Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.231733] ==================================================================
[   18.231811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.231872] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.231931] 
[   18.231976] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.232058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.232092] Hardware name: linux,dummy-virt (DT)
[   18.232125] Call trace:
[   18.232154]  show_stack+0x20/0x38 (C)
[   18.232421]  dump_stack_lvl+0x8c/0xd0
[   18.232525]  print_report+0x118/0x608
[   18.232580]  kasan_report+0xdc/0x128
[   18.232634]  kasan_check_range+0x100/0x1a8
[   18.232687]  __kasan_check_write+0x20/0x30
[   18.232801]  kasan_atomics_helper+0x147c/0x4858
[   18.232861]  kasan_atomics+0x198/0x2e0
[   18.232916]  kunit_try_run_case+0x170/0x3f0
[   18.232979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233041]  kthread+0x328/0x630
[   18.233095]  ret_from_fork+0x10/0x20
[   18.233149] 
[   18.233180] Allocated by task 268:
[   18.233221]  kasan_save_stack+0x3c/0x68
[   18.233263]  kasan_save_track+0x20/0x40
[   18.233300]  kasan_save_alloc_info+0x40/0x58
[   18.233341]  __kasan_kmalloc+0xd4/0xd8
[   18.233492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.233561]  kasan_atomics+0xb8/0x2e0
[   18.233697]  kunit_try_run_case+0x170/0x3f0
[   18.233763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.233827]  kthread+0x328/0x630
[   18.233872]  ret_from_fork+0x10/0x20
[   18.233917] 
[   18.233967] The buggy address belongs to the object at fff00000c77e9a80
[   18.233967]  which belongs to the cache kmalloc-64 of size 64
[   18.234083] The buggy address is located 0 bytes to the right of
[   18.234083]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.234221] 
[   18.234278] The buggy address belongs to the physical page:
[   18.234321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.234385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.234454] page_type: f5(slab)
[   18.234501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.234556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.234599] page dumped because: kasan: bad access detected
[   18.234632] 
[   18.235059] Memory state around the buggy address:
[   18.235170]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235419]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235555] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.235781]                                      ^
[   18.235835]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236191]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.236334] ==================================================================
[   18.109560] ==================================================================
[   18.109720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.109774] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.109825] 
[   18.109893] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.109992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.110020] Hardware name: linux,dummy-virt (DT)
[   18.110063] Call trace:
[   18.110093]  show_stack+0x20/0x38 (C)
[   18.110404]  dump_stack_lvl+0x8c/0xd0
[   18.110467]  print_report+0x118/0x608
[   18.110748]  kasan_report+0xdc/0x128
[   18.111025]  kasan_check_range+0x100/0x1a8
[   18.111219]  __kasan_check_read+0x20/0x30
[   18.111307]  kasan_atomics_helper+0xdd4/0x4858
[   18.111356]  kasan_atomics+0x198/0x2e0
[   18.111654]  kunit_try_run_case+0x170/0x3f0
[   18.111786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.112167]  kthread+0x328/0x630
[   18.112264]  ret_from_fork+0x10/0x20
[   18.112340] 
[   18.112407] Allocated by task 268:
[   18.112487]  kasan_save_stack+0x3c/0x68
[   18.112554]  kasan_save_track+0x20/0x40
[   18.112751]  kasan_save_alloc_info+0x40/0x58
[   18.112936]  __kasan_kmalloc+0xd4/0xd8
[   18.113008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.113650]  kasan_atomics+0xb8/0x2e0
[   18.113889]  kunit_try_run_case+0x170/0x3f0
[   18.113974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.114043]  kthread+0x328/0x630
[   18.114092]  ret_from_fork+0x10/0x20
[   18.114440] 
[   18.114674] The buggy address belongs to the object at fff00000c77e9a80
[   18.114674]  which belongs to the cache kmalloc-64 of size 64
[   18.115112] The buggy address is located 0 bytes to the right of
[   18.115112]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.115228] 
[   18.115266] The buggy address belongs to the physical page:
[   18.115301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.115357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.115406] page_type: f5(slab)
[   18.115445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.115498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.115540] page dumped because: kasan: bad access detected
[   18.115574] 
[   18.115931] Memory state around the buggy address:
[   18.116003]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.116366] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.116407]                                      ^
[   18.116444]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116489]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116530] ==================================================================
[   18.021372] ==================================================================
[   18.021800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.021925] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.022082] 
[   18.022117] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.022217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.022278] Hardware name: linux,dummy-virt (DT)
[   18.022404] Call trace:
[   18.022433]  show_stack+0x20/0x38 (C)
[   18.022508]  dump_stack_lvl+0x8c/0xd0
[   18.022558]  print_report+0x118/0x608
[   18.022604]  kasan_report+0xdc/0x128
[   18.022649]  kasan_check_range+0x100/0x1a8
[   18.022888]  __kasan_check_write+0x20/0x30
[   18.023062]  kasan_atomics_helper+0x99c/0x4858
[   18.023174]  kasan_atomics+0x198/0x2e0
[   18.023337]  kunit_try_run_case+0x170/0x3f0
[   18.023578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.023660]  kthread+0x328/0x630
[   18.023819]  ret_from_fork+0x10/0x20
[   18.023876] 
[   18.023913] Allocated by task 268:
[   18.024084]  kasan_save_stack+0x3c/0x68
[   18.024303]  kasan_save_track+0x20/0x40
[   18.024349]  kasan_save_alloc_info+0x40/0x58
[   18.024440]  __kasan_kmalloc+0xd4/0xd8
[   18.024541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.024726]  kasan_atomics+0xb8/0x2e0
[   18.024854]  kunit_try_run_case+0x170/0x3f0
[   18.025113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.025273]  kthread+0x328/0x630
[   18.025360]  ret_from_fork+0x10/0x20
[   18.025575] 
[   18.025622] The buggy address belongs to the object at fff00000c77e9a80
[   18.025622]  which belongs to the cache kmalloc-64 of size 64
[   18.025827] The buggy address is located 0 bytes to the right of
[   18.025827]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.025995] 
[   18.026085] The buggy address belongs to the physical page:
[   18.026406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.026763] page dumped because: kasan: bad access detected
[   18.027585]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.028427] Hardware name: linux,dummy-virt (DT)
[   18.029024]  ret_from_fork+0x10/0x20
[   18.029071] 
[   18.029091] Allocated by task 268:
[   18.029121]  kasan_save_stack+0x3c/0x68
[   18.029161]  kasan_save_track+0x20/0x40
[   18.029199]  kasan_save_alloc_info+0x40/0x58
[   18.029240]  __kasan_kmalloc+0xd4/0xd8
[   18.029277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.029341]  kasan_atomics+0xb8/0x2e0
[   18.029380]  kunit_try_run_case+0x170/0x3f0
[   18.029420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.029673]  kthread+0x328/0x630
[   18.030328]  ret_from_fork+0x10/0x20
[   18.030380] 
[   18.030402] The buggy address belongs to the object at fff00000c77e9a80
[   18.030402]  which belongs to the cache kmalloc-64 of size 64
[   18.030467] The buggy address is located 0 bytes to the right of
[   18.030467]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.030532] 
[   18.030553] The buggy address belongs to the physical page:
[   18.030585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.030638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.030685] page_type: f5(slab)
[   18.030722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.030774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.030816] page dumped because: kasan: bad access detected
[   18.030849] 
[   18.030869] Memory state around the buggy address:
[   18.030902]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.030958]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.031003] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.031042]                                      ^
[   18.031074]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031116]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.031156] ==================================================================
[   18.172601] ==================================================================
[   18.172654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.172796] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.172882] 
[   18.173060] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.173148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.173177] Hardware name: linux,dummy-virt (DT)
[   18.173458] Call trace:
[   18.173494]  show_stack+0x20/0x38 (C)
[   18.174032]  dump_stack_lvl+0x8c/0xd0
[   18.174124]  print_report+0x118/0x608
[   18.174279]  kasan_report+0xdc/0x128
[   18.174344]  kasan_check_range+0x100/0x1a8
[   18.174807]  __kasan_check_write+0x20/0x30
[   18.175073]  kasan_atomics_helper+0x1058/0x4858
[   18.175244]  kasan_atomics+0x198/0x2e0
[   18.175384]  kunit_try_run_case+0x170/0x3f0
[   18.175503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.175587]  kthread+0x328/0x630
[   18.175694]  ret_from_fork+0x10/0x20
[   18.175745] 
[   18.175795] Allocated by task 268:
[   18.175853]  kasan_save_stack+0x3c/0x68
[   18.176208]  kasan_save_track+0x20/0x40
[   18.176565]  kasan_save_alloc_info+0x40/0x58
[   18.176656]  __kasan_kmalloc+0xd4/0xd8
[   18.176748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.176824]  kasan_atomics+0xb8/0x2e0
[   18.176900]  kunit_try_run_case+0x170/0x3f0
[   18.177045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.177098]  kthread+0x328/0x630
[   18.177165]  ret_from_fork+0x10/0x20
[   18.177505] 
[   18.177605] The buggy address belongs to the object at fff00000c77e9a80
[   18.177605]  which belongs to the cache kmalloc-64 of size 64
[   18.178025] The buggy address is located 0 bytes to the right of
[   18.178025]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.178105] 
[   18.178359] The buggy address belongs to the physical page:
[   18.178525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.179063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.179157] page_type: f5(slab)
[   18.179216] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.179276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.179429] page dumped because: kasan: bad access detected
[   18.179673] 
[   18.179713] Memory state around the buggy address:
[   18.179978]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180126]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.180331] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.180689]                                      ^
[   18.180811]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.181102]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.181355] ==================================================================
[   18.102499] ==================================================================
[   18.102553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.102794] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.103064] 
[   18.103116] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.103423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.103481] Hardware name: linux,dummy-virt (DT)
[   18.103517] Call trace:
[   18.103568]  show_stack+0x20/0x38 (C)
[   18.103621]  dump_stack_lvl+0x8c/0xd0
[   18.103752]  print_report+0x118/0x608
[   18.103810]  kasan_report+0xdc/0x128
[   18.103855]  __asan_report_load4_noabort+0x20/0x30
[   18.104071]  kasan_atomics_helper+0x3e04/0x4858
[   18.104232]  kasan_atomics+0x198/0x2e0
[   18.104290]  kunit_try_run_case+0x170/0x3f0
[   18.104586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.104675]  kthread+0x328/0x630
[   18.104766]  ret_from_fork+0x10/0x20
[   18.104820] 
[   18.104858] Allocated by task 268:
[   18.104892]  kasan_save_stack+0x3c/0x68
[   18.104993]  kasan_save_track+0x20/0x40
[   18.105045]  kasan_save_alloc_info+0x40/0x58
[   18.105084]  __kasan_kmalloc+0xd4/0xd8
[   18.105268]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.105326]  kasan_atomics+0xb8/0x2e0
[   18.105467]  kunit_try_run_case+0x170/0x3f0
[   18.105521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.105762]  kthread+0x328/0x630
[   18.105823]  ret_from_fork+0x10/0x20
[   18.106155] 
[   18.106299] The buggy address belongs to the object at fff00000c77e9a80
[   18.106299]  which belongs to the cache kmalloc-64 of size 64
[   18.106416] The buggy address is located 0 bytes to the right of
[   18.106416]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.106536] 
[   18.106585] The buggy address belongs to the physical page:
[   18.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.106960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.107017] page_type: f5(slab)
[   18.107080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.107384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.107540] page dumped because: kasan: bad access detected
[   18.107586] 
[   18.107615] Memory state around the buggy address:
[   18.107665]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.108094]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.108173] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.108456]                                      ^
[   18.108558]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108662]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108723] ==================================================================
[   18.125279] ==================================================================
[   18.125340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.125455] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.125529] 
[   18.125572] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.125780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.125988] Hardware name: linux,dummy-virt (DT)
[   18.126109] Call trace:
[   18.126368]  show_stack+0x20/0x38 (C)
[   18.126523]  dump_stack_lvl+0x8c/0xd0
[   18.126578]  print_report+0x118/0x608
[   18.126624]  kasan_report+0xdc/0x128
[   18.126669]  kasan_check_range+0x100/0x1a8
[   18.126750]  __kasan_check_write+0x20/0x30
[   18.127068]  kasan_atomics_helper+0xe44/0x4858
[   18.127373]  kasan_atomics+0x198/0x2e0
[   18.127573]  kunit_try_run_case+0x170/0x3f0
[   18.127686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.127858]  kthread+0x328/0x630
[   18.127971]  ret_from_fork+0x10/0x20
[   18.128071] 
[   18.128386] Allocated by task 268:
[   18.128431]  kasan_save_stack+0x3c/0x68
[   18.128613]  kasan_save_track+0x20/0x40
[   18.128691]  kasan_save_alloc_info+0x40/0x58
[   18.129027]  __kasan_kmalloc+0xd4/0xd8
[   18.129114]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.129282]  kasan_atomics+0xb8/0x2e0
[   18.129353]  kunit_try_run_case+0x170/0x3f0
[   18.129471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.129533]  kthread+0x328/0x630
[   18.129588]  ret_from_fork+0x10/0x20
[   18.129773] 
[   18.129807] The buggy address belongs to the object at fff00000c77e9a80
[   18.129807]  which belongs to the cache kmalloc-64 of size 64
[   18.129869] The buggy address is located 0 bytes to the right of
[   18.129869]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.129943] 
[   18.129977] The buggy address belongs to the physical page:
[   18.130010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.130078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.130174] page_type: f5(slab)
[   18.130487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.130559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.130603] page dumped because: kasan: bad access detected
[   18.131019] 
[   18.131113] Memory state around the buggy address:
[   18.131553]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.131668]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.131831] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.131899]                                      ^
[   18.131934]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132187]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132359] ==================================================================
[   18.133032] ==================================================================
[   18.133295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.133538] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.133740] 
[   18.133795] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.133894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.133924] Hardware name: linux,dummy-virt (DT)
[   18.133967] Call trace:
[   18.133991]  show_stack+0x20/0x38 (C)
[   18.134041]  dump_stack_lvl+0x8c/0xd0
[   18.134090]  print_report+0x118/0x608
[   18.134135]  kasan_report+0xdc/0x128
[   18.134189]  __asan_report_store8_noabort+0x20/0x30
[   18.134240]  kasan_atomics_helper+0x3e5c/0x4858
[   18.134287]  kasan_atomics+0x198/0x2e0
[   18.134332]  kunit_try_run_case+0x170/0x3f0
[   18.134380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.134441]  kthread+0x328/0x630
[   18.134487]  ret_from_fork+0x10/0x20
[   18.134533] 
[   18.134553] Allocated by task 268:
[   18.134584]  kasan_save_stack+0x3c/0x68
[   18.134622]  kasan_save_track+0x20/0x40
[   18.134660]  kasan_save_alloc_info+0x40/0x58
[   18.134699]  __kasan_kmalloc+0xd4/0xd8
[   18.134736]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.134775]  kasan_atomics+0xb8/0x2e0
[   18.135131]  kunit_try_run_case+0x170/0x3f0
[   18.135218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.135276]  kthread+0x328/0x630
[   18.135315]  ret_from_fork+0x10/0x20
[   18.135668] 
[   18.135728] The buggy address belongs to the object at fff00000c77e9a80
[   18.135728]  which belongs to the cache kmalloc-64 of size 64
[   18.135812] The buggy address is located 0 bytes to the right of
[   18.135812]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.136137] 
[   18.136291] The buggy address belongs to the physical page:
[   18.136327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.136668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.137007] page_type: f5(slab)
[   18.137088] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.137186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.137264] page dumped because: kasan: bad access detected
[   18.137322] 
[   18.137421] Memory state around the buggy address:
[   18.137458]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.137696]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.137846] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.137914]                                      ^
[   18.138096]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138303]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.138372] ==================================================================
[   18.204525] ==================================================================
[   18.204579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.204631] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.204684] 
[   18.204720] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.204913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.204985] Hardware name: linux,dummy-virt (DT)
[   18.205019] Call trace:
[   18.205271]  show_stack+0x20/0x38 (C)
[   18.205397]  dump_stack_lvl+0x8c/0xd0
[   18.205450]  print_report+0x118/0x608
[   18.205878]  kasan_report+0xdc/0x128
[   18.205940]  kasan_check_range+0x100/0x1a8
[   18.206140]  __kasan_check_write+0x20/0x30
[   18.206385]  kasan_atomics_helper+0x11f8/0x4858
[   18.206538]  kasan_atomics+0x198/0x2e0
[   18.206613]  kunit_try_run_case+0x170/0x3f0
[   18.206693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.206763]  kthread+0x328/0x630
[   18.206808]  ret_from_fork+0x10/0x20
[   18.207180] 
[   18.207263] Allocated by task 268:
[   18.207321]  kasan_save_stack+0x3c/0x68
[   18.207388]  kasan_save_track+0x20/0x40
[   18.207668]  kasan_save_alloc_info+0x40/0x58
[   18.207844]  __kasan_kmalloc+0xd4/0xd8
[   18.207942]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.208027]  kasan_atomics+0xb8/0x2e0
[   18.208148]  kunit_try_run_case+0x170/0x3f0
[   18.208262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.208315]  kthread+0x328/0x630
[   18.208471]  ret_from_fork+0x10/0x20
[   18.209056] 
[   18.209405] The buggy address belongs to the object at fff00000c77e9a80
[   18.209405]  which belongs to the cache kmalloc-64 of size 64
[   18.209501] The buggy address is located 0 bytes to the right of
[   18.209501]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.209621] 
[   18.209666] The buggy address belongs to the physical page:
[   18.209730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.209788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.210277] page_type: f5(slab)
[   18.210341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.210393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.210443] page dumped because: kasan: bad access detected
[   18.210478] 
[   18.210500] Memory state around the buggy address:
[   18.210534]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210580]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.210625] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.210665]                                      ^
[   18.210701]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.210745]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.210784] ==================================================================
[   18.214318] ==================================================================
[   18.214514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.214570] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.214620] 
[   18.214651] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.214734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.214763] Hardware name: linux,dummy-virt (DT)
[   18.214795] Call trace:
[   18.214827]  show_stack+0x20/0x38 (C)
[   18.214873]  dump_stack_lvl+0x8c/0xd0
[   18.214923]  print_report+0x118/0x608
[   18.215010]  kasan_report+0xdc/0x128
[   18.215055]  kasan_check_range+0x100/0x1a8
[   18.215103]  __kasan_check_write+0x20/0x30
[   18.215150]  kasan_atomics_helper+0x12d8/0x4858
[   18.215244]  kasan_atomics+0x198/0x2e0
[   18.215288]  kunit_try_run_case+0x170/0x3f0
[   18.215352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.215408]  kthread+0x328/0x630
[   18.215452]  ret_from_fork+0x10/0x20
[   18.215607] 
[   18.215631] Allocated by task 268:
[   18.215664]  kasan_save_stack+0x3c/0x68
[   18.215705]  kasan_save_track+0x20/0x40
[   18.215847]  kasan_save_alloc_info+0x40/0x58
[   18.215906]  __kasan_kmalloc+0xd4/0xd8
[   18.215989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.216035]  kasan_atomics+0xb8/0x2e0
[   18.216081]  kunit_try_run_case+0x170/0x3f0
[   18.216126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.216193]  kthread+0x328/0x630
[   18.216237]  ret_from_fork+0x10/0x20
[   18.216284] 
[   18.216323] The buggy address belongs to the object at fff00000c77e9a80
[   18.216323]  which belongs to the cache kmalloc-64 of size 64
[   18.216558] The buggy address is located 0 bytes to the right of
[   18.216558]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.216644] 
[   18.216682] The buggy address belongs to the physical page:
[   18.216716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.216779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.216979] page_type: f5(slab)
[   18.217049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.217107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.217232] page dumped because: kasan: bad access detected
[   18.217289] 
[   18.217318] Memory state around the buggy address:
[   18.217353]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217406]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217465] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.217505]                                      ^
[   18.217540]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.217583]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.217814] ==================================================================
[   18.245845] ==================================================================
[   18.245907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.245990] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.246146] 
[   18.246295] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.246404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.246479] Hardware name: linux,dummy-virt (DT)
[   18.246569] Call trace:
[   18.246654]  show_stack+0x20/0x38 (C)
[   18.246723]  dump_stack_lvl+0x8c/0xd0
[   18.246827]  print_report+0x118/0x608
[   18.246913]  kasan_report+0xdc/0x128
[   18.246992]  kasan_check_range+0x100/0x1a8
[   18.247048]  __kasan_check_write+0x20/0x30
[   18.247097]  kasan_atomics_helper+0x15b4/0x4858
[   18.247177]  kasan_atomics+0x198/0x2e0
[   18.247311]  kunit_try_run_case+0x170/0x3f0
[   18.247361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.247417]  kthread+0x328/0x630
[   18.247461]  ret_from_fork+0x10/0x20
[   18.247508] 
[   18.247530] Allocated by task 268:
[   18.247793]  kasan_save_stack+0x3c/0x68
[   18.247896]  kasan_save_track+0x20/0x40
[   18.247972]  kasan_save_alloc_info+0x40/0x58
[   18.248081]  __kasan_kmalloc+0xd4/0xd8
[   18.248161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.248453]  kasan_atomics+0xb8/0x2e0
[   18.248525]  kunit_try_run_case+0x170/0x3f0
[   18.248578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.248625]  kthread+0x328/0x630
[   18.248662]  ret_from_fork+0x10/0x20
[   18.248700] 
[   18.248723] The buggy address belongs to the object at fff00000c77e9a80
[   18.248723]  which belongs to the cache kmalloc-64 of size 64
[   18.248783] The buggy address is located 0 bytes to the right of
[   18.248783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.248848] 
[   18.248869] The buggy address belongs to the physical page:
[   18.248912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.248988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.249036] page_type: f5(slab)
[   18.249075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.249126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.249175] page dumped because: kasan: bad access detected
[   18.249219] 
[   18.249241] Memory state around the buggy address:
[   18.249274]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249319]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.249362] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.249418]                                      ^
[   18.249454]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.249514]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.249571] ==================================================================
[   18.167287] ==================================================================
[   18.167349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.167549] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.167615] 
[   18.167789] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.167886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.168000] Hardware name: linux,dummy-virt (DT)
[   18.168038] Call trace:
[   18.168064]  show_stack+0x20/0x38 (C)
[   18.168137]  dump_stack_lvl+0x8c/0xd0
[   18.168444]  print_report+0x118/0x608
[   18.168502]  kasan_report+0xdc/0x128
[   18.168564]  kasan_check_range+0x100/0x1a8
[   18.168614]  __kasan_check_write+0x20/0x30
[   18.168660]  kasan_atomics_helper+0xff0/0x4858
[   18.168750]  kasan_atomics+0x198/0x2e0
[   18.168816]  kunit_try_run_case+0x170/0x3f0
[   18.168864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.168919]  kthread+0x328/0x630
[   18.168977]  ret_from_fork+0x10/0x20
[   18.169023] 
[   18.169055] Allocated by task 268:
[   18.169094]  kasan_save_stack+0x3c/0x68
[   18.169143]  kasan_save_track+0x20/0x40
[   18.169191]  kasan_save_alloc_info+0x40/0x58
[   18.169231]  __kasan_kmalloc+0xd4/0xd8
[   18.169269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.169315]  kasan_atomics+0xb8/0x2e0
[   18.169355]  kunit_try_run_case+0x170/0x3f0
[   18.169395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.169440]  kthread+0x328/0x630
[   18.169478]  ret_from_fork+0x10/0x20
[   18.169516] 
[   18.169537] The buggy address belongs to the object at fff00000c77e9a80
[   18.169537]  which belongs to the cache kmalloc-64 of size 64
[   18.169598] The buggy address is located 0 bytes to the right of
[   18.169598]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.169669] 
[   18.169700] The buggy address belongs to the physical page:
[   18.169732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.169795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.169852] page_type: f5(slab)
[   18.169899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.170684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.170751] page dumped because: kasan: bad access detected
[   18.170804] 
[   18.170847] Memory state around the buggy address:
[   18.170922]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.170981]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.171025] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.171067]                                      ^
[   18.171286]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.171560]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.171643] ==================================================================
[   18.278873] ==================================================================
[   18.278926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.278986] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.279050] 
[   18.279082] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.279184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.279249] Hardware name: linux,dummy-virt (DT)
[   18.279465] Call trace:
[   18.279638]  show_stack+0x20/0x38 (C)
[   18.280077]  dump_stack_lvl+0x8c/0xd0
[   18.280668]  print_report+0x118/0x608
[   18.280782]  kasan_report+0xdc/0x128
[   18.281228]  __asan_report_load8_noabort+0x20/0x30
[   18.281285]  kasan_atomics_helper+0x3e10/0x4858
[   18.281749]  kasan_atomics+0x198/0x2e0
[   18.282074]  kunit_try_run_case+0x170/0x3f0
[   18.282311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.282479]  kthread+0x328/0x630
[   18.282556]  ret_from_fork+0x10/0x20
[   18.282776] 
[   18.282986] Allocated by task 268:
[   18.283048]  kasan_save_stack+0x3c/0x68
[   18.283199]  kasan_save_track+0x20/0x40
[   18.283295]  kasan_save_alloc_info+0x40/0x58
[   18.283598]  __kasan_kmalloc+0xd4/0xd8
[   18.283693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.283760]  kasan_atomics+0xb8/0x2e0
[   18.283895]  kunit_try_run_case+0x170/0x3f0
[   18.284037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284121]  kthread+0x328/0x630
[   18.284160]  ret_from_fork+0x10/0x20
[   18.284235] 
[   18.284558] The buggy address belongs to the object at fff00000c77e9a80
[   18.284558]  which belongs to the cache kmalloc-64 of size 64
[   18.284665] The buggy address is located 0 bytes to the right of
[   18.284665]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.284996] 
[   18.285099] The buggy address belongs to the physical page:
[   18.285159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.285256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.285390] page_type: f5(slab)
[   18.285468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.285548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.285672] page dumped because: kasan: bad access detected
[   18.285732] 
[   18.285770] Memory state around the buggy address:
[   18.286106]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.286219]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.286323] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.286394]                                      ^
[   18.286456]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286922]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.286978] ==================================================================
[   18.288266] ==================================================================
[   18.288320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.288373] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.288425] 
[   18.288505] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.288618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.288909] Hardware name: linux,dummy-virt (DT)
[   18.289191] Call trace:
[   18.289300]  show_stack+0x20/0x38 (C)
[   18.289360]  dump_stack_lvl+0x8c/0xd0
[   18.289487]  print_report+0x118/0x608
[   18.289565]  kasan_report+0xdc/0x128
[   18.289631]  kasan_check_range+0x100/0x1a8
[   18.289698]  __kasan_check_write+0x20/0x30
[   18.289832]  kasan_atomics_helper+0x175c/0x4858
[   18.289885]  kasan_atomics+0x198/0x2e0
[   18.289929]  kunit_try_run_case+0x170/0x3f0
[   18.290016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290080]  kthread+0x328/0x630
[   18.290125]  ret_from_fork+0x10/0x20
[   18.290748] 
[   18.290797] Allocated by task 268:
[   18.290855]  kasan_save_stack+0x3c/0x68
[   18.290992]  kasan_save_track+0x20/0x40
[   18.291060]  kasan_save_alloc_info+0x40/0x58
[   18.291146]  __kasan_kmalloc+0xd4/0xd8
[   18.291280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.291322]  kasan_atomics+0xb8/0x2e0
[   18.291359]  kunit_try_run_case+0x170/0x3f0
[   18.291399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.291666]  kthread+0x328/0x630
[   18.291830]  ret_from_fork+0x10/0x20
[   18.291895] 
[   18.291934] The buggy address belongs to the object at fff00000c77e9a80
[   18.291934]  which belongs to the cache kmalloc-64 of size 64
[   18.292463] The buggy address is located 0 bytes to the right of
[   18.292463]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.292549] 
[   18.292583] The buggy address belongs to the physical page:
[   18.292634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.292689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.292739] page_type: f5(slab)
[   18.292896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.292977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.293020] page dumped because: kasan: bad access detected
[   18.293055] 
[   18.293104] Memory state around the buggy address:
[   18.293138]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293183]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293227] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.293268]                                      ^
[   18.293329]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.293398]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.293445] ==================================================================
[   18.227859] ==================================================================
[   18.228240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.228346] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.228399] 
[   18.228437] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.228552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.228589] Hardware name: linux,dummy-virt (DT)
[   18.228638] Call trace:
[   18.228663]  show_stack+0x20/0x38 (C)
[   18.228716]  dump_stack_lvl+0x8c/0xd0
[   18.228881]  print_report+0x118/0x608
[   18.228940]  kasan_report+0xdc/0x128
[   18.228998]  kasan_check_range+0x100/0x1a8
[   18.229046]  __kasan_check_write+0x20/0x30
[   18.229169]  kasan_atomics_helper+0x1414/0x4858
[   18.229245]  kasan_atomics+0x198/0x2e0
[   18.229289]  kunit_try_run_case+0x170/0x3f0
[   18.229352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.229415]  kthread+0x328/0x630
[   18.229467]  ret_from_fork+0x10/0x20
[   18.229516] 
[   18.229562] Allocated by task 268:
[   18.229594]  kasan_save_stack+0x3c/0x68
[   18.229639]  kasan_save_track+0x20/0x40
[   18.229678]  kasan_save_alloc_info+0x40/0x58
[   18.229717]  __kasan_kmalloc+0xd4/0xd8
[   18.229762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.229800]  kasan_atomics+0xb8/0x2e0
[   18.229836]  kunit_try_run_case+0x170/0x3f0
[   18.229875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.229923]  kthread+0x328/0x630
[   18.229972]  ret_from_fork+0x10/0x20
[   18.230009] 
[   18.230031] The buggy address belongs to the object at fff00000c77e9a80
[   18.230031]  which belongs to the cache kmalloc-64 of size 64
[   18.230089] The buggy address is located 0 bytes to the right of
[   18.230089]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.230354] 
[   18.230392] The buggy address belongs to the physical page:
[   18.230478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.230552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.230611] page_type: f5(slab)
[   18.230650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.230793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.230883] page dumped because: kasan: bad access detected
[   18.230979] 
[   18.231030] Memory state around the buggy address:
[   18.231100]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231181]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231257] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.231299]                                      ^
[   18.231335]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.231377]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.231440] ==================================================================
[   18.273595] ==================================================================
[   18.273668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.273723] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.273775] 
[   18.274075] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.274263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274334] Hardware name: linux,dummy-virt (DT)
[   18.274406] Call trace:
[   18.274476]  show_stack+0x20/0x38 (C)
[   18.274583]  dump_stack_lvl+0x8c/0xd0
[   18.274630]  print_report+0x118/0x608
[   18.274678]  kasan_report+0xdc/0x128
[   18.274864]  kasan_check_range+0x100/0x1a8
[   18.275357]  __kasan_check_write+0x20/0x30
[   18.275591]  kasan_atomics_helper+0x16d0/0x4858
[   18.275726]  kasan_atomics+0x198/0x2e0
[   18.275794]  kunit_try_run_case+0x170/0x3f0
[   18.275935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276007]  kthread+0x328/0x630
[   18.276218]  ret_from_fork+0x10/0x20
[   18.276297] 
[   18.276325] Allocated by task 268:
[   18.276370]  kasan_save_stack+0x3c/0x68
[   18.276425]  kasan_save_track+0x20/0x40
[   18.276485]  kasan_save_alloc_info+0x40/0x58
[   18.276527]  __kasan_kmalloc+0xd4/0xd8
[   18.276572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.276613]  kasan_atomics+0xb8/0x2e0
[   18.276657]  kunit_try_run_case+0x170/0x3f0
[   18.276698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276758]  kthread+0x328/0x630
[   18.276805]  ret_from_fork+0x10/0x20
[   18.276842] 
[   18.276868] The buggy address belongs to the object at fff00000c77e9a80
[   18.276868]  which belongs to the cache kmalloc-64 of size 64
[   18.276934] The buggy address is located 0 bytes to the right of
[   18.276934]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.277015] 
[   18.277039] The buggy address belongs to the physical page:
[   18.277088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.277152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.277209] page_type: f5(slab)
[   18.277271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.277324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.277386] page dumped because: kasan: bad access detected
[   18.277421] 
[   18.277443] Memory state around the buggy address:
[   18.277477]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.277522]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.277576] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.277625]                                      ^
[   18.277662]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277707]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277745] ==================================================================
[   18.015983] ==================================================================
[   18.016032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.016084] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.016135] 
[   18.016166] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.016246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.016428]  print_report+0x118/0x608
[   18.016999]  kasan_save_alloc_info+0x40/0x58
[   18.017075]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.017386] The buggy address is located 0 bytes to the right of
[   18.017386]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.018217]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019025] Call trace:
[   18.019049]  show_stack+0x20/0x38 (C)
[   18.019099]  dump_stack_lvl+0x8c/0xd0
[   18.019145]  print_report+0x118/0x608
[   18.019190]  kasan_report+0xdc/0x128
[   18.019235]  kasan_check_range+0x100/0x1a8
[   18.019281]  __kasan_check_write+0x20/0x30
[   18.019329]  kasan_atomics_helper+0x934/0x4858
[   18.019375]  kasan_atomics+0x198/0x2e0
[   18.019420]  kunit_try_run_case+0x170/0x3f0
[   18.019471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.019536]  kthread+0x328/0x630
[   18.019581]  ret_from_fork+0x10/0x20
[   18.019629] 
[   18.019650] Allocated by task 268:
[   18.019688]  kasan_save_stack+0x3c/0x68
[   18.019730]  kasan_save_track+0x20/0x40
[   18.019766]  kasan_save_alloc_info+0x40/0x58
[   18.019807]  __kasan_kmalloc+0xd4/0xd8
[   18.019845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.019882]  kasan_atomics+0xb8/0x2e0
[   18.019918]  kunit_try_run_case+0x170/0x3f0
[   18.019971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.020018]  kthread+0x328/0x630
[   18.020056]  ret_from_fork+0x10/0x20
[   18.020093] 
[   18.020113] The buggy address belongs to the object at fff00000c77e9a80
[   18.020113]  which belongs to the cache kmalloc-64 of size 64
[   18.020167] The buggy address is located 0 bytes to the right of
[   18.020167]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.020259] 
[   18.020281] The buggy address belongs to the physical page:
[   18.020320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.020372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.020417] page_type: f5(slab)
[   18.020465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.020524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.020566] page dumped because: kasan: bad access detected
[   18.020609] 
[   18.020629] Memory state around the buggy address:
[   18.020660]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.020704]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.020757] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.020805]                                      ^
[   18.020839]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020883]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.020924] ==================================================================
[   18.031422] ==================================================================
[   18.031630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.031693] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.031761] 
[   18.031828] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.031985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.032022] Hardware name: linux,dummy-virt (DT)
[   18.032055] Call trace:
[   18.032079]  show_stack+0x20/0x38 (C)
[   18.032127]  dump_stack_lvl+0x8c/0xd0
[   18.032174]  print_report+0x118/0x608
[   18.032220]  kasan_report+0xdc/0x128
[   18.032265]  kasan_check_range+0x100/0x1a8
[   18.032312]  __kasan_check_write+0x20/0x30
[   18.032360]  kasan_atomics_helper+0xa6c/0x4858
[   18.032407]  kasan_atomics+0x198/0x2e0
[   18.032763]  kasan_save_track+0x20/0x40
[   18.032940]  kasan_save_alloc_info+0x40/0x58
[   18.032994]  __kasan_kmalloc+0xd4/0xd8
[   18.033031]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.033116]  kasan_atomics+0xb8/0x2e0
[   18.033183]  kunit_try_run_case+0x170/0x3f0
[   18.033226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.033273]  kthread+0x328/0x630
[   18.033310]  ret_from_fork+0x10/0x20
[   18.033349] 
[   18.033376] The buggy address belongs to the object at fff00000c77e9a80
[   18.033376]  which belongs to the cache kmalloc-64 of size 64
[   18.034114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.034426] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.035742] Call trace:
[   18.036057]  kasan_check_range+0x100/0x1a8
[   18.037088]  kasan_save_alloc_info+0x40/0x58
[   18.037138]  __kasan_kmalloc+0xd4/0xd8
[   18.037213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.037315]  kasan_atomics+0xb8/0x2e0
[   18.037382]  kunit_try_run_case+0x170/0x3f0
[   18.037440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.037487]  kthread+0x328/0x630
[   18.037559]  ret_from_fork+0x10/0x20
[   18.037598] 
[   18.037619] The buggy address belongs to the object at fff00000c77e9a80
[   18.037619]  which belongs to the cache kmalloc-64 of size 64
[   18.037679] The buggy address is located 0 bytes to the right of
[   18.037679]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.037746] 
[   18.037768] The buggy address belongs to the physical page:
[   18.037800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.037928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.037997] page_type: f5(slab)
[   18.038034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.038088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.038554] 
[   18.038837]                                      ^
[   18.039345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   18.040260]  kasan_atomics_helper+0x3dcc/0x4858
[   18.041676]  __kasan_kmalloc+0xd4/0xd8
[   18.042147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.042609]  ret_from_fork+0x10/0x20
[   18.043593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.044807]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.045168]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.045964]  dump_stack_lvl+0x8c/0xd0
[   18.049659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.050959] The buggy address is located 0 bytes to the right of
[   18.050959]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.051984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.052774] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.053806] ==================================================================
[   18.249759] ==================================================================
[   18.249804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.249860] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.250425] 
[   18.250606] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.250709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.250737] Hardware name: linux,dummy-virt (DT)
[   18.250770] Call trace:
[   18.250793]  show_stack+0x20/0x38 (C)
[   18.250845]  dump_stack_lvl+0x8c/0xd0
[   18.250995]  print_report+0x118/0x608
[   18.251073]  kasan_report+0xdc/0x128
[   18.251148]  __asan_report_load8_noabort+0x20/0x30
[   18.251255]  kasan_atomics_helper+0x3db0/0x4858
[   18.251535]  kasan_atomics+0x198/0x2e0
[   18.251602]  kunit_try_run_case+0x170/0x3f0
[   18.251653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252003]  kthread+0x328/0x630
[   18.252121]  ret_from_fork+0x10/0x20
[   18.252194] 
[   18.252604] Allocated by task 268:
[   18.252741]  kasan_save_stack+0x3c/0x68
[   18.252816]  kasan_save_track+0x20/0x40
[   18.252920]  kasan_save_alloc_info+0x40/0x58
[   18.252995]  __kasan_kmalloc+0xd4/0xd8
[   18.253092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.253132]  kasan_atomics+0xb8/0x2e0
[   18.253352]  kunit_try_run_case+0x170/0x3f0
[   18.253764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.253852]  kthread+0x328/0x630
[   18.253964]  ret_from_fork+0x10/0x20
[   18.254078] 
[   18.254175] The buggy address belongs to the object at fff00000c77e9a80
[   18.254175]  which belongs to the cache kmalloc-64 of size 64
[   18.254260] The buggy address is located 0 bytes to the right of
[   18.254260]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.254435] 
[   18.254476] The buggy address belongs to the physical page:
[   18.254510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.254683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.254899] page_type: f5(slab)
[   18.254985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.255088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.255162] page dumped because: kasan: bad access detected
[   18.255489] 
[   18.255534] Memory state around the buggy address:
[   18.255626]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255675]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.255742] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.255925]                                      ^
[   18.256132]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256184]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.256510] ==================================================================
[   18.147110] ==================================================================
[   18.147166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.147238] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.147433] 
[   18.147792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.147905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.148085] Hardware name: linux,dummy-virt (DT)
[   18.148180] Call trace:
[   18.148228]  show_stack+0x20/0x38 (C)
[   18.148280]  dump_stack_lvl+0x8c/0xd0
[   18.148381]  print_report+0x118/0x608
[   18.148449]  kasan_report+0xdc/0x128
[   18.148513]  kasan_check_range+0x100/0x1a8
[   18.148560]  __kasan_check_write+0x20/0x30
[   18.150003]  kasan_atomics_helper+0xf20/0x4858
[   18.150472]  kasan_atomics+0x198/0x2e0
[   18.150653]  kunit_try_run_case+0x170/0x3f0
[   18.150711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.151099]  kthread+0x328/0x630
[   18.151278]  ret_from_fork+0x10/0x20
[   18.151378] 
[   18.151521] Allocated by task 268:
[   18.151613]  kasan_save_stack+0x3c/0x68
[   18.151680]  kasan_save_track+0x20/0x40
[   18.151735]  kasan_save_alloc_info+0x40/0x58
[   18.152140]  __kasan_kmalloc+0xd4/0xd8
[   18.153076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.153617]  kasan_atomics+0xb8/0x2e0
[   18.153807]  kunit_try_run_case+0x170/0x3f0
[   18.153995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.154061]  kthread+0x328/0x630
[   18.154174]  ret_from_fork+0x10/0x20
[   18.154217] 
[   18.154548] The buggy address belongs to the object at fff00000c77e9a80
[   18.154548]  which belongs to the cache kmalloc-64 of size 64
[   18.154640] The buggy address is located 0 bytes to the right of
[   18.154640]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.155021] 
[   18.155068] The buggy address belongs to the physical page:
[   18.155419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.155515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.155603] page_type: f5(slab)
[   18.155938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.156085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.156130] page dumped because: kasan: bad access detected
[   18.156172] 
[   18.156492] Memory state around the buggy address:
[   18.156540]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.156588]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.156634] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.156676]                                      ^
[   18.156761]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156817]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.156855] ==================================================================
[   18.197379] ==================================================================
[   18.197429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.197474] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.197525] 
[   18.197556] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.197640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.197668] Hardware name: linux,dummy-virt (DT)
[   18.197704] Call trace:
[   18.197728]  show_stack+0x20/0x38 (C)
[   18.197775]  dump_stack_lvl+0x8c/0xd0
[   18.197822]  print_report+0x118/0x608
[   18.197869]  kasan_report+0xdc/0x128
[   18.198036]  kasan_check_range+0x100/0x1a8
[   18.198093]  __kasan_check_write+0x20/0x30
[   18.198165]  kasan_atomics_helper+0x1190/0x4858
[   18.198213]  kasan_atomics+0x198/0x2e0
[   18.198258]  kunit_try_run_case+0x170/0x3f0
[   18.198926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199122]  kthread+0x328/0x630
[   18.199258]  ret_from_fork+0x10/0x20
[   18.199344] 
[   18.199412] Allocated by task 268:
[   18.199731]  kasan_save_stack+0x3c/0x68
[   18.199829]  kasan_save_track+0x20/0x40
[   18.199898]  kasan_save_alloc_info+0x40/0x58
[   18.199940]  __kasan_kmalloc+0xd4/0xd8
[   18.200016]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.200081]  kasan_atomics+0xb8/0x2e0
[   18.200135]  kunit_try_run_case+0x170/0x3f0
[   18.200196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.200285]  kthread+0x328/0x630
[   18.200371]  ret_from_fork+0x10/0x20
[   18.200614] 
[   18.200675] The buggy address belongs to the object at fff00000c77e9a80
[   18.200675]  which belongs to the cache kmalloc-64 of size 64
[   18.200967] The buggy address is located 0 bytes to the right of
[   18.200967]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.201080] 
[   18.201164] The buggy address belongs to the physical page:
[   18.201509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.201991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.202245] page_type: f5(slab)
[   18.202303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.202499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.202552] page dumped because: kasan: bad access detected
[   18.202617] 
[   18.202653] Memory state around the buggy address:
[   18.202693]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.202740]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.202791] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.202856]                                      ^
[   18.202893]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.202937]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.203534] ==================================================================
[   18.117442] ==================================================================
[   18.117495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.117563] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.117664] 
[   18.117698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.117789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.117888] Hardware name: linux,dummy-virt (DT)
[   18.117933] Call trace:
[   18.117967]  show_stack+0x20/0x38 (C)
[   18.118018]  dump_stack_lvl+0x8c/0xd0
[   18.118072]  print_report+0x118/0x608
[   18.118119]  kasan_report+0xdc/0x128
[   18.118505]  __asan_report_load8_noabort+0x20/0x30
[   18.118584]  kasan_atomics_helper+0x3f58/0x4858
[   18.118647]  kasan_atomics+0x198/0x2e0
[   18.118709]  kunit_try_run_case+0x170/0x3f0
[   18.118766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.118828]  kthread+0x328/0x630
[   18.119269]  ret_from_fork+0x10/0x20
[   18.119372] 
[   18.119639] Allocated by task 268:
[   18.119745]  kasan_save_stack+0x3c/0x68
[   18.119895]  kasan_save_track+0x20/0x40
[   18.119971]  kasan_save_alloc_info+0x40/0x58
[   18.120383]  __kasan_kmalloc+0xd4/0xd8
[   18.120480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.120547]  kasan_atomics+0xb8/0x2e0
[   18.120983]  kunit_try_run_case+0x170/0x3f0
[   18.121048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.121381]  kthread+0x328/0x630
[   18.121478]  ret_from_fork+0x10/0x20
[   18.121582] 
[   18.121604] The buggy address belongs to the object at fff00000c77e9a80
[   18.121604]  which belongs to the cache kmalloc-64 of size 64
[   18.121978] The buggy address is located 0 bytes to the right of
[   18.121978]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.122181] 
[   18.122301] The buggy address belongs to the physical page:
[   18.122506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.122703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.122911] page_type: f5(slab)
[   18.123018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.123091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.123317] page dumped because: kasan: bad access detected
[   18.123357] 
[   18.123386] Memory state around the buggy address:
[   18.123523]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.124074]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.124161] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.124204]                                      ^
[   18.124245]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124314]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124354] ==================================================================
[   18.257844] ==================================================================
[   18.257908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.258333] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.258517] 
[   18.258802] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.258994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.259054] Hardware name: linux,dummy-virt (DT)
[   18.259119] Call trace:
[   18.259187]  show_stack+0x20/0x38 (C)
[   18.259460]  dump_stack_lvl+0x8c/0xd0
[   18.259536]  print_report+0x118/0x608
[   18.259624]  kasan_report+0xdc/0x128
[   18.259695]  kasan_check_range+0x100/0x1a8
[   18.259759]  __kasan_check_write+0x20/0x30
[   18.259808]  kasan_atomics_helper+0x1644/0x4858
[   18.259864]  kasan_atomics+0x198/0x2e0
[   18.259908]  kunit_try_run_case+0x170/0x3f0
[   18.259985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260041]  kthread+0x328/0x630
[   18.260087]  ret_from_fork+0x10/0x20
[   18.260143] 
[   18.260170] Allocated by task 268:
[   18.260215]  kasan_save_stack+0x3c/0x68
[   18.260268]  kasan_save_track+0x20/0x40
[   18.260316]  kasan_save_alloc_info+0x40/0x58
[   18.260377]  __kasan_kmalloc+0xd4/0xd8
[   18.260414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.260452]  kasan_atomics+0xb8/0x2e0
[   18.260504]  kunit_try_run_case+0x170/0x3f0
[   18.260544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260600]  kthread+0x328/0x630
[   18.260636]  ret_from_fork+0x10/0x20
[   18.260673] 
[   18.260710] The buggy address belongs to the object at fff00000c77e9a80
[   18.260710]  which belongs to the cache kmalloc-64 of size 64
[   18.260783] The buggy address is located 0 bytes to the right of
[   18.260783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.260848] 
[   18.260872] The buggy address belongs to the physical page:
[   18.260904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.260970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.261244] page_type: f5(slab)
[   18.261683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.262046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.262352] page dumped because: kasan: bad access detected
[   18.262486] 
[   18.262512] Memory state around the buggy address:
[   18.262835]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.263920]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.264135] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.264214]                                      ^
[   18.264412]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264486]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264535] ==================================================================
[   18.094306] ==================================================================
[   18.094562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.094751] Write of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.095114] 
[   18.095189] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.095392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.095452] Hardware name: linux,dummy-virt (DT)
[   18.095547] Call trace:
[   18.095649]  show_stack+0x20/0x38 (C)
[   18.095705]  dump_stack_lvl+0x8c/0xd0
[   18.095754]  print_report+0x118/0x608
[   18.095826]  kasan_report+0xdc/0x128
[   18.096263]  kasan_check_range+0x100/0x1a8
[   18.096492]  __kasan_check_write+0x20/0x30
[   18.096670]  kasan_atomics_helper+0xd3c/0x4858
[   18.096766]  kasan_atomics+0x198/0x2e0
[   18.096841]  kunit_try_run_case+0x170/0x3f0
[   18.097006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.097076]  kthread+0x328/0x630
[   18.097459]  ret_from_fork+0x10/0x20
[   18.097557] 
[   18.097602] Allocated by task 268:
[   18.097978]  kasan_save_stack+0x3c/0x68
[   18.098063]  kasan_save_track+0x20/0x40
[   18.098205]  kasan_save_alloc_info+0x40/0x58
[   18.098252]  __kasan_kmalloc+0xd4/0xd8
[   18.098535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.098646]  kasan_atomics+0xb8/0x2e0
[   18.098930]  kunit_try_run_case+0x170/0x3f0
[   18.099016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.099292]  kthread+0x328/0x630
[   18.099507]  ret_from_fork+0x10/0x20
[   18.099718] 
[   18.099783] The buggy address belongs to the object at fff00000c77e9a80
[   18.099783]  which belongs to the cache kmalloc-64 of size 64
[   18.099968] The buggy address is located 0 bytes to the right of
[   18.099968]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.100181] 
[   18.100226] The buggy address belongs to the physical page:
[   18.100263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.100347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.100668] page_type: f5(slab)
[   18.100728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.101058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.101135] page dumped because: kasan: bad access detected
[   18.101191] 
[   18.101224] Memory state around the buggy address:
[   18.101308]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.101379]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.101424] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.101467]                                      ^
[   18.101509]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101552]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101591] ==================================================================
[   18.223884] ==================================================================
[   18.223930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.224075] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.224221] 
[   18.224288] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.224400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.224445] Hardware name: linux,dummy-virt (DT)
[   18.224479] Call trace:
[   18.224509]  show_stack+0x20/0x38 (C)
[   18.224570]  dump_stack_lvl+0x8c/0xd0
[   18.224676]  print_report+0x118/0x608
[   18.224745]  kasan_report+0xdc/0x128
[   18.224876]  __asan_report_load8_noabort+0x20/0x30
[   18.224987]  kasan_atomics_helper+0x3f04/0x4858
[   18.225038]  kasan_atomics+0x198/0x2e0
[   18.225082]  kunit_try_run_case+0x170/0x3f0
[   18.225144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.225209]  kthread+0x328/0x630
[   18.225263]  ret_from_fork+0x10/0x20
[   18.225327] 
[   18.225353] Allocated by task 268:
[   18.225394]  kasan_save_stack+0x3c/0x68
[   18.225435]  kasan_save_track+0x20/0x40
[   18.225473]  kasan_save_alloc_info+0x40/0x58
[   18.225520]  __kasan_kmalloc+0xd4/0xd8
[   18.225670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.225819]  kasan_atomics+0xb8/0x2e0
[   18.225864]  kunit_try_run_case+0x170/0x3f0
[   18.225910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.225972]  kthread+0x328/0x630
[   18.226080]  ret_from_fork+0x10/0x20
[   18.226118] 
[   18.226140] The buggy address belongs to the object at fff00000c77e9a80
[   18.226140]  which belongs to the cache kmalloc-64 of size 64
[   18.226310] The buggy address is located 0 bytes to the right of
[   18.226310]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.226433] 
[   18.226481] The buggy address belongs to the physical page:
[   18.226538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.226787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.227021] page_type: f5(slab)
[   18.227076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.227135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.227180] page dumped because: kasan: bad access detected
[   18.227213] 
[   18.227364] Memory state around the buggy address:
[   18.227398]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227443]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.227489] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.227529]                                      ^
[   18.227565]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.227610]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.227650] ==================================================================
[   18.240967] ==================================================================
[   18.241039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.241093] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.241143] 
[   18.241180] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.241270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.241509] Hardware name: linux,dummy-virt (DT)
[   18.241579] Call trace:
[   18.241605]  show_stack+0x20/0x38 (C)
[   18.241657]  dump_stack_lvl+0x8c/0xd0
[   18.241714]  print_report+0x118/0x608
[   18.241767]  kasan_report+0xdc/0x128
[   18.241812]  kasan_check_range+0x100/0x1a8
[   18.241868]  __kasan_check_write+0x20/0x30
[   18.241926]  kasan_atomics_helper+0x154c/0x4858
[   18.241993]  kasan_atomics+0x198/0x2e0
[   18.242047]  kunit_try_run_case+0x170/0x3f0
[   18.242107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.242169]  kthread+0x328/0x630
[   18.242233]  ret_from_fork+0x10/0x20
[   18.242321] 
[   18.242364] Allocated by task 268:
[   18.242394]  kasan_save_stack+0x3c/0x68
[   18.242659]  kasan_save_track+0x20/0x40
[   18.242705]  kasan_save_alloc_info+0x40/0x58
[   18.242760]  __kasan_kmalloc+0xd4/0xd8
[   18.242864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.242943]  kasan_atomics+0xb8/0x2e0
[   18.243021]  kunit_try_run_case+0x170/0x3f0
[   18.243101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.243188]  kthread+0x328/0x630
[   18.243225]  ret_from_fork+0x10/0x20
[   18.243263] 
[   18.243421] The buggy address belongs to the object at fff00000c77e9a80
[   18.243421]  which belongs to the cache kmalloc-64 of size 64
[   18.243497] The buggy address is located 0 bytes to the right of
[   18.243497]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.243580] 
[   18.243616] The buggy address belongs to the physical page:
[   18.243678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.243740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.243798] page_type: f5(slab)
[   18.243837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.243889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.243931] page dumped because: kasan: bad access detected
[   18.244456] 
[   18.244519] Memory state around the buggy address:
[   18.244607]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.244705]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.245023] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.245085]                                      ^
[   18.245181]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245248]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245349] ==================================================================
[   18.191305] ==================================================================
[   18.191361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.191416] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.191467] 
[   18.191500] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.191817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.191862] Hardware name: linux,dummy-virt (DT)
[   18.191898] Call trace:
[   18.192146]  show_stack+0x20/0x38 (C)
[   18.192224]  dump_stack_lvl+0x8c/0xd0
[   18.192414]  print_report+0x118/0x608
[   18.192476]  kasan_report+0xdc/0x128
[   18.192541]  kasan_check_range+0x100/0x1a8
[   18.192880]  __kasan_check_write+0x20/0x30
[   18.192994]  kasan_atomics_helper+0x1128/0x4858
[   18.193044]  kasan_atomics+0x198/0x2e0
[   18.193090]  kunit_try_run_case+0x170/0x3f0
[   18.193303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193375]  kthread+0x328/0x630
[   18.193420]  ret_from_fork+0x10/0x20
[   18.193694] 
[   18.193738] Allocated by task 268:
[   18.193773]  kasan_save_stack+0x3c/0x68
[   18.193818]  kasan_save_track+0x20/0x40
[   18.194045]  kasan_save_alloc_info+0x40/0x58
[   18.194196]  __kasan_kmalloc+0xd4/0xd8
[   18.194326]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.194373]  kasan_atomics+0xb8/0x2e0
[   18.194410]  kunit_try_run_case+0x170/0x3f0
[   18.194457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.194504]  kthread+0x328/0x630
[   18.194678]  ret_from_fork+0x10/0x20
[   18.194908] 
[   18.194937] The buggy address belongs to the object at fff00000c77e9a80
[   18.194937]  which belongs to the cache kmalloc-64 of size 64
[   18.195011] The buggy address is located 0 bytes to the right of
[   18.195011]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.195369] 
[   18.195507] The buggy address belongs to the physical page:
[   18.195554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.195900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.195977] page_type: f5(slab)
[   18.196017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.196350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.196494] page dumped because: kasan: bad access detected
[   18.196836] 
[   18.196867] Memory state around the buggy address:
[   18.196904]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.196961]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.197007] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.197047]                                      ^
[   18.197084]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197128]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197166] ==================================================================
[   18.211091] ==================================================================
[   18.211141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.211187] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.211373] 
[   18.211419] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.211518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.211549] Hardware name: linux,dummy-virt (DT)
[   18.211589] Call trace:
[   18.211623]  show_stack+0x20/0x38 (C)
[   18.211680]  dump_stack_lvl+0x8c/0xd0
[   18.211730]  print_report+0x118/0x608
[   18.211775]  kasan_report+0xdc/0x128
[   18.211819]  kasan_check_range+0x100/0x1a8
[   18.211867]  __kasan_check_write+0x20/0x30
[   18.211913]  kasan_atomics_helper+0x126c/0x4858
[   18.211983]  kasan_atomics+0x198/0x2e0
[   18.212036]  kunit_try_run_case+0x170/0x3f0
[   18.212085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212140]  kthread+0x328/0x630
[   18.212184]  ret_from_fork+0x10/0x20
[   18.212238] 
[   18.212259] Allocated by task 268:
[   18.212298]  kasan_save_stack+0x3c/0x68
[   18.212353]  kasan_save_track+0x20/0x40
[   18.212392]  kasan_save_alloc_info+0x40/0x58
[   18.212432]  __kasan_kmalloc+0xd4/0xd8
[   18.212469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.212507]  kasan_atomics+0xb8/0x2e0
[   18.212544]  kunit_try_run_case+0x170/0x3f0
[   18.212591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212639]  kthread+0x328/0x630
[   18.212677]  ret_from_fork+0x10/0x20
[   18.212716] 
[   18.212738] The buggy address belongs to the object at fff00000c77e9a80
[   18.212738]  which belongs to the cache kmalloc-64 of size 64
[   18.212796] The buggy address is located 0 bytes to the right of
[   18.212796]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.212861] 
[   18.212893] The buggy address belongs to the physical page:
[   18.212926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.212988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.213035] page_type: f5(slab)
[   18.213074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.213127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.213170] page dumped because: kasan: bad access detected
[   18.213203] 
[   18.213225] Memory state around the buggy address:
[   18.213723]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213785]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213849] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.213896]                                      ^
[   18.213942]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.214005]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.214061] ==================================================================
[   18.218141] ==================================================================
[   18.218339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.218392] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.218561] 
[   18.218854] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.219063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.219111] Hardware name: linux,dummy-virt (DT)
[   18.219174] Call trace:
[   18.219223]  show_stack+0x20/0x38 (C)
[   18.219300]  dump_stack_lvl+0x8c/0xd0
[   18.219378]  print_report+0x118/0x608
[   18.219445]  kasan_report+0xdc/0x128
[   18.219508]  kasan_check_range+0x100/0x1a8
[   18.219801]  __kasan_check_write+0x20/0x30
[   18.219892]  kasan_atomics_helper+0x1384/0x4858
[   18.219969]  kasan_atomics+0x198/0x2e0
[   18.220037]  kunit_try_run_case+0x170/0x3f0
[   18.220147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.220234]  kthread+0x328/0x630
[   18.220297]  ret_from_fork+0x10/0x20
[   18.220381] 
[   18.220441] Allocated by task 268:
[   18.220483]  kasan_save_stack+0x3c/0x68
[   18.220523]  kasan_save_track+0x20/0x40
[   18.220711]  kasan_save_alloc_info+0x40/0x58
[   18.220753]  __kasan_kmalloc+0xd4/0xd8
[   18.221809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.221857]  kasan_atomics+0xb8/0x2e0
[   18.221933]  kunit_try_run_case+0x170/0x3f0
[   18.222011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222082]  kthread+0x328/0x630
[   18.222145]  ret_from_fork+0x10/0x20
[   18.222230] 
[   18.222290] The buggy address belongs to the object at fff00000c77e9a80
[   18.222290]  which belongs to the cache kmalloc-64 of size 64
[   18.222364] The buggy address is located 0 bytes to the right of
[   18.222364]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.222434] 
[   18.222457] The buggy address belongs to the physical page:
[   18.222489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.222541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.222589] page_type: f5(slab)
[   18.222628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.222680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.222841] page dumped because: kasan: bad access detected
[   18.222888] 
[   18.222926] Memory state around the buggy address:
[   18.222990]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223058]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.223158] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.223248]                                      ^
[   18.223489]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223544]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.223597] ==================================================================
[   18.084104] ==================================================================
[   18.084435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.084602] Read of size 4 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.084665] 
[   18.084698] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.084974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.085005] Hardware name: linux,dummy-virt (DT)
[   18.085150] Call trace:
[   18.085191]  show_stack+0x20/0x38 (C)
[   18.085361]  dump_stack_lvl+0x8c/0xd0
[   18.085417]  print_report+0x118/0x608
[   18.085466]  kasan_report+0xdc/0x128
[   18.085780]  __asan_report_load4_noabort+0x20/0x30
[   18.085971]  kasan_atomics_helper+0x3dd8/0x4858
[   18.086153]  kasan_atomics+0x198/0x2e0
[   18.086269]  kunit_try_run_case+0x170/0x3f0
[   18.086459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.086554]  kthread+0x328/0x630
[   18.086707]  ret_from_fork+0x10/0x20
[   18.086761] 
[   18.086781] Allocated by task 268:
[   18.087028]  kasan_save_stack+0x3c/0x68
[   18.087199]  kasan_save_track+0x20/0x40
[   18.087277]  kasan_save_alloc_info+0x40/0x58
[   18.087472]  __kasan_kmalloc+0xd4/0xd8
[   18.087520]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.087561]  kasan_atomics+0xb8/0x2e0
[   18.087744]  kunit_try_run_case+0x170/0x3f0
[   18.088333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.088476]  kthread+0x328/0x630
[   18.090057]  ret_from_fork+0x10/0x20
[   18.090179] 
[   18.090221] The buggy address belongs to the object at fff00000c77e9a80
[   18.090221]  which belongs to the cache kmalloc-64 of size 64
[   18.090783] The buggy address is located 0 bytes to the right of
[   18.090783]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.090915] 
[   18.090957] The buggy address belongs to the physical page:
[   18.091155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.091522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.091747] page_type: f5(slab)
[   18.091794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.091848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.092242] page dumped because: kasan: bad access detected
[   18.092563] 
[   18.092627] Memory state around the buggy address:
[   18.092694]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.092739]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.093210] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.093280]                                      ^
[   18.093328]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093383]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.093437] ==================================================================
[   18.294576] ==================================================================
[   18.294665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.294727] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.294780] 
[   18.294813] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.295237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.295442] Hardware name: linux,dummy-virt (DT)
[   18.295485] Call trace:
[   18.295596]  show_stack+0x20/0x38 (C)
[   18.295650]  dump_stack_lvl+0x8c/0xd0
[   18.295753]  print_report+0x118/0x608
[   18.295820]  kasan_report+0xdc/0x128
[   18.295875]  __asan_report_load8_noabort+0x20/0x30
[   18.296111]  kasan_atomics_helper+0x3e20/0x4858
[   18.296256]  kasan_atomics+0x198/0x2e0
[   18.296312]  kunit_try_run_case+0x170/0x3f0
[   18.296609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.296698]  kthread+0x328/0x630
[   18.296768]  ret_from_fork+0x10/0x20
[   18.296827] 
[   18.296931] Allocated by task 268:
[   18.297005]  kasan_save_stack+0x3c/0x68
[   18.297049]  kasan_save_track+0x20/0x40
[   18.297093]  kasan_save_alloc_info+0x40/0x58
[   18.297211]  __kasan_kmalloc+0xd4/0xd8
[   18.297251]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.297291]  kasan_atomics+0xb8/0x2e0
[   18.297344]  kunit_try_run_case+0x170/0x3f0
[   18.297404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.297701]  kthread+0x328/0x630
[   18.297789]  ret_from_fork+0x10/0x20
[   18.297838] 
[   18.298128] The buggy address belongs to the object at fff00000c77e9a80
[   18.298128]  which belongs to the cache kmalloc-64 of size 64
[   18.298241] The buggy address is located 0 bytes to the right of
[   18.298241]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.298717] 
[   18.298757] The buggy address belongs to the physical page:
[   18.298819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.298878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.299264] page_type: f5(slab)
[   18.299361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.299444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.299693] page dumped because: kasan: bad access detected
[   18.299822] 
[   18.299857] Memory state around the buggy address:
[   18.299892]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300174]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300272] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.300553]                                      ^
[   18.300627]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300764]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.300839] ==================================================================
[   18.158129] ==================================================================
[   18.158455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.158532] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.158644] 
[   18.158722] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.158923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.159238] Hardware name: linux,dummy-virt (DT)
[   18.159329] Call trace:
[   18.159389]  show_stack+0x20/0x38 (C)
[   18.159465]  dump_stack_lvl+0x8c/0xd0
[   18.159909]  print_report+0x118/0x608
[   18.160010]  kasan_report+0xdc/0x128
[   18.160374]  kasan_check_range+0x100/0x1a8
[   18.160536]  __kasan_check_write+0x20/0x30
[   18.160613]  kasan_atomics_helper+0xf88/0x4858
[   18.160999]  kasan_atomics+0x198/0x2e0
[   18.161130]  kunit_try_run_case+0x170/0x3f0
[   18.161279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.161409]  kthread+0x328/0x630
[   18.161463]  ret_from_fork+0x10/0x20
[   18.161682] 
[   18.161908] Allocated by task 268:
[   18.161972]  kasan_save_stack+0x3c/0x68
[   18.162026]  kasan_save_track+0x20/0x40
[   18.162085]  kasan_save_alloc_info+0x40/0x58
[   18.162124]  __kasan_kmalloc+0xd4/0xd8
[   18.162317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.162460]  kasan_atomics+0xb8/0x2e0
[   18.162507]  kunit_try_run_case+0x170/0x3f0
[   18.162982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.163075]  kthread+0x328/0x630
[   18.163119]  ret_from_fork+0x10/0x20
[   18.163249] 
[   18.163445] The buggy address belongs to the object at fff00000c77e9a80
[   18.163445]  which belongs to the cache kmalloc-64 of size 64
[   18.163670] The buggy address is located 0 bytes to the right of
[   18.163670]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.164003] 
[   18.164129] The buggy address belongs to the physical page:
[   18.164166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.164241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.164448] page_type: f5(slab)
[   18.164600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.164832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.165036] page dumped because: kasan: bad access detected
[   18.165233] 
[   18.165392] Memory state around the buggy address:
[   18.165457]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.165573]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.165647] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.165982]                                      ^
[   18.166173]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.166521]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.166684] ==================================================================
[   18.236718] ==================================================================
[   18.236767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.236922] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.237005] 
[   18.237069] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.237156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.237184] Hardware name: linux,dummy-virt (DT)
[   18.237217] Call trace:
[   18.237256]  show_stack+0x20/0x38 (C)
[   18.237323]  dump_stack_lvl+0x8c/0xd0
[   18.237373]  print_report+0x118/0x608
[   18.237418]  kasan_report+0xdc/0x128
[   18.237513]  kasan_check_range+0x100/0x1a8
[   18.237590]  __kasan_check_write+0x20/0x30
[   18.237749]  kasan_atomics_helper+0x14e4/0x4858
[   18.237826]  kasan_atomics+0x198/0x2e0
[   18.237887]  kunit_try_run_case+0x170/0x3f0
[   18.237938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.238088]  kthread+0x328/0x630
[   18.238157]  ret_from_fork+0x10/0x20
[   18.238363] 
[   18.238412] Allocated by task 268:
[   18.238524]  kasan_save_stack+0x3c/0x68
[   18.238637]  kasan_save_track+0x20/0x40
[   18.238690]  kasan_save_alloc_info+0x40/0x58
[   18.238740]  __kasan_kmalloc+0xd4/0xd8
[   18.238776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.238830]  kasan_atomics+0xb8/0x2e0
[   18.238866]  kunit_try_run_case+0x170/0x3f0
[   18.238909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.238975]  kthread+0x328/0x630
[   18.239012]  ret_from_fork+0x10/0x20
[   18.239050] 
[   18.239072] The buggy address belongs to the object at fff00000c77e9a80
[   18.239072]  which belongs to the cache kmalloc-64 of size 64
[   18.239422] The buggy address is located 0 bytes to the right of
[   18.239422]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.239516] 
[   18.239574] The buggy address belongs to the physical page:
[   18.239633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.239711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.239777] page_type: f5(slab)
[   18.239863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.239928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.239985] page dumped because: kasan: bad access detected
[   18.240018] 
[   18.240039] Memory state around the buggy address:
[   18.240163]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.240386] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.240452]                                      ^
[   18.240494]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.240536]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.240576] ==================================================================
[   18.182375] ==================================================================
[   18.182642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.182745] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.182983] 
[   18.183073] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.183354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.183507] Hardware name: linux,dummy-virt (DT)
[   18.183585] Call trace:
[   18.183639]  show_stack+0x20/0x38 (C)
[   18.183935]  dump_stack_lvl+0x8c/0xd0
[   18.184036]  print_report+0x118/0x608
[   18.184186]  kasan_report+0xdc/0x128
[   18.184305]  kasan_check_range+0x100/0x1a8
[   18.184364]  __kasan_check_write+0x20/0x30
[   18.184845]  kasan_atomics_helper+0x10c0/0x4858
[   18.185101]  kasan_atomics+0x198/0x2e0
[   18.185320]  kunit_try_run_case+0x170/0x3f0
[   18.185499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.185576]  kthread+0x328/0x630
[   18.185890]  ret_from_fork+0x10/0x20
[   18.186061] 
[   18.186177] Allocated by task 268:
[   18.186304]  kasan_save_stack+0x3c/0x68
[   18.186369]  kasan_save_track+0x20/0x40
[   18.186427]  kasan_save_alloc_info+0x40/0x58
[   18.186469]  __kasan_kmalloc+0xd4/0xd8
[   18.186505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.186555]  kasan_atomics+0xb8/0x2e0
[   18.186590]  kunit_try_run_case+0x170/0x3f0
[   18.186659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186706]  kthread+0x328/0x630
[   18.187138]  ret_from_fork+0x10/0x20
[   18.187349] 
[   18.187403] The buggy address belongs to the object at fff00000c77e9a80
[   18.187403]  which belongs to the cache kmalloc-64 of size 64
[   18.187580] The buggy address is located 0 bytes to the right of
[   18.187580]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.187659] 
[   18.187682] The buggy address belongs to the physical page:
[   18.187715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.188075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.188392] page_type: f5(slab)
[   18.188536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.188626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.188671] page dumped because: kasan: bad access detected
[   18.188966] 
[   18.189013] Memory state around the buggy address:
[   18.189210]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189284]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189466] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.189528]                                      ^
[   18.189816]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.189961]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.190336] ==================================================================
[   18.301621] ==================================================================
[   18.301750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.301804] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.301936] 
[   18.301991] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.302209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.302380] Hardware name: linux,dummy-virt (DT)
[   18.302479] Call trace:
[   18.302538]  show_stack+0x20/0x38 (C)
[   18.302683]  dump_stack_lvl+0x8c/0xd0
[   18.302771]  print_report+0x118/0x608
[   18.302818]  kasan_report+0xdc/0x128
[   18.302891]  kasan_check_range+0x100/0x1a8
[   18.302941]  __kasan_check_write+0x20/0x30
[   18.303000]  kasan_atomics_helper+0x17ec/0x4858
[   18.303048]  kasan_atomics+0x198/0x2e0
[   18.303109]  kunit_try_run_case+0x170/0x3f0
[   18.303158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.303228]  kthread+0x328/0x630
[   18.303287]  ret_from_fork+0x10/0x20
[   18.303335] 
[   18.303356] Allocated by task 268:
[   18.303395]  kasan_save_stack+0x3c/0x68
[   18.303437]  kasan_save_track+0x20/0x40
[   18.303474]  kasan_save_alloc_info+0x40/0x58
[   18.303532]  __kasan_kmalloc+0xd4/0xd8
[   18.303568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.303608]  kasan_atomics+0xb8/0x2e0
[   18.303643]  kunit_try_run_case+0x170/0x3f0
[   18.303692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.303739]  kthread+0x328/0x630
[   18.303775]  ret_from_fork+0x10/0x20
[   18.303823] 
[   18.303846] The buggy address belongs to the object at fff00000c77e9a80
[   18.303846]  which belongs to the cache kmalloc-64 of size 64
[   18.303918] The buggy address is located 0 bytes to the right of
[   18.303918]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.305061] 
[   18.305114] The buggy address belongs to the physical page:
[   18.305156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.306112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.306179] page_type: f5(slab)
[   18.306606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.306663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.306706] page dumped because: kasan: bad access detected
[   18.306742] 
[   18.307755] Memory state around the buggy address:
[   18.308140]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308217]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.308264] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.308580]                                      ^
[   18.308980]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.309066]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.309230] ==================================================================
[   18.139104] ==================================================================
[   18.139167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.139231] Write of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.139283] 
[   18.139318] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.139412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.139452] Hardware name: linux,dummy-virt (DT)
[   18.139501] Call trace:
[   18.139535]  show_stack+0x20/0x38 (C)
[   18.139583]  dump_stack_lvl+0x8c/0xd0
[   18.139633]  print_report+0x118/0x608
[   18.139680]  kasan_report+0xdc/0x128
[   18.139734]  kasan_check_range+0x100/0x1a8
[   18.139781]  __kasan_check_write+0x20/0x30
[   18.139829]  kasan_atomics_helper+0xeb8/0x4858
[   18.139876]  kasan_atomics+0x198/0x2e0
[   18.139919]  kunit_try_run_case+0x170/0x3f0
[   18.139981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.140036]  kthread+0x328/0x630
[   18.140080]  ret_from_fork+0x10/0x20
[   18.140786] 
[   18.140834] Allocated by task 268:
[   18.140869]  kasan_save_stack+0x3c/0x68
[   18.140914]  kasan_save_track+0x20/0x40
[   18.140972]  kasan_save_alloc_info+0x40/0x58
[   18.141014]  __kasan_kmalloc+0xd4/0xd8
[   18.141049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.141268]  kasan_atomics+0xb8/0x2e0
[   18.141320]  kunit_try_run_case+0x170/0x3f0
[   18.141472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.141582]  kthread+0x328/0x630
[   18.141625]  ret_from_fork+0x10/0x20
[   18.141999] 
[   18.142041] The buggy address belongs to the object at fff00000c77e9a80
[   18.142041]  which belongs to the cache kmalloc-64 of size 64
[   18.142103] The buggy address is located 0 bytes to the right of
[   18.142103]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.142588] 
[   18.142638] The buggy address belongs to the physical page:
[   18.143136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.143204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.143479] page_type: f5(slab)
[   18.143550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.143710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.143767] page dumped because: kasan: bad access detected
[   18.144019] 
[   18.144282] Memory state around the buggy address:
[   18.144351]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.144420]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.144697] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.144945]                                      ^
[   18.145016]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.145070]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.145444] ==================================================================
[   18.265269] ==================================================================
[   18.265649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.265716] Read of size 8 at addr fff00000c77e9ab0 by task kunit_try_catch/268
[   18.265769] 
[   18.265884] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT 
[   18.266006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.266241] Hardware name: linux,dummy-virt (DT)
[   18.266414] Call trace:
[   18.266735]  show_stack+0x20/0x38 (C)
[   18.266885]  dump_stack_lvl+0x8c/0xd0
[   18.267054]  print_report+0x118/0x608
[   18.267129]  kasan_report+0xdc/0x128
[   18.267255]  __asan_report_load8_noabort+0x20/0x30
[   18.267328]  kasan_atomics_helper+0x3df4/0x4858
[   18.267376]  kasan_atomics+0x198/0x2e0
[   18.267429]  kunit_try_run_case+0x170/0x3f0
[   18.267478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.267859]  kthread+0x328/0x630
[   18.268241]  ret_from_fork+0x10/0x20
[   18.268398] 
[   18.268456] Allocated by task 268:
[   18.268538]  kasan_save_stack+0x3c/0x68
[   18.268976]  kasan_save_track+0x20/0x40
[   18.269093]  kasan_save_alloc_info+0x40/0x58
[   18.269363]  __kasan_kmalloc+0xd4/0xd8
[   18.269584]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.269668]  kasan_atomics+0xb8/0x2e0
[   18.269740]  kunit_try_run_case+0x170/0x3f0
[   18.269871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269925]  kthread+0x328/0x630
[   18.270148]  ret_from_fork+0x10/0x20
[   18.270207] 
[   18.270352] The buggy address belongs to the object at fff00000c77e9a80
[   18.270352]  which belongs to the cache kmalloc-64 of size 64
[   18.270581] The buggy address is located 0 bytes to the right of
[   18.270581]  allocated 48-byte region [fff00000c77e9a80, fff00000c77e9ab0)
[   18.270802] 
[   18.270943] The buggy address belongs to the physical page:
[   18.271009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e9
[   18.271154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.271241] page_type: f5(slab)
[   18.271309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.271447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.271523] page dumped because: kasan: bad access detected
[   18.271558] 
[   18.271586] Memory state around the buggy address:
[   18.271925]  fff00000c77e9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272002]  fff00000c77e9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.272152] >fff00000c77e9a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.272229]                                      ^
[   18.272557]  fff00000c77e9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272618]  fff00000c77e9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272657] ==================================================================

[   14.890707] ==================================================================
[   14.891057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.891414] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.891644] 
[   14.891734] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.891796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891832] Call Trace:
[   14.891849]  <TASK>
[   14.891866]  dump_stack_lvl+0x73/0xb0
[   14.891895]  print_report+0xd1/0x650
[   14.891919]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891941]  ? kasan_atomics_helper+0x2006/0x5450
[   14.891964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891988]  ? kasan_atomics_helper+0x2006/0x5450
[   14.892011]  kasan_report+0x141/0x180
[   14.892036]  ? kasan_atomics_helper+0x2006/0x5450
[   14.892064]  kasan_check_range+0x10c/0x1c0
[   14.892086]  __kasan_check_write+0x18/0x20
[   14.892108]  kasan_atomics_helper+0x2006/0x5450
[   14.892133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.892157]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.892181]  ? kasan_atomics+0x152/0x310
[   14.892205]  kasan_atomics+0x1dc/0x310
[   14.892237]  ? __pfx_kasan_atomics+0x10/0x10
[   14.892260]  ? __pfx_read_tsc+0x10/0x10
[   14.892281]  ? ktime_get_ts64+0x86/0x230
[   14.892308]  kunit_try_run_case+0x1a5/0x480
[   14.892334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.892383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892409]  ? __kthread_parkme+0x82/0x180
[   14.892432]  ? preempt_count_sub+0x50/0x80
[   14.892459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892534]  kthread+0x337/0x6f0
[   14.892552]  ? trace_preempt_on+0x20/0xc0
[   14.892577]  ? __pfx_kthread+0x10/0x10
[   14.892597]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892621]  ? calculate_sigpending+0x7b/0xa0
[   14.892654]  ? __pfx_kthread+0x10/0x10
[   14.892675]  ret_from_fork+0x41/0x80
[   14.892697]  ? __pfx_kthread+0x10/0x10
[   14.892716]  ret_from_fork_asm+0x1a/0x30
[   14.892748]  </TASK>
[   14.892759] 
[   14.900044] Allocated by task 284:
[   14.900202]  kasan_save_stack+0x45/0x70
[   14.900425]  kasan_save_track+0x18/0x40
[   14.900589]  kasan_save_alloc_info+0x3b/0x50
[   14.900893]  __kasan_kmalloc+0xb7/0xc0
[   14.901085]  __kmalloc_cache_noprof+0x189/0x420
[   14.901266]  kasan_atomics+0x95/0x310
[   14.901401]  kunit_try_run_case+0x1a5/0x480
[   14.901551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.901772]  kthread+0x337/0x6f0
[   14.901951]  ret_from_fork+0x41/0x80
[   14.902145]  ret_from_fork_asm+0x1a/0x30
[   14.902359] 
[   14.902452] The buggy address belongs to the object at ffff8881039f4880
[   14.902452]  which belongs to the cache kmalloc-64 of size 64
[   14.903087] The buggy address is located 0 bytes to the right of
[   14.903087]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.903594] 
[   14.903696] The buggy address belongs to the physical page:
[   14.903915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.904236] flags: 0x200000000000000(node=0|zone=2)
[   14.904403] page_type: f5(slab)
[   14.904578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.905055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.905327] page dumped because: kasan: bad access detected
[   14.905587] 
[   14.905706] Memory state around the buggy address:
[   14.905876]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.906183]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.906488] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.906833]                                      ^
[   14.906989]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907206]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907535] ==================================================================
[   14.486554] ==================================================================
[   14.486951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.487292] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.487622] 
[   14.487809] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.487862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.487875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.487899] Call Trace:
[   14.487920]  <TASK>
[   14.487951]  dump_stack_lvl+0x73/0xb0
[   14.487979]  print_report+0xd1/0x650
[   14.488015]  ? __virt_addr_valid+0x1db/0x2d0
[   14.488039]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.488062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.488087]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.488120]  kasan_report+0x141/0x180
[   14.488144]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.488183]  __asan_report_store8_noabort+0x1b/0x30
[   14.488206]  kasan_atomics_helper+0x50d4/0x5450
[   14.488240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.488274]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.488297]  ? kasan_atomics+0x152/0x310
[   14.488322]  kasan_atomics+0x1dc/0x310
[   14.488354]  ? __pfx_kasan_atomics+0x10/0x10
[   14.488376]  ? __pfx_read_tsc+0x10/0x10
[   14.488398]  ? ktime_get_ts64+0x86/0x230
[   14.488425]  kunit_try_run_case+0x1a5/0x480
[   14.488452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.488476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.488502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.488527]  ? __kthread_parkme+0x82/0x180
[   14.488551]  ? preempt_count_sub+0x50/0x80
[   14.488579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.488604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.488628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.488653]  kthread+0x337/0x6f0
[   14.488671]  ? trace_preempt_on+0x20/0xc0
[   14.488697]  ? __pfx_kthread+0x10/0x10
[   14.488716]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.488739]  ? calculate_sigpending+0x7b/0xa0
[   14.488772]  ? __pfx_kthread+0x10/0x10
[   14.488792]  ret_from_fork+0x41/0x80
[   14.488814]  ? __pfx_kthread+0x10/0x10
[   14.488844]  ret_from_fork_asm+0x1a/0x30
[   14.488876]  </TASK>
[   14.488889] 
[   14.496319] Allocated by task 284:
[   14.496461]  kasan_save_stack+0x45/0x70
[   14.496614]  kasan_save_track+0x18/0x40
[   14.496800]  kasan_save_alloc_info+0x3b/0x50
[   14.497087]  __kasan_kmalloc+0xb7/0xc0
[   14.497314]  __kmalloc_cache_noprof+0x189/0x420
[   14.497668]  kasan_atomics+0x95/0x310
[   14.497893]  kunit_try_run_case+0x1a5/0x480
[   14.498101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.498290]  kthread+0x337/0x6f0
[   14.498491]  ret_from_fork+0x41/0x80
[   14.498688]  ret_from_fork_asm+0x1a/0x30
[   14.498904] 
[   14.499009] The buggy address belongs to the object at ffff8881039f4880
[   14.499009]  which belongs to the cache kmalloc-64 of size 64
[   14.499512] The buggy address is located 0 bytes to the right of
[   14.499512]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.499958] 
[   14.500062] The buggy address belongs to the physical page:
[   14.500322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.500681] flags: 0x200000000000000(node=0|zone=2)
[   14.500902] page_type: f5(slab)
[   14.501074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.501398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.501728] page dumped because: kasan: bad access detected
[   14.501956] 
[   14.502042] Memory state around the buggy address:
[   14.502254]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.502532]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.502749] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.502964]                                      ^
[   14.503118]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.503431]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.504094] ==================================================================
[   14.037737] ==================================================================
[   14.038084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.038455] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.038709] 
[   14.038792] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.038835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.038848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.038870] Call Trace:
[   14.038885]  <TASK>
[   14.038900]  dump_stack_lvl+0x73/0xb0
[   14.038924]  print_report+0xd1/0x650
[   14.038948]  ? __virt_addr_valid+0x1db/0x2d0
[   14.038970]  ? kasan_atomics_helper+0xac7/0x5450
[   14.038993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.039017]  ? kasan_atomics_helper+0xac7/0x5450
[   14.039040]  kasan_report+0x141/0x180
[   14.039065]  ? kasan_atomics_helper+0xac7/0x5450
[   14.039093]  kasan_check_range+0x10c/0x1c0
[   14.039116]  __kasan_check_write+0x18/0x20
[   14.039138]  kasan_atomics_helper+0xac7/0x5450
[   14.039161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.039186]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.039210]  ? kasan_atomics+0x152/0x310
[   14.039245]  kasan_atomics+0x1dc/0x310
[   14.039265]  ? __pfx_kasan_atomics+0x10/0x10
[   14.039288]  ? __pfx_read_tsc+0x10/0x10
[   14.039308]  ? ktime_get_ts64+0x86/0x230
[   14.039335]  kunit_try_run_case+0x1a5/0x480
[   14.039360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.039384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.039409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.039434]  ? __kthread_parkme+0x82/0x180
[   14.039456]  ? preempt_count_sub+0x50/0x80
[   14.039481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.039507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.039531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.039556]  kthread+0x337/0x6f0
[   14.039574]  ? trace_preempt_on+0x20/0xc0
[   14.039598]  ? __pfx_kthread+0x10/0x10
[   14.039618]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.039661]  ? calculate_sigpending+0x7b/0xa0
[   14.039683]  ? __pfx_kthread+0x10/0x10
[   14.039704]  ret_from_fork+0x41/0x80
[   14.039726]  ? __pfx_kthread+0x10/0x10
[   14.039746]  ret_from_fork_asm+0x1a/0x30
[   14.039778]  </TASK>
[   14.039790] 
[   14.047250] Allocated by task 284:
[   14.047430]  kasan_save_stack+0x45/0x70
[   14.047603]  kasan_save_track+0x18/0x40
[   14.047800]  kasan_save_alloc_info+0x3b/0x50
[   14.047981]  __kasan_kmalloc+0xb7/0xc0
[   14.048160]  __kmalloc_cache_noprof+0x189/0x420
[   14.048369]  kasan_atomics+0x95/0x310
[   14.048532]  kunit_try_run_case+0x1a5/0x480
[   14.048741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.048948]  kthread+0x337/0x6f0
[   14.049117]  ret_from_fork+0x41/0x80
[   14.049284]  ret_from_fork_asm+0x1a/0x30
[   14.049488] 
[   14.049569] The buggy address belongs to the object at ffff8881039f4880
[   14.049569]  which belongs to the cache kmalloc-64 of size 64
[   14.050023] The buggy address is located 0 bytes to the right of
[   14.050023]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.050401] 
[   14.050476] The buggy address belongs to the physical page:
[   14.050671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.050912] flags: 0x200000000000000(node=0|zone=2)
[   14.051091] page_type: f5(slab)
[   14.051265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.051610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.051963] page dumped because: kasan: bad access detected
[   14.052213] 
[   14.052315] Memory state around the buggy address:
[   14.052540]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.052808]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053030] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.053253]                                      ^
[   14.053408]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.053629]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.053957] ==================================================================
[   14.101723] ==================================================================
[   14.102308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.102784] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.103163] 
[   14.103292] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.103338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.103352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.103376] Call Trace:
[   14.103388]  <TASK>
[   14.103403]  dump_stack_lvl+0x73/0xb0
[   14.103619]  print_report+0xd1/0x650
[   14.103658]  ? __virt_addr_valid+0x1db/0x2d0
[   14.103681]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.103704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.103728]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.103752]  kasan_report+0x141/0x180
[   14.103777]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.103806]  __asan_report_load4_noabort+0x18/0x20
[   14.103827]  kasan_atomics_helper+0x4a84/0x5450
[   14.103851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.103875]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.103897]  ? kasan_atomics+0x152/0x310
[   14.103922]  kasan_atomics+0x1dc/0x310
[   14.103944]  ? __pfx_kasan_atomics+0x10/0x10
[   14.103967]  ? __pfx_read_tsc+0x10/0x10
[   14.103987]  ? ktime_get_ts64+0x86/0x230
[   14.104013]  kunit_try_run_case+0x1a5/0x480
[   14.104038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.104061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.104085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.104110]  ? __kthread_parkme+0x82/0x180
[   14.104133]  ? preempt_count_sub+0x50/0x80
[   14.104158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.104184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.104208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.104246]  kthread+0x337/0x6f0
[   14.104264]  ? trace_preempt_on+0x20/0xc0
[   14.104288]  ? __pfx_kthread+0x10/0x10
[   14.104307]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.104331]  ? calculate_sigpending+0x7b/0xa0
[   14.104353]  ? __pfx_kthread+0x10/0x10
[   14.104373]  ret_from_fork+0x41/0x80
[   14.104394]  ? __pfx_kthread+0x10/0x10
[   14.104414]  ret_from_fork_asm+0x1a/0x30
[   14.104445]  </TASK>
[   14.104458] 
[   14.114165] Allocated by task 284:
[   14.114416]  kasan_save_stack+0x45/0x70
[   14.114745]  kasan_save_track+0x18/0x40
[   14.114923]  kasan_save_alloc_info+0x3b/0x50
[   14.115246]  __kasan_kmalloc+0xb7/0xc0
[   14.115511]  __kmalloc_cache_noprof+0x189/0x420
[   14.115786]  kasan_atomics+0x95/0x310
[   14.116038]  kunit_try_run_case+0x1a5/0x480
[   14.116224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.116487]  kthread+0x337/0x6f0
[   14.116644]  ret_from_fork+0x41/0x80
[   14.117047]  ret_from_fork_asm+0x1a/0x30
[   14.117324] 
[   14.117405] The buggy address belongs to the object at ffff8881039f4880
[   14.117405]  which belongs to the cache kmalloc-64 of size 64
[   14.118104] The buggy address is located 0 bytes to the right of
[   14.118104]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.118707] 
[   14.118950] The buggy address belongs to the physical page:
[   14.119167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.119625] flags: 0x200000000000000(node=0|zone=2)
[   14.119867] page_type: f5(slab)
[   14.120018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.120358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.120665] page dumped because: kasan: bad access detected
[   14.120891] 
[   14.120974] Memory state around the buggy address:
[   14.121180]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.121871]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.122247] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.122623]                                      ^
[   14.122918]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.123340]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.123717] ==================================================================
[   13.930525] ==================================================================
[   13.931075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.931437] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.931955] 
[   13.932101] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.932147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.932161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.932184] Call Trace:
[   13.932197]  <TASK>
[   13.932212]  dump_stack_lvl+0x73/0xb0
[   13.932251]  print_report+0xd1/0x650
[   13.932275]  ? __virt_addr_valid+0x1db/0x2d0
[   13.932298]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.932321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.932346]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.932370]  kasan_report+0x141/0x180
[   13.932395]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.932433]  kasan_check_range+0x10c/0x1c0
[   13.932455]  __kasan_check_write+0x18/0x20
[   13.932488]  kasan_atomics_helper+0x7c7/0x5450
[   13.932513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.932537]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.932561]  ? kasan_atomics+0x152/0x310
[   13.932585]  kasan_atomics+0x1dc/0x310
[   13.932606]  ? __pfx_kasan_atomics+0x10/0x10
[   13.932629]  ? __pfx_read_tsc+0x10/0x10
[   13.932650]  ? ktime_get_ts64+0x86/0x230
[   13.932730]  kunit_try_run_case+0x1a5/0x480
[   13.932760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.932809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.932835]  ? __kthread_parkme+0x82/0x180
[   13.932869]  ? preempt_count_sub+0x50/0x80
[   13.932895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.932920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.932956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.932981]  kthread+0x337/0x6f0
[   13.932999]  ? trace_preempt_on+0x20/0xc0
[   13.933023]  ? __pfx_kthread+0x10/0x10
[   13.933043]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.933065]  ? calculate_sigpending+0x7b/0xa0
[   13.933089]  ? __pfx_kthread+0x10/0x10
[   13.933109]  ret_from_fork+0x41/0x80
[   13.933130]  ? __pfx_kthread+0x10/0x10
[   13.933159]  ret_from_fork_asm+0x1a/0x30
[   13.933190]  </TASK>
[   13.933201] 
[   13.942072] Allocated by task 284:
[   13.942281]  kasan_save_stack+0x45/0x70
[   13.942485]  kasan_save_track+0x18/0x40
[   13.942679]  kasan_save_alloc_info+0x3b/0x50
[   13.942863]  __kasan_kmalloc+0xb7/0xc0
[   13.943003]  __kmalloc_cache_noprof+0x189/0x420
[   13.943701]  kasan_atomics+0x95/0x310
[   13.943923]  kunit_try_run_case+0x1a5/0x480
[   13.944091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.944278]  kthread+0x337/0x6f0
[   13.944425]  ret_from_fork+0x41/0x80
[   13.944640]  ret_from_fork_asm+0x1a/0x30
[   13.944837] 
[   13.944949] The buggy address belongs to the object at ffff8881039f4880
[   13.944949]  which belongs to the cache kmalloc-64 of size 64
[   13.945350] The buggy address is located 0 bytes to the right of
[   13.945350]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.946096] 
[   13.946203] The buggy address belongs to the physical page:
[   13.946493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.947002] flags: 0x200000000000000(node=0|zone=2)
[   13.947247] page_type: f5(slab)
[   13.947593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.947940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.948257] page dumped because: kasan: bad access detected
[   13.948552] 
[   13.948661] Memory state around the buggy address:
[   13.948853]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.949082]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.949474] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.949942]                                      ^
[   13.950158]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950730]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.951030] ==================================================================
[   14.249176] ==================================================================
[   14.250466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.250880] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.251456] 
[   14.251708] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.251764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.251778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.251801] Call Trace:
[   14.251822]  <TASK>
[   14.251842]  dump_stack_lvl+0x73/0xb0
[   14.251913]  print_report+0xd1/0x650
[   14.251938]  ? __virt_addr_valid+0x1db/0x2d0
[   14.251962]  ? kasan_atomics_helper+0x1079/0x5450
[   14.251985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.252010]  ? kasan_atomics_helper+0x1079/0x5450
[   14.252033]  kasan_report+0x141/0x180
[   14.252058]  ? kasan_atomics_helper+0x1079/0x5450
[   14.252086]  kasan_check_range+0x10c/0x1c0
[   14.252108]  __kasan_check_write+0x18/0x20
[   14.252129]  kasan_atomics_helper+0x1079/0x5450
[   14.252154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.252179]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.252203]  ? kasan_atomics+0x152/0x310
[   14.252239]  kasan_atomics+0x1dc/0x310
[   14.252259]  ? __pfx_kasan_atomics+0x10/0x10
[   14.252282]  ? __pfx_read_tsc+0x10/0x10
[   14.252304]  ? ktime_get_ts64+0x86/0x230
[   14.252331]  kunit_try_run_case+0x1a5/0x480
[   14.252357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252381]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.252407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.252434]  ? __kthread_parkme+0x82/0x180
[   14.252459]  ? preempt_count_sub+0x50/0x80
[   14.252486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.252511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.252536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.252560]  kthread+0x337/0x6f0
[   14.252579]  ? trace_preempt_on+0x20/0xc0
[   14.252605]  ? __pfx_kthread+0x10/0x10
[   14.252625]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.252657]  ? calculate_sigpending+0x7b/0xa0
[   14.252682]  ? __pfx_kthread+0x10/0x10
[   14.252702]  ret_from_fork+0x41/0x80
[   14.252724]  ? __pfx_kthread+0x10/0x10
[   14.252743]  ret_from_fork_asm+0x1a/0x30
[   14.252776]  </TASK>
[   14.252788] 
[   14.263265] Allocated by task 284:
[   14.263643]  kasan_save_stack+0x45/0x70
[   14.263944]  kasan_save_track+0x18/0x40
[   14.264104]  kasan_save_alloc_info+0x3b/0x50
[   14.264359]  __kasan_kmalloc+0xb7/0xc0
[   14.264498]  __kmalloc_cache_noprof+0x189/0x420
[   14.264714]  kasan_atomics+0x95/0x310
[   14.264932]  kunit_try_run_case+0x1a5/0x480
[   14.265164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.265452]  kthread+0x337/0x6f0
[   14.265615]  ret_from_fork+0x41/0x80
[   14.265750]  ret_from_fork_asm+0x1a/0x30
[   14.266050] 
[   14.266151] The buggy address belongs to the object at ffff8881039f4880
[   14.266151]  which belongs to the cache kmalloc-64 of size 64
[   14.266658] The buggy address is located 0 bytes to the right of
[   14.266658]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.267194] 
[   14.267312] The buggy address belongs to the physical page:
[   14.267572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.267980] flags: 0x200000000000000(node=0|zone=2)
[   14.268199] page_type: f5(slab)
[   14.268389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.268753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.269119] page dumped because: kasan: bad access detected
[   14.269395] 
[   14.269474] Memory state around the buggy address:
[   14.269636]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.269852]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.270507] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.270922]                                      ^
[   14.271311]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.271552]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.272051] ==================================================================
[   14.054568] ==================================================================
[   14.055115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.056127] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.056490] 
[   14.056600] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.056643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.056656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.056678] Call Trace:
[   14.056694]  <TASK>
[   14.056710]  dump_stack_lvl+0x73/0xb0
[   14.056736]  print_report+0xd1/0x650
[   14.056759]  ? __virt_addr_valid+0x1db/0x2d0
[   14.056781]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.056803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.056827]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.056853]  kasan_report+0x141/0x180
[   14.056877]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.056905]  kasan_check_range+0x10c/0x1c0
[   14.056926]  __kasan_check_write+0x18/0x20
[   14.056948]  kasan_atomics_helper+0xb6a/0x5450
[   14.056972]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.056995]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.057018]  ? kasan_atomics+0x152/0x310
[   14.057042]  kasan_atomics+0x1dc/0x310
[   14.057062]  ? __pfx_kasan_atomics+0x10/0x10
[   14.057084]  ? __pfx_read_tsc+0x10/0x10
[   14.057104]  ? ktime_get_ts64+0x86/0x230
[   14.057130]  kunit_try_run_case+0x1a5/0x480
[   14.057154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.057178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.057203]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.058148]  ? __kthread_parkme+0x82/0x180
[   14.058180]  ? preempt_count_sub+0x50/0x80
[   14.058208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.058246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.058272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.058297]  kthread+0x337/0x6f0
[   14.058315]  ? trace_preempt_on+0x20/0xc0
[   14.058339]  ? __pfx_kthread+0x10/0x10
[   14.058359]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.058382]  ? calculate_sigpending+0x7b/0xa0
[   14.058405]  ? __pfx_kthread+0x10/0x10
[   14.058426]  ret_from_fork+0x41/0x80
[   14.058449]  ? __pfx_kthread+0x10/0x10
[   14.058469]  ret_from_fork_asm+0x1a/0x30
[   14.058502]  </TASK>
[   14.058515] 
[   14.068450] Allocated by task 284:
[   14.068879]  kasan_save_stack+0x45/0x70
[   14.069138]  kasan_save_track+0x18/0x40
[   14.069421]  kasan_save_alloc_info+0x3b/0x50
[   14.069593]  __kasan_kmalloc+0xb7/0xc0
[   14.069903]  __kmalloc_cache_noprof+0x189/0x420
[   14.070198]  kasan_atomics+0x95/0x310
[   14.070349]  kunit_try_run_case+0x1a5/0x480
[   14.070699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.070916]  kthread+0x337/0x6f0
[   14.071196]  ret_from_fork+0x41/0x80
[   14.071465]  ret_from_fork_asm+0x1a/0x30
[   14.071739] 
[   14.071835] The buggy address belongs to the object at ffff8881039f4880
[   14.071835]  which belongs to the cache kmalloc-64 of size 64
[   14.072443] The buggy address is located 0 bytes to the right of
[   14.072443]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.073129] 
[   14.073351] The buggy address belongs to the physical page:
[   14.073574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.074097] flags: 0x200000000000000(node=0|zone=2)
[   14.074473] page_type: f5(slab)
[   14.074607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.075072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.075465] page dumped because: kasan: bad access detected
[   14.075812] 
[   14.075913] Memory state around the buggy address:
[   14.076286]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.076599]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.076943] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.077430]                                      ^
[   14.077705]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.077963]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.078393] ==================================================================
[   14.272612] ==================================================================
[   14.273211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.273695] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.274491] 
[   14.274746] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.274812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.274825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.274861] Call Trace:
[   14.274880]  <TASK>
[   14.274898]  dump_stack_lvl+0x73/0xb0
[   14.274927]  print_report+0xd1/0x650
[   14.274951]  ? __virt_addr_valid+0x1db/0x2d0
[   14.274974]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.274997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.275021]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.275045]  kasan_report+0x141/0x180
[   14.275068]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.275096]  __asan_report_load4_noabort+0x18/0x20
[   14.275118]  kasan_atomics_helper+0x4a1c/0x5450
[   14.275142]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.275166]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.275189]  ? kasan_atomics+0x152/0x310
[   14.275213]  kasan_atomics+0x1dc/0x310
[   14.275245]  ? __pfx_kasan_atomics+0x10/0x10
[   14.275286]  ? __pfx_read_tsc+0x10/0x10
[   14.275307]  ? ktime_get_ts64+0x86/0x230
[   14.275334]  kunit_try_run_case+0x1a5/0x480
[   14.275382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.275431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.275471]  ? __kthread_parkme+0x82/0x180
[   14.275495]  ? preempt_count_sub+0x50/0x80
[   14.275522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.275571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.275596]  kthread+0x337/0x6f0
[   14.275614]  ? trace_preempt_on+0x20/0xc0
[   14.275639]  ? __pfx_kthread+0x10/0x10
[   14.275659]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.275682]  ? calculate_sigpending+0x7b/0xa0
[   14.275705]  ? __pfx_kthread+0x10/0x10
[   14.275725]  ret_from_fork+0x41/0x80
[   14.275746]  ? __pfx_kthread+0x10/0x10
[   14.275766]  ret_from_fork_asm+0x1a/0x30
[   14.275797]  </TASK>
[   14.275809] 
[   14.286193] Allocated by task 284:
[   14.286392]  kasan_save_stack+0x45/0x70
[   14.286590]  kasan_save_track+0x18/0x40
[   14.287135]  kasan_save_alloc_info+0x3b/0x50
[   14.287324]  __kasan_kmalloc+0xb7/0xc0
[   14.287510]  __kmalloc_cache_noprof+0x189/0x420
[   14.288042]  kasan_atomics+0x95/0x310
[   14.288309]  kunit_try_run_case+0x1a5/0x480
[   14.288635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.289072]  kthread+0x337/0x6f0
[   14.289256]  ret_from_fork+0x41/0x80
[   14.289431]  ret_from_fork_asm+0x1a/0x30
[   14.289619] 
[   14.290055] The buggy address belongs to the object at ffff8881039f4880
[   14.290055]  which belongs to the cache kmalloc-64 of size 64
[   14.290488] The buggy address is located 0 bytes to the right of
[   14.290488]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.291508] 
[   14.291734] The buggy address belongs to the physical page:
[   14.292158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.292676] flags: 0x200000000000000(node=0|zone=2)
[   14.292920] page_type: f5(slab)
[   14.293084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.293364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.293672] page dumped because: kasan: bad access detected
[   14.294209] 
[   14.294339] Memory state around the buggy address:
[   14.294539]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.295014]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.295333] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.295622]                                      ^
[   14.295841]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.296139]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.296446] ==================================================================
[   14.580368] ==================================================================
[   14.580678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.581284] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.581512] 
[   14.581608] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.581653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.581667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.581689] Call Trace:
[   14.581705]  <TASK>
[   14.581724]  dump_stack_lvl+0x73/0xb0
[   14.581750]  print_report+0xd1/0x650
[   14.581773]  ? __virt_addr_valid+0x1db/0x2d0
[   14.581796]  ? kasan_atomics_helper+0x177f/0x5450
[   14.581819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.581843]  ? kasan_atomics_helper+0x177f/0x5450
[   14.581867]  kasan_report+0x141/0x180
[   14.581892]  ? kasan_atomics_helper+0x177f/0x5450
[   14.581920]  kasan_check_range+0x10c/0x1c0
[   14.581941]  __kasan_check_write+0x18/0x20
[   14.581963]  kasan_atomics_helper+0x177f/0x5450
[   14.581988]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.582012]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.582034]  ? kasan_atomics+0x152/0x310
[   14.582059]  kasan_atomics+0x1dc/0x310
[   14.582079]  ? __pfx_kasan_atomics+0x10/0x10
[   14.582102]  ? __pfx_read_tsc+0x10/0x10
[   14.582122]  ? ktime_get_ts64+0x86/0x230
[   14.582149]  kunit_try_run_case+0x1a5/0x480
[   14.582174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.582246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.582272]  ? __kthread_parkme+0x82/0x180
[   14.582294]  ? preempt_count_sub+0x50/0x80
[   14.582333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.582359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.582384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.582409]  kthread+0x337/0x6f0
[   14.582428]  ? trace_preempt_on+0x20/0xc0
[   14.582453]  ? __pfx_kthread+0x10/0x10
[   14.582473]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.582497]  ? calculate_sigpending+0x7b/0xa0
[   14.582520]  ? __pfx_kthread+0x10/0x10
[   14.582541]  ret_from_fork+0x41/0x80
[   14.582564]  ? __pfx_kthread+0x10/0x10
[   14.582583]  ret_from_fork_asm+0x1a/0x30
[   14.582615]  </TASK>
[   14.582628] 
[   14.591048] Allocated by task 284:
[   14.591237]  kasan_save_stack+0x45/0x70
[   14.591414]  kasan_save_track+0x18/0x40
[   14.591626]  kasan_save_alloc_info+0x3b/0x50
[   14.591828]  __kasan_kmalloc+0xb7/0xc0
[   14.592023]  __kmalloc_cache_noprof+0x189/0x420
[   14.592192]  kasan_atomics+0x95/0x310
[   14.592358]  kunit_try_run_case+0x1a5/0x480
[   14.592532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592745]  kthread+0x337/0x6f0
[   14.592889]  ret_from_fork+0x41/0x80
[   14.593121]  ret_from_fork_asm+0x1a/0x30
[   14.593366] 
[   14.593468] The buggy address belongs to the object at ffff8881039f4880
[   14.593468]  which belongs to the cache kmalloc-64 of size 64
[   14.594159] The buggy address is located 0 bytes to the right of
[   14.594159]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.594807] 
[   14.594920] The buggy address belongs to the physical page:
[   14.595213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.595470] flags: 0x200000000000000(node=0|zone=2)
[   14.595674] page_type: f5(slab)
[   14.595859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.596219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.596566] page dumped because: kasan: bad access detected
[   14.596820] 
[   14.596918] Memory state around the buggy address:
[   14.597136]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.597460]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.597855] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.598147]                                      ^
[   14.598353]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598572]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.599138] ==================================================================
[   14.755902] ==================================================================
[   14.756475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.756746] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.756974] 
[   14.757087] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.757133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.757146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.757170] Call Trace:
[   14.757185]  <TASK>
[   14.757202]  dump_stack_lvl+0x73/0xb0
[   14.757240]  print_report+0xd1/0x650
[   14.757276]  ? __virt_addr_valid+0x1db/0x2d0
[   14.757299]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.757323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.757359]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.757383]  kasan_report+0x141/0x180
[   14.757408]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.757436]  kasan_check_range+0x10c/0x1c0
[   14.757460]  __kasan_check_write+0x18/0x20
[   14.757482]  kasan_atomics_helper+0x1ce1/0x5450
[   14.757506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.757531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.757559]  ? kasan_atomics+0x152/0x310
[   14.757583]  kasan_atomics+0x1dc/0x310
[   14.757604]  ? __pfx_kasan_atomics+0x10/0x10
[   14.757627]  ? __pfx_read_tsc+0x10/0x10
[   14.757669]  ? ktime_get_ts64+0x86/0x230
[   14.757695]  kunit_try_run_case+0x1a5/0x480
[   14.757721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.757771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.757795]  ? __kthread_parkme+0x82/0x180
[   14.757818]  ? preempt_count_sub+0x50/0x80
[   14.757845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.757895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.757919]  kthread+0x337/0x6f0
[   14.757937]  ? trace_preempt_on+0x20/0xc0
[   14.757962]  ? __pfx_kthread+0x10/0x10
[   14.757992]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.758015]  ? calculate_sigpending+0x7b/0xa0
[   14.758038]  ? __pfx_kthread+0x10/0x10
[   14.758069]  ret_from_fork+0x41/0x80
[   14.758090]  ? __pfx_kthread+0x10/0x10
[   14.758110]  ret_from_fork_asm+0x1a/0x30
[   14.758141]  </TASK>
[   14.758153] 
[   14.765689] Allocated by task 284:
[   14.765888]  kasan_save_stack+0x45/0x70
[   14.766128]  kasan_save_track+0x18/0x40
[   14.766334]  kasan_save_alloc_info+0x3b/0x50
[   14.766550]  __kasan_kmalloc+0xb7/0xc0
[   14.766795]  __kmalloc_cache_noprof+0x189/0x420
[   14.767014]  kasan_atomics+0x95/0x310
[   14.767199]  kunit_try_run_case+0x1a5/0x480
[   14.767414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.767689]  kthread+0x337/0x6f0
[   14.767853]  ret_from_fork+0x41/0x80
[   14.768039]  ret_from_fork_asm+0x1a/0x30
[   14.768246] 
[   14.768358] The buggy address belongs to the object at ffff8881039f4880
[   14.768358]  which belongs to the cache kmalloc-64 of size 64
[   14.768832] The buggy address is located 0 bytes to the right of
[   14.768832]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.769202] 
[   14.769331] The buggy address belongs to the physical page:
[   14.769664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.770058] flags: 0x200000000000000(node=0|zone=2)
[   14.770288] page_type: f5(slab)
[   14.770414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.770726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.771090] page dumped because: kasan: bad access detected
[   14.771378] 
[   14.771452] Memory state around the buggy address:
[   14.771708]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.772018]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.772351] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.772658]                                      ^
[   14.772848]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773133]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773419] ==================================================================
[   14.943756] ==================================================================
[   14.944204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.944552] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.945036] 
[   14.945134] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.945182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.945195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.945220] Call Trace:
[   14.945247]  <TASK>
[   14.945265]  dump_stack_lvl+0x73/0xb0
[   14.945291]  print_report+0xd1/0x650
[   14.945316]  ? __virt_addr_valid+0x1db/0x2d0
[   14.945340]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.945363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.945388]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.945411]  kasan_report+0x141/0x180
[   14.945436]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.945465]  __asan_report_load8_noabort+0x18/0x20
[   14.945487]  kasan_atomics_helper+0x4fb2/0x5450
[   14.945512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.945537]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.945565]  ? kasan_atomics+0x152/0x310
[   14.945593]  kasan_atomics+0x1dc/0x310
[   14.945614]  ? __pfx_kasan_atomics+0x10/0x10
[   14.945637]  ? __pfx_read_tsc+0x10/0x10
[   14.945659]  ? ktime_get_ts64+0x86/0x230
[   14.945686]  kunit_try_run_case+0x1a5/0x480
[   14.945712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.945763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.945788]  ? __kthread_parkme+0x82/0x180
[   14.945812]  ? preempt_count_sub+0x50/0x80
[   14.945840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.945866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.945916]  kthread+0x337/0x6f0
[   14.945934]  ? trace_preempt_on+0x20/0xc0
[   14.945959]  ? __pfx_kthread+0x10/0x10
[   14.945979]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.946002]  ? calculate_sigpending+0x7b/0xa0
[   14.946026]  ? __pfx_kthread+0x10/0x10
[   14.946045]  ret_from_fork+0x41/0x80
[   14.946068]  ? __pfx_kthread+0x10/0x10
[   14.946087]  ret_from_fork_asm+0x1a/0x30
[   14.946119]  </TASK>
[   14.946130] 
[   14.953170] Allocated by task 284:
[   14.953362]  kasan_save_stack+0x45/0x70
[   14.953567]  kasan_save_track+0x18/0x40
[   14.953768]  kasan_save_alloc_info+0x3b/0x50
[   14.954002]  __kasan_kmalloc+0xb7/0xc0
[   14.954150]  __kmalloc_cache_noprof+0x189/0x420
[   14.954357]  kasan_atomics+0x95/0x310
[   14.954551]  kunit_try_run_case+0x1a5/0x480
[   14.954818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954994]  kthread+0x337/0x6f0
[   14.955115]  ret_from_fork+0x41/0x80
[   14.955293]  ret_from_fork_asm+0x1a/0x30
[   14.955497] 
[   14.955594] The buggy address belongs to the object at ffff8881039f4880
[   14.955594]  which belongs to the cache kmalloc-64 of size 64
[   14.956280] The buggy address is located 0 bytes to the right of
[   14.956280]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.956861] 
[   14.956945] The buggy address belongs to the physical page:
[   14.957172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.957508] flags: 0x200000000000000(node=0|zone=2)
[   14.957758] page_type: f5(slab)
[   14.957913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.958177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.958417] page dumped because: kasan: bad access detected
[   14.958591] 
[   14.958672] Memory state around the buggy address:
[   14.958902]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.959221]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.959548] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.960090]                                      ^
[   14.960318]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.960570]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.961064] ==================================================================
[   13.724127] ==================================================================
[   13.724750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.725001] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.725355] 
[   13.725538] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.725590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.725602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.725624] Call Trace:
[   13.725640]  <TASK>
[   13.725668]  dump_stack_lvl+0x73/0xb0
[   13.725693]  print_report+0xd1/0x650
[   13.725719]  ? __virt_addr_valid+0x1db/0x2d0
[   13.725741]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.725777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.725803]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.725827]  kasan_report+0x141/0x180
[   13.725864]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.725893]  __asan_report_store4_noabort+0x1b/0x30
[   13.725916]  kasan_atomics_helper+0x4b6e/0x5450
[   13.725940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.725964]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.725997]  ? kasan_atomics+0x152/0x310
[   13.726022]  kasan_atomics+0x1dc/0x310
[   13.726044]  ? __pfx_kasan_atomics+0x10/0x10
[   13.726076]  ? __pfx_read_tsc+0x10/0x10
[   13.726097]  ? ktime_get_ts64+0x86/0x230
[   13.726124]  kunit_try_run_case+0x1a5/0x480
[   13.726149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.726173]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.726206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.726247]  ? __kthread_parkme+0x82/0x180
[   13.726270]  ? preempt_count_sub+0x50/0x80
[   13.726341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.726369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.726394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.726419]  kthread+0x337/0x6f0
[   13.726438]  ? trace_preempt_on+0x20/0xc0
[   13.726464]  ? __pfx_kthread+0x10/0x10
[   13.726484]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.726508]  ? calculate_sigpending+0x7b/0xa0
[   13.726531]  ? __pfx_kthread+0x10/0x10
[   13.726562]  ret_from_fork+0x41/0x80
[   13.726585]  ? __pfx_kthread+0x10/0x10
[   13.726605]  ret_from_fork_asm+0x1a/0x30
[   13.726647]  </TASK>
[   13.726660] 
[   13.735968] Allocated by task 284:
[   13.736156]  kasan_save_stack+0x45/0x70
[   13.736469]  kasan_save_track+0x18/0x40
[   13.736869]  kasan_save_alloc_info+0x3b/0x50
[   13.737085]  __kasan_kmalloc+0xb7/0xc0
[   13.737327]  __kmalloc_cache_noprof+0x189/0x420
[   13.737612]  kasan_atomics+0x95/0x310
[   13.737827]  kunit_try_run_case+0x1a5/0x480
[   13.738019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.738200]  kthread+0x337/0x6f0
[   13.738332]  ret_from_fork+0x41/0x80
[   13.738513]  ret_from_fork_asm+0x1a/0x30
[   13.738793] 
[   13.738891] The buggy address belongs to the object at ffff8881039f4880
[   13.738891]  which belongs to the cache kmalloc-64 of size 64
[   13.739290] The buggy address is located 0 bytes to the right of
[   13.739290]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.740554] 
[   13.740670] The buggy address belongs to the physical page:
[   13.740848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.741471] flags: 0x200000000000000(node=0|zone=2)
[   13.741659] page_type: f5(slab)
[   13.741838] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.742256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.742623] page dumped because: kasan: bad access detected
[   13.742922] 
[   13.743020] Memory state around the buggy address:
[   13.743188]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.743485]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.743924] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.744236]                                      ^
[   13.744531]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.744904]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.745518] ==================================================================
[   14.321463] ==================================================================
[   14.321800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.322088] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.322461] 
[   14.322596] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.322643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.322656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.322678] Call Trace:
[   14.322697]  <TASK>
[   14.322716]  dump_stack_lvl+0x73/0xb0
[   14.322742]  print_report+0xd1/0x650
[   14.322765]  ? __virt_addr_valid+0x1db/0x2d0
[   14.322789]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.322811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.322836]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.322860]  kasan_report+0x141/0x180
[   14.322883]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.322911]  __asan_report_load4_noabort+0x18/0x20
[   14.322933]  kasan_atomics_helper+0x4a02/0x5450
[   14.322958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.322982]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.323005]  ? kasan_atomics+0x152/0x310
[   14.323030]  kasan_atomics+0x1dc/0x310
[   14.323050]  ? __pfx_kasan_atomics+0x10/0x10
[   14.323072]  ? __pfx_read_tsc+0x10/0x10
[   14.323094]  ? ktime_get_ts64+0x86/0x230
[   14.323120]  kunit_try_run_case+0x1a5/0x480
[   14.323146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.323197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.323222]  ? __kthread_parkme+0x82/0x180
[   14.323258]  ? preempt_count_sub+0x50/0x80
[   14.323285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.323333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.323359]  kthread+0x337/0x6f0
[   14.323377]  ? trace_preempt_on+0x20/0xc0
[   14.323403]  ? __pfx_kthread+0x10/0x10
[   14.323422]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.323446]  ? calculate_sigpending+0x7b/0xa0
[   14.323469]  ? __pfx_kthread+0x10/0x10
[   14.323489]  ret_from_fork+0x41/0x80
[   14.323510]  ? __pfx_kthread+0x10/0x10
[   14.323530]  ret_from_fork_asm+0x1a/0x30
[   14.323561]  </TASK>
[   14.323573] 
[   14.330672] Allocated by task 284:
[   14.330858]  kasan_save_stack+0x45/0x70
[   14.331062]  kasan_save_track+0x18/0x40
[   14.331269]  kasan_save_alloc_info+0x3b/0x50
[   14.331478]  __kasan_kmalloc+0xb7/0xc0
[   14.331693]  __kmalloc_cache_noprof+0x189/0x420
[   14.331861]  kasan_atomics+0x95/0x310
[   14.331990]  kunit_try_run_case+0x1a5/0x480
[   14.332137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.332323]  kthread+0x337/0x6f0
[   14.332459]  ret_from_fork+0x41/0x80
[   14.332646]  ret_from_fork_asm+0x1a/0x30
[   14.332852] 
[   14.332949] The buggy address belongs to the object at ffff8881039f4880
[   14.332949]  which belongs to the cache kmalloc-64 of size 64
[   14.333504] The buggy address is located 0 bytes to the right of
[   14.333504]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.334045] 
[   14.334149] The buggy address belongs to the physical page:
[   14.334369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.334757] flags: 0x200000000000000(node=0|zone=2)
[   14.334971] page_type: f5(slab)
[   14.335146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.335472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.335816] page dumped because: kasan: bad access detected
[   14.336039] 
[   14.336136] Memory state around the buggy address:
[   14.336357]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.336645]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.336933] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.337221]                                      ^
[   14.337430]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.337763]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.338028] ==================================================================
[   13.882728] ==================================================================
[   13.883206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.883683] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.884146] 
[   13.884343] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.884417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.884431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.884453] Call Trace:
[   13.884469]  <TASK>
[   13.884523]  dump_stack_lvl+0x73/0xb0
[   13.884549]  print_report+0xd1/0x650
[   13.884572]  ? __virt_addr_valid+0x1db/0x2d0
[   13.884601]  ? kasan_atomics_helper+0x697/0x5450
[   13.884624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.884657]  ? kasan_atomics_helper+0x697/0x5450
[   13.884682]  kasan_report+0x141/0x180
[   13.884707]  ? kasan_atomics_helper+0x697/0x5450
[   13.884736]  kasan_check_range+0x10c/0x1c0
[   13.884757]  __kasan_check_write+0x18/0x20
[   13.884777]  kasan_atomics_helper+0x697/0x5450
[   13.884802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.884825]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.884850]  ? kasan_atomics+0x152/0x310
[   13.884874]  kasan_atomics+0x1dc/0x310
[   13.884895]  ? __pfx_kasan_atomics+0x10/0x10
[   13.884917]  ? __pfx_read_tsc+0x10/0x10
[   13.884938]  ? ktime_get_ts64+0x86/0x230
[   13.884964]  kunit_try_run_case+0x1a5/0x480
[   13.884990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.885014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.885039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.885064]  ? __kthread_parkme+0x82/0x180
[   13.885087]  ? preempt_count_sub+0x50/0x80
[   13.885113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.885139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.885164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.885189]  kthread+0x337/0x6f0
[   13.885207]  ? trace_preempt_on+0x20/0xc0
[   13.885240]  ? __pfx_kthread+0x10/0x10
[   13.885260]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.885311]  ? calculate_sigpending+0x7b/0xa0
[   13.885335]  ? __pfx_kthread+0x10/0x10
[   13.885355]  ret_from_fork+0x41/0x80
[   13.885387]  ? __pfx_kthread+0x10/0x10
[   13.885407]  ret_from_fork_asm+0x1a/0x30
[   13.885438]  </TASK>
[   13.885448] 
[   13.895179] Allocated by task 284:
[   13.895533]  kasan_save_stack+0x45/0x70
[   13.895856]  kasan_save_track+0x18/0x40
[   13.896032]  kasan_save_alloc_info+0x3b/0x50
[   13.896175]  __kasan_kmalloc+0xb7/0xc0
[   13.896318]  __kmalloc_cache_noprof+0x189/0x420
[   13.896469]  kasan_atomics+0x95/0x310
[   13.896852]  kunit_try_run_case+0x1a5/0x480
[   13.897400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.897951]  kthread+0x337/0x6f0
[   13.898203]  ret_from_fork+0x41/0x80
[   13.898697]  ret_from_fork_asm+0x1a/0x30
[   13.898915] 
[   13.899063] The buggy address belongs to the object at ffff8881039f4880
[   13.899063]  which belongs to the cache kmalloc-64 of size 64
[   13.899815] The buggy address is located 0 bytes to the right of
[   13.899815]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.900170] 
[   13.900603] The buggy address belongs to the physical page:
[   13.901189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.901923] flags: 0x200000000000000(node=0|zone=2)
[   13.902161] page_type: f5(slab)
[   13.902361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.903215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.903788] page dumped because: kasan: bad access detected
[   13.904267] 
[   13.904697] Memory state around the buggy address:
[   13.905072]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.905974]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.906444] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.907101]                                      ^
[   13.907377]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.907705]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.907996] ==================================================================
[   14.363472] ==================================================================
[   14.364173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.364891] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.365567] 
[   14.365792] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.365852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.365865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.365890] Call Trace:
[   14.365909]  <TASK>
[   14.365941]  dump_stack_lvl+0x73/0xb0
[   14.365973]  print_report+0xd1/0x650
[   14.365999]  ? __virt_addr_valid+0x1db/0x2d0
[   14.366022]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.366046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.366071]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.366095]  kasan_report+0x141/0x180
[   14.366119]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.366147]  __asan_report_load4_noabort+0x18/0x20
[   14.366169]  kasan_atomics_helper+0x49e8/0x5450
[   14.366194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.366218]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.366251]  ? kasan_atomics+0x152/0x310
[   14.366275]  kasan_atomics+0x1dc/0x310
[   14.366296]  ? __pfx_kasan_atomics+0x10/0x10
[   14.366317]  ? __pfx_read_tsc+0x10/0x10
[   14.366340]  ? ktime_get_ts64+0x86/0x230
[   14.366366]  kunit_try_run_case+0x1a5/0x480
[   14.366392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.366441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.366466]  ? __kthread_parkme+0x82/0x180
[   14.366489]  ? preempt_count_sub+0x50/0x80
[   14.366516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.366566]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.366590]  kthread+0x337/0x6f0
[   14.366608]  ? trace_preempt_on+0x20/0xc0
[   14.366653]  ? __pfx_kthread+0x10/0x10
[   14.366673]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.366696]  ? calculate_sigpending+0x7b/0xa0
[   14.366720]  ? __pfx_kthread+0x10/0x10
[   14.366740]  ret_from_fork+0x41/0x80
[   14.366762]  ? __pfx_kthread+0x10/0x10
[   14.366781]  ret_from_fork_asm+0x1a/0x30
[   14.366813]  </TASK>
[   14.366825] 
[   14.379222] Allocated by task 284:
[   14.379568]  kasan_save_stack+0x45/0x70
[   14.380097]  kasan_save_track+0x18/0x40
[   14.380392]  kasan_save_alloc_info+0x3b/0x50
[   14.380602]  __kasan_kmalloc+0xb7/0xc0
[   14.381019]  __kmalloc_cache_noprof+0x189/0x420
[   14.381354]  kasan_atomics+0x95/0x310
[   14.381487]  kunit_try_run_case+0x1a5/0x480
[   14.381642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.381819]  kthread+0x337/0x6f0
[   14.381939]  ret_from_fork+0x41/0x80
[   14.382076]  ret_from_fork_asm+0x1a/0x30
[   14.382217] 
[   14.382305] The buggy address belongs to the object at ffff8881039f4880
[   14.382305]  which belongs to the cache kmalloc-64 of size 64
[   14.382811] The buggy address is located 0 bytes to the right of
[   14.382811]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.383349] 
[   14.383535] The buggy address belongs to the physical page:
[   14.383788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.384036] flags: 0x200000000000000(node=0|zone=2)
[   14.384386] page_type: f5(slab)
[   14.384572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.385049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.385330] page dumped because: kasan: bad access detected
[   14.385613] 
[   14.385744] Memory state around the buggy address:
[   14.385970]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.386299]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.386614] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.386953]                                      ^
[   14.387159]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387446]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387696] ==================================================================
[   14.599692] ==================================================================
[   14.600330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.600580] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.601113] 
[   14.601235] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.601282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.601295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.601328] Call Trace:
[   14.601344]  <TASK>
[   14.601362]  dump_stack_lvl+0x73/0xb0
[   14.601388]  print_report+0xd1/0x650
[   14.601423]  ? __virt_addr_valid+0x1db/0x2d0
[   14.601445]  ? kasan_atomics_helper+0x1818/0x5450
[   14.601469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.601492]  ? kasan_atomics_helper+0x1818/0x5450
[   14.601517]  kasan_report+0x141/0x180
[   14.601541]  ? kasan_atomics_helper+0x1818/0x5450
[   14.601573]  kasan_check_range+0x10c/0x1c0
[   14.601594]  __kasan_check_write+0x18/0x20
[   14.601616]  kasan_atomics_helper+0x1818/0x5450
[   14.601641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.601665]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.601687]  ? kasan_atomics+0x152/0x310
[   14.601721]  kasan_atomics+0x1dc/0x310
[   14.601741]  ? __pfx_kasan_atomics+0x10/0x10
[   14.601764]  ? __pfx_read_tsc+0x10/0x10
[   14.601796]  ? ktime_get_ts64+0x86/0x230
[   14.601822]  kunit_try_run_case+0x1a5/0x480
[   14.601847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601922]  ? __kthread_parkme+0x82/0x180
[   14.601945]  ? preempt_count_sub+0x50/0x80
[   14.601972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.602021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.602045]  kthread+0x337/0x6f0
[   14.602064]  ? trace_preempt_on+0x20/0xc0
[   14.602089]  ? __pfx_kthread+0x10/0x10
[   14.602108]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.602131]  ? calculate_sigpending+0x7b/0xa0
[   14.602154]  ? __pfx_kthread+0x10/0x10
[   14.602174]  ret_from_fork+0x41/0x80
[   14.602195]  ? __pfx_kthread+0x10/0x10
[   14.602217]  ret_from_fork_asm+0x1a/0x30
[   14.602256]  </TASK>
[   14.602267] 
[   14.610193] Allocated by task 284:
[   14.610422]  kasan_save_stack+0x45/0x70
[   14.610633]  kasan_save_track+0x18/0x40
[   14.610853]  kasan_save_alloc_info+0x3b/0x50
[   14.611063]  __kasan_kmalloc+0xb7/0xc0
[   14.611284]  __kmalloc_cache_noprof+0x189/0x420
[   14.611462]  kasan_atomics+0x95/0x310
[   14.611595]  kunit_try_run_case+0x1a5/0x480
[   14.611744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612112]  kthread+0x337/0x6f0
[   14.612317]  ret_from_fork+0x41/0x80
[   14.612508]  ret_from_fork_asm+0x1a/0x30
[   14.612707] 
[   14.612807] The buggy address belongs to the object at ffff8881039f4880
[   14.612807]  which belongs to the cache kmalloc-64 of size 64
[   14.613232] The buggy address is located 0 bytes to the right of
[   14.613232]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.613826] 
[   14.613924] The buggy address belongs to the physical page:
[   14.614179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.614531] flags: 0x200000000000000(node=0|zone=2)
[   14.614767] page_type: f5(slab)
[   14.614927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.615241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.615539] page dumped because: kasan: bad access detected
[   14.615775] 
[   14.615847] Memory state around the buggy address:
[   14.616074]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.616367]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.616638] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.616993]                                      ^
[   14.617217]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617552]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617868] ==================================================================
[   13.702965] ==================================================================
[   13.703288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.703725] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.704013] 
[   13.704143] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.704188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.704200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.704222] Call Trace:
[   13.704247]  <TASK>
[   13.704261]  dump_stack_lvl+0x73/0xb0
[   13.704284]  print_report+0xd1/0x650
[   13.704308]  ? __virt_addr_valid+0x1db/0x2d0
[   13.704329]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.704352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.704375]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.704397]  kasan_report+0x141/0x180
[   13.704430]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.704457]  __asan_report_load4_noabort+0x18/0x20
[   13.704480]  kasan_atomics_helper+0x4b88/0x5450
[   13.704622]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.704715]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.704764]  ? kasan_atomics+0x152/0x310
[   13.704790]  kasan_atomics+0x1dc/0x310
[   13.704811]  ? __pfx_kasan_atomics+0x10/0x10
[   13.704834]  ? __pfx_read_tsc+0x10/0x10
[   13.704855]  ? ktime_get_ts64+0x86/0x230
[   13.704881]  kunit_try_run_case+0x1a5/0x480
[   13.704907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.704931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.704955]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.704981]  ? __kthread_parkme+0x82/0x180
[   13.705004]  ? preempt_count_sub+0x50/0x80
[   13.705032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.705060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.705086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.705111]  kthread+0x337/0x6f0
[   13.705131]  ? trace_preempt_on+0x20/0xc0
[   13.705156]  ? __pfx_kthread+0x10/0x10
[   13.705178]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.705203]  ? calculate_sigpending+0x7b/0xa0
[   13.705242]  ? __pfx_kthread+0x10/0x10
[   13.705264]  ret_from_fork+0x41/0x80
[   13.705334]  ? __pfx_kthread+0x10/0x10
[   13.705357]  ret_from_fork_asm+0x1a/0x30
[   13.705389]  </TASK>
[   13.705402] 
[   13.714378] Allocated by task 284:
[   13.714632]  kasan_save_stack+0x45/0x70
[   13.714843]  kasan_save_track+0x18/0x40
[   13.715037]  kasan_save_alloc_info+0x3b/0x50
[   13.715257]  __kasan_kmalloc+0xb7/0xc0
[   13.715434]  __kmalloc_cache_noprof+0x189/0x420
[   13.715751]  kasan_atomics+0x95/0x310
[   13.715919]  kunit_try_run_case+0x1a5/0x480
[   13.716132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.716564]  kthread+0x337/0x6f0
[   13.716767]  ret_from_fork+0x41/0x80
[   13.716938]  ret_from_fork_asm+0x1a/0x30
[   13.717145] 
[   13.717219] The buggy address belongs to the object at ffff8881039f4880
[   13.717219]  which belongs to the cache kmalloc-64 of size 64
[   13.717594] The buggy address is located 0 bytes to the right of
[   13.717594]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.718596] 
[   13.718753] The buggy address belongs to the physical page:
[   13.718932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.719224] flags: 0x200000000000000(node=0|zone=2)
[   13.719788] page_type: f5(slab)
[   13.719981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.720309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.720595] page dumped because: kasan: bad access detected
[   13.721091] 
[   13.721199] Memory state around the buggy address:
[   13.721615]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.721986]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.722206] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.722602]                                      ^
[   13.722805]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.723171]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.723409] ==================================================================
[   13.996062] ==================================================================
[   13.996747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.997168] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.997669] 
[   13.997886] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.997936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.997950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.997972] Call Trace:
[   13.997986]  <TASK>
[   13.998095]  dump_stack_lvl+0x73/0xb0
[   13.998127]  print_report+0xd1/0x650
[   13.998151]  ? __virt_addr_valid+0x1db/0x2d0
[   13.998174]  ? kasan_atomics_helper+0x992/0x5450
[   13.998196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.998220]  ? kasan_atomics_helper+0x992/0x5450
[   13.998253]  kasan_report+0x141/0x180
[   13.998278]  ? kasan_atomics_helper+0x992/0x5450
[   13.998307]  kasan_check_range+0x10c/0x1c0
[   13.998328]  __kasan_check_write+0x18/0x20
[   13.998350]  kasan_atomics_helper+0x992/0x5450
[   13.998376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.998399]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.998425]  ? kasan_atomics+0x152/0x310
[   13.998449]  kasan_atomics+0x1dc/0x310
[   13.998470]  ? __pfx_kasan_atomics+0x10/0x10
[   13.998492]  ? __pfx_read_tsc+0x10/0x10
[   13.998513]  ? ktime_get_ts64+0x86/0x230
[   13.998540]  kunit_try_run_case+0x1a5/0x480
[   13.998566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.998590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.998614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.998664]  ? __kthread_parkme+0x82/0x180
[   13.998688]  ? preempt_count_sub+0x50/0x80
[   13.998714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.998740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.998765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.998790]  kthread+0x337/0x6f0
[   13.998808]  ? trace_preempt_on+0x20/0xc0
[   13.998833]  ? __pfx_kthread+0x10/0x10
[   13.998853]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.998876]  ? calculate_sigpending+0x7b/0xa0
[   13.998900]  ? __pfx_kthread+0x10/0x10
[   13.998921]  ret_from_fork+0x41/0x80
[   13.998943]  ? __pfx_kthread+0x10/0x10
[   13.998963]  ret_from_fork_asm+0x1a/0x30
[   13.998995]  </TASK>
[   13.999007] 
[   14.009520] Allocated by task 284:
[   14.009869]  kasan_save_stack+0x45/0x70
[   14.010158]  kasan_save_track+0x18/0x40
[   14.010327]  kasan_save_alloc_info+0x3b/0x50
[   14.010669]  __kasan_kmalloc+0xb7/0xc0
[   14.010944]  __kmalloc_cache_noprof+0x189/0x420
[   14.011266]  kasan_atomics+0x95/0x310
[   14.011451]  kunit_try_run_case+0x1a5/0x480
[   14.011788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.012128]  kthread+0x337/0x6f0
[   14.012402]  ret_from_fork+0x41/0x80
[   14.012556]  ret_from_fork_asm+0x1a/0x30
[   14.012931] 
[   14.013017] The buggy address belongs to the object at ffff8881039f4880
[   14.013017]  which belongs to the cache kmalloc-64 of size 64
[   14.013583] The buggy address is located 0 bytes to the right of
[   14.013583]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.014449] 
[   14.014559] The buggy address belongs to the physical page:
[   14.014954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.015392] flags: 0x200000000000000(node=0|zone=2)
[   14.015631] page_type: f5(slab)
[   14.015963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.016393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.016828] page dumped because: kasan: bad access detected
[   14.017063] 
[   14.017309] Memory state around the buggy address:
[   14.017517]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018034]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018455] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.018930]                                      ^
[   14.019265]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.019684]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020126] ==================================================================
[   14.124431] ==================================================================
[   14.124732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.125553] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.126029] 
[   14.126210] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.126335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.126350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.126430] Call Trace:
[   14.126448]  <TASK>
[   14.126466]  dump_stack_lvl+0x73/0xb0
[   14.126492]  print_report+0xd1/0x650
[   14.126516]  ? __virt_addr_valid+0x1db/0x2d0
[   14.126538]  ? kasan_atomics_helper+0xd47/0x5450
[   14.126561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.126586]  ? kasan_atomics_helper+0xd47/0x5450
[   14.126609]  kasan_report+0x141/0x180
[   14.126633]  ? kasan_atomics_helper+0xd47/0x5450
[   14.126661]  kasan_check_range+0x10c/0x1c0
[   14.126683]  __kasan_check_write+0x18/0x20
[   14.126704]  kasan_atomics_helper+0xd47/0x5450
[   14.126728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.126753]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.126776]  ? kasan_atomics+0x152/0x310
[   14.126800]  kasan_atomics+0x1dc/0x310
[   14.126821]  ? __pfx_kasan_atomics+0x10/0x10
[   14.126844]  ? __pfx_read_tsc+0x10/0x10
[   14.126864]  ? ktime_get_ts64+0x86/0x230
[   14.126890]  kunit_try_run_case+0x1a5/0x480
[   14.126915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.126938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.126963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.126988]  ? __kthread_parkme+0x82/0x180
[   14.127010]  ? preempt_count_sub+0x50/0x80
[   14.127036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.127061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.127085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.127110]  kthread+0x337/0x6f0
[   14.127129]  ? trace_preempt_on+0x20/0xc0
[   14.127153]  ? __pfx_kthread+0x10/0x10
[   14.127172]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.127195]  ? calculate_sigpending+0x7b/0xa0
[   14.127217]  ? __pfx_kthread+0x10/0x10
[   14.127250]  ret_from_fork+0x41/0x80
[   14.127272]  ? __pfx_kthread+0x10/0x10
[   14.127292]  ret_from_fork_asm+0x1a/0x30
[   14.127323]  </TASK>
[   14.127334] 
[   14.137192] Allocated by task 284:
[   14.137365]  kasan_save_stack+0x45/0x70
[   14.137744]  kasan_save_track+0x18/0x40
[   14.137927]  kasan_save_alloc_info+0x3b/0x50
[   14.138282]  __kasan_kmalloc+0xb7/0xc0
[   14.138534]  __kmalloc_cache_noprof+0x189/0x420
[   14.138755]  kasan_atomics+0x95/0x310
[   14.138948]  kunit_try_run_case+0x1a5/0x480
[   14.139297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.139629]  kthread+0x337/0x6f0
[   14.139845]  ret_from_fork+0x41/0x80
[   14.140036]  ret_from_fork_asm+0x1a/0x30
[   14.140296] 
[   14.140401] The buggy address belongs to the object at ffff8881039f4880
[   14.140401]  which belongs to the cache kmalloc-64 of size 64
[   14.141097] The buggy address is located 0 bytes to the right of
[   14.141097]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.141659] 
[   14.141840] The buggy address belongs to the physical page:
[   14.142205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.142626] flags: 0x200000000000000(node=0|zone=2)
[   14.142826] page_type: f5(slab)
[   14.143109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.143496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.143840] page dumped because: kasan: bad access detected
[   14.144124] 
[   14.144224] Memory state around the buggy address:
[   14.144424]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.144962]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.145331] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.145747]                                      ^
[   14.146045]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.146427]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.146870] ==================================================================
[   14.644483] ==================================================================
[   14.645174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.645905] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.646578] 
[   14.646802] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.646853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646891] Call Trace:
[   14.646922]  <TASK>
[   14.646944]  dump_stack_lvl+0x73/0xb0
[   14.646972]  print_report+0xd1/0x650
[   14.647010]  ? __virt_addr_valid+0x1db/0x2d0
[   14.647034]  ? kasan_atomics_helper+0x194a/0x5450
[   14.647058]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.647084]  ? kasan_atomics_helper+0x194a/0x5450
[   14.647108]  kasan_report+0x141/0x180
[   14.647132]  ? kasan_atomics_helper+0x194a/0x5450
[   14.647160]  kasan_check_range+0x10c/0x1c0
[   14.647182]  __kasan_check_write+0x18/0x20
[   14.647203]  kasan_atomics_helper+0x194a/0x5450
[   14.647236]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.647260]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.647284]  ? kasan_atomics+0x152/0x310
[   14.647309]  kasan_atomics+0x1dc/0x310
[   14.647331]  ? __pfx_kasan_atomics+0x10/0x10
[   14.647356]  ? __pfx_read_tsc+0x10/0x10
[   14.647378]  ? ktime_get_ts64+0x86/0x230
[   14.647405]  kunit_try_run_case+0x1a5/0x480
[   14.647432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.647480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.647506]  ? __kthread_parkme+0x82/0x180
[   14.647530]  ? preempt_count_sub+0x50/0x80
[   14.647556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.647649]  kthread+0x337/0x6f0
[   14.647668]  ? trace_preempt_on+0x20/0xc0
[   14.647693]  ? __pfx_kthread+0x10/0x10
[   14.647713]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.647736]  ? calculate_sigpending+0x7b/0xa0
[   14.647759]  ? __pfx_kthread+0x10/0x10
[   14.647779]  ret_from_fork+0x41/0x80
[   14.647800]  ? __pfx_kthread+0x10/0x10
[   14.647819]  ret_from_fork_asm+0x1a/0x30
[   14.647852]  </TASK>
[   14.647864] 
[   14.656521] Allocated by task 284:
[   14.656737]  kasan_save_stack+0x45/0x70
[   14.656944]  kasan_save_track+0x18/0x40
[   14.657116]  kasan_save_alloc_info+0x3b/0x50
[   14.657350]  __kasan_kmalloc+0xb7/0xc0
[   14.657485]  __kmalloc_cache_noprof+0x189/0x420
[   14.657673]  kasan_atomics+0x95/0x310
[   14.657808]  kunit_try_run_case+0x1a5/0x480
[   14.658049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.658313]  kthread+0x337/0x6f0
[   14.658481]  ret_from_fork+0x41/0x80
[   14.658694]  ret_from_fork_asm+0x1a/0x30
[   14.658895] 
[   14.658996] The buggy address belongs to the object at ffff8881039f4880
[   14.658996]  which belongs to the cache kmalloc-64 of size 64
[   14.659479] The buggy address is located 0 bytes to the right of
[   14.659479]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.660014] 
[   14.660090] The buggy address belongs to the physical page:
[   14.660353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.660735] flags: 0x200000000000000(node=0|zone=2)
[   14.660954] page_type: f5(slab)
[   14.661144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.661480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.661823] page dumped because: kasan: bad access detected
[   14.662079] 
[   14.662176] Memory state around the buggy address:
[   14.662395]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.662727]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.663034] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.663299]                                      ^
[   14.663458]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.663726]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664058] ==================================================================
[   14.542850] ==================================================================
[   14.543335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.543742] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.544064] 
[   14.544165] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.544212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.544238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.544262] Call Trace:
[   14.544283]  <TASK>
[   14.544302]  dump_stack_lvl+0x73/0xb0
[   14.544329]  print_report+0xd1/0x650
[   14.544353]  ? __virt_addr_valid+0x1db/0x2d0
[   14.544377]  ? kasan_atomics_helper+0x164f/0x5450
[   14.544400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.544424]  ? kasan_atomics_helper+0x164f/0x5450
[   14.544450]  kasan_report+0x141/0x180
[   14.544473]  ? kasan_atomics_helper+0x164f/0x5450
[   14.544501]  kasan_check_range+0x10c/0x1c0
[   14.544523]  __kasan_check_write+0x18/0x20
[   14.544544]  kasan_atomics_helper+0x164f/0x5450
[   14.544568]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.544593]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.544617]  ? kasan_atomics+0x152/0x310
[   14.544642]  kasan_atomics+0x1dc/0x310
[   14.544664]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544688]  ? __pfx_read_tsc+0x10/0x10
[   14.544709]  ? ktime_get_ts64+0x86/0x230
[   14.544735]  kunit_try_run_case+0x1a5/0x480
[   14.544761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.544811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.544837]  ? __kthread_parkme+0x82/0x180
[   14.544861]  ? preempt_count_sub+0x50/0x80
[   14.544887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.544963]  kthread+0x337/0x6f0
[   14.544981]  ? trace_preempt_on+0x20/0xc0
[   14.545006]  ? __pfx_kthread+0x10/0x10
[   14.545026]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.545052]  ? calculate_sigpending+0x7b/0xa0
[   14.545075]  ? __pfx_kthread+0x10/0x10
[   14.545095]  ret_from_fork+0x41/0x80
[   14.545129]  ? __pfx_kthread+0x10/0x10
[   14.545149]  ret_from_fork_asm+0x1a/0x30
[   14.545181]  </TASK>
[   14.545205] 
[   14.552893] Allocated by task 284:
[   14.553085]  kasan_save_stack+0x45/0x70
[   14.553363]  kasan_save_track+0x18/0x40
[   14.553500]  kasan_save_alloc_info+0x3b/0x50
[   14.553655]  __kasan_kmalloc+0xb7/0xc0
[   14.553789]  __kmalloc_cache_noprof+0x189/0x420
[   14.553942]  kasan_atomics+0x95/0x310
[   14.554073]  kunit_try_run_case+0x1a5/0x480
[   14.554220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554485]  kthread+0x337/0x6f0
[   14.554666]  ret_from_fork+0x41/0x80
[   14.554858]  ret_from_fork_asm+0x1a/0x30
[   14.555060] 
[   14.555159] The buggy address belongs to the object at ffff8881039f4880
[   14.555159]  which belongs to the cache kmalloc-64 of size 64
[   14.555834] The buggy address is located 0 bytes to the right of
[   14.555834]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.556429] 
[   14.556556] The buggy address belongs to the physical page:
[   14.556815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.557058] flags: 0x200000000000000(node=0|zone=2)
[   14.557233] page_type: f5(slab)
[   14.557384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.557877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.558218] page dumped because: kasan: bad access detected
[   14.558476] 
[   14.558598] Memory state around the buggy address:
[   14.558797]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559105]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559412] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.559756]                                      ^
[   14.559993]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.560307]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.560594] ==================================================================
[   13.671766] ==================================================================
[   13.672475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.672856] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.673338] 
[   13.673523] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.673637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.673661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.673683] Call Trace:
[   13.673694]  <TASK>
[   13.673715]  dump_stack_lvl+0x73/0xb0
[   13.673740]  print_report+0xd1/0x650
[   13.673763]  ? __virt_addr_valid+0x1db/0x2d0
[   13.673784]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.673806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.673829]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.673853]  kasan_report+0x141/0x180
[   13.673876]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.673903]  __asan_report_store4_noabort+0x1b/0x30
[   13.673924]  kasan_atomics_helper+0x4ba2/0x5450
[   13.673948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.673972]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.673994]  ? kasan_atomics+0x152/0x310
[   13.674017]  kasan_atomics+0x1dc/0x310
[   13.674037]  ? __pfx_kasan_atomics+0x10/0x10
[   13.674058]  ? __pfx_read_tsc+0x10/0x10
[   13.674077]  ? ktime_get_ts64+0x86/0x230
[   13.674102]  kunit_try_run_case+0x1a5/0x480
[   13.674127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.674149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.674173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.674197]  ? __kthread_parkme+0x82/0x180
[   13.674219]  ? preempt_count_sub+0x50/0x80
[   13.674253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.674395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.674429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.674453]  kthread+0x337/0x6f0
[   13.674470]  ? trace_preempt_on+0x20/0xc0
[   13.674494]  ? __pfx_kthread+0x10/0x10
[   13.674513]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.674535]  ? calculate_sigpending+0x7b/0xa0
[   13.674557]  ? __pfx_kthread+0x10/0x10
[   13.674576]  ret_from_fork+0x41/0x80
[   13.674597]  ? __pfx_kthread+0x10/0x10
[   13.674616]  ret_from_fork_asm+0x1a/0x30
[   13.674646]  </TASK>
[   13.674657] 
[   13.688472] Allocated by task 284:
[   13.688896]  kasan_save_stack+0x45/0x70
[   13.689356]  kasan_save_track+0x18/0x40
[   13.689665]  kasan_save_alloc_info+0x3b/0x50
[   13.689975]  __kasan_kmalloc+0xb7/0xc0
[   13.690112]  __kmalloc_cache_noprof+0x189/0x420
[   13.690329]  kasan_atomics+0x95/0x310
[   13.690712]  kunit_try_run_case+0x1a5/0x480
[   13.691273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.691960]  kthread+0x337/0x6f0
[   13.692335]  ret_from_fork+0x41/0x80
[   13.692563]  ret_from_fork_asm+0x1a/0x30
[   13.692816] 
[   13.692996] The buggy address belongs to the object at ffff8881039f4880
[   13.692996]  which belongs to the cache kmalloc-64 of size 64
[   13.694134] The buggy address is located 0 bytes to the right of
[   13.694134]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.694983] 
[   13.695101] The buggy address belongs to the physical page:
[   13.695758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.696522] flags: 0x200000000000000(node=0|zone=2)
[   13.696713] page_type: f5(slab)
[   13.697030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.698000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.698246] page dumped because: kasan: bad access detected
[   13.698934] 
[   13.699127] Memory state around the buggy address:
[   13.699702]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.700376]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.700746] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.701076]                                      ^
[   13.701310]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.701653]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.701999] ==================================================================
[   13.839400] ==================================================================
[   13.839960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.840344] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.840627] 
[   13.840887] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.840949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.840963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.840986] Call Trace:
[   13.840999]  <TASK>
[   13.841014]  dump_stack_lvl+0x73/0xb0
[   13.841041]  print_report+0xd1/0x650
[   13.841065]  ? __virt_addr_valid+0x1db/0x2d0
[   13.841088]  ? kasan_atomics_helper+0x565/0x5450
[   13.841111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.841137]  ? kasan_atomics_helper+0x565/0x5450
[   13.841161]  kasan_report+0x141/0x180
[   13.841214]  ? kasan_atomics_helper+0x565/0x5450
[   13.841259]  kasan_check_range+0x10c/0x1c0
[   13.841297]  __kasan_check_write+0x18/0x20
[   13.841372]  kasan_atomics_helper+0x565/0x5450
[   13.841414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.841438]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.841462]  ? kasan_atomics+0x152/0x310
[   13.841487]  kasan_atomics+0x1dc/0x310
[   13.841507]  ? __pfx_kasan_atomics+0x10/0x10
[   13.841530]  ? __pfx_read_tsc+0x10/0x10
[   13.841556]  ? ktime_get_ts64+0x86/0x230
[   13.841582]  kunit_try_run_case+0x1a5/0x480
[   13.841606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.841630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.841663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.841689]  ? __kthread_parkme+0x82/0x180
[   13.841713]  ? preempt_count_sub+0x50/0x80
[   13.841739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.841764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.841788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.841813]  kthread+0x337/0x6f0
[   13.841831]  ? trace_preempt_on+0x20/0xc0
[   13.841856]  ? __pfx_kthread+0x10/0x10
[   13.841875]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.841900]  ? calculate_sigpending+0x7b/0xa0
[   13.841923]  ? __pfx_kthread+0x10/0x10
[   13.841943]  ret_from_fork+0x41/0x80
[   13.841965]  ? __pfx_kthread+0x10/0x10
[   13.841984]  ret_from_fork_asm+0x1a/0x30
[   13.842015]  </TASK>
[   13.842027] 
[   13.851393] Allocated by task 284:
[   13.851587]  kasan_save_stack+0x45/0x70
[   13.851736]  kasan_save_track+0x18/0x40
[   13.851998]  kasan_save_alloc_info+0x3b/0x50
[   13.852140]  __kasan_kmalloc+0xb7/0xc0
[   13.852566]  __kmalloc_cache_noprof+0x189/0x420
[   13.852770]  kasan_atomics+0x95/0x310
[   13.852899]  kunit_try_run_case+0x1a5/0x480
[   13.853041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.853211]  kthread+0x337/0x6f0
[   13.853338]  ret_from_fork+0x41/0x80
[   13.853465]  ret_from_fork_asm+0x1a/0x30
[   13.853685] 
[   13.853790] The buggy address belongs to the object at ffff8881039f4880
[   13.853790]  which belongs to the cache kmalloc-64 of size 64
[   13.854534] The buggy address is located 0 bytes to the right of
[   13.854534]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.855378] 
[   13.855515] The buggy address belongs to the physical page:
[   13.855866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.856213] flags: 0x200000000000000(node=0|zone=2)
[   13.856543] page_type: f5(slab)
[   13.856844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.857166] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.857403] page dumped because: kasan: bad access detected
[   13.857578] 
[   13.857678] Memory state around the buggy address:
[   13.857979]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.858352]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.858876] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.859337]                                      ^
[   13.859554]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.859996]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.860395] ==================================================================
[   13.791799] ==================================================================
[   13.792532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.793029] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.793508] 
[   13.793626] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.793726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.793739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.793846] Call Trace:
[   13.793881]  <TASK>
[   13.793898]  dump_stack_lvl+0x73/0xb0
[   13.793925]  print_report+0xd1/0x650
[   13.793950]  ? __virt_addr_valid+0x1db/0x2d0
[   13.793973]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.793996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.794020]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.794044]  kasan_report+0x141/0x180
[   13.794068]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.794097]  kasan_check_range+0x10c/0x1c0
[   13.794119]  __kasan_check_write+0x18/0x20
[   13.794141]  kasan_atomics_helper+0x4a0/0x5450
[   13.794205]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.794252]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.794367]  ? kasan_atomics+0x152/0x310
[   13.794399]  kasan_atomics+0x1dc/0x310
[   13.794557]  ? __pfx_kasan_atomics+0x10/0x10
[   13.794586]  ? __pfx_read_tsc+0x10/0x10
[   13.794606]  ? ktime_get_ts64+0x86/0x230
[   13.794633]  kunit_try_run_case+0x1a5/0x480
[   13.794668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.794692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.794718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.794743]  ? __kthread_parkme+0x82/0x180
[   13.794765]  ? preempt_count_sub+0x50/0x80
[   13.794792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.794817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.794840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.794866]  kthread+0x337/0x6f0
[   13.794885]  ? trace_preempt_on+0x20/0xc0
[   13.794910]  ? __pfx_kthread+0x10/0x10
[   13.794930]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.794953]  ? calculate_sigpending+0x7b/0xa0
[   13.794975]  ? __pfx_kthread+0x10/0x10
[   13.794995]  ret_from_fork+0x41/0x80
[   13.795017]  ? __pfx_kthread+0x10/0x10
[   13.795037]  ret_from_fork_asm+0x1a/0x30
[   13.795070]  </TASK>
[   13.795082] 
[   13.805381] Allocated by task 284:
[   13.805520]  kasan_save_stack+0x45/0x70
[   13.805953]  kasan_save_track+0x18/0x40
[   13.806176]  kasan_save_alloc_info+0x3b/0x50
[   13.806605]  __kasan_kmalloc+0xb7/0xc0
[   13.806869]  __kmalloc_cache_noprof+0x189/0x420
[   13.807175]  kasan_atomics+0x95/0x310
[   13.807509]  kunit_try_run_case+0x1a5/0x480
[   13.807769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.808017]  kthread+0x337/0x6f0
[   13.808141]  ret_from_fork+0x41/0x80
[   13.808400]  ret_from_fork_asm+0x1a/0x30
[   13.808689] 
[   13.808790] The buggy address belongs to the object at ffff8881039f4880
[   13.808790]  which belongs to the cache kmalloc-64 of size 64
[   13.809320] The buggy address is located 0 bytes to the right of
[   13.809320]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.810013] 
[   13.810114] The buggy address belongs to the physical page:
[   13.810644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.811072] flags: 0x200000000000000(node=0|zone=2)
[   13.811298] page_type: f5(slab)
[   13.811484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.811990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.812318] page dumped because: kasan: bad access detected
[   13.812544] 
[   13.812643] Memory state around the buggy address:
[   13.812823]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.813111]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.813442] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.813840]                                      ^
[   13.814005]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.814306]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.814852] ==================================================================
[   14.446527] ==================================================================
[   14.446884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.447274] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.447618] 
[   14.447752] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.447812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.447860] Call Trace:
[   14.447881]  <TASK>
[   14.447900]  dump_stack_lvl+0x73/0xb0
[   14.447927]  print_report+0xd1/0x650
[   14.447961]  ? __virt_addr_valid+0x1db/0x2d0
[   14.447985]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.448007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.448042]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.448067]  kasan_report+0x141/0x180
[   14.448091]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.448119]  __asan_report_load8_noabort+0x18/0x20
[   14.448143]  kasan_atomics_helper+0x4eae/0x5450
[   14.448167]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.448191]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.448215]  ? kasan_atomics+0x152/0x310
[   14.448252]  kasan_atomics+0x1dc/0x310
[   14.448273]  ? __pfx_kasan_atomics+0x10/0x10
[   14.448295]  ? __pfx_read_tsc+0x10/0x10
[   14.448316]  ? ktime_get_ts64+0x86/0x230
[   14.448344]  kunit_try_run_case+0x1a5/0x480
[   14.448370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448403]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.448429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.448465]  ? __kthread_parkme+0x82/0x180
[   14.448488]  ? preempt_count_sub+0x50/0x80
[   14.448515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.448572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.448597]  kthread+0x337/0x6f0
[   14.448615]  ? trace_preempt_on+0x20/0xc0
[   14.448651]  ? __pfx_kthread+0x10/0x10
[   14.448671]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.448693]  ? calculate_sigpending+0x7b/0xa0
[   14.448716]  ? __pfx_kthread+0x10/0x10
[   14.448737]  ret_from_fork+0x41/0x80
[   14.448759]  ? __pfx_kthread+0x10/0x10
[   14.448779]  ret_from_fork_asm+0x1a/0x30
[   14.448811]  </TASK>
[   14.448823] 
[   14.456602] Allocated by task 284:
[   14.456814]  kasan_save_stack+0x45/0x70
[   14.456995]  kasan_save_track+0x18/0x40
[   14.457129]  kasan_save_alloc_info+0x3b/0x50
[   14.457283]  __kasan_kmalloc+0xb7/0xc0
[   14.457413]  __kmalloc_cache_noprof+0x189/0x420
[   14.457578]  kasan_atomics+0x95/0x310
[   14.457786]  kunit_try_run_case+0x1a5/0x480
[   14.457996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.458255]  kthread+0x337/0x6f0
[   14.458421]  ret_from_fork+0x41/0x80
[   14.458790]  ret_from_fork_asm+0x1a/0x30
[   14.458983] 
[   14.459053] The buggy address belongs to the object at ffff8881039f4880
[   14.459053]  which belongs to the cache kmalloc-64 of size 64
[   14.459437] The buggy address is located 0 bytes to the right of
[   14.459437]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.460151] 
[   14.460276] The buggy address belongs to the physical page:
[   14.460528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.461017] flags: 0x200000000000000(node=0|zone=2)
[   14.461252] page_type: f5(slab)
[   14.461451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.461788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.462067] page dumped because: kasan: bad access detected
[   14.462254] 
[   14.462326] Memory state around the buggy address:
[   14.462484]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.462702]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.463341] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.463674]                                      ^
[   14.464059]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.464318]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.464616] ==================================================================
[   13.860833] ==================================================================
[   13.861525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.861905] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.862200] 
[   13.862342] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.862387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.862430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.862453] Call Trace:
[   13.862469]  <TASK>
[   13.862486]  dump_stack_lvl+0x73/0xb0
[   13.862522]  print_report+0xd1/0x650
[   13.862546]  ? __virt_addr_valid+0x1db/0x2d0
[   13.862568]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.862618]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.862645]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.862669]  kasan_report+0x141/0x180
[   13.862715]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.862744]  kasan_check_range+0x10c/0x1c0
[   13.862766]  __kasan_check_write+0x18/0x20
[   13.862814]  kasan_atomics_helper+0x5fe/0x5450
[   13.862839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.862873]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.862897]  ? kasan_atomics+0x152/0x310
[   13.862947]  kasan_atomics+0x1dc/0x310
[   13.862969]  ? __pfx_kasan_atomics+0x10/0x10
[   13.862991]  ? __pfx_read_tsc+0x10/0x10
[   13.863023]  ? ktime_get_ts64+0x86/0x230
[   13.863049]  kunit_try_run_case+0x1a5/0x480
[   13.863100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.863124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.863149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.863185]  ? __kthread_parkme+0x82/0x180
[   13.863207]  ? preempt_count_sub+0x50/0x80
[   13.863267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.863293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.863329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.863354]  kthread+0x337/0x6f0
[   13.863373]  ? trace_preempt_on+0x20/0xc0
[   13.863409]  ? __pfx_kthread+0x10/0x10
[   13.863429]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.863452]  ? calculate_sigpending+0x7b/0xa0
[   13.863486]  ? __pfx_kthread+0x10/0x10
[   13.863506]  ret_from_fork+0x41/0x80
[   13.863528]  ? __pfx_kthread+0x10/0x10
[   13.863548]  ret_from_fork_asm+0x1a/0x30
[   13.863590]  </TASK>
[   13.863602] 
[   13.873408] Allocated by task 284:
[   13.873595]  kasan_save_stack+0x45/0x70
[   13.873789]  kasan_save_track+0x18/0x40
[   13.873975]  kasan_save_alloc_info+0x3b/0x50
[   13.874203]  __kasan_kmalloc+0xb7/0xc0
[   13.874487]  __kmalloc_cache_noprof+0x189/0x420
[   13.874711]  kasan_atomics+0x95/0x310
[   13.874893]  kunit_try_run_case+0x1a5/0x480
[   13.875184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.875481]  kthread+0x337/0x6f0
[   13.875704]  ret_from_fork+0x41/0x80
[   13.875834]  ret_from_fork_asm+0x1a/0x30
[   13.876100] 
[   13.876220] The buggy address belongs to the object at ffff8881039f4880
[   13.876220]  which belongs to the cache kmalloc-64 of size 64
[   13.876839] The buggy address is located 0 bytes to the right of
[   13.876839]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.877623] 
[   13.877700] The buggy address belongs to the physical page:
[   13.877958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.878330] flags: 0x200000000000000(node=0|zone=2)
[   13.878596] page_type: f5(slab)
[   13.878798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.879104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.879527] page dumped because: kasan: bad access detected
[   13.879819] 
[   13.879929] Memory state around the buggy address:
[   13.880177]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.880500]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.880816] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.881056]                                      ^
[   13.881208]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.881427]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.881913] ==================================================================
[   14.407671] ==================================================================
[   14.408169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.408751] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.409053] 
[   14.409221] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.409309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.409323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.409347] Call Trace:
[   14.409377]  <TASK>
[   14.409399]  dump_stack_lvl+0x73/0xb0
[   14.409427]  print_report+0xd1/0x650
[   14.409451]  ? __virt_addr_valid+0x1db/0x2d0
[   14.409475]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.409498]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.409522]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.409553]  kasan_report+0x141/0x180
[   14.409578]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.409606]  __asan_report_load4_noabort+0x18/0x20
[   14.409629]  kasan_atomics_helper+0x49ce/0x5450
[   14.409661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.409685]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.409708]  ? kasan_atomics+0x152/0x310
[   14.409732]  kasan_atomics+0x1dc/0x310
[   14.409786]  ? __pfx_kasan_atomics+0x10/0x10
[   14.409808]  ? __pfx_read_tsc+0x10/0x10
[   14.409853]  ? ktime_get_ts64+0x86/0x230
[   14.409880]  kunit_try_run_case+0x1a5/0x480
[   14.409906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.409995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.410057]  ? __kthread_parkme+0x82/0x180
[   14.410081]  ? preempt_count_sub+0x50/0x80
[   14.410131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.410156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.410181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.410205]  kthread+0x337/0x6f0
[   14.410233]  ? trace_preempt_on+0x20/0xc0
[   14.410258]  ? __pfx_kthread+0x10/0x10
[   14.410278]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.410302]  ? calculate_sigpending+0x7b/0xa0
[   14.410353]  ? __pfx_kthread+0x10/0x10
[   14.410374]  ret_from_fork+0x41/0x80
[   14.410398]  ? __pfx_kthread+0x10/0x10
[   14.410428]  ret_from_fork_asm+0x1a/0x30
[   14.410460]  </TASK>
[   14.410472] 
[   14.418492] Allocated by task 284:
[   14.418704]  kasan_save_stack+0x45/0x70
[   14.419041]  kasan_save_track+0x18/0x40
[   14.419260]  kasan_save_alloc_info+0x3b/0x50
[   14.419480]  __kasan_kmalloc+0xb7/0xc0
[   14.419729]  __kmalloc_cache_noprof+0x189/0x420
[   14.419944]  kasan_atomics+0x95/0x310
[   14.420078]  kunit_try_run_case+0x1a5/0x480
[   14.420292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420612]  kthread+0x337/0x6f0
[   14.420824]  ret_from_fork+0x41/0x80
[   14.421164]  ret_from_fork_asm+0x1a/0x30
[   14.421380] 
[   14.421454] The buggy address belongs to the object at ffff8881039f4880
[   14.421454]  which belongs to the cache kmalloc-64 of size 64
[   14.422323] The buggy address is located 0 bytes to the right of
[   14.422323]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.422872] 
[   14.422949] The buggy address belongs to the physical page:
[   14.423239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.423674] flags: 0x200000000000000(node=0|zone=2)
[   14.423894] page_type: f5(slab)
[   14.424022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.424268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.424592] page dumped because: kasan: bad access detected
[   14.424994] 
[   14.425104] Memory state around the buggy address:
[   14.425345]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.425636]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.426021] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.426350]                                      ^
[   14.426630]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426897]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.427115] ==================================================================
[   13.815723] ==================================================================
[   13.816110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.816580] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.817045] 
[   13.817159] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.817265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.817304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.817336] Call Trace:
[   13.817411]  <TASK>
[   13.817428]  dump_stack_lvl+0x73/0xb0
[   13.817465]  print_report+0xd1/0x650
[   13.817490]  ? __virt_addr_valid+0x1db/0x2d0
[   13.817513]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.817537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.817565]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.817589]  kasan_report+0x141/0x180
[   13.817614]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.817642]  __asan_report_store4_noabort+0x1b/0x30
[   13.817665]  kasan_atomics_helper+0x4b3a/0x5450
[   13.817706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.817730]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.817755]  ? kasan_atomics+0x152/0x310
[   13.817780]  kasan_atomics+0x1dc/0x310
[   13.817800]  ? __pfx_kasan_atomics+0x10/0x10
[   13.817823]  ? __pfx_read_tsc+0x10/0x10
[   13.817844]  ? ktime_get_ts64+0x86/0x230
[   13.817870]  kunit_try_run_case+0x1a5/0x480
[   13.817895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.817919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.817944]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.817969]  ? __kthread_parkme+0x82/0x180
[   13.817991]  ? preempt_count_sub+0x50/0x80
[   13.818018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.818043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.818067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.818092]  kthread+0x337/0x6f0
[   13.818110]  ? trace_preempt_on+0x20/0xc0
[   13.818135]  ? __pfx_kthread+0x10/0x10
[   13.818155]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.818178]  ? calculate_sigpending+0x7b/0xa0
[   13.818201]  ? __pfx_kthread+0x10/0x10
[   13.818222]  ret_from_fork+0x41/0x80
[   13.818255]  ? __pfx_kthread+0x10/0x10
[   13.818275]  ret_from_fork_asm+0x1a/0x30
[   13.818307]  </TASK>
[   13.818319] 
[   13.828647] Allocated by task 284:
[   13.828840]  kasan_save_stack+0x45/0x70
[   13.829051]  kasan_save_track+0x18/0x40
[   13.829264]  kasan_save_alloc_info+0x3b/0x50
[   13.829479]  __kasan_kmalloc+0xb7/0xc0
[   13.829685]  __kmalloc_cache_noprof+0x189/0x420
[   13.830058]  kasan_atomics+0x95/0x310
[   13.830194]  kunit_try_run_case+0x1a5/0x480
[   13.830348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.830519]  kthread+0x337/0x6f0
[   13.830690]  ret_from_fork+0x41/0x80
[   13.830956]  ret_from_fork_asm+0x1a/0x30
[   13.831218] 
[   13.831357] The buggy address belongs to the object at ffff8881039f4880
[   13.831357]  which belongs to the cache kmalloc-64 of size 64
[   13.832545] The buggy address is located 0 bytes to the right of
[   13.832545]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.833199] 
[   13.833520] The buggy address belongs to the physical page:
[   13.833865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.834173] flags: 0x200000000000000(node=0|zone=2)
[   13.834593] page_type: f5(slab)
[   13.834820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.835447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.835798] page dumped because: kasan: bad access detected
[   13.836061] 
[   13.836188] Memory state around the buggy address:
[   13.836506]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.836940]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.837412] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.837788]                                      ^
[   13.838051]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.838550]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.838864] ==================================================================
[   14.855555] ==================================================================
[   14.855829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.856159] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.856510] 
[   14.856698] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.856746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.856760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.856784] Call Trace:
[   14.856803]  <TASK>
[   14.856824]  dump_stack_lvl+0x73/0xb0
[   14.856850]  print_report+0xd1/0x650
[   14.856875]  ? __virt_addr_valid+0x1db/0x2d0
[   14.856898]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.856921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.856946]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.856971]  kasan_report+0x141/0x180
[   14.856995]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.857024]  kasan_check_range+0x10c/0x1c0
[   14.857046]  __kasan_check_write+0x18/0x20
[   14.857067]  kasan_atomics_helper+0x1f43/0x5450
[   14.857093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.857118]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.857142]  ? kasan_atomics+0x152/0x310
[   14.857166]  kasan_atomics+0x1dc/0x310
[   14.857188]  ? __pfx_kasan_atomics+0x10/0x10
[   14.857210]  ? __pfx_read_tsc+0x10/0x10
[   14.857246]  ? ktime_get_ts64+0x86/0x230
[   14.857274]  kunit_try_run_case+0x1a5/0x480
[   14.857302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.857326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.857353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.857379]  ? __kthread_parkme+0x82/0x180
[   14.857403]  ? preempt_count_sub+0x50/0x80
[   14.857430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.857456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.857481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.857506]  kthread+0x337/0x6f0
[   14.857524]  ? trace_preempt_on+0x20/0xc0
[   14.857555]  ? __pfx_kthread+0x10/0x10
[   14.857574]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.857598]  ? calculate_sigpending+0x7b/0xa0
[   14.857622]  ? __pfx_kthread+0x10/0x10
[   14.857642]  ret_from_fork+0x41/0x80
[   14.857665]  ? __pfx_kthread+0x10/0x10
[   14.857685]  ret_from_fork_asm+0x1a/0x30
[   14.857717]  </TASK>
[   14.857728] 
[   14.865022] Allocated by task 284:
[   14.865208]  kasan_save_stack+0x45/0x70
[   14.865422]  kasan_save_track+0x18/0x40
[   14.865628]  kasan_save_alloc_info+0x3b/0x50
[   14.865823]  __kasan_kmalloc+0xb7/0xc0
[   14.865965]  __kmalloc_cache_noprof+0x189/0x420
[   14.866191]  kasan_atomics+0x95/0x310
[   14.866391]  kunit_try_run_case+0x1a5/0x480
[   14.866594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866827]  kthread+0x337/0x6f0
[   14.867021]  ret_from_fork+0x41/0x80
[   14.867159]  ret_from_fork_asm+0x1a/0x30
[   14.867320] 
[   14.867419] The buggy address belongs to the object at ffff8881039f4880
[   14.867419]  which belongs to the cache kmalloc-64 of size 64
[   14.867991] The buggy address is located 0 bytes to the right of
[   14.867991]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.868369] 
[   14.868444] The buggy address belongs to the physical page:
[   14.868688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.869044] flags: 0x200000000000000(node=0|zone=2)
[   14.869295] page_type: f5(slab)
[   14.869467] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.869815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.870176] page dumped because: kasan: bad access detected
[   14.870360] 
[   14.870431] Memory state around the buggy address:
[   14.870589]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.871261]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.871571] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.871874]                                      ^
[   14.872092]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.872377]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.872645] ==================================================================
[   14.979642] ==================================================================
[   14.979994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.980411] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.980733] 
[   14.980829] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.980878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.980890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.980913] Call Trace:
[   14.980932]  <TASK>
[   14.980951]  dump_stack_lvl+0x73/0xb0
[   14.980978]  print_report+0xd1/0x650
[   14.981002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.981024]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.981049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.981073]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.981097]  kasan_report+0x141/0x180
[   14.981121]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.981150]  __asan_report_load8_noabort+0x18/0x20
[   14.981173]  kasan_atomics_helper+0x4fa5/0x5450
[   14.981198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.981235]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.981260]  ? kasan_atomics+0x152/0x310
[   14.981286]  kasan_atomics+0x1dc/0x310
[   14.981310]  ? __pfx_kasan_atomics+0x10/0x10
[   14.981333]  ? __pfx_read_tsc+0x10/0x10
[   14.981354]  ? ktime_get_ts64+0x86/0x230
[   14.981381]  kunit_try_run_case+0x1a5/0x480
[   14.981406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.981455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.981481]  ? __kthread_parkme+0x82/0x180
[   14.981505]  ? preempt_count_sub+0x50/0x80
[   14.981532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.981610]  kthread+0x337/0x6f0
[   14.981630]  ? trace_preempt_on+0x20/0xc0
[   14.981656]  ? __pfx_kthread+0x10/0x10
[   14.981675]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.981698]  ? calculate_sigpending+0x7b/0xa0
[   14.981722]  ? __pfx_kthread+0x10/0x10
[   14.981743]  ret_from_fork+0x41/0x80
[   14.981765]  ? __pfx_kthread+0x10/0x10
[   14.981784]  ret_from_fork_asm+0x1a/0x30
[   14.981816]  </TASK>
[   14.981829] 
[   14.989030] Allocated by task 284:
[   14.989232]  kasan_save_stack+0x45/0x70
[   14.989434]  kasan_save_track+0x18/0x40
[   14.989607]  kasan_save_alloc_info+0x3b/0x50
[   14.989838]  __kasan_kmalloc+0xb7/0xc0
[   14.990015]  __kmalloc_cache_noprof+0x189/0x420
[   14.990182]  kasan_atomics+0x95/0x310
[   14.990324]  kunit_try_run_case+0x1a5/0x480
[   14.990516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.990931]  kthread+0x337/0x6f0
[   14.991098]  ret_from_fork+0x41/0x80
[   14.991284]  ret_from_fork_asm+0x1a/0x30
[   14.991463] 
[   14.991560] The buggy address belongs to the object at ffff8881039f4880
[   14.991560]  which belongs to the cache kmalloc-64 of size 64
[   14.992059] The buggy address is located 0 bytes to the right of
[   14.992059]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.992555] 
[   14.992665] The buggy address belongs to the physical page:
[   14.992891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.993166] flags: 0x200000000000000(node=0|zone=2)
[   14.993342] page_type: f5(slab)
[   14.993464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.993833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.994172] page dumped because: kasan: bad access detected
[   14.994435] 
[   14.994530] Memory state around the buggy address:
[   14.994833]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.995152]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.995408] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.995624]                                      ^
[   14.995859]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.996183]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.996494] ==================================================================
[   14.338641] ==================================================================
[   14.339021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.339371] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.339850] 
[   14.339939] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.339984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.339997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.340020] Call Trace:
[   14.340037]  <TASK>
[   14.340053]  dump_stack_lvl+0x73/0xb0
[   14.340078]  print_report+0xd1/0x650
[   14.340102]  ? __virt_addr_valid+0x1db/0x2d0
[   14.340310]  ? kasan_atomics_helper+0x1217/0x5450
[   14.340339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.340364]  ? kasan_atomics_helper+0x1217/0x5450
[   14.340388]  kasan_report+0x141/0x180
[   14.340412]  ? kasan_atomics_helper+0x1217/0x5450
[   14.340441]  kasan_check_range+0x10c/0x1c0
[   14.340463]  __kasan_check_write+0x18/0x20
[   14.340484]  kasan_atomics_helper+0x1217/0x5450
[   14.340509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.340534]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.340556]  ? kasan_atomics+0x152/0x310
[   14.340580]  kasan_atomics+0x1dc/0x310
[   14.340600]  ? __pfx_kasan_atomics+0x10/0x10
[   14.340622]  ? __pfx_read_tsc+0x10/0x10
[   14.340644]  ? ktime_get_ts64+0x86/0x230
[   14.340671]  kunit_try_run_case+0x1a5/0x480
[   14.340697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.340720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.340745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.340771]  ? __kthread_parkme+0x82/0x180
[   14.340794]  ? preempt_count_sub+0x50/0x80
[   14.340820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.340844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.340894]  kthread+0x337/0x6f0
[   14.340912]  ? trace_preempt_on+0x20/0xc0
[   14.340936]  ? __pfx_kthread+0x10/0x10
[   14.340956]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.340979]  ? calculate_sigpending+0x7b/0xa0
[   14.341002]  ? __pfx_kthread+0x10/0x10
[   14.341021]  ret_from_fork+0x41/0x80
[   14.341044]  ? __pfx_kthread+0x10/0x10
[   14.341063]  ret_from_fork_asm+0x1a/0x30
[   14.341095]  </TASK>
[   14.341106] 
[   14.348467] Allocated by task 284:
[   14.348603]  kasan_save_stack+0x45/0x70
[   14.349018]  kasan_save_track+0x18/0x40
[   14.349214]  kasan_save_alloc_info+0x3b/0x50
[   14.349443]  __kasan_kmalloc+0xb7/0xc0
[   14.349639]  __kmalloc_cache_noprof+0x189/0x420
[   14.349868]  kasan_atomics+0x95/0x310
[   14.350053]  kunit_try_run_case+0x1a5/0x480
[   14.350662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.350885]  kthread+0x337/0x6f0
[   14.351205]  ret_from_fork+0x41/0x80
[   14.351510]  ret_from_fork_asm+0x1a/0x30
[   14.351843] 
[   14.351924] The buggy address belongs to the object at ffff8881039f4880
[   14.351924]  which belongs to the cache kmalloc-64 of size 64
[   14.352295] The buggy address is located 0 bytes to the right of
[   14.352295]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.352675] 
[   14.353829] The buggy address belongs to the physical page:
[   14.354581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.355652] flags: 0x200000000000000(node=0|zone=2)
[   14.356465] page_type: f5(slab)
[   14.357107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.357984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.358833] page dumped because: kasan: bad access detected
[   14.359029] 
[   14.359103] Memory state around the buggy address:
[   14.359276]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.360016]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.360704] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.361329]                                      ^
[   14.361799]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362448]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362883] ==================================================================
[   14.925816] ==================================================================
[   14.926075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.926373] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.926966] 
[   14.927062] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.927110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.927148] Call Trace:
[   14.927167]  <TASK>
[   14.927186]  dump_stack_lvl+0x73/0xb0
[   14.927213]  print_report+0xd1/0x650
[   14.927248]  ? __virt_addr_valid+0x1db/0x2d0
[   14.927272]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.927296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.927320]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.927344]  kasan_report+0x141/0x180
[   14.927368]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.927396]  kasan_check_range+0x10c/0x1c0
[   14.927418]  __kasan_check_write+0x18/0x20
[   14.927440]  kasan_atomics_helper+0x20c8/0x5450
[   14.927465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.927489]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.927513]  ? kasan_atomics+0x152/0x310
[   14.927537]  kasan_atomics+0x1dc/0x310
[   14.927558]  ? __pfx_kasan_atomics+0x10/0x10
[   14.927581]  ? __pfx_read_tsc+0x10/0x10
[   14.927602]  ? ktime_get_ts64+0x86/0x230
[   14.927630]  kunit_try_run_case+0x1a5/0x480
[   14.927656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.927679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.927705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.927731]  ? __kthread_parkme+0x82/0x180
[   14.927754]  ? preempt_count_sub+0x50/0x80
[   14.927781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.927806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.927831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.927856]  kthread+0x337/0x6f0
[   14.927874]  ? trace_preempt_on+0x20/0xc0
[   14.927899]  ? __pfx_kthread+0x10/0x10
[   14.927921]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.927945]  ? calculate_sigpending+0x7b/0xa0
[   14.927969]  ? __pfx_kthread+0x10/0x10
[   14.927989]  ret_from_fork+0x41/0x80
[   14.928011]  ? __pfx_kthread+0x10/0x10
[   14.928031]  ret_from_fork_asm+0x1a/0x30
[   14.928063]  </TASK>
[   14.928075] 
[   14.935695] Allocated by task 284:
[   14.935876]  kasan_save_stack+0x45/0x70
[   14.936080]  kasan_save_track+0x18/0x40
[   14.936293]  kasan_save_alloc_info+0x3b/0x50
[   14.936506]  __kasan_kmalloc+0xb7/0xc0
[   14.936718]  __kmalloc_cache_noprof+0x189/0x420
[   14.936884]  kasan_atomics+0x95/0x310
[   14.937016]  kunit_try_run_case+0x1a5/0x480
[   14.937164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.937352]  kthread+0x337/0x6f0
[   14.937475]  ret_from_fork+0x41/0x80
[   14.937674]  ret_from_fork_asm+0x1a/0x30
[   14.937875] 
[   14.937973] The buggy address belongs to the object at ffff8881039f4880
[   14.937973]  which belongs to the cache kmalloc-64 of size 64
[   14.938515] The buggy address is located 0 bytes to the right of
[   14.938515]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.939084] 
[   14.939187] The buggy address belongs to the physical page:
[   14.939423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.939694] flags: 0x200000000000000(node=0|zone=2)
[   14.939932] page_type: f5(slab)
[   14.940103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.940463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.940893] page dumped because: kasan: bad access detected
[   14.941111] 
[   14.941200] Memory state around the buggy address:
[   14.941398]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.941727]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.941944] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.942158]                                      ^
[   14.942325]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.942593]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.943257] ==================================================================
[   14.737874] ==================================================================
[   14.738244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.738531] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.738755] 
[   14.738876] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.738924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.738937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.738960] Call Trace:
[   14.738979]  <TASK>
[   14.738999]  dump_stack_lvl+0x73/0xb0
[   14.739025]  print_report+0xd1/0x650
[   14.739049]  ? __virt_addr_valid+0x1db/0x2d0
[   14.739073]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.739096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.739120]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.739145]  kasan_report+0x141/0x180
[   14.739168]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.739197]  __asan_report_load8_noabort+0x18/0x20
[   14.739257]  kasan_atomics_helper+0x4f30/0x5450
[   14.739285]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.739309]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.739344]  ? kasan_atomics+0x152/0x310
[   14.739369]  kasan_atomics+0x1dc/0x310
[   14.739390]  ? __pfx_kasan_atomics+0x10/0x10
[   14.739413]  ? __pfx_read_tsc+0x10/0x10
[   14.739434]  ? ktime_get_ts64+0x86/0x230
[   14.739461]  kunit_try_run_case+0x1a5/0x480
[   14.739488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.739511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.739536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.739561]  ? __kthread_parkme+0x82/0x180
[   14.739584]  ? preempt_count_sub+0x50/0x80
[   14.739612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.739650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.739674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.739708]  kthread+0x337/0x6f0
[   14.739727]  ? trace_preempt_on+0x20/0xc0
[   14.739752]  ? __pfx_kthread+0x10/0x10
[   14.739782]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.739806]  ? calculate_sigpending+0x7b/0xa0
[   14.739830]  ? __pfx_kthread+0x10/0x10
[   14.739859]  ret_from_fork+0x41/0x80
[   14.739881]  ? __pfx_kthread+0x10/0x10
[   14.739900]  ret_from_fork_asm+0x1a/0x30
[   14.739943]  </TASK>
[   14.739954] 
[   14.747614] Allocated by task 284:
[   14.747763]  kasan_save_stack+0x45/0x70
[   14.747909]  kasan_save_track+0x18/0x40
[   14.748048]  kasan_save_alloc_info+0x3b/0x50
[   14.748193]  __kasan_kmalloc+0xb7/0xc0
[   14.748397]  __kmalloc_cache_noprof+0x189/0x420
[   14.748679]  kasan_atomics+0x95/0x310
[   14.748872]  kunit_try_run_case+0x1a5/0x480
[   14.749082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.749348]  kthread+0x337/0x6f0
[   14.749518]  ret_from_fork+0x41/0x80
[   14.749734]  ret_from_fork_asm+0x1a/0x30
[   14.749877] 
[   14.749950] The buggy address belongs to the object at ffff8881039f4880
[   14.749950]  which belongs to the cache kmalloc-64 of size 64
[   14.750399] The buggy address is located 0 bytes to the right of
[   14.750399]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.751035] 
[   14.751150] The buggy address belongs to the physical page:
[   14.751395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.751783] flags: 0x200000000000000(node=0|zone=2)
[   14.752027] page_type: f5(slab)
[   14.752201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.752540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.752886] page dumped because: kasan: bad access detected
[   14.753139] 
[   14.753266] Memory state around the buggy address:
[   14.753484]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.753854]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.754166] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.754491]                                      ^
[   14.754742]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754959]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755311] ==================================================================
[   13.641372] ==================================================================
[   13.642140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.643110] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.644296] 
[   13.644489] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.644555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.644568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.644592] Call Trace:
[   13.644604]  <TASK>
[   13.644623]  dump_stack_lvl+0x73/0xb0
[   13.644671]  print_report+0xd1/0x650
[   13.644695]  ? __virt_addr_valid+0x1db/0x2d0
[   13.644717]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.644749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.644773]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.644796]  kasan_report+0x141/0x180
[   13.644831]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.644858]  __asan_report_load4_noabort+0x18/0x20
[   13.644880]  kasan_atomics_helper+0x4bbc/0x5450
[   13.644903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.644927]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.644951]  ? kasan_atomics+0x152/0x310
[   13.644974]  kasan_atomics+0x1dc/0x310
[   13.644994]  ? __pfx_kasan_atomics+0x10/0x10
[   13.645017]  ? __pfx_read_tsc+0x10/0x10
[   13.645038]  ? ktime_get_ts64+0x86/0x230
[   13.645066]  kunit_try_run_case+0x1a5/0x480
[   13.645093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.645141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.645167]  ? __kthread_parkme+0x82/0x180
[   13.645190]  ? preempt_count_sub+0x50/0x80
[   13.645216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.645252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.645433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.645461]  kthread+0x337/0x6f0
[   13.645479]  ? trace_preempt_on+0x20/0xc0
[   13.645503]  ? __pfx_kthread+0x10/0x10
[   13.645521]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.645552]  ? calculate_sigpending+0x7b/0xa0
[   13.645575]  ? __pfx_kthread+0x10/0x10
[   13.645594]  ret_from_fork+0x41/0x80
[   13.645615]  ? __pfx_kthread+0x10/0x10
[   13.645655]  ret_from_fork_asm+0x1a/0x30
[   13.645688]  </TASK>
[   13.645700] 
[   13.658538] Allocated by task 284:
[   13.658917]  kasan_save_stack+0x45/0x70
[   13.659413]  kasan_save_track+0x18/0x40
[   13.659612]  kasan_save_alloc_info+0x3b/0x50
[   13.660047]  __kasan_kmalloc+0xb7/0xc0
[   13.660185]  __kmalloc_cache_noprof+0x189/0x420
[   13.660670]  kasan_atomics+0x95/0x310
[   13.661033]  kunit_try_run_case+0x1a5/0x480
[   13.661182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.661818]  kthread+0x337/0x6f0
[   13.662158]  ret_from_fork+0x41/0x80
[   13.662591]  ret_from_fork_asm+0x1a/0x30
[   13.662960] 
[   13.663034] The buggy address belongs to the object at ffff8881039f4880
[   13.663034]  which belongs to the cache kmalloc-64 of size 64
[   13.663826] The buggy address is located 0 bytes to the right of
[   13.663826]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.664868] 
[   13.664944] The buggy address belongs to the physical page:
[   13.665115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.665536] flags: 0x200000000000000(node=0|zone=2)
[   13.666031] page_type: f5(slab)
[   13.666306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.666806] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.667257] page dumped because: kasan: bad access detected
[   13.667618] 
[   13.667794] Memory state around the buggy address:
[   13.668125]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.668429]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.669132] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.670049]                                      ^
[   13.670505]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.670959]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.671175] ==================================================================
[   14.719729] ==================================================================
[   14.720067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.720435] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.720785] 
[   14.720905] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.720956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.720969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.721003] Call Trace:
[   14.721023]  <TASK>
[   14.721043]  dump_stack_lvl+0x73/0xb0
[   14.721081]  print_report+0xd1/0x650
[   14.721106]  ? __virt_addr_valid+0x1db/0x2d0
[   14.721130]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.721154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.721179]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.721203]  kasan_report+0x141/0x180
[   14.721236]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.721265]  kasan_check_range+0x10c/0x1c0
[   14.721286]  __kasan_check_write+0x18/0x20
[   14.721308]  kasan_atomics_helper+0x1c18/0x5450
[   14.721333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.721357]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.721381]  ? kasan_atomics+0x152/0x310
[   14.721406]  kasan_atomics+0x1dc/0x310
[   14.721436]  ? __pfx_kasan_atomics+0x10/0x10
[   14.721459]  ? __pfx_read_tsc+0x10/0x10
[   14.721480]  ? ktime_get_ts64+0x86/0x230
[   14.721517]  kunit_try_run_case+0x1a5/0x480
[   14.721549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.721572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.721598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.721623]  ? __kthread_parkme+0x82/0x180
[   14.721665]  ? preempt_count_sub+0x50/0x80
[   14.721692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.721717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.721744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.721769]  kthread+0x337/0x6f0
[   14.721786]  ? trace_preempt_on+0x20/0xc0
[   14.721812]  ? __pfx_kthread+0x10/0x10
[   14.721831]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.721855]  ? calculate_sigpending+0x7b/0xa0
[   14.721879]  ? __pfx_kthread+0x10/0x10
[   14.721898]  ret_from_fork+0x41/0x80
[   14.721920]  ? __pfx_kthread+0x10/0x10
[   14.721939]  ret_from_fork_asm+0x1a/0x30
[   14.721981]  </TASK>
[   14.721992] 
[   14.729567] Allocated by task 284:
[   14.729721]  kasan_save_stack+0x45/0x70
[   14.729968]  kasan_save_track+0x18/0x40
[   14.730164]  kasan_save_alloc_info+0x3b/0x50
[   14.730382]  __kasan_kmalloc+0xb7/0xc0
[   14.730572]  __kmalloc_cache_noprof+0x189/0x420
[   14.730819]  kasan_atomics+0x95/0x310
[   14.730984]  kunit_try_run_case+0x1a5/0x480
[   14.731149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.731415]  kthread+0x337/0x6f0
[   14.731589]  ret_from_fork+0x41/0x80
[   14.731751]  ret_from_fork_asm+0x1a/0x30
[   14.731893] 
[   14.731966] The buggy address belongs to the object at ffff8881039f4880
[   14.731966]  which belongs to the cache kmalloc-64 of size 64
[   14.732483] The buggy address is located 0 bytes to the right of
[   14.732483]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.733087] 
[   14.733187] The buggy address belongs to the physical page:
[   14.733377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.733627] flags: 0x200000000000000(node=0|zone=2)
[   14.733902] page_type: f5(slab)
[   14.734103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.734506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.734842] page dumped because: kasan: bad access detected
[   14.735017] 
[   14.735088] Memory state around the buggy address:
[   14.735329]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.735702]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.735964] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.736181]                                      ^
[   14.736421]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.736787]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.737111] ==================================================================
[   14.799091] ==================================================================
[   14.799872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.800156] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.800400] 
[   14.800494] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.800542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.800555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.800580] Call Trace:
[   14.800601]  <TASK>
[   14.800622]  dump_stack_lvl+0x73/0xb0
[   14.800679]  print_report+0xd1/0x650
[   14.800704]  ? __virt_addr_valid+0x1db/0x2d0
[   14.800729]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.800752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.800777]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.800801]  kasan_report+0x141/0x180
[   14.800826]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.800854]  kasan_check_range+0x10c/0x1c0
[   14.800877]  __kasan_check_write+0x18/0x20
[   14.800898]  kasan_atomics_helper+0x1e12/0x5450
[   14.800923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.800947]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.800972]  ? kasan_atomics+0x152/0x310
[   14.800997]  kasan_atomics+0x1dc/0x310
[   14.801019]  ? __pfx_kasan_atomics+0x10/0x10
[   14.801041]  ? __pfx_read_tsc+0x10/0x10
[   14.801063]  ? ktime_get_ts64+0x86/0x230
[   14.801090]  kunit_try_run_case+0x1a5/0x480
[   14.801117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801141]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.801167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.801192]  ? __kthread_parkme+0x82/0x180
[   14.801216]  ? preempt_count_sub+0x50/0x80
[   14.801254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.801280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.801305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.801329]  kthread+0x337/0x6f0
[   14.801347]  ? trace_preempt_on+0x20/0xc0
[   14.801372]  ? __pfx_kthread+0x10/0x10
[   14.801392]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.801414]  ? calculate_sigpending+0x7b/0xa0
[   14.801437]  ? __pfx_kthread+0x10/0x10
[   14.801458]  ret_from_fork+0x41/0x80
[   14.801479]  ? __pfx_kthread+0x10/0x10
[   14.801499]  ret_from_fork_asm+0x1a/0x30
[   14.801530]  </TASK>
[   14.801550] 
[   14.814985] Allocated by task 284:
[   14.815341]  kasan_save_stack+0x45/0x70
[   14.815738]  kasan_save_track+0x18/0x40
[   14.816051]  kasan_save_alloc_info+0x3b/0x50
[   14.816201]  __kasan_kmalloc+0xb7/0xc0
[   14.816569]  __kmalloc_cache_noprof+0x189/0x420
[   14.817012]  kasan_atomics+0x95/0x310
[   14.817353]  kunit_try_run_case+0x1a5/0x480
[   14.817724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817906]  kthread+0x337/0x6f0
[   14.818030]  ret_from_fork+0x41/0x80
[   14.818171]  ret_from_fork_asm+0x1a/0x30
[   14.818462] 
[   14.818626] The buggy address belongs to the object at ffff8881039f4880
[   14.818626]  which belongs to the cache kmalloc-64 of size 64
[   14.819594] The buggy address is located 0 bytes to the right of
[   14.819594]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.820386] 
[   14.820464] The buggy address belongs to the physical page:
[   14.820662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.821348] flags: 0x200000000000000(node=0|zone=2)
[   14.821798] page_type: f5(slab)
[   14.822094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.822771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.823364] page dumped because: kasan: bad access detected
[   14.823539] 
[   14.823610] Memory state around the buggy address:
[   14.824048]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.824675]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.825288] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.825755]                                      ^
[   14.825917]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826134]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826362] ==================================================================
[   14.222758] ==================================================================
[   14.223071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.223435] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.223914] 
[   14.224011] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.224061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.224090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.224114] Call Trace:
[   14.224134]  <TASK>
[   14.224155]  dump_stack_lvl+0x73/0xb0
[   14.224184]  print_report+0xd1/0x650
[   14.224209]  ? __virt_addr_valid+0x1db/0x2d0
[   14.224243]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.224284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.224309]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.224334]  kasan_report+0x141/0x180
[   14.224358]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.224387]  __asan_report_load4_noabort+0x18/0x20
[   14.224409]  kasan_atomics_helper+0x4a36/0x5450
[   14.224433]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.224457]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.224862]  ? kasan_atomics+0x152/0x310
[   14.224888]  kasan_atomics+0x1dc/0x310
[   14.224908]  ? __pfx_kasan_atomics+0x10/0x10
[   14.224931]  ? __pfx_read_tsc+0x10/0x10
[   14.224952]  ? ktime_get_ts64+0x86/0x230
[   14.226729]  kunit_try_run_case+0x1a5/0x480
[   14.226763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.226813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.226839]  ? __kthread_parkme+0x82/0x180
[   14.226863]  ? preempt_count_sub+0x50/0x80
[   14.226889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.226940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.226964]  kthread+0x337/0x6f0
[   14.226983]  ? trace_preempt_on+0x20/0xc0
[   14.227008]  ? __pfx_kthread+0x10/0x10
[   14.227027]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.227051]  ? calculate_sigpending+0x7b/0xa0
[   14.227075]  ? __pfx_kthread+0x10/0x10
[   14.227095]  ret_from_fork+0x41/0x80
[   14.227117]  ? __pfx_kthread+0x10/0x10
[   14.227135]  ret_from_fork_asm+0x1a/0x30
[   14.227168]  </TASK>
[   14.227180] 
[   14.237703] Allocated by task 284:
[   14.237889]  kasan_save_stack+0x45/0x70
[   14.238088]  kasan_save_track+0x18/0x40
[   14.238268]  kasan_save_alloc_info+0x3b/0x50
[   14.238467]  __kasan_kmalloc+0xb7/0xc0
[   14.238646]  __kmalloc_cache_noprof+0x189/0x420
[   14.238851]  kasan_atomics+0x95/0x310
[   14.239018]  kunit_try_run_case+0x1a5/0x480
[   14.239199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.239951]  kthread+0x337/0x6f0
[   14.240086]  ret_from_fork+0x41/0x80
[   14.240369]  ret_from_fork_asm+0x1a/0x30
[   14.240814] 
[   14.240906] The buggy address belongs to the object at ffff8881039f4880
[   14.240906]  which belongs to the cache kmalloc-64 of size 64
[   14.241777] The buggy address is located 0 bytes to the right of
[   14.241777]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.242528] 
[   14.242758] The buggy address belongs to the physical page:
[   14.243160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.243668] flags: 0x200000000000000(node=0|zone=2)
[   14.244073] page_type: f5(slab)
[   14.244262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.244579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.245331] page dumped because: kasan: bad access detected
[   14.245760] 
[   14.245977] Memory state around the buggy address:
[   14.246331]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.246913]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.247358] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.247660]                                      ^
[   14.247872]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.248159]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.248457] ==================================================================
[   14.873256] ==================================================================
[   14.873604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.873967] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.874286] 
[   14.874389] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.874435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.874448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.874471] Call Trace:
[   14.874489]  <TASK>
[   14.874508]  dump_stack_lvl+0x73/0xb0
[   14.874533]  print_report+0xd1/0x650
[   14.874558]  ? __virt_addr_valid+0x1db/0x2d0
[   14.874582]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.874606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.874631]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.874654]  kasan_report+0x141/0x180
[   14.874679]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.874708]  __asan_report_load8_noabort+0x18/0x20
[   14.874730]  kasan_atomics_helper+0x4f71/0x5450
[   14.874755]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.874779]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.874803]  ? kasan_atomics+0x152/0x310
[   14.874828]  kasan_atomics+0x1dc/0x310
[   14.874848]  ? __pfx_kasan_atomics+0x10/0x10
[   14.874871]  ? __pfx_read_tsc+0x10/0x10
[   14.874892]  ? ktime_get_ts64+0x86/0x230
[   14.874919]  kunit_try_run_case+0x1a5/0x480
[   14.874944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.874969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.874995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.875020]  ? __kthread_parkme+0x82/0x180
[   14.875044]  ? preempt_count_sub+0x50/0x80
[   14.875071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.875096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.875121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.875146]  kthread+0x337/0x6f0
[   14.875165]  ? trace_preempt_on+0x20/0xc0
[   14.875190]  ? __pfx_kthread+0x10/0x10
[   14.875209]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.875243]  ? calculate_sigpending+0x7b/0xa0
[   14.875267]  ? __pfx_kthread+0x10/0x10
[   14.875287]  ret_from_fork+0x41/0x80
[   14.875310]  ? __pfx_kthread+0x10/0x10
[   14.875329]  ret_from_fork_asm+0x1a/0x30
[   14.875362]  </TASK>
[   14.875374] 
[   14.882536] Allocated by task 284:
[   14.882785]  kasan_save_stack+0x45/0x70
[   14.882990]  kasan_save_track+0x18/0x40
[   14.883130]  kasan_save_alloc_info+0x3b/0x50
[   14.883289]  __kasan_kmalloc+0xb7/0xc0
[   14.883424]  __kmalloc_cache_noprof+0x189/0x420
[   14.883579]  kasan_atomics+0x95/0x310
[   14.883711]  kunit_try_run_case+0x1a5/0x480
[   14.883858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884150]  kthread+0x337/0x6f0
[   14.884328]  ret_from_fork+0x41/0x80
[   14.884514]  ret_from_fork_asm+0x1a/0x30
[   14.884771] 
[   14.884868] The buggy address belongs to the object at ffff8881039f4880
[   14.884868]  which belongs to the cache kmalloc-64 of size 64
[   14.885417] The buggy address is located 0 bytes to the right of
[   14.885417]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.885964] 
[   14.886073] The buggy address belongs to the physical page:
[   14.886271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.886514] flags: 0x200000000000000(node=0|zone=2)
[   14.886678] page_type: f5(slab)
[   14.886799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.887184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.887540] page dumped because: kasan: bad access detected
[   14.887797] 
[   14.887897] Memory state around the buggy address:
[   14.888129]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.888623]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.888958] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.889288]                                      ^
[   14.889517]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.889861]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890107] ==================================================================
[   14.997048] ==================================================================
[   14.997343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.997662] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.997960] 
[   14.998048] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.998095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.998107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.998130] Call Trace:
[   14.998146]  <TASK>
[   14.998161]  dump_stack_lvl+0x73/0xb0
[   14.998186]  print_report+0xd1/0x650
[   14.998210]  ? __virt_addr_valid+0x1db/0x2d0
[   14.998244]  ? kasan_atomics_helper+0x224c/0x5450
[   14.998268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.998292]  ? kasan_atomics_helper+0x224c/0x5450
[   14.998315]  kasan_report+0x141/0x180
[   14.998340]  ? kasan_atomics_helper+0x224c/0x5450
[   14.998368]  kasan_check_range+0x10c/0x1c0
[   14.998391]  __kasan_check_write+0x18/0x20
[   14.998412]  kasan_atomics_helper+0x224c/0x5450
[   14.998436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.998460]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.998483]  ? kasan_atomics+0x152/0x310
[   14.998508]  kasan_atomics+0x1dc/0x310
[   14.998530]  ? __pfx_kasan_atomics+0x10/0x10
[   14.998552]  ? __pfx_read_tsc+0x10/0x10
[   14.998573]  ? ktime_get_ts64+0x86/0x230
[   14.998600]  kunit_try_run_case+0x1a5/0x480
[   14.998626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998649]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.998675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.998701]  ? __kthread_parkme+0x82/0x180
[   14.998724]  ? preempt_count_sub+0x50/0x80
[   14.998751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.998826]  kthread+0x337/0x6f0
[   14.998845]  ? trace_preempt_on+0x20/0xc0
[   14.998870]  ? __pfx_kthread+0x10/0x10
[   14.998889]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.998912]  ? calculate_sigpending+0x7b/0xa0
[   14.998936]  ? __pfx_kthread+0x10/0x10
[   14.998956]  ret_from_fork+0x41/0x80
[   14.998977]  ? __pfx_kthread+0x10/0x10
[   14.998996]  ret_from_fork_asm+0x1a/0x30
[   14.999028]  </TASK>
[   14.999039] 
[   15.006525] Allocated by task 284:
[   15.006772]  kasan_save_stack+0x45/0x70
[   15.006944]  kasan_save_track+0x18/0x40
[   15.007123]  kasan_save_alloc_info+0x3b/0x50
[   15.007318]  __kasan_kmalloc+0xb7/0xc0
[   15.007472]  __kmalloc_cache_noprof+0x189/0x420
[   15.007701]  kasan_atomics+0x95/0x310
[   15.007831]  kunit_try_run_case+0x1a5/0x480
[   15.007977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.008219]  kthread+0x337/0x6f0
[   15.008399]  ret_from_fork+0x41/0x80
[   15.008586]  ret_from_fork_asm+0x1a/0x30
[   15.008795] 
[   15.008897] The buggy address belongs to the object at ffff8881039f4880
[   15.008897]  which belongs to the cache kmalloc-64 of size 64
[   15.009318] The buggy address is located 0 bytes to the right of
[   15.009318]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   15.009745] 
[   15.009845] The buggy address belongs to the physical page:
[   15.010094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   15.010457] flags: 0x200000000000000(node=0|zone=2)
[   15.010703] page_type: f5(slab)
[   15.010825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.011052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.011305] page dumped because: kasan: bad access detected
[   15.011564] 
[   15.011668] Memory state around the buggy address:
[   15.011897]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012179]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.012463] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.012742]                                      ^
[   15.012939]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013241]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.013504] ==================================================================
[   15.014109] ==================================================================
[   15.014491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.014808] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   15.015110] 
[   15.015213] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   15.015271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.015286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.015309] Call Trace:
[   15.015328]  <TASK>
[   15.015347]  dump_stack_lvl+0x73/0xb0
[   15.015374]  print_report+0xd1/0x650
[   15.015398]  ? __virt_addr_valid+0x1db/0x2d0
[   15.015421]  ? kasan_atomics_helper+0x5115/0x5450
[   15.015445]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.015469]  ? kasan_atomics_helper+0x5115/0x5450
[   15.015493]  kasan_report+0x141/0x180
[   15.015518]  ? kasan_atomics_helper+0x5115/0x5450
[   15.015546]  __asan_report_load8_noabort+0x18/0x20
[   15.015569]  kasan_atomics_helper+0x5115/0x5450
[   15.015597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.015621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.015655]  ? kasan_atomics+0x152/0x310
[   15.015680]  kasan_atomics+0x1dc/0x310
[   15.015701]  ? __pfx_kasan_atomics+0x10/0x10
[   15.015724]  ? __pfx_read_tsc+0x10/0x10
[   15.015745]  ? ktime_get_ts64+0x86/0x230
[   15.015772]  kunit_try_run_case+0x1a5/0x480
[   15.015798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.015848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.015874]  ? __kthread_parkme+0x82/0x180
[   15.015897]  ? preempt_count_sub+0x50/0x80
[   15.015924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.015974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.015999]  kthread+0x337/0x6f0
[   15.016017]  ? trace_preempt_on+0x20/0xc0
[   15.016042]  ? __pfx_kthread+0x10/0x10
[   15.016062]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.016085]  ? calculate_sigpending+0x7b/0xa0
[   15.016108]  ? __pfx_kthread+0x10/0x10
[   15.016129]  ret_from_fork+0x41/0x80
[   15.016150]  ? __pfx_kthread+0x10/0x10
[   15.016170]  ret_from_fork_asm+0x1a/0x30
[   15.016202]  </TASK>
[   15.016213] 
[   15.023661] Allocated by task 284:
[   15.023815]  kasan_save_stack+0x45/0x70
[   15.023997]  kasan_save_track+0x18/0x40
[   15.024186]  kasan_save_alloc_info+0x3b/0x50
[   15.024389]  __kasan_kmalloc+0xb7/0xc0
[   15.024552]  __kmalloc_cache_noprof+0x189/0x420
[   15.024778]  kasan_atomics+0x95/0x310
[   15.024966]  kunit_try_run_case+0x1a5/0x480
[   15.025167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.025379]  kthread+0x337/0x6f0
[   15.025501]  ret_from_fork+0x41/0x80
[   15.025637]  ret_from_fork_asm+0x1a/0x30
[   15.025840] 
[   15.025936] The buggy address belongs to the object at ffff8881039f4880
[   15.025936]  which belongs to the cache kmalloc-64 of size 64
[   15.026431] The buggy address is located 0 bytes to the right of
[   15.026431]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   15.027329] 
[   15.027426] The buggy address belongs to the physical page:
[   15.027626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   15.027867] flags: 0x200000000000000(node=0|zone=2)
[   15.028034] page_type: f5(slab)
[   15.028217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.028575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.029065] page dumped because: kasan: bad access detected
[   15.029247] 
[   15.029318] Memory state around the buggy address:
[   15.029479]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.029854]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.030177] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.030509]                                      ^
[   15.030849]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.031182]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.031482] ==================================================================
[   13.745943] ==================================================================
[   13.746315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.746826] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.747160] 
[   13.747286] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.747331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.747344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.747409] Call Trace:
[   13.747425]  <TASK>
[   13.747454]  dump_stack_lvl+0x73/0xb0
[   13.747482]  print_report+0xd1/0x650
[   13.747506]  ? __virt_addr_valid+0x1db/0x2d0
[   13.747528]  ? kasan_atomics_helper+0x3df/0x5450
[   13.747560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.747584]  ? kasan_atomics_helper+0x3df/0x5450
[   13.747619]  kasan_report+0x141/0x180
[   13.747642]  ? kasan_atomics_helper+0x3df/0x5450
[   13.747671]  kasan_check_range+0x10c/0x1c0
[   13.747693]  __kasan_check_read+0x15/0x20
[   13.747723]  kasan_atomics_helper+0x3df/0x5450
[   13.747748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.747772]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.747806]  ? kasan_atomics+0x152/0x310
[   13.747831]  kasan_atomics+0x1dc/0x310
[   13.747852]  ? __pfx_kasan_atomics+0x10/0x10
[   13.747875]  ? __pfx_read_tsc+0x10/0x10
[   13.747896]  ? ktime_get_ts64+0x86/0x230
[   13.747931]  kunit_try_run_case+0x1a5/0x480
[   13.747956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.747981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.748016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.748041]  ? __kthread_parkme+0x82/0x180
[   13.748064]  ? preempt_count_sub+0x50/0x80
[   13.748090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.748115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.748140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.748172]  kthread+0x337/0x6f0
[   13.748190]  ? trace_preempt_on+0x20/0xc0
[   13.748215]  ? __pfx_kthread+0x10/0x10
[   13.748249]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.748273]  ? calculate_sigpending+0x7b/0xa0
[   13.748296]  ? __pfx_kthread+0x10/0x10
[   13.748315]  ret_from_fork+0x41/0x80
[   13.748338]  ? __pfx_kthread+0x10/0x10
[   13.748357]  ret_from_fork_asm+0x1a/0x30
[   13.748515]  </TASK>
[   13.748533] 
[   13.757116] Allocated by task 284:
[   13.757337]  kasan_save_stack+0x45/0x70
[   13.757543]  kasan_save_track+0x18/0x40
[   13.757743]  kasan_save_alloc_info+0x3b/0x50
[   13.758087]  __kasan_kmalloc+0xb7/0xc0
[   13.758224]  __kmalloc_cache_noprof+0x189/0x420
[   13.758423]  kasan_atomics+0x95/0x310
[   13.758611]  kunit_try_run_case+0x1a5/0x480
[   13.758962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.759142]  kthread+0x337/0x6f0
[   13.759277]  ret_from_fork+0x41/0x80
[   13.759440]  ret_from_fork_asm+0x1a/0x30
[   13.759638] 
[   13.759803] The buggy address belongs to the object at ffff8881039f4880
[   13.759803]  which belongs to the cache kmalloc-64 of size 64
[   13.760348] The buggy address is located 0 bytes to the right of
[   13.760348]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.761011] 
[   13.761094] The buggy address belongs to the physical page:
[   13.761281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.761651] flags: 0x200000000000000(node=0|zone=2)
[   13.761914] page_type: f5(slab)
[   13.762263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.762740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.762975] page dumped because: kasan: bad access detected
[   13.763242] 
[   13.763419] Memory state around the buggy address:
[   13.763648]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.764027]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.764534] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.764943]                                      ^
[   13.765185]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.765623]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.765918] ==================================================================
[   13.972818] ==================================================================
[   13.973099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.973469] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.973874] 
[   13.973962] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.974072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.974086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.974109] Call Trace:
[   13.974125]  <TASK>
[   13.974143]  dump_stack_lvl+0x73/0xb0
[   13.974177]  print_report+0xd1/0x650
[   13.974202]  ? __virt_addr_valid+0x1db/0x2d0
[   13.974224]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.974264]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.974325]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.974351]  kasan_report+0x141/0x180
[   13.974386]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.974414]  kasan_check_range+0x10c/0x1c0
[   13.974437]  __kasan_check_write+0x18/0x20
[   13.974470]  kasan_atomics_helper+0x8f9/0x5450
[   13.974496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.974521]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.974553]  ? kasan_atomics+0x152/0x310
[   13.974578]  kasan_atomics+0x1dc/0x310
[   13.974601]  ? __pfx_kasan_atomics+0x10/0x10
[   13.974636]  ? __pfx_read_tsc+0x10/0x10
[   13.974660]  ? ktime_get_ts64+0x86/0x230
[   13.974689]  kunit_try_run_case+0x1a5/0x480
[   13.974714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.974764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.974790]  ? __kthread_parkme+0x82/0x180
[   13.974813]  ? preempt_count_sub+0x50/0x80
[   13.974839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.974890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.974915]  kthread+0x337/0x6f0
[   13.974933]  ? trace_preempt_on+0x20/0xc0
[   13.974956]  ? __pfx_kthread+0x10/0x10
[   13.974976]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.974999]  ? calculate_sigpending+0x7b/0xa0
[   13.975022]  ? __pfx_kthread+0x10/0x10
[   13.975042]  ret_from_fork+0x41/0x80
[   13.975064]  ? __pfx_kthread+0x10/0x10
[   13.975083]  ret_from_fork_asm+0x1a/0x30
[   13.975115]  </TASK>
[   13.975126] 
[   13.984173] Allocated by task 284:
[   13.984351]  kasan_save_stack+0x45/0x70
[   13.984789]  kasan_save_track+0x18/0x40
[   13.985099]  kasan_save_alloc_info+0x3b/0x50
[   13.985357]  __kasan_kmalloc+0xb7/0xc0
[   13.985597]  __kmalloc_cache_noprof+0x189/0x420
[   13.985853]  kasan_atomics+0x95/0x310
[   13.986025]  kunit_try_run_case+0x1a5/0x480
[   13.986225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.986601]  kthread+0x337/0x6f0
[   13.986826]  ret_from_fork+0x41/0x80
[   13.987000]  ret_from_fork_asm+0x1a/0x30
[   13.987219] 
[   13.987303] The buggy address belongs to the object at ffff8881039f4880
[   13.987303]  which belongs to the cache kmalloc-64 of size 64
[   13.987908] The buggy address is located 0 bytes to the right of
[   13.987908]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.988587] 
[   13.988788] The buggy address belongs to the physical page:
[   13.988990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.989244] flags: 0x200000000000000(node=0|zone=2)
[   13.989408] page_type: f5(slab)
[   13.989658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.990336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.990671] page dumped because: kasan: bad access detected
[   13.990914] 
[   13.990995] Memory state around the buggy address:
[   13.991199]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.991635]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.991967] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.992325]                                      ^
[   13.992573]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.992925]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.994021] ==================================================================
[   13.766443] ==================================================================
[   13.766883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.767223] Read of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.767670] 
[   13.767785] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.767839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.767852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.767874] Call Trace:
[   13.767887]  <TASK>
[   13.767912]  dump_stack_lvl+0x73/0xb0
[   13.767937]  print_report+0xd1/0x650
[   13.767960]  ? __virt_addr_valid+0x1db/0x2d0
[   13.767982]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.768005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.768030]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.768053]  kasan_report+0x141/0x180
[   13.768077]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.768105]  __asan_report_load4_noabort+0x18/0x20
[   13.768129]  kasan_atomics_helper+0x4b54/0x5450
[   13.768153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.768176]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.768199]  ? kasan_atomics+0x152/0x310
[   13.768224]  kasan_atomics+0x1dc/0x310
[   13.768255]  ? __pfx_kasan_atomics+0x10/0x10
[   13.768278]  ? __pfx_read_tsc+0x10/0x10
[   13.768299]  ? ktime_get_ts64+0x86/0x230
[   13.768325]  kunit_try_run_case+0x1a5/0x480
[   13.768350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.768374]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.768408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.768433]  ? __kthread_parkme+0x82/0x180
[   13.768456]  ? preempt_count_sub+0x50/0x80
[   13.768493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.768518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.768567]  kthread+0x337/0x6f0
[   13.768586]  ? trace_preempt_on+0x20/0xc0
[   13.768610]  ? __pfx_kthread+0x10/0x10
[   13.768630]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.768653]  ? calculate_sigpending+0x7b/0xa0
[   13.768676]  ? __pfx_kthread+0x10/0x10
[   13.768696]  ret_from_fork+0x41/0x80
[   13.768718]  ? __pfx_kthread+0x10/0x10
[   13.768738]  ret_from_fork_asm+0x1a/0x30
[   13.768770]  </TASK>
[   13.768781] 
[   13.780026] Allocated by task 284:
[   13.780425]  kasan_save_stack+0x45/0x70
[   13.780904]  kasan_save_track+0x18/0x40
[   13.781166]  kasan_save_alloc_info+0x3b/0x50
[   13.781558]  __kasan_kmalloc+0xb7/0xc0
[   13.781901]  __kmalloc_cache_noprof+0x189/0x420
[   13.782325]  kasan_atomics+0x95/0x310
[   13.782755]  kunit_try_run_case+0x1a5/0x480
[   13.783031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.783540]  kthread+0x337/0x6f0
[   13.783851]  ret_from_fork+0x41/0x80
[   13.784174]  ret_from_fork_asm+0x1a/0x30
[   13.784520] 
[   13.784629] The buggy address belongs to the object at ffff8881039f4880
[   13.784629]  which belongs to the cache kmalloc-64 of size 64
[   13.785110] The buggy address is located 0 bytes to the right of
[   13.785110]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.785511] 
[   13.785690] The buggy address belongs to the physical page:
[   13.786189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.786559] flags: 0x200000000000000(node=0|zone=2)
[   13.786855] page_type: f5(slab)
[   13.786977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.787324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.787813] page dumped because: kasan: bad access detected
[   13.788137] 
[   13.788258] Memory state around the buggy address:
[   13.788556]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.788909]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.789144] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.789506]                                      ^
[   13.789806]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.790205]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.790691] ==================================================================
[   14.773947] ==================================================================
[   14.774297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.774699] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.774983] 
[   14.775075] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.775121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.775135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.775159] Call Trace:
[   14.775176]  <TASK>
[   14.775195]  dump_stack_lvl+0x73/0xb0
[   14.775221]  print_report+0xd1/0x650
[   14.775254]  ? __virt_addr_valid+0x1db/0x2d0
[   14.775277]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.775301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.775325]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.775349]  kasan_report+0x141/0x180
[   14.775383]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.775412]  kasan_check_range+0x10c/0x1c0
[   14.775434]  __kasan_check_write+0x18/0x20
[   14.775467]  kasan_atomics_helper+0x1d7a/0x5450
[   14.775492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.775517]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.775543]  ? kasan_atomics+0x152/0x310
[   14.775569]  kasan_atomics+0x1dc/0x310
[   14.775590]  ? __pfx_kasan_atomics+0x10/0x10
[   14.775613]  ? __pfx_read_tsc+0x10/0x10
[   14.775653]  ? ktime_get_ts64+0x86/0x230
[   14.775680]  kunit_try_run_case+0x1a5/0x480
[   14.775706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.775730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.775756]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.775781]  ? __kthread_parkme+0x82/0x180
[   14.775808]  ? preempt_count_sub+0x50/0x80
[   14.775835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.775869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.775893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.775918]  kthread+0x337/0x6f0
[   14.775947]  ? trace_preempt_on+0x20/0xc0
[   14.775973]  ? __pfx_kthread+0x10/0x10
[   14.775993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.776025]  ? calculate_sigpending+0x7b/0xa0
[   14.776049]  ? __pfx_kthread+0x10/0x10
[   14.776069]  ret_from_fork+0x41/0x80
[   14.776101]  ? __pfx_kthread+0x10/0x10
[   14.776121]  ret_from_fork_asm+0x1a/0x30
[   14.776152]  </TASK>
[   14.776163] 
[   14.785330] Allocated by task 284:
[   14.785699]  kasan_save_stack+0x45/0x70
[   14.786052]  kasan_save_track+0x18/0x40
[   14.786425]  kasan_save_alloc_info+0x3b/0x50
[   14.786834]  __kasan_kmalloc+0xb7/0xc0
[   14.787175]  __kmalloc_cache_noprof+0x189/0x420
[   14.787592]  kasan_atomics+0x95/0x310
[   14.787951]  kunit_try_run_case+0x1a5/0x480
[   14.788205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788715]  kthread+0x337/0x6f0
[   14.788976]  ret_from_fork+0x41/0x80
[   14.789111]  ret_from_fork_asm+0x1a/0x30
[   14.789264] 
[   14.789340] The buggy address belongs to the object at ffff8881039f4880
[   14.789340]  which belongs to the cache kmalloc-64 of size 64
[   14.789840] The buggy address is located 0 bytes to the right of
[   14.789840]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.790932] 
[   14.791095] The buggy address belongs to the physical page:
[   14.791568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.792251] flags: 0x200000000000000(node=0|zone=2)
[   14.792700] page_type: f5(slab)
[   14.793002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.793682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.794320] page dumped because: kasan: bad access detected
[   14.794808] 
[   14.794883] Memory state around the buggy address:
[   14.795043]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.795320]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.795944] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.796561]                                      ^
[   14.797008]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797622]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.798251] ==================================================================
[   14.187039] ==================================================================
[   14.187551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.187892] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.188134] 
[   14.188244] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.188292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.188305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.188328] Call Trace:
[   14.188349]  <TASK>
[   14.188369]  dump_stack_lvl+0x73/0xb0
[   14.188396]  print_report+0xd1/0x650
[   14.188419]  ? __virt_addr_valid+0x1db/0x2d0
[   14.188444]  ? kasan_atomics_helper+0xf10/0x5450
[   14.188466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.188490]  ? kasan_atomics_helper+0xf10/0x5450
[   14.188514]  kasan_report+0x141/0x180
[   14.188538]  ? kasan_atomics_helper+0xf10/0x5450
[   14.188565]  kasan_check_range+0x10c/0x1c0
[   14.188588]  __kasan_check_write+0x18/0x20
[   14.188610]  kasan_atomics_helper+0xf10/0x5450
[   14.188635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.188659]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.188682]  ? kasan_atomics+0x152/0x310
[   14.188708]  kasan_atomics+0x1dc/0x310
[   14.188728]  ? __pfx_kasan_atomics+0x10/0x10
[   14.188751]  ? __pfx_read_tsc+0x10/0x10
[   14.188772]  ? ktime_get_ts64+0x86/0x230
[   14.188799]  kunit_try_run_case+0x1a5/0x480
[   14.188825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.188849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.188875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.188899]  ? __kthread_parkme+0x82/0x180
[   14.188923]  ? preempt_count_sub+0x50/0x80
[   14.188950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.188976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.189001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.189025]  kthread+0x337/0x6f0
[   14.189044]  ? trace_preempt_on+0x20/0xc0
[   14.189069]  ? __pfx_kthread+0x10/0x10
[   14.189088]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.189112]  ? calculate_sigpending+0x7b/0xa0
[   14.189135]  ? __pfx_kthread+0x10/0x10
[   14.189155]  ret_from_fork+0x41/0x80
[   14.189177]  ? __pfx_kthread+0x10/0x10
[   14.189196]  ret_from_fork_asm+0x1a/0x30
[   14.189237]  </TASK>
[   14.189249] 
[   14.196765] Allocated by task 284:
[   14.196959]  kasan_save_stack+0x45/0x70
[   14.197149]  kasan_save_track+0x18/0x40
[   14.197324]  kasan_save_alloc_info+0x3b/0x50
[   14.197536]  __kasan_kmalloc+0xb7/0xc0
[   14.197727]  __kmalloc_cache_noprof+0x189/0x420
[   14.197894]  kasan_atomics+0x95/0x310
[   14.198083]  kunit_try_run_case+0x1a5/0x480
[   14.198285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198497]  kthread+0x337/0x6f0
[   14.198618]  ret_from_fork+0x41/0x80
[   14.198750]  ret_from_fork_asm+0x1a/0x30
[   14.198891] 
[   14.198963] The buggy address belongs to the object at ffff8881039f4880
[   14.198963]  which belongs to the cache kmalloc-64 of size 64
[   14.199478] The buggy address is located 0 bytes to the right of
[   14.199478]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.200090] 
[   14.200166] The buggy address belongs to the physical page:
[   14.200348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.200587] flags: 0x200000000000000(node=0|zone=2)
[   14.200855] page_type: f5(slab)
[   14.201028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.201393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.201741] page dumped because: kasan: bad access detected
[   14.202047] 
[   14.202119] Memory state around the buggy address:
[   14.202288]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.202506]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.202724] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.203049]                                      ^
[   14.203287]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.203606]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.203923] ==================================================================
[   13.951544] ==================================================================
[   13.952009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.952416] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.952854] 
[   13.952941] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.952985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.952998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.953020] Call Trace:
[   13.953036]  <TASK>
[   13.953051]  dump_stack_lvl+0x73/0xb0
[   13.953076]  print_report+0xd1/0x650
[   13.953112]  ? __virt_addr_valid+0x1db/0x2d0
[   13.953134]  ? kasan_atomics_helper+0x860/0x5450
[   13.953158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.953194]  ? kasan_atomics_helper+0x860/0x5450
[   13.953218]  kasan_report+0x141/0x180
[   13.953252]  ? kasan_atomics_helper+0x860/0x5450
[   13.953328]  kasan_check_range+0x10c/0x1c0
[   13.953369]  __kasan_check_write+0x18/0x20
[   13.953391]  kasan_atomics_helper+0x860/0x5450
[   13.953428]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.953453]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.953476]  ? kasan_atomics+0x152/0x310
[   13.953501]  kasan_atomics+0x1dc/0x310
[   13.953531]  ? __pfx_kasan_atomics+0x10/0x10
[   13.953557]  ? __pfx_read_tsc+0x10/0x10
[   13.953588]  ? ktime_get_ts64+0x86/0x230
[   13.953614]  kunit_try_run_case+0x1a5/0x480
[   13.953640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.953666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.953691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.953715]  ? __kthread_parkme+0x82/0x180
[   13.953737]  ? preempt_count_sub+0x50/0x80
[   13.953763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.953788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.953813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.953838]  kthread+0x337/0x6f0
[   13.953856]  ? trace_preempt_on+0x20/0xc0
[   13.953880]  ? __pfx_kthread+0x10/0x10
[   13.953899]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.953932]  ? calculate_sigpending+0x7b/0xa0
[   13.953953]  ? __pfx_kthread+0x10/0x10
[   13.953974]  ret_from_fork+0x41/0x80
[   13.954006]  ? __pfx_kthread+0x10/0x10
[   13.954025]  ret_from_fork_asm+0x1a/0x30
[   13.954056]  </TASK>
[   13.954067] 
[   13.963198] Allocated by task 284:
[   13.963471]  kasan_save_stack+0x45/0x70
[   13.963714]  kasan_save_track+0x18/0x40
[   13.963876]  kasan_save_alloc_info+0x3b/0x50
[   13.964109]  __kasan_kmalloc+0xb7/0xc0
[   13.964272]  __kmalloc_cache_noprof+0x189/0x420
[   13.964560]  kasan_atomics+0x95/0x310
[   13.964823]  kunit_try_run_case+0x1a5/0x480
[   13.964986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.965161]  kthread+0x337/0x6f0
[   13.965293]  ret_from_fork+0x41/0x80
[   13.965428]  ret_from_fork_asm+0x1a/0x30
[   13.965898] 
[   13.966078] The buggy address belongs to the object at ffff8881039f4880
[   13.966078]  which belongs to the cache kmalloc-64 of size 64
[   13.966862] The buggy address is located 0 bytes to the right of
[   13.966862]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.967283] 
[   13.967360] The buggy address belongs to the physical page:
[   13.967671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.968073] flags: 0x200000000000000(node=0|zone=2)
[   13.968349] page_type: f5(slab)
[   13.968586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.969027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.969393] page dumped because: kasan: bad access detected
[   13.969653] 
[   13.969749] Memory state around the buggy address:
[   13.969942]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970222]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970448] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.970894]                                      ^
[   13.971522]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971874]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.972213] ==================================================================
[   14.147652] ==================================================================
[   14.148183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.148566] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.149000] 
[   14.149126] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.149180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.149194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.149217] Call Trace:
[   14.149249]  <TASK>
[   14.149269]  dump_stack_lvl+0x73/0xb0
[   14.149502]  print_report+0xd1/0x650
[   14.149528]  ? __virt_addr_valid+0x1db/0x2d0
[   14.149558]  ? kasan_atomics_helper+0xde0/0x5450
[   14.149581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.149605]  ? kasan_atomics_helper+0xde0/0x5450
[   14.149628]  kasan_report+0x141/0x180
[   14.149664]  ? kasan_atomics_helper+0xde0/0x5450
[   14.149691]  kasan_check_range+0x10c/0x1c0
[   14.149713]  __kasan_check_write+0x18/0x20
[   14.149734]  kasan_atomics_helper+0xde0/0x5450
[   14.149759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.149783]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.149806]  ? kasan_atomics+0x152/0x310
[   14.149831]  kasan_atomics+0x1dc/0x310
[   14.149852]  ? __pfx_kasan_atomics+0x10/0x10
[   14.149875]  ? __pfx_read_tsc+0x10/0x10
[   14.149895]  ? ktime_get_ts64+0x86/0x230
[   14.149922]  kunit_try_run_case+0x1a5/0x480
[   14.149948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.149971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.149996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.150021]  ? __kthread_parkme+0x82/0x180
[   14.150045]  ? preempt_count_sub+0x50/0x80
[   14.150072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.150096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.150120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.150145]  kthread+0x337/0x6f0
[   14.150164]  ? trace_preempt_on+0x20/0xc0
[   14.150189]  ? __pfx_kthread+0x10/0x10
[   14.150208]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.150244]  ? calculate_sigpending+0x7b/0xa0
[   14.150269]  ? __pfx_kthread+0x10/0x10
[   14.150289]  ret_from_fork+0x41/0x80
[   14.150310]  ? __pfx_kthread+0x10/0x10
[   14.150330]  ret_from_fork_asm+0x1a/0x30
[   14.150361]  </TASK>
[   14.150373] 
[   14.160398] Allocated by task 284:
[   14.160766]  kasan_save_stack+0x45/0x70
[   14.160940]  kasan_save_track+0x18/0x40
[   14.161141]  kasan_save_alloc_info+0x3b/0x50
[   14.161355]  __kasan_kmalloc+0xb7/0xc0
[   14.161541]  __kmalloc_cache_noprof+0x189/0x420
[   14.162011]  kasan_atomics+0x95/0x310
[   14.162179]  kunit_try_run_case+0x1a5/0x480
[   14.162478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.162887]  kthread+0x337/0x6f0
[   14.163036]  ret_from_fork+0x41/0x80
[   14.163321]  ret_from_fork_asm+0x1a/0x30
[   14.163477] 
[   14.163733] The buggy address belongs to the object at ffff8881039f4880
[   14.163733]  which belongs to the cache kmalloc-64 of size 64
[   14.164217] The buggy address is located 0 bytes to the right of
[   14.164217]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.164669] 
[   14.164769] The buggy address belongs to the physical page:
[   14.165003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.165356] flags: 0x200000000000000(node=0|zone=2)
[   14.165584] page_type: f5(slab)
[   14.165788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.166030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.166393] page dumped because: kasan: bad access detected
[   14.166646] 
[   14.166733] Memory state around the buggy address:
[   14.166937]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.167248]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.167494] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.167798]                                      ^
[   14.167955]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.168258]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.168534] ==================================================================
[   14.388471] ==================================================================
[   14.388768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.389391] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.389681] 
[   14.389818] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.389866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.389879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.389902] Call Trace:
[   14.389921]  <TASK>
[   14.389941]  dump_stack_lvl+0x73/0xb0
[   14.389968]  print_report+0xd1/0x650
[   14.389992]  ? __virt_addr_valid+0x1db/0x2d0
[   14.390015]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.390051]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.390075]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.390109]  kasan_report+0x141/0x180
[   14.390134]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.390162]  kasan_check_range+0x10c/0x1c0
[   14.390183]  __kasan_check_write+0x18/0x20
[   14.390205]  kasan_atomics_helper+0x12e6/0x5450
[   14.390245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.390269]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.390303]  ? kasan_atomics+0x152/0x310
[   14.390328]  kasan_atomics+0x1dc/0x310
[   14.390348]  ? __pfx_kasan_atomics+0x10/0x10
[   14.390371]  ? __pfx_read_tsc+0x10/0x10
[   14.390392]  ? ktime_get_ts64+0x86/0x230
[   14.390420]  kunit_try_run_case+0x1a5/0x480
[   14.390446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.390496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.390521]  ? __kthread_parkme+0x82/0x180
[   14.390547]  ? preempt_count_sub+0x50/0x80
[   14.390575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.390601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.390625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.390650]  kthread+0x337/0x6f0
[   14.390668]  ? trace_preempt_on+0x20/0xc0
[   14.390694]  ? __pfx_kthread+0x10/0x10
[   14.390714]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.390738]  ? calculate_sigpending+0x7b/0xa0
[   14.390761]  ? __pfx_kthread+0x10/0x10
[   14.390780]  ret_from_fork+0x41/0x80
[   14.390803]  ? __pfx_kthread+0x10/0x10
[   14.390823]  ret_from_fork_asm+0x1a/0x30
[   14.390855]  </TASK>
[   14.390866] 
[   14.399208] Allocated by task 284:
[   14.399368]  kasan_save_stack+0x45/0x70
[   14.399560]  kasan_save_track+0x18/0x40
[   14.399786]  kasan_save_alloc_info+0x3b/0x50
[   14.399990]  __kasan_kmalloc+0xb7/0xc0
[   14.400173]  __kmalloc_cache_noprof+0x189/0x420
[   14.400383]  kasan_atomics+0x95/0x310
[   14.400549]  kunit_try_run_case+0x1a5/0x480
[   14.400822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.401120]  kthread+0x337/0x6f0
[   14.401297]  ret_from_fork+0x41/0x80
[   14.401440]  ret_from_fork_asm+0x1a/0x30
[   14.401586] 
[   14.401659] The buggy address belongs to the object at ffff8881039f4880
[   14.401659]  which belongs to the cache kmalloc-64 of size 64
[   14.402099] The buggy address is located 0 bytes to the right of
[   14.402099]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.402690] 
[   14.402791] The buggy address belongs to the physical page:
[   14.403041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.403413] flags: 0x200000000000000(node=0|zone=2)
[   14.403675] page_type: f5(slab)
[   14.403908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.404237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.404554] page dumped because: kasan: bad access detected
[   14.404729] 
[   14.404800] Memory state around the buggy address:
[   14.404959]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.405401]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.405777] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.406105]                                      ^
[   14.406332]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406739]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406991] ==================================================================
[   14.561335] ==================================================================
[   14.561693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.561984] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.562214] 
[   14.562396] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.562442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.562467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.562491] Call Trace:
[   14.562509]  <TASK>
[   14.562528]  dump_stack_lvl+0x73/0xb0
[   14.562554]  print_report+0xd1/0x650
[   14.562579]  ? __virt_addr_valid+0x1db/0x2d0
[   14.562602]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.562625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.562658]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.562683]  kasan_report+0x141/0x180
[   14.562707]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.562745]  kasan_check_range+0x10c/0x1c0
[   14.562768]  __kasan_check_write+0x18/0x20
[   14.562789]  kasan_atomics_helper+0x16e7/0x5450
[   14.562824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.562849]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.562872]  ? kasan_atomics+0x152/0x310
[   14.562897]  kasan_atomics+0x1dc/0x310
[   14.562919]  ? __pfx_kasan_atomics+0x10/0x10
[   14.562940]  ? __pfx_read_tsc+0x10/0x10
[   14.562961]  ? ktime_get_ts64+0x86/0x230
[   14.562988]  kunit_try_run_case+0x1a5/0x480
[   14.563014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.563063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.563089]  ? __kthread_parkme+0x82/0x180
[   14.563113]  ? preempt_count_sub+0x50/0x80
[   14.563140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.563165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.563190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.563217]  kthread+0x337/0x6f0
[   14.563246]  ? trace_preempt_on+0x20/0xc0
[   14.563272]  ? __pfx_kthread+0x10/0x10
[   14.563292]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.563316]  ? calculate_sigpending+0x7b/0xa0
[   14.563339]  ? __pfx_kthread+0x10/0x10
[   14.563359]  ret_from_fork+0x41/0x80
[   14.563382]  ? __pfx_kthread+0x10/0x10
[   14.563401]  ret_from_fork_asm+0x1a/0x30
[   14.563434]  </TASK>
[   14.563447] 
[   14.571408] Allocated by task 284:
[   14.571596]  kasan_save_stack+0x45/0x70
[   14.571805]  kasan_save_track+0x18/0x40
[   14.572149]  kasan_save_alloc_info+0x3b/0x50
[   14.572372]  __kasan_kmalloc+0xb7/0xc0
[   14.572563]  __kmalloc_cache_noprof+0x189/0x420
[   14.572835]  kasan_atomics+0x95/0x310
[   14.573023]  kunit_try_run_case+0x1a5/0x480
[   14.573243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.573493]  kthread+0x337/0x6f0
[   14.573619]  ret_from_fork+0x41/0x80
[   14.573813]  ret_from_fork_asm+0x1a/0x30
[   14.574012] 
[   14.574100] The buggy address belongs to the object at ffff8881039f4880
[   14.574100]  which belongs to the cache kmalloc-64 of size 64
[   14.574524] The buggy address is located 0 bytes to the right of
[   14.574524]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.575294] 
[   14.575401] The buggy address belongs to the physical page:
[   14.575576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.576252] flags: 0x200000000000000(node=0|zone=2)
[   14.576419] page_type: f5(slab)
[   14.576541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.576773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.577067] page dumped because: kasan: bad access detected
[   14.577357] 
[   14.577468] Memory state around the buggy address:
[   14.577732]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.578060]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.578347] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.578563]                                      ^
[   14.578904]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.579318]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.579646] ==================================================================
[   13.908434] ==================================================================
[   13.908674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.909162] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   13.909640] 
[   13.909786] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.909846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909883] Call Trace:
[   13.909900]  <TASK>
[   13.909916]  dump_stack_lvl+0x73/0xb0
[   13.909943]  print_report+0xd1/0x650
[   13.909967]  ? __virt_addr_valid+0x1db/0x2d0
[   13.909990]  ? kasan_atomics_helper+0x72f/0x5450
[   13.910013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.910038]  ? kasan_atomics_helper+0x72f/0x5450
[   13.910062]  kasan_report+0x141/0x180
[   13.910086]  ? kasan_atomics_helper+0x72f/0x5450
[   13.910115]  kasan_check_range+0x10c/0x1c0
[   13.910146]  __kasan_check_write+0x18/0x20
[   13.910167]  kasan_atomics_helper+0x72f/0x5450
[   13.910192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.910242]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.910265]  ? kasan_atomics+0x152/0x310
[   13.910301]  kasan_atomics+0x1dc/0x310
[   13.910322]  ? __pfx_kasan_atomics+0x10/0x10
[   13.910344]  ? __pfx_read_tsc+0x10/0x10
[   13.910365]  ? ktime_get_ts64+0x86/0x230
[   13.910391]  kunit_try_run_case+0x1a5/0x480
[   13.910417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910490]  ? __kthread_parkme+0x82/0x180
[   13.910513]  ? preempt_count_sub+0x50/0x80
[   13.910540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910616]  kthread+0x337/0x6f0
[   13.910634]  ? trace_preempt_on+0x20/0xc0
[   13.910658]  ? __pfx_kthread+0x10/0x10
[   13.910678]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910701]  ? calculate_sigpending+0x7b/0xa0
[   13.910724]  ? __pfx_kthread+0x10/0x10
[   13.910743]  ret_from_fork+0x41/0x80
[   13.910765]  ? __pfx_kthread+0x10/0x10
[   13.911010]  ret_from_fork_asm+0x1a/0x30
[   13.911047]  </TASK>
[   13.911059] 
[   13.920359] Allocated by task 284:
[   13.920634]  kasan_save_stack+0x45/0x70
[   13.920902]  kasan_save_track+0x18/0x40
[   13.921126]  kasan_save_alloc_info+0x3b/0x50
[   13.921299]  __kasan_kmalloc+0xb7/0xc0
[   13.921489]  __kmalloc_cache_noprof+0x189/0x420
[   13.921795]  kasan_atomics+0x95/0x310
[   13.922010]  kunit_try_run_case+0x1a5/0x480
[   13.922306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.922552]  kthread+0x337/0x6f0
[   13.922735]  ret_from_fork+0x41/0x80
[   13.922899]  ret_from_fork_asm+0x1a/0x30
[   13.923412] 
[   13.923517] The buggy address belongs to the object at ffff8881039f4880
[   13.923517]  which belongs to the cache kmalloc-64 of size 64
[   13.924025] The buggy address is located 0 bytes to the right of
[   13.924025]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   13.924752] 
[   13.924851] The buggy address belongs to the physical page:
[   13.925106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   13.925625] flags: 0x200000000000000(node=0|zone=2)
[   13.925872] page_type: f5(slab)
[   13.926042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.926436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.926968] page dumped because: kasan: bad access detected
[   13.927200] 
[   13.927352] Memory state around the buggy address:
[   13.927640]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.927972]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.928216] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.928847]                                      ^
[   13.929064]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.929526]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.929884] ==================================================================
[   14.169273] ==================================================================
[   14.169672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.169989] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.170264] 
[   14.170471] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.170518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.170531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.170554] Call Trace:
[   14.170571]  <TASK>
[   14.170591]  dump_stack_lvl+0x73/0xb0
[   14.170617]  print_report+0xd1/0x650
[   14.170641]  ? __virt_addr_valid+0x1db/0x2d0
[   14.170665]  ? kasan_atomics_helper+0xe78/0x5450
[   14.170688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.170712]  ? kasan_atomics_helper+0xe78/0x5450
[   14.170735]  kasan_report+0x141/0x180
[   14.170759]  ? kasan_atomics_helper+0xe78/0x5450
[   14.170787]  kasan_check_range+0x10c/0x1c0
[   14.170808]  __kasan_check_write+0x18/0x20
[   14.170830]  kasan_atomics_helper+0xe78/0x5450
[   14.170855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.170879]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.170902]  ? kasan_atomics+0x152/0x310
[   14.170927]  kasan_atomics+0x1dc/0x310
[   14.170948]  ? __pfx_kasan_atomics+0x10/0x10
[   14.170971]  ? __pfx_read_tsc+0x10/0x10
[   14.170992]  ? ktime_get_ts64+0x86/0x230
[   14.171019]  kunit_try_run_case+0x1a5/0x480
[   14.171045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.171069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.171094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.171119]  ? __kthread_parkme+0x82/0x180
[   14.171142]  ? preempt_count_sub+0x50/0x80
[   14.171169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.171194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.171218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.171255]  kthread+0x337/0x6f0
[   14.171273]  ? trace_preempt_on+0x20/0xc0
[   14.171298]  ? __pfx_kthread+0x10/0x10
[   14.171318]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.171342]  ? calculate_sigpending+0x7b/0xa0
[   14.171364]  ? __pfx_kthread+0x10/0x10
[   14.171384]  ret_from_fork+0x41/0x80
[   14.171406]  ? __pfx_kthread+0x10/0x10
[   14.171425]  ret_from_fork_asm+0x1a/0x30
[   14.171457]  </TASK>
[   14.171469] 
[   14.179086] Allocated by task 284:
[   14.179289]  kasan_save_stack+0x45/0x70
[   14.179475]  kasan_save_track+0x18/0x40
[   14.179665]  kasan_save_alloc_info+0x3b/0x50
[   14.179854]  __kasan_kmalloc+0xb7/0xc0
[   14.180020]  __kmalloc_cache_noprof+0x189/0x420
[   14.180174]  kasan_atomics+0x95/0x310
[   14.180357]  kunit_try_run_case+0x1a5/0x480
[   14.180569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.180820]  kthread+0x337/0x6f0
[   14.181029]  ret_from_fork+0x41/0x80
[   14.181162]  ret_from_fork_asm+0x1a/0x30
[   14.181374] 
[   14.181469] The buggy address belongs to the object at ffff8881039f4880
[   14.181469]  which belongs to the cache kmalloc-64 of size 64
[   14.181989] The buggy address is located 0 bytes to the right of
[   14.181989]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.182474] 
[   14.182573] The buggy address belongs to the physical page:
[   14.182793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.183140] flags: 0x200000000000000(node=0|zone=2)
[   14.183365] page_type: f5(slab)
[   14.183492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.183723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.183953] page dumped because: kasan: bad access detected
[   14.184124] 
[   14.184219] Memory state around the buggy address:
[   14.184490]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.185026]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.185301] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.185517]                                      ^
[   14.185729]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.186053]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.186383] ==================================================================
[   14.204754] ==================================================================
[   14.205084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.205507] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.205844] 
[   14.205948] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.205995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.206008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.206032] Call Trace:
[   14.206051]  <TASK>
[   14.206071]  dump_stack_lvl+0x73/0xb0
[   14.206097]  print_report+0xd1/0x650
[   14.206121]  ? __virt_addr_valid+0x1db/0x2d0
[   14.206145]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.206168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.206319]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.206346]  kasan_report+0x141/0x180
[   14.206372]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.206400]  kasan_check_range+0x10c/0x1c0
[   14.206422]  __kasan_check_write+0x18/0x20
[   14.206443]  kasan_atomics_helper+0xfa9/0x5450
[   14.206468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.206492]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.206516]  ? kasan_atomics+0x152/0x310
[   14.206540]  kasan_atomics+0x1dc/0x310
[   14.206560]  ? __pfx_kasan_atomics+0x10/0x10
[   14.206583]  ? __pfx_read_tsc+0x10/0x10
[   14.206605]  ? ktime_get_ts64+0x86/0x230
[   14.206631]  kunit_try_run_case+0x1a5/0x480
[   14.206657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.206681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.206707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.206733]  ? __kthread_parkme+0x82/0x180
[   14.206757]  ? preempt_count_sub+0x50/0x80
[   14.206783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.206808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206833]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.206858]  kthread+0x337/0x6f0
[   14.206875]  ? trace_preempt_on+0x20/0xc0
[   14.206901]  ? __pfx_kthread+0x10/0x10
[   14.206932]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.206956]  ? calculate_sigpending+0x7b/0xa0
[   14.206979]  ? __pfx_kthread+0x10/0x10
[   14.206999]  ret_from_fork+0x41/0x80
[   14.207020]  ? __pfx_kthread+0x10/0x10
[   14.207040]  ret_from_fork_asm+0x1a/0x30
[   14.207072]  </TASK>
[   14.207084] 
[   14.214466] Allocated by task 284:
[   14.214606]  kasan_save_stack+0x45/0x70
[   14.214832]  kasan_save_track+0x18/0x40
[   14.215038]  kasan_save_alloc_info+0x3b/0x50
[   14.215329]  __kasan_kmalloc+0xb7/0xc0
[   14.215527]  __kmalloc_cache_noprof+0x189/0x420
[   14.215860]  kasan_atomics+0x95/0x310
[   14.216020]  kunit_try_run_case+0x1a5/0x480
[   14.216246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216420]  kthread+0x337/0x6f0
[   14.216541]  ret_from_fork+0x41/0x80
[   14.216670]  ret_from_fork_asm+0x1a/0x30
[   14.216820] 
[   14.216929] The buggy address belongs to the object at ffff8881039f4880
[   14.216929]  which belongs to the cache kmalloc-64 of size 64
[   14.217463] The buggy address is located 0 bytes to the right of
[   14.217463]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.218113] 
[   14.218187] The buggy address belongs to the physical page:
[   14.218364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.218595] flags: 0x200000000000000(node=0|zone=2)
[   14.218756] page_type: f5(slab)
[   14.218876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.219098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.219546] page dumped because: kasan: bad access detected
[   14.219984] 
[   14.220080] Memory state around the buggy address:
[   14.220321]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.220651]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.220977] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.221306]                                      ^
[   14.221477]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.221693]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222016] ==================================================================
[   14.079184] ==================================================================
[   14.079839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.080187] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.080510] 
[   14.080615] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.080841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.080857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.080880] Call Trace:
[   14.080897]  <TASK>
[   14.080914]  dump_stack_lvl+0x73/0xb0
[   14.080941]  print_report+0xd1/0x650
[   14.080964]  ? __virt_addr_valid+0x1db/0x2d0
[   14.081084]  ? kasan_atomics_helper+0xc70/0x5450
[   14.081107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.081133]  ? kasan_atomics_helper+0xc70/0x5450
[   14.081156]  kasan_report+0x141/0x180
[   14.081180]  ? kasan_atomics_helper+0xc70/0x5450
[   14.081208]  kasan_check_range+0x10c/0x1c0
[   14.081244]  __kasan_check_write+0x18/0x20
[   14.081265]  kasan_atomics_helper+0xc70/0x5450
[   14.081290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.081315]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.081337]  ? kasan_atomics+0x152/0x310
[   14.081361]  kasan_atomics+0x1dc/0x310
[   14.081382]  ? __pfx_kasan_atomics+0x10/0x10
[   14.081404]  ? __pfx_read_tsc+0x10/0x10
[   14.081425]  ? ktime_get_ts64+0x86/0x230
[   14.081451]  kunit_try_run_case+0x1a5/0x480
[   14.081476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.081500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.081525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.081556]  ? __kthread_parkme+0x82/0x180
[   14.081579]  ? preempt_count_sub+0x50/0x80
[   14.081605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.081629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.081676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.081701]  kthread+0x337/0x6f0
[   14.081719]  ? trace_preempt_on+0x20/0xc0
[   14.081743]  ? __pfx_kthread+0x10/0x10
[   14.081762]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.081786]  ? calculate_sigpending+0x7b/0xa0
[   14.081808]  ? __pfx_kthread+0x10/0x10
[   14.081829]  ret_from_fork+0x41/0x80
[   14.081851]  ? __pfx_kthread+0x10/0x10
[   14.081871]  ret_from_fork_asm+0x1a/0x30
[   14.081902]  </TASK>
[   14.081914] 
[   14.091342] Allocated by task 284:
[   14.091527]  kasan_save_stack+0x45/0x70
[   14.092099]  kasan_save_track+0x18/0x40
[   14.092286]  kasan_save_alloc_info+0x3b/0x50
[   14.092585]  __kasan_kmalloc+0xb7/0xc0
[   14.092918]  __kmalloc_cache_noprof+0x189/0x420
[   14.093138]  kasan_atomics+0x95/0x310
[   14.093330]  kunit_try_run_case+0x1a5/0x480
[   14.093530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.094013]  kthread+0x337/0x6f0
[   14.094167]  ret_from_fork+0x41/0x80
[   14.094480]  ret_from_fork_asm+0x1a/0x30
[   14.094766] 
[   14.094846] The buggy address belongs to the object at ffff8881039f4880
[   14.094846]  which belongs to the cache kmalloc-64 of size 64
[   14.095475] The buggy address is located 0 bytes to the right of
[   14.095475]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.096092] 
[   14.096185] The buggy address belongs to the physical page:
[   14.096625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.097061] flags: 0x200000000000000(node=0|zone=2)
[   14.097365] page_type: f5(slab)
[   14.097510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.097964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.098386] page dumped because: kasan: bad access detected
[   14.098697] 
[   14.098794] Memory state around the buggy address:
[   14.098963]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.099299]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.099599] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.099906]                                      ^
[   14.100131]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.100815]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.101181] ==================================================================
[   14.618520] ==================================================================
[   14.618881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.619308] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.619644] 
[   14.619735] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.619784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.619797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.619821] Call Trace:
[   14.619841]  <TASK>
[   14.619862]  dump_stack_lvl+0x73/0xb0
[   14.619887]  print_report+0xd1/0x650
[   14.619914]  ? __virt_addr_valid+0x1db/0x2d0
[   14.619937]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.619961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.619984]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.620022]  kasan_report+0x141/0x180
[   14.620047]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.620086]  kasan_check_range+0x10c/0x1c0
[   14.620109]  __kasan_check_write+0x18/0x20
[   14.620141]  kasan_atomics_helper+0x18b1/0x5450
[   14.620174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.620198]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.620221]  ? kasan_atomics+0x152/0x310
[   14.620256]  kasan_atomics+0x1dc/0x310
[   14.620276]  ? __pfx_kasan_atomics+0x10/0x10
[   14.620299]  ? __pfx_read_tsc+0x10/0x10
[   14.620319]  ? ktime_get_ts64+0x86/0x230
[   14.620347]  kunit_try_run_case+0x1a5/0x480
[   14.620372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.620423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.620447]  ? __kthread_parkme+0x82/0x180
[   14.620471]  ? preempt_count_sub+0x50/0x80
[   14.620499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.620573]  kthread+0x337/0x6f0
[   14.620591]  ? trace_preempt_on+0x20/0xc0
[   14.620617]  ? __pfx_kthread+0x10/0x10
[   14.620635]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.620659]  ? calculate_sigpending+0x7b/0xa0
[   14.620681]  ? __pfx_kthread+0x10/0x10
[   14.620701]  ret_from_fork+0x41/0x80
[   14.620722]  ? __pfx_kthread+0x10/0x10
[   14.620742]  ret_from_fork_asm+0x1a/0x30
[   14.620773]  </TASK>
[   14.620784] 
[   14.631020] Allocated by task 284:
[   14.631174]  kasan_save_stack+0x45/0x70
[   14.631565]  kasan_save_track+0x18/0x40
[   14.631928]  kasan_save_alloc_info+0x3b/0x50
[   14.632346]  __kasan_kmalloc+0xb7/0xc0
[   14.632713]  __kmalloc_cache_noprof+0x189/0x420
[   14.633132]  kasan_atomics+0x95/0x310
[   14.633365]  kunit_try_run_case+0x1a5/0x480
[   14.633517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.633884]  kthread+0x337/0x6f0
[   14.634211]  ret_from_fork+0x41/0x80
[   14.634576]  ret_from_fork_asm+0x1a/0x30
[   14.634977] 
[   14.635155] The buggy address belongs to the object at ffff8881039f4880
[   14.635155]  which belongs to the cache kmalloc-64 of size 64
[   14.636143] The buggy address is located 0 bytes to the right of
[   14.636143]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.636528] 
[   14.636605] The buggy address belongs to the physical page:
[   14.637129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.637850] flags: 0x200000000000000(node=0|zone=2)
[   14.638306] page_type: f5(slab)
[   14.638627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.639302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.639974] page dumped because: kasan: bad access detected
[   14.640371] 
[   14.640444] Memory state around the buggy address:
[   14.640604]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.641263]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.641902] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.642531]                                      ^
[   14.642900]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643296]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643517] ==================================================================
[   14.664714] ==================================================================
[   14.665081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.665441] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.665816] 
[   14.665934] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.665982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.665996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.666020] Call Trace:
[   14.666039]  <TASK>
[   14.666058]  dump_stack_lvl+0x73/0xb0
[   14.666085]  print_report+0xd1/0x650
[   14.666110]  ? __virt_addr_valid+0x1db/0x2d0
[   14.666134]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.666157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.666182]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.666206]  kasan_report+0x141/0x180
[   14.666243]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.666272]  kasan_check_range+0x10c/0x1c0
[   14.666295]  __kasan_check_write+0x18/0x20
[   14.666316]  kasan_atomics_helper+0x19e3/0x5450
[   14.666342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.666365]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.666390]  ? kasan_atomics+0x152/0x310
[   14.666415]  kasan_atomics+0x1dc/0x310
[   14.666447]  ? __pfx_kasan_atomics+0x10/0x10
[   14.666469]  ? __pfx_read_tsc+0x10/0x10
[   14.666492]  ? ktime_get_ts64+0x86/0x230
[   14.666531]  kunit_try_run_case+0x1a5/0x480
[   14.666558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.666586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.666613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.666643]  ? __kthread_parkme+0x82/0x180
[   14.666667]  ? preempt_count_sub+0x50/0x80
[   14.666694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.666719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.666743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.666768]  kthread+0x337/0x6f0
[   14.666786]  ? trace_preempt_on+0x20/0xc0
[   14.666811]  ? __pfx_kthread+0x10/0x10
[   14.666832]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.666856]  ? calculate_sigpending+0x7b/0xa0
[   14.666878]  ? __pfx_kthread+0x10/0x10
[   14.666899]  ret_from_fork+0x41/0x80
[   14.666920]  ? __pfx_kthread+0x10/0x10
[   14.666940]  ret_from_fork_asm+0x1a/0x30
[   14.666972]  </TASK>
[   14.666985] 
[   14.674730] Allocated by task 284:
[   14.674897]  kasan_save_stack+0x45/0x70
[   14.675102]  kasan_save_track+0x18/0x40
[   14.675324]  kasan_save_alloc_info+0x3b/0x50
[   14.675521]  __kasan_kmalloc+0xb7/0xc0
[   14.675728]  __kmalloc_cache_noprof+0x189/0x420
[   14.675954]  kasan_atomics+0x95/0x310
[   14.676134]  kunit_try_run_case+0x1a5/0x480
[   14.676342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.676563]  kthread+0x337/0x6f0
[   14.676704]  ret_from_fork+0x41/0x80
[   14.676837]  ret_from_fork_asm+0x1a/0x30
[   14.676978] 
[   14.677049] The buggy address belongs to the object at ffff8881039f4880
[   14.677049]  which belongs to the cache kmalloc-64 of size 64
[   14.677566] The buggy address is located 0 bytes to the right of
[   14.677566]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.678146] 
[   14.678254] The buggy address belongs to the physical page:
[   14.678513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.678885] flags: 0x200000000000000(node=0|zone=2)
[   14.679052] page_type: f5(slab)
[   14.679175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.679421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.679705] page dumped because: kasan: bad access detected
[   14.679974] 
[   14.680071] Memory state around the buggy address:
[   14.680358]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.680736]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.681091] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.681429]                                      ^
[   14.681705]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682001]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.682299] ==================================================================
[   14.682922] ==================================================================
[   14.683264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.683578] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.683952] 
[   14.684066] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.684112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.684125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.684151] Call Trace:
[   14.684166]  <TASK>
[   14.684183]  dump_stack_lvl+0x73/0xb0
[   14.684210]  print_report+0xd1/0x650
[   14.684244]  ? __virt_addr_valid+0x1db/0x2d0
[   14.684268]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.684291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.684316]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.684340]  kasan_report+0x141/0x180
[   14.684364]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.684403]  kasan_check_range+0x10c/0x1c0
[   14.684425]  __kasan_check_write+0x18/0x20
[   14.684447]  kasan_atomics_helper+0x1a7f/0x5450
[   14.684484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.684507]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.684532]  ? kasan_atomics+0x152/0x310
[   14.684565]  kasan_atomics+0x1dc/0x310
[   14.684586]  ? __pfx_kasan_atomics+0x10/0x10
[   14.684609]  ? __pfx_read_tsc+0x10/0x10
[   14.684658]  ? ktime_get_ts64+0x86/0x230
[   14.684685]  kunit_try_run_case+0x1a5/0x480
[   14.684710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.684734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.684760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.684785]  ? __kthread_parkme+0x82/0x180
[   14.684809]  ? preempt_count_sub+0x50/0x80
[   14.684834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.684859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.684884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.684909]  kthread+0x337/0x6f0
[   14.684927]  ? trace_preempt_on+0x20/0xc0
[   14.684952]  ? __pfx_kthread+0x10/0x10
[   14.684971]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.684994]  ? calculate_sigpending+0x7b/0xa0
[   14.685017]  ? __pfx_kthread+0x10/0x10
[   14.685038]  ret_from_fork+0x41/0x80
[   14.685059]  ? __pfx_kthread+0x10/0x10
[   14.685089]  ret_from_fork_asm+0x1a/0x30
[   14.685120]  </TASK>
[   14.685132] 
[   14.693179] Allocated by task 284:
[   14.693358]  kasan_save_stack+0x45/0x70
[   14.693576]  kasan_save_track+0x18/0x40
[   14.693802]  kasan_save_alloc_info+0x3b/0x50
[   14.694023]  __kasan_kmalloc+0xb7/0xc0
[   14.694219]  __kmalloc_cache_noprof+0x189/0x420
[   14.694449]  kasan_atomics+0x95/0x310
[   14.694582]  kunit_try_run_case+0x1a5/0x480
[   14.694757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.694996]  kthread+0x337/0x6f0
[   14.695177]  ret_from_fork+0x41/0x80
[   14.695375]  ret_from_fork_asm+0x1a/0x30
[   14.695572] 
[   14.695700] The buggy address belongs to the object at ffff8881039f4880
[   14.695700]  which belongs to the cache kmalloc-64 of size 64
[   14.696191] The buggy address is located 0 bytes to the right of
[   14.696191]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.696698] 
[   14.696822] The buggy address belongs to the physical page:
[   14.697081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.697430] flags: 0x200000000000000(node=0|zone=2)
[   14.697695] page_type: f5(slab)
[   14.697859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.698213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.698500] page dumped because: kasan: bad access detected
[   14.698799] 
[   14.698895] Memory state around the buggy address:
[   14.699099]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.699333]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.699550] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.699913]                                      ^
[   14.700141]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700474]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700821] ==================================================================
[   14.465362] ==================================================================
[   14.465704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.466148] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.466430] 
[   14.466556] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.466607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.466620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.466666] Call Trace:
[   14.466686]  <TASK>
[   14.466718]  dump_stack_lvl+0x73/0xb0
[   14.466747]  print_report+0xd1/0x650
[   14.466773]  ? __virt_addr_valid+0x1db/0x2d0
[   14.466797]  ? kasan_atomics_helper+0x1467/0x5450
[   14.466821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.466844]  ? kasan_atomics_helper+0x1467/0x5450
[   14.466868]  kasan_report+0x141/0x180
[   14.466892]  ? kasan_atomics_helper+0x1467/0x5450
[   14.466920]  kasan_check_range+0x10c/0x1c0
[   14.466941]  __kasan_check_write+0x18/0x20
[   14.466963]  kasan_atomics_helper+0x1467/0x5450
[   14.466987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.467011]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.467035]  ? kasan_atomics+0x152/0x310
[   14.467060]  kasan_atomics+0x1dc/0x310
[   14.467080]  ? __pfx_kasan_atomics+0x10/0x10
[   14.467102]  ? __pfx_read_tsc+0x10/0x10
[   14.467124]  ? ktime_get_ts64+0x86/0x230
[   14.467150]  kunit_try_run_case+0x1a5/0x480
[   14.467175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.467235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.467260]  ? __kthread_parkme+0x82/0x180
[   14.467283]  ? preempt_count_sub+0x50/0x80
[   14.467310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.467384]  kthread+0x337/0x6f0
[   14.467405]  ? trace_preempt_on+0x20/0xc0
[   14.467431]  ? __pfx_kthread+0x10/0x10
[   14.467459]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.467482]  ? calculate_sigpending+0x7b/0xa0
[   14.467506]  ? __pfx_kthread+0x10/0x10
[   14.467537]  ret_from_fork+0x41/0x80
[   14.467559]  ? __pfx_kthread+0x10/0x10
[   14.467579]  ret_from_fork_asm+0x1a/0x30
[   14.467611]  </TASK>
[   14.467623] 
[   14.478138] Allocated by task 284:
[   14.478356]  kasan_save_stack+0x45/0x70
[   14.478583]  kasan_save_track+0x18/0x40
[   14.478792]  kasan_save_alloc_info+0x3b/0x50
[   14.478977]  __kasan_kmalloc+0xb7/0xc0
[   14.479180]  __kmalloc_cache_noprof+0x189/0x420
[   14.479408]  kasan_atomics+0x95/0x310
[   14.479588]  kunit_try_run_case+0x1a5/0x480
[   14.479813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.480058]  kthread+0x337/0x6f0
[   14.480222]  ret_from_fork+0x41/0x80
[   14.480393]  ret_from_fork_asm+0x1a/0x30
[   14.480581] 
[   14.480679] The buggy address belongs to the object at ffff8881039f4880
[   14.480679]  which belongs to the cache kmalloc-64 of size 64
[   14.481167] The buggy address is located 0 bytes to the right of
[   14.481167]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.481674] 
[   14.481777] The buggy address belongs to the physical page:
[   14.482034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.482385] flags: 0x200000000000000(node=0|zone=2)
[   14.482627] page_type: f5(slab)
[   14.482809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.483046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.483311] page dumped because: kasan: bad access detected
[   14.483566] 
[   14.483685] Memory state around the buggy address:
[   14.483914]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.484247]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.484678] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.484891]                                      ^
[   14.485299]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.485653]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.485971] ==================================================================
[   14.826923] ==================================================================
[   14.827599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.828279] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.828902] 
[   14.829087] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.829136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.829149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.829173] Call Trace:
[   14.829194]  <TASK>
[   14.829215]  dump_stack_lvl+0x73/0xb0
[   14.829251]  print_report+0xd1/0x650
[   14.829277]  ? __virt_addr_valid+0x1db/0x2d0
[   14.829301]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.829326]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.829351]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.829374]  kasan_report+0x141/0x180
[   14.829398]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.829427]  kasan_check_range+0x10c/0x1c0
[   14.829449]  __kasan_check_write+0x18/0x20
[   14.829470]  kasan_atomics_helper+0x1eaa/0x5450
[   14.829494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.829519]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829549]  ? kasan_atomics+0x152/0x310
[   14.829573]  kasan_atomics+0x1dc/0x310
[   14.829594]  ? __pfx_kasan_atomics+0x10/0x10
[   14.829616]  ? __pfx_read_tsc+0x10/0x10
[   14.829658]  ? ktime_get_ts64+0x86/0x230
[   14.829686]  kunit_try_run_case+0x1a5/0x480
[   14.829713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829788]  ? __kthread_parkme+0x82/0x180
[   14.829814]  ? preempt_count_sub+0x50/0x80
[   14.829841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829916]  kthread+0x337/0x6f0
[   14.829934]  ? trace_preempt_on+0x20/0xc0
[   14.829960]  ? __pfx_kthread+0x10/0x10
[   14.829979]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830003]  ? calculate_sigpending+0x7b/0xa0
[   14.830026]  ? __pfx_kthread+0x10/0x10
[   14.830046]  ret_from_fork+0x41/0x80
[   14.830068]  ? __pfx_kthread+0x10/0x10
[   14.830087]  ret_from_fork_asm+0x1a/0x30
[   14.830119]  </TASK>
[   14.830132] 
[   14.843598] Allocated by task 284:
[   14.843939]  kasan_save_stack+0x45/0x70
[   14.844243]  kasan_save_track+0x18/0x40
[   14.844380]  kasan_save_alloc_info+0x3b/0x50
[   14.844528]  __kasan_kmalloc+0xb7/0xc0
[   14.844703]  __kmalloc_cache_noprof+0x189/0x420
[   14.845098]  kasan_atomics+0x95/0x310
[   14.845433]  kunit_try_run_case+0x1a5/0x480
[   14.845832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846369]  kthread+0x337/0x6f0
[   14.846677]  ret_from_fork+0x41/0x80
[   14.846994]  ret_from_fork_asm+0x1a/0x30
[   14.847367] 
[   14.847539] The buggy address belongs to the object at ffff8881039f4880
[   14.847539]  which belongs to the cache kmalloc-64 of size 64
[   14.848159] The buggy address is located 0 bytes to the right of
[   14.848159]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.848538] 
[   14.848614] The buggy address belongs to the physical page:
[   14.849096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.849796] flags: 0x200000000000000(node=0|zone=2)
[   14.850280] page_type: f5(slab)
[   14.850572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.851290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.851968] page dumped because: kasan: bad access detected
[   14.852593] 
[   14.852773] Memory state around the buggy address:
[   14.853200]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.853572]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.853815] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.854032]                                      ^
[   14.854188]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.854483]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.854714] ==================================================================
[   14.020675] ==================================================================
[   14.020985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.021327] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.021695] 
[   14.021808] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.021854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.021867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.021890] Call Trace:
[   14.021902]  <TASK>
[   14.021917]  dump_stack_lvl+0x73/0xb0
[   14.021941]  print_report+0xd1/0x650
[   14.021965]  ? __virt_addr_valid+0x1db/0x2d0
[   14.021987]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.022011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.022035]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.022059]  kasan_report+0x141/0x180
[   14.022083]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.022110]  kasan_check_range+0x10c/0x1c0
[   14.022133]  __kasan_check_write+0x18/0x20
[   14.022153]  kasan_atomics_helper+0xa2b/0x5450
[   14.022178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.022203]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.022239]  ? kasan_atomics+0x152/0x310
[   14.022263]  kasan_atomics+0x1dc/0x310
[   14.022284]  ? __pfx_kasan_atomics+0x10/0x10
[   14.022307]  ? __pfx_read_tsc+0x10/0x10
[   14.022327]  ? ktime_get_ts64+0x86/0x230
[   14.022353]  kunit_try_run_case+0x1a5/0x480
[   14.022378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.022427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.022453]  ? __kthread_parkme+0x82/0x180
[   14.022476]  ? preempt_count_sub+0x50/0x80
[   14.022501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.022551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.022576]  kthread+0x337/0x6f0
[   14.022594]  ? trace_preempt_on+0x20/0xc0
[   14.022619]  ? __pfx_kthread+0x10/0x10
[   14.022657]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.022681]  ? calculate_sigpending+0x7b/0xa0
[   14.022705]  ? __pfx_kthread+0x10/0x10
[   14.022725]  ret_from_fork+0x41/0x80
[   14.022747]  ? __pfx_kthread+0x10/0x10
[   14.022767]  ret_from_fork_asm+0x1a/0x30
[   14.022799]  </TASK>
[   14.022812] 
[   14.030078] Allocated by task 284:
[   14.030250]  kasan_save_stack+0x45/0x70
[   14.030426]  kasan_save_track+0x18/0x40
[   14.030619]  kasan_save_alloc_info+0x3b/0x50
[   14.030829]  __kasan_kmalloc+0xb7/0xc0
[   14.030996]  __kmalloc_cache_noprof+0x189/0x420
[   14.031205]  kasan_atomics+0x95/0x310
[   14.031374]  kunit_try_run_case+0x1a5/0x480
[   14.031580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.031841]  kthread+0x337/0x6f0
[   14.032001]  ret_from_fork+0x41/0x80
[   14.032166]  ret_from_fork_asm+0x1a/0x30
[   14.032345] 
[   14.032420] The buggy address belongs to the object at ffff8881039f4880
[   14.032420]  which belongs to the cache kmalloc-64 of size 64
[   14.032919] The buggy address is located 0 bytes to the right of
[   14.032919]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.033443] 
[   14.033547] The buggy address belongs to the physical page:
[   14.033784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.034138] flags: 0x200000000000000(node=0|zone=2)
[   14.034346] page_type: f5(slab)
[   14.034516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.034852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.035105] page dumped because: kasan: bad access detected
[   14.035288] 
[   14.035361] Memory state around the buggy address:
[   14.035518]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.035761]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.036082] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.036407]                                      ^
[   14.036631]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.036968]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.037294] ==================================================================
[   14.701423] ==================================================================
[   14.701905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.702286] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.702553] 
[   14.702666] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.702714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.702727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.702751] Call Trace:
[   14.702769]  <TASK>
[   14.702788]  dump_stack_lvl+0x73/0xb0
[   14.702814]  print_report+0xd1/0x650
[   14.702839]  ? __virt_addr_valid+0x1db/0x2d0
[   14.702862]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.702886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.702921]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.702946]  kasan_report+0x141/0x180
[   14.702984]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.703013]  kasan_check_range+0x10c/0x1c0
[   14.703035]  __kasan_check_write+0x18/0x20
[   14.703056]  kasan_atomics_helper+0x1b22/0x5450
[   14.703081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.703107]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.703131]  ? kasan_atomics+0x152/0x310
[   14.703156]  kasan_atomics+0x1dc/0x310
[   14.703176]  ? __pfx_kasan_atomics+0x10/0x10
[   14.703198]  ? __pfx_read_tsc+0x10/0x10
[   14.703219]  ? ktime_get_ts64+0x86/0x230
[   14.703253]  kunit_try_run_case+0x1a5/0x480
[   14.703279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.703328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.703353]  ? __kthread_parkme+0x82/0x180
[   14.703376]  ? preempt_count_sub+0x50/0x80
[   14.703403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.703486]  kthread+0x337/0x6f0
[   14.703504]  ? trace_preempt_on+0x20/0xc0
[   14.703540]  ? __pfx_kthread+0x10/0x10
[   14.703560]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.703583]  ? calculate_sigpending+0x7b/0xa0
[   14.703605]  ? __pfx_kthread+0x10/0x10
[   14.703625]  ret_from_fork+0x41/0x80
[   14.703673]  ? __pfx_kthread+0x10/0x10
[   14.703693]  ret_from_fork_asm+0x1a/0x30
[   14.703735]  </TASK>
[   14.703747] 
[   14.711170] Allocated by task 284:
[   14.711339]  kasan_save_stack+0x45/0x70
[   14.711558]  kasan_save_track+0x18/0x40
[   14.711801]  kasan_save_alloc_info+0x3b/0x50
[   14.712055]  __kasan_kmalloc+0xb7/0xc0
[   14.712260]  __kmalloc_cache_noprof+0x189/0x420
[   14.712508]  kasan_atomics+0x95/0x310
[   14.712722]  kunit_try_run_case+0x1a5/0x480
[   14.712956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.713178]  kthread+0x337/0x6f0
[   14.713341]  ret_from_fork+0x41/0x80
[   14.713548]  ret_from_fork_asm+0x1a/0x30
[   14.713768] 
[   14.713878] The buggy address belongs to the object at ffff8881039f4880
[   14.713878]  which belongs to the cache kmalloc-64 of size 64
[   14.714404] The buggy address is located 0 bytes to the right of
[   14.714404]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.714938] 
[   14.715066] The buggy address belongs to the physical page:
[   14.715312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.715569] flags: 0x200000000000000(node=0|zone=2)
[   14.715760] page_type: f5(slab)
[   14.715886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.716253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.716607] page dumped because: kasan: bad access detected
[   14.716876] 
[   14.716948] Memory state around the buggy address:
[   14.717104]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.717334]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.717601] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.717980]                                      ^
[   14.718251]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.718613]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.718976] ==================================================================
[   14.908327] ==================================================================
[   14.908692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.908957] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.909185] 
[   14.909315] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.909361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.909375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.909397] Call Trace:
[   14.909415]  <TASK>
[   14.909432]  dump_stack_lvl+0x73/0xb0
[   14.909457]  print_report+0xd1/0x650
[   14.909481]  ? __virt_addr_valid+0x1db/0x2d0
[   14.909505]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.909527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.909558]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.909582]  kasan_report+0x141/0x180
[   14.909606]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.909634]  __asan_report_load8_noabort+0x18/0x20
[   14.909656]  kasan_atomics_helper+0x4f98/0x5450
[   14.909681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.909705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.909728]  ? kasan_atomics+0x152/0x310
[   14.909753]  kasan_atomics+0x1dc/0x310
[   14.909774]  ? __pfx_kasan_atomics+0x10/0x10
[   14.909797]  ? __pfx_read_tsc+0x10/0x10
[   14.909818]  ? ktime_get_ts64+0x86/0x230
[   14.909845]  kunit_try_run_case+0x1a5/0x480
[   14.909869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.909893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.909919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.909944]  ? __kthread_parkme+0x82/0x180
[   14.909967]  ? preempt_count_sub+0x50/0x80
[   14.909993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.910018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.910043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.910068]  kthread+0x337/0x6f0
[   14.910087]  ? trace_preempt_on+0x20/0xc0
[   14.910112]  ? __pfx_kthread+0x10/0x10
[   14.910132]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.910155]  ? calculate_sigpending+0x7b/0xa0
[   14.910178]  ? __pfx_kthread+0x10/0x10
[   14.910199]  ret_from_fork+0x41/0x80
[   14.910221]  ? __pfx_kthread+0x10/0x10
[   14.910250]  ret_from_fork_asm+0x1a/0x30
[   14.910283]  </TASK>
[   14.910294] 
[   14.917754] Allocated by task 284:
[   14.917931]  kasan_save_stack+0x45/0x70
[   14.918142]  kasan_save_track+0x18/0x40
[   14.918309]  kasan_save_alloc_info+0x3b/0x50
[   14.918525]  __kasan_kmalloc+0xb7/0xc0
[   14.918736]  __kmalloc_cache_noprof+0x189/0x420
[   14.918935]  kasan_atomics+0x95/0x310
[   14.919119]  kunit_try_run_case+0x1a5/0x480
[   14.919336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.919515]  kthread+0x337/0x6f0
[   14.919636]  ret_from_fork+0x41/0x80
[   14.919824]  ret_from_fork_asm+0x1a/0x30
[   14.920030] 
[   14.920123] The buggy address belongs to the object at ffff8881039f4880
[   14.920123]  which belongs to the cache kmalloc-64 of size 64
[   14.920685] The buggy address is located 0 bytes to the right of
[   14.920685]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.921064] 
[   14.921139] The buggy address belongs to the physical page:
[   14.921373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.921817] flags: 0x200000000000000(node=0|zone=2)
[   14.922069] page_type: f5(slab)
[   14.922298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.922536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.922843] page dumped because: kasan: bad access detected
[   14.923097] 
[   14.923192] Memory state around the buggy address:
[   14.923430]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.923753]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.924067] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.924326]                                      ^
[   14.924554]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.924880]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.925199] ==================================================================
[   14.523847] ==================================================================
[   14.524204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.524947] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.525204] 
[   14.525327] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.525385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.525399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.525421] Call Trace:
[   14.525451]  <TASK>
[   14.525471]  dump_stack_lvl+0x73/0xb0
[   14.525498]  print_report+0xd1/0x650
[   14.525521]  ? __virt_addr_valid+0x1db/0x2d0
[   14.525559]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.525583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.525619]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.525653]  kasan_report+0x141/0x180
[   14.525678]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.525707]  kasan_check_range+0x10c/0x1c0
[   14.525739]  __kasan_check_write+0x18/0x20
[   14.525762]  kasan_atomics_helper+0x15b6/0x5450
[   14.525786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.525822]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.525846]  ? kasan_atomics+0x152/0x310
[   14.525871]  kasan_atomics+0x1dc/0x310
[   14.525892]  ? __pfx_kasan_atomics+0x10/0x10
[   14.525923]  ? __pfx_read_tsc+0x10/0x10
[   14.525944]  ? ktime_get_ts64+0x86/0x230
[   14.525971]  kunit_try_run_case+0x1a5/0x480
[   14.526008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.526067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.526092]  ? __kthread_parkme+0x82/0x180
[   14.526118]  ? preempt_count_sub+0x50/0x80
[   14.526157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.526251]  kthread+0x337/0x6f0
[   14.526271]  ? trace_preempt_on+0x20/0xc0
[   14.526307]  ? __pfx_kthread+0x10/0x10
[   14.526327]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.526350]  ? calculate_sigpending+0x7b/0xa0
[   14.526374]  ? __pfx_kthread+0x10/0x10
[   14.526395]  ret_from_fork+0x41/0x80
[   14.526428]  ? __pfx_kthread+0x10/0x10
[   14.526448]  ret_from_fork_asm+0x1a/0x30
[   14.526490]  </TASK>
[   14.526502] 
[   14.534331] Allocated by task 284:
[   14.534470]  kasan_save_stack+0x45/0x70
[   14.534617]  kasan_save_track+0x18/0x40
[   14.534754]  kasan_save_alloc_info+0x3b/0x50
[   14.535032]  __kasan_kmalloc+0xb7/0xc0
[   14.535256]  __kmalloc_cache_noprof+0x189/0x420
[   14.535483]  kasan_atomics+0x95/0x310
[   14.535685]  kunit_try_run_case+0x1a5/0x480
[   14.535897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.536153]  kthread+0x337/0x6f0
[   14.536334]  ret_from_fork+0x41/0x80
[   14.536549]  ret_from_fork_asm+0x1a/0x30
[   14.536849] 
[   14.536948] The buggy address belongs to the object at ffff8881039f4880
[   14.536948]  which belongs to the cache kmalloc-64 of size 64
[   14.537518] The buggy address is located 0 bytes to the right of
[   14.537518]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.538113] 
[   14.538190] The buggy address belongs to the physical page:
[   14.538377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.538620] flags: 0x200000000000000(node=0|zone=2)
[   14.538785] page_type: f5(slab)
[   14.538910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.539391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.539746] page dumped because: kasan: bad access detected
[   14.540018] 
[   14.540114] Memory state around the buggy address:
[   14.540384]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540757]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540973] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.541184]                                      ^
[   14.541348]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541877]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542217] ==================================================================
[   14.961771] ==================================================================
[   14.962038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.962328] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.962673] 
[   14.962795] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.962852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.962866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.962889] Call Trace:
[   14.962907]  <TASK>
[   14.962927]  dump_stack_lvl+0x73/0xb0
[   14.962953]  print_report+0xd1/0x650
[   14.962977]  ? __virt_addr_valid+0x1db/0x2d0
[   14.963001]  ? kasan_atomics_helper+0x218a/0x5450
[   14.963023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.963048]  ? kasan_atomics_helper+0x218a/0x5450
[   14.963072]  kasan_report+0x141/0x180
[   14.963095]  ? kasan_atomics_helper+0x218a/0x5450
[   14.963136]  kasan_check_range+0x10c/0x1c0
[   14.963158]  __kasan_check_write+0x18/0x20
[   14.963180]  kasan_atomics_helper+0x218a/0x5450
[   14.963206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.963243]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.963269]  ? kasan_atomics+0x152/0x310
[   14.963301]  kasan_atomics+0x1dc/0x310
[   14.963324]  ? __pfx_kasan_atomics+0x10/0x10
[   14.963349]  ? __pfx_read_tsc+0x10/0x10
[   14.963373]  ? ktime_get_ts64+0x86/0x230
[   14.963400]  kunit_try_run_case+0x1a5/0x480
[   14.963427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.963454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.963482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.963510]  ? __kthread_parkme+0x82/0x180
[   14.963534]  ? preempt_count_sub+0x50/0x80
[   14.963561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.963587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.963613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.963638]  kthread+0x337/0x6f0
[   14.963668]  ? trace_preempt_on+0x20/0xc0
[   14.963693]  ? __pfx_kthread+0x10/0x10
[   14.963713]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.963737]  ? calculate_sigpending+0x7b/0xa0
[   14.963761]  ? __pfx_kthread+0x10/0x10
[   14.963782]  ret_from_fork+0x41/0x80
[   14.963805]  ? __pfx_kthread+0x10/0x10
[   14.963824]  ret_from_fork_asm+0x1a/0x30
[   14.963857]  </TASK>
[   14.963869] 
[   14.971806] Allocated by task 284:
[   14.972002]  kasan_save_stack+0x45/0x70
[   14.972219]  kasan_save_track+0x18/0x40
[   14.972430]  kasan_save_alloc_info+0x3b/0x50
[   14.972628]  __kasan_kmalloc+0xb7/0xc0
[   14.972803]  __kmalloc_cache_noprof+0x189/0x420
[   14.972970]  kasan_atomics+0x95/0x310
[   14.973106]  kunit_try_run_case+0x1a5/0x480
[   14.973276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973535]  kthread+0x337/0x6f0
[   14.973772]  ret_from_fork+0x41/0x80
[   14.973957]  ret_from_fork_asm+0x1a/0x30
[   14.974150] 
[   14.974232] The buggy address belongs to the object at ffff8881039f4880
[   14.974232]  which belongs to the cache kmalloc-64 of size 64
[   14.974783] The buggy address is located 0 bytes to the right of
[   14.974783]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.975262] 
[   14.975363] The buggy address belongs to the physical page:
[   14.975595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.975975] flags: 0x200000000000000(node=0|zone=2)
[   14.976170] page_type: f5(slab)
[   14.976330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.976649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.976894] page dumped because: kasan: bad access detected
[   14.977069] 
[   14.977140] Memory state around the buggy address:
[   14.977342]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.977673]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.978000] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.978336]                                      ^
[   14.978557]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978821]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.979039] ==================================================================
[   14.504955] ==================================================================
[   14.505434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.505833] Write of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.506150] 
[   14.506257] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.506306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.506319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.506343] Call Trace:
[   14.506362]  <TASK>
[   14.506382]  dump_stack_lvl+0x73/0xb0
[   14.506409]  print_report+0xd1/0x650
[   14.506435]  ? __virt_addr_valid+0x1db/0x2d0
[   14.506458]  ? kasan_atomics_helper+0x151d/0x5450
[   14.506481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.506506]  ? kasan_atomics_helper+0x151d/0x5450
[   14.506530]  kasan_report+0x141/0x180
[   14.506554]  ? kasan_atomics_helper+0x151d/0x5450
[   14.506583]  kasan_check_range+0x10c/0x1c0
[   14.506605]  __kasan_check_write+0x18/0x20
[   14.506627]  kasan_atomics_helper+0x151d/0x5450
[   14.506662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.506687]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.506711]  ? kasan_atomics+0x152/0x310
[   14.506736]  kasan_atomics+0x1dc/0x310
[   14.506758]  ? __pfx_kasan_atomics+0x10/0x10
[   14.506780]  ? __pfx_read_tsc+0x10/0x10
[   14.506801]  ? ktime_get_ts64+0x86/0x230
[   14.506829]  kunit_try_run_case+0x1a5/0x480
[   14.506867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.506890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.506928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.506963]  ? __kthread_parkme+0x82/0x180
[   14.506987]  ? preempt_count_sub+0x50/0x80
[   14.507014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.507040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.507065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.507111]  kthread+0x337/0x6f0
[   14.507131]  ? trace_preempt_on+0x20/0xc0
[   14.507156]  ? __pfx_kthread+0x10/0x10
[   14.507176]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.507199]  ? calculate_sigpending+0x7b/0xa0
[   14.507223]  ? __pfx_kthread+0x10/0x10
[   14.507253]  ret_from_fork+0x41/0x80
[   14.507275]  ? __pfx_kthread+0x10/0x10
[   14.507295]  ret_from_fork_asm+0x1a/0x30
[   14.507328]  </TASK>
[   14.507340] 
[   14.515986] Allocated by task 284:
[   14.516170]  kasan_save_stack+0x45/0x70
[   14.516389]  kasan_save_track+0x18/0x40
[   14.516577]  kasan_save_alloc_info+0x3b/0x50
[   14.516810]  __kasan_kmalloc+0xb7/0xc0
[   14.516962]  __kmalloc_cache_noprof+0x189/0x420
[   14.517183]  kasan_atomics+0x95/0x310
[   14.517372]  kunit_try_run_case+0x1a5/0x480
[   14.517560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.517849]  kthread+0x337/0x6f0
[   14.518003]  ret_from_fork+0x41/0x80
[   14.518155]  ret_from_fork_asm+0x1a/0x30
[   14.518393] 
[   14.518492] The buggy address belongs to the object at ffff8881039f4880
[   14.518492]  which belongs to the cache kmalloc-64 of size 64
[   14.518944] The buggy address is located 0 bytes to the right of
[   14.518944]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.519322] 
[   14.519398] The buggy address belongs to the physical page:
[   14.519573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.519815] flags: 0x200000000000000(node=0|zone=2)
[   14.520055] page_type: f5(slab)
[   14.520326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.520682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.521019] page dumped because: kasan: bad access detected
[   14.521251] 
[   14.521322] Memory state around the buggy address:
[   14.521479]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.521702]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.521919] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.522132]                                      ^
[   14.522406]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.522810]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.523159] ==================================================================
[   14.427904] ==================================================================
[   14.428335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.428779] Read of size 8 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.429003] 
[   14.429195] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.429287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.429302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.429337] Call Trace:
[   14.429360]  <TASK>
[   14.429379]  dump_stack_lvl+0x73/0xb0
[   14.429406]  print_report+0xd1/0x650
[   14.429431]  ? __virt_addr_valid+0x1db/0x2d0
[   14.429454]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.429478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.429503]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.429562]  kasan_report+0x141/0x180
[   14.429587]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.429627]  kasan_check_range+0x10c/0x1c0
[   14.429648]  __kasan_check_read+0x15/0x20
[   14.429669]  kasan_atomics_helper+0x13b5/0x5450
[   14.429694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.429718]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.429742]  ? kasan_atomics+0x152/0x310
[   14.429767]  kasan_atomics+0x1dc/0x310
[   14.429787]  ? __pfx_kasan_atomics+0x10/0x10
[   14.429809]  ? __pfx_read_tsc+0x10/0x10
[   14.429831]  ? ktime_get_ts64+0x86/0x230
[   14.429857]  kunit_try_run_case+0x1a5/0x480
[   14.429883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.429932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429956]  ? __kthread_parkme+0x82/0x180
[   14.429980]  ? preempt_count_sub+0x50/0x80
[   14.430008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.430033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.430057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.430081]  kthread+0x337/0x6f0
[   14.430110]  ? trace_preempt_on+0x20/0xc0
[   14.430134]  ? __pfx_kthread+0x10/0x10
[   14.430154]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.430188]  ? calculate_sigpending+0x7b/0xa0
[   14.430212]  ? __pfx_kthread+0x10/0x10
[   14.430240]  ret_from_fork+0x41/0x80
[   14.430263]  ? __pfx_kthread+0x10/0x10
[   14.430282]  ret_from_fork_asm+0x1a/0x30
[   14.430314]  </TASK>
[   14.430325] 
[   14.438050] Allocated by task 284:
[   14.438243]  kasan_save_stack+0x45/0x70
[   14.438448]  kasan_save_track+0x18/0x40
[   14.438643]  kasan_save_alloc_info+0x3b/0x50
[   14.438941]  __kasan_kmalloc+0xb7/0xc0
[   14.439098]  __kmalloc_cache_noprof+0x189/0x420
[   14.439277]  kasan_atomics+0x95/0x310
[   14.439469]  kunit_try_run_case+0x1a5/0x480
[   14.439685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.439890]  kthread+0x337/0x6f0
[   14.440092]  ret_from_fork+0x41/0x80
[   14.440250]  ret_from_fork_asm+0x1a/0x30
[   14.440444] 
[   14.440517] The buggy address belongs to the object at ffff8881039f4880
[   14.440517]  which belongs to the cache kmalloc-64 of size 64
[   14.441247] The buggy address is located 0 bytes to the right of
[   14.441247]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.441689] 
[   14.441806] The buggy address belongs to the physical page:
[   14.442105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.442472] flags: 0x200000000000000(node=0|zone=2)
[   14.442755] page_type: f5(slab)
[   14.442883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.443114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.443409] page dumped because: kasan: bad access detected
[   14.443661] 
[   14.443758] Memory state around the buggy address:
[   14.444026]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.444289]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.444513] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.444979]                                      ^
[   14.445207]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445567]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.445891] ==================================================================
[   14.298180] ==================================================================
[   14.298910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.299328] Write of size 4 at addr ffff8881039f48b0 by task kunit_try_catch/284
[   14.300055] 
[   14.300296] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   14.300353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.300367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.300391] Call Trace:
[   14.300411]  <TASK>
[   14.300469]  dump_stack_lvl+0x73/0xb0
[   14.300500]  print_report+0xd1/0x650
[   14.300526]  ? __virt_addr_valid+0x1db/0x2d0
[   14.300549]  ? kasan_atomics_helper+0x1148/0x5450
[   14.300574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.300598]  ? kasan_atomics_helper+0x1148/0x5450
[   14.300621]  kasan_report+0x141/0x180
[   14.300660]  ? kasan_atomics_helper+0x1148/0x5450
[   14.300689]  kasan_check_range+0x10c/0x1c0
[   14.300710]  __kasan_check_write+0x18/0x20
[   14.300731]  kasan_atomics_helper+0x1148/0x5450
[   14.300756]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.300781]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.300804]  ? kasan_atomics+0x152/0x310
[   14.300830]  kasan_atomics+0x1dc/0x310
[   14.300850]  ? __pfx_kasan_atomics+0x10/0x10
[   14.300873]  ? __pfx_read_tsc+0x10/0x10
[   14.300894]  ? ktime_get_ts64+0x86/0x230
[   14.300921]  kunit_try_run_case+0x1a5/0x480
[   14.300948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.300971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.300997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.301022]  ? __kthread_parkme+0x82/0x180
[   14.301045]  ? preempt_count_sub+0x50/0x80
[   14.301072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.301121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.301145]  kthread+0x337/0x6f0
[   14.301162]  ? trace_preempt_on+0x20/0xc0
[   14.301187]  ? __pfx_kthread+0x10/0x10
[   14.301207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.301242]  ? calculate_sigpending+0x7b/0xa0
[   14.301265]  ? __pfx_kthread+0x10/0x10
[   14.301285]  ret_from_fork+0x41/0x80
[   14.301306]  ? __pfx_kthread+0x10/0x10
[   14.301325]  ret_from_fork_asm+0x1a/0x30
[   14.301358]  </TASK>
[   14.301370] 
[   14.312553] Allocated by task 284:
[   14.312883]  kasan_save_stack+0x45/0x70
[   14.313273]  kasan_save_track+0x18/0x40
[   14.313589]  kasan_save_alloc_info+0x3b/0x50
[   14.313935]  __kasan_kmalloc+0xb7/0xc0
[   14.314124]  __kmalloc_cache_noprof+0x189/0x420
[   14.314345]  kasan_atomics+0x95/0x310
[   14.314521]  kunit_try_run_case+0x1a5/0x480
[   14.314800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.315045]  kthread+0x337/0x6f0
[   14.315202]  ret_from_fork+0x41/0x80
[   14.315351]  ret_from_fork_asm+0x1a/0x30
[   14.315553] 
[   14.315653] The buggy address belongs to the object at ffff8881039f4880
[   14.315653]  which belongs to the cache kmalloc-64 of size 64
[   14.316019] The buggy address is located 0 bytes to the right of
[   14.316019]  allocated 48-byte region [ffff8881039f4880, ffff8881039f48b0)
[   14.316780] 
[   14.316859] The buggy address belongs to the physical page:
[   14.317035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f4
[   14.317380] flags: 0x200000000000000(node=0|zone=2)
[   14.317640] page_type: f5(slab)
[   14.317829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.318160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.318492] page dumped because: kasan: bad access detected
[   14.318744] 
[   14.318830] Memory state around the buggy address:
[   14.319031]  ffff8881039f4780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.319318]  ffff8881039f4800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.319615] >ffff8881039f4880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.319882]                                      ^
[   14.320038]  ffff8881039f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.320350]  ffff8881039f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.320678] ==================================================================