit_try_run_case+0x1a6/0x480
[   15.586031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.586279]  kthread+0x324/0x6e0
[   15.586447]  ret_from_fork+0x41/0x80
[   15.586835]  ret_from_fork_asm+0x1a/0x30
[   15.587174] 
[   15.587401] The buggy address belongs to the object at ffff888101bf3e00
[   15.587401]  which belongs to the cache kmalloc-64 of size 64
[   15.588296] The buggy address is located 0 bytes to the right of
[   15.588296]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.589168] 
[   15.589275] The buggy address belongs to the physical page:
[   15.589489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.590055] flags: 0x200000000000000(node=0|zone=2)
[   15.590415] page_type: f5(slab)
[   15.590732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.591115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.591439] page dumped because: kasan: bad access detected
[   15.592058] 
[   15.592147] Memory state around the buggy address:
[   15.592558]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.593037]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.593529] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.594128]                                      ^
[   15.594352]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.594833]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.595327] ==================================================================
[   15.883317] ==================================================================
[   15.883816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   15.884103] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.884414] 
[   15.884518] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.884558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.884624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.884645] Call Trace:
[   15.884661]  <TASK>
[   15.884677]  dump_stack_lvl+0x73/0xb0
[   15.884702]  print_report+0xd1/0x650
[   15.884724]  ? __virt_addr_valid+0x1db/0x2d0
[   15.884746]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.884768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.884795]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.884817]  kasan_report+0x140/0x180
[   15.884839]  ? kasan_atomics_helper+0x49ea/0x5450
[   15.884866]  __asan_report_load4_noabort+0x18/0x20
[   15.884892]  kasan_atomics_helper+0x49ea/0x5450
[   15.884915]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.884937]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.884962]  ? kasan_atomics+0x153/0x310
[   15.884989]  kasan_atomics+0x1dd/0x310
[   15.885012]  ? __pfx_kasan_atomics+0x10/0x10
[   15.885047]  ? __pfx_read_tsc+0x10/0x10
[   15.885069]  ? ktime_get_ts64+0x86/0x230
[   15.885095]  kunit_try_run_case+0x1a6/0x480
[   15.885119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.885141]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.885165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.885190]  ? __kthread_parkme+0x82/0x160
[   15.885213]  ? preempt_count_sub+0x50/0x80
[   15.885239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.885262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.885288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.885315]  kthread+0x324/0x6e0
[   15.885337]  ? trace_preempt_on+0x20/0xc0
[   15.885361]  ? __pfx_kthread+0x10/0x10
[   15.885384]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.885408]  ? calculate_sigpending+0x7b/0xa0
[   15.885430]  ? __pfx_kthread+0x10/0x10
[   15.885453]  ret_from_fork+0x41/0x80
[   15.885473]  ? __pfx_kthread+0x10/0x10
[   15.885495]  ret_from_fork_asm+0x1a/0x30
[   15.885527]  </TASK>
[   15.885538] 
[   15.893237] Allocated by task 273:
[   15.893369]  kasan_save_stack+0x45/0x70
[   15.893513]  kasan_save_track+0x18/0x40
[   15.893647]  kasan_save_alloc_info+0x3b/0x50
[   15.893801]  __kasan_kmalloc+0xb7/0xc0
[   15.894161]  __kmalloc_cache_noprof+0x18a/0x420
[   15.894408]  kasan_atomics+0x96/0x310
[   15.894631]  kunit_try_run_case+0x1a6/0x480
[   15.894844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.895116]  kthread+0x324/0x6e0
[   15.895289]  ret_from_fork+0x41/0x80
[   15.895474]  ret_from_fork_asm+0x1a/0x30
[   15.895873] 
[   15.895975] The buggy address belongs to the object at ffff888101bf3e00
[   15.895975]  which belongs to the cache kmalloc-64 of size 64
[   15.896458] The buggy address is located 0 bytes to the right of
[   15.896458]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.896959] 
[   15.897051] The buggy address belongs to the physical page:
[   15.897307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.897877] flags: 0x200000000000000(node=0|zone=2)
[   15.898110] page_type: f5(slab)
[   15.898258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.898527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.899154] page dumped because: kasan: bad access detected
[   15.899359] 
[   15.899431] Memory state around the buggy address:
[   15.899585]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.899799]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.900184] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.900504]                                      ^
[   15.900733]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.901062]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.901293] ==================================================================
[   16.544296] ==================================================================
[   16.544636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   16.544985] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.545374] 
[   16.545458] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.545495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.545508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.545529] Call Trace:
[   16.545544]  <TASK>
[   16.545560]  dump_stack_lvl+0x73/0xb0
[   16.545583]  print_report+0xd1/0x650
[   16.545605]  ? __virt_addr_valid+0x1db/0x2d0
[   16.545627]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.545648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.545699]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.545721]  kasan_report+0x140/0x180
[   16.545749]  ? kasan_atomics_helper+0x4fb4/0x5450
[   16.545793]  __asan_report_load8_noabort+0x18/0x20
[   16.545817]  kasan_atomics_helper+0x4fb4/0x5450
[   16.545841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.545863]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.545887]  ? kasan_atomics+0x153/0x310
[   16.545913]  kasan_atomics+0x1dd/0x310
[   16.545935]  ? __pfx_kasan_atomics+0x10/0x10
[   16.545959]  ? __pfx_read_tsc+0x10/0x10
[   16.545999]  ? ktime_get_ts64+0x86/0x230
[   16.546034]  kunit_try_run_case+0x1a6/0x480
[   16.546058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.546097]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.546121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.546146]  ? __kthread_parkme+0x82/0x160
[   16.546168]  ? preempt_count_sub+0x50/0x80
[   16.546193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.546217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.546243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.546271]  kthread+0x324/0x6e0
[   16.546308]  ? trace_preempt_on+0x20/0xc0
[   16.546346]  ? __pfx_kthread+0x10/0x10
[   16.546383]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.546419]  ? calculate_sigpending+0x7b/0xa0
[   16.546442]  ? __pfx_kthread+0x10/0x10
[   16.546465]  ret_from_fork+0x41/0x80
[   16.546484]  ? __pfx_kthread+0x10/0x10
[   16.546507]  ret_from_fork_asm+0x1a/0x30
[   16.546539]  </TASK>
[   16.546550] 
[   16.554481] Allocated by task 273:
[   16.554733]  kasan_save_stack+0x45/0x70
[   16.554951]  kasan_save_track+0x18/0x40
[   16.555136]  kasan_save_alloc_info+0x3b/0x50
[   16.555350]  __kasan_kmalloc+0xb7/0xc0
[   16.555552]  __kmalloc_cache_noprof+0x18a/0x420
[   16.555711]  kasan_atomics+0x96/0x310
[   16.555913]  kunit_try_run_case+0x1a6/0x480
[   16.556120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.556372]  kthread+0x324/0x6e0
[   16.556560]  ret_from_fork+0x41/0x80
[   16.556786]  ret_from_fork_asm+0x1a/0x30
[   16.556951] 
[   16.557033] The buggy address belongs to the object at ffff888101bf3e00
[   16.557033]  which belongs to the cache kmalloc-64 of size 64
[   16.557543] The buggy address is located 0 bytes to the right of
[   16.557543]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.558004] 
[   16.558085] The buggy address belongs to the physical page:
[   16.558255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.558492] flags: 0x200000000000000(node=0|zone=2)
[   16.558833] page_type: f5(slab)
[   16.559119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.559461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.559809] page dumped because: kasan: bad access detected
[   16.560049] 
[   16.560162] Memory state around the buggy address:
[   16.560397]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.560739]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.560997] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.561210]                                      ^
[   16.561358]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561563]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561906] ==================================================================
[   16.167607] ==================================================================
[   16.168297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   16.169010] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.169748] 
[   16.169918] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.169967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.169979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.170000] Call Trace:
[   16.170035]  <TASK>
[   16.170052]  dump_stack_lvl+0x73/0xb0
[   16.170079]  print_report+0xd1/0x650
[   16.170100]  ? __virt_addr_valid+0x1db/0x2d0
[   16.170124]  ? kasan_atomics_helper+0x1819/0x5450
[   16.170154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.170181]  ? kasan_atomics_helper+0x1819/0x5450
[   16.170203]  kasan_report+0x140/0x180
[   16.170236]  ? kasan_atomics_helper+0x1819/0x5450
[   16.170262]  kasan_check_range+0x10c/0x1c0
[   16.170285]  __kasan_check_write+0x18/0x20
[   16.170308]  kasan_atomics_helper+0x1819/0x5450
[   16.170331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.170353]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.170377]  ? kasan_atomics+0x153/0x310
[   16.170403]  kasan_atomics+0x1dd/0x310
[   16.170425]  ? __pfx_kasan_atomics+0x10/0x10
[   16.170449]  ? __pfx_read_tsc+0x10/0x10
[   16.170471]  ? ktime_get_ts64+0x86/0x230
[   16.170496]  kunit_try_run_case+0x1a6/0x480
[   16.170519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.170541]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.170567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.170591]  ? __kthread_parkme+0x82/0x160
[   16.170614]  ? preempt_count_sub+0x50/0x80
[   16.170640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.170664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.170690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.170718]  kthread+0x324/0x6e0
[   16.170739]  ? trace_preempt_on+0x20/0xc0
[   16.170763]  ? __pfx_kthread+0x10/0x10
[   16.170786]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.170809]  ? calculate_sigpending+0x7b/0xa0
[   16.170831]  ? __pfx_kthread+0x10/0x10
[   16.170855]  ret_from_fork+0x41/0x80
[   16.170874]  ? __pfx_kthread+0x10/0x10
[   16.170897]  ret_from_fork_asm+0x1a/0x30
[   16.170929]  </TASK>
[   16.170940] 
[   16.178840] Allocated by task 273:
[   16.179041]  kasan_save_stack+0x45/0x70
[   16.179207]  kasan_save_track+0x18/0x40
[   16.179417]  kasan_save_alloc_info+0x3b/0x50
[   16.179624]  __kasan_kmalloc+0xb7/0xc0
[   16.179894]  __kmalloc_cache_noprof+0x18a/0x420
[   16.180078]  kasan_atomics+0x96/0x310
[   16.180221]  kunit_try_run_case+0x1a6/0x480
[   16.180451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.180730]  kthread+0x324/0x6e0
[   16.180976]  ret_from_fork+0x41/0x80
[   16.181168]  ret_from_fork_asm+0x1a/0x30
[   16.181326] 
[   16.181400] The buggy address belongs to the object at ffff888101bf3e00
[   16.181400]  which belongs to the cache kmalloc-64 of size 64
[   16.182069] The buggy address is located 0 bytes to the right of
[   16.182069]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.182606] 
[   16.182711] The buggy address belongs to the physical page:
[   16.182949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.183307] flags: 0x200000000000000(node=0|zone=2)
[   16.183535] page_type: f5(slab)
[   16.183745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.184062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.184388] page dumped because: kasan: bad access detected
[   16.184676] 
[   16.184757] Memory state around the buggy address:
[   16.184971]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.185195]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.185409] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.185619]                                      ^
[   16.185872]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186201]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.186514] ==================================================================
[   16.498626] ==================================================================
[   16.498979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   16.499326] Read of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.499855] 
[   16.499969] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.500008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.500032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.500063] Call Trace:
[   16.500078]  <TASK>
[   16.500093]  dump_stack_lvl+0x73/0xb0
[   16.500130]  print_report+0xd1/0x650
[   16.500151]  ? __virt_addr_valid+0x1db/0x2d0
[   16.500174]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.500195]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.500222]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.500244]  kasan_report+0x140/0x180
[   16.500266]  ? kasan_atomics_helper+0x4f9a/0x5450
[   16.500292]  __asan_report_load8_noabort+0x18/0x20
[   16.500325]  kasan_atomics_helper+0x4f9a/0x5450
[   16.500349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.500371]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.500407]  ? kasan_atomics+0x153/0x310
[   16.500434]  kasan_atomics+0x1dd/0x310
[   16.500457]  ? __pfx_kasan_atomics+0x10/0x10
[   16.500482]  ? __pfx_read_tsc+0x10/0x10
[   16.500504]  ? ktime_get_ts64+0x86/0x230
[   16.500529]  kunit_try_run_case+0x1a6/0x480
[   16.500553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.500576]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.500610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.500634]  ? __kthread_parkme+0x82/0x160
[   16.500658]  ? preempt_count_sub+0x50/0x80
[   16.500694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.500717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.500745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.500772]  kthread+0x324/0x6e0
[   16.500797]  ? trace_preempt_on+0x20/0xc0
[   16.500821]  ? __pfx_kthread+0x10/0x10
[   16.500853]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.500877]  ? calculate_sigpending+0x7b/0xa0
[   16.500900]  ? __pfx_kthread+0x10/0x10
[   16.500934]  ret_from_fork+0x41/0x80
[   16.500953]  ? __pfx_kthread+0x10/0x10
[   16.500976]  ret_from_fork_asm+0x1a/0x30
[   16.501026]  </TASK>
[   16.501037] 
[   16.508535] Allocated by task 273:
[   16.508787]  kasan_save_stack+0x45/0x70
[   16.508960]  kasan_save_track+0x18/0x40
[   16.509201]  kasan_save_alloc_info+0x3b/0x50
[   16.509391]  __kasan_kmalloc+0xb7/0xc0
[   16.509604]  __kmalloc_cache_noprof+0x18a/0x420
[   16.509823]  kasan_atomics+0x96/0x310
[   16.510005]  kunit_try_run_case+0x1a6/0x480
[   16.510231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.510471]  kthread+0x324/0x6e0
[   16.510672]  ret_from_fork+0x41/0x80
[   16.510871]  ret_from_fork_asm+0x1a/0x30
[   16.511084] 
[   16.511184] The buggy address belongs to the object at ffff888101bf3e00
[   16.511184]  which belongs to the cache kmalloc-64 of size 64
[   16.511705] The buggy address is located 0 bytes to the right of
[   16.511705]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.512242] 
[   16.512343] The buggy address belongs to the physical page:
[   16.512626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.512871] flags: 0x200000000000000(node=0|zone=2)
[   16.513044] page_type: f5(slab)
[   16.513163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.513432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.513794] page dumped because: kasan: bad access detected
[   16.514110] 
[   16.514223] Memory state around the buggy address:
[   16.514500]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.514898]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.515154] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.515404]                                      ^
[   16.515664]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.516021]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.516365] ==================================================================
[   15.551750] ==================================================================
[   15.552335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   15.553065] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.553333] 
[   15.553442] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.553482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.553496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.553517] Call Trace:
[   15.553529]  <TASK>
[   15.553546]  dump_stack_lvl+0x73/0xb0
[   15.553571]  print_report+0xd1/0x650
[   15.553594]  ? __virt_addr_valid+0x1db/0x2d0
[   15.553616]  ? kasan_atomics_helper+0xac8/0x5450
[   15.553638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.553664]  ? kasan_atomics_helper+0xac8/0x5450
[   15.553686]  kasan_report+0x140/0x180
[   15.553709]  ? kasan_atomics_helper+0xac8/0x5450
[   15.553741]  kasan_check_range+0x10c/0x1c0
[   15.553765]  __kasan_check_write+0x18/0x20
[   15.553788]  kasan_atomics_helper+0xac8/0x5450
[   15.553811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.553833]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.553859]  ? kasan_atomics+0x153/0x310
[   15.553886]  kasan_atomics+0x1dd/0x310
[   15.553909]  ? __pfx_kasan_atomics+0x10/0x10
[   15.553933]  ? __pfx_read_tsc+0x10/0x10
[   15.553956]  ? ktime_get_ts64+0x86/0x230
[   15.553981]  kunit_try_run_case+0x1a6/0x480
[   15.554005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.554037]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.554061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.554086]  ? __kthread_parkme+0x82/0x160
[   15.554109]  ? preempt_count_sub+0x50/0x80
[   15.554134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.554158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.554184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.554212]  kthread+0x324/0x6e0
[   15.554234]  ? trace_preempt_on+0x20/0xc0
[   15.554258]  ? __pfx_kthread+0x10/0x10
[   15.554281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.554304]  ? calculate_sigpending+0x7b/0xa0
[   15.554326]  ? __pfx_kthread+0x10/0x10
[   15.554350]  ret_from_fork+0x41/0x80
[   15.554369]  ? __pfx_kthread+0x10/0x10
[   15.554393]  ret_from_fork_asm+0x1a/0x30
[   15.554424]  </TASK>
[   15.554434] 
[   15.562273] Allocated by task 273:
[   15.562456]  kasan_save_stack+0x45/0x70
[   15.562688]  kasan_save_track+0x18/0x40
[   15.562822]  kasan_save_alloc_info+0x3b/0x50
[   15.562970]  __kasan_kmalloc+0xb7/0xc0
[   15.563233]  __kmalloc_cache_noprof+0x18a/0x420
[   15.563477]  kasan_atomics+0x96/0x310
[   15.563663]  kunit_try_run_case+0x1a6/0x480
[   15.563829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.564007]  kthread+0x324/0x6e0
[   15.564137]  ret_from_fork+0x41/0x80
[   15.564477]  ret_from_fork_asm+0x1a/0x30
[   15.564849] 
[   15.565035] The buggy address belongs to the object at ffff888101bf3e00
[   15.565035]  which belongs to the cache kmalloc-64 of size 64
[   15.565504] The buggy address is located 0 bytes to the right of
[   15.565504]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.566035] 
[   15.566109] The buggy address belongs to the physical page:
[   15.566281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.566518] flags: 0x200000000000000(node=0|zone=2)
[   15.566678] page_type: f5(slab)
[   15.566798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.567240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.567570] page dumped because: kasan: bad access detected
[   15.567793] 
[   15.567916] Memory state around the buggy address:
[   15.568188]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.568406]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.568816] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.569244]                                      ^
[   15.569482]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569778]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570171] ==================================================================
[   15.982424] ==================================================================
[   15.983075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   15.983536] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.984095] 
[   15.984212] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.984256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.984270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.984292] Call Trace:
[   15.984308]  <TASK>
[   15.984325]  dump_stack_lvl+0x73/0xb0
[   15.984350]  print_report+0xd1/0x650
[   15.984372]  ? __virt_addr_valid+0x1db/0x2d0
[   15.984394]  ? kasan_atomics_helper+0x1468/0x5450
[   15.984415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.984441]  ? kasan_atomics_helper+0x1468/0x5450
[   15.984462]  kasan_report+0x140/0x180
[   15.984484]  ? kasan_atomics_helper+0x1468/0x5450
[   15.984511]  kasan_check_range+0x10c/0x1c0
[   15.984534]  __kasan_check_write+0x18/0x20
[   15.984557]  kasan_atomics_helper+0x1468/0x5450
[   15.984580]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.984601]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.984625]  ? kasan_atomics+0x153/0x310
[   15.984651]  kasan_atomics+0x1dd/0x310
[   15.984674]  ? __pfx_kasan_atomics+0x10/0x10
[   15.984697]  ? __pfx_read_tsc+0x10/0x10
[   15.984719]  ? ktime_get_ts64+0x86/0x230
[   15.984744]  kunit_try_run_case+0x1a6/0x480
[   15.984767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.984789]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.984814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.984837]  ? __kthread_parkme+0x82/0x160
[   15.984859]  ? preempt_count_sub+0x50/0x80
[   15.984884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.984907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.984934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.984961]  kthread+0x324/0x6e0
[   15.984984]  ? trace_preempt_on+0x20/0xc0
[   15.985008]  ? __pfx_kthread+0x10/0x10
[   15.985040]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.985063]  ? calculate_sigpending+0x7b/0xa0
[   15.985086]  ? __pfx_kthread+0x10/0x10
[   15.985110]  ret_from_fork+0x41/0x80
[   15.985129]  ? __pfx_kthread+0x10/0x10
[   15.985152]  ret_from_fork_asm+0x1a/0x30
[   15.985183]  </TASK>
[   15.985195] 
[   15.995414] Allocated by task 273:
[   15.995655]  kasan_save_stack+0x45/0x70
[   15.995859]  kasan_save_track+0x18/0x40
[   15.996067]  kasan_save_alloc_info+0x3b/0x50
[   15.996473]  __kasan_kmalloc+0xb7/0xc0
[   15.997297]  __kmalloc_cache_noprof+0x18a/0x420
[   15.997473]  kasan_atomics+0x96/0x310
[   15.997609]  kunit_try_run_case+0x1a6/0x480
[   15.997763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.997941]  kthread+0x324/0x6e0
[   15.998629]  ret_from_fork+0x41/0x80
[   15.999427]  ret_from_fork_asm+0x1a/0x30
[   16.000004] 
[   16.000197] The buggy address belongs to the object at ffff888101bf3e00
[   16.000197]  which belongs to the cache kmalloc-64 of size 64
[   16.002406] The buggy address is located 0 bytes to the right of
[   16.002406]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.003361] 
[   16.003446] The buggy address belongs to the physical page:
[   16.004090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.004984] flags: 0x200000000000000(node=0|zone=2)
[   16.005684] page_type: f5(slab)
[   16.006133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.006374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.006980] page dumped because: kasan: bad access detected
[   16.007713] 
[   16.008025] Memory state around the buggy address:
[   16.008616]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.009480]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.010158] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.011132]                                      ^
[   16.011462]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.012247]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.013288] ==================================================================
[   16.267187] ==================================================================
[   16.268506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   16.269300] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.269813] 
[   16.269939] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.269983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.270059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.270082] Call Trace:
[   16.270110]  <TASK>
[   16.270129]  dump_stack_lvl+0x73/0xb0
[   16.270156]  print_report+0xd1/0x650
[   16.270178]  ? __virt_addr_valid+0x1db/0x2d0
[   16.270240]  ? kasan_atomics_helper+0x1b23/0x5450
[   16.270263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.270289]  ? kasan_atomics_helper+0x1b23/0x5450
[   16.270311]  kasan_report+0x140/0x180
[   16.270334]  ? kasan_atomics_helper+0x1b23/0x5450
[   16.270360]  kasan_check_range+0x10c/0x1c0
[   16.270384]  __kasan_check_write+0x18/0x20
[   16.270407]  kasan_atomics_helper+0x1b23/0x5450
[   16.270430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.270452]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.270477]  ? kasan_atomics+0x153/0x310
[   16.270503]  kasan_atomics+0x1dd/0x310
[   16.270525]  ? __pfx_kasan_atomics+0x10/0x10
[   16.270556]  ? __pfx_read_tsc+0x10/0x10
[   16.270580]  ? ktime_get_ts64+0x86/0x230
[   16.270605]  kunit_try_run_case+0x1a6/0x480
[   16.270628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.270650]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.270674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.270699]  ? __kthread_parkme+0x82/0x160
[   16.270721]  ? preempt_count_sub+0x50/0x80
[   16.270747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.270771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.270797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.270825]  kthread+0x324/0x6e0
[   16.270847]  ? trace_preempt_on+0x20/0xc0
[   16.270869]  ? __pfx_kthread+0x10/0x10
[   16.270892]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.270914]  ? calculate_sigpending+0x7b/0xa0
[   16.270937]  ? __pfx_kthread+0x10/0x10
[   16.270960]  ret_from_fork+0x41/0x80
[   16.270979]  ? __pfx_kthread+0x10/0x10
[   16.271002]  ret_from_fork_asm+0x1a/0x30
[   16.271043]  </TASK>
[   16.271054] 
[   16.280416] Allocated by task 273:
[   16.280623]  kasan_save_stack+0x45/0x70
[   16.280782]  kasan_save_track+0x18/0x40
[   16.280919]  kasan_save_alloc_info+0x3b/0x50
[   16.281080]  __kasan_kmalloc+0xb7/0xc0
[   16.281269]  __kmalloc_cache_noprof+0x18a/0x420
[   16.281492]  kasan_atomics+0x96/0x310
[   16.281675]  kunit_try_run_case+0x1a6/0x480
[   16.281883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.282156]  kthread+0x324/0x6e0
[   16.282293]  ret_from_fork+0x41/0x80
[   16.282498]  ret_from_fork_asm+0x1a/0x30
[   16.282662] 
[   16.282763] The buggy address belongs to the object at ffff888101bf3e00
[   16.282763]  which belongs to the cache kmalloc-64 of size 64
[   16.283220] The buggy address is located 0 bytes to the right of
[   16.283220]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.283879] 
[   16.284003] The buggy address belongs to the physical page:
[   16.284270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.284571] flags: 0x200000000000000(node=0|zone=2)
[   16.284843] page_type: f5(slab)
[   16.285042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.285281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.285683] page dumped because: kasan: bad access detected
[   16.285912] 
[   16.285984] Memory state around the buggy address:
[   16.286152]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.286447]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.286893] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.287177]                                      ^
[   16.287380]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.287705]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.288011] ==================================================================
[   15.920222] ==================================================================
[   15.920566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   15.921179] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.921511] 
[   15.921737] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.921779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.921792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.921812] Call Trace:
[   15.921826]  <TASK>
[   15.921841]  dump_stack_lvl+0x73/0xb0
[   15.921866]  print_report+0xd1/0x650
[   15.921888]  ? __virt_addr_valid+0x1db/0x2d0
[   15.921910]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.921932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.921958]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.921981]  kasan_report+0x140/0x180
[   15.922004]  ? kasan_atomics_helper+0x49d0/0x5450
[   15.922042]  __asan_report_load4_noabort+0x18/0x20
[   15.922067]  kasan_atomics_helper+0x49d0/0x5450
[   15.922090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.922113]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.922137]  ? kasan_atomics+0x153/0x310
[   15.922164]  kasan_atomics+0x1dd/0x310
[   15.922186]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922210]  ? __pfx_read_tsc+0x10/0x10
[   15.922232]  ? ktime_get_ts64+0x86/0x230
[   15.922258]  kunit_try_run_case+0x1a6/0x480
[   15.922282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.922329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.922354]  ? __kthread_parkme+0x82/0x160
[   15.922377]  ? preempt_count_sub+0x50/0x80
[   15.922403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.922452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.922480]  kthread+0x324/0x6e0
[   15.922502]  ? trace_preempt_on+0x20/0xc0
[   15.922526]  ? __pfx_kthread+0x10/0x10
[   15.922548]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.922613]  ? calculate_sigpending+0x7b/0xa0
[   15.922637]  ? __pfx_kthread+0x10/0x10
[   15.922661]  ret_from_fork+0x41/0x80
[   15.922680]  ? __pfx_kthread+0x10/0x10
[   15.922703]  ret_from_fork_asm+0x1a/0x30
[   15.922734]  </TASK>
[   15.922745] 
[   15.930685] Allocated by task 273:
[   15.930824]  kasan_save_stack+0x45/0x70
[   15.930966]  kasan_save_track+0x18/0x40
[   15.931113]  kasan_save_alloc_info+0x3b/0x50
[   15.931261]  __kasan_kmalloc+0xb7/0xc0
[   15.931396]  __kmalloc_cache_noprof+0x18a/0x420
[   15.931662]  kasan_atomics+0x96/0x310
[   15.931848]  kunit_try_run_case+0x1a6/0x480
[   15.932319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.932674]  kthread+0x324/0x6e0
[   15.932852]  ret_from_fork+0x41/0x80
[   15.933043]  ret_from_fork_asm+0x1a/0x30
[   15.933214] 
[   15.933314] The buggy address belongs to the object at ffff888101bf3e00
[   15.933314]  which belongs to the cache kmalloc-64 of size 64
[   15.933946] The buggy address is located 0 bytes to the right of
[   15.933946]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.934438] 
[   15.934542] The buggy address belongs to the physical page:
[   15.934821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.935136] flags: 0x200000000000000(node=0|zone=2)
[   15.935333] page_type: f5(slab)
[   15.935455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.935683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.936077] page dumped because: kasan: bad access detected
[   15.936316] 
[   15.936409] Memory state around the buggy address:
[   15.937483]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.937806]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.938033] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.938982]                                      ^
[   15.939309]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939926]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.940258] ==================================================================
[   15.596392] ==================================================================
[   15.597051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   15.597341] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.597866] 
[   15.598225] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.598271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.598285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.598307] Call Trace:
[   15.598323]  <TASK>
[   15.598378]  dump_stack_lvl+0x73/0xb0
[   15.598408]  print_report+0xd1/0x650
[   15.598430]  ? __virt_addr_valid+0x1db/0x2d0
[   15.598454]  ? kasan_atomics_helper+0xc71/0x5450
[   15.598477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.598506]  ? kasan_atomics_helper+0xc71/0x5450
[   15.598528]  kasan_report+0x140/0x180
[   15.598550]  ? kasan_atomics_helper+0xc71/0x5450
[   15.598578]  kasan_check_range+0x10c/0x1c0
[   15.598603]  __kasan_check_write+0x18/0x20
[   15.598626]  kasan_atomics_helper+0xc71/0x5450
[   15.598651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.598675]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.598699]  ? kasan_atomics+0x153/0x310
[   15.598727]  kasan_atomics+0x1dd/0x310
[   15.598751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.598775]  ? __pfx_read_tsc+0x10/0x10
[   15.598798]  ? ktime_get_ts64+0x86/0x230
[   15.598824]  kunit_try_run_case+0x1a6/0x480
[   15.598847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.598870]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.598894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.598918]  ? __kthread_parkme+0x82/0x160
[   15.598941]  ? preempt_count_sub+0x50/0x80
[   15.598968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.598991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.599029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.599058]  kthread+0x324/0x6e0
[   15.599080]  ? trace_preempt_on+0x20/0xc0
[   15.599103]  ? __pfx_kthread+0x10/0x10
[   15.599126]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.599149]  ? calculate_sigpending+0x7b/0xa0
[   15.599172]  ? __pfx_kthread+0x10/0x10
[   15.599195]  ret_from_fork+0x41/0x80
[   15.599215]  ? __pfx_kthread+0x10/0x10
[   15.599239]  ret_from_fork_asm+0x1a/0x30
[   15.599272]  </TASK>
[   15.599284] 
[   15.610859] Allocated by task 273:
[   15.611301]  kasan_save_stack+0x45/0x70
[   15.611558]  kasan_save_track+0x18/0x40
[   15.611765]  kasan_save_alloc_info+0x3b/0x50
[   15.611965]  __kasan_kmalloc+0xb7/0xc0
[   15.612147]  __kmalloc_cache_noprof+0x18a/0x420
[   15.612346]  kasan_atomics+0x96/0x310
[   15.612516]  kunit_try_run_case+0x1a6/0x480
[   15.613085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613370]  kthread+0x324/0x6e0
[   15.613702]  ret_from_fork+0x41/0x80
[   15.613983]  ret_from_fork_asm+0x1a/0x30
[   15.614356] 
[   15.614447] The buggy address belongs to the object at ffff888101bf3e00
[   15.614447]  which belongs to the cache kmalloc-64 of size 64
[   15.615277] The buggy address is located 0 bytes to the right of
[   15.615277]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.616134] 
[   15.616380] The buggy address belongs to the physical page:
[   15.616844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.617466] flags: 0x200000000000000(node=0|zone=2)
[   15.617849] page_type: f5(slab)
[   15.618030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.618346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.619030] page dumped because: kasan: bad access detected
[   15.619314] 
[   15.619545] Memory state around the buggy address:
[   15.620025]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.620510]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.621186] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.621544]                                      ^
[   15.621831]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622246]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.622505] ==================================================================
[   15.622996] ==================================================================
[   15.623370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   15.623614] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.623939] 
[   15.624082] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.624122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.624135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.624156] Call Trace:
[   15.624171]  <TASK>
[   15.624186]  dump_stack_lvl+0x73/0xb0
[   15.624210]  print_report+0xd1/0x650
[   15.624232]  ? __virt_addr_valid+0x1db/0x2d0
[   15.624255]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.624276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.624302]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.624324]  kasan_report+0x140/0x180
[   15.624347]  ? kasan_atomics_helper+0x4a86/0x5450
[   15.624372]  __asan_report_load4_noabort+0x18/0x20
[   15.624397]  kasan_atomics_helper+0x4a86/0x5450
[   15.624420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.624442]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.624467]  ? kasan_atomics+0x153/0x310
[   15.624493]  kasan_atomics+0x1dd/0x310
[   15.624516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.624540]  ? __pfx_read_tsc+0x10/0x10
[   15.624562]  ? ktime_get_ts64+0x86/0x230
[   15.624588]  kunit_try_run_case+0x1a6/0x480
[   15.624611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.624634]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.624658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.624685]  ? __kthread_parkme+0x82/0x160
[   15.624707]  ? preempt_count_sub+0x50/0x80
[   15.624733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.624757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.624783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.624811]  kthread+0x324/0x6e0
[   15.624833]  ? trace_preempt_on+0x20/0xc0
[   15.624857]  ? __pfx_kthread+0x10/0x10
[   15.624880]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.624903]  ? calculate_sigpending+0x7b/0xa0
[   15.624927]  ? __pfx_kthread+0x10/0x10
[   15.624950]  ret_from_fork+0x41/0x80
[   15.624970]  ? __pfx_kthread+0x10/0x10
[   15.624993]  ret_from_fork_asm+0x1a/0x30
[   15.625037]  </TASK>
[   15.625049] 
[   15.632633] Allocated by task 273:
[   15.632791]  kasan_save_stack+0x45/0x70
[   15.633190]  kasan_save_track+0x18/0x40
[   15.633383]  kasan_save_alloc_info+0x3b/0x50
[   15.633589]  __kasan_kmalloc+0xb7/0xc0
[   15.633778]  __kmalloc_cache_noprof+0x18a/0x420
[   15.634339]  kasan_atomics+0x96/0x310
[   15.634482]  kunit_try_run_case+0x1a6/0x480
[   15.634630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.635145]  kthread+0x324/0x6e0
[   15.635321]  ret_from_fork+0x41/0x80
[   15.635506]  ret_from_fork_asm+0x1a/0x30
[   15.635819] 
[   15.636005] The buggy address belongs to the object at ffff888101bf3e00
[   15.636005]  which belongs to the cache kmalloc-64 of size 64
[   15.636458] The buggy address is located 0 bytes to the right of
[   15.636458]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.637049] 
[   15.637147] The buggy address belongs to the physical page:
[   15.637384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.637711] flags: 0x200000000000000(node=0|zone=2)
[   15.637913] page_type: f5(slab)
[   15.638100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.638331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.638711] page dumped because: kasan: bad access detected
[   15.638964] 
[   15.639068] Memory state around the buggy address:
[   15.639248]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.639544]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.639757] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.639966]                                      ^
[   15.640130]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640343]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640737] ==================================================================
[   16.061276] ==================================================================
[   16.061582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   16.061872] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.062444] 
[   16.062550] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.062590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.062601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.062622] Call Trace:
[   16.062637]  <TASK>
[   16.062651]  dump_stack_lvl+0x73/0xb0
[   16.062676]  print_report+0xd1/0x650
[   16.062697]  ? __virt_addr_valid+0x1db/0x2d0
[   16.062720]  ? kasan_atomics_helper+0x15b7/0x5450
[   16.062741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.062767]  ? kasan_atomics_helper+0x15b7/0x5450
[   16.062789]  kasan_report+0x140/0x180
[   16.062811]  ? kasan_atomics_helper+0x15b7/0x5450
[   16.062837]  kasan_check_range+0x10c/0x1c0
[   16.062861]  __kasan_check_write+0x18/0x20
[   16.062884]  kasan_atomics_helper+0x15b7/0x5450
[   16.062907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.062930]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.062954]  ? kasan_atomics+0x153/0x310
[   16.062980]  kasan_atomics+0x1dd/0x310
[   16.063003]  ? __pfx_kasan_atomics+0x10/0x10
[   16.063038]  ? __pfx_read_tsc+0x10/0x10
[   16.063061]  ? ktime_get_ts64+0x86/0x230
[   16.063087]  kunit_try_run_case+0x1a6/0x480
[   16.063110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063133]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.063157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.063182]  ? __kthread_parkme+0x82/0x160
[   16.063205]  ? preempt_count_sub+0x50/0x80
[   16.063230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.063253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.063280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.063307]  kthread+0x324/0x6e0
[   16.063329]  ? trace_preempt_on+0x20/0xc0
[   16.063353]  ? __pfx_kthread+0x10/0x10
[   16.063375]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.063398]  ? calculate_sigpending+0x7b/0xa0
[   16.063421]  ? __pfx_kthread+0x10/0x10
[   16.063445]  ret_from_fork+0x41/0x80
[   16.063464]  ? __pfx_kthread+0x10/0x10
[   16.063487]  ret_from_fork_asm+0x1a/0x30
[   16.063519]  </TASK>
[   16.063531] 
[   16.070912] Allocated by task 273:
[   16.071097]  kasan_save_stack+0x45/0x70
[   16.071292]  kasan_save_track+0x18/0x40
[   16.071481]  kasan_save_alloc_info+0x3b/0x50
[   16.071898]  __kasan_kmalloc+0xb7/0xc0
[   16.072121]  __kmalloc_cache_noprof+0x18a/0x420
[   16.072333]  kasan_atomics+0x96/0x310
[   16.072465]  kunit_try_run_case+0x1a6/0x480
[   16.072609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.072785]  kthread+0x324/0x6e0
[   16.072907]  ret_from_fork+0x41/0x80
[   16.073043]  ret_from_fork_asm+0x1a/0x30
[   16.073182] 
[   16.073252] The buggy address belongs to the object at ffff888101bf3e00
[   16.073252]  which belongs to the cache kmalloc-64 of size 64
[   16.074276] The buggy address is located 0 bytes to the right of
[   16.074276]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.075217] 
[   16.075308] The buggy address belongs to the physical page:
[   16.075521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.075950] flags: 0x200000000000000(node=0|zone=2)
[   16.076184] page_type: f5(slab)
[   16.076305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.076534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.076758] page dumped because: kasan: bad access detected
[   16.076928] 
[   16.076997] Memory state around the buggy address:
[   16.077302]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077659]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077978] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.078296]                                      ^
[   16.078681]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079179]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079621] ==================================================================
[   16.080186] ==================================================================
[   16.080416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   16.080699] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.081038] 
[   16.081145] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.081182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.081194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.081215] Call Trace:
[   16.081228]  <TASK>
[   16.081243]  dump_stack_lvl+0x73/0xb0
[   16.081267]  print_report+0xd1/0x650
[   16.081289]  ? __virt_addr_valid+0x1db/0x2d0
[   16.081311]  ? kasan_atomics_helper+0x1650/0x5450
[   16.081333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.081360]  ? kasan_atomics_helper+0x1650/0x5450
[   16.081381]  kasan_report+0x140/0x180
[   16.081418]  ? kasan_atomics_helper+0x1650/0x5450
[   16.081446]  kasan_check_range+0x10c/0x1c0
[   16.081469]  __kasan_check_write+0x18/0x20
[   16.081492]  kasan_atomics_helper+0x1650/0x5450
[   16.081515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.081536]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.081561]  ? kasan_atomics+0x153/0x310
[   16.081587]  kasan_atomics+0x1dd/0x310
[   16.081610]  ? __pfx_kasan_atomics+0x10/0x10
[   16.081634]  ? __pfx_read_tsc+0x10/0x10
[   16.081656]  ? ktime_get_ts64+0x86/0x230
[   16.081682]  kunit_try_run_case+0x1a6/0x480
[   16.081704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081727]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.081758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.081783]  ? __kthread_parkme+0x82/0x160
[   16.081805]  ? preempt_count_sub+0x50/0x80
[   16.081831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.081882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.081909]  kthread+0x324/0x6e0
[   16.081931]  ? trace_preempt_on+0x20/0xc0
[   16.081955]  ? __pfx_kthread+0x10/0x10
[   16.081978]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.082000]  ? calculate_sigpending+0x7b/0xa0
[   16.082033]  ? __pfx_kthread+0x10/0x10
[   16.082057]  ret_from_fork+0x41/0x80
[   16.082076]  ? __pfx_kthread+0x10/0x10
[   16.082099]  ret_from_fork_asm+0x1a/0x30
[   16.082131]  </TASK>
[   16.082141] 
[   16.090689] Allocated by task 273:
[   16.090821]  kasan_save_stack+0x45/0x70
[   16.090966]  kasan_save_track+0x18/0x40
[   16.091113]  kasan_save_alloc_info+0x3b/0x50
[   16.091326]  __kasan_kmalloc+0xb7/0xc0
[   16.091519]  __kmalloc_cache_noprof+0x18a/0x420
[   16.091749]  kasan_atomics+0x96/0x310
[   16.091945]  kunit_try_run_case+0x1a6/0x480
[   16.093228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094270]  kthread+0x324/0x6e0
[   16.094853]  ret_from_fork+0x41/0x80
[   16.095493]  ret_from_fork_asm+0x1a/0x30
[   16.096384] 
[   16.096791] The buggy address belongs to the object at ffff888101bf3e00
[   16.096791]  which belongs to the cache kmalloc-64 of size 64
[   16.098276] The buggy address is located 0 bytes to the right of
[   16.098276]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.099044] 
[   16.099439] The buggy address belongs to the physical page:
[   16.100336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.101448] flags: 0x200000000000000(node=0|zone=2)
[   16.101994] page_type: f5(slab)
[   16.102527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.103310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.104100] page dumped because: kasan: bad access detected
[   16.104287] 
[   16.104364] Memory state around the buggy address:
[   16.104522]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.105215]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.105916] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.106622]                                      ^
[   16.107088]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.107751]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108286] ==================================================================
[   16.209726] ==================================================================
[   16.210063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   16.210355] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.210733] 
[   16.210854] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.210905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.210918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.210940] Call Trace:
[   16.210954]  <TASK>
[   16.210968]  dump_stack_lvl+0x73/0xb0
[   16.210991]  print_report+0xd1/0x650
[   16.211023]  ? __virt_addr_valid+0x1db/0x2d0
[   16.211056]  ? kasan_atomics_helper+0x194b/0x5450
[   16.211076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.211103]  ? kasan_atomics_helper+0x194b/0x5450
[   16.211136]  kasan_report+0x140/0x180
[   16.211158]  ? kasan_atomics_helper+0x194b/0x5450
[   16.211184]  kasan_check_range+0x10c/0x1c0
[   16.211208]  __kasan_check_write+0x18/0x20
[   16.211241]  kasan_atomics_helper+0x194b/0x5450
[   16.211263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.211285]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.211321]  ? kasan_atomics+0x153/0x310
[   16.211346]  kasan_atomics+0x1dd/0x310
[   16.211370]  ? __pfx_kasan_atomics+0x10/0x10
[   16.211394]  ? __pfx_read_tsc+0x10/0x10
[   16.211415]  ? ktime_get_ts64+0x86/0x230
[   16.211440]  kunit_try_run_case+0x1a6/0x480
[   16.211463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.211486]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.211510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.211534]  ? __kthread_parkme+0x82/0x160
[   16.211556]  ? preempt_count_sub+0x50/0x80
[   16.211581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.211613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.211639]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.211676]  kthread+0x324/0x6e0
[   16.211699]  ? trace_preempt_on+0x20/0xc0
[   16.211723]  ? __pfx_kthread+0x10/0x10
[   16.211746]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.211768]  ? calculate_sigpending+0x7b/0xa0
[   16.211800]  ? __pfx_kthread+0x10/0x10
[   16.211824]  ret_from_fork+0x41/0x80
[   16.211843]  ? __pfx_kthread+0x10/0x10
[   16.211875]  ret_from_fork_asm+0x1a/0x30
[   16.211908]  </TASK>
[   16.211919] 
[   16.219549] Allocated by task 273:
[   16.219738]  kasan_save_stack+0x45/0x70
[   16.219989]  kasan_save_track+0x18/0x40
[   16.220191]  kasan_save_alloc_info+0x3b/0x50
[   16.220402]  __kasan_kmalloc+0xb7/0xc0
[   16.220620]  __kmalloc_cache_noprof+0x18a/0x420
[   16.220876]  kasan_atomics+0x96/0x310
[   16.221082]  kunit_try_run_case+0x1a6/0x480
[   16.221228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.221422]  kthread+0x324/0x6e0
[   16.221638]  ret_from_fork+0x41/0x80
[   16.221968]  ret_from_fork_asm+0x1a/0x30
[   16.222236] 
[   16.222400] The buggy address belongs to the object at ffff888101bf3e00
[   16.222400]  which belongs to the cache kmalloc-64 of size 64
[   16.222999] The buggy address is located 0 bytes to the right of
[   16.222999]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.223480] 
[   16.223637] The buggy address belongs to the physical page:
[   16.223895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.224143] flags: 0x200000000000000(node=0|zone=2)
[   16.224302] page_type: f5(slab)
[   16.224516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.225268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.225612] page dumped because: kasan: bad access detected
[   16.225896] 
[   16.226009] Memory state around the buggy address:
[   16.226258]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.226479]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.226694] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.226940]                                      ^
[   16.227199]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.227594]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.228001] ==================================================================
[   15.901936] ==================================================================
[   15.902284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   15.902669] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.902907] 
[   15.902987] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.903037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.903049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.903071] Call Trace:
[   15.903084]  <TASK>
[   15.903099]  dump_stack_lvl+0x73/0xb0
[   15.903125]  print_report+0xd1/0x650
[   15.903146]  ? __virt_addr_valid+0x1db/0x2d0
[   15.903168]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.903190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.903217]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.903239]  kasan_report+0x140/0x180
[   15.903261]  ? kasan_atomics_helper+0x12e7/0x5450
[   15.903287]  kasan_check_range+0x10c/0x1c0
[   15.903311]  __kasan_check_write+0x18/0x20
[   15.903334]  kasan_atomics_helper+0x12e7/0x5450
[   15.903357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.903380]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.903405]  ? kasan_atomics+0x153/0x310
[   15.903430]  kasan_atomics+0x1dd/0x310
[   15.903453]  ? __pfx_kasan_atomics+0x10/0x10
[   15.903478]  ? __pfx_read_tsc+0x10/0x10
[   15.903500]  ? ktime_get_ts64+0x86/0x230
[   15.903526]  kunit_try_run_case+0x1a6/0x480
[   15.903550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903573]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.903596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.903621]  ? __kthread_parkme+0x82/0x160
[   15.903644]  ? preempt_count_sub+0x50/0x80
[   15.903668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.903719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.903746]  kthread+0x324/0x6e0
[   15.903847]  ? trace_preempt_on+0x20/0xc0
[   15.903873]  ? __pfx_kthread+0x10/0x10
[   15.903896]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.903920]  ? calculate_sigpending+0x7b/0xa0
[   15.903941]  ? __pfx_kthread+0x10/0x10
[   15.903965]  ret_from_fork+0x41/0x80
[   15.903984]  ? __pfx_kthread+0x10/0x10
[   15.904008]  ret_from_fork_asm+0x1a/0x30
[   15.904050]  </TASK>
[   15.904061] 
[   15.912263] Allocated by task 273:
[   15.912414]  kasan_save_stack+0x45/0x70
[   15.912678]  kasan_save_track+0x18/0x40
[   15.912818]  kasan_save_alloc_info+0x3b/0x50
[   15.912978]  __kasan_kmalloc+0xb7/0xc0
[   15.913182]  __kmalloc_cache_noprof+0x18a/0x420
[   15.913406]  kasan_atomics+0x96/0x310
[   15.913598]  kunit_try_run_case+0x1a6/0x480
[   15.913787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.914034]  kthread+0x324/0x6e0
[   15.914191]  ret_from_fork+0x41/0x80
[   15.914321]  ret_from_fork_asm+0x1a/0x30
[   15.914492] 
[   15.914786] The buggy address belongs to the object at ffff888101bf3e00
[   15.914786]  which belongs to the cache kmalloc-64 of size 64
[   15.915304] The buggy address is located 0 bytes to the right of
[   15.915304]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.915971] 
[   15.916074] The buggy address belongs to the physical page:
[   15.916249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.916653] flags: 0x200000000000000(node=0|zone=2)
[   15.916896] page_type: f5(slab)
[   15.917083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.917406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.917750] page dumped because: kasan: bad access detected
[   15.917978] 
[   15.918091] Memory state around the buggy address:
[   15.918305]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918566]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918873] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.919153]                                      ^
[   15.919309]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919520]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919730] ==================================================================
[   16.288582] ==================================================================
[   16.288821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   16.289173] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.289539] 
[   16.289648] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.289685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.289698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.289719] Call Trace:
[   16.289739]  <TASK>
[   16.289752]  dump_stack_lvl+0x73/0xb0
[   16.289814]  print_report+0xd1/0x650
[   16.289836]  ? __virt_addr_valid+0x1db/0x2d0
[   16.289858]  ? kasan_atomics_helper+0x1c19/0x5450
[   16.289880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.289906]  ? kasan_atomics_helper+0x1c19/0x5450
[   16.289929]  kasan_report+0x140/0x180
[   16.289951]  ? kasan_atomics_helper+0x1c19/0x5450
[   16.289977]  kasan_check_range+0x10c/0x1c0
[   16.290001]  __kasan_check_write+0x18/0x20
[   16.290036]  kasan_atomics_helper+0x1c19/0x5450
[   16.290059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.290081]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.290106]  ? kasan_atomics+0x153/0x310
[   16.290132]  kasan_atomics+0x1dd/0x310
[   16.290154]  ? __pfx_kasan_atomics+0x10/0x10
[   16.290179]  ? __pfx_read_tsc+0x10/0x10
[   16.290201]  ? ktime_get_ts64+0x86/0x230
[   16.290227]  kunit_try_run_case+0x1a6/0x480
[   16.290251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290273]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.290318]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.290344]  ? __kthread_parkme+0x82/0x160
[   16.290366]  ? preempt_count_sub+0x50/0x80
[   16.290390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.290415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.290442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.290469]  kthread+0x324/0x6e0
[   16.290490]  ? trace_preempt_on+0x20/0xc0
[   16.290514]  ? __pfx_kthread+0x10/0x10
[   16.290537]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.290561]  ? calculate_sigpending+0x7b/0xa0
[   16.290584]  ? __pfx_kthread+0x10/0x10
[   16.290606]  ret_from_fork+0x41/0x80
[   16.290626]  ? __pfx_kthread+0x10/0x10
[   16.290649]  ret_from_fork_asm+0x1a/0x30
[   16.290681]  </TASK>
[   16.290691] 
[   16.298773] Allocated by task 273:
[   16.299005]  kasan_save_stack+0x45/0x70
[   16.299198]  kasan_save_track+0x18/0x40
[   16.299450]  kasan_save_alloc_info+0x3b/0x50
[   16.299672]  __kasan_kmalloc+0xb7/0xc0
[   16.299908]  __kmalloc_cache_noprof+0x18a/0x420
[   16.300143]  kasan_atomics+0x96/0x310
[   16.300276]  kunit_try_run_case+0x1a6/0x480
[   16.300428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.300857]  kthread+0x324/0x6e0
[   16.301042]  ret_from_fork+0x41/0x80
[   16.301207]  ret_from_fork_asm+0x1a/0x30
[   16.301596] 
[   16.301789] The buggy address belongs to the object at ffff888101bf3e00
[   16.301789]  which belongs to the cache kmalloc-64 of size 64
[   16.302471] The buggy address is located 0 bytes to the right of
[   16.302471]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.303075] 
[   16.303150] The buggy address belongs to the physical page:
[   16.303320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.303555] flags: 0x200000000000000(node=0|zone=2)
[   16.304026] page_type: f5(slab)
[   16.304197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.304636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.305210] page dumped because: kasan: bad access detected
[   16.305428] 
[   16.305500] Memory state around the buggy address:
[   16.305949]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.306275]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.306608] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.306915]                                      ^
[   16.307726]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.307973]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.308207] ==================================================================
[   15.268072] ==================================================================
[   15.268949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   15.269458] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.269749] 
[   15.269836] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.269976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.269991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.270181] Call Trace:
[   15.270201]  <TASK>
[   15.270218]  dump_stack_lvl+0x73/0xb0
[   15.270269]  print_report+0xd1/0x650
[   15.270292]  ? __virt_addr_valid+0x1db/0x2d0
[   15.270315]  ? kasan_atomics_helper+0x4b56/0x5450
[   15.270446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.270477]  ? kasan_atomics_helper+0x4b56/0x5450
[   15.270499]  kasan_report+0x140/0x180
[   15.270522]  ? kasan_atomics_helper+0x4b56/0x5450
[   15.270548]  __asan_report_load4_noabort+0x18/0x20
[   15.270573]  kasan_atomics_helper+0x4b56/0x5450
[   15.270596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.270618]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.270643]  ? kasan_atomics+0x153/0x310
[   15.270670]  kasan_atomics+0x1dd/0x310
[   15.270692]  ? __pfx_kasan_atomics+0x10/0x10
[   15.270716]  ? __pfx_read_tsc+0x10/0x10
[   15.270738]  ? ktime_get_ts64+0x86/0x230
[   15.270764]  kunit_try_run_case+0x1a6/0x480
[   15.270787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270809]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.270834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.270858]  ? __kthread_parkme+0x82/0x160
[   15.270880]  ? preempt_count_sub+0x50/0x80
[   15.270905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.270956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.270982]  kthread+0x324/0x6e0
[   15.271004]  ? trace_preempt_on+0x20/0xc0
[   15.271040]  ? __pfx_kthread+0x10/0x10
[   15.271063]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.271086]  ? calculate_sigpending+0x7b/0xa0
[   15.271107]  ? __pfx_kthread+0x10/0x10
[   15.271131]  ret_from_fork+0x41/0x80
[   15.271150]  ? __pfx_kthread+0x10/0x10
[   15.271173]  ret_from_fork_asm+0x1a/0x30
[   15.271204]  </TASK>
[   15.271216] 
[   15.284075] Allocated by task 273:
[   15.284588]  kasan_save_stack+0x45/0x70
[   15.284773]  kasan_save_track+0x18/0x40
[   15.285313]  kasan_save_alloc_info+0x3b/0x50
[   15.285502]  __kasan_kmalloc+0xb7/0xc0
[   15.285706]  __kmalloc_cache_noprof+0x18a/0x420
[   15.286301]  kasan_atomics+0x96/0x310
[   15.286443]  kunit_try_run_case+0x1a6/0x480
[   15.286639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286979]  kthread+0x324/0x6e0
[   15.287273]  ret_from_fork+0x41/0x80
[   15.287701]  ret_from_fork_asm+0x1a/0x30
[   15.287912] 
[   15.287995] The buggy address belongs to the object at ffff888101bf3e00
[   15.287995]  which belongs to the cache kmalloc-64 of size 64
[   15.288904] The buggy address is located 0 bytes to the right of
[   15.288904]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.289514] 
[   15.289639] The buggy address belongs to the physical page:
[   15.289824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.290199] flags: 0x200000000000000(node=0|zone=2)
[   15.290428] page_type: f5(slab)
[   15.290907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.291190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.291666] page dumped because: kasan: bad access detected
[   15.292064] 
[   15.292153] Memory state around the buggy address:
[   15.292514]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292997]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.293317] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.293839]                                      ^
[   15.294059]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294373]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294847] ==================================================================
[   15.792157] ==================================================================
[   15.792494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   15.793096] Read of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.793420] 
[   15.793522] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.793560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.793572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.793593] Call Trace:
[   15.793606]  <TASK>
[   15.793621]  dump_stack_lvl+0x73/0xb0
[   15.793646]  print_report+0xd1/0x650
[   15.793667]  ? __virt_addr_valid+0x1db/0x2d0
[   15.793690]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.793714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.793748]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.793771]  kasan_report+0x140/0x180
[   15.793795]  ? kasan_atomics_helper+0x4a1e/0x5450
[   15.793821]  __asan_report_load4_noabort+0x18/0x20
[   15.793845]  kasan_atomics_helper+0x4a1e/0x5450
[   15.793868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.793890]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.793915]  ? kasan_atomics+0x153/0x310
[   15.793941]  kasan_atomics+0x1dd/0x310
[   15.793963]  ? __pfx_kasan_atomics+0x10/0x10
[   15.793989]  ? __pfx_read_tsc+0x10/0x10
[   15.794010]  ? ktime_get_ts64+0x86/0x230
[   15.794046]  kunit_try_run_case+0x1a6/0x480
[   15.794070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.794092]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.794115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.794139]  ? __kthread_parkme+0x82/0x160
[   15.794162]  ? preempt_count_sub+0x50/0x80
[   15.794186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.794209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.794237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.794263]  kthread+0x324/0x6e0
[   15.794284]  ? trace_preempt_on+0x20/0xc0
[   15.794309]  ? __pfx_kthread+0x10/0x10
[   15.794331]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.794354]  ? calculate_sigpending+0x7b/0xa0
[   15.794376]  ? __pfx_kthread+0x10/0x10
[   15.794400]  ret_from_fork+0x41/0x80
[   15.794419]  ? __pfx_kthread+0x10/0x10
[   15.794442]  ret_from_fork_asm+0x1a/0x30
[   15.794473]  </TASK>
[   15.794484] 
[   15.803187] Allocated by task 273:
[   15.803325]  kasan_save_stack+0x45/0x70
[   15.803470]  kasan_save_track+0x18/0x40
[   15.803607]  kasan_save_alloc_info+0x3b/0x50
[   15.803753]  __kasan_kmalloc+0xb7/0xc0
[   15.803884]  __kmalloc_cache_noprof+0x18a/0x420
[   15.804050]  kasan_atomics+0x96/0x310
[   15.804186]  kunit_try_run_case+0x1a6/0x480
[   15.805393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806312]  kthread+0x324/0x6e0
[   15.806972]  ret_from_fork+0x41/0x80
[   15.807922]  ret_from_fork_asm+0x1a/0x30
[   15.808855] 
[   15.809131] The buggy address belongs to the object at ffff888101bf3e00
[   15.809131]  which belongs to the cache kmalloc-64 of size 64
[   15.810929] The buggy address is located 0 bytes to the right of
[   15.810929]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.812361] 
[   15.812452] The buggy address belongs to the physical page:
[   15.812986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.813365] flags: 0x200000000000000(node=0|zone=2)
[   15.813546] page_type: f5(slab)
[   15.813899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.814298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.814785] page dumped because: kasan: bad access detected
[   15.815149] 
[   15.815256] Memory state around the buggy address:
[   15.815459]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.815987]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.816448] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.816844]                                      ^
[   15.817163]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817460]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.817906] ==================================================================
[   15.492219] ==================================================================
[   15.492545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   15.492840] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.493168] 
[   15.493248] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.493287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.493300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.493321] Call Trace:
[   15.493337]  <TASK>
[   15.493353]  dump_stack_lvl+0x73/0xb0
[   15.493378]  print_report+0xd1/0x650
[   15.493400]  ? __virt_addr_valid+0x1db/0x2d0
[   15.493489]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.493511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.493537]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.493559]  kasan_report+0x140/0x180
[   15.493582]  ? kasan_atomics_helper+0x8fa/0x5450
[   15.493608]  kasan_check_range+0x10c/0x1c0
[   15.493632]  __kasan_check_write+0x18/0x20
[   15.493655]  kasan_atomics_helper+0x8fa/0x5450
[   15.493677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.493980]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.494030]  ? kasan_atomics+0x153/0x310
[   15.494057]  kasan_atomics+0x1dd/0x310
[   15.494081]  ? __pfx_kasan_atomics+0x10/0x10
[   15.494105]  ? __pfx_read_tsc+0x10/0x10
[   15.494151]  ? ktime_get_ts64+0x86/0x230
[   15.494178]  kunit_try_run_case+0x1a6/0x480
[   15.494202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.494225]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.494250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.494275]  ? __kthread_parkme+0x82/0x160
[   15.494318]  ? preempt_count_sub+0x50/0x80
[   15.494344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.494368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.494394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.494422]  kthread+0x324/0x6e0
[   15.494444]  ? trace_preempt_on+0x20/0xc0
[   15.494468]  ? __pfx_kthread+0x10/0x10
[   15.494491]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.494514]  ? calculate_sigpending+0x7b/0xa0
[   15.494536]  ? __pfx_kthread+0x10/0x10
[   15.494560]  ret_from_fork+0x41/0x80
[   15.494746]  ? __pfx_kthread+0x10/0x10
[   15.494772]  ret_from_fork_asm+0x1a/0x30
[   15.494805]  </TASK>
[   15.494816] 
[   15.503086] Allocated by task 273:
[   15.503415]  kasan_save_stack+0x45/0x70
[   15.503631]  kasan_save_track+0x18/0x40
[   15.503827]  kasan_save_alloc_info+0x3b/0x50
[   15.503984]  __kasan_kmalloc+0xb7/0xc0
[   15.504128]  __kmalloc_cache_noprof+0x18a/0x420
[   15.504282]  kasan_atomics+0x96/0x310
[   15.504465]  kunit_try_run_case+0x1a6/0x480
[   15.504797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.505059]  kthread+0x324/0x6e0
[   15.505318]  ret_from_fork+0x41/0x80
[   15.505452]  ret_from_fork_asm+0x1a/0x30
[   15.505778] 
[   15.505876] The buggy address belongs to the object at ffff888101bf3e00
[   15.505876]  which belongs to the cache kmalloc-64 of size 64
[   15.506459] The buggy address is located 0 bytes to the right of
[   15.506459]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.507143] 
[   15.507250] The buggy address belongs to the physical page:
[   15.507510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.507885] flags: 0x200000000000000(node=0|zone=2)
[   15.508078] page_type: f5(slab)
[   15.508288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.508757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.509195] page dumped because: kasan: bad access detected
[   15.509414] 
[   15.509511] Memory state around the buggy address:
[   15.509858]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.510141]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.510471] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.510736]                                      ^
[   15.510967]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511504]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.511732] ==================================================================
[   15.295543] ==================================================================
[   15.296499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   15.297158] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.297684] 
[   15.297916] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.297962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.297976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.297996] Call Trace:
[   15.298012]  <TASK>
[   15.298043]  dump_stack_lvl+0x73/0xb0
[   15.298070]  print_report+0xd1/0x650
[   15.298092]  ? __virt_addr_valid+0x1db/0x2d0
[   15.298137]  ? kasan_atomics_helper+0x4a1/0x5450
[   15.298159]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.298186]  ? kasan_atomics_helper+0x4a1/0x5450
[   15.298208]  kasan_report+0x140/0x180
[   15.298230]  ? kasan_atomics_helper+0x4a1/0x5450
[   15.298256]  kasan_check_range+0x10c/0x1c0
[   15.298280]  __kasan_check_write+0x18/0x20
[   15.298303]  kasan_atomics_helper+0x4a1/0x5450
[   15.298326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.298349]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.298374]  ? kasan_atomics+0x153/0x310
[   15.298402]  kasan_atomics+0x1dd/0x310
[   15.298425]  ? __pfx_kasan_atomics+0x10/0x10
[   15.298449]  ? __pfx_read_tsc+0x10/0x10
[   15.298472]  ? ktime_get_ts64+0x86/0x230
[   15.298497]  kunit_try_run_case+0x1a6/0x480
[   15.298521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.298543]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.298568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.298592]  ? __kthread_parkme+0x82/0x160
[   15.298614]  ? preempt_count_sub+0x50/0x80
[   15.298639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.298662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.298688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.298716]  kthread+0x324/0x6e0
[   15.298738]  ? trace_preempt_on+0x20/0xc0
[   15.298761]  ? __pfx_kthread+0x10/0x10
[   15.298784]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.298807]  ? calculate_sigpending+0x7b/0xa0
[   15.298830]  ? __pfx_kthread+0x10/0x10
[   15.298853]  ret_from_fork+0x41/0x80
[   15.298872]  ? __pfx_kthread+0x10/0x10
[   15.298895]  ret_from_fork_asm+0x1a/0x30
[   15.298926]  </TASK>
[   15.298937] 
[   15.310979] Allocated by task 273:
[   15.311116]  kasan_save_stack+0x45/0x70
[   15.311259]  kasan_save_track+0x18/0x40
[   15.311391]  kasan_save_alloc_info+0x3b/0x50
[   15.311533]  __kasan_kmalloc+0xb7/0xc0
[   15.311892]  __kmalloc_cache_noprof+0x18a/0x420
[   15.312327]  kasan_atomics+0x96/0x310
[   15.312695]  kunit_try_run_case+0x1a6/0x480
[   15.313192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.313717]  kthread+0x324/0x6e0
[   15.314070]  ret_from_fork+0x41/0x80
[   15.314393]  ret_from_fork_asm+0x1a/0x30
[   15.314811] 
[   15.314995] The buggy address belongs to the object at ffff888101bf3e00
[   15.314995]  which belongs to the cache kmalloc-64 of size 64
[   15.316264] The buggy address is located 0 bytes to the right of
[   15.316264]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.317550] 
[   15.317715] The buggy address belongs to the physical page:
[   15.318181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.318570] flags: 0x200000000000000(node=0|zone=2)
[   15.319084] page_type: f5(slab)
[   15.319410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.320195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.320860] page dumped because: kasan: bad access detected
[   15.321084] 
[   15.321155] Memory state around the buggy address:
[   15.321304]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.321508]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.322095] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.322807]                                      ^
[   15.323248]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.323996]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.324694] ==================================================================
[   16.108713] ==================================================================
[   16.109323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   16.109994] Write of size 8 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   16.110790] 
[   16.111157] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   16.111202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.111215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.111237] Call Trace:
[   16.111249]  <TASK>
[   16.111266]  dump_stack_lvl+0x73/0xb0
[   16.111460]  print_report+0xd1/0x650
[   16.111497]  ? __virt_addr_valid+0x1db/0x2d0
[   16.111520]  ? kasan_atomics_helper+0x16e8/0x5450
[   16.111541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.111580]  ? kasan_atomics_helper+0x16e8/0x5450
[   16.111601]  kasan_report+0x140/0x180
[   16.111624]  ? kasan_atomics_helper+0x16e8/0x5450
[   16.111662]  kasan_check_range+0x10c/0x1c0
[   16.111686]  __kasan_check_write+0x18/0x20
[   16.111710]  kasan_atomics_helper+0x16e8/0x5450
[   16.111744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.111765]  ? __kmalloc_cache_noprof+0x18a/0x420
[   16.111791]  ? kasan_atomics+0x153/0x310
[   16.111828]  kasan_atomics+0x1dd/0x310
[   16.111851]  ? __pfx_kasan_atomics+0x10/0x10
[   16.111886]  ? __pfx_read_tsc+0x10/0x10
[   16.111908]  ? ktime_get_ts64+0x86/0x230
[   16.111934]  kunit_try_run_case+0x1a6/0x480
[   16.111968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.111991]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.112031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.112056]  ? __kthread_parkme+0x82/0x160
[   16.112079]  ? preempt_count_sub+0x50/0x80
[   16.112116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.112206]  kthread+0x324/0x6e0
[   16.112228]  ? trace_preempt_on+0x20/0xc0
[   16.112263]  ? __pfx_kthread+0x10/0x10
[   16.112286]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.112309]  ? calculate_sigpending+0x7b/0xa0
[   16.112344]  ? __pfx_kthread+0x10/0x10
[   16.112367]  ret_from_fork+0x41/0x80
[   16.112386]  ? __pfx_kthread+0x10/0x10
[   16.112419]  ret_from_fork_asm+0x1a/0x30
[   16.112451]  </TASK>
[   16.112462] 
[   16.125258] Allocated by task 273:
[   16.125391]  kasan_save_stack+0x45/0x70
[   16.125534]  kasan_save_track+0x18/0x40
[   16.125912]  kasan_save_alloc_info+0x3b/0x50
[   16.126312]  __kasan_kmalloc+0xb7/0xc0
[   16.126683]  __kmalloc_cache_noprof+0x18a/0x420
[   16.127111]  kasan_atomics+0x96/0x310
[   16.127473]  kunit_try_run_case+0x1a6/0x480
[   16.127905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.128408]  kthread+0x324/0x6e0
[   16.128753]  ret_from_fork+0x41/0x80
[   16.129142]  ret_from_fork_asm+0x1a/0x30
[   16.129531] 
[   16.129724] The buggy address belongs to the object at ffff888101bf3e00
[   16.129724]  which belongs to the cache kmalloc-64 of size 64
[   16.130333] The buggy address is located 0 bytes to the right of
[   16.130333]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   16.131027] 
[   16.131203] The buggy address belongs to the physical page:
[   16.131723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   16.132428] flags: 0x200000000000000(node=0|zone=2)
[   16.132942] page_type: f5(slab)
[   16.133289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.133522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.134220] page dumped because: kasan: bad access detected
[   16.134767] 
[   16.134990] Memory state around the buggy address:
[   16.135410]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.135653]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.136225] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.136437]                                      ^
[   16.136618]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137265]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137953] ==================================================================
[   15.450105] ==================================================================
[   15.450353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   15.450748] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.451094] 
[   15.451215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.451255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.451268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.451291] Call Trace:
[   15.451307]  <TASK>
[   15.451322]  dump_stack_lvl+0x73/0xb0
[   15.451346]  print_report+0xd1/0x650
[   15.451369]  ? __virt_addr_valid+0x1db/0x2d0
[   15.451392]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.451414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.451442]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.451467]  kasan_report+0x140/0x180
[   15.451490]  ? kasan_atomics_helper+0x7c8/0x5450
[   15.451517]  kasan_check_range+0x10c/0x1c0
[   15.451540]  __kasan_check_write+0x18/0x20
[   15.451588]  kasan_atomics_helper+0x7c8/0x5450
[   15.451611]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.451634]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.451678]  ? kasan_atomics+0x153/0x310
[   15.451704]  kasan_atomics+0x1dd/0x310
[   15.451728]  ? __pfx_kasan_atomics+0x10/0x10
[   15.451752]  ? __pfx_read_tsc+0x10/0x10
[   15.451774]  ? ktime_get_ts64+0x86/0x230
[   15.451801]  kunit_try_run_case+0x1a6/0x480
[   15.451823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.451846]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.451870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.451895]  ? __kthread_parkme+0x82/0x160
[   15.451918]  ? preempt_count_sub+0x50/0x80
[   15.451943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.451967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.451994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.452030]  kthread+0x324/0x6e0
[   15.452053]  ? trace_preempt_on+0x20/0xc0
[   15.452077]  ? __pfx_kthread+0x10/0x10
[   15.452100]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.452123]  ? calculate_sigpending+0x7b/0xa0
[   15.452145]  ? __pfx_kthread+0x10/0x10
[   15.452169]  ret_from_fork+0x41/0x80
[   15.452188]  ? __pfx_kthread+0x10/0x10
[   15.452211]  ret_from_fork_asm+0x1a/0x30
[   15.452243]  </TASK>
[   15.452255] 
[   15.459540] Allocated by task 273:
[   15.459788]  kasan_save_stack+0x45/0x70
[   15.460056]  kasan_save_track+0x18/0x40
[   15.460249]  kasan_save_alloc_info+0x3b/0x50
[   15.460465]  __kasan_kmalloc+0xb7/0xc0
[   15.460686]  __kmalloc_cache_noprof+0x18a/0x420
[   15.460921]  kasan_atomics+0x96/0x310
[   15.461124]  kunit_try_run_case+0x1a6/0x480
[   15.461426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.461764]  kthread+0x324/0x6e0
[   15.461888]  ret_from_fork+0x41/0x80
[   15.462079]  ret_from_fork_asm+0x1a/0x30
[   15.462279] 
[   15.462378] The buggy address belongs to the object at ffff888101bf3e00
[   15.462378]  which belongs to the cache kmalloc-64 of size 64
[   15.462855] The buggy address is located 0 bytes to the right of
[   15.462855]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.463357] 
[   15.463454] The buggy address belongs to the physical page:
[   15.463783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.464140] flags: 0x200000000000000(node=0|zone=2)
[   15.464344] page_type: f5(slab)
[   15.464468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.464724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.464949] page dumped because: kasan: bad access detected
[   15.465178] 
[   15.465272] Memory state around the buggy address:
[   15.465495]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.465939]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.466218] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.466523]                                      ^
[   15.466710]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.466924]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.467146] ==================================================================
[   15.372932] ==================================================================
[   15.373208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   15.373541] Write of size 4 at addr ffff888101bf3e30 by task kunit_try_catch/273
[   15.374144] 
[   15.374348] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   15.374430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.374445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.374468] Call Trace:
[   15.374483]  <TASK>
[   15.374499]  dump_stack_lvl+0x73/0xb0
[   15.374525]  print_report+0xd1/0x650
[   15.374548]  ? __virt_addr_valid+0x1db/0x2d0
[   15.374571]  ? kasan_atomics_helper+0x5ff/0x5450
[   15.374592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.374618]  ? kasan_atomics_helper+0x5ff/0x5450
[   15.374640]  kasan_report+0x140/0x180
[   15.374663]  ? kasan_atomics_helper+0x5ff/0x5450
[   15.374689]  kasan_check_range+0x10c/0x1c0
[   15.374713]  __kasan_check_write+0x18/0x20
[   15.374736]  kasan_atomics_helper+0x5ff/0x5450
[   15.374760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.374783]  ? __kmalloc_cache_noprof+0x18a/0x420
[   15.374808]  ? kasan_atomics+0x153/0x310
[   15.374834]  kasan_atomics+0x1dd/0x310
[   15.374857]  ? __pfx_kasan_atomics+0x10/0x10
[   15.374881]  ? __pfx_read_tsc+0x10/0x10
[   15.374904]  ? ktime_get_ts64+0x86/0x230
[   15.374930]  kunit_try_run_case+0x1a6/0x480
[   15.374953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.374975]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.375000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.375036]  ? __kthread_parkme+0x82/0x160
[   15.375059]  ? preempt_count_sub+0x50/0x80
[   15.375084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.375108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.375135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.375162]  kthread+0x324/0x6e0
[   15.375184]  ? trace_preempt_on+0x20/0xc0
[   15.375208]  ? __pfx_kthread+0x10/0x10
[   15.375231]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.375255]  ? calculate_sigpending+0x7b/0xa0
[   15.375278]  ? __pfx_kthread+0x10/0x10
[   15.375302]  ret_from_fork+0x41/0x80
[   15.375322]  ? __pfx_kthread+0x10/0x10
[   15.375345]  ret_from_fork_asm+0x1a/0x30
[   15.375378]  </TASK>
[   15.375390] 
[   15.386896] Allocated by task 273:
[   15.387281]  kasan_save_stack+0x45/0x70
[   15.387452]  kasan_save_track+0x18/0x40
[   15.387891]  kasan_save_alloc_info+0x3b/0x50
[   15.388085]  __kasan_kmalloc+0xb7/0xc0
[   15.388302]  __kmalloc_cache_noprof+0x18a/0x420
[   15.388714]  kasan_atomics+0x96/0x310
[   15.388881]  kunit_try_run_case+0x1a6/0x480
[   15.389243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389531]  kthread+0x324/0x6e0
[   15.389888]  ret_from_fork+0x41/0x80
[   15.390093]  ret_from_fork_asm+0x1a/0x30
[   15.390287] 
[   15.390359] The buggy address belongs to the object at ffff888101bf3e00
[   15.390359]  which belongs to the cache kmalloc-64 of size 64
[   15.390971] The buggy address is located 0 bytes to the right of
[   15.390971]  allocated 48-byte region [ffff888101bf3e00, ffff888101bf3e30)
[   15.391854] 
[   15.391955] The buggy address belongs to the physical page:
[   15.392192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf3
[   15.392544] flags: 0x200000000000000(node=0|zone=2)
[   15.392914] page_type: f5(slab)
[   15.393464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.393895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.394458] page dumped because: kasan: bad access detected
[   15.394728] 
[   15.395028] Memory state around the buggy address:
[   15.395327]  ffff888101bf3d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.395766]  ffff888101bf3d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.396172] >ffff888101bf3e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.396495]                                      ^
[   15.396877]  ffff888101bf3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397167]  ffff888101bf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397472] ==================================================================